Seminar Topics
Digital Currencies
- Bitcoin Battle: Burning Bitcoin for Geopolitical Fun and Profit (Paper)
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability (Paper)
- Majority is not enough: bitcoin mining is vulnerable (Paper)
- Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic (Paper)
- Eclipse Attacks on Bitcoin’s Peer-to-Peer Network (Paper)
- Tracing Transactions Across Cryptocurrency Ledgers (Paper)
Hardware Security
- Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper)
Wireless Communications
- All cops are broadcasting: TETRA under scrutiny (Paper)
2 COPS 2 BROADCASTING (Webpage , Slides (PDF) , Heise Artikel) - A Reassessment on Friendly Jamming Efficiency (Paper)
- Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks (Paper)
- UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
- Zigator: analyzing the security of zigbee-enabled smart homes (Paper)
Biometric Security and Authentication
- Person Re-identification in 3D Space: A WiFi Vision-based Approach (Paper)
Cryptography
- Functional Encryption with Bounded Collusions via Multi-party Computation (Paper)
- Efficient Pattern Mining Based Cryptanalysis for Privacy-Preserving Record Linkage (Paper)
and
Automated Cryptanalysis of Bloom Filter Encryptions of Health Records (Paper) - A Graph Matching Attack on Privacy-Preserving Record Linkage (Paper)