How to Authenticate Keys for Secure Messaging

Abstract: Modern messaging applications such as iMessage, Signal, and WhatsApp encrypt their users’ messages using cryptography that provides strong security guarantees. All these security guarantees are void, however, when inauthentic keys are used. For years, the only option to authenticate your peers’ keys was to compare safety numbers in-person, which was rarely done in practice.

Ethical, responsible, and safe requirements for AI

Abstract: Abstract: In a world increasingly shaped by AI technologies, addressing their technical, ethical, and fairness challenges becomes imperative. This talk will address the criticality of identifying ethical, responsible, and safe requirements for large language models, featuring published and ongoing research at Precog Lab https://precog.iiit.ac.in/. We’ll discuss representation steering to make interpretable changes to language

When Cryptocurrency Meets Network Security: The layers, the attacks, and the defenses

Abstract: With blockchain technology at its core, cryptocurrencies have captured widespread attention both in academic research and beyond in recent years. As these systems oversee increasing stakes, reaching into the billions of US dollars, they have become attractive attack targets. Notably, several attacks have focused on their network layer, which crucially provides the communication foundation for innovations in the consensus or

Thriving in between theory and practice: How applied cryptography bridges the gap

Abstract: The focus of applied cryptography is the security of cryptographic systems used in practice. This includes analyzing cryptographic protocols and primitives used in the wild, and designing and deploying secure systems. Unfortunately, this is a challenging task. Cryptography is highly brittle and small design or implementation mistakes can have devastating effects on a system

How Geopolitics is Elevating the Importance of Cybersecurity in Aviation: Exploring the Latest Research

Abstract: This seminar spotlights the latest research aimed at boosting aviation security. As the geopolitical landscape shifts, it has exposed key vulnerabilities, especially in digital communications and navigation systems. We will delve into ongoing research efforts focused on strengthening aviation security by pinpointing these vulnerabilities and crafting effective countermeasures to address various potential threats. Join

Xray: Finding Security Vulnerabilities in Arm AXI Implementations Using Model Checking

Abstract: The Arm Advanced eXtensible Interface (AXI) protocols are widely used in bus implementations that connect processors, accelerators, memories, and other IP cores. Any bugs in these implementations can pose a security risk to the correctness of the connected IPs. Malicious or third-party IPs can use such implementation bugs to bypass security mechanisms employed at