..

CASED is funded by

Landes-Ofensive Entwicklung Wissenschaftlich-ökonomischer Exzellenz

Distinguished Lectures

  • Prof. Greg Morrisett Prof. Greg Morrisett

    Harvard University, USA
    "Securing Code in a More Trustworthy Fashion"
    Much of our computing infrastructure is still built using C and C++, in spite of overwhelming language-level problems that lead to security exploits. I will discuss a range of compiler-oriented techniques that researchers have explored to try and harden C/C++ code.
    November 20, 2014

    Continue

  • Prof. Adrian Perrig Prof. Adrian Perrig

    ETH Zürich, Network Security Group D-INFK, Switzerland
    "SCION: Scalability, Control, and Isolation On Next-Generation Networks"
    Abstract:
    We present an Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications. SCION separates ASes into groups of independent routing sub-planes, called isolation domains, which then interconnect to form complete routes.
    June 26, 2014, 4:15-5:15 p.m.

    Continue

  • Prof.  Farinaz Koushanfar Prof. Farinaz Koushanfar

    Rice University, Department of Electrical and Computer Engineering, Houston, USA
    "Big Data, Big Security, Bigger Challenges and Opportunities"
    Abstract:

    The construction and study of systems that can extract useful knowledge from the massively growing data have become extremely challenging. The conventional knowledge extraction tools, which handle computations on matrices/graphs, do not typically scale to extremely large data sizes. Major difficulties particularly arise when the data correlations are dense like in the case of large scale Internet security and malware analysis: the underlying matrix/graphs cannot be fit into a single machine or, effectively partitioned, parallelized, and communicated within multiple processing units (i.e., system’s bandwidth limitations.)
    June 11, 2014, 5:00-6:00 p.m.

    Continue

  • Prof.  Fred Schneider Prof. Fred Schneider

    Cornell University, Department of Computer Science, USA
    "Toward a Science of Security"
    Abstract:

    While today much security research is about defending against the attack du jour, there has been theoretical work in computer security and there are the beginnings of a science base for security.  This talk will discuss the kinds of questions one might expect a scince base to address.

    It will also give examples of how such questions could be answered.  Basic concepts in security, such as attack, policy, and enforcement turn out to be surprisingly subtle to define.
    April 24, 2014, 4:15-5:15 p.m., Piloty Building, S2 | 02, room C 205

    Continue

  •  Josyula R. Rao, Ph. D. Josyula R. Rao, Ph. D.

    IBM Thomas J. Watson Research Center, USA
    "Using Big Data Analytics to Secure Enterprises"
    January 23, 2014, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110, Hochschulstraße 10, 64289 Darmstadt

  • Prof. Amir Herzberg Prof. Amir Herzberg

    Bar-Ilan-University, Israel
    "Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI"
    December 5, 2013, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110, Hochschulstraße 10, 64289 Darmstadt

    Continue

  • Prof. Dr.  Adi Shamir Prof. Dr. Adi Shamir

    Weizman Institute of Science, Israel
    "Cryptography: A personal perspective"
    September 25, 2013, 4:45-5:45 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 205, Hochschulstraße 10, 64289 Darmstadt

  • Prof. Vern Paxson, Ph. D. Prof. Vern Paxson, Ph. D.

    UC Berkeley | ICSI, USA
    "Beyond Technical Security: Investigating Social and Economic Perspectives"
    June 27, 2013, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110, Hochschulstraße 10, 64289 Darmstadt

  • Prof. Dr.  Srdjan Capkun Prof. Dr. Srdjan Capkun

    ETH Zurich, System Security Group, Switzerland
    "Selected topics in wireless physical layer security"
    June 13, 2013, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110, Hochschulstraße 10, 64289 Darmstadt
    Further Information

  • Prof. Dr. Christof Paar Prof. Dr. Christof Paar

    Ruhr-Universität Bochum, Chair for Embedded Security, Bochum, Germany
    "Constructive and Destructive Aspects of Security for the Internet of Things"
    April 18, 2013, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110, Hochschulstraße 10, 64289 Darmstadt

    Continue

  •  Radia Perlman, Ph. D. Radia Perlman, Ph. D.

    Intel Fellow and Director of Network and Security Technology at Intel, Massachusetts, USA
    "Data: Making it be there when you want it, and making it disappear when you want it gone"
    Download Radia Perlman´s slides
    Watch a video of Radia Perlman´s lecture.
    January 17, 2013, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110

    Continue

  • Dr. Kai Grassie Dr. Kai Grassie

    Giesecke & Devrient GmbH, Chief Technology Officer (CTO), Munich, Germany
    "Mobile Security - a secure ecosystem for mobile communication"
    Download Kai Grassie´s slides
    December 13, 2012, 4:15-5:15 p.m., TU Darmstadt Piloty-Building S2|02 Room C 110

    Continue

  •  Kristin Lovejoy, Ph. D. Kristin Lovejoy, Ph. D.

    IBM Security Services, Virginia, USA
    "Today's Security Attacks: A real world overview of who, how and why"
    November 8, 2012, 4:15-5:15 p.m., TU Darmstadt, Piloty Building, S2|02 Room C 110

  • Prof. Kenneth Paterson, Ph. D. Prof. Kenneth Paterson, Ph. D.

    Information Security Group, Royal Holloway, University of London, London, United Kingdom
    "TLS and DTLS: A Tale of Two Protocols"
    July 5, 2012, 4:15-5:45 p.m., TU Darmstadt Piloty-Building S2|02 Room C 110

    Continue

  • Prof. Refik  Molva, Ph. D. Prof. Refik Molva, Ph. D.

    EURECOM, Sophia-Antipolis, France
    "Selected Protocols for RFID Security and Privacy"
    June 28, 2012, 4:15-5:45 p.m., TU Darmstadt Piloty-Building S2|02 Room C 110

  • Prof. Virgil  Gligor, Ph. D. Prof. Virgil Gligor, Ph. D.

    Carnegie Mellon University and CyLab, Pittsburg, Pennsylvania, USA
    "Street-Level Semantics for Attribute Authentication"
    June 14, 2012, 3:15-4:15 p.m., !!!! Changes of room and time: TU Darmstadt Piloty-Building S2|02 Room C 205

    Continue

  • Prof. Úlfar   Erlingsson, PhD Prof. Úlfar Erlingsson, PhD

    Google Research, USA
    "Cloud Computing and Software Security"
    February 2, 2012, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof. Dr.  Ueli  Maurer Prof. Dr. Ueli Maurer

    ETH Zurich, Switzerland
    "Constructive Cryptography -- A New Paradigm for Security"
    January 12, 2012, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof.  John Daugman, PhD Prof. John Daugman, PhD

    University of Cambridge, UK
    "Recognising persons by their iris patterns"
    December 8, 2011, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  •  Cédric  Fournet,  PhD Cédric Fournet, PhD

    Microsoft Research, UK
    "Modular Code-Based Cryptographic Verification"
    November 24, 2011, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof. Michael Reiter,  Ph.D. Prof. Michael Reiter, Ph.D.

    Department of Computer Science, University of North Carolina at Chapel Hill, USA
    "Defending against Client Compromises in Client-Server Applications"
    June 30, 2011, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof. Elisa Bertino, Ph.D. Prof. Elisa Bertino, Ph.D.

    CERIAS and Department of Computer Science Purdue University, West Lafayette, Indiana, USA
    "Protecting Information Systems from Insider Threats - Concepts and Issues"
    June 16, 2011, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof. Dr. Rainer Blatt Prof. Dr. Rainer Blatt

    Innsbruck University, Innsbruck, Austria
    "The Quantum Way of Doing Computations"
    May 19, 2011, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110
    Further Information

  • Prof. David Naccache, Ph.D. Prof. David Naccache, Ph.D.

    École normale superiéure, Department of Computer Science, Paris, France
    "On Secret Leakage and Polymorphic Code Design"
    January 27, 2011

    Continue

  • Prof. Vitaly Shmatikov, Ph.D. (Stanford) Prof. Vitaly Shmatikov, Ph.D. (Stanford)

    The University of Texas at Austin, Austin, Texas, U.S.A.
    "The End of Anonymity, The Beginning of Privacy"
    January 13, 2011, TU Darmstadt | Piloty- Building S2/02, Room C110

    Continue

  • Prof. Dr. Audun Jøsang Prof. Dr. Audun Jøsang

    UNIK University Graduate Center, University of Oslo, Oslo, Norway
    "User-Centric Identity Management"
    November 4, 2010, 4:15-5:45 p.m., TU Darmstadt | Piloty- Building S2/02 Room C110

    Continue

  • Prof. Dr.  Jean-Pierre  Hubaux Prof. Dr. Jean-Pierre Hubaux

    Computer Communications and Applications Laboratory 1, Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland
    "Location Privacy and Neighbor Discovery - Attacks, Countermeasures and Game-Theoretic Modeling"
    July 1, 2010, TU Darmstadt | Piloty- Building S2/02-C110

    Continue

  • Prof. Joshua Guttman, Ph.D. Prof. Joshua Guttman, Ph.D.

    Worcester Polytechnic Institute, Worcester, Massachusetts, USA
    "Designing Correct Cryptoprotocols"
    June 17, 2010, 4:45-5:15 p.m., TU Darmstadt | Piloty- Building S2/02-C110

    Continue

  • Prof. Anja Feldmann, Ph.D. (CMU) Prof. Anja Feldmann, Ph.D. (CMU)

    Deutsche Telekom Laboratories, Technische Universität Berlin, Berlin, Germany, An-Institut Deutsche
    "Characteristics of Residential Broadband Internet Traffic"
    December 17, 2009, 4:45-5:15 p.m.

    Continue

  • Prof. Dr. Ronald Cramer Prof. Dr. Ronald Cramer

    Professor, Mathematical Institute, Leiden University, Leiden, Netherlands, Head of the Cryptology and Information Security Research Group, CWI, Amsterdam, Netherlands
    "On a Class of Special Codes Arising in Secure Multi-Party Computation and its Relation to Towers of Algebraic Function Fields"
    December 10, 2009, 4:45-5:15 p.m.

    Continue

  • Prof. Andrew C. Myers, Ph.D. (MIT) Prof. Andrew C. Myers, Ph.D. (MIT)

    "A higher-level abstraction for building decentralized distributed systems"
    October 29, 2009

  • Prof. Somesh Jha, Ph. D. Prof. Somesh Jha, Ph. D.

    "Retrofitting Legacy Code for Security"
    July 2, 2009

  • Prof. Dr. Renato Renner Prof. Dr. Renato Renner

    "Security against Quantum Mechanical Adversaries"
    June 4, 2009

  • Prof. Dr. Bart Preneel Prof. Dr. Bart Preneel

    "Cryptographic Hash Functions Revisited: The NIST SHA-3 Competition"
    May 14, 2009

Talks