NewsCurrently, no news are available
The registration for all CISPA proseminars will open at the latest at the end of August.
This virtual proseminar is used to distribute students among the available actual proseminars. To register for any of the other proseminars that are offered by CISPA, you have to you register for this meta proseminar. You can select up to three proseminars you would like to take, and will then be automatically assigned to one of them on October 16th. Please note that this assignment is only optimal if you do not drop the assigned seminar.
Please note the following:
We aim to provide a fair mapping that respects your wishes, but at the same time also respects the preferences of your fellow students.
Experience has shown that particular proseminars are more popular than others, yet these proseminars cannot fit all students. We thus encourage students to select their preferences for all available seminars, which eases the process to assign students that do not fit the overly popular seminars to another, less crowded one. Each student must therefore give at least two neutral (“OK”) or positive (“Good”) preferences.
If you are really dedicated to one particular proseminar, and you do not want any other proseminar, please select the "No seminar" as second positive option. However, this may ultimately lead to the situation that you are not assigned to any proseminar. Also, choosing "No seminar" as second option does not increase your chances of getting your first choice. In fact, it increases the chances that you will be assigned to any CISPA proseminar.
The assignment will be automatically performed by a CMS-internal constraint solver on October, 16th, 2018. You will be added to the respective proseminars automatically and be notified about this shortly thereafter.
If you also applied for a non-CISPA proseminar (e.g., with other chairs in the CS department) and want to take their proseminar instead of the one you have been assigned by us, please let us know ASAP, but latest by Friday, October 19th. Missing to do so may harm other students that want to take the seminar slot that you occupy and do not use. Naturally, neither your fellow students nor we will appreciate this.
This term's proseminars
Low-Level Software Security (Nürnberger)
Description: Even though software is written in high-level languages, the processor ultimately executes low-level instructions. On the layer of assembler and processor instructions, errors exist but are often not easy to comprehend: memory management errors, type safety errors, or simply wrong operating system assumptions. In this bi-weekly proseminar, students will learn to present their findings in a short presentation and have to write a small research paper in the form of a summary for the topic they were given. Students work in groups of two and are given a main research paper that everyone has to read and additional related work that only the assigned group has to read. After the presentation, students have to engage in a discussion.
Requirements: Foundations of Cybersecurity I and II, knowledge of buffer overflows and operating system design.
Description: Malicious software, in its various facets, causes severe harm to millions of users worldwide. This weekly proseminar will therefore study academic research papers from the last ten years that propose methodologies to analyze, cluster, detect and defend against malicious software. After an initial introduction and topic assignment, the seminar will be organized in conference style. Each student will have to read and critically assess (review) one research paper per week. Every week, two students have to present a paper they reviewed, such that every student presents exactly one paper. Each presentation will be followed by a thorough discussion of the paper.
Requirements: Malware is a wide topic that covers several aspects on operating system, networks, and machine learning. Students will benefit from general knowledge in these topics (e.g., from CySec I and II, Security, Operating Systems), though there are no hard prerequisites for this seminar. Students are expected to self-study topics for which they lack background, which will happen to everyone when reading research papers.
Physical-Layer Security (Tippenhauer)
Description: The practical implementation of (theoretically) secure systems adds physical aspects that can be exploited by an attacker. In this seminar, students will learn to present, discuss, and summarize papers on established and recent attacks that are leveraging the physical layer, and potential countermeasures and mitigations. Example topics to be discussed are attacks leveraging physical access to devices, local and remote Side-Channel Analysis, and attacks targeting wireless communications. In addition, attacks related to sensing and control of IoT and Industrial Control Systems are discussed. The seminar is taught as a reading group with weekly meetings. Two to four students will get a single topic assigned to them, consisting of a lead paper and at least three additional papers. Each student will then present one of the papers, starting with the student presenting the lead paper. All students in the seminar are required to have read the lead paper and participate in the discussions during the meeting.
Requirements: Students must have basic knowledge about cryptography and protocols (e.g., through Foundations of Cybersecurity I and II).