Schedule
Preparation
Please discuss your slides with your assistant at least 1 week prior to your talk.
Talk
Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.
Active participation
Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.
Scheduling
Each session starts at 13:15. We will take breaks (or not) as needed. We expect everyone to be there for the whole session.
October 22:
- Sinisa Matetic: FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
- Marc Wyss: Device Pairing at the Touch of an Electrode
October 29:
- Francesco Saverio Varini: Security Policies and Security Models
- Aryaman Fasciati: On Purpose and by Necessity: Compliance under the GDPR
November 5:
- Raj Shubham: Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
- Jan Veen: Preventing (Network) Time Travel with Chronos
- Peter Sufliarsky: Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs
November 19:
- Jonas Gude: The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks
- Martin Kotuliak: How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services
November 26:
- Khalid Aldughayem: Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis
- Matteo Scarlata: Privacy Risks with Facebook's PII-based Targeting: Auditing a Data Broker's Advertising Interfac
December 10:
- Hidde Sytse Lycklama à Nijeholt: Revive: Rebalancing Off-Blockchain Payment Networks
- Mauro Zenoni: When Can a Distributed Ledger Replace a Trusted Third Party?