Seminars

Past Seminars

28 Feb 2024Ioana Boureanu FM-SEC
Attacking the Buyers and the Sellers: A Tale of Offline Readers and Payees’ Authentication
Read more...
31 Jan 2024Alessandro Bruni
Certifying Statistical Robustness in Coq
Read more...
15 Nov 2023Massimo Merro FM-SEC
Formal methodologies to secure cyber-physical systems: from static analysis to runtime enforcement
Read more...
25 Oct 2023Sylvain Ruhault FM-SEC
A Unified Symbolic Analysis of WireGuard
Read more...
28 Jun 2023Muhammad Usama Sardar FM-SEC
Comprehensive Specification and Formal Analysis of Attestation Mechanisms in Confidential Computing
Read more...
24 Apr 2023Fulvio Valenza FM-SEC
Formal and Automatic Network Security Configuration
Read more...
12 Apr 2023Nataliia Bielova
Protecting Privacy of Web users: technical and legal perspectives
Read more...
22 Mar 2023François Dupressoir FM-SEC
EasyCrypt in anger — Proofs for Primitives, Constructions and Protocols
Read more...
18 Jan 2023Jam Ramanujam FM-SEC
Insecurity, going from terms to formulas
Read more...
11 Jan 2023Tom Chothia
Blackbox and Grey-box Approaches to Protocol State Machine Learning (With Lots of Attacks Against TLS and WPA)
Read more...
30 Nov 2022Alexandre Debant FM-SEC
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
Read more...
19 Oct 2022Pascal Lafourcade
(In)Security of e-exams
Read more...
21 Sep 2022Steve Kremer FM-SEC
Symbolic protocol verification with dice: process equivalences in the presence of probabilities
Read more...
20 Jul 2022Charlie Jacomme
Not so AdHoc testing: formal methods in the standardization of the EDHOC protocol
Read more...
29 Jun 2022Vincent Cheval
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif.
Read more...
25 May 2022Sasa Radomirovic
Managing our online account security
Read more...
18 May 2022Bruno Blanchet FM-SEC
The security protocol verifier ProVerif and its improvements
Read more...
11 May 2022Kenny Patterson FM-SEC
Probabilistic Data Structures in Adversarial Environments
Read more...
13 Apr 2022Musard Balliu FM-SEC
Securing Cloud-based IoT Apps
Read more...
6 Apr 2022Qiang Tang
Dumbo Protocol Family: Making Asynchronous Consensus Real
Read more...
30 Mar 2022Florian Kerschbaum
Security and Privacy in Data Science
Read more...
23 Mar 2022Ben Stock
Failing Content Security Policy? Learning from its past to improve its future
Read more...
16 Mar 2022Nicolas Papernot
Is Differential Privacy a Silver Bullet for Machine Learning?
Read more...
9 Mar 2022Ben Zhao
Evolving Perspectives on Adversarial Robustness for Deep Neural Networks
Read more...
2 Mar 2022Elissa M. Redmiles
Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps
Read more...
23 Feb 2022Bo Li
Trustworthy Machine Learning: Robustness, Privacy, Generalization, and their Interconnections
Read more...
16 Feb 2022Nick Nikiforakis
Small and Different: Security and Privacy Risks of Mobile Browsers
Read more...
9 Feb 2022Yuzhe Tang
Understanding and Hardening Blockchain Systems Security under DoS Attacks
Read more...
2 Feb 2022Omar Haider Chowdhury
Towards a High-Assurance and Specification-Compliant X.509 PKI Implementation
Read more...
26 Jan 2022Luca De Feo
On the (in)security of ElGamal in OpenPGP
Read more...
15 Dec 2021Robert Buhren
One Glitch to Rule them All: Fault Injection Attacks against AMD's Secure Encrypted Virtualization
Read more...
8 Dec 2021Ioana Boureanu
Practical and Formal Analysis Security of Contactless Mobile Payments
Read more...
1 Dec 2021Ana Salagean
Estimating the nonlinearity of cryptographic Boolean functions
Read more...
24 Nov 2021Adam Morrison
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
Read more...
17 Nov 2021Herbert Bos
Attacks on Hardware: How to Ruin Your Life
Read more...
10 Nov 2021Basel Halak
Physically Unclonable Functions: Design Principles, Applications and Outstanding Challenges
Read more...
3 Nov 2021Hoang Nga Nguyen
A Real-time Automotive Testbed for Developing and Validating Security Solutions
Read more...
27 Oct 2021Florian Schaub
Human-centric Privacy Design and Engineering
Read more...
20 Oct 2021Aydin Abadi
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Read more...
13 Oct 2021Roei Schuster
Resilient Machine Learning: A Systems-Security Perspective
Read more...
6 Oct 2021George Theodorakopoulos
Quantifying Location Privacy [Test of Time Award IEEE S&P 21]
Read more...
29 Sep 2021Feng Hao
An Overview of Password-authenticated Key Exchange Protocols
Read more...
22 Sep 2021Nicholas Carlini
An Unreliable Foundation: Security & Privacy of Large Scale Machine Learning
Read more...
15 Sep 2021Grigorios Loukides
Combinatorial String Dissemination
Read more...
8 Sep 2021Dmitry Kogan
Private Blocklist Lookups with Checklist
Read more...
25 Aug 2021Joseph Hallett
“Do This! Do That! And nothing will happen”: Do specifications lead to securely stored passwords? (ICSE ’21)
Read more...
18 Aug 2021Rikke Bjerg Jensen
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong [USENIX Security'21]
Read more...
11 Aug 2021Yves-Alexandre de Montjoye
Using Data while Protecting Privacy in the Digital Era
Read more...
4 Aug 2021Jason Nurse
A Framework for Effective Corporate Communication after Cybersecurity Incidents
Read more...
28 Jul 2021Roberto Guanciale
InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
Read more...
21 Jul 2021XiaoFeng Wang
Confidential Computing: Challenges Today & Opportunities Tomorrow
Read more...
21 Jul 2021Zhiyun Qian
Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning
Read more...
14 Jul 2021Ian Thornton-Trump
The Eight Principles of Security Leadership: An insider’s view of SolarWinds & Supply Chain Failure
Read more...
7 Jul 2021Jorge Blasco
Information-Flow Analysis for Mobile and Wearable Device Security and Privacy
Read more...
23 Jun 2021Arthur Gervais
High-Frequency Trading on Decentralized On-Chain Exchanges
Read more...
21 Jun 2021Changyu Dong
How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free [Usenix Security ’21]
Read more...
16 Jun 2021Kovila Coopamootoo
Usage Patterns of Privacy-Enhancing Technologies [CCS ’20]
Read more...
2 Jun 2021Peter Ryan
Trust and Trustworthiness of Voting Systems
Read more...
26 May 2021Vesselin Velichkov
Recent Developments in Lightweight Cryptography: Alzette and SPARKLE
Read more...