Who: Pablo Picazo\
When: Friday, {{ page.date | date_to_long_string }}\
Where: room 5128\
Title: {{ page.title }}
Abstract:\
The new generation of Implantable Medical Devices (IMDs) is a reality but the security threats mainly linked to the inclusion of wireless connectivity seem to have not received the adequate attention.
Who: Fname Lname\
When: Thursday, {{ page.date | date_to_long_string }}, 14:00-15:00\
Where: Room 3364\
Title: {{ page.title }}
Abstract:\
In this talk we describe ZKBoo, a proposal for practically efficient zero-knowledge arguments especially tailored for Boolean circuits and report on a proof-of-concept implementation.
Who: Niklas Andreasson\
When: 10:00, June 8 \
Where: room EDIT 8103\
Title: {{ page.title }}
Abstract:\
Web applications are often composed by resources such as JavaScript written, and provided, by different parties.
Who: Peter Y A Ryan (University of Luxembourg)\
When: 14:30, June 8 \
Where: room EDIT 81033\
Title: {{ page.title }}
Abstract:\
In conventional cryptographic E2E verification schemes, voters are provided with encrypted ballots that enable them to confirm that their vote is accurately included in the tally.
Who: Thibaud Antignac\
When: 11:00 am, April 29\
Where: EDIT 8103\
Title: {{ page.title }}
Abstract:\
This talk will be about privacy engineering, a field mainly concerned with techniques, methods, and tools to systematically take into account and address privacy issues when building a system.
Who: Aslan Askarov (Aarhus University)\
When: 14:15, April 27\
Where: room ED\
Title: {{ page.title }}
Abstract:\
A promising new approach to controlling timing channels relies on distinguishing between the direct timing dependencies that are visible at the program control flow level, and the indirect timing dependencies that typically have architectural nature.
Who: Mark S. Miller (Google)\
When: 10:00, May 27 \
Where: room EDIT 3364\
Title: {{ page.title }}
Abstract:\
Support ultra-fine-grain protection domains in JavaScript. Minimizing standardization, development, explanation, and runtime costs.
Who: Steven Van Acker (Chalmers)\
When: 14:15, May 11 \
Where: room ED\
Title: {{ page.title }}
Abstract:\
Most people with an online presence these days, store large amounts of information about their lives in online web services: e-mails, pictures, medical information, … To prevent unauthorised access to their personal and private information, these web services require users to authenticate and this authentication is typically done using a username and password, transmitted for verification via a login page.