talk

Privacy and security threat modeling: current research directions

Who: Riccardo Scandariato \ When: 11h00 - 11h30 {{ page.date | date_to_long_string }}\ Where: Lindholmen, Jupiter building, 4th floor, room 473\ Title: {{ page.title }} Abstract:\ Threat analysis is the cornerstone of security-by-design and privacy-by-design approaches for building more secure and privacy-friendly software systems.

Security and Privacy on Medical Devices

Who: Pablo Picazo\ When: Friday, {{ page.date | date_to_long_string }}\ Where: room 5128\ Title: {{ page.title }} Abstract:\ The new generation of Implantable Medical Devices (IMDs) is a reality but the security threats mainly linked to the inclusion of wireless connectivity seem to have not received the adequate attention.

ZKBoo: Faster Zero-Knowledge for Boolean Circuits

Who: Fname Lname\ When: Thursday, {{ page.date | date_to_long_string }}, 14:00-15:00\ Where: Room 3364\ Title: {{ page.title }} Abstract:\ In this talk we describe ZKBoo, a proposal for practically efficient zero-knowledge arguments especially tailored for Boolean circuits and report on a proof-of-concept implementation.

Enhancing the COWL W3C Standard

Who: Niklas Andreasson\ When: 10:00, June 8 \ Where: room EDIT 8103\ Title: {{ page.title }} Abstract:\ Web applications are often composed by resources such as JavaScript written, and provided, by different parties.

Selene: Voting with Transparent Verification and Coercion Mitigation

Who: Peter Y A Ryan (University of Luxembourg)\ When: 14:30, June 8 \ Where: room EDIT 81033\ Title: {{ page.title }} Abstract:\ In conventional cryptographic E2E verification schemes, voters are provided with encrypted ballots that enable them to confirm that their vote is accurately included in the tally.

Verification of differential private computationss

Who: Gilles Barthe (IMDEA)\ When: 13:30, May 31 \ Where: room EDIT 8103\ Title: {{ page.title }} Abstract:\ Differential privacy is a statistical notion of privacy which achieves compelling trade-offs between input privacy and accuracy (of outputs).

Privacy engineering: from the building blocks to the system

Who: Thibaud Antignac\ When: 11:00 am, April 29\ Where: EDIT 8103\ Title: {{ page.title }} Abstract:\ This talk will be about privacy engineering, a field mainly concerned with techniques, methods, and tools to systematically take into account and address privacy issues when building a system.

Architectural requirements for language-level control of external timing channels

Who: Aslan Askarov (Aarhus University)\ When: 14:15, April 27\ Where: room ED\ Title: {{ page.title }} Abstract:\ A promising new approach to controlling timing channels relies on distinguishing between the direct timing dependencies that are visible at the program control flow level, and the indirect timing dependencies that typically have architectural nature.

Frozen Realms: draft standard support for safer JavaScript plugins

Who: Mark S. Miller (Google)\ When: 10:00, May 27 \ Where: room EDIT 3364\ Title: {{ page.title }} Abstract:\ Support ultra-fine-grain protection domains in JavaScript. Minimizing standardization, development, explanation, and runtime costs.

Security of login pages on the Web: who else can know your password?

Who: Steven Van Acker (Chalmers)\ When: 14:15, May 11 \ Where: room ED\ Title: {{ page.title }} Abstract:\ Most people with an online presence these days, store large amounts of information about their lives in online web services: e-mails, pictures, medical information, … To prevent unauthorised access to their personal and private information, these web services require users to authenticate and this authentication is typically done using a username and password, transmitted for verification via a login page.