CODE-Kolloquium

Wir freuen uns, Sie zum CODE-Kolloquium begrüßen zu dürfen. In regelmäßigen Abständen laden wir in Kooperation mit ITIS e.V. hochkarätige Redner für 45-minütige Vorträge zu ausgewählten Themen der IT- und Cyber-Sicherheit an das Forschungsinstitut CODE ein. Im Anschluss an einen Vortrag folgt eine Questions- and Answers-Runde. Abgerundet wird das Kolloquium durch ein kleines Get-Together.

Regelmäßige Einladungen erhalten Sie über unseren E-Mail-Verteiler. Gern nehmen wir Sie mit auf. Bitte senden Sie uns dazu einfach eine kurze Mitteilung an code@unibw.de.

Nächste Veranstaltung

Die nächsten Termine für das CODE-Kolloquium werden in Kürze an dieser Stelle bekanntgegeben.

Vergangene Termine

04.12.2024  

Dr. Alenka Gucek
(Jozef Stefan Institute, Ljubljana, Slowenien)

Prof. Dr. Gabi Dreo Rodosek
(FI CODE)

Prof. Dr. Eirini Ntoutsi
(FI CODE)

 

Responsible Al: Balancing Innovation and Ethics (Podiumsdiskussion)

06.11.2024   Prof. Dr. Ivan Visconti
(La Sapienza, University of Rome, Italien)
  Decentralized Trading of Digital Assets via Trustworthy Previews
23.10.2024   Dr. Kamil Kluczniak
(secunet Security Networks AG)
  Fully-Homomorphic Encryption and its applications to critical systems
12.06.2024   Leah Zhang-Kennedy, PhD
(University of Waterloo, Kanada)
  Deceptive Design and Privacy in Immersive Extended Reality
17.04.2024   Dr. Lucjan Hanzlik
(CISPA Helmholtz Center for Information Security)
  Fast IDentity Online with Privacy and Attributes
13.03.2024   Prof. Dr. Konrad Rieck
(TU Berlin)
  When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review
21.02.2024   Prof. Dr. Dominique Schröder
(FAU Erlangen-Nürnberg)
  Adaptor Signatures in Practice
13.12.2023
  Prof. Dr.-Ing. Gerhard Wunder
(FU Berlin)
  On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box
22.11.2023
  Prof. Dr. Arthur Zimek
(University of Southern Denmark)
  Fairness in Imbalanced Classification: An Adjustment to the k Nearest Neighbor Classifier
11.10.2023   Prof. Dr. Roy Maxion
(Carnegie Mellon University, USA)
  When the Rubbish Meets the Road: A Lesson About Bad Data in Keystroke Dynamics
21.06.2023
  Prof. Dr. Kaveh Razavi
(ETH Zürich, Schweiz)
  Open Hardware Security – A New Hope
24.05.2023   Prof. Dr. Mark Yampolskiy
(Auburn University, USA)
  Additive Manufacturing Security: 10+ Reasons to be Concerned
03.05.2023   Prof. Dr. Frank Piessens
(Katholische Universität Leuven, Belgien)
  Transient execution attacks: a simple system model and a proposal for a defense
07.12.2022
  Prof. Dr. Eric Bodden
(Universität Paderborn)
  Managing the Dependency Hell – Challenges and Current Approaches to Software Composition Analysis
23.11.2022
  Samuel Groß
(Google V8 Security)
  Attacking and Defending JavaScript Engines
09.11.2022
  Prof. Dr. Olivier Bartheye
(French Air Force and Space Academy)
  The cyber-crisis management as a natural framework to address the challenge of coding decision-making autonomy in embedded systems
18.05.2022
  Prof. Dr. Somesh Jha
(University of Wisconsin Madison, USA)
  Trustworthy Machine Learning and the Security Mindset
12.02.2020
 

Prof. Steve Blackburn
(Australian National University)

  Garbage Collection – Implementation, Innovation, Performance and Security
29.01.2020   Prof. Dr. Laurence Tratt
(Kings College London, UK)
  Between the Lines – VM Assumptions
18.12.2019
  Victor van der Veen
(Qualcomm)
  System Security Research at Qualcomm Product Security
04.12.2019
  Stijn Volckaert
(Katholische Universität Leuven, Belgien)
  Making Multi-Variant Execution Practical in the Real World
30.10.2019
  Herbert Bos
(Freie Universität Amsterdam, Niederlande)
  Software and Harmware: when chip vendors pull the rug from under our feet
19.06.2019
  Ben Titzer 
(Google Munich)
  What Spectre means for language implementors
12.06.2019
  Prof. Stefan Katzenbeisser
(Universität Passau)
  Covert channels on mobile devices – gyroscopes and more
15.05.2019
  Dr. Phillip J. Windley
(Brigham Young University, USA)
  An Identity Metasystem – Sovrin Foundation
03.04.2019   Thorsten Holz
(Ruhr-Universität Bochum)
  Scalable and Efficient Fuzzing for Complex Programs
20.03.2019
  Shriram Krishnamurthi
(Brown University, USA)
  Logic in the Service of System Configurations
13.03.2019
  Lucas Davi
(Universität Duisburg-Essen)
  Sereum – Protecting existing Smart Contracts against Re-Entrancy Attacks
20.02.2019
  Mathias Payer
(EPF Lausanne, Schweiz)
  Memory Corruption: Exploit-guided Software Testing
12.02.2019
  Michael Franz
(UC Irvine, USA)
  Cyber Attacks and Defenses: Trends, Challenges, and Outlook
23.01.2019   Thomas Dullien
(Google Project Zero)
  Computer Security "Exploits" and the weird machine