CODE-Kolloquium

Wir freuen uns, Sie zum CODE-Kolloquium begrüßen zu dürfen. In regelmäßigen Abständen laden wir in Kooperation mit ITIS e.V. hochkarätige Redner für 45-minütige Vorträge zu ausgewählten Themen der IT- und Cyber-Sicherheit an das Forschungsinstitut CODE ein. Im Anschluss an einen Vortrag folgt eine Questions- and Answers-Runde. Abgerundet wird das Kolloquium durch ein kleines Get-Together.

Regelmäßige Einladungen erhalten Sie über unseren E-Mail-Verteiler. Gern nehmen wir Sie mit auf. Bitte senden Sie uns dazu einfach eine kurze Mitteilung an code@unibw.de.

Nächste Veranstaltung

Mittwoch, 06.11.2024, 18:00 Uhr

Decentralized Trading of Digital Assets via Trustworthy Previews

Prof. Ivan Visconti

La Sapienza, University of Rome, Italy

 

Abstract:
Decentralized platforms, like blockchains, can be used to realize afair exchange of digital assets avoiding the use of expensive and risky third parties. However, digital assets are easy to clone and thus when privacy is desired they must remain secret. Nevertheless, sometimes one would like to advertise a digital asset in order to generate interest and increase its value to later on fairly exchange it. In this talk Professor Visconti will present privacy-preserving techniques: 1) to efficiently guarantee that a preview of a digital asset is correct; 2) to fairly exchange an advertised asset through on-chain communication only.

Bio:
Ivan Visconti is a full professor of Computer Science at La Sapienza University of Rome. His research focuses on cryptographic protocols and primitives and on blockchain technology. He has served multiple times in program committees of prestigious IACR conferences and has published several of his research results in those conferences.

Veranstaltungsort:
Cascada-Gebäude, Carl-Wery-Str. 18, 81739 München, Raum 0812 (EG, rechts neben dem Eingang). Einlass ab 17:30 Uhr

Die Teilnahme an der Veranstaltung ist wie immer kostenlos und steht grundsätzlich allen Interessierten offen! Für unsere eigene Planung bitten wir jedoch vorab um kurze Anmeldung unter code@unibw.de. Eine gesonderte Bestätigung Ihrer Anmeldung wird nicht versandt.

Vergangene Termine

23.10.2024 | Dr. Kamil Kluczniak, secunet Security Networks AG | Fully-Homomorphic Encryption and its applications to critical systems
12.06.2024 | Leah Zhang-Kennedy, PhD, University of Waterloo, Kanada | Deceptive Design and Privacy in Immersive Extended Reality
17.04.2024 | Dr. Lucjan Hanzlik, CISPA Helmholtz Center for Information Security | Fast IDentity Online with Privacy and Attributes
13.03.2024 | Prof. Dr. Konrad Rieck, TU Berlin | When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review
21.02.2024 | Prof. Dr. Dominique Schröder, FAU Erlangen-Nürnberg | Adaptor Signatures in Practice
13.12.2023 | Prof. Dr.-Ing. Gerhard Wunder, FU Berlin | On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box
22.11.2023 | Prof. Dr. Arthur Zimek, University of Southern Denmark | Fairness in Imbalanced Classification: An Adjustment to the k Nearest Neighbor Classifier
11.10.2023 | Prof. Dr. Roy Maxion, Carnegie Mellon University, USA | When the Rubbish Meets the Road: A Lesson About Bad Data in Keystroke Dynamics
21.06.2023 | Prof. Dr. Kaveh Razavi, ETH Zürich, Schweiz | Open Hardware Security – A New Hope
24.05.2023 | Prof. Dr. Mark Yampolskiy, Auburn University, USA | Additive Manufacturing Security: 10+ Reasons to be Concerned
03.05.2023 | Prof. Dr. Frank Piessens, Katholische Universität Leuven, Belgien | Transient execution attacks: a simple system model and a proposal for a defense
07.12.2022 | Prof. Dr. Eric Bodden, Universität Paderborn | Managing the Dependency Hell – Challenges and Current Approaches to Software Composition Analysis
23.11.2022 | Samuel Groß, Google V8 Security | Attacking and Defending JavaScript Engines
09.11.2022 | Prof. Dr. Olivier Bartheye, French Air Force and Space Academy | The cyber-crisis management as a natural framework to address the challenge of coding decision-making autonomy in embedded systems
18.05.2022 | Prof. Dr. Somesh Jha, University of Wisconsin Madison, USA | Trustworthy Machine Learning and the Security Mindset
12.02.2020 | Prof. Steve Blackburn, Australian National University | Garbage Collection – Implementation, Innovation, Performance and Security
29.01.2020 | Prof. Dr. Laurence Tratt, Kings College London, UK | Between the Lines – VM Assumptions
18.12.2019 | Victor van der Veen, Qualcomm | System Security Research at Qualcomm Product Security
04.12.2019 | Stijn Volckaert, Katholische Universität Leuven, Belgien | Making Multi-Variant Execution Practical in the Real World
30.10.2019 | Herbert Bos, Freie Universität Amsterdam, Niederlande | Software and Harmware: when chip vendors pull the rug from under our feet
19.06.2019 | Ben Titzer, Google Munich | What Spectre means for language implementors
12.06.2019 | Prof. Stefan Katzenbeisser, Universität Passau | Covert channels on mobile devices – gyroscopes and more
15.05.2019 | Dr. Phillip J. Windley, Brigham Young University, USA | An Identity Metasystem – Sovrin Foundation
03.04.2019 | Thorsten Holz, Ruhr-Universität Bochum | Scalable and Efficient Fuzzing for Complex Programs
20.03.2019 | Shriram Krishnamurthi, Brown University, USA | Logic in the Service of System Configurations
13.03.2019 | Lucas Davi, Universität Duisburg-Essen | Sereum – Protecting existing Smart Contracts against Re-Entrancy Attacks
20.02.2019 | Mathias Payer, EPF Lausanne, Schweiz | Memory Corruption: Exploit-guided Software Testing
12.02.2019 | Michael Franz, UC Irvine, USA | Cyber Attacks and Defenses: Trends, Challenges, and Outlook
23.01.2019 | Thomas Dullien (aka halvarflake), Google Project Zero | Computer Security "Exploits" and the weird machine