Prof. Peter Y. A. Ryan, University of Luxembourg
Abstract Details anzeigen
Democracy is a defining feature of civilised societies, but it is delicate and vulnerable. In recent years, we have seen the threats to democratic processes brought into sharp relief, and, arguably, we have witnessed some spectacular failures of democracy. The increasing digitisation of democracy brings with it the potential to enrich it but also a raft of novel and poorly understood attack vectors. These threats can undermine the conduct of elections, the surrounding systems of voter registration, electoral rolls, voter authentication, and the conduct of campaigns, fake news etc.
Prof. Juan Garay, Texas A&M University, USA
Decentralized cryptocurrencies such as Bitcoin have ignited much excitement, not only for their novel realization of central bank-free financial instruments, but also as an alternative approach to classical distributed computing problems, such as reaching agreement distributedly in the presence of misbehaving parties, as well as to numerous other applications―contracts, reputation systems, name services, etc. The soundness and security of these applications, however, hinge on the thorough understanding of the fundamental properties of their underlying blockchain data structure, which parties (“miners”) maintain and try to extend by generating proofs of various kinds, “proofs of work” (PoW, aka “cryptographic puzzle”) perhaps being the most interesting ones.
Prof. Alice J. O’Toole, The University of Texas at Dallas, USA
- Achtung: diese DLS findet ausnahmesweise an einem Montag statt - Details anzeigen
Real-world face recognition requires an ability to perceive the uniqueness of a face across multiple, variable images. Deep convolutional neural networks (DCNNs) accomplish this feat and can be analyzed in a multidimensional “face space”.
Prof. Gene Tsudik, University of California, Irvine, USA
- Achtung: diese DLS findet ausnahmesweise an einem Dienstag statt - Details anzeigen
Remote Attestation (RA) is a security service that allows a trusted verifier (Vrf) to measure the software state of an untrusted remote device -- Prv. If correctly implemented, RA allows Vrf to remotely detect if Prv is in an illegal or compromised state. Although several RA architectures have been proposed, little attention has been devoted to their verifiability and security guarantees that can be derived through formal verification of RA architectures.
Prof. N. Asokan, Aalto University, Espoo, Finland
Run-time attacks are a prominent attack vector for compromising systems written in memory-unsafe languages like C and C++. Over the last decade there has been significant advances by both researchers and practitioners in understanding and defending against run-time attacks, especially those that attempt to defeat control-flow integrity (CFI). As CFI defenses are gradually being deployed, data-oriented attacks will become increasingly attractive. ....Details anzeigen
Prof. Daniel Keim, Universität Konstanz
Abstract: Details anzeigen
Never before in history data is generated and collected at such high volumes as it is today, in particular in security applications. For the analysis of large data sets to be effective, it is important to include the human in the data exploration process and combine the flexibility, creativity, and general knowledge of humans with the enormous storage capacity and the computational power of today's computers.
Prof. Ross Anderson, University of Cambridge Computer Laboratory, UK
Diese DLS in Cybersecurity kann leider nicht stattfinden. Sie wird zu einem späteren Zeitpunkt nachgeholt werden.
We've been exploring how to track stolen bitcoin. Previous attempts to do this had got entangled in the problem of dealing with transactions that split bitcoin into change, or that consolidate smaller sums into larger ones, and with mining fees. One answer comes from an unexpected direction: a legal precedent in 1816....
Prof. Ari Juels, Cornell Tech, New York, USA
Abstract: Details anzeigen
Smart contracts are applications that run on and inherit the special properties of blockchains. These properties alone, though, do not make smart contracts broadly useful. Persistence prevents tampering, but makes errors irreversible. Transparency supports behavioral assurances, but at the cost of confidentiality.
Prof. Paulo Esteves-Veríssimo, University of Luxembourg
Abstract: Details anzeigen
Computing and communications infrastructures have become commodities which societies largely depend on, transacting huge quantities of data and exhibiting pervasive interconnections, sometimes in critical conditions. However, the actual magnitude that security and dependability risks may assume, is often misperceived. The information society has been assuming risk behaviours, without the adequate protection. Many stakeholders, not only end-users but vendors, service providers, public administrations and - what may be surprising - even governments, seem to ignore those risks, in different ways.
Prof. Gilles Barthe, University of Manchester, UK
Building secure cryptographic implementations is notoriously hard. In this talk, I will outline a general methodology that delivers formal guarantees on assembly-level implementations through a combination of ideas from deductive program verification, program analysis, and verified compilation.