talk

Practical Data Access Minimization in Trigger-Action Platforms

Trigger-Action Platforms (TAPs) connect disparate online services and enable users to create automation rules in diverse domains such as smart homes and business productivity. Unfortunately, the current TAP design is flawed from a privacy perspective, since it has unfettered access to sensitive user data.

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

Who: Catalin Hritcu from Inria Paris, France \ When: 14:00 - 15:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room ES52, Linsen (Maskingränd 2).\ Title: {{ page.title }} Abstract:\ We propose a new formal criterion for evaluating secure compartmentalization schemes for unsafe languages like C and C++, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior—for example, by accessing an array out of bounds.

Risk Analysis of Privacy Policies

Who: Raúl Pardo Jimenez from IT University of Copenhagen, Denmark \ When: 11:00 - 12:00 Friday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }}

The Simplest Multi-key Linearly Homomorphic Signature Scheme

Who: Elena Pagnin from Aarhus University, Denmark \ When: 10:00 - 11:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }} Abstract:\ We consider the problem of outsourcing computation on data authenticated by different users.

The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains

Who: Daniele Friolo from Sapienza University of Rome, Italy \ When: 15:00 - 16:00 Wednesday {{ page.date | date_to_long_string }}\ Where: Room 5128, EDIT building.\ Title: {{ page.title }} Abstract:\

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting

Who: Elena Pagnin from Aarhus University, Denmark \ When: 10:00 - 11:00 Wednesday {{ page.date | date_to_long_string }}\ Where: Room Analysen, EDIT building.\ Title: {{ page.title }} Abstract:\ As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses.

Trusted Execution Environments for Privacy-preserving Cloud Applications

Who: Pascal Felber from the University of Neuchâtel, Switzerland \ When: 11:15 - 12:30 Friday{{ page.date | date_to_long_string }}\ Where: EL42, EDIT building.\ Title: {{ page.title }} Abstract:\ In this talk, we will give an overview of popular trusted execution environments (TEEs), with special emphasis on Intel’s SGX, and we will describe how they can be exploited for implementing privacy-preserving operations in the Cloud that are both secure and efficient.

CLIO: Cryptographically Secure Information Flow Control on Key-Value Stores

Who: Pablo Buiras, PhD from Chalmers, now PostDoc at Harvard university\ When: 10:30 - 11:30 Friday{{ page.date | date_to_long_string }}\ Where: room EDIT 3364\ Title: {{ page.title }} Abstract:\ Cryptography can in principle be used to protect users' data when stored or transmitted, but in practice is error-prone and can potentially result in a violation of a user’s security concerns.

Historical Analyses of the Client-Side Web Security and How to tell people they have an issue

Who: room EDIT 8103\ When: 9:30-10:30{{ page.date | date_to_long_string }}\ Where: room EDIT 8103 \ Title: {{ page.title }} Abstract:\ In this talk, I will present two lines of research I am currently pursuing.

Recent work on probabilistic programming languages

Who: Daniel Huang \ When: 16.00 {{ page.date | date_to_long_string }}\ Where: 5128 (Grouproom) \ Title: {{ page.title }} Abstract:\ In this talk, we will present some of our recent work on probabilistic programming languages.