Research Seminar

Next seminar sessions

Date Time Speaker Topic  
05.07.2024 12:00 - 13:30 CEST Riccardo Scandariato Automated Vulnerability Repair for Java: from Challenges to Innovation Details

Past sessions

Date Time Speaker Topic  
21.05.2024 16:30 - 18:00 CEST Robert Künnemann CryptoBAP: Verifying closed-source protocol implementations Details
16.02.2024 12:00 - 13:30 CET Simon Koch GDPR, Privacy Labels, and a Touch of Consent Details
06.12.2023 10:15 - 11:45 CET Chitchanok Chuengsatiansup

Cache-Timing Attack Against HQC

Details
24.10.2023 17:30 - 18:30 CEST Daniel Moghimi Downfall: Exploiting Speculative Data Gathering Details
04.10.2023 11:00 - 12:00 CEST Max Eisele Debugger-Driven Embedded Fuzzing Details
14.09.2023 10:00 - 10:45 CEST Carmela Troncoso When decentralization, security, and privacy are not friends Details
14.09.2023 09:15 - 10:00 CEST Gilles Barthe An introduction to Differential Privacy Details
08.09.2023 12:45 - 14:00 CEST Diego Aranha Faster constant-time evaluation of the Kronecker symbol Details
01.08.2023 16:00 - 17:00 CEST Estuardo Alpirez Bock / Łukasz Chmielewski Breaking DPA-protected Kyber via the pair-pointwise multiplication Details
27.04.2023 10:00 - 11:00 CEST Julius Hermelink Decryption Errors and Implementation Attacks on Kyber Details
04.04.2023 16:00 - 17:00 CEST Jan Richter-Brockmann Computer-Aided Verification of Countermeasures against Physical Attacks Details
03.02.2023 12:30-13:30 CET Sinan Yavuz Physical Unclonable Functions: An Introduction to Hardware-based Security Primitive Details
30.01.2023 14:00-15:00 CET David Froelicher Privacy-Preserving Federated Analytics with Multiparty Homomorphic Encryption Details
25.10.2022 11:00-12:00 CEST David Basin Breaking and Fixing Modern Payment Protocols with Tamarin Details
19.10.2022 16:00-17:00 CEST Berk Sunar Signature Correction Attacks on Post-quantum Schemes Details
23.09.2022 12:00-13:00 CEST Debajyoti Das OrgAn: Organizational Anonymity with Low Latency Details
16.08.2022 17:00-18:00 CEST Melissa Azouaoui Post-Quantum Authenticated Encryption Against Chosen-Ciphertext Side-Channel Attacks Avoiding the FO-calypse Details
29.07.2022 13:00 - 14:00 CEST Benjamin Bichsel DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers Details
22.06.2022 11:00 - 12:00 CEST Chitchanok Chuengsatiansup Spectre Declassified: Reading from the Right Place at the Wrong Time Details
21.06.2022 16:00 - 17:00 CEST Zhiyuan Zhang Breaking and Fixing Speculative Load Hardening Details
03.05.2022 16:00 - 17:00 CEST Dennis Gnad On-Chip Physical Attack Threats to FPGAs and beyond Details
01.02.2022 16:00 - 17:00 CET Theresa Stadler Synthetic Data -- Anonymisation Groundhog Day Details
11.01.2022 16:00 - 17:00 CET Aria Shahverdi Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite Details
16.12.2021 15:00 - 15:45 CET Aniket Kate Ripple Network Details
21.09.2021 16:00 - 17:00 CEST Nicholas Carlini Extracting Training Data from Large Language Models Details
20.07.2021 16:00 - 17:00 CEST Aniket Kate Designing and Analyzing Network Anonymity Solutions Details
20.07.2021 15:00 - 16:00 CEST Farzad Zafarani Differentially Private Naïve Bayes Classifier Using Smooth Sensitivity Details
25.05.2021 16:00 - 17:00 CEST Ghada Dessouky Side-Channel-Resilient Caches for Trusted Execution Environments Details
27.04.2021 15:00 - 16:00 CEST Gorka Irazoqui Apecechea Upcoming trends in decentralized protocols Details
17.03.2021 09:00 -
10:00 CET
Takao Murakami Locally Differentially Private Analysis of Graph Statistics Details
16.02.2021 16:00 -
17:00 CET
Shahin Tajik Real-World Snapshots vs. Theory:
Questioning the t-Probing Security Model
Details

To top