SRM seminar

The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in MNO-E03-22-010 on the Belval Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.

If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Peter Rønne or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.

Presentations

No. Date Presenter Title Abstracts
311 September 5 Ioana Boureanu (University of Surrey) Breaking and fixing HB+DB: A Short Tale of Provable vs. Experimental Security and Lightweight Designs Abstract
310 July 18 Cheng-Te Li (National Cheng Kung University) Selecting Workers to Reduce Labor Force in Crowdsourcing Translation Abstract
309 July 14, 14:30, JFK E00-004 José Miguel Becerra On the Relation Between SIM and IND-RoR Security Models for PAKEs Abstract
308 July 10 Dinghao Wu (The Pennsylvania State University) CacheD: Identifying Cache-Based Timing Channels in Production Software Abstract
307 June 30 Zhiming Zhao (University of Amsterdam) Time critical applications in cloud: challenges and the SWITCH approach Abstract
306 June 22, 10:30 Yvo Desmedt (University of Texas, Dallas) Internet Voting on Insecure Platforms Abstract
305 June 14, 10:30 Jean-Louis Huynen From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis Abstract
304 May 23, 10:45 Robert Künnemann (Saarland University) Towards a Game-theoretic Notion of Incoercibility Abstract
303 May 22, 11:00 Stanislav Dashevskyi (University of Trento) Security Assessment of Third-party Open Source Applications Abstract
302 May 15, 10:30 Man Ho Au (PolyU) Ring Signature and its Blockchain-related Applications Abstract
301 May 9, 11:00 Ben Smyth (Huawei) Hacking voting systems for cash, fun, and power Abstract
300 May 2, 14:00 David Naccache (ENS, Paris) Where There Is Power There Is Resistance: Designing Optically Undetectable Analog Trojans Abstract
299 May 2 Chenyi Zhang (JiNan University) Unifying Access Control and Information Flow Abstract
298 March 31, 10:30 Cheng-Te Li (National Cheng Kung University) Planning and Predicting Activities on Location-based Social Networks Abstract
297 March 29, 10:30, JFK Building, Room E004/E005 Richard Clayton (University of Cambridge) Brute Force Basics Abstract
296 March 23, MNO-E03-03-450 Hongyang Qu (University of Sheffield) A stochastically verifiable autonomous control architecture with reasoning Abstract
295 March 13, 10:30, F213 Gergei Bana Computationally Sound Security Analysis with First Order Logic – Computationally Complete Symbolic Attacker Based on Indistinguishability Abstract
294 March 6, 10:30, E212 Yury Zhauniarovich (Qatar Computing Research Institute) Small Changes, Big Changes: An Updated View on the Android Permission System Abstract
293 March 1, 13:00, E212 Matthijs Melissen (Computest) An Ethical Hacker's Diary Abstract
292 March 1, 10:30, F213 Wojtek Jamroga (Institute of Computer Science, Polish Academy of Sciences) Towards Model Checking of Coercion Resistance in Logics of Strategic Ability Abstract
291 Febuary 14 Hauke Busch (University of Lübeck) Boolean Modeling Reveals the Necessity of Transcriptional Regulation for Cellular Decisions Abstract
290 January 31, 10:30, F213 Zhe Liu (University of Waterloo, Canada) microFourQ: FourQ Crypto on 8/16/32-bit Embedded Devices Abstract
289 January 27, 10:30, F213 Vincenzo Iovino (University of Luxembourg) Unconditional and Efficient NIZK proofs in the Random Oracle Model Abstract
288 January 20, 14:00, F213 Johannes Müller (University of Trier, Germany) sElect: A Lightweight Verifiable Remote Voting System Abstract
287 January 17, 15:30, E212 David Naccache (ENS, Paris) Testing With Given a priori Probabilities TBA