csstalk

Selene: Voting with Transparent Verification and Coercion Mitigation

Who: Peter Y A Ryan (University of Luxembourg)\ When: 14:30, June 8 \ Where: room EDIT 81033\ Title: {{ page.title }} Abstract:\ In conventional cryptographic E2E verification schemes, voters are provided with encrypted ballots that enable them to confirm that their vote is accurately included in the tally.

Verification of differential private computationss

Who: Gilles Barthe (IMDEA)\ When: 13:30, May 31 \ Where: room EDIT 8103\ Title: {{ page.title }} Abstract:\ Differential privacy is a statistical notion of privacy which achieves compelling trade-offs between input privacy and accuracy (of outputs).

Privacy engineering: from the building blocks to the system

Who: Thibaud Antignac\ When: 11:00 am, April 29\ Where: EDIT 8103\ Title: {{ page.title }} Abstract:\ This talk will be about privacy engineering, a field mainly concerned with techniques, methods, and tools to systematically take into account and address privacy issues when building a system.

Architectural requirements for language-level control of external timing channels

Who: Aslan Askarov (Aarhus University)\ When: 14:15, April 27\ Where: room ED\ Title: {{ page.title }} Abstract:\ A promising new approach to controlling timing channels relies on distinguishing between the direct timing dependencies that are visible at the program control flow level, and the indirect timing dependencies that typically have architectural nature.

Frozen Realms: draft standard support for safer JavaScript plugins

Who: Mark S. Miller (Google)\ When: 10:00, May 27 \ Where: room EDIT 3364\ Title: {{ page.title }} Abstract:\ Support ultra-fine-grain protection domains in JavaScript. Minimizing standardization, development, explanation, and runtime costs.

Security of login pages on the Web: who else can know your password?

Who: Steven Van Acker (Chalmers)\ When: 14:15, May 11 \ Where: room ED\ Title: {{ page.title }} Abstract:\ Most people with an online presence these days, store large amounts of information about their lives in online web services: e-mails, pictures, medical information, … To prevent unauthorised access to their personal and private information, these web services require users to authenticate and this authentication is typically done using a username and password, transmitted for verification via a login page.

Program behavior-based fuzzing and vulnerability discovery

Who: Gustavo Grieco (CIFASIS - CONICET and VERIMAG) When: 11:00, May 6 in Where: room EDIT 8103 Title: {{ page.title }} Abstract:\ Mutational fuzzing is a powerful tool to detect vulnerabilities in software.

Two Can Keep a Secret, If One of Them Uses Haskell

Who: Alejandro Russo When: 11:00 am on April 15 Where: Room 3364\ Title: {{ page.title }} Abstract:\ For several decades, researchers from different communities have independently focused on protecting confidentiality of data.

Recent Breakthroughs in Obfuscation

Who: Elena Pagnin When: Friday April 1, 11:00 Where: Room 8103 Title: {{ page.title }} Abstract: This talk is supposed to give an overview of the state of the art in the area of Homomorphic Encryption (HE) and Multi-Linear Maps (MLM).

Formal Security Analysis of Mobile and Web Applications

Who: Matteo Maffei\ When: Thursday, {{ page.date | date_to_long_string }}, 13:30-14:30\ Where: Room 3364\ Title: {{ page.title }} Abstract:\ In this talk, I will present two ongoing projects on the formal verification of security properties for mobile and web applications.