ATHENE Distinguished Lecture Series

At the ATHENE Distinguished Lecture Series, we invite established national and international cybersecurity experts to give us insights into their latest research findings. The language of the lecture is English.
The lectures are open to the public, interested visitors are welcome to attend. However, registration is required.

The event will be held in presence at TU Darmstadt. The exact room can be found on the details page of the respective lecture. The event will be held online via MS Teams.

If you take part in a presentation, you will have the opportunity to meet and exchange with the key players in cybersecurity in person after the lecture.


Upcoming talks

The lecture with Melanie Volkamer, KIT - Karlsruhe Institute of Technology, scheduled for 26 November 2024 will not take place. We will inform you here about a new date.


Previous lectures of our ATHENE Distinguished Lecture Series

2024

Tal Shapira, Reco
Talk: "A Deep Learning Approach for Detecting IP Hijack Attacks"
See his talk on YouTube.
Read more

Amir Herzberg, University of Connecticut
Vortrag: "BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks"
See his talk on YouTube.
Read more

Juliane Krämer, Universität Regensburg
Talk: "On the physical security of multivariate signature schemes"
Read more

Carsten Meywirth, Head of the Cybercrime Division at the Bundeskriminalamt
Talk: "Ransomware & Cybercrime - Sind wir noch zu retten?"
Read more

2023

Peter van Burgel, AMS-IX
Talk: "Securing vital infrastructure: A public or private matter?"
See his talk on YouTube.
Read more

Katie Arrington
Talk:"The Criticality of Cybersecurity in Supply Chains"
See her talk on YouTube.
Read more

Konrad Rieck
"When Papers Choose their Reviewers: Adversarial Machine Learning in Conference Management Systems"
See his talk on YouTube.
Read more

Matthias Wählisch
"Impactful Measurement Research: Lessons from Analyzing IP Prefix Hijacks, DDoS, and Emerging Transport Protocols"
See his talk on YouTube.
Read more

Sascha Fahl
"A Holistic Approach to Human Factors in Cybersecurity"
See his talk on YouTube.
Read more

Anat Bremler-Barr
"Cloud Auto-scaling Mechanisms Under DDoS Attacks: Yo-Yo Attack and Tandem Attack"
See her talk on YouTube.
Read more

Amir Moradi
"Simply Secure: Tools for Automated Generation and Evaluation of Protected Hardware"
See his talk on YouTube.
Read more

Yuval Yarom
"Automating cryptographic code generation"
See his talk on YouTube.
Read more

Ulrich Rührmair
"Scalable Security without Classical Secrets"
See his talk on YouTube.
Read more

2022

Adrian Perrig
"Experiencing a new Internet Architecture"
See his talk on YouTube.
Read more

David Hay
"Network-Level IoT Security"
See his talk on YouTube.
Read more

2019

Peter Y. A. Ryan
"Trust and Trustworthiness of Voting Systems"
 

Juan Garay
"Foundational Aspects of Blockchain Protocols"
 

Alice J. O´Toole
"Turning a face recognition black box white: Understanding what deep convolutional neural networks learn about faces"
 

Gene Tsudik
"VRASED: Verifiable Remote Attestation for Simple Embedded Devices"
 

N. Asokan
"Hardware-assisted run-time protection: on balancing security and deployability"
 

Daniel Keim
"The Power of Visual Analytics for Security Applications"
 

2018

Ross Anderson
"Tracing Stolen Bitcoin"
 

Ari Juels
"Beyond Smarts: Toward Correct, Private, Data-Rich Smart Contracts"
 

Paulo Esteves-Veríssimo
"Grand Research Challenges for Cybersecurity of Critical Information and Infrastructures"
 

Gilles Barthe
"From Provable Security to Secure Cryptographic Implementations"
 

2017

Paul van Oorschot
"Security as a Science - Are we making progress?"
 

Srini Devadas
"Sanctum - Towards an Open-Source, Formally-Verifi ed Secure Processor"
 

Bart Preneel
"New Threat Models for Cryptography"
 

Cristina Nita-Rotaru
"Building Robust Distributed Systesm and Network Protocols"
 

Ulrich Meyer
"Algorithm Engineering for Graph Traversal and Graph Generation in External-Memory"
 

2016

Thorsten Holz
"Reflections on Code-Reuse Attacks and Defenses"
 

Pepijn W. H. Pinkse
"Quantum-Secure Authentication of Physical Optical Keys"
 

Alessandro Orso
"Automated Debugging: Are We There Yet?"
 

Negar Kiyavash
"A Timing Approach to Causal Network Inference: From Brain to Social Networks and Beyond"
 

Mauro Barni
"Multimedia Forensics: a Game Theoretic Approach"
 

Michael Backes
"Privacy in the Tomorrow‘s Internet"
 

2015

Matthew Smith
"
Frontiers of Usable Security - Developers, Administrators and System Security"
 

Jörn Müller-Quade
"A Systematic Approach to Cybersecurity: Models, Assumptions, Proofs"
 

Patrick McDaniel
"Six Years of Mobile Smartphone Security"
 

Nigel Smart
"Computing on Encrypted Data"
 

Angela Sasse
"Implicit authentication via biometrics: usability triumph or privacy nightmare?"
 

Steven M. Bellovin
"Web Secruity in the Real World"
 

Ernie Brickell
"Intel‘s Security Architecture Vision"
 

Jean-Pierre Seifert
"A thorough analysis of the arbiter PUF promise"
 

2014

Gene Tsudik
"Challenges in Remote Attestation of Low-End Embedded Devices"
 

Greg Morrisett
"Securing Code in a More Trustworthy Fashion"
 

Adrian Perrig
"SCION: Scalability, Control and Isolation On Newxt-Generation Network"
 

Farinaz Koushanfar
"Big Data, Big Security, Bigger Challenges and Opportunities"
 

Fred Schneider
"Toward a Science of Security"
 

Josyula R. Rao
"Using Big Data Analytics to Secure Enterprises"
 

2013

Amir Herzberg
"Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI"
 

Adi Shamir
"Cryptography: A Personal Perspective"
 

Vern Paxson
"Beyond Technical Security: Investigating Social and Economic Perspectives"
 

Srdjan Capkun
"Selected Topics in Wireless Physical Layer Security"
 

Christof Paar
"Constructive and Destructive Aspects of Security for the Internet of Things"
 

Radia Perlman
"Data: Making it be there when you want it, and making it disappear when you want it gone"
 

2012

Kai Grassie
"Mobile Security: A secure ecosystem for mobile communication"
 

Kristin Lovejoy
"Today‘s Security Attacks: A real world overview of who, how and why"
 

Kenneth Patterson
"TLS and DTLS: a Tale of Two Protocols"
 

Refik Molva
"Selected Protocols for RFID Security and Privacy"
 

Virgil Gligor
"Street-level Sematics for Attribute Authentication"
 

Ulfar Erlingsson
"Cloud Computing and Software Security"
 

Ueli Maurer
"Constructive Cryptography - A new Paradigm for Security"
 

2011

John Daugman
"Recognising Persons by their Iris Patterns"
 

Cedric Fournet
"Modular Code-Based Cryptographic Verification"
 

Michael Reiter
"Defending againgst Client Compromises in Client-Server Applications"
 

Elisa Bertino
"Protecting Information Systems from Insider Threats - Concepts and Issues"
 

Rainer Blatt
"The Quantum Way of doing Computations"
 

David Naccache
"On Secret Leakage and Polymorphic Code Design"
 

Vitaly Shmatikov
"The End of Anonymity, the Beginning of Privacy"
 

2010

Audun Jøsang
"User-Centric Identity Management"
 

Jean-Pierre Hubaux
"Location Privacy and Neighbor Discovery - Attacks, Countermeasures and Game-Theoretic Modeling"
 

Joshua D. Guttman
"Designing Correct Cryptoprotocols"
 

Gerd Leuchs
"Information is physical"
 

2009

Anja Feldmann
"Characteristics of Residential Broadband Internet Traffic"
 

Ronald Cramer
"On a Class of Special Codes Arising in Secure Multi-Party Computation"
 

Andrew C. Myers
"A higher-level abstraction for building decentralized distributed systems"
 

Somesh Jha
"Retrofitting Legacy Code for Security"
 

Renato Renner
"Security against Quantum: Mechanical Adversaries"
 

Bart Preneel
"Cryptographic Hash Functions Revisited: The NIST SHA-3 Comptetition"