Seminars
Past Seminars
28 Feb 2024 | Ioana Boureanu
FM-SEC Attacking the Buyers and the Sellers: A Tale of Offline Readers and Payees’ Authentication | Read more... |
31 Jan 2024 | Alessandro Bruni Certifying Statistical Robustness in Coq | Read more... |
15 Nov 2023 | Massimo Merro
FM-SEC Formal methodologies to secure cyber-physical systems: from static analysis to runtime enforcement | Read more... |
25 Oct 2023 | Sylvain Ruhault
FM-SEC A Unified Symbolic Analysis of WireGuard | Read more... |
28 Jun 2023 | Muhammad Usama Sardar
FM-SEC Comprehensive Specification and Formal Analysis of Attestation Mechanisms in Confidential Computing | Read more... |
24 Apr 2023 | Fulvio Valenza
FM-SEC Formal and Automatic Network Security Configuration | Read more... |
12 Apr 2023 | Nataliia Bielova Protecting Privacy of Web users: technical and legal perspectives | Read more... |
22 Mar 2023 | François Dupressoir
FM-SEC EasyCrypt in anger — Proofs for Primitives, Constructions and Protocols | Read more... |
18 Jan 2023 | Jam Ramanujam
FM-SEC Insecurity, going from terms to formulas | Read more... |
11 Jan 2023 | Tom Chothia Blackbox and Grey-box Approaches to Protocol State Machine Learning (With Lots of Attacks Against TLS and WPA) | Read more... |
30 Nov 2022 | Alexandre Debant
FM-SEC Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol | Read more... |
19 Oct 2022 | Pascal Lafourcade (In)Security of e-exams | Read more... |
21 Sep 2022 | Steve Kremer
FM-SEC Symbolic protocol verification with dice: process equivalences in the presence of probabilities | Read more... |
20 Jul 2022 | Charlie Jacomme Not so AdHoc testing: formal methods in the standardization of the EDHOC protocol | Read more... |
29 Jun 2022 | Vincent Cheval A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. | Read more... |
25 May 2022 | Sasa Radomirovic Managing our online account security | Read more... |
18 May 2022 | Bruno Blanchet
FM-SEC The security protocol verifier ProVerif and its improvements | Read more... |
11 May 2022 | Kenny Patterson
FM-SEC Probabilistic Data Structures in Adversarial Environments | Read more... |
13 Apr 2022 | Musard Balliu
FM-SEC Securing Cloud-based IoT Apps | Read more... |
6 Apr 2022 | Qiang Tang Dumbo Protocol Family: Making Asynchronous Consensus Real | Read more... |
30 Mar 2022 | Florian Kerschbaum Security and Privacy in Data Science | Read more... |
23 Mar 2022 | Ben Stock Failing Content Security Policy? Learning from its past to improve its future | Read more... |
16 Mar 2022 | Nicolas Papernot Is Differential Privacy a Silver Bullet for Machine Learning? | Read more... |
9 Mar 2022 | Ben Zhao Evolving Perspectives on Adversarial Robustness for Deep Neural Networks | Read more... |
2 Mar 2022 | Elissa M. Redmiles Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps | Read more... |
23 Feb 2022 | Bo Li Trustworthy Machine Learning: Robustness, Privacy, Generalization, and their Interconnections | Read more... |
16 Feb 2022 | Nick Nikiforakis Small and Different: Security and Privacy Risks of Mobile Browsers | Read more... |
9 Feb 2022 | Yuzhe Tang Understanding and Hardening Blockchain Systems Security under DoS Attacks | Read more... |
2 Feb 2022 | Omar Haider Chowdhury Towards a High-Assurance and Specification-Compliant X.509 PKI Implementation | Read more... |
26 Jan 2022 | Luca De Feo On the (in)security of ElGamal in OpenPGP | Read more... |
15 Dec 2021 | Robert Buhren One Glitch to Rule them All: Fault Injection Attacks against AMD's Secure Encrypted Virtualization | Read more... |
8 Dec 2021 | Ioana Boureanu Practical and Formal Analysis Security of Contactless Mobile Payments | Read more... |
1 Dec 2021 | Ana Salagean Estimating the nonlinearity of cryptographic Boolean functions | Read more... |
24 Nov 2021 | Adam Morrison An Analysis of Speculative Type Confusion Vulnerabilities in the Wild | Read more... |
17 Nov 2021 | Herbert Bos Attacks on Hardware: How to Ruin Your Life | Read more... |
10 Nov 2021 | Basel Halak Physically Unclonable Functions: Design Principles, Applications and Outstanding Challenges | Read more... |
3 Nov 2021 | Hoang Nga Nguyen A Real-time Automotive Testbed for Developing and Validating Security Solutions | Read more... |
27 Oct 2021 | Florian Schaub Human-centric Privacy Design and Engineering | Read more... |
20 Oct 2021 | Aydin Abadi Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited | Read more... |
13 Oct 2021 | Roei Schuster Resilient Machine Learning: A Systems-Security Perspective | Read more... |
6 Oct 2021 | George Theodorakopoulos Quantifying Location Privacy [Test of Time Award IEEE S&P 21] | Read more... |
29 Sep 2021 | Feng Hao An Overview of Password-authenticated Key Exchange Protocols | Read more... |
22 Sep 2021 | Nicholas Carlini An Unreliable Foundation: Security & Privacy of Large Scale Machine Learning | Read more... |
15 Sep 2021 | Grigorios Loukides Combinatorial String Dissemination | Read more... |
8 Sep 2021 | Dmitry Kogan Private Blocklist Lookups with Checklist | Read more... |
25 Aug 2021 | Joseph Hallett “Do This! Do That! And nothing will happen”: Do specifications lead to securely stored passwords? (ICSE ’21) | Read more... |
18 Aug 2021 | Rikke Bjerg Jensen Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong [USENIX Security'21] | Read more... |
11 Aug 2021 | Yves-Alexandre de Montjoye Using Data while Protecting Privacy in the Digital Era | Read more... |
4 Aug 2021 | Jason Nurse A Framework for Effective Corporate Communication after Cybersecurity Incidents | Read more... |
28 Jul 2021 | Roberto Guanciale InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis | Read more... |
21 Jul 2021 | XiaoFeng Wang Confidential Computing: Challenges Today & Opportunities Tomorrow | Read more... |
21 Jul 2021 | Zhiyun Qian Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning | Read more... |
14 Jul 2021 | Ian Thornton-Trump The Eight Principles of Security Leadership: An insider’s view of SolarWinds & Supply Chain Failure | Read more... |
7 Jul 2021 | Jorge Blasco Information-Flow Analysis for Mobile and Wearable Device Security and Privacy | Read more... |
23 Jun 2021 | Arthur Gervais High-Frequency Trading on Decentralized On-Chain Exchanges | Read more... |
21 Jun 2021 | Changyu Dong How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free [Usenix Security ’21] | Read more... |
16 Jun 2021 | Kovila Coopamootoo Usage Patterns of Privacy-Enhancing Technologies [CCS ’20] | Read more... |
2 Jun 2021 | Peter Ryan Trust and Trustworthiness of Voting Systems | Read more... |
26 May 2021 | Vesselin Velichkov Recent Developments in Lightweight Cryptography: Alzette and SPARKLE | Read more... |