Schedule
Preparation
- Please discuss your slides with your assistant at least 1 week prior to your talk.
Talk
- Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.
Active participation
- Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.
Monday October 6, 2014
no presentations
Monday October 13, 2014
First presentation (13:15h):
FindU: Privacy-preserving personal profile matching in mobile social networks (Olesen Anders)
Contact: Bernhard Distl
Monday October 20, 2014
First presentation (13:15h):
The visual microphone: passive recovery of sound from video (Beat Küng)
Contact: Aanjhan Ranganathan
Second presentation (14:15h):
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack (Martynas Pumputis)
Contact: Hubert Ritzdorf
Third presentation (15:15h):
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols (Damian Gruber)
Contact: Hubert Ritzdorf
Monday October 27, 2014
Second presentation (14:15h):
Formal Analysis of Electronic Exams (Sandro Affentranger)
Contact: Jannik Dreier
Third presentation (15:15h):
Fail-Secure Access Control (Alexander Viand)
Contact: Petar Tsankov
Monday November 3, 2013
First presentation (13:15h):
Smartphones as Practical and Secure Location Verification Tokens for Payments (Rajko Kisdobranski)
Contact: Claudio Marforio
Second presentation (14:15h):
kGuard: Lightweight Kernel Protection against Return-to-user Attacks (Pedro Mendez Montejano)
Contact: Hubert Ritzdorf
Third presentation (15:15h):
ret2dir: Rethinking Kernel Isolation (Ralf Sager)
Contact: Hubert Ritzdorf
Monday November 10, 2014
First presentation (13:15h):
SnapMe if You Can: Privacy Threats of Other Peoples’ Geo-tagged Media and What We Can Do About It (Liu Zhang Chen-Da)
Contact: Bernhard Distl
Second presentation (14:15h):
Selling off Privacy at Auction (Brebner Samuel)
Contact: David Gugelmann
Third presentation (15:15h):
Pixel Perfect: Fingerprinting Canvas in HTML5 (Kralev Trajche)
Contact: Bernhard Ager
Monday November 17, 2014
Second presentation (14:15h):
Actor Key Compromise: Consequences and Countermeasures (Julian Loss)
Contact: Ralf Sasse
Third presentation (15:15h):
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing (Karl Wüst)
Contact: Ralf Sasse
Monday November 24, 2014
Second presentation (14:15h):
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks (Tristan Buchs)
Contact: Hubert Ritzdorf
Third presentation (15:15h):
Chip and Skim: cloning EMV cards with the pre-play attack (Fabian Schewetofski)
Contact: Hubert Ritzdorf
Monday December 1, 2014
Second presentation (14:15h):
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications (Thomas Müller)
Contact: Nikolaos Karapanos
Monday December 8, 2014
no presentations
Monday December 15, 2014
Second presentation (14:15h):
Uncovering social network sybils in the wild (Bungiu Francisco)
Contact: Sascha Trifunovic
Third presentation (15:15h):
The Evolution of Sybil Defense via Social Networks (Smith Jean-Pierre)
Contact: Sascha Trifunovic