|Organizer||Prof. Dr. Matteo Maffei and Manuel Reinert|
|Date||Every Thursday, 9:30am (look in the table below for upcoming talks)|
|Audience||Everyone who is interested in current research in security and privacy. In particular, Master students and PhD students with a solid background in security and privacy. New students are always welcome!|
|Place||E1.7, room 0.01|
|Content||We will discuss recent papers from top conferences with a strong connection to security or privacy. Discussing means that one student is presenting the paper for 30 minutes (slides or whiteboard, sometimes also video). The presentation is followed by a 30 minutes discussion.|
Reading group as a seminar or research immersion lab
Every student is welcome to attend the reading group as a listener. Alternatively, we give students the opportunity to obtain credits for participating in the reading group in a more active way. There are two options with two different requirements, explained below.
Count it as a seminar (7 ECTS)In order to receive a seminar certificate counting for 7 credit points you have to fulfill the following tasks:
- Read and present four papers in the area of security and privacy, which appeared in top tier conferences. You will decide which papers to present in accordance with us. Each presentation takes 30 minutes followed by a 30 minute discussion round. The presentation must be supported by slides. At least one week before the actual presentation you have to send the slides to us and you will get feedback on how to improve them.
- You have to attend six more reading group sessions, i.e., ten sessions in total. These do not have to be in a row. We count the sessions in which you are present.
Count it as a research immersion lab (6 ECTS)In order to receive 6 credit points for a research immersion lab you have to fulfill the following tasks:
- Read and present one paper in the area of security and privacy, which appeared in top tier conferences. You will decide which paper to present in accordance with us. The presentation takes 30 minutes followed by a 30 minute discussion round. Moreover, it must be supported by slides. At least one week before the actual presentation you have to send the slides to us and you will get feedback on how to improve them.
- After the presentation you have to come up with a research idea and define goals for your project, which you then discuss with us. You will then work on achieving these goals under the supervision of a member of our group.
|21.10.2015||Adrien Koutsos||Symbolic proofs of computational equivalence
|29.10.2015||Manuel Reinert||Observing and Preventing Leakage in
Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, and Divya Sharma.
|19.11.2015||Fabienne Eigner||Du-Vote: Remote Electronic Voting with Untrusted
Gurchetan S. Grewal, Mark D. Ryan, Liqun Chen, and Michael R. Clarkson.
|26.11.2015||Niklas Grimm||Automated Symbolic Proofs of Observational
David Basin, Jannik Dreier, and Ralf Sasse.
|03.12.2015||Giulio Malavolta||Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano and Dario Fiore.
|10.12.2015||Ilya Grishchenko||Cross-Site Search Attacks
Nethanel Gelernter and Amir Herzberg.
|04.02.2016||Manuel Reinert||Order Preserving Encryption
S&P 2013, CCS 2014 and 2015
|11.02.2016||Fabienne Eigner||Portrait of a Privacy Invasion: Detecting
Relationships Through Large-scale Photo
Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna.
|18.02.2016||Adrien Koutsos||Automated Proofs of Pairing-Based
Gilles Barthe, Benjamin Grégoire, and Benedikt Schmidt.
|25.02.2016||Ilya Grishchenko||Detecting and Exploiting Second Order
Denial-of-Service Vulnerabilities in Web
Oswaldo Olivo, Isil Dillig, and Calvin Lin.
|03.03.2016||Giulio Malavolta||Chosen-Ciphertext Security from Subset
Sebastian Faust, Daniel Masny, and Daniele Venturi.
Pratik Soni, Enrico Budianto, and Prateek Saxena.
For previous talks, please see here.