SRM seminar

The SRM is a joint research meeting of the SaToSS and APSIA groups supported by LACS and SnT. The SRM talks take place on Tuesdays at 10:30am in MNO-E03-25-110 on the Belval Campus unless otherwise indicated. The SRM features presentations on ongoing research in security, privacy, and trust.

If you are interested in joining the seminar's mailing list, or in giving a talk at the seminar, contact Peter Rønne or Jun Pang. The next upcoming presentation is highlighted in boldface. A Google calendar of the SRM and related seminars is available.


No. Date Presenter Title Abstracts
321 December 15, 10:30, MSA 4.140 Yuyi Wang (ETHZ, Zurich) Variable-Version Lovász Local Lemma: Beyond Shearer's Bound Abstract
320 December 5 Hugues Mandon (ENS de Cachan) Temporal Reprogramming in Boolean Networks Abstract
319 November 30, 14:00 Tim Willemse (Eindhoven University of Technology) Explorations of Attribute-Based Access Control Abstract
318 November 14 Alexandre Bartel Automatically Detecting Malware: Dream or Reality? Abstract
317 November 7 Ross Horne (Nanyang Technological University) Specialisation of Attack Trees with Sequential Refinement Abstract
316 October 17 Yang Zhang (Saarland University) walk2friends: Inferring social links from mobility profiles Abstract
315 October 3 Zhiqiang Zhong (Paris Dauphine University) User Profile and Online Recommendation System Abstract
314 September 19, 15:30 Guozhu Meng (Nanyang Technological University) Guided, Stochastic Model-based GUI Testing of Android Apps Abstract
313 September 18 Borce Stojkovski Down the road Abstract
312 September 5 Ioana Boureanu (University of Surrey) Breaking and fixing HB+DB: A Short Tale of Provable vs. Experimental Security and Lightweight Designs Abstract
311 August 29, 14:00, MNO-E02-0225110 Steve Kremer (INRIA, Nancy) Deciding behavioral equivalences in the applied pi calculus: complexity, procedures and tool Abstract
310 July 18 Cheng-Te Li (National Cheng Kung University) Selecting Workers to Reduce Labor Force in Crowdsourcing Translation Abstract
309 July 14, 14:30, JFK E00-004 José Miguel Becerra On the Relation Between SIM and IND-RoR Security Models for PAKEs Abstract
308 July 10 Dinghao Wu (The Pennsylvania State University) CacheD: Identifying Cache-Based Timing Channels in Production Software Abstract
307 June 30 Zhiming Zhao (University of Amsterdam) Time critical applications in cloud: challenges and the SWITCH approach Abstract
306 June 22, 10:30 Yvo Desmedt (University of Texas, Dallas) Internet Voting on Insecure Platforms Abstract
305 June 14, 10:30 Jean-Louis Huynen From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis Abstract
304 May 23, 10:45 Robert Künnemann (Saarland University) Towards a Game-theoretic Notion of Incoercibility Abstract
303 May 22, 11:00 Stanislav Dashevskyi (University of Trento) Security Assessment of Third-party Open Source Applications Abstract
302 May 15, 10:30 Man Ho Au (PolyU) Ring Signature and its Blockchain-related Applications Abstract
301 May 9, 11:00 Ben Smyth (Huawei) Hacking voting systems for cash, fun, and power Abstract
300 May 2, 14:00 David Naccache (ENS, Paris) Where There Is Power There Is Resistance: Designing Optically Undetectable Analog Trojans Abstract
299 May 2 Chenyi Zhang (JiNan University) Unifying Access Control and Information Flow Abstract
298 March 31, 10:30 Cheng-Te Li (National Cheng Kung University) Planning and Predicting Activities on Location-based Social Networks Abstract
297 March 29, 10:30, JFK Building, Room E004/E005 Richard Clayton (University of Cambridge) Brute Force Basics Abstract
296 March 23, MNO-E03-03-450 Hongyang Qu (University of Sheffield) A stochastically verifiable autonomous control architecture with reasoning Abstract
295 March 13, 10:30, F213 Gergei Bana Computationally Sound Security Analysis with First Order Logic – Computationally Complete Symbolic Attacker Based on Indistinguishability Abstract
294 March 6, 10:30, E212 Yury Zhauniarovich (Qatar Computing Research Institute) Small Changes, Big Changes: An Updated View on the Android Permission System Abstract
293 March 1, 13:00, E212 Matthijs Melissen (Computest) An Ethical Hacker's Diary Abstract
292 March 1, 10:30, F213 Wojtek Jamroga (Institute of Computer Science, Polish Academy of Sciences) Towards Model Checking of Coercion Resistance in Logics of Strategic Ability Abstract
291 Febuary 14 Hauke Busch (University of Lübeck) Boolean Modeling Reveals the Necessity of Transcriptional Regulation for Cellular Decisions Abstract
290 January 31, 10:30, F213 Zhe Liu (University of Waterloo, Canada) microFourQ: FourQ Crypto on 8/16/32-bit Embedded Devices Abstract
289 January 27, 10:30, F213 Vincenzo Iovino (University of Luxembourg) Unconditional and Efficient NIZK proofs in the Random Oracle Model Abstract
288 January 20, 14:00, F213 Johannes Müller (University of Trier, Germany) sElect: A Lightweight Verifiable Remote Voting System Abstract
287 January 17, 15:30, E212 David Naccache (ENS, Paris) Testing With Given a priori Probabilities TBA