Schedule
Preparation
- Please discuss your slides with your assistant at least 1 week prior to your talk.
Talk
- Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.
Active participation
- Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.
Monday October 5, 2015
No meeting.
Monday October 12, 2015
No meeting.
Monday October 19, 2015
No meeting.
Monday October 26, 2015
No meeting.
Monday November 2, 2015
First presentation (13:15h):
Thermal Covert Channels on Multicore Platforms (Niclas Scheuing)
Second presentation (14:15h):
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies (Matija Ciganovic)
Third presentation (15:15h):
The science of guessing: Analyzing an anonymized corpus of 70 million passwords (Ulrich Kienhoz)
Monday November 9, 2015
First presentation (13:15h):
Sound-Proof: Usable Two-factor Authentication Based on Ambient Sound (Erjon Pacarizi)
Second presentation (14:15h):
CONIKS: Bringing Key Transparency to End Users (Lorenz Breidenbach)
Third presentation (15:15h):
What the App is That? Deception and Countermeasures in the Android User Interface (Felix Rauchenstein)
Monday November 16, 2015
No meeting.
Monday November 23, 2015
First presentation (13:15h):
Routing Bottlenecks in the Internet - Causes, Exploits, and Countermeasures (Pavlos Lamprakis)
Second presentation (14:15h):
Accountable Internet Protocol (Stefan Kastle)
Monday November 30, 2015
First presentation (13:15h):
ARPKI: Attack Resilient Public-Key Infrastructure (Andre Schmidt)
Second presentation (14:15h):
When HTTPS Meets CDN: A Case of Authentication in Delegated Service (Gregor Wegberg)
Third presentation (15:15h):
A Formal Analysis of the Norwegian E-voting Protocol (Lukasz Dykcik)
Monday December 7, 2015
First presentation (13:15h):
Tor: The Second-Generation Onion Router (Sandro Affentranger)
Second presentation (14:15h):
RAPTOR: Routing Attacks on Privacy in Tor (Quentin Hibon)
Monday December 14, 2015
First presentation (13:15h):
A Survey of BGP Security Issues and Solutions (Arthur Habicht)