| Dec 4, 2024 |
|
Dr. Alenka Gucek (Jozef Stefan Institute, Ljubljana, Slovenia)
Prof. Dr. Gabi Dreo Rodosek (RI CODE)
Prof. Dr. Eirini Ntoutsi (RI CODE)
|
|
Responsible Al: Balancing Innovation and Ethics (panel discussion)
|
| Nov 6, 2024 |
|
Prof. Dr. Ivan Visconti (La Sapienza, University of Rome, Italien) |
|
Decentralized Trading of Digital Assets via Trustworthy Previews |
| Oct 23, 2024 |
|
Dr. Kamil Kluczniak (secunet Security Networks AG) |
|
Fully-Homomorphic Encryption and its applications to critical systems |
| Jun 12, 2024 |
|
Leah Zhang-Kennedy, PhD (University of Waterloo, Canada) |
|
Deceptive Design and Privacy in Immersive Extended Reality |
| Apr 17, 2024 |
|
Dr. Lucjan Hanzlik (CISPA Helmholtz Center for Information Security) |
|
Fast IDentity Online with Privacy and Attributes |
| Mar 13, 2024 |
|
Prof. Dr. Konrad Rieck (TU Berlin) |
|
When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review |
| Feb 21, 2024 |
|
Prof. Dr. Dominique Schröder (FAU Erlangen-Nürnberg)
|
|
Adaptor Signatures in Practice |
Dec 13, 2023
|
|
Prof. Dr.-Ing. Gerhard Wunder (FU Berlin) |
|
On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box |
Nov 22, 2023
|
|
Prof. Dr. Arthur Zimek (University of Southern Denmark) |
|
Fairness in Imbalanced Classification: An Adjustment to the k Nearest Neighbor Classifier |
| Oct 11, 2023 |
|
Prof. Dr. Roy Maxion (Carnegie Mellon University, USA) |
|
When the Rubbish Meets the Road: A Lesson About Bad Data in Keystroke Dynamics |
Jun 21, 2023
|
|
Prof. Dr. Kaveh Razavi (ETH Zurich, Schwitzerland)
|
|
Open Hardware Security – A New Hope
|
| May 24, 2023 |
|
Prof. Dr. Mark Yampolskiy (Auburn University, USA)
|
|
Additive Manufacturing Security: 10+ Reasons to be Concerned |
| May 3, 2023 |
|
Prof. Dr. Frank Piessens (KU Leuven, Belgium)
|
|
Transient execution attacks: a simple system model and a proposal for a defense |
Dec 7, 2022
|
|
Prof. Dr. Eric Bodden (Paderborn University)
|
|
Managing the Dependency Hell – Challenges and Current Approaches to Software Composition Analysis
|
Nov 23, 2022
|
|
Samuel Groß (Google V8 Security)
|
|
Attacking and Defending JavaScript Engines |
Nov 9, 2022
|
|
Prof. Dr. Olivier Bartheye (French Air Force and Space Academy) |
|
The cyber-crisis management as a natural framework to address the challenge of coding decision-making autonomy in embedded systems |
May 18, 2022
|
|
Prof. Dr. Somesh Jha (University of Wisconsin Madison, USA) |
|
Trustworthy Machine Learning and the Security Mindset |
Feb 12, 2020
|
|
Prof. Steve Blackburn (Australian National University)
|
|
Garbage Collection – Implementation, Innovation, Performance and Security
|
| Jan 29, 2020 |
|
Prof. Dr. Laurence Tratt (Kings College London, UK) |
|
Between the Lines – VM Assumptions
|
Dec 18, 2019
|
|
Victor van der Veen (Qualcomm) |
|
System Security Research at Qualcomm Product Security |
Dec 4, 2019
|
|
Stijn Volckaert (KU Leuven, Belgium)
|
|
Making Multi-Variant Execution Practical in the Real World |
Oct 30, 2019
|
|
Herbert Bos (VU Amsterdam, Netherlands)
|
|
Software and Harmware: when chip vendors pull the rug from under our feet |
Jun 19, 2019
|
|
Ben Titzer (Google Munich) |
|
What Spectre means for language implementors |
Jun 12, 2019
|
|
Prof. Stefan Katzenbeisser (University of Passau)
|
|
Covert channels on mobile devices – gyroscopes and more
|
May 15, 2019
|
|
Dr. Phillip J. Windley (Brigham Young University, USA) |
|
An Identity Metasystem – Sovrin Foundation
|
| Apr 3, 2019 |
|
Thorsten Holz (Ruhr University Bochum)
|
|
Scalable and Efficient Fuzzing for Complex Programs |
Mar 20, 2019
|
|
Shriram Krishnamurthi (Brown University, USA)
|
|
Logic in the Service of System Configurations |
Mar 13, 2019
|
|
Lucas Davi (University of Duisburg-Essen)
|
|
Sereum – Protecting existing Smart Contracts against Re-Entrancy Attacks
|
Feb 20, 2019
|
|
Mathias Payer (EPF Lausanne, Schwitzerland)
|
|
Memory Corruption: Exploit-guided Software Testing |
Feb 12, 2019
|
|
Michael Franz (UC Irvine, USA) |
|
Cyber Attacks and Defenses: Trends, Challenges, and Outlook |
| Jan 23, 2019 |
|
Thomas Dullien (Google Project Zero) |
|
Computer Security "Exploits" and the weird machine |