csstalk

Security Assurance Cases for Road Vehicles: an Industry Perspective

How can security be assured in safety-cricial domains?

An Overview of Vehicular Security

This talk will give a first overview of research and activities trending in automotive security. We will look at future cooperative vehicle safety systems where cellular communications (i.e., 4G, 5G) and IEEE 802.11p are technologies enabling …

Decentralized Action Integrity for Trigger-Action Platforms

Securing OAuth tokens through security principles

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

Who: Catalin Hritcu from Inria Paris, France \ When: 14:00 - 15:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room ES52, Linsen (Maskingränd 2).\ Title: {{ page.title }} Abstract:\ We propose a new formal criterion for evaluating secure compartmentalization schemes for unsafe languages like C and C++, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior—for example, by accessing an array out of bounds.

Risk Analysis of Privacy Policies

Who: Raúl Pardo Jimenez from IT University of Copenhagen, Denmark \ When: 11:00 - 12:00 Friday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }}

The Simplest Multi-key Linearly Homomorphic Signature Scheme

Who: Elena Pagnin from Aarhus University, Denmark \ When: 10:00 - 11:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }} Abstract:\ We consider the problem of outsourcing computation on data authenticated by different users.

The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains

Who: Daniele Friolo from Sapienza University of Rome, Italy \ When: 15:00 - 16:00 Wednesday {{ page.date | date_to_long_string }}\ Where: Room 5128, EDIT building.\ Title: {{ page.title }} Abstract:\

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting

Who: Elena Pagnin from Aarhus University, Denmark \ When: 10:00 - 11:00 Wednesday {{ page.date | date_to_long_string }}\ Where: Room Analysen, EDIT building.\ Title: {{ page.title }} Abstract:\ As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses.

Trusted Execution Environments for Privacy-preserving Cloud Applications

Who: Pascal Felber from the University of Neuchâtel, Switzerland \ When: 11:15 - 12:30 Friday{{ page.date | date_to_long_string }}\ Where: EL42, EDIT building.\ Title: {{ page.title }} Abstract:\ In this talk, we will give an overview of popular trusted execution environments (TEEs), with special emphasis on Intel’s SGX, and we will describe how they can be exploited for implementing privacy-preserving operations in the Cloud that are both secure and efficient.

CLIO: Cryptographically Secure Information Flow Control on Key-Value Stores

Who: Pablo Buiras, PhD from Chalmers, now PostDoc at Harvard university\ When: 10:30 - 11:30 Friday{{ page.date | date_to_long_string }}\ Where: room EDIT 3364\ Title: {{ page.title }} Abstract:\ Cryptography can in principle be used to protect users' data when stored or transmitted, but in practice is error-prone and can potentially result in a violation of a user’s security concerns.