Schedule

Preparation

Please discuss your slides with your assistant at least 1 week prior to your talk.

Talk

Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.

Active participation

Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.

Scheduling

Each session starts at 13:15. We will take breaks (or not) as needed. We expect everyone to be there for the whole session.

 

 

October 22:

  1. Sinisa Matetic: FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
  2. Marc Wyss: Device Pairing at the Touch of an Electrode

October 29:

  1. Francesco Saverio Varini: Security Policies and Security Models
  2. Aryaman Fasciati: On Purpose and by Necessity: Compliance under the GDPR

November 5:

  1. Raj Shubham: Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
  2. Jan Veen: Preventing (Network) Time Travel with Chronos
  3. Peter Sufliarsky: Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs

November 19:

  1. Jonas Gude: The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
  2. Martin Kotuliak: How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services

November 26:

  1. Khalid Aldughayem: Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis
  2. Matteo Scarlata: Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interfac

December 10:

  1. Hidde Sytse Lycklama à Nijeholt: Revive: Rebalancing Off-Blockchain Payment Networks
  2. Mauro Zenoni: When Can a Distributed Ledger Replace a Trusted Third Party?


JavaScript has been disabled in your browser