Forschungsseminar
Nächste Seminartermine
Datum | Uhrzeit | Redner | Thema | |
Vergangene Sitzungen
Datum | Uhrzeit | Redner | Thema | |
05.07.2024 | 12:00 - 13:30 CEST | Riccardo Scandariato | Automated Vulnerability Repair for Java: from Challenges to Innovation | Details |
21.05.2024 | 16:30 - 18:00 CEST | Robert Künnemann | CryptoBAP: Verifying closed-source protocol implementations | Details |
16.02.2024 | 12:00 - 13:30 CET | Simon Koch | GDPR, Privacy Labels, and a Touch of Consent | Details |
06.12.2023 | 10:15 - 11:45 CET | Chitchanok Chuengsatiansup | Cache-Timing Attack Against HQC | Details |
24.10.2023 | 17:30 - 18:30 CEST | Daniel Moghimi | Downfall: Exploiting Speculative Data Gathering | Details |
04.10.2023 | 11:00 - 12:00 CEST | Max Eisele | Debugger-Driven Embedded Fuzzing | Details |
14.09.2023 | 10:00 - 10:45 CEST | Carmela Troncoso | When decentralization, security, and privacy are not friends | Details |
14.09.2023 | 09:15 - 10:00 CEST | Gilles Barthe | An introduction to Differential Privacy | Details |
08.09.2023 | 12:45 - 14:00 CEST | Diego Aranha | Faster constant-time evaluation of the Kronecker symbol | Details |
01.08.2023 | 16:00 - 17:00 CEST | Estuardo Alpirez Bock / Łukasz Chmielewski | Breaking DPA-protected Kyber via the pair-pointwise multiplication | Details |
27.04.2023 | 10:00 - 11:00 CEST | Julius Hermelink | Decryption Errors and Implementation Attacks on Kyber | Details |
04.04.2023 | 16:00 - 17:00 CEST | Jan Richter-Brockmann | Computer-Aided Verification of Countermeasures against Physical Attacks | Details |
03.02.2023 | 12:30-13:30 CET | Sinan Yavuz | Physical Unclonable Functions: An Introduction to Hardware-based Security Primitive | Details |
30.01.2023 | 14:00-15:00 CET | David Froelicher | Privacy-Preserving Federated Analytics with Multiparty Homomorphic Encryption | Details |
25.10.2022 | 11:00-12:00 CEST | David Basin | Breaking and Fixing Modern Payment Protocols with Tamarin | Details |
19.10.2022 | 16:00-17:00 CEST | Berk Sunar | Signature Correction Attacks on Post-quantum Schemes | Details |
23.09.2022 | 12:00-13:00 CEST | Debajyoti Das | OrgAn: Organizational Anonymity with Low Latency | Details |
16.08.2022 | 17:00-18:00 CEST | Melissa Azouaoui | Post-Quantum Authenticated Encryption Against Chosen-Ciphertext Side-Channel Attacks Avoiding the FO-calypse | Details |
29.07.2022 | 13:00 - 14:00 CEST | Benjamin Bichsel | DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers | Details |
22.06.2022 | 11:00 - 12:00 CEST | Chitchanok Chuengsatiansup | Spectre Declassified: Reading from the Right Place at the Wrong Time | Details |
21.06.2022 | 16:00 - 17:00 CEST | Zhiyuan Zhang | Breaking and Fixing Speculative Load Hardening | Details |
03.05.2022 | 16:00 - 17:00 CEST | Dennis Gnad | On-Chip Physical Attack Threats to FPGAs and beyond | Details |
01.02.2022 | 16:00 - 17:00 CET | Theresa Stadler | Synthetic Data -- Anonymisation Groundhog Day | Details |
11.01.2022 | 16:00 - 17:00 CET | Aria Shahverdi | Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite | Details |
16.12.2021 | 15:00 - 15:45 CET | Aniket Kate | Ripple Network | Details |
21.09.2021 | 16:00 - 17:00 CEST | Nicholas Carlini | Extracting Training Data from Large Language Models | Details |
20.07.2021 | 16:00 - 17:00 CEST | Aniket Kate | Designing and Analyzing Network Anonymity Solutions | Details |
20.07.2021 | 15:00 - 16:00 CEST | Farzad Zafarani | Differentially Private Naïve Bayes Classifier Using Smooth Sensitivity | Details |
25.05.2021 | 16:00 - 17:00 CEST | Ghada Dessouky | Side-Channel-Resilient Caches for Trusted Execution Environments | Details |
27.04.2021 | 15:00 - 16:00 CEST | Gorka Irazoqui Apecechea | Upcoming trends in decentralized protocols | Details |
17.03.2021 | 09:00 - 10:00 CET | Takao Murakami | Locally Differentially Private Analysis of Graph Statistics | Details |
16.02.2021 | 16:00 - 17:00 CET | Shahin Tajik | Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model | Details |