Schedule
October 11
Applied Cryptography (Paterson)
Giacomo Fabris
[14] On the (in)security of ElGamal in OpenPGP
Massimiliano Taverna
[18] Automating the Development of Chosen Ciphertext Attacks
October 18
System Security (Prof. Srdjan Capkun)
Clément Thorens
[2] Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
Freya Murphy
[4] Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
October 25
Network Security (Prof. Adrian Perrig)
Lukas Heimes
[20] Weaponizing Middleboxes for TCP Reflected Amplification
Florian Bütler
[21] DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
Francesco Pilo
[26] The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
November 1
Secure & Trustworthy Systems (Prof. Shweta Shinde)
Sandro Rüegge
[27] OPERA: Open Remote Attestation for Intel’s Secure Enclaves
Francesco Intoci
[34] Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment
November 8
Applied Cryptography (Paterson)
Sven Grübel
[13] Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Shabnam Ghasemirad
[15] Probabilistic Data Structures in Adversarial Environments
November 15
Network Security (Prof. Adrian Perrig)
Zilin Wang
[23] Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis
Aurel Feer
[24] A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?
November 22
System Security (Prof. Srdjan Capkun)
Roman Angehrn
[7] Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
Marko Nikic
[8] Zether: Towards Privacy in a Smart Contract World
November 29
Secure & Trustworthy Systems (Prof. Shweta Shinde)
Adrian Zanga
[28] Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA
Jeniffer Lima Graf
[30] Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning
December 6
Applied Cryptography (Paterson)
Jela Kovacevic
[16] Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong
Daniel Pöllmann
[17] Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation
December 13
System Security (Prof. Srdjan Capkun)
Clément Charollais
[5] Pretty Good Phone Privacy
Alexander Kvamme
[6] Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
Auguste Lefevre
[9] Snappy: Fast On-chain Payments with Practical Collaterals
December 20
Network Security (Prof. Adrian Perrig)
Benjamin Suter-Dörig
[25] Blind In/On-Path Attacks and Applications to VPNs
Secure & Trustworthy Systems (Prof. Shweta Shinde)
Jiacheng Shen
[33] Graviton: Trusted Execution Environments on GPUs