Security and Privacy Lunch

People interested in network security and privacy meet once a week over lunch break and watch videos related to security and privacy recorded at high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). After the presentation, there will likely be a short discussion and brainstorming related to the presentation. This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Watching and talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.

Organizational Information

  • Contact: Markus Dahlmanns
  • ECTS Credits: none (but you can get a certificate)
  • Audience: Anyone interested in security and privacy
  • Language: English
  • Registration: Please subscribe to our mailing list

Logistics

  • Date: Thursdays, 12:30-13:15h (please follow the mailing list for announcements and last minute changes)
  • Place: COMSYS seminar room (Room 9007, Ground Floor, E3 Building)
  • First meeting: Thursday, October 10
  • Brown bag seminar, please bring your own lunch
  • Suggestions for videos are very welcome, please contact Markus Dahlmanns

 

If you want to peek into talks we target to watch during the session have a look at our last term's schedule.

Preliminary Schedule

Preliminary Schedule

Date
Topic
2019-10-10Redacting Content from Public Blockchains
Redactable Blockchain in the Permissionless Setting (Dominic Deuber, Bernardo Magri, Sri Aravinda Krishnan Thyagarajan @ IEEE S&P 2019)
2019-10-17Unauthorized Access: How Apps Circumvent Android's Permission Control
50 Ways to Leak Your Data: An Exploration of Apps (Joel Reardon, Álvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Serge Egelman @ USENIX Security 2019)
2019-10-24
Cancelled
2019-10-31My Browser Blacklist Protects Me From Phishing, or Not?
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists (Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, Kevin Tyers @ IEEE S&P 2019)
2019-11-062FA Reworked - A New Protocol for Hardware Authentication Tokens
True2F: Backdoor-Resistant Authentication Tokens (Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo @ IEEE S&P 2019)
2019-11-14
Chatty IoT Devices
Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach (Jingjing Ren, Daniel J. Dubois, and David Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi @ IMC 2019)
2019-11-21
Malware Doesn't Stick to Windows Anymore
Understanding Linux Malware (Emanuele Cozzi, Mariano Graziano, Yanick Fratantonio, Davide Balzarotti @ IEEE S&P 2018)
2019-11-28 Bad Security Practices due to Copy & Paste
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography (Felix Fischer, Huang Xiao, Ching-Yu Kao, Yannick Stachelscheid, Benjamin Johnson, Danial Razar, Paul Fawkesley, Nat Buckley, Konstantin Böttinger, Paul Muntean, Jens Grossklags @ USENIX Security 2019)
2019-12-05On Security-(Ir)Relevant User Notifications
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings (Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson @ SOUPS 2019)
2019-12-12
Beyond the Browser: Understanding TLS Application Behavior
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior (Blake Anderson and David McGrew @ IMC 2019)
2019-12-19Automated Safety Vetting of PLC Code
Towards Automated Safety Vetting of PLC Code in Real World Plants (Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James Moyne, Z. Morley Mao @ IEEE S&P 2019)
2019-12-26
Cancelled - Boxing Day
2020-01-02
Cancelled
2020-01-09Increasing Sensor Reliability in Smart Homes
Peeves: Physical Event Verification in Smart Homes (Simon Birnbach, Simon Eberz, Ivan Martinovic @ CCS 2019)
2020-01-16Exploring the Understanding of Users Browsing the Web (Securely)
The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators (Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, Adrienne Porter Felt @ USENIX Security 2019)
2020-01-23Faster Blockchain Bootstrapping
Vault: Fast Bootstrapping for the Algorand Cryptocurrency (Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich @ NDSS 2019)
2020-01-30The Cost of DNS-over-HTTPS
An Empirical Study of the Cost of DNS-over-HTTPS (Timm Böttger, Felix Cuadrado, and Gianni Antichi (Queen Mary University of London), Eder Leão Fernandes (Queen Mary, University of London), Gareth Tyson (Queen Mary University of London), Ignacio Castro (Queen Mary, University of London), Steve Uhlig (Queen Mary University of London) @ IMC 2019)
2020-02-06IoT-specific E2E Encryption
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT (Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler @ USENIX Security 2019)
2020-02-13On the Other Side of Internet Measurements
Scanning the Scanners: Sensing the Internet from a Massively Distributed Network Telescope (Philipp Richter, Arthur Berger @ IMC 2019)
2020-02-20
Cancelled - Fat Thursday
2020-02-27
Cancelled - Chair retreat
2020-03-05
Privacy in Machine Learning
Data Privacy Risks of Machine Learning (Reza Shokri @ IRTF PEARG 106 2019)
2020-03-12Wireless Attacks on Electrical Vehicle Charging
Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging (Richard Baker, Ivan Martinovic @ USENIX Security 2019)
2020-03-19
Cancelled
2020-03-26
Cancelled

 

- Impressum -