Schedule

Preparation

  • Please discuss your slides with your assistant at least 1 week prior to your talk.

Talk

  • Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.

Active participation

  • Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.

Monday October 6, 2014

no presentations

Monday October 13, 2014

First presentation (13:15h):
FindU: Privacy-preserving personal profile matching in mobile social networks (Olesen Anders)
Contact: Bernhard Distl

Monday October 20, 2014

First presentation (13:15h):
The visual microphone: passive recovery of sound from video (Beat Küng)
Contact: Aanjhan Ranganathan

Second presentation (14:15h):
FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack (Martynas Pumputis)
Contact: Hubert Ritzdorf

Third presentation (15:15h):
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols (Damian Gruber)
Contact: Hubert Ritzdorf

Monday October 27, 2014

Second presentation (14:15h):
Formal Analysis of Electronic Exams (Sandro Affentranger)
Contact: Jannik Dreier

Third presentation (15:15h):
Fail-Secure Access Control (Alexander Viand)
Contact: Petar Tsankov

Monday November 3, 2013

First presentation (13:15h):
Smartphones as Practical and Secure Location Verification Tokens for Payments (Rajko Kisdobranski)
Contact: Claudio Marforio

Second presentation (14:15h):
kGuard: Lightweight Kernel Protection against Return-to-user Attacks (Pedro Mendez Montejano)
Contact: Hubert Ritzdorf

Third presentation (15:15h):
ret2dir: Rethinking Kernel Isolation (Ralf Sager)
Contact: Hubert Ritzdorf

Monday November 10, 2014

First presentation (13:15h):
SnapMe if You Can: Privacy Threats of Other Peoples’ Geo-tagged Media and What We Can Do About It (Liu Zhang Chen-Da)
Contact: Bernhard Distl

Second presentation (14:15h):
Selling off Privacy at Auction (Brebner Samuel)
Contact: David Gugelmann

Third presentation (15:15h):
Pixel Perfect: Fingerprinting Canvas in HTML5 (Kralev Trajche)
Contact: Bernhard Ager

Monday November 17, 2014

Second presentation (14:15h):
Actor Key Compromise: Consequences and Countermeasures (Julian Loss)
Contact: Ralf Sasse

Third presentation (15:15h):
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing (Karl Wüst)
Contact: Ralf Sasse

Monday November 24, 2014

Second presentation (14:15h):
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks (Tristan Buchs)
Contact: Hubert Ritzdorf

Third presentation (15:15h):
Chip and Skim: cloning EMV cards with the pre-play attack (Fabian Schewetofski)
Contact: Hubert Ritzdorf

Monday December 1, 2014

Second presentation (14:15h):
On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications (Thomas Müller)
Contact: Nikolaos Karapanos

Monday December 8, 2014

no presentations

Monday December 15, 2014

Second presentation (14:15h):
Uncovering social network sybils in the wild (Bungiu Francisco)
Contact: Sascha Trifunovic

Third presentation (15:15h):
The Evolution of Sybil Defense via Social Networks (Smith Jean-Pierre)
Contact: Sascha Trifunovic

JavaScript has been disabled in your browser