Ruhr-Uni-Bochum
Cyber Security in the Age of Large-Scale Adversaries

Women in Security and Cryptography Workshop (WISC)


Der Workshop richtet sich an Promovierende und herausragende Studierende auf dem Gebiet der IT-Sicherheit. Er bietet Fachvorträge und Raum für den Austausch zwischen älteren und jüngeren Forschenden in diesem Bereich. Das langfristige Ziel von WISC ist es, ein starkes internationales Netzwerk von Nachwuchsforscherinnen aufzubauen und ein wertvolles akademisches Programm zu schaffen. WISC ist eine Nebenveranstaltung der renommierten Computersicherheitskonferenz Women in Theory (WIT) und findet alle zwei Jahre statt.

Programm

Cyber Security in the Age of Large-Scale Adversaries

Die meisten Vorträge werden live auf YouTube gestreamt. Eine Aufzeichnung oder spätere Bereitstellung der Inhalte ist nicht vorgesehen. Die Übertragung steht daher ausschließlich während der Livestreams zur Verfügung.

-> Zum CASA Youtube Channel

Der Vortrag von Shafi Goldwasser wird zudem live über -> Zoom gehalten.

Livestream WISC 2025 - Cluster of Excellence for Cyber Security


Auf 'Play' wird externer Medieninhalt geladen, und die Datenschutzrichtlinie von YouTube gilt

Schwerpunkte der WISC

  • Vorträge von herausragenden Wissenschaftlerinnen* aus der Cybersicherheit
  • Diskussionen & (wissenschaftlicher) Austausch
  • Erfahrungsaustausch & Networking
  • Lightning Talks & Open Space

Speaker*innen

Cyber Security in the Age of Large-Scale Adversaries

Lejla Batina

Radboud University, The Netherlands

 

"Side-channel analysis of cryptographic implementations: What can AI do for you?"

Cryptography is considered to be the cornerstone of secure systems, but its implementations are often vulnerable to physical attacks such as side-channel analysis (SCA) and fault injection. Those, so-called implementation attacks provide the best attack vector to embedded crypto implementations today.  In this talk, I will discuss several aspects of SCA on crypto implementations and its interactions with AI. We will evaluate the impact of AI-assisted SCA on implementations of post-quantum cryptography. Next, we will see how SCA threatens not just crypto implementations but also those of commercial neural networks. In the end, we identify some avenues for future research.

Cyber Security in the Age of Large-Scale Adversaries

Zinaida Benenson

University of Erlangen-Nuremberg

 

"Shedding Light on CVSS Scoring Inconsistencies"

The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric score between 0 and 10 is calculated, 10 being the most severe (critical) value. The goal of CVSS is to provide comparable scores across different evaluators. We show in an online survey with 196 participants that specific CVSS metrics are inconsistently evaluated for widespread vulnerability types, including Top 3 vulnerabilities from the ''2022 CWE Top 25 Most Dangerous Software Weaknesses'' list.

Cyber Security in the Age of Large-Scale Adversaries

Shafi Goldwasser 

Berkeley University, USA (will join us online)

 

"How can the Theory of Cryptography contribute to AI Safety"

Cyber Security in the Age of Large-Scale Adversaries

Martina Lindorfer

TU Wien, Austria

 

"Lessons learned by a reluctant academic…”

The number of “smart” devices, that is, devices making up the Internet of Things (IoT), is steadily growing. They suffer from vulnerabilities just as other software and hardware. Automated analysis techniques can detect and address weaknesses before attackers can misuse them. Applying existing techniques or developing new approaches that are sufficiently general is challenging though. Contrary to other platforms, the IoT ecosystem features various software and hardware architectures. We introduce IoTFlow, a new static analysis approach for IoT devices that leverages their mobile companion apps to address the diversity and scalability challenges. IoTFlow combines Value Set Analysis (VSA) with more general data-flow analysis to automatically reconstruct and derive how companion apps communicate with IoT devices and remote cloud-based backends, what data they receive or send, and with whom they share it. We analyzed 9,889 manually verified companion apps with IoT-Flow to understand and characterize the current state of security and privacy in the IoT ecosystem. We discovered various IoT security and privacy issues, such as abandoned domains, hard-coded credentials, expired certificates, and sensitive personal information being shared. However, don’t expect a straight up research talk, I will give you a peek behind the scenes of the project, from its overall (funding) inception, through various iterations and revisions until the final presentation at ACM CCS 2023.

Cyber Security in the Age of Large-Scale Adversaries

Doreen Riepel

CISPA, Saarbrücken

 

"Modeling and Proving Security: From Foundations of Key Exchange to Real-World Cryptography"

 Provable security aims to bridge the gap between cryptographic theory and practice by developing formal models that capture real-world adversarial capabilities. We prove the security of protocols based on well-studied hardness assumptions via security reductions. In this talk, I will connect my work on the theoretical foundations of key exchange—particularly focusing on the quality of security reductions—to more recent research on secure messaging. Along the way, we will see how insights from theoretical work can lead to proof techniques that enable strong security guarantees, e.g., for the Signal messaging protocol. I will also discuss limitations of existing techniques and why it may be necessary to adapt traditional security models or to strengthen assumptions when analyzing real-world protocols.

Cyber Security in the Age of Large-Scale Adversaries

Cristina Vintila

Google, Switzerland

 

"Building Secure Systems in the Cloud & AI Era --- Insights and Opportunities for Aspiring Experts"

The presentation covers Google's approach to cloud security at scale, including shifting paradigms, defense in depth, automation, and Zero Trust principles. It also delves into effective retrospectives and security by design practices, as well as the unique challenges and approaches to securing AI. Furthermore, the presentation discusses the core technical and soft skills required for security experts and concludes with a call to action for attendees to pursue their interests in the field. Audience is invited to participate with their perspectives and Q&A / discussion.

Veranstaltungsort

An d. Jahrhunderthalle 1, 44793 Bochum

http://www.jahrhunderthalle-bochum.de/

Maps: F5JX+Q6F Bochum

Die Jahrhunderthalle Bochum ist nicht nur ein Wahrzeichen der Stadt, sondern auch eine außergewöhnliche Veranstaltungsstätte. Ihre Mischung aus industriellem Charme und modernem Ambiente macht sie zur idealen Location für die WISC.

Wir freuen uns darauf, Sie in dieser einzigartigen Atmosphäre begrüßen zu dürfen.

Jahrhunderthalle der Stadt Bochum

Copyright: Stadt Bochum, Pressestelle/ Leitmann

Unterkünfte und Hotels

Wir empfehlen Ihnen die Hotels B&B HOTEL Bochum-City und das GHOTEL hotel & living Bochum, in der Nähe des Veranstltungsortes. Selbstverständlich können Sie auch gerne andere Hotels oder Unterkünfte buchen. 

Kinderbetreuung während der Konferenz

Gerne organisieren wir für Sie eine Kinderbetreuung während unseres Workshops. Dazu bitten wir Sie uns die wichtigsten Daten (z. B. Datum, Anzahl der Kinder, Namen, Geburtsdaten und Kontaktinformationen der Eltern) so bald wie möglich, spätestens jedoch vier Wochen vor der Veranstaltung, mitzuteilen.

Organisationsteam

-> Equal Opportunities & Diversity | CASA | RUB

Falls Sie noch weitere Fragen oder Anregungen haben, melden Sie sich gerne bei dem Organisationsteam: wisc(at)casa.rub.de

Rückblick: WISC 2023

 

Vom 27. bis 29. Juni 2023 richtete das Exzellenzcluster CASA zum zweiten Mal den WISC-Workshop aus, diesmal in Präsenz. Absolventinnen und herausragende Studentinnen aus dem Bereich der Cybersicherheit und verwandten Bereichen verbrachten drei spannende Tage in Bochum, um gemeinsam zu lernen und sich zu vernetzen.

Referentinnen: 

  • Claudia Diaz, KU Leuven
    "The Nym network: Incentivized mixnets"
  • Cynthia Sturton, University of North Carolina at Chapel Hill
    "Bringing Symbolic Execution to the Security Verification of Hardware Designs"
  • Yixin Zou, Max-Planck-Institut für Sicherheit und Privatsphäre
    "Learning from the People: A Human-Centered Approach in Security and Privacy Research"
  • Shruti Tople, Microsoft Research
    "Unlocking the Vault: Analyzing Data Leakage in Language Models"
  • Maria Eichlseder, TU Graz
    "Ascon - The new NIST standard for lightweight cryptography"
  • Jade Philipoom, Google/Open Titan
    "The Joy of Cryptographic Implementation"

Außerdem: Podiumsdiskussionen, Posterpräsentationen, Networking-Aktivitäten und vieles mehr!

Zum ausführlichen Rückblick auf die WISC 2023

Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA, Mareen Meyer

Unser Flyer zur WISC 2023 gibt weitere Einblicke in die drei spannenden Workshoptage!

Eindrücke von der WISC 2023

Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA, Mareen Meyer

Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA, Mareen Meyer

Cyber Security in the Age of Large-Scale Adversaries

Copyright: CASA, Mareen Meyer

Bleibe auf dem Laufenden

An unserem Exzellenzcluster tun sich eine Menge spannender Dinge: Veranstaltungen, Vorträge, Workshops, Jobangebote...
Wenn Sie im Bereich Equal Opportunity & Diversity auf dem Laufenden bleiben wollen, tragen Sie sich bitte in unsere E-Mail-Liste ein. Dann verpassen Sie kein Update mehr!

E-Mail-Liste
By submitting this form, you give CASA permission to process your data (name, email address) for the purpose of informing you about events, jobs and other news of the cluster. This consent is voluntary and can be revoked at any time.

Kontakt

Cyber Security in the Age of Large-Scale Adversaries

Kirsten Jäger
Equal Opportunities & Diversity,
Quality & Event Management
(0)234-32-29263
K.Jaeger(at)rub.de

<iframe src="https://start.video-stream-hosting.de/player.html?serverip=62.113.210.243&serverapp=eventmediagroup-live&smil=eventmediagrouplivestream.smil" width="640" height="360" frameborder="0" allowfullscreen> </iframe>