Seminars
Scheduled Seminars
| 11 Dec 2025 | Berry Schoenmakers
CRANE Multiparty Computation for Privacy Preserving Computing? | Zoom link Read more... |
Past Seminars
| 20 Nov 2025 | David Oswald How confidential is confidential computing? | Read more... |
| 12 Nov 2025 | CRANE
CRANE Cybersecurity challenges in the era of AI | Read more... |
| 8 Oct 2025 | Sam Collins Anti-cheat is a gold mine of interesting, novel defences-battle-hardened from years of attrition in a defender's worst nightmare. It's time we start digging [BlackHat 2025] | Read more... |
| 10 Sep 2025 | Andrea Saracino Trustworthy AI - Managing Privacy and Explainability in Collaborative Data Analysis | Read more... |
| 2 Jul 2025 | Charles Olivier-Anclin Who Pays Whom? Anonymous EMV-Compliant Contactless Payments | Read more... |
| 11 Jun 2025 | Tom Chothia Formal Analysis of the I-ETMS Train Control Systems Safety Cases | Read more... |
| 28 Feb 2024 | Ioana Boureanu
FM-SEC Attacking the Buyers and the Sellers: A Tale of Offline Readers and Payees’ Authentication | Read more... |
| 31 Jan 2024 | Alessandro Bruni Certifying Statistical Robustness in Coq | Read more... |
| 15 Nov 2023 | Massimo Merro
FM-SEC Formal methodologies to secure cyber-physical systems: from static analysis to runtime enforcement | Read more... |
| 25 Oct 2023 | Sylvain Ruhault
FM-SEC A Unified Symbolic Analysis of WireGuard | Read more... |
| 28 Jun 2023 | Muhammad Usama Sardar
FM-SEC Comprehensive Specification and Formal Analysis of Attestation Mechanisms in Confidential Computing | Read more... |
| 24 Apr 2023 | Fulvio Valenza
FM-SEC Formal and Automatic Network Security Configuration | Read more... |
| 12 Apr 2023 | Nataliia Bielova Protecting Privacy of Web users: technical and legal perspectives | Read more... |
| 22 Mar 2023 | François Dupressoir
FM-SEC EasyCrypt in anger — Proofs for Primitives, Constructions and Protocols | Read more... |
| 18 Jan 2023 | Jam Ramanujam
FM-SEC Insecurity, going from terms to formulas | Read more... |
| 11 Jan 2023 | Tom Chothia Blackbox and Grey-box Approaches to Protocol State Machine Learning (With Lots of Attacks Against TLS and WPA) | Read more... |
| 30 Nov 2022 | Alexandre Debant
FM-SEC Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol | Read more... |
| 19 Oct 2022 | Pascal Lafourcade (In)Security of e-exams | Read more... |
| 21 Sep 2022 | Steve Kremer
FM-SEC Symbolic protocol verification with dice: process equivalences in the presence of probabilities | Read more... |
| 20 Jul 2022 | Charlie Jacomme Not so AdHoc testing: formal methods in the standardization of the EDHOC protocol | Read more... |
| 29 Jun 2022 | Vincent Cheval A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. | Read more... |
| 25 May 2022 | Sasa Radomirovic Managing our online account security | Read more... |
| 18 May 2022 | Bruno Blanchet
FM-SEC The security protocol verifier ProVerif and its improvements | Read more... |
| 11 May 2022 | Kenny Patterson
FM-SEC Probabilistic Data Structures in Adversarial Environments | Read more... |
| 13 Apr 2022 | Musard Balliu
FM-SEC Securing Cloud-based IoT Apps | Read more... |
| 6 Apr 2022 | Qiang Tang Dumbo Protocol Family: Making Asynchronous Consensus Real | Read more... |
| 30 Mar 2022 | Florian Kerschbaum Security and Privacy in Data Science | Read more... |
| 23 Mar 2022 | Ben Stock Failing Content Security Policy? Learning from its past to improve its future | Read more... |
| 16 Mar 2022 | Nicolas Papernot Is Differential Privacy a Silver Bullet for Machine Learning? | Read more... |
| 9 Mar 2022 | Ben Zhao Evolving Perspectives on Adversarial Robustness for Deep Neural Networks | Read more... |
| 2 Mar 2022 | Elissa M. Redmiles Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps | Read more... |
| 23 Feb 2022 | Bo Li Trustworthy Machine Learning: Robustness, Privacy, Generalization, and their Interconnections | Read more... |
| 16 Feb 2022 | Nick Nikiforakis Small and Different: Security and Privacy Risks of Mobile Browsers | Read more... |
| 9 Feb 2022 | Yuzhe Tang Understanding and Hardening Blockchain Systems Security under DoS Attacks | Read more... |
| 2 Feb 2022 | Omar Haider Chowdhury Towards a High-Assurance and Specification-Compliant X.509 PKI Implementation | Read more... |
| 26 Jan 2022 | Luca De Feo On the (in)security of ElGamal in OpenPGP | Read more... |
| 15 Dec 2021 | Robert Buhren One Glitch to Rule them All: Fault Injection Attacks against AMD's Secure Encrypted Virtualization | Read more... |
| 8 Dec 2021 | Ioana Boureanu Practical and Formal Analysis Security of Contactless Mobile Payments | Read more... |
| 1 Dec 2021 | Ana Salagean Estimating the nonlinearity of cryptographic Boolean functions | Read more... |
| 24 Nov 2021 | Adam Morrison An Analysis of Speculative Type Confusion Vulnerabilities in the Wild | Read more... |
| 17 Nov 2021 | Herbert Bos Attacks on Hardware: How to Ruin Your Life | Read more... |
| 10 Nov 2021 | Basel Halak Physically Unclonable Functions: Design Principles, Applications and Outstanding Challenges | Read more... |
| 3 Nov 2021 | Hoang Nga Nguyen A Real-time Automotive Testbed for Developing and Validating Security Solutions | Read more... |
| 27 Oct 2021 | Florian Schaub Human-centric Privacy Design and Engineering | Read more... |
| 20 Oct 2021 | Aydin Abadi Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited | Read more... |
| 13 Oct 2021 | Roei Schuster Resilient Machine Learning: A Systems-Security Perspective | Read more... |
| 6 Oct 2021 | George Theodorakopoulos Quantifying Location Privacy [Test of Time Award IEEE S&P 21] | Read more... |
| 29 Sep 2021 | Feng Hao An Overview of Password-authenticated Key Exchange Protocols | Read more... |
| 22 Sep 2021 | Nicholas Carlini An Unreliable Foundation: Security & Privacy of Large Scale Machine Learning | Read more... |
| 15 Sep 2021 | Grigorios Loukides Combinatorial String Dissemination | Read more... |
| 8 Sep 2021 | Dmitry Kogan Private Blocklist Lookups with Checklist | Read more... |
| 25 Aug 2021 | Joseph Hallett “Do This! Do That! And nothing will happen”: Do specifications lead to securely stored passwords? (ICSE ’21) | Read more... |
| 18 Aug 2021 | Rikke Bjerg Jensen Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong [USENIX Security'21] | Read more... |
| 11 Aug 2021 | Yves-Alexandre de Montjoye Using Data while Protecting Privacy in the Digital Era | Read more... |
| 4 Aug 2021 | Jason Nurse A Framework for Effective Corporate Communication after Cybersecurity Incidents | Read more... |
| 28 Jul 2021 | Roberto Guanciale InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis | Read more... |
| 21 Jul 2021 | XiaoFeng Wang Confidential Computing: Challenges Today & Opportunities Tomorrow | Read more... |
| 21 Jul 2021 | Zhiyun Qian Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning | Read more... |
| 14 Jul 2021 | Ian Thornton-Trump The Eight Principles of Security Leadership: An insider’s view of SolarWinds & Supply Chain Failure | Read more... |
| 7 Jul 2021 | Jorge Blasco Information-Flow Analysis for Mobile and Wearable Device Security and Privacy | Read more... |
| 23 Jun 2021 | Arthur Gervais High-Frequency Trading on Decentralized On-Chain Exchanges | Read more... |
| 21 Jun 2021 | Changyu Dong How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free [Usenix Security ’21] | Read more... |
| 16 Jun 2021 | Kovila Coopamootoo Usage Patterns of Privacy-Enhancing Technologies [CCS ’20] | Read more... |
| 2 Jun 2021 | Peter Ryan Trust and Trustworthiness of Voting Systems | Read more... |
| 26 May 2021 | Vesselin Velichkov Recent Developments in Lightweight Cryptography: Alzette and SPARKLE | Read more... |