
People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, …). This is a great way to spend your lunch break and keep pace with cutting-edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.
Organizational Information
- Audience: Anyone interested in security and privacy
- Registration: Please subscribe to our mailing list
Logistics
- Discussion Date: Wednesday, 12:30 PM
- Place: COMSYS Big Meeting Room, Room 9006, Building E3
- Suggestions for videos: Very welcome, please contact Hajeong Jeon
Preliminary Schedule
Date | Topic |
---|---|
2025-04-09 | Intentionally Breaking End-to-End Messaging A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat (Martin R. Albrecht, Sunoo Park, Douglas Stebila, Mike Specter @ RWC) |
2025-04-23 | Wireless Aviation Attacks & Practical AI Threat Models On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS) (Giacomo Longo, Martin Strohmeier, Enrico Russo, Alessio Merlo, Vincent Lenders @ USENIX Security) Towards More Practical Threat Models in Artificial Intelligence Security (Kathrin Grosse, Lukas Bieringer, Tarek R. Besold, Alexandre M. Alahi @ USENIX Security) |
2025-05-07 | Your Code Editor Is Vulnerable UntrustIDE: Exploiting Weaknesses in VS Code Extensions (Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos @ NDSS) |
2025-05-21 | Internet Censorship On Precisely Detecting Censorship Circumvention in Real-World Networks (Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen @ NDSS) |
2025-06-04 | Security Pitfalls in Mobile Payment and App Ecosystems: Authentication Loopholes and TLS Validation Risks In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping (Raja Hasnain Anwar, Syed Rafiul Hussain, Muhammad Taqi Raza @ USENIX Sec) Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy (Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr Youssef @ USENIX Sec) |
2025-06-18 | IoT Security in Reality & Network Latency Measurement Techniques Unveiling IoT Security in Reality: A Firmware-Centric Journey (Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, Ziming Zhao, Le Guan @ USENIX Sec) CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse (Reethika Ramesh, Philipp Winter, Sam Korman, Roya Ensafi @ USENIX Sec) |
2025-07-02 | Android Security Updates: Delays, Disparities, and the OEM Factor 50 Shades of Support: A Device-Centric Analysis of Android Security Updates (Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, Selcuk Uluagac @ NDSS) |
2025-07-16 | Your LDAP Server is Exposing Secrets & Discovering Vulnerable Deployments on Scale LanDscAPe: Exploring LDAP Weaknesses and Data Leaks at Internet Scale (Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel @ USENIX Sec) 6Sense: Internet-Wide IPv6 Scanning and its Security Applications (Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce @ USENIX Sec) |
2025-07-30 | Membership Inference for LLMs Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models (Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye @ USENIX Sec) |
2025-08-13 | Trusted Tlemetry Tool for Cloud Providers TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts (Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar @ NDSS) |
2025-08-27 | Social Authentication to Replace Manual Key Authentication & Obstacles While Deploying Passwordless Authentication SOAP: A Social Authentication Protocol (Felix Linker, David Basin @ USENIX) Why Aren’t We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication (Leona Lassak, Elleen Pan, Blase Ur, Maximilian Golla @ USENIX) |
2025-09-10 | Verified or Not That is the Question & (Media) Perception of Students in Higher Education “I can say I’m John Travolta…but I’m not John Travolta”: Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts (Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka @ SOUPS) Media Portrayals of Student Privacy in Higher Education: A 2013-2023 Review (Min Cheong Kim @ SOUPS) |
2025-09-24 | Hybrid Attestation Neglecting TOCTOU IDA: Hybrid Attestation with Support for Interrupts and TOCTOU (Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh @ NDSS) |