ZISC Seminars
We organize two types of seminar talks:
- ZISC Lunch Seminar is a weekly series of talks that take place in the Institute of Information Security Meeting Room (CNB F110). The Lunch Seminar consists of an informal lunch followed by a research talk. The Lunch seminar talks are given by ZISC researchers. Additionally, We invite researchers from various universities as well as the industry. Registration for the Lunch seminar talks is required.
- ZISC Open Seminars are individual research talks. Typically the Open Seminar talks are given by visiting world-class researchers and they take place is a larger room to facilitate bigger audience. The talks are open and no registration is required.
Below you can find a list of talks and, when available, an abstract and the slides used during the presentation.
Upcoming Seminars
Confidential Computing in Practice 2023
Dr. Jethro Beekman, Fortanix
From 12:15 until 14:00
At CAB G 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Past Seminars
CVE-2022-23491, or Why PO boxes can't be root certificate authorities anymore
Joel Reardon, University of Calgary
From 14:00 until 15:00
At CAB H 52 (Seminar), ETH Zurich
Human-Centred Privacy in Machine Learning
Bailey Kacsmar, University of Alberta
From 11:00 until 12:30
At CAB H 53 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Verifiable Fully Homomorphic Encryption
Christian Knabenhans, ETH Zürich
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Privacy in Machine Learning
Reza Shokri, National University of Singapore
From 11:30 until 13:00
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Confidential Computing for Next-Gen Data Centers
Aritra Dhar, Huawei
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
The Geneva Conventions in Cyberspace: An Authentic Digital Emblem
Mauro Vignati, ICRC & Felix Linker, ETH Zürich
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Proving Information Flow Security for Concurrent Programs
Thibault Dardinier, ETH Zürich
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
It’s TEEtime: A New Architecture that Brings Sovereignty to Smartphones
Friederike Groschupp, ETH Zürich
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Designing a Provenance Analysis for SGX Enclaves
Flavio Toffalini, EPFL
From 11:00 until 12:30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Poisoning Web-Scale Training Datasets is Practical
Florian Tramèr, ETH Zürich
From 11:30 until 13:00
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Three Lessons from Threema: Analysis of a Secure Messenger
Matteo Scarlata and Kien Tuong Truong, ETH Zürich
From 11:00 until 12.30
At CAB G 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Security and Robustness of Collaborative Learning Systems
Anwar Hithnawi, ETH Zürich
From 11:00 until 12.30
At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich
Exploiting RDMA Mistakes in NVMe-oF Storage Applications
Konstantin Taranov, Microsoft
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
Victory by KO: Attacking OpenPGP Using Key Overwriting
Lara Bruseghini, ProtonMail
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
Measuring privacy leakage in neural networks
Florian Tramèr, ETH Zürich
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
Human-Centered Security: Focusing on the human in IT security and privacy research
Verena Zimmermann, ETH Zürich
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
Zero Trust in Zero Trust?
Virgil Gligor, Carnegie Mellon University
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
A Flash(bot) In The Pan: Measuring MEV in Private Pools
Christof Ferreira Torres, ETH Zürich
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
An Efficient Query Recovery Attack Against a Graph Encryption Scheme
Francesca Falzon, University of Chicago
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB H 52 (Seminar), ETH Zurich
Minority or Minoritized? Cybersecurity and Privacy for Women
Maryam Mehrnezhad, Newcastle University & ETH Future Computing Lab
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB H 52 (Seminar), ETH Zurich
Code-Level Protocol Verification
Linard Arquint, ETH Zürich
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB H 52 (Seminar), ETH Zurich
Machine readable specifications at scale
Alastair Reid, Intel Labs
From 12.30 until 13.30
At https://ethz.zoom.us/j/69032369168
Automating Cookie Consent and GDPR Violation Detection
Karel Kubíček, ETH Zürich
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB H 52 (Seminar), ETH Zurich
Challenges in adopting Machine Learning for Cybersecurity
Desislava Dimitrova & Matteo Casserini, Oracle Labs
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB H 52 (Seminar), ETH Zurich
WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking
Sandra Siby, EPFL
From 12.00 until 13.30
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
LPGNet: Link Private Graph Networks for Node Classification
Aashish Kolluri, National University of Singapore
From 12.30 until 13.30
At https://ethz.zoom.us/j/68133445571
Secure Ranging in 5G Wireless Networks
Mridula Singh, CISPA
From 12.30 until 13.30
At https://ethz.zoom.us/j/67081805489
LTrack: Stealthy Tracking of Mobile Phones in LTE
Martin Kotuliak, ETH Zürich
From 12.30 until 13.30
At https://ethz.zoom.us/j/65657145227
Hardware-software contracts for secure speculation
Boris Köpf, Microsoft Research
From 12.30 until 13.30
At https://ethz.zoom.us/j/69043735622
How to steal millions from formally verified contracts
Hubert Ritzdorf, ChainSecurity
From 12.30 until 13.30
At https://ethz.zoom.us/j/67292372519
Secure Code Execution on Untrusted Remote Devices
Gene Tsudik, UC Irvine
From 12.30 until 13.30
At https://ethz.zoom.us/j/66701426954
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
Ivan Puddu, ETH Zürich
From 12.30 until 14.00
At CNB/F/110 (Lunch) + CAB G 52 (Seminar), ETH Zurich
Adaptive Security of Multi-Party Protocols, Revisited
Chen-Da Liu Zhang, Carnegie Mellon University
From 14:30 until 15:30
At Zoom: https://ethz.zoom.us/j/61109461622
Dos and Don'ts of Machine Learning in Computer Security
Feargus Pendlebury, Royal Holloway, University of London
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/64900469091
Securing the Standards: Bringing Cryptographic Security Proofs for TLS 1.3 into the Real World
Hannah Davis, University of California, San Diego
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/62282337238
Screaming Channels: When TEMPEST Meets Side Channels and Wireless Security
Giovanni Camurati, ETH Zürich
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/61356096167
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
Mathy Vanhoef, New York University Abu Dhabi
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/66371325367
Participative Security – How to build digital trust
Marcel Zumbühl, Swiss Post
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/65841148696
Taming quantum computation with cryptography
Alexandru Gheorghiu, ETH Zürich
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/62712763210
Analyzing Cybersecurity Risks with and in Machine learning
Mathias Humbert, Swiss Cyber Defence Campus
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/67860681938
Wireless Security in Critical Infrastructures: Legacy Debt and Opportunities
Martin Strohmeier, Swiss Cyber Defence Campus & University of Oxford
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/97959381128
Computational records for RSA and finite field Diffie-Hellman
Emmanuel Thomé, INRIA
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/96960450634
Probabilistic Data Structures in Adversarial Environments
Tom Shrimpton, University of Florida
From 16:00 until 17:00
At Zoom: https://ethz.zoom.us/j/98363015201
Mondrian: Comprehensive Inter-domain Network Zoning Architecture
Claude Hähni, ETH Zürich
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/91928141110
Succinct Zero-Knowledge Arguments with Constant Computational Overhead
Jonathan Bootle, IBM Research
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/92189245457
Smartcard security research at CRoCS - From testing to vulnerabilities and attacks
Ján Jančár, Masaryk University
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/94150617023
TRRespass: Exploiting the Many Sides of Target Row Refresh
Kaveh Razavi, ETH Zürich
From 12:30 until 13:30
At Zoom: https://ethz.zoom.us/j/99959771012
And yet it leaks: on the (sad) state of today's hardware security
Daniel Genkin, University of Michigan
From 15:30 until 16:30
At Zoom: https://ethz.zoom.us/j/99391091929
Better Foundations for Secure Software: Minimize Trust and Verify It
Shweta Shinde, ETH Zürich
From 12.30 until 13.30
At Zoom: https://ethz.zoom.us/j/5494819355