Security and Privacy Lunch

People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.

We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.

Organizational Information

  • Contact: Johannes Lohmöller
  • ECTS Credits: none (but you can get a certificate)
  • Audience: Anyone interested in security and privacy
  • Language: English
  • Registration: Please subscribe to our mailing list

Logistics

  • Discussion Date: Wednesday, 12:30 PM 
  • Place: COMSYS Big Meeting Room, Room 9006, Building E3
  • Suggestions for videos are very welcome, please contact Johannes Lohmöller

Preliminary Schedule

2024-10-09 Managing Secondary Authentication Factors and Attacker Preferences
”If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor Manager (Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons @ USENIX Security 23)
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale (Michele Campobasso, Luca Allodi @ USENIX Security 23)
2024-10-23 Privacy Implications of AirTags
Who tracks the trackers? Balancing privacy and stalker detection for Apple's AirTags (Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain @ RWC 24)
2024-11-06 Internet Censorship
Modeling and Detecting Internet Censorship Events (Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi @ NDSS 24)
2024-11-20 The Legal Side of Incident Response
Lessons Lost: Incident Response in the Age of Cber Insurance and Breach Attorneys (Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz @ USENIX Security 2023)
2024-12-04 Enhancing the Authentication on IoT Devices
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices (Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li @ NDSS 24)
2024-12-18 Acoustic Side-Channel Attacks
Acoustic Keystroke Leakage on Smart Televisions (Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann @ NDSS 24)
2025-01-01
Cancelled - New Year's Day
2025-01-15 Privacy Risks From Wearable Activity Trackers and How to Cover up Anomalous Accesses to Electronic Health Records
Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers (Noe Zufferey, Mathias Humbert, Romain Tavenard, Kevin Huguenin @ USENIX Security 23)
How to Cover up Anomalous Accesses to Electronic Health Records (Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter @ USENIX Security 23)
2025-01-29
Cancelled - COMSYS Chair Retreat
2025-02-12 How to achieve real-world use of FHE
Towards robust FHE for the real world (Christian Knabenhans, Alexander Viand, Anwar Hithnawi @ RWC 24)
2025-02-26 Smart Home Monitoring
CP-IoT: A Cross-Platform Monitoring System for Smart Home (Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan @ NDSS 24)
2025-03-12
TBA / Suggestions Welcome
2025-03-26
TBA / Suggestions Welcome
- Impressum | Datenschutz -