Seminar Topics

Digital Currencies

  • Bitcoin Battle: Burning Bitcoin for Geopolitical Fun and Profit (Paper)
  • Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability (Paper)
  • Majority is not enough: bitcoin mining is vulnerable (Paper)
  • Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic (Paper)
  • Eclipse Attacks on Bitcoin’s Peer-to-Peer Network (Paper)
  • Tracing Transactions Across Cryptocurrency Ledgers (Paper)

Hardware Security

  • Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper

Wireless Communications

  • All cops are broadcasting: TETRA under scrutiny (Paper)
    2 COPS 2 BROADCASTING (Webpage , Slides (PDF) , Heise Artikel)
  • A Reassessment on Friendly Jamming Efficiency (Paper)
  • Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks (Paper)
  • UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
  • Zigator: analyzing the security of zigbee-enabled smart homes (Paper

Biometric Security and Authentication

  • Person Re-identification in 3D Space: A WiFi Vision-based Approach (Paper

Cryptography

  • Functional Encryption with Bounded Collusions via Multi-party Computation (Paper)
  • Efficient Pattern Mining Based Cryptanalysis for Privacy-Preserving Record Linkage (Paper)
    and
    Automated Cryptanalysis of Bloom Filter Encryptions of Health Records (Paper)
  • A Graph Matching Attack on Privacy-Preserving Record Linkage (Paper)