This talk will give a first overview of research and activities trending in automotive security. We will look at future cooperative vehicle safety systems where cellular communications (i.e., 4G, 5G) and IEEE 802.11p are technologies enabling …
Who: Catalin Hritcu from Inria Paris, France \
When: 14:00 - 15:00 Thursday {{ page.date | date_to_long_string }}\
Where: Room ES52, Linsen (Maskingränd 2).\
Title: {{ page.title }}
Abstract:\
We propose a new formal criterion for evaluating secure compartmentalization schemes for unsafe languages like C and C++, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior—for example, by accessing an array out of bounds.
Who: Elena Pagnin from Aarhus University, Denmark \
When: 10:00 - 11:00 Thursday {{ page.date | date_to_long_string }}\
Where: Room 8103, EDIT building.\
Title: {{ page.title }}
Abstract:\
We consider the problem of outsourcing computation on data authenticated by different users.
Who: Elena Pagnin from Aarhus University, Denmark \
When: 10:00 - 11:00 Wednesday {{ page.date | date_to_long_string }}\
Where: Room Analysen, EDIT building.\
Title: {{ page.title }}
Abstract:\
As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses.
Who: Pascal Felber from the University of Neuchâtel, Switzerland \
When: 11:15 - 12:30 Friday{{ page.date | date_to_long_string }}\
Where: EL42, EDIT building.\
Title: {{ page.title }}
Abstract:\
In this talk, we will give an overview of popular trusted execution environments (TEEs), with special emphasis on Intel’s SGX, and we will describe how they can be exploited for implementing privacy-preserving operations in the Cloud that are both secure and efficient.
Who: Pablo Buiras, PhD from Chalmers, now PostDoc at Harvard university\
When: 10:30 - 11:30 Friday{{ page.date | date_to_long_string }}\
Where: room EDIT 3364\
Title: {{ page.title }}
Abstract:\
Cryptography can in principle be used to protect users' data when stored or transmitted, but in practice is error-prone and can potentially result in a violation of a user’s security concerns.