Ruhr-Uni-Bochum
Webheader der CASA Distinguished Lecture

Copyright: CASA

CASA Distinguished Lectures


In our CASA Distinguished Lectures, we welcome selected international and national scientists at our Cluster of Excellence CASA. The lectures of these influential and pioneering guest speakers, usually lasting one hour, are always followed by a discussion with the participants. Our goal is to encourage discussions and open up new perspectives within the field of cybersecurity research.

The lectures usually take place in presence at Ruhr-Universität Bochum. It is also possible to participate digitally in the lectures - they are thus accessible to interested parties around the world. The access link to the respective event is shared under the information about the speakers.

Stay Informed About the Distinguished Lectures
Some of our Distinguished Lectures can also be viewed in full length on our YouTube channel at any time. To stay informed about the upcoming lectures, please subscribe to our newsletter.

To the YouTube Channel

No news available.
Cyber Security in the Age of Large-Scale Adversaries

"Establishing secure and privacy-preserving blockchain applications through real world cryptography."

Read more

"Deanonymization of Dark Web Traffic for Cybercrime Investigations"

Read more

"Shedding Light on Data Collection and Security Issues in Modern Apps"

Read more

"Provable Security for PKI Schemes - and the (Composable) Modular Security Specifications Framework"

Read more

"From Dashboards to Labels: Help users manage and make decision about privacy"

Read more

"Scaling zkSNARKs"

Read more

"Security needs Trust needs Security"

Read more

"Model Extraction Attack On Deep Neural Networks Running On GPUs"

Read more

"Cache Side-Channel Attacks on Existing and Emerging Computing Platforms"

Read more

"Automatic Detection of Microarchitectural Leaks"

Read more

"Black Ostrich: Web Application Scanning with String Solvers"

Read more

"Side Channel Attacks: Lessons Learned or Troubles Ahead?"

Read more

"Practical Rowhammer Attacks and Defenses"

Read more

"How do quantum computers break crypto and what are we doing about it?"

Read more

"Experiencing a new Internet Architecture"

Read more

“Threshold Implementations - provably secure countermeasure against physical attacks“

Read more

"When the Rubbish Meets the Road – A Lesson About Data"

Read more

"Engaging Software Developers: Approaches to Research with Professional Teams"

Read more

"Fast Communication Efficient Secure Multi-Party Computation"

Read more

Keeping Secrets at a Distance: New Approaches to Nuclear Monitoring and Verification

Read more

"Model-based security: Connecting models and code"

Read more

"Lightweight Cryptography"

Read more

"Johnny’s Journey Toward Usable Secure E-Mail"

Read more

"Privacy-friendly presence and proximity tracing"

Read more

"In Hardware We Trust? The Struggle, Challenges and Future of Trusted Computing"

 

Read more

"Building Secure Key Exchange Protocols From Passwords"

Read more

"Usable Verifiable Electronic Voting"

Read more

"On the Security of (UWB) Distance Measurement"

Read more

"Differentially Oblivious Protocols for Differential Privacy"

Read more

"Measuring and Enhancing the Security of Machine Learning"

Read more

"Learning from the People: From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning"

Read more

"Who's Calling? Characterizing and Addressing Telephone Network Abuse"

Read more

"Intriguing Properties of Adversarial ML Attacks in the Problem Space"

Read more

“SNARKs for Blockchains”

Read more

"Property Driven Hardware Security"

Read more

"Extraction of Complex DNN Models: Real Threat or Boogeyman?"

Read more

"We Need A Discipline of Cyber Public Health"

Read more

Understanding and Mitigating Technology-Enabled Misinformation: Present and Future

Read more

"Deep Learning Under Resource Constraints"

Read more

"Attacks on ECDSA with nonce leakage: recent progress and perspectives"

Read more

"Learning the Language of Failure"

Read more

"Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning"

Read more

"On Deck Functions"

Read more

"Security Testing Hard to Reach Code"

Read more

"Toward a Quantum-Safe Future"

Read more

"From hash-function security in a post-quantum world to SPHINCS+"

Read more

"Post-quantum crypto on embedded microcontrollers"

Read more

"Sorting integer arrays: security, speed, and verification"

Read more

"A human-centered approach to the secure application of cryptography"

Read more

"Trapdoor Hash Functions and their Applications"

Read more

"Transient Execution Attacks"

Read more

"Strong network anonymity with mixnets"

Read more

"Expressive, Robust and Accountable Machine Learning for Real-world Data"

Read more

"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"

Read more

"A User-Centric Approach to Securing the HTTPS Ecosystem"

Read more

Contact

Cyber Security in the Age of Large-Scale Adversaries

Kirsten Jäger
Equal Opportunities & Diversity,
Quality & Event Management
(0)234-32-29263
K.Jaeger(at)rub.de