Wir freuen uns, Sie zum CODE-Kolloquium begrüßen zu dürfen. In regelmäßigen Abständen laden wir in Kooperation mit ITIS e.V. hochkarätige Redner für 45-minütige Vorträge zu ausgewählten Themen der IT- und Cyber-Sicherheit an das Forschungsinstitut CODE ein. Im Anschluss an einen Vortrag folgt eine Questions- and Answers-Runde. Abgerundet wird das Kolloquium durch ein kleines Get-Together.

Regelmäßige Einladungen erhalten Sie über unseren E-Mail-Verteiler. Gern nehmen wir Sie mit auf. Bitte senden Sie uns dazu einfach eine kurze Mitteilung an

Nächste Veranstaltung


Prof. Dr. Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)

Titel des Vortrags: "Adaptor Signatures in Practice"

In blockchain transactions, a significant cost is associated with executing transactions directly on the chain. To overcome this hurdle, the exploration of off-chain solutions has become imperative. However, a critical challenge emerges regarding the fairness of these off-chain transactions. Adaptor signatures mitigate this unfortunate fairness dilemma. Adaptor signatures extend the functionality of regular signatures by computing pre-signatures. A pre-signature can be considered a verifiably encrypted signature on a message m. This means that any party receiving a pre-signature and a message m can verify that this pre-signature encrypts a valid signature on the message. Anyone with an appropriate decryption key for the pre-signature can modify the pre-signature to obtain the "regular" signature. Furthermore, any party with knowledge of a pre-signature-signature pair can extract the encryption key used to compute the pre-signature. While this mechanism seems unspectacular initially, we show how to build atomic swaps, coin-mixing protocols, and payment channels using adaptor signatures.

Dominique Schröder is a full professor and holds the chair of Applied Cryptography at the Friedrich-Alexander-Universität (FAU) Erlangen-Nürnberg, Germany. Prior to joining FAU, Dominique was a tenured professor of computer science at Saarland University and a postdoctoral fellow at the University of Maryland. Dominique has published over 60 research papers in peer-reviewed venues and journals, many in the "leading first-tier venues" of IT security and cryptography. He has received several awards for his work, including the Feodor Lynen Award from the Humboldt Foundation and the Intel Early Career Award.




Prof. Dr. Konrad Rieck (Technische Universität Berlin)

Titel des Vortrags: "When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review"

Academia is thriving like never before. Thousands of papers are submitted to conferences on hot research topics, such as artificial intelligence and computer vision. To handle this growth, systems for automatic paper-reviewer assignments are increasingly used during the reviewing process. These systems employ statistical topic models from machine learning to characterize the content of papers and automate their assignment to reviewers. In this talk, we explore the attack surface introduced by entrusting the matching of reviewers to machine-learning algorithms. In particular, we introduce an attack that modifies a given paper so that it selects its own reviewers. Technically, this attack builds on a novel optimization strategy that alternates between fooling the topic model and preserving the semantics of the document. In an empirical evaluation with a (simulated) conference, our attack successfully selects and removes reviewers, while the tampered papers remain plausible and often indistinguishable from innocuous submissions.

Konrad Rieck is a professor at TU Berlin, where he leads the Chair of Machine Learning and Security as part of the Berlin Institute for the Foundations of Learning and Data. Previously, he held academic positions at TU Braunschweig, the University of Göttingen, and Fraunhofer Institute FIRST. His research focuses on the intersection of computer security and machine learning. He has published over 100 papers in this area and serves on the PCs of the top security conferences (system security circus). He has been awarded the CAST/GI Dissertation Award, a Google Faculty Award, and an ERC Consolidator Grant.


Cascada-Gebäude, Carl-Wery-Straße 18, 81739 München (EG, rechts neben dem Eingang). Einlass ab 17:30 Uhr.

Die Teilnahme an der Veranstaltung ist kostenlos und steht grundsätzlich allen Interessierten offen. Für unsere eigene Planung bitten wir jedoch vorab um kurze Anmeldung unter

Vergangene Termine

13.12.2023 | Prof. Dr.-Ing. Gerhard Wunder, FU Berlin | On Gradient-like Explanation under a Black-box Setting: When Black-box Explanations Become as Good as White-box
22.11.2023 | Prof. Dr. Arthur Zimek, University of Southern Denmark | Fairness in Imbalanced Classification: An Adjustment to the k Nearest Neighbor Classifier
11.10.2023 | Prof. Dr. Roy Maxion, Carnegie Mellon University, USA | When the Rubbish Meets the Road: A Lesson About Bad Data in Keystroke Dynamics
21.06.2023 | Prof. Dr. Kaveh Razavi, ETH Zürich | Open Hardware Security – A New Hope
24.05.2023 | Prof. Dr. Mark Yampolskiy, Auburn University, USA | Additive Manufacturing Security: 10+ Reasons to be Concerned
03.05.2023 | Prof. Dr. Frank Piessens, KU Leuven, Belgien | Transient execution attacks: a simple system model and a proposal for a defense
07.12.2022 | Prof. Dr. Eric Bodden, Universität Paderborn | Managing the Dependency Hell – Challenges and Current Approaches to Software Composition Analysis
23.11.2022 | Samuel Groß, Google V8 Security | Attacking and Defending JavaScript Engines
09.11.2022 | Prof. Dr. Olivier Bartheye, French Air Force and Space Academy | The cyber-crisis management as a natural framework to address the challenge of coding decision-making autonomy in embedded systems
18.05.2022 | Prof. Dr. Somesh Jha, University of Wisconsin Madison, USA | Trustworthy Machine Learning and the Security Mindset
12.02.2020 | Prof. Steve Blackburn, Australian National University | Garbage Collection – Implementation, Innovation, Performance and Security
29.01.2020 | Prof. Dr. Laurence Tratt, Kings College London | Between the Lines – VM Assumptions
18.12.2019 | Victor van der Veen | Qualcomm, System Security Research at Qualcomm Product Security
04.12.2019 | Stijn Volckaert, Katholische Universität Leuven | Making Multi-Variant Execution Practical in the Real World
30.10.2019 | Herbert Bos, Freie Universität Amsterdam | Software and Harmware: when chip vendors pull the rug from under our feet
19.06.2019 | Ben Titzer, Google Munich | What Spectre means for language implementors
12.06.2019 | Prof. Stefan Katzenbeisser, Universität Passau | Covert channels on mobile devices – gyroscopes and more
15.05.2019 | Dr. Phillip J. Windley, Brigham Young University | An Identity Metasystem – Sovrin Foundation
03.04.2019 | Thorsten Holz, Ruhr-Universität Bochum | Scalable and Efficient Fuzzing for Complex Programs
20.03.2019 | Shriram Krishnamurthi, Brown University | Logic in the Service of System Configurations
13.03.2019 | Lucas Davi, Uni Duisburg-Essen | Sereum – Protecting existing Smart Contracts against Re-Entrancy Attacks
20.02.2019 | Mathias Payer, EPF Lausanne | Memory Corruption: Exploit-guided Software Testing
12.02.2019 | Michael Franz, UC Irvine | Cyber Attacks and Defenses: Trends, Challenges, and Outlook
23.01.2019 | Thomas Dullien, (aka halvarflake) von Google Project Zero | Computer Security "Exploits" and the weird machine