DLS in Cybersecurity

With the Distinguished Lectures Series in Cybersecurity, every semester, we invite outstanding experts from science and industry to Darmstadt to discuss the multifaceted prospects and challenges of IT Security. In the lectures, the speakers present the results of trendsetting research from a variety of disciplines, give overviews of complex topics or show the current state of knowledge in their field of research. The lectures are free and open for everybody without prior registration.

When:
on selected Thursdays
from 4:15 - 5:15 pm
during the lecture period

Where:
TU Darmstadt
Piloty Building S2|02 room C 110
Hochschulstraße 10
64289 Darmstadt

After the lecture there is the possibility to get together.


Upcoming DLS

DLS in Cybersecurity: Security as a Science - Are we making progress?

Paul van Oorschot, Carleton University, Ottawa, Canada

October, 19, 2017, 16:15 – 17:15

TU Darmstadt | Piloty Building S2|02 | room C 110 | Hochschulstraße 10 | Darmstadt

Abstract
Recent years have seen increasing calls to make security research more “scientific”. Who can argue with science being desirable? But what exactly do people mean when they suggest this, and what are they really seeking? There is little clarity on what a “Science of Security” would look like. We consider this question, in the context of historical science and more recent security research, offer observations and insights, and suggest where things might be improved.

show details

DLS in Cybersecurity: Secure Deduplication - Models and Optimization

Colin Boyd, Norwegian University of Science and Technology (NTNU), Norway

November, 16, 2017, 16:15 – 17:15

TU Darmstadt | Piloty Building S2|02 | room C 110 | Hochschulstraße 10 | Darmstadt

Abstract
Deduplication is a widely used mechanism in cloud storage systems which can greatly increase efficiency. The basic idea is to remove duplicate stored files, replacing copies with a pointer to a single version. Empirical evidence shows that deduplication can be extremely effective in reducing both storage requirements and bandwidth used for uploading. However, deduplication also introduces severe challenges to security. There is an inherent conflict between the use of deduplication and the desire of users to encrypt their files prior to uploading. Even if this problem can be solved, client-side deduplication opens up a side channel which can reveal information to an adversary, as shown in 2010 by Harnik et al.

show details

DLS in Cyberecurity: Grand Research Challenges for Cybersecurity of Critical Information and Infrastructures

Prof. Paulo Esteves-Veríssimo, University of Luxembourg

November, 23, 2017, 16:15 – 17:15

TU Darmstadt | Piloty Building S2|02 | room C 110 | Hochschulstraße 10 | Darmstadt

Abstract:
Computing and communications infrastructures have become commodities which societies largely depend on, transacting huge quantities of data and exhibiting pervasive interconnections, sometimes in critical conditions. However, the actual magnitude that security and dependability risks may assume, is often misperceived. The information society has been assuming risk behaviours, without the adequate protection. Many stakeholders, not only end-users but vendors, service providers, public administrations and - what may be surprising - even governments, seem to ignore those risks, in different ways.

show details