Schedule

Preparation

  • Please discuss your slides with your assistant at least 1 week prior to your talk.

Talk

  • Each 45min slot is composed of a 35 min presentation and 10 min for questions and discussion.

Active participation

  • Active participation in your colleagues' presentations is strongly encouraged and also one of the grading criteria.

Scheduling

Each session starts at 13.15. We will take breaks (or not) as needed. We expect everyone to be there for the whole session.

Monday October 10, 2016

No meeting.

 

Monday October 17, 2016

Marc Ilunga Tshibumbu Mukendi: HORNET: High-speed Onion Routing at the Network Layer

Lukas Burkhalter: Shielding Applications from an Untrusted Cloud with Haven

Samuel Steffen: Slithleen: Perfectly Imitated Decoy Routing through Traffic Replacement

 

Monday October 24, 2016

Mohit Narang: Understanding Password Choices: How Frequently Entered Passwords are Re-used across Websites

Fabian Murer: Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

 

Monday October 31, 2016

No meeting.

 

Monday November 7, 2016

Jinank Jain: Analyzing First-order Role Based Access Control

Sandro Meier: Scalable Offline Monitoring

Viktor Chibotaru: Computational Soundness for Dalvik Bytecode

 

Monday November 14, 2016

Jonas Passerini: zxcvbn: Low-Budget Password Strength Estimation

Oliver Butz: Request and Conquer: Exposing Cross-Origin Resource Size

Luca Tondelli: SPREE: A Spoofing-Resistant GPS Receiver

 

Monday November 21, 2016

Nicolas Badoux: Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services

Joshua Schneider: An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

 

Monday November 28, 2016

Christian Fehlmann: Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems

Matthias Lanz: Alibi Routing

Cedric Baumann: SALVE: Server Authentication with Location Verification

 

Monday December 5, 2016

Loris Diana: cMix: Anonymization by High-Performance Scalable Mixing

Andreas Enz: Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability

 

Monday December 12, 2016

Andreas Furrer: Just-in-time Code Reuse: On the effectiveness of fine-grained address space layout randomization

 

Monday December 19, 2016


Andreia Faria Carvalho: Modeling Human Errors in Security Protocols

Kamila Soucková: A Comprehensive Formal Security Analysis of OAuth 2.0

Cyrill Krähenbühl: Strong and Provably Secure Database Access Control

 

JavaScript has been disabled in your browser