Seminar Topics

Machine Learning/Data Analysis

  1. A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots (Paper)
  2. EIFFeL: Ensuring Integrity for Federated Learning (Paper)
  3. Password Guessing Using Random Forest (Paper)

Malware

  1. Remote Attacks on Speech Recognition Systems Using Sound from Power Supply (Paper)
  2. Towards a General Video-based Keystroke Inference Attack (Paper)

Internet of Things Security

  1. Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting (Paper)
  2. Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee (Paper)

Hardware Security

  1. On the (in)security of a Self-Encrypting Drive series (Paper)
  2. Wireless Mice and Keyboards Vulnerabilities (News, Crazyradio, nRF24Playset)
  3. Blockcipher-based Authenticated Encryption (Paper, News1, News2)
  4. Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper)

Biometric Security and Authentication

  1. Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments (Paper)
    Evaluating Behavioral Biometrics for Continuous Authentication (Paper)
  2. Person Re-identification in 3D Space: A WiFi Vision-based Approach (Paper)

Web Security

  1. How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic (Paper)

Wireless Communications

  1. All cops are broadcasting: TETRA under scrutiny (Paper)
  2. Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems (Paper)
  3. UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
  4. One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks (Paper)
  5. MIMO-based jamming resilient communication in wireless networks (Paper)
  6. Zigator: analyzing the security of zigbee-enabled smart homes (Paper)
  7. No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning (Paper)
  8. UWB-Auth: A UWB-based Two Factor Authentication Platform (Paper)
  9. Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions (Paper)
  10. Metasurface-in-the-Middle Attack: From Theory to Experiment (Paper)
  11. On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices (Paper)
  12. A Robust Radio Frequency Fingerprint Extraction  Method Based on Channel Reciprocity (Paper)
  13. Triplet Network and Unsupervised-Clustering-Based Zero-Shot Radio Frequency Fingerprint Identification With Extremely Small Sample Size (Paper)

SSL/TLS and RC4

  1. RC4-Angriff von Klein (Paper)
  2. RC4-Angriff innerhalb WPA-TKIP und TLS von Vanhoef und Piessens (Paper)
  3. Sweet32 (WebseitePaperNews)
  4. A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates (Paper)
  5. Multi-Context TLS (mcTLS) (Paper, Website, Slides, Talk, News)

Cryptography

  1. A Practical Cryptanalysis of the Algebraic Eraser (Paper, News, Website)
  2. Dual_EC_DRBG & Juniper (PaperInformationenPräsentationPaper2Paper3BlogECBlog Juniper)
  3. Indistinguishability Obfuscation (InformationenPaper1Paper2Paper3Paper4Paper5)
  4. Argon2 (Paper)
  5. RSA Sliding Window Attack (Paper)
  6. 1024 Bit Primes may be weak: A kilobit hidden SNFS discrete logarithm (Paper)
  7. SHA-1 Shattered (Paper, Website, News, MD5 Collision)
  8. Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters (Paper)
  9. Efficient Set Operations in the Presence of Malicious Adversaries (Paper, Talk)
  10. Forward-Security under Continual Leakage (Paper)
  11. One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation (Paper)
  12. ElsieFour: A Low-Tech Authenticated Encryption Algorithm (Paper)
  13. How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper)