Seminar Topics
Machine Learning/ Data Analysis
Malware
Internet of Things Security
Hardware Security
- On the (in)security of a Self-Encrypting Drive series (Paper)
- Wireless Mice and Keyboards Vulnerabilities (News, Crazyradio, nRF24Playset)
- Blockcipher-based Authenticated Encryption (Paper, News1, News2)
- Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper)
Biometric Security and Authentication
Web Security
- How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic (Paper)
Wireless Communications
- All cops are broadcasting: TETRA under scrutiny (Paper)
- Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems (Paper)
- UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
- One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks (Paper)
- MIMO-based jamming resilient communication in wireless networks (Paper)
- Zigator: analyzing the security of zigbee-enabled smart homes (Paper)
- No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning (Paper)
- UWB-Auth: A UWB-based Two Factor Authentication Platform (Paper)
- Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions (Paper)
- Metasurface-in-the-Middle Attack: From Theory to Experiment (Paper)
- On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices (Paper)
- A Robust Radio Frequency Fingerprint Extraction Method Based on Channel Reciprocity (Paper)
- Triplet Network and Unsupervised-Clustering-Based Zero-Shot Radio Frequency Fingerprint Identification With Extremely Small Sample Size (Paper)
SSL/ TLS and RC4
Cryptography
- A Practical Cryptanalysis of the Algebraic Eraser (Paper, News, Website)
- Dual_EC_DRBG & Juniper (Paper, Informationen, Präsentation, Paper2, Paper3, BlogEC, Blog Juniper)
- Indistinguishability Obfuscation (Informationen, Paper1, Paper2, Paper3, Paper4, Paper5)
- Argon2 (Paper)
- RSA Sliding Window Attack (Paper)
- 1024 Bit Primes may be weak: A kilobit hidden SNFS discrete logarithm (Paper)
- SHA-1 Shattered (Paper, Website, News, MD5 Collision)
- Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters (Paper)
- Efficient Set Operations in the Presence of Malicious Adversaries (Paper, Talk)
- Forward-Security under Continual Leakage (Paper)
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation (Paper)
- ElsieFour: A Low-Tech Authenticated Encryption Algorithm (Paper)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper)