Qiang Tang, Senior Lecturer (equal to U.S. Associate Professor), the University of Sydney
Thursday, March 30, 2023, 12:00
- 13:00
Building 4, Level 5, Room 5220.
Contact Person
Cloud storage is pervasive nowadays; surprisingly, how to secure cloud storage that is usable in the real world is in fact still open. In this work, we propose a novel system called End-to-Same-End Encryption (E2SEE) that can be deployed directly on existing infrastructure and provide both security and usability. Our system can be flexibly used to augment any App with secure storage, for users to create a personal digital lockbox, and for the cloud to provide secure storage service. A preliminary version of E2SEE was deployed in Snapchat, serving hundreds of millions of users, and the research result was published at USENIX Security 22.
Dr. Ruichuan Chen, Distinguished Member of Technical Staff and a Tech Lead, Nokia Bell Labs
Thursday, March 23, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Federated learning (FL) is increasingly deployed among multiple clients to train a shared model over decentralized data. To address the privacy concerns, FL systems need to protect the clients' data from being revealed during training, and also control data leakage through trained models when exposed to untrusted domains. However, existing FL systems (with distributed differential privacy) work impractically in the presence of client dropout, resulting in either poor privacy guarantees or degraded training accuracy. In addition, existing FL systems focus on safeguarding the privacy of training data, but not on protecting the confidentiality of the models being trained, which are increasingly of high business value. In this talk, I will present two pieces of our recent work that aim to address these aforementioned issues.
Wednesday, March 22, 2023, 12:30
- 14:30
B1, L3, R3119
Contact Person
This presentation addresses the challenges associated with trusting Neural Networks due to their black-box nature and limited ability to answer important questions on how they behave. The thesis proposes techniques that increase the trustworthiness of Neural Network models by employing approaches to overcome their black-box nature. The techniques include efficient extraction and verification of weights and decisions to ensure correctness with regards to pre-existing properties, continuous and exact explanations of the model behavior, and scalable training techniques providing strong, theoretically provable guarantees of privacy. We provide strong, approximation-free guarantees about Neural Networks, improving their trustworthiness to make it more likely that users will be willing to deploy them in the real world.
Michael Reiter, James B. Duke Distinguished Professor, Departments of Computer Science and Electrical & Computer Engineering, Duke University
Monday, March 20, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person
Despite long-ago predictions (e.g., see Bill Gates, 2004) that other user-authentication technologies would replace passwords, passwords remain not only pervasive but have flourished as the dominant form of account protection, especially at websites such as retailers that require a low-friction user experience. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same users' accounts at another.
Prof.Gustavo Alonso, Computer Science, ETH Zurich
Monday, March 13, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this talk I will discuss the shift towards hardware acceleration and show with several examples from industry and from research the large role that FPGAs are playing. I will hypothesize that we are in a new era where most of the established assumptions, rules of thumb, and accumulated wisdom about many aspects of computation in general and of data processing in particular no longer hold and need to be revisited.
Pramod Bhatotia, Chair Professor, Department of Computer Science, the Technical University of Munich (TUM), Germany.
Thursday, March 09, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
In this talk, Professor Pramod Bhatotia will give an overview of systems research at TU Munich. He will cover his teaching and ongoing research projects. And will conclude the talk with a brief overview of his ERC project.
Prof. Sven Dietrich, the Computer Science Department, Hunter College, the City University of New York (CUNY)
Thursday, February 09, 2023, 15:30
- 16:30
Building 5, Level 5, Room 5209
Contact Person
Vulnerability discovery can be challenging: many software packages, both open and closed-source projects, build on existing code from public software repositories to network drives, derived from earlier versions or related software packages. Even implemented protocols rely on such repositories. It is important to detect such copies of code when the original code contains a software vulnerability, especially one that is exploitable, as seen with flaws such as the bash vulnerability Shellshock or the SSL vulnerability Heartbleed.
Prof. David Bromberg, Distributed computing systems, University of Rennes (IRISA)
Thursday, February 02, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5220.
Contact Person
In this talk we will explore how research in systems and distributed systems may improve the resilience to cyber attacks following 3 axes targeting mobile systems, distributed systems, and operating systems
Prof. Mohammad Mannan, Concordia Institute for Information Systems Engineering, Concordia University, Montreal
Thursday, January 26, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5220.
Contact Person
I will discuss four related proposals: Gracewipe (coercion-resistant disk data deletion), Hypnoguard (cold-boot protection for RAM data in sleep), SafeKeeper (protecting web credentials from rougue IT admins), and Blindfold (protecting PKI private keys from human admins). While our solutions are possibly a step forward, more importantly, we highlight pitfalls of such solutions against a strong adversary.
Prof.Rodrigo Rodrigues, Instituto Superior Tecnico (ULisboa)
Monday, January 23, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2322, Hall 1
Contact Person
Trusted Execution Environments (TEEs) ensure the confidentiality and integrity of computations in hardware. Subject to the TEE's threat model, the hardware shields a computation from most externally induced fault behavior except crashes. As a result, a crash-fault tolerant (CFT) replication protocol should be sufficient when replicating trusted code inside TEEs.  However, TEEs do not provide efficient and general means of ensuring the freshness of the external, persistent state. Therefore, CFT replication is insufficient for TEE computations with an external state, as this state could be rolled back to an earlier version when a TEE restarts.  Furthermore, using BFT protocols in this setting is too conservative, because these protocols are designed to tolerate arbitrary behavior, not just rollback during a restart.
Monday, October 31, 2022, 12:00
- 13:00
Building 9, Level 2, Room 2322, Hall 1
From my experience, I will try to answer doubts and dilemmas PhD students are often faced with, in their path towards a degree. Namely, I'll discuss how advisors, colleagues, peers, reviewers and so forth, fit in the universe of a PhD student, and I will end sharing my own definition of 'excellence', as an objective to pursue.
Tuesday, September 13, 2022, 14:00
- 15:30
B9, L2, R2325
In this talk, I will start by providing our vision for next-generation networks. Throughout the talk, I will highlight several challenges in existing communication technologies that could have the potential of shaping new research and deployment directions of future wireless networks, including, (i) review our recent advances in non-terrestrial networks, which includes both UAVs and satellite (ii) show satellite systems are essential for today’s traffic-intensive applications while maintaining an accepted end-to-end latency for delay-sensitive applications and (iii) show how we integrated both existing Wi-Fi technology with optics to extend the Internet as we use it today to the underwater environments via Aqua-fi.
Monday, September 12, 2022, 12:00
- 13:00
Building 9, Level 2, Room 2322, Hall 1
This talks presents a very serious emerging threat: the bots scraping web sites and hiding their IPs thanks to residential IP providers. The problem, state of the art and a new solution will be explained.
Jiangshan Yu, Senior Lecturer, Monash University, Australia
Sunday, March 13, 2022, 12:00
- 13:00
Auditorium between Building 2 and 3, Level 0
Contact Person
Over the last decade, we have witnessed a rapid growth of blockchain technologies and their applications. Different governments have announced their strategy to boost the blockchain industry. For example, Chinese President Xi Jinping has recently endorsed blockchain and its potential for the Chinese economy; and the Australian Government announced that it would establish a National Blockchain Roadmap to help position Australia’s blockchain industry to become a global leader. This talk presents an overview of three of our works towards secure and scalable blockchains. I will first revisit the honest majority assumption of permissionless blockchains (AsiaCCS’21), and then present our efforts in making blockchain more scalable and secure against real-world threats.
Professor Roberto Di Pietro, College of Science and Engineering, Cybersecurity at Hamad Bin Khalifa University
Monday, February 14, 2022, 12:00
- 13:00
B9, L2, R2322, H1
Contact Person
Our standard of living, nation GDP,  and, in some cases, even our safety rely on critical infrastructures (CIs). In particular, being CIs generally perceived as a commodity (think of GPS availability, or avionics & maritime traffic routes and hubs), their security has largely been overlooked. The emergent property is that, nowadays, CIs systems are generally fragile, especially with respect to cyber attacks.
Professor Miguel Correia, Computer Science and Engineering Department, Instituto Superior Técnico, Universidade de Lisboa
Wednesday, December 01, 2021, 12:00
- 13:00
B9, L3, R3223
Contact Person
The seminar is an overview on my research path and approach. I will start with my initial research on the concept of intrusion tolerance and present some of the results I had at the time. Then, I will show how this initial research had led me to other areas and related approaches: software security, trusted computing, intrusion detection, intrusion recovery, and blockchain interoperability. I will present with some detail very recent research on securely moving data between trusted execution environments (TEEs) in a non-interactive way, a problem that must be solved for digital id crypto wallets starting to appear in Europe and elsewhere.
Valerio Schiavoni, Scientific Coordinator and Lecturer, Centre of Competence for Complex Systems and Big Data, University of Neuchâtel
Thursday, November 11, 2021, 12:00
- 13:00
B9, L3, R3223
Contact Person
Available as dedicated hardware components into several mobile and server-grade processors, and recently included in infrastructure-as-a-service commercial offerings by several cloud providers, TEEs allow applications with high privacy and confidentiality demands to be deployed and executed over untrusted environments, shielding data and code from compromised systems or powerful attackers. After an  introduction to basic concepts for TEEs, I will survey some of our most recent contributions exploiting TEEs, including as defensive tools in the context of Federated Learning, as support to build secure cache systems for edge networks, as protection mechanisms in a med-tech/e-health context,  shielding novel environments (ie, WebAssembly), and more. Finally, I will highlight some of the lessons learned and offer open perspectives, hopefully useful and inspirational to future researchers and practitioners entering this exciting area of research.