People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.
Date | Topic |
2025-04-09 | Intentionally Breaking End-to-End Messaging A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat (Martin R. Albrecht, Sunoo Park, Douglas Stebila, Mike Specter @ RWC 24) |
2025-04-23 | 2025-04-23 Wireless Aviation Attacks & Practical AI Threat Models Towards More Practical Threat Models in Artificial Intelligence Security (Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi @ USENIX Security 24) |
2025-05-07 | Your Code Editor Is Vulnerable UntrustIDE: Exploiting Weaknesses in VS Code Extensions (Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos @ NDSS 24) |
2025-05-21 | Hybrid Attestation Neglecting TOCTOU IDA: Hybrid Attestation with Support for Interrupts and TOCTOU (Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh @ NDSS 24) |
2025-06-04 | Security Pitfalls in Mobile Payment and App Ecosystems: Authentication Loopholes and TLS Validation Risks Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy (Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, and Amr Youssef @ USENIX Sec 24) |
2025-06-18 | IoT Security in Reality & Network Latency Measurement Techniques CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse (Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi @USENIX Sec 24) |
2025-07-02 | Internet Censorship On Precisely Detecting Censorship Circumvention in Real-World Networks (Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen @NDSS 24) |
2025-07-16 | Your LDAP Server is Exposing Secrets & Discovering Vulnerable Deployments on Scale 6Sense: Internet-Wide IPv6 Scanning and its Security Applications (Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce @USENIX Sec 24) |
2025-07-30 | Membership Inference for LLMs Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models (Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye @USENIX Sec 24) |
2025-08-13 | Trusted Tlemetry Tool for Cloud Providers TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts (Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar @NDSS 24) |
2025-08-27 | Social Authentication to Replace Manual Key Authentication & Obstacles While Deploying Passwordless Authentication Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication (Leona Lassak, Elleen Pan and Blase Ur, Maximilian Golla @USENIX 24) |
2025-09-10 | Verified or Not That is the Question & (Media) Perception of Students in Higher Education Media Portrayals of Student Privacy in Higher Education: A 2013-2023 Review (Min Cheong Kim @SOUPS 24) |
2025-09-24 | Android Security Updates: Delays, Disparities, and the OEM Factor 50 Shades of Support: A Device-Centric Analysis of Android Security Updates (Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, and Selcuk Uluagac @NDSS 24) |