Schedule

October 5

Applied Cryptography (Paterson)

Radwa Abdelbar
[14] 
Post-quantum TLS without handshake signatures

Mohammed Khouni
[15] Security Analysis and Improvements for the IETF MLS Standard for Group Messaging

October 12

Applied Cryptography (Paterson)

Katja Möhring
[12] A Modern View on Forward Security

Kevin Tang
[13] Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT

October 19

System Security (Capkun)

Tom Cinbis
[1]
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors

Jodok Vieli
[2] Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE

October 26

Network Security (Perrig)

Robin Burkhard
[28] 
Domain Validation ++ for MitM-Resilient PKI

Mathias Blarer
[30] 
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking

November 2

Applied Cryptography (Paterson)

Hédi Sassi
[11]
Encrypt-to-self: Securely Outsourcing Storage

Tijana Klimovic
[16]
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

November 9

System Security (Capkun)

Jonas Mohler
[3]
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

Shahriar Javidi
[4]
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing

November 16

System Security (Capkun)

Lukas Baege
[5]
An Off-Chip Attack on Hardware Enclaves via the Memory Bus

Lino Telschow
[6]
V0LTpwn: Attacking x86 Processor Integrity from Software

November 23

System Security (Capkun)

Karin Holzhauser
[8]
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers

Dan Lindholm
[9]
How to End Password Reuse on the Web

Simon Nicolas Perriard
[10]
Honeywords: Making Password-Cracking Detectable

November 30

Network Security (Perrig)

Ege Kirci
[22]
Programmable In-Network Security for Context-aware BYOD Policies

Seyedali Tabaeiaghdaei
[23]
SICO: Surgical Interception Attacks by Manipulating BGP Communities

December 7

Network Security (Perrig)

Adalsteinn Jonsson
[24]
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices

Jonas Gessner
[25]
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

Manuel Meinen
[26]
EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet

December 14

Network Security (Perrig)

Supraja Sridhara
[27]
The Maestro Attack: Orchestrating Malicious Flows with BGP

Gianluca Lain
[29]
NetCAT: Practical Cache Attacks from the Network

JavaScript has been disabled in your browser