12.06.
2014
09:00 am – 05:00 pm
12.06.
2014
09:00 am – 03:00 pm

EC SPRIDE-Colloquium on Privacy and Security By Design

Renowned researchers from the US, Great Britain and Spain give insights into their IT security research.

Seminar moderator: Prof. Ahmad-Reza Sadeghi (TU Darmstadt)

show details
11.06.
2014
05:00 pm – 06:00 pm

Prof. Farinaz Koushanfar: "Big Data, Big Security, Bigger Challenges and Opportunities"

The construction and study of systems that can extract useful knowledge from the massively growing data have become extremely challenging. The conventional knowledge extraction tools, which handle computations on matrices/graphs, do not typically scale to extremely large data sizes. Major difficulties particularly arise when the data correlations are dense like in the case of large scale Internet security and malware analysis: the underlying matrix/graphs cannot be fit into a single machine or, effectively partitioned, parallelized, and communicated within multiple processing units (i.e., system’s bandwidth limitations.)

show details
05.06.
2014
10:00 am – 11:30 am

Optimization of Binary Probabilistic Fingerprinting Codes for Real World Watermarking

Traitor tracing is today a common application for digital watermarking. The digital copies of a multimedia file are marked with an individual identifier to enable tracing back to the user which has unauthorized redistributed his copies. However, a group of dishonest users can cooperate and forge a pirated copy. The so called collusion attack represents a significant security threat.

show details
08.05.
2014
10:00 am – 11:30 am

Hybrid Inter-Component and Inter-Application Data Flow Analysis in Android

Today’s smartphones have become sources of private and confidential data. Users store all kinds of information on their smartphones, from friend’s phone numbers, personal photos to passwords and bank account numbers.

show details
28.04.
2014
04:15 pm – 05:45 pm

Visuomotor behavior in naturalistic tasks: from receptive fields to value functions

Cognitive science strives to explain psychological phenomena in computational terms. The long tradition in neuroscience and psychology of separating perception, action, and learning has been challenged accordingly by experimental studies of natural behavior outside the laboratory and by theoretical results from the areas of optimal control and artificial intelligence, showing that this separation is only valid under very specific circumstances.

show details
24.04.
2014
04:15 pm – 05:15 pm

Prof. Fred Schneider: "Toward a Science of Security"

While today much security research is about defending against the attack du jour, there has been theoretical work in computer security and there are the beginnings of a science base for security.  This talk will discuss the kinds of questions one might expect a scince base to address.

 

show details
23.04.
2014
04:00 pm – 06:00 pm

New Seminar "Routing Security"

Dr. Haya Shulman offers a new seminar concerning "Routing Security" in summer term 2014. The seminar will be held in English.

show details
23.04.–
25.06.
2014
02:00 pm – 04:00 pm

Cyber Security

In this seminar, we will discuss recent research and (proposed) standards related to Cyber Security.

Interested students need to apply via Tucan (Module 20-00-0756-se).

 

The Kick-Off Meeting will be on April 23, 2014 14:00 - 16:00 h. All interested people should attend this meeting.

 

The seminar will take place every Wednesday, 14:00 - 16:00 h (until the end of June).

show details
15.04.
2014
03:30 pm – 05:00 pm

Inaugural lecture by Eric Bodden: “When security is cut short – the case of the Java Runtime Library"

Abstract:
I will discuss recent vulnerabilities in the Java runtime library, and will highlight how many of them are caused by purely implementations of access control. I will demo and explain an exploit for a now fixed vulnerability, and discuss challenges when it comes to detecting those vulnerabilities through static code analysis.

show details