Seminar Topics
Digital Currencies
- Bitcoin Battle: Burning Bitcoin for Geopolitical Fun and Profit (Paper)
- Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability (Paper)
- Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic (Paper)
- How to Beat Nakamoto in the Race (Paper)
- Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining (Paper)
Hardware Security
- Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper)
Wireless Communications
- A Reassessment on Friendly Jamming Efficiency (Paper)
- Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks (Paper)
- UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
- Zigator: analyzing the security of zigbee-enabled smart homes (Paper)
Cryptography
- Functional Encryption with Bounded Collusions via Multi-party Computation (Paper)
- Efficient Pattern Mining Based Cryptanalysis for Privacy-Preserving Record Linkage (Paper)
and
Automated Cryptanalysis of Bloom Filter Encryptions of Health Records (Paper) - A Graph Matching Attack on Privacy-Preserving Record Linkage (Paper)
- A Framework for Designing Provably Secure Steganography (Paper)
Privacy Leakage
- Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels and an explanation of invisible pixels (Paper (PDF))
- PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel (Paper)
- One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels (Paper)
- Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (Paper)
- Timing Attacks on Differential Privacy are Practical (Paper)
Machine Learning
Security Leaks
Fingerprints
- Secure Information Embedding in Forensic 3D Fingerprinting (Paper)