The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in MNO-E03-25-110 on the Belval Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.
If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Peter Rønne or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.
No. | Date | Presenter | Title | Abstracts |
---|---|---|---|---|
321 | December 15, 10:30, MSA 4.140 | Yuyi Wang (ETHZ, Zurich) | Variable-Version Lovász Local Lemma: Beyond Shearer's Bound | Abstract |
320 | December 5 | Hugues Mandon (ENS de Cachan) | Temporal Reprogramming in Boolean Networks | Abstract |
319 | November 30, 14:00 | Tim Willemse (Eindhoven University of Technology) | Explorations of Attribute-Based Access Control | Abstract |
318 | November 14 | Alexandre Bartel | Automatically Detecting Malware: Dream or Reality? | Abstract |
317 | November 7 | Ross Horne (Nanyang Technological University) | Specialisation of Attack Trees with Sequential Refinement | Abstract |
316 | October 17 | Yang Zhang (Saarland University) | walk2friends: Inferring social links from mobility profiles | Abstract |
315 | October 3 | Zhiqiang Zhong (Paris Dauphine University) | User Profile and Online Recommendation System | Abstract |
314 | September 19, 15:30 | Guozhu Meng (Nanyang Technological University) | Guided, Stochastic Model-based GUI Testing of Android Apps | Abstract |
313 | September 18 | Borce Stojkovski | Down the road | Abstract |
312 | September 5 | Ioana Boureanu (University of Surrey) | Breaking and fixing HB+DB: A Short Tale of Provable vs. Experimental Security and Lightweight Designs | Abstract |
311 | August 29, 14:00, MNO-E02-0225110 | Steve Kremer (INRIA, Nancy) | Deciding behavioral equivalences in the applied pi calculus: complexity, procedures and tool | Abstract |
310 | July 18 | Cheng-Te Li (National Cheng Kung University) | Selecting Workers to Reduce Labor Force in Crowdsourcing Translation | Abstract |
309 | July 14, 14:30, JFK E00-004 | José Miguel Becerra | On the Relation Between SIM and IND-RoR Security Models for PAKEs | Abstract |
308 | July 10 | Dinghao Wu (The Pennsylvania State University) | CacheD: Identifying Cache-Based Timing Channels in Production Software | Abstract |
307 | June 30 | Zhiming Zhao (University of Amsterdam) | Time critical applications in cloud: challenges and the SWITCH approach | Abstract |
306 | June 22, 10:30 | Yvo Desmedt (University of Texas, Dallas) | Internet Voting on Insecure Platforms | Abstract |
305 | June 14, 10:30 | Jean-Louis Huynen | From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis | Abstract |
304 | May 23, 10:45 | Robert Künnemann (Saarland University) | Towards a Game-theoretic Notion of Incoercibility | Abstract |
303 | May 22, 11:00 | Stanislav Dashevskyi (University of Trento) | Security Assessment of Third-party Open Source Applications | Abstract |
302 | May 15, 10:30 | Man Ho Au (PolyU) | Ring Signature and its Blockchain-related Applications | Abstract |
301 | May 9, 11:00 | Ben Smyth (Huawei) | Hacking voting systems for cash, fun, and power | Abstract |
300 | May 2, 14:00 | David Naccache (ENS, Paris) | Where There Is Power There Is Resistance: Designing Optically Undetectable Analog Trojans | Abstract |
299 | May 2 | Chenyi Zhang (JiNan University) | Unifying Access Control and Information Flow | Abstract |
298 | March 31, 10:30 | Cheng-Te Li (National Cheng Kung University) | Planning and Predicting Activities on Location-based Social Networks | Abstract |
297 | March 29, 10:30, JFK Building, Room E004/E005 | Richard Clayton (University of Cambridge) | Brute Force Basics | Abstract |
296 | March 23, MNO-E03-03-450 | Hongyang Qu (University of Sheffield) | A stochastically verifiable autonomous control architecture with reasoning | Abstract |
295 | March 13, 10:30, F213 | Gergei Bana | Computationally Sound Security Analysis with First Order Logic – Computationally Complete Symbolic Attacker Based on Indistinguishability | Abstract |
294 | March 6, 10:30, E212 | Yury Zhauniarovich (Qatar Computing Research Institute) | Small Changes, Big Changes: An Updated View on the Android Permission System | Abstract |
293 | March 1, 13:00, E212 | Matthijs Melissen (Computest) | An Ethical Hacker's Diary | Abstract |
292 | March 1, 10:30, F213 | Wojtek Jamroga (Institute of Computer Science, Polish Academy of Sciences) | Towards Model Checking of Coercion Resistance in Logics of Strategic Ability | Abstract |
291 | Febuary 14 | Hauke Busch (University of Lübeck) | Boolean Modeling Reveals the Necessity of Transcriptional Regulation for Cellular Decisions | Abstract |
290 | January 31, 10:30, F213 | Zhe Liu (University of Waterloo, Canada) | microFourQ: FourQ Crypto on 8/16/32-bit Embedded Devices | Abstract |
289 | January 27, 10:30, F213 | Vincenzo Iovino (University of Luxembourg) | Unconditional and Efficient NIZK proofs in the Random Oracle Model | Abstract |
288 | January 20, 14:00, F213 | Johannes Müller (University of Trier, Germany) | sElect: A Lightweight Verifiable Remote Voting System | Abstract |
287 | January 17, 15:30, E212 | David Naccache (ENS, Paris) | Testing With Given a priori Probabilities | TBA |