Ruhr-Uni-Bochum
Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA

CASA Distinguished Lectures

In den CASA Distinguished Lectures heißen wir ausgewählte internationale und nationale Wissenschaftler*innen am Exzellenzcluster CASA willkommen. An die meist einstündigen Vorträge dieser exzellenten Gastredner*innen schließt immer auch eine Diskussion mit den Teilnehmenden an. Damit möchten wir unser Ziel verwirklichen, einen regen Gedankenaustausch innerhalb der Cyber-Security-Forschung anzutreiben und neue Perspektiven zu öffnen.

Die Lectures finden in der Regel in Präsenz an Ruhr-Universität Bochum statt. Es besteht auch die Möglichkeit digital an den Lectures teilzunehmen – sie sind damit weiterhin für Interessierte auf der ganzen Welt zugänglich. Der Zugangslink zur jeweiligen Veranstaltung wird unter den Informationen zu den Sprecher*innen geteilt.

Service-Angebote zu den Distinguished Lectures
Auf unserem Youtube-Kanal können Sie sich einige vergangene Distinguished Lectures in voller Länge anschauen. Wenn Sie über die anstehenden Vorträge informiert werden möchten, melden Sie sich bitte zu unserem Newsletter an.

Cyber Security in the Age of Large-Scale Adversaries

"Black Ostrich: Web Application Scanning with String Solvers"

Read more

"Side Channel Attacks: Lessons Learned or Troubles Ahead?"

Read more

"Practical Rowhammer Attacks and Defenses"

Read more

"How do quantum computers break crypto and what are we doing about it?"

Read more

"Experiencing a new Internet Architecture"

Read more

“Threshold Implementations - provably secure countermeasure against physical attacks“

Read more

"When the Rubbish Meets the Road – A Lesson About Data"

Read more

"Engaging Software Developers: Approaches to Research with Professional Teams"

Read more

"Fast Communication Efficient Secure Multi-Party Computation"

Read more

Keeping Secrets at a Distance: New Approaches to Nuclear Monitoring and Verification

Read more

"Model-based security: Connecting models and code"

Read more

"Lightweight Cryptography"

Read more

"Johnny’s Journey Toward Usable Secure E-Mail"

Read more

"Privacy-friendly presence and proximity tracing"

Read more

"In Hardware We Trust? The Struggle, Challenges and Future of Trusted Computing"

Read more

"Building Secure Key Exchange Protocols From Passwords"

Read more

"Usable Verifiable Electronic Voting"

Read more

"On the Security of (UWB) Distance Measurement"

Read more

"Differentially Oblivious Protocols for Differential Privacy"

Read more

"Measuring and Enhancing the Security of Machine Learning"

Read more

"Learning from the People: From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning"

Read more

"Who's Calling? Characterizing and Addressing Telephone Network Abuse"

Read more

"Intriguing Properties of Adversarial ML Attacks in the Problem Space"

Read more

“SNARKs for Blockchains”

Read more

"Property Driven Hardware Security"

Read more

"Extraction of Complex DNN Models: Real Threat or Boogeyman?"

Read more

"We Need A Discipline of Cyber Public Health"

Read more

Understanding and Mitigating Technology-Enabled Misinformation: Present and Future

Read more

"Deep Learning Under Resource Constraints"

Read more

"Attacks on ECDSA with nonce leakage: recent progress and perspectives"

Read more

"Learning the Language of Failure"

Read more

"Wild Patterns: Ten Years after the Rise of Adversarial Machine Learning"

Read more

"On Deck Functions"

Read more

"Security Testing Hard to Reach Code"

Read more

"Toward a Quantum-Safe Future"

Read more

"From hash-function security in a post-quantum world to SPHINCS+"

Read more

"Post-quantum crypto on embedded microcontrollers"

Read more

"Sorting integer arrays: security, speed, and verification"

Read more

"A human-centered approach to the secure application of cryptography"

Read more

"Trapdoor Hash Functions and their Applications"

Read more

"Transient Execution Attacks"

Read more

"Strong network anonymity with mixnets"

Read more

"Expressive, Robust and Accountable Machine Learning for Real-world Data"

Read more

"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"

Read more

"A User-Centric Approach to Securing the HTTPS Ecosystem"

Read more