Schedule

 

October 11

Applied Cryptography (Paterson)

Giacomo Fabris
[14] On the (in)security of ElGamal in OpenPGP

Massimiliano Taverna
[18] Automating the Development of Chosen Ciphertext Attacks

 

October 18

System Security (Prof. Srdjan Capkun)

Clément Thorens
[2] Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

Freya Murphy
[4] Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation

 

October 25

Network Security (Prof. Adrian Perrig)

Lukas Heimes
[20] Weaponizing Middleboxes for TCP Reflected Amplification

Florian Bütler
[21] DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels

Francesco Pilo
[26] The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources

 

November 1

Secure & Trustworthy Systems (Prof. Shweta Shinde)

Sandro Rüegge
[27] OPERA: Open Remote Attestation for Intel’s Secure Enclaves

Francesco Intoci
[34] Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment

 

November 8

Applied Cryptography (Paterson)

Sven Grübel
[13] Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)

Shabnam Ghasemirad
[15] Probabilistic Data Structures in Adversarial Environments

 

November 15

Network Security (Prof. Adrian Perrig)

Zilin Wang
[23] Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis

Aurel Feer
[24] A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?

 

November 22

System Security (Prof. Srdjan Capkun)

Roman Angehrn
[7] Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability

Marko Nikic
[8] Zether: Towards Privacy in a Smart Contract World

 

November 29

Secure & Trustworthy Systems (Prof. Shweta Shinde)

Adrian Zanga
[28] Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA

Jeniffer Lima Graf
[30] Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning

 

December 6

Applied Cryptography (Paterson)

Jela Kovacevic
[16] Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

Daniel Pöllmann
[17] Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation

 

December 13

System Security (Prof. Srdjan Capkun)

Clément Charollais
[5] Pretty Good Phone Privacy

Alexander Kvamme
[6] Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols

Auguste Lefevre
[9] Snappy: Fast On-chain Payments with Practical Collaterals

 

December 20

Network Security (Prof. Adrian Perrig)

Benjamin Suter-Dörig
[25] Blind In/On-Path Attacks and Applications to VPNs

Secure & Trustworthy Systems (Prof. Shweta Shinde)

Jiacheng Shen
[33] Graviton: Trusted Execution Environments on GPUs

 

JavaScript has been disabled in your browser