18.07.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Peter Y. A. Ryan: Trust and Trustworthiness of Voting Systems

Abstract
Democracy is a defining feature of civilised societies, but it is delicate and vulnerable. In recent years, we have seen the threats to democratic processes brought into sharp relief, and, arguably, we have witnessed some spectacular failures of democracy. The increasing digitisation of democracy brings with it the potential to enrich it but also a raft of novel and poorly understood attack vectors. These threats can undermine the conduct of elections, the surrounding systems of voter registration, electoral rolls, voter authentication, and the conduct of campaigns, fake news etc.

Details anzeigen
04.07.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Juan Garay: Foundational Aspects of Blockchain Protocols

Abstract
Decentralized cryptocurrencies such as Bitcoin have ignited much excitement, not only for their novel realization of central bank-free financial instruments, but also as an alternative approach to classical distributed computing problems, such as reaching agreement distributedly in the presence of misbehaving parties, as well as to numerous other applications―contracts, reputation systems, name services, etc. The soundness and security of these applications, however, hinge on the thorough understanding of the fundamental properties of their underlying blockchain data structure, which parties (“miners”) maintain and try to extend by generating proofs of various kinds, “proofs of work” (PoW, aka “cryptographic puzzle”) perhaps being the most interesting ones.

Details anzeigen
03.06.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Alice J O'Toole: Turning a face recognition black box white: Understanding what deep convolutional neural networks learn about faces

  - Achtung: diese DLS findet ausnahmesweise an einem Montag statt -
Abstract

Real-world face recognition requires an ability to perceive the uniqueness of a face across multiple, variable images. Deep convolutional neural networks (DCNNs) accomplish this feat and can be analyzed in a multidimensional “face space”.

Details anzeigen
19.03.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Gene Tsudik: VRASED: Verifiable Remote Attestation for Simple Embedded Devices

  - Achtung: diese DLS findet ausnahmesweise an einem Dienstag statt -
Abstract

Remote Attestation (RA) is a security service that allows a trusted verifier (Vrf) to measure the software state of an untrusted remote device -- Prv. If correctly implemented, RA allows Vrf to remotely detect if Prv is in an illegal or compromised state. Although several RA architectures have been proposed, little attention has been devoted to their verifiability and security guarantees that can be derived through formal verification of RA architectures.

Details anzeigen
14.02.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit N. Asokan: Hardware-assisted run-time protection: on balancing security and deployability

Run-time attacks are a prominent attack vector for compromising systems written in memory-unsafe languages like C and C++. Over the last decade there has been significant advances by both researchers and practitioners in understanding and defending against run-time attacks, especially those that attempt to defeat control-flow integrity (CFI). As CFI defenses are gradually being deployed, data-oriented attacks will become increasingly attractive. ....

Details anzeigen
31.01.
2019
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Daniel Keim: The Power of Visual Analytics for Security Applications

Abstract:
Never before in history data is generated and collected at such high volumes as it is today, in particular in security applications. For the analysis of large data sets to be effective, it is important to include the human in the data exploration process and combine the flexibility, creativity, and general knowledge of humans with the enormous storage capacity and the computational power of today's computers.

Details anzeigen
12.07.
2018
von 16:15–17:15 Uhr

CANCELLED: DLS in Cybersecurity - Tracing Stolen Bitcoin

Diese DLS in Cybersecurity kann leider nicht stattfinden. Sie wird zu einem späteren Zeitpunkt nachgeholt werden.

Abstract:
We've been exploring how to track stolen bitcoin. Previous attempts to do this had got entangled in the problem of dealing with transactions that split bitcoin into change, or that consolidate smaller sums into larger ones, and with mining fees. One answer comes from an unexpected direction: a legal precedent in 1816....

Details anzeigen
21.06.
2018
von 16:15–17:15 Uhr

DLS in Cybersecurity mit Ari Juels: Beyond Smarts: Toward Correct, Private, Data-Rich Smart Contracts

Abstract:
Smart contracts are applications that run on and inherit the special properties of blockchains. These properties alone, though, do not make smart contracts broadly useful. Persistence prevents tampering, but makes errors irreversible. Transparency supports behavioral assurances, but at the cost of confidentiality. 

Details anzeigen
24.05.
2018
von 16:15–17:15 Uhr

DLS in Cyberecurity: Grand Research Challenges for Cybersecurity of Critical Information and Infrastructures

Abstract:
Computing and communications infrastructures have become commodities which societies largely depend on, transacting huge quantities of data and exhibiting pervasive interconnections, sometimes in critical conditions. However, the actual magnitude that security and dependability risks may assume, is often misperceived. The information society has been assuming risk behaviours, without the adequate protection. Many stakeholders, not only end-users but vendors, service providers, public administrations and - what may be surprising - even governments, seem to ignore those risks, in different ways.

Details anzeigen
19.04.
2018
von 16:15 Uhr

DLS in Cybersecurity: From Provable Security to Secure Cryptographic Implementations

Abstract
Building secure cryptographic implementations is notoriously hard. In this talk, I will outline a general methodology that delivers formal guarantees on assembly-level implementations through a combination of ideas from deductive program verification, program analysis, and verified compilation.

Details anzeigen
Seite 1 von 5nächste Seite