Seminar Topics

Digital Currencies

  • Bitcoin Battle: Burning Bitcoin for Geopolitical Fun and Profit (Paper)
  • Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability (Paper)
  • Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic (Paper)
  • How to Beat Nakamoto in the Race (Paper)
  • Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining (Paper)

Hardware Security

  • Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper

Wireless Communications

  • A Reassessment on Friendly Jamming Efficiency (Paper)
  • Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks (Paper)
  • UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
  • Zigator: analyzing the security of zigbee-enabled smart homes (Paper

Cryptography

  • Functional Encryption with Bounded Collusions via Multi-party Computation (Paper)
  • Efficient Pattern Mining Based Cryptanalysis for Privacy-Preserving Record Linkage (Paper)
    and
    Automated Cryptanalysis of Bloom Filter Encryptions of Health Records (Paper)
  • A Graph Matching Attack on Privacy-Preserving Record Linkage (Paper)
  • A Framework for Designing Provably Secure Steganography (Paper)

Privacy Leakage

  • Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels and an explanation of invisible pixels (Paper (PDF))
  • PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel (Paper)
  • One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels (Paper)
  • Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (Paper)
  • Timing Attacks on Differential Privacy are Practical (Paper

Machine Learning

  • Machine Unlearning (Paper)
  • SMOTE and Mirrors: Exposing Privacy Leakage from Synthetic Minority Oversampling (Paper)
  • Making AI Forget You: Data Deletion in Machine Learning (Paper)
  • Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors (Paper

Security Leaks

  • More is Less: Extra Features in Contactless Payments Break Security (Paper)
  • Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites (Paper

Fingerprints

  • Secure Information Embedding in Forensic 3D Fingerprinting (Paper)