Schedule
October 5
Applied Cryptography (Paterson)
Radwa Abdelbar
[14] Post-quantum TLS without handshake signatures
Mohammed Khouni
[15] Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
October 12
Applied Cryptography (Paterson)
Katja Möhring
[12] A Modern View on Forward Security
Kevin Tang
[13] Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
October 19
System Security (Capkun)
Tom Cinbis
[1] Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Jodok Vieli
[2] Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
October 26
Network Security (Perrig)
Robin Burkhard
[28] Domain Validation ++ for MitM-Resilient PKI
Mathias Blarer
[30] Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking
November 2
Applied Cryptography (Paterson)
Hédi Sassi
[11] Encrypt-to-self: Securely Outsourcing Storage
Tijana Klimovic
[16] Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
November 9
System Security (Capkun)
Jonas Mohler
[3] Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems
Shahriar Javidi
[4] Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing
November 16
System Security (Capkun)
Lukas Baege
[5] An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Lino Telschow
[6] V0LTpwn: Attacking x86 Processor Integrity from Software
November 23
System Security (Capkun)
Karin Holzhauser
[8] That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers
Dan Lindholm
[9] How to End Password Reuse on the Web
Simon Nicolas Perriard
[10] Honeywords: Making Password-Cracking Detectable
November 30
Network Security (Perrig)
Ege Kirci
[22] Programmable In-Network Security for Context-aware BYOD Policies
Seyedali Tabaeiaghdaei
[23] SICO: Surgical Interception Attacks by Manipulating BGP Communities
December 7
Network Security (Perrig)
Adalsteinn Jonsson
[24] Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices
Jonas Gessner
[25] NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Manuel Meinen
[26] EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
December 14
Network Security (Perrig)
Supraja Sridhara
[27] The Maestro Attack: Orchestrating Malicious Flows with BGP
Gianluca Lain
[29] NetCAT: Practical Cache Attacks from the Network