Proseminar Assignment 2018/2019

The registration for all CISPA proseminars will open at the beginning of September.

This system is used to distribute students among the available actual proseminars. To register for any of the other proseminars that are offered by CISPA, you have to register here until October 15th 23:59 CEST. You can select which proseminar you would like to take, and will then be automatically assigned to one of them on October 18th. Please note that the assignment cannot be optimal for all students if you drop the assigned proseminar.

Please note the following:

  • We aim to provide a fair mapping that respects your wishes, but at the same time also respects the preferences of your fellow students.
  • Experience has shown that particular proseminars are more popular than others, yet these proseminars cannot fit all students. We thus encourage students to select their preferences for all available proseminars, which eases the process to assign students that do not fit the overly popular proseminars to another, less crowded one. Each student must therefore select at least two proseminars (with priority from "High" to "Low").
  • If you are really dedicated to one particular proseminar, and you do not want any other proseminar, please select the "No proseminar" as second positive option. However, this may ultimately lead to the situation that you are not assigned to any proseminar. Also, choosing "No proseminar" as second option does not increase your chances of getting your first choice.

The assignment will be automatically performed by a constraint solver on October, 18th, 2018. You will be added to the respective proseminars automatically and be notified about this shortly thereafter.

If you also applied for a non-CISPA proseminar (e.g., with other chairs in the CS department) and want to take their proseminar instead of the one you have been assigned by us, please let us know ASAP, but latest by Friday, October 19th. Missing to do so may harm other students that want to take the proseminar slot that you occupy and do not use. Naturally, neither your fellow students nor we will appreciate this.


Seminars

Malware by Christian Rossow

Malicious software, in its various facets, causes severe harm to millions of users worldwide. This weekly proseminar will therefore study academic research papers from the last ten years that propose methodologies to analyze, cluster, detect and defend against malicious software. After an initial introduction and topic assignment, the seminar will be organized in conference style. Each student will have to read and critically assess (review) one research paper per week. Every week, two students have to present a paper they reviewed, such that every student presents exactly one paper. Each presentation will be followed by a thorough discussion of the paper.

Requirements: Malware is a wide topic that covers several aspects on operating system, networks, and machine learning. Students will benefit from general knowledge in these topics (e.g., from CySec I and II, Security, Operating Systems), though there are no hard prerequisites for this seminar. Students are expected to self-study topics for which they lack background, which will happen to everyone when reading research papers.

Places: 18

Physical-Layer Security by Nils Ole Tippenhauer

The practical implementation of (theoretically) secure systems adds physical aspects that can be exploited by an attacker. In this seminar, students will learn to present, discuss, and summarize papers on established and recent attacks that are leveraging the physical layer, and potential countermeasures and mitigations. Example topics to be discussed are attacks leveraging physical access to devices, local and remote Side-Channel Analysis, and attacks targeting wireless communications. In addition, attacks related to sensing and control of IoT and Industrial Control Systems are discussed. The seminar is taught as a reading group with weekly meetings. Two to four students will get a single topic assigned to them, consisting of a lead paper and at least three additional papers. Each student will then present one of the papers, starting with the student presenting the lead paper. All students in the seminar are required to have read the lead paper and participate in the discussions during the meeting.

Requirements: Students must have basic knowledge about cryptography and protocols (e.g., through Foundations of Cybersecurity I and II).

Places: 24