Reading Group

Organizer Prof. Dr. Matteo Maffei and Manuel Reinert
Date Every Thursday, 9:30am (look in the table below for upcoming talks)
Audience Everyone who is interested in current research in security and privacy. In particular, Master students and PhD students with a solid background in security and privacy. New students are always welcome!
Place E1.7, room 0.01
Content We will discuss recent papers from top conferences with a strong connection to security or privacy. Discussing means that one student is presenting the paper for 30 minutes (slides or whiteboard, sometimes also video). The presentation is followed by a 30 minutes discussion.

Reading group as a seminar or research immersion lab

Every student is welcome to attend the reading group as a listener. Alternatively, we give students the opportunity to obtain credits for participating in the reading group in a more active way. There are two options with two different requirements, explained below.

Count it as a seminar (7 ECTS)

In order to receive a seminar certificate counting for 7 credit points you have to fulfill the following tasks:
  • Read and present four papers in the area of security and privacy, which appeared in top tier conferences. You will decide which papers to present in accordance with us. Each presentation takes 30 minutes followed by a 30 minute discussion round. The presentation must be supported by slides. At least one week before the actual presentation you have to send the slides to us and you will get feedback on how to improve them.
  • You have to attend six more reading group sessions, i.e., ten sessions in total. These do not have to be in a row. We count the sessions in which you are present.

Count it as a research immersion lab (6 ECTS)

In order to receive 6 credit points for a research immersion lab you have to fulfill the following tasks:
  • Read and present one paper in the area of security and privacy, which appeared in top tier conferences. You will decide which paper to present in accordance with us. The presentation takes 30 minutes followed by a 30 minute discussion round. Moreover, it must be supported by slides. At least one week before the actual presentation you have to send the slides to us and you will get feedback on how to improve them.
  • After the presentation you have to come up with a research idea and define goals for your project, which you then discuss with us. You will then work on achieving these goals under the supervision of a member of our group.
In case of questions, please do not hesitate to contact Manuel Reinert.

Talk Announcements

Date Speaker Paper
21.10.2015 Adrien Koutsos Symbolic proofs of computational equivalence properties
Master's thesis
29.10.2015 Manuel Reinert Observing and Preventing Leakage in MapReduce
Olga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, and Divya Sharma.
CCS 2015
05.11.2015cancelled
12.11.2015cancelled
19.11.2015 Fabienne Eigner Du-Vote: Remote Electronic Voting with Untrusted Computers
Gurchetan S. Grewal, Mark D. Ryan, Liqun Chen, and Michael R. Clarkson.
CSF 2015
26.11.2015 Niklas Grimm Automated Symbolic Proofs of Observational Equivalence
David Basin, Jannik Dreier, and Ralf Sasse.
CCS 2015
03.12.2015 Giulio Malavolta Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano and Dario Fiore.
CCS 2015
10.12.2015 Ilya Grishchenko Cross-Site Search Attacks
Nethanel Gelernter and Amir Herzberg.
CCS 2015
04.02.2016 Manuel Reinert Order Preserving Encryption
S&P 2013, CCS 2014 and 2015
11.02.2016 Fabienne Eigner Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis
Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna.
PETS 2015
18.02.2016 Adrien Koutsos Automated Proofs of Pairing-Based Cryptography
Gilles Barthe, Benjamin Grégoire, and Benedikt Schmidt.
CCS 2015
25.02.2016 Ilya Grishchenko Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
Oswaldo Olivo, Isil Dillig, and Calvin Lin.
CCS 2015
03.03.2016 Giulio Malavolta Chosen-Ciphertext Security from Subset Sum
Sebastian Faust, Daniel Masny, and Daniele Venturi.
PKC 2016
10.03.2016 Niklas Grimm The Sicilian Defense: Signature-based Whitelisting of Web JavaScript
Pratik Soni, Enrico Budianto, and Prateek Saxena.
CCS 2015

For previous talks, please see here.