CODE Colloquium

CODE Colloquium

In cooperation with ITIS e.V., we regularly invite high-profile speakers to give 45-minute presentations on selected topics related to IT and cyber security at the Research Institute CODE. Each presentation is followed by a Q&A session. The colloquium is followed by a small get-together. We are looking forward to welcome you at the CODE Colloquium. 

Regular invitations are sent out via our mailing list. We would be happy to add you to it. Simply send us a short message to code@unibw.de.

Past events

Dec 4, 2024  

Dr. Alenka Gucek
(Jozef Stefan Institute, Ljubljana, Slovenia)

Prof. Dr. Gabi Dreo Rodosek
(RI CODE)

Prof. Dr. Eirini Ntoutsi
(RI CODE)

 

Responsible Al: Balancing Innovation and Ethics (panel discussion)

Nov 6, 2024   Prof. Dr. Ivan Visconti
(La Sapienza, University of Rome, Italien)
  Decentralized Trading of Digital Assets via Trustworthy Previews
Oct 23, 2024   Dr. Kamil Kluczniak
(secunet Security Networks AG)
  Fully-Homomorphic Encryption and its applications to critical systems
Jun 12, 2024   Leah Zhang-Kennedy, PhD
(University of Waterloo, Canada)
  Deceptive Design and Privacy in Immersive Extended Reality
Apr 17, 2024   Dr. Lucjan Hanzlik
(CISPA Helmholtz Center for Information Security)
  Fast IDentity Online with Privacy and Attributes
Mar 13, 2024   Prof. Dr. Konrad Rieck
(TU Berlin)
  When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review
Feb 21, 2024   Prof. Dr. Dominique Schröder
(FAU Erlangen-Nürnberg)
  Adaptor Signatures in Practice
Dec 13, 2023
  Prof. Dr.-Ing. Gerhard Wunder
(FU Berlin)
  On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box
Nov 22, 2023
  Prof. Dr. Arthur Zimek
(University of Southern Denmark)
  Fairness in Imbalanced Classification: An Adjustment to the k Nearest Neighbor Classifier
Oct 11, 2023   Prof. Dr. Roy Maxion
(Carnegie Mellon University, USA)
  When the Rubbish Meets the Road: A Lesson About Bad Data in Keystroke Dynamics
Jun 21, 2023
  Prof. Dr. Kaveh Razavi
(ETH Zurich, Schwitzerland)
  Open Hardware Security – A New Hope
May 24, 2023   Prof. Dr. Mark Yampolskiy
(Auburn University, USA)
  Additive Manufacturing Security: 10+ Reasons to be Concerned
May 3, 2023   Prof. Dr. Frank Piessens
(KU Leuven, Belgium)
  Transient execution attacks: a simple system model and a proposal for a defense
Dec 7, 2022
  Prof. Dr. Eric Bodden
(Paderborn University)
  Managing the Dependency Hell – Challenges and Current Approaches to Software Composition Analysis
Nov 23, 2022
  Samuel Groß
(Google V8 Security)
  Attacking and Defending JavaScript Engines
Nov 9, 2022
  Prof. Dr. Olivier Bartheye
(French Air Force and Space Academy)
  The cyber-crisis management as a natural framework to address the challenge of coding decision-making autonomy in embedded systems
May 18, 2022
  Prof. Dr. Somesh Jha
(University of Wisconsin Madison, USA)
  Trustworthy Machine Learning and the Security Mindset
Feb 12, 2020
 

Prof. Steve Blackburn
(Australian National University)

  Garbage Collection – Implementation, Innovation, Performance and Security
Jan 29, 2020   Prof. Dr. Laurence Tratt
(Kings College London, UK)
  Between the Lines – VM Assumptions
Dec 18, 2019
  Victor van der Veen
(Qualcomm)
  System Security Research at Qualcomm Product Security
Dec 4, 2019
  Stijn Volckaert
(KU Leuven, Belgium)
  Making Multi-Variant Execution Practical in the Real World
Oct 30, 2019
  Herbert Bos
(VU Amsterdam, Netherlands)
  Software and Harmware: when chip vendors pull the rug from under our feet
Jun 19, 2019
  Ben Titzer 
(Google Munich)
  What Spectre means for language implementors
Jun 12, 2019
  Prof. Stefan Katzenbeisser
(University of Passau)
  Covert channels on mobile devices – gyroscopes and more
May 15, 2019
  Dr. Phillip J. Windley
(Brigham Young University, USA)
  An Identity Metasystem – Sovrin Foundation
Apr 3, 2019   Thorsten Holz
(Ruhr University Bochum)
  Scalable and Efficient Fuzzing for Complex Programs
Mar 20, 2019
  Shriram Krishnamurthi
(Brown University, USA)
  Logic in the Service of System Configurations
Mar 13, 2019
  Lucas Davi
(University of Duisburg-Essen)
  Sereum – Protecting existing Smart Contracts against Re-Entrancy Attacks
Feb 20, 2019
  Mathias Payer
(EPF Lausanne, Schwitzerland)
  Memory Corruption: Exploit-guided Software Testing
Feb 12, 2019
  Michael Franz
(UC Irvine, USA)
  Cyber Attacks and Defenses: Trends, Challenges, and Outlook
Jan 23, 2019   Thomas Dullien
(Google Project Zero)
  Computer Security "Exploits" and the weird machine