Schedule
Preparation
- Please discuss your slides with your assistant at least 1 week prior to your talk.
Talk
- Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.
Active participation
- Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.
Scheduling
Each session starts at 13.15. We will take breaks (or not) as needed. We expect everyone to be there for the whole session.
Monday October 10, 2016
No meeting.
Monday October 17, 2016
Marc Ilunga Tshibumbu Mukendi: HORNET: High-speed Onion Routing at the Network Layer
Lukas Burkhalter: Shielding Applications from an Untrusted Cloud with Haven
Samuel Steffen: Slithleen: Perfectly Imitated Decoy Routing through Traffic Replacement
Monday October 24, 2016
Mohit Narang: Understanding Password Choices: How Frequently Entered Passwords are Re-used across Websites
Fabian Murer: Mobile Application Impersonation Detection Using Dynamic User Interface Extraction
Monday October 31, 2016
No meeting.
Monday November 7, 2016
Jinank Jain: Analyzing First-order Role Based Access Control
Sandro Meier: Scalable Offline Monitoring
Viktor Chibotaru: Computational Soundness for Dalvik Bytecode
Monday November 14, 2016
Jonas Passerini: zxcvbn: Low-Budget Password Strength Estimation
Oliver Butz: Request and Conquer: Exposing Cross-Origin Resource Size
Luca Tondelli: SPREE: A Spoofing-Resistant GPS Receiver
Monday November 21, 2016
Nicolas Badoux: Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
Joshua Schneider: An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System
Monday November 28, 2016
Christian Fehlmann: Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems
Matthias Lanz: Alibi Routing
Cedric Baumann: SALVE: Server Authentication with Location Verification
Monday December 5, 2016
Loris Diana: cMix: Anonymization by High-Performance Scalable Mixing
Andreas Enz: Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
Monday December 12, 2016
Andreas Furrer: Just-in-time Code Reuse: On the effectiveness of fine-grained address space layout randomization
Monday December 19, 2016
Andreia Faria Carvalho: Modeling Human Errors in Security Protocols
Kamila Soucková: A Comprehensive Formal Security Analysis of OAuth 2.0
Cyrill Krähenbühl: Strong and Provably Secure Database Access Control