News
Grades onlineWritten on 14.03.18 by Ben Stock The grades are now online: they are weighted as follows - Paper (70% total): Spelling/Grammar (20%), Structure (10%), Presentation of Research (40%) - Talk (20% total): Theme (5%), Talk comprehensible (10%), Presentation (5%) - Reviews (10% total): averaged over all reviews If you have the… Read more The grades are now online: they are weighted as follows - Paper (70% total): Spelling/Grammar (20%), Structure (10%), Presentation of Research (40%) - Talk (20% total): Theme (5%), Talk comprehensible (10%), Presentation (5%) - Reviews (10% total): averaged over all reviews If you have the need for additional feedback on your paper, please contact your advisor. |
Conference todayWritten on 27.02.18 by Ben Stock The conference today will be held in our lecture hall. Please be there at 8:55 at the latest, so we can give a brief overview of how the talks "work". |
Conference scheduleWritten on 17.02.18 by Ben Stock Dear all, please find the conference schedule for February, 27th, in the following. Recall that attendance is mandatory and we start on time at 9 am. 09:00 Post-Quantum Group Signatures (Kevin Morio) 09:50 Information spread in social networks and… Read more Dear all, please find the conference schedule for February, 27th, in the following. Recall that attendance is mandatory and we start on time at 9 am. 09:00 Post-Quantum Group Signatures (Kevin Morio) 09:50 Information spread in social networks and viral marketing (Marius Bleif) 10:40 Alexa where is the ministry of love: Evaluating the (in)security of Digital Assisstants (Marius Steffens) 13:00 Vulnerability Notifications (Alexander Fink) 14:15 Privilege Escalation (Jayanth Jain H. Ajith Kumar) 15:55 Android permissions (Askar Zaitov) |
Slides from Andreas' Talk are onlineWritten on 08.02.18 by Ben Stock Please see materials. |
Date for the final conference is setWritten on 03.01.18 by Ben Stock The date for the conference will be February 27th. Please write an email to stock@cispa.saarland if you can for any reason not attend either morning or afternoon, stating that reason. Please note that attendance is mandatory. By the end of the week, the final program will be set (assuming that all… Read more The date for the conference will be February 27th. Please write an email to stock@cispa.saarland if you can for any reason not attend either morning or afternoon, stating that reason. Please note that attendance is mandatory. By the end of the week, the final program will be set (assuming that all papers do in fact make it into the program). |
Joint CISPA Conference Seminar
This semester, CISPA will offer a joint conference seminar which broadly covers research areas of CISPA. Each topic will be assigned to one student (based on their preferences and availability of the topics), and students will be tasked with writing a conference style paper, which covers the state-of-the-art of the selected topic. After submission, they will change roles to become reviewers to other students' submissions. Based on the feedback of the other participants, the students will improve their paper for a camera-ready version for submission. The seminar will end with a conference where each student will present their topic (full attendance is mandatory).
The timeline will be along these lines:
- 20.10.2017 Kickoff meeting (10am, E9.1 Room 0.06), topic assignment
- 27.10.2017 How to write an academic paper
- 23.12.2017 Submission deadline for seminar papers
- 14.1.2018 Reviews due
- 28.1.2018 Camera-ready version of seminar papers
- TBD (semester break) Presentation of all papers at conference
As of September, 19th, the following topics are available:
- Nataniel Borges: Android Test Generation
- Michael Brengel: Binary Code Reuse
- Sven Bugiel: Cracking passwords and password vaults
- Sven Bugiel: Mandatory access control --- past, present, future
- Dhiman Chakraborty: Language-Based Information-Flow Security
- Dhiman Chakraborty: Noninterference through Secure Multi-Execution
- Erik Derr: The Impact of Third-party Code on App Security
- Aljoscha Dietrich: Privacy Enhancing Technologies for Smart Electricity Meters
- Lucjan Hanzlik: Group signatures
- Lucjan Hanzlik: Ring signatures
- Sascha Just: Coverage-based Security Testing
- Robert Künnemann: accountability in protocols
- Robert Künnemann: Which verification tool is right for me? -- a decision diagram for the working security expert.
- Johannes Krupp: Traceback of Reflective DDoS / DDoS Defense
- Sanam Ghorbani Lyastani: Replacing and improving passwords
- Maria Gomez: Crowd Intelligence for Mobile Software Engineering
- Maria Gomez: Android Permissions
- Rahul Gopinath: Mutation Analysis and Testing
- Rahul Gopinath: Program Repair
- Kathrin Grosse: Adversarial Machine Learning
- Giorgi Maisuradze: Code Reuse Attacks
- Praveen Manoharan: Differential Privacy
- Ninja Marnau: Web Tracking (Privacy Aspects)
- Duc Nguyen: Security in Digital Assistants: Google Home and Amazon Echo
- Stefan Nürnberger: Automotive Security
- Marco Patrignani: Secure Compilation
- Jonas Schneider: Verifiable Computation / (Zero-Knowledge) SNARKs
- Oliver Schranz: App-layer Security on the Android platform
- Milivoj Simeonovski: Who Controls the Internet? Analyzing dependencies on the internet.
- Patrick Speicher: Privilege escalation
- Ben Stock: Vulnerability Notifications
- Bartek Surma: Information spread in social networks and viral marketing.
- Christian Stransky: Information sources and their impact on code security
- Marie Walter: Data Integrity: Attacks and Defenses
- Yang Zhang: The state of friendship prediction with mobility data