Joint CISPA Conference Seminar CISPA

News

14.03.2018

Grades online

The grades are now online: they are weighted as follows

- Paper (70% total): Spelling/Grammar (20%), Structure (10%), Presentation of Research (40%)

- Talk (20% total): Theme (5%), Talk comprehensible (10%), Presentation (5%)

- Reviews (10% total): averaged... Read more

The grades are now online: they are weighted as follows

- Paper (70% total): Spelling/Grammar (20%), Structure (10%), Presentation of Research (40%)

- Talk (20% total): Theme (5%), Talk comprehensible (10%), Presentation (5%)

- Reviews (10% total): averaged over all reviews

If you have the need for additional feedback on your paper, please contact your advisor.

27.02.2018

Conference today

The conference today will be held in our lecture hall. Please be there at 8:55 at the latest, so we can give a brief overview of how the talks "work".

17.02.2018

Conference schedule

Dear all,

please find the conference schedule for February, 27th, in the following. Recall that attendance is mandatory and we start on time at 9 am.

09:00  Post-Quantum Group Signatures (Kevin Morio)
09:25  Ring Signatures (Yassir Kozha)

09:50 ... Read more

Dear all,

please find the conference schedule for February, 27th, in the following. Recall that attendance is mandatory and we start on time at 9 am.

09:00  Post-Quantum Group Signatures (Kevin Morio)
09:25  Ring Signatures (Yassir Kozha)

09:50  Information spread in social networks and viral marketing (Marius Bleif)
10:15  The State of Friendship Prediction with Mobility Data (Peter Tikhonov)

10:40  Alexa where is the ministry of love: Evaluating the (in)security of Digital Assisstants (Marius Steffens)
11:05  Adversarial Machine Learning - A comprehensive walkthrough (Simeon Hoffmann)
11:30  Didn't you see that traffic sign? The challenge of testing automotive systems (Sebastian Roth)

13:00  Vulnerability Notifications (Alexander Fink)
13:25  Passwords Offline Attacks: A Comprehensive Overview (Aftab Alam)
13:50  DesperaDoS:an overview of denial-of-service mitigation and traceback techniques (Roman Tabachnikov)

14:15  Privilege Escalation (Jayanth Jain H. Ajith Kumar)
14:40  Secure Compilation An examination of different approaches (Hendrik Leidinger)
15:05  Code Reuse Attacks and Defenses: A Brief History (Muhammad Sarmad Khan)
15:30  The Impact of Third-party Code on App Security (Lea Gröber)

15:55  Android permissions (Askar Zaitov)
16:20  Coverage-based Security Testing (Marius Smytzek)
16:45  Crowd Intelligence for Mobile Software Engineering (Ali Maqsood)

08.02.2018

Slides from Andreas' Talk are online

Please see materials.

03.01.2018

Date for the final conference is set

The date for the conference will be February 27th. Please write an email to stock@cispa.saarland if you can for any reason not attend either morning or afternoon, stating that reason. Please note that attendance is mandatory. By the end of the week, the final... Read more

The date for the conference will be February 27th. Please write an email to stock@cispa.saarland if you can for any reason not attend either morning or afternoon, stating that reason. Please note that attendance is mandatory. By the end of the week, the final program will be set (assuming that all papers do in fact make it into the program).

 

Joint CISPA Conference Seminar

This semester, CISPA will offer a joint conference seminar which broadly covers research areas of CISPA. Each topic will be assigned to one student (based on their preferences and availability of the topics), and students will be tasked with writing a conference style paper, which covers the state-of-the-art of the selected topic. After submission, they will change roles to become reviewers to other students' submissions. Based on the feedback of the other participants, the students will improve their paper for a camera-ready version for submission. The seminar will end with a conference where each student will present their topic (full attendance is mandatory).

The timeline will be along these lines:

  • 20.10.2017 Kickoff meeting (10am, E9.1 Room 0.06), topic assignment
  • 27.10.2017 How to write an academic paper
  • 23.12.2017 Submission deadline for seminar papers
  • 14.1.2018 Reviews due
  • 28.1.2018 Camera-ready version of seminar papers
  • TBD (semester break) Presentation of all papers at conference 

As of September, 19th, the following topics are available:

  1. Nataniel Borges: Android Test Generation
  2. Michael Brengel: Binary Code Reuse
  3. Sven Bugiel: Cracking passwords and password vaults
  4. Sven Bugiel: Mandatory access control --- past, present, future
  5. Dhiman Chakraborty: Language-Based Information-Flow Security
  6. Dhiman Chakraborty: Noninterference through Secure Multi-Execution
  7. Erik Derr: The Impact of Third-party Code on App Security
  8. Aljoscha Dietrich: Privacy Enhancing Technologies for Smart Electricity Meters
  9. Lucjan Hanzlik: Group signatures
  10. Lucjan Hanzlik: Ring signatures
  11. Sascha Just: Coverage-based Security Testing
  12. Robert Künnemann: accountability in protocols
  13. Robert Künnemann: Which verification tool is right for me? -- a decision diagram for the working security expert.
  14. Johannes Krupp: Traceback of Reflective DDoS / DDoS Defense
  15. Sanam Ghorbani Lyastani: Replacing and improving passwords
  16. Maria Gomez: Crowd Intelligence for Mobile Software Engineering
  17. Maria Gomez: Android Permissions
  18. Rahul Gopinath: Mutation Analysis and Testing
  19. Rahul Gopinath: Program Repair
  20. Kathrin Grosse: Adversarial Machine Learning
  21. Giorgi Maisuradze: Code Reuse Attacks
  22. Praveen Manoharan: Differential Privacy
  23. Ninja Marnau: Web Tracking (Privacy Aspects)
  24. Duc Nguyen: Security in Digital Assistants: Google Home and Amazon Echo
  25. Stefan Nürnberger: Automotive Security
  26. Marco Patrignani: Secure Compilation
  27. Jonas Schneider: Verifiable Computation / (Zero-Knowledge) SNARKs
  28. Oliver Schranz: App-layer Security on the Android platform
  29. Milivoj Simeonovski: Who Controls the Internet? Analyzing dependencies on the internet.
  30. Patrick Speicher: Privilege escalation
  31. Ben Stock: Vulnerability Notifications
  32. Bartek Surma: Information spread in social networks and viral marketing.
  33. Christian Stransky: Information sources and their impact on code security
  34. Marie Walter: Data Integrity: Attacks and Defenses
  35. Yang Zhang: The state of friendship prediction with mobility data


Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators