Seminar Topics
Machine Learning/ Data Analysis
- A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots (Paper (PDF))
- EIFFeL: Ensuring Integrity for Federated Learning (Paper (PDF))
- Password Guessing Using Random Forest (Paper (PDF))
Malware
Internet of Things Security
Hardware Security
- On the (in)security of a Self-Encrypting Drive series (Paper (PDF))
- Wireless Mice and Keyboards Vulnerabilities (News, Crazyradio, nRF24Playset)
- Blockcipher-based Authenticated Encryption (Paper, News1, News2)
- Nintendo Switch Hack: The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs (Paper)
Biometric Security and Authentication
Web Security
- How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic (Paper)
Wireless Communications
- All cops are broadcasting: TETRA under scrutiny (Paper)
- Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems (Paper)
- UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips (Paper)
- One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks (Paper)
- MIMO-based jamming resilient communication in wireless networks (Paper)
- Zigator: analyzing the security of zigbee-enabled smart homes (Paper)
- No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning (Paper)
- UWB-Auth: A UWB-based Two Factor Authentication Platform (Paper)
- Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions (Paper)
- Metasurface-in-the-Middle Attack: From Theory to Experiment (Paper)
- On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices (Paper)
- A Robust Radio Frequency Fingerprint Extraction Method Based on Channel Reciprocity (Paper)
- Triplet Network and Unsupervised-Clustering-Based Zero-Shot Radio Frequency Fingerprint Identification With Extremely Small Sample Size (Paper)
SSL/ TLS and RC4
- RC4-Angriff von Klein (Paper)
- RC4-Angriff innerhalb WPA-TKIP und TLS von Vanhoef und Piessens (Paper (PDF))
- Sweet32 (Webseite, Paper (PDF), News)
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates (Paper (PDF))
- Multi-Context TLS (mcTLS) (Paper (PDF), Website, Slides (PDF), Talk, News)
Cryptography
- A Practical Cryptanalysis of the Algebraic Eraser (Paper, News, Website)
- Dual_EC_DRBG & Juniper (Paper, Informationen, Präsentation (PDF), Paper2, Paper3, BlogEC, Blog Juniper)
- Indistinguishability Obfuscation (Informationen, Paper1 (PDF), Paper2 (PDF), Paper3 (PDF), Paper4 (PDF), Paper5)
- Argon2 (Paper (PDF))
- RSA Sliding Window Attack (Paper (PDF))
- 1024 Bit Primes may be weak: A kilobit hidden SNFS discrete logarithm (Paper (PDF))
- SHA-1 Shattered (Paper (PDF), Website, News, MD5 Collision (PDF))
- Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters (Paper)
- Efficient Set Operations in the Presence of Malicious Adversaries (Paper, Talk)
- Forward-Security under Continual Leakage (Paper (PDF))
- One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation (Paper (PDF))
- ElsieFour: A Low-Tech Authenticated Encryption Algorithm (Paper)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper)