The registration for all CISPA proseminars will open at the beginning of September.
This system is used to distribute students among the available actual proseminars. To register for any of the other proseminars that are offered by CISPA, you have to register here until October 15th 23:59 CEST. You can select which proseminar you would like to take, and will then be automatically assigned to one of them on October 18th. Please note that the assignment cannot be optimal for all students if you drop the assigned proseminar.
Please note the following:
The assignment will be automatically performed by a constraint solver on October, 18th, 2018. You will be added to the respective proseminars automatically and be notified about this shortly thereafter.
If you also applied for a non-CISPA proseminar (e.g., with other chairs in the CS department) and want to take their proseminar instead of the one you have been assigned by us, please let us know ASAP, but latest by Friday, October 19th. Missing to do so may harm other students that want to take the proseminar slot that you occupy and do not use. Naturally, neither your fellow students nor we will appreciate this.
Malicious software, in its various facets, causes severe harm to millions of users worldwide. This weekly proseminar will therefore study academic research papers from the last ten years that propose methodologies to analyze, cluster, detect and defend against malicious software. After an initial introduction and topic assignment, the seminar will be organized in conference style. Each student will have to read and critically assess (review) one research paper per week. Every week, two students have to present a paper they reviewed, such that every student presents exactly one paper. Each presentation will be followed by a thorough discussion of the paper.
Requirements: Malware is a wide topic that covers several aspects on operating system, networks, and machine learning. Students will benefit from general knowledge in these topics (e.g., from CySec I and II, Security, Operating Systems), though there are no hard prerequisites for this seminar. Students are expected to self-study topics for which they lack background, which will happen to everyone when reading research papers.
The practical implementation of (theoretically) secure systems adds physical aspects that can be exploited by an attacker. In this seminar, students will learn to present, discuss, and summarize papers on established and recent attacks that are leveraging the physical layer, and potential countermeasures and mitigations. Example topics to be discussed are attacks leveraging physical access to devices, local and remote Side-Channel Analysis, and attacks targeting wireless communications. In addition, attacks related to sensing and control of IoT and Industrial Control Systems are discussed. The seminar is taught as a reading group with weekly meetings. Two to four students will get a single topic assigned to them, consisting of a lead paper and at least three additional papers. Each student will then present one of the papers, starting with the student presenting the lead paper. All students in the seminar are required to have read the lead paper and participate in the discussions during the meeting.
Requirements: Students must have basic knowledge about cryptography and protocols (e.g., through Foundations of Cybersecurity I and II).