Oberseminar
Oberseminar: Recent Advances in IT Security
German original title for this course: "Oberseminar Fortgeschrittene IT-Sicherheit"
Course Objectives and Organization
This seminar is intended to present the results of theses (bachelor, masters, diploma, PhD) and to discuss new publications in the area of information security. New ideas, projects and concepts will be discussed and developed further. The Seminar is regularly held in winter and summer term. The majority of the presentations is given in English. Guests are welcome. A certificate of participation can be issued upon request. All statements without warranty.
Summer Term 2025 (F-635 and Zoom, 12:30-14:00)
- 08.04.2025
- Janik Noel Schug (SVS): tbd
- Eleftherios Eleftheriadis (SVS): tbd
- 15.04.2025
- tbd
- 29.04.2025
- tbd
- 13.05.2025
- tbd
- 20.05.2025
- Maya Herrscher (SVS): Secure Composition of Cryptographic Protocols
- tbd
- 03.06.2025
- August See (NET): PhD Defense?
- 10.06.2025
- Cornelia Brülhart (NET): tbd
- Oliver Wandschneider (NET): tbd
- 17.06.2025
- Kevin Röbert (NET): tbd
- 24.06.2025
- Anum Talpur (NET): tbd
- Liliana Kistenmacher (NET): tbd
- 01.07.2025
- Anne Kunstmann (SVS): Failure Occurences in Mix Networks
- Tatjana Wingarz (NET): tbd
- 08.07.2025
- Sehrish Shafeeq (NET): tbd
- 15.07.2025
- Heiko Bornholdt (NET): tbd
Winter Term 2024 (F-635 and Zoom, 12:30-14:00)
- 15.10.2024
- Eleftherios Eleftheriadis (SVS): A Quantitative Approach to Modeling Cyber Risk - Early Insights
- Janik Schug (SVS): Privacy-preserving Threshold based Authentication and Authorization - Revisited
- 22.10.2024
- Maya Herrscher (SVS): Secure Composition of Cryptographic Protocols
- Niklas Zapatka (SVS): Unifying Attacks on Syntactic Privacy
- 05.11.2024
- Stefan Bavendiek (SVS): Attack Surface Measurement
- Majd Latah (NET): Combining Digital Twins - Revisited
- 12.11.2024
- Tom Petersen (SVS): Distributed Architectures for the Anonymization and Pseudonymization of Medical Research Data (Thesis Test Talk)
- 03.12.2024
- Heiko Bornholdt (NET): Software-Defined Overlay Networking for the Deployment of Distributed Applications at the Edge (Thesis Test Talk)
- 10.12.2024
- Johanna Ansohn McDougall (SVS): Security Challenges and Pitfalls in Wireless Connection Establishment and Communication (Thesis Test Talk)
- 17.12.2024
- Liliana Kistenmacher (NET): Application Fingerprinting on Encrypted Traffic for Intrusion Detection
- Sehrish Shafeeq (NET): False data injection in data aggregation
- 07.01.2025
- Cornelia Brülhart (NET): Breaking networks and detecting time synchronization attacks with dynamic packet analysis
- Moritz Greiner (NET): Optimizing UAV locations for robust communication coverage
- 14.01.2025
- Anne Kunstmann (SVS): Distinguishing faulty from malicious traffic in mix networks
- Tatjana Wingarz (NET): Measuring Privacy
- 21.01.2025
- August See (NET): Thesis Test Talk
- 28.01.2025
- Jeetesh Gupta (NET): C2-Beaconing Detection in the Wild
- Joshua Stock (SVS): Challenges and Solutions for the Training Data Privacy of Machine Learning Models (Thesis Test Talk)
Summer Term 2024 (F-635 and Zoom, 12:30-14:00)
- 02.04.2024
- Anum Talpur: Work Summary
- Majd Latah: Combining Digital Twins
- 14.05.2024
- Niklas Zapatka (SVS): Modelling Privacy-Preserving Data Trusts
- Johanna Ansohn McDougall (SVS): Security Challenges and Pitfalls in Wireless Connection Establishment and Communication
- 28.05.2024
- Liliana Kistenmacher (NET): APT Attack Detection and Intervention
- Heiko Bornholdt (NET): Towards Software-Defined Overlays for Distributed Applications
- 04.06.2024
- Florian Dehling (Hochschule Bonn-Rhein-Sieg): Architectural Approaches for Continuous User Authentication Systems
- 18.06.2024
- Janik Schug (SVS): Privacy-preserving Threshold based Authentication and Authorization
- 25.06.2024
- Joshua Stock (SVS): Machine Learning Privacy
- Sehrish Shafeeq (NET): Ensuring E2e Integrity in Data Aggregation: Combining Hard and Soft Approches
- 02.07.2024
- August See (NET): Android UI Fuzzing
- Jeetesh Gupta (NET): C&C Baeconing Detection
- 09.07.2024
- Anne Kunstmann (SVS): Towards Privacy-Aware Fault Tolerance in Mix Networks
- Cornelia Brülhart (NET): Detecting Time Synchronization Attacks in Time-Sensitive Networks
Winter Term 2023 (F-635 and Zoom, 16:15-17:45)
- 21.11.2023
- Nurefsan Sertbas-Bülbül (NET): Dissertation test talk
- 28.11.2023
- Niklas Zapatka (SVS): Privacy-Preserving Aggregation of Spatial Data
- Monina Schwarz (SVS): IoT Matter(s)
- 05.12.2023
- Johann Ansohn McDougall (SVS): Security Challenges and Pitfalls in Wireless Communication
- Florian Dehling (Hochschule Bonn-Rhein-Sieg): Stability of touch dynamics features across mobile application contexts
- 12.12.2023 15:00
- Joshua Stock (SVS): Black-Box Property Inference Attacks
- Lucas Lange (Universität Leipzig): Data-Driven Tuning for Machine Learning Privacy
- 19.12.2023
- August See (NET): Update Resilient Hooks
- Janik Schug (SVS): Proving cryptographic protection of data processing
- 09.01.2024
- Heiko Bornholdt (NET): Software-Defined Overlays (SDOs) for Distributed Applications
- Cornelia Brülhart (NET): Transparent TSN for Agnostic Endhosts via P4-based Traffic Characterization at Switches
- 16.01.2024
- Tatjana Wingarz (NET): Privacy-preserving Federated Learning at the Edge
- Kevin Röbert (NET): User-Controlled Privacy-Preserving Information Provisioning
- 23.01.2024
- Anne Kunstmann (SVS): Detecting Faulty Mixes with Cryptographic Protocols
- Sehrish Shafeeq (NET): Privacy aware data aggregation
- 30.01.2024
- Pascal Wichmann (SVS): Design of Protected Security-Critical Web Applications (PhD Defense Test Talk)
- Maya Herrscher (SVS): Secure Composition of Cryptographic Protocols
Summer Term 2023 (ESA 125 and Zoom, 16:15-17:45)
- 18.04.2023
- Florian Wilkens (NET): Methods for Enhanced Security Monitoring and APT Detection in Enterprise Networks
- Nurefsan Sertbas-Bülbül (NET) : Secure and Self-Adaptive Mission Critical Time Sensitive Networks
- 02.05.2023
- Pascal Wichmann (SVS): Protecting Web Applications From Compromised Clients
- 09.05.2023
- Doganalp Ergenc (NET): Resilience of Service-oriented and Time-sensitive Mission-critical Networks
- 23.05.2023
- Janik Schug (SVS): Securing biometric access control
- 30.05.2023
- August See (NET): Bot detection using website traversal graphs
- 06.06.2023
- Sehrish Shafeeq (NET): Securing IoT Data Aggregation: An End-to-End Solution
- Joshua Stock (SVS): Machine Learning Privacy
- 13.06.2023
- Anne Kunstmann (SVS): Confirming Communication Anonymously
- Tom Petersen (SVS): Technical Measures and Architectures for Privacy-Preserving, Data-Based Research
- 27.06.2023
- Florian Dehling (Hochschule Bonn-Rhein-Sieg): Impact of Timing-related Web Browser Security Features on Continuous Authentication and User Profiling
- 11.07.2023
- Kevin Röbert (NET): Edge Computing: Real-Time Support via Latency-Aware Scheduling
- Heiko Bornholdt (NET): NAT-Kick
Winter Term 2022 (F-635 and Zoom, 14:15-15:45)
- 01.11.2022
- Doganalp Ergenc (NET): Resilience in Mission-critical Networks
- 08.11.2022
- Marius Stübs (Lawrence Berkeley National Laboratory): Modeling Dynamic Electricity Prices in California and their System Level Impacts
- 22.11.2022
- Tom Petersen (SVS): Differentially Private Statistics for Medical Databases
- Sehrish Shafeeq (NET): End-to-end Integrity Protection in Data Aggregation
- 29.11.2022
- Christian Burkert (SVS): Exposure of Worker Activity Times Through Application Software and Its Limitation
- Nurefsan Sertbas-Bülbül (NET): Fault Tolerance Routing for Time Sensitive Networks
- 06.12.2022
- August See (NET): Encrypted Endpoints to Fight Bots
- 13.12.2022
- Florian Dehling (Hochschule Bonn-Rhein-Sieg): Internet Users’ Willingness to Disclose Biometrics for the Use of Continuous Authentication Systems
- 10.01.2023
- Joshua Stock (SVS): Federated Learning for Official Statistics
- Maya Herrscher (SVS): Secure Composition of Cryptographic Protocols
- 24.01.2023
- Pascal Wichmann (SVS): WebAppAuth: An Architecture to Protect From Compromised First-Party Webservers
- Heiko Bornholdt (NET): Software-Defined Overlays
- 31.01.2023
- Anne Kunstmann (SVS): Towards More Resilience in Anonymization Networks
- Kevin Röbert (NET): Data Trustees as Secure and Privacy-Preserving Data Storage
- 14.02.2023
- Kevin Köster (SVS): Comparison of Low Latency Anonymity Networks
Summer Term 2022 (F-027 and Zoom, 14:15-15:45)
- 12.04.2022
- Maya Herrscher: Privacy-Preserving Web-Based Calendar Application
- Jan Hartkopf: Fingerprinting der KVM-Version aus virtuellen Maschinen
- 19.04.2022
- Sehrish Shafeeq (NET): LDDA: A lightweight Decentralized Data Aggregation
- 24.05.2022
- Florian Dehling (Hochschule Bonn-Rhein-Sieg): Continuous Authentication in Distributed Systems
- 31.05.2022
- Florian Wilkens (NET): Comprehensive APT Detection for Large-scale Networks
- 07.06.2022
- Tom Petersen (SVS): Employing SMPC for Decentralized Anonymization
- Anne Kunstmann (SVS): Availability in Mix-based Applications
- 14.06.2022
- Doganalp Ergenc (NET): Resilience in Mission-critical Networks
- August See (NET): Detecting Website Personalization
- 21.06.2022
- Kevin Röbert (NET): Privacy-Preserving Data Trustee
- Nurefsan Sertbas Bülbül (NET): Towards Self-configured and Secure Time Sensitive Networks
- 28.06.2022
- Pascal Wichmann (SVS): Towards Secure Memory and Password Handling in Web
Applications - Johanna Ansohn McDougall (SVS): Provisioning, Discovery, Connection Establishment and Maintainance of Wireless Connections
- Pascal Wichmann (SVS): Towards Secure Memory and Password Handling in Web
- 05.07.2022
- Joshua Stock (SVS): Defense Strategies Against Property Inference Attacks
- Kevin Köster (SVS): Performance in Anonymity Networks
- 12.07.2022
- Tatjana Wingarz (NET): Secure and Privacy-Preserving Data Storage
- Heiko Bornholdt (NET): TLS Handshake Optimization across NATs
Winter Term 2021 (Virtual seminar, 14:15-15:45)
- 26.10.2021
- Aidmar Wainakh (TU Darmstadt): On Distributed Privacy-Preserving Analytics in Online Social Networks
- 02.11.2021
- Anne Kunstmann (SVS): Increasing Trust in Low-Latency Anonymization Networks
- Doganalp Ergenc (ISS): An Attacker-Defender Game for Resilient Joint Service Allocation and Routing in Virtualized Networks
- 16.11.2021
- Matthias Marx (SVS): Anonymous Communication Networks
- 30.11.2021
- Tatjana Wingarz (ISS): Garbled Circuits and Neural Networks
- 07.12.2021
- Nurefsan Sertbas Bülbül (ISS): Machine Learning assisted TSN Configuration
- Christian Burkert (SVS): Assessing the Privacy Impact of Timestamp Data Minimisation
- 14.12.2021
- Joshua Stock (SVS): Unlearning as a Defense Strategy against Property Inference Attacks (PIAs)
- Jens Wettlaufer (SVS/ISS): Insights and Enhancement of Flow-based Anomaly Detection of DDoS attacks using Black-box Inference Techniques
- 04.01.2022
- Kevin Köster (SVS): Modifying the maximal circuit dirtiness in Tor
- Jens Lindemann (SVS): VM Placement to Counter Co-Residence Atacks
- 11.01.2022
- Pascal Wichmann (SVS): Reducing Required Trust into Individual Parties on the Web
- 18.01.2022
- August See (NET): Evaluating Third-Party Anti-bot Services
- Heiko Bornholdt (NET): Design of a secure transport middleware for P2P application development
- 25.01.2022
- Johanna Ansohn McDougall (SVS): Current State of Probe Requests
- Florian Wilkens (NET): Explainable APT Detection via Data Provenance
Summer Term 2021 (Virtual seminar, 14:15-15:45)
- 06.04.2021
- Alexander Groddeck, Jurik Karimian, Kevin Köster, Marius Stübs: Student Project on A Cellular Approach for Energy Agents
- 13.04.2021
- Kai Schmees: Patching von Sicherheitslücken in IoT-Geräten in kritischen Infrastrukturen
- 04.05.2021
- Eldar Sultanow, CapGemini: Smarte Verteidigung: Angriffsszenarien und Abwehrkonzepte
- 11.05.2021
- Adrian Michalek: Automatische S/MIME-Zertifikatsgenerierung in Thunderbird für GNU/Linux
- Alexander Groddeck: Detection and Sanitization of Malicious Media File Uploads in Web Applications
- 25.05.2021
- Florian Wilkens (ISS): APT Detection via Data Provenance
- Tom Petersen (SVS): Details on Decentralized Anonymisation
- 01.06.2021
- Christian Burkert (SVS): Understanding User Demand for Precision of Displayed Timestamps in DevOps Software
- 08.06.2021
- Joshua Stock (SVS): Property Inference Attacks and Defense Strategies
- Jens Wettlaufer (ISS/SVS): Property Inference-based Federated Learning Groups for Collaborative Network Anomaly Detection
- 15.06.2021
- Nurefsan Sertbas Bülbül (ISS): Low Latency Communication with 5G Networks
- Tobias Mueller (SVS): Finding Paths in the Web of Trust
- 29.06.2021
- Pascal Wichmann (SVS): Analyzing Use and Possible Misuse of the Web Cryptography API
- Doganalp Ergenc (ISS):Topology-design for Resilient Time-sensitive Networks
- 06.07.2021
- August See (ISS): Transforming Base APIs to Fight Bots
Winter Term 2020 (Virtual seminar, 14:15-15:45)
- 24.11.2020
- Tatjana Wingarz (ISS): Privacy-preserving Face Recognition using Homomorphic Encryption and Neural Networks
- Jens Wettlaufer (ISS/SVS): Privacy-respecting Collaborative Anomaly Detection - A Leveled Approach
- 01.12.2020
- Christian Burkert (SVS): Analysing Personal Data Usage in Apps based on Database Schemes
- 08.12.2020
- Marius Stübs (SVS): Trust, but Verify? Self-Organization in Smart Grids
- 15.12.2020
- Florian Wilkens (ISS): Kill Chain-based Detection of Advanced Persistent Threats
- 12.01.2021
- Pascal Wichmann (SVS): Security and Protective Measures of Modern Web Technologies
- 19.01.2021
- Tom Petersen (SVS): Decentralized Anonymization of Distributed Data
- Joshua Stock (SVS): Privacy Attacks on Machine Learning Models
- 26.01.2021
- Nurefsan Sertbas Bülbül (ISS): Evaluating dynamic migration of time-triggered flows in TSN
- Daniel Demmler (SVS): Towards Practical Privacy-Preserving Protocols (Short Talk)
- 02.02.2021
- Doganalp Ergenc (ISS): Resilience of Embedded IoT Networks
- Kai Bavendiek (TUHH): The σ-Calculus - A process calculus for privacy-preserving protocols in location-based service systems
- 09.02.2021
- Monina Schwarz (SVS): Aspects of IoT Forensics - SPI Interface
- Matthias Marx (SVS): IPv6 Prefix Randomization
- 16.02.2021
- Tobias Mueller (SVS): Lifecycle Management for Public Keys
- Torge Hinrichs (HAW): Vulnerability Detection in Source Code using Machine Learning
Summer Term 2020 (Virtual seminar, 14:15-15:45)
- 05.05.2020
- Doganalp Ergenc (ISS): On Reliability of Frame Replication and Elimination Mechanism in Time-sensitive Networking
- Mert Baskaya (Middle East Technical University): A Distributed Architecture for Health Monitoring and Personalized Behavior Change Interventions
- 12.05.2020
- Joshua Stock (SVS): Attacking a PRG using CSP refutation and football graphs
- Jens Wettlaufer (SVS/ISS): Privacy, Collaboration, and Intrusion Detection in Heterogeneous Networks
- 19.05.2020
- Florian Wilkens (ISS): APT Contextualization via a network-based Killchain State-Machine
- David Jost (ISS): Complex Event Processing and Integrity in Distributed Networks
- 26.05.2020
- Maximilian Blochberger (SVS): macOS Sandbox Coverage: Challenges for Dynamic Analysis of macOS Applications
- 09.06.2020
- Steffen Haas (ISS): Security Monitoring and Alert Correlation for Intrusion Detection in Large Networks
- 16.06.2020
- Tom Petersen (SVS): Key Management for Threshold Decryption
- Nurefsan Sertbas-Bülbül (ISS): Dynamic Configuration of Time Sensitive Networks
- 23.06.2020
- Tobias Mueller (SVS): Improving Privacy and Efficiency of OpenPGP Certificate Updates
- 30.06.2020
- Monina Schwarz (SVS): Find evidence in ZigBee communication
- Marius Stübs (SVS): Smart Grid Security.
- 14.07.2020
- Matthias Marx (SVS): Anti-Abuse Measures for Tor
- Johanna Nehring-Ansohn (SVS): Patching Techniques for IoT devices - An Overview
Winter Term 2019/2020 (F-027, 14:15-15:45)
- 15.10.2019
- Jonas Herskind Sejr (University of Southern Denmark and LEGO): A critical review of outliers
- 22.10.2019
- Doganalp Ergenc (ISS): Service-based Resilience in Modern Embedded Networks
- 05.11.2019
- Matthias Marx (SVS): Mitigating Abuse of Tor
- Jenny Dietrich (Deloitte): Cloud computing
- 12.11.2019
- Ephraim Zimmer (SVS): Insider - Definition, Mitigation and Protection
- Steffen Haas (ISS): Large-Scale Monitoring and Alert Correlation for Network Security
- 19.11.2019
- Johanna Nehring-Ansohn (SVS): Automatic Reverse Engineering and Patching of IoT Firmware
- Tom Petersen (SVS): Privacy-compliant and Multilateral Secure Systems for Medical Research
- 03.12.2019
- Florian Wilkens (ISS): Characterizing Automated Scanners via Honeypots
- David Jost (ISS): Security in Distributed Sensor Networks
- 10.12.2019
- Christian Burkert (SVS): Inferring Behavioural Patterns from Git Metadata and Countermeasures
- Tobias Mueller (SVS): Publish and Perish: Hardening Dissemination of Public Keys
- 17.12.2019
- Nurefsan Sertbas-Bülbül (ISS): Enabling Tactile Internet, Vision and Open Challenges
- 07.01.2020
- Marius Stübs (SVS): IT Security & Resilience for Distributed Smart Grid Control
- Erik Sy (SVS): Enhanced Performance and Privacy for Core Internet Protocols
- 14.01.2020
- Monina Schwarz (SVS): IoT Forensics - From a hardware perspective to hidden object search
- Malte Hamann (ISS): Moving Target Defense
- 28.01.2020
- Prof. Dr. Wilfried Honekamp (Akademie der Polizei): Sicherheitslücken in Schiffsnavigationssystemen
- Prof. Dr. Wolfgang Lindner (Akademie der Polizei): Digitale Spuren
Summer Term 2019 (F-027, 15:15-16:45)
- 09.04.2019
- Maximilian Conrad (SVS): Design of a maritime IT security reporting framework regarding container ships
- Daniel Demmler (TU Darmstadt): Towards Practical Privacy-Preserving Protocols
- 16.04.2019
- Felix Favre (SVS): Einsatz von Raft zwischen verteilten Energiesystemen
- Hoai Viet Nguyen (TH Köln): Security Threats in Web Caching Systems
- 23.04.2019
- Doganalp Ergenc (ISS): Control and User Plane Separation in Wireless Ad-hoc Networks
- Nurefsan Sertbas (ISS): Trust Enhanced Secure Routing in SDN
- 30.04.2019
- Christian Burkert (SVS): Privacy Design Patterns for Minimising Timestamp Usage in Application Software
- 07.05.2019
- Steffen Haas (ISS): Large-Scale Monitoring and Alert Correlation for Network Security
- 14.05.2019
- Davood Babazadeh (OFFIS): Methods to Enhance Cyber-Physical Resilience in Energy Systems
- Malte Hamann (ISS): NFV Heuristics - fast vs efficient placement
- 21.05.2019
- David Jost (ISS): On Data Integrity in In-Network Data Aggregation
- 28.05.2019
- Johanna Nehring-Ansohn (SVS): Security Evaluations of IoT Systems
- Monina Schwarz (SVS): IoT Forensics from a Hardware Perspective
- 04.06.2019
- Tom Petersen (SVS): Privacy-compliant and Multilateral Secure Systems for Medical Research
- Erik Sy (SVS): Enhanced Performance and Privacy for the Web
- 11.06.2019
- Florian Wilkens (ISS): On Threat Intelligence and Collaborative Intrusion Detection
- 18.06.2019
- Nurefsan Sertbas (ISS): Aggregate based Congestion Control in SDN
- Doganalp Ergenc (ISS): Resilience in Safety-critical Embedded Networks
- 25.06.2019
- Max Blochberger (SVS): Adoption of Security & Privacy Mechanisms
- Marius Stübs (SVS): IT-Security in Self-Organizing Decentralized Virtual Power Plants
- 02.07.2019
- Jens Lindemann (SVS): Application Detection Across Virtual Machines and Countermeasures Against Memory Deduplication Side-Channels
- 09.07.2019
- Timo Frühbrodt, Jan Gaetcke, Julian Frangopolis, Anne Kunstmann, Philip Gawehn: Abschlusspräsentation SVS-Masterprojekt
Winter Term 2018 (ZFW, Schlüterstr. 51, 20146 Hamburg, Room 3025, 17:15-18:45)
- 23.10.2018
- Maxim Anikeev (South-Russian Educational and Research Center for IT-Security)
- Tobias Mueller (SVS): Revocation non-equivocation through Certificate Transparency
- 06.11.2018
- Hanno Böck: E-Mail, E-fail, and other Failures
- David Jost (ISS): Data Quality and Trust Management
- 20.11.2018
- Florian Ebert (Deloitte): Data protection in connected cars
- Steffen Haas (ISS): tba
- 27.11.2018
- Ephraim Zimmer (SVS): Malware and Activity Monitoring via System Call Graphs
- Marius Stübs (SVS): Resilience of Decentralized Control Algorithms and Distributed Power Grid Simulation
- 11.12.2018
- Maximilian Blochberger (SVS): macOS Sandbox Adoption
- Florian Wilkens (ISS): APT Detection & Threat Intelligence
- 18.12.2018
- Jens Lindemann (SVS): Application Detection Across Virtual Machines via Memory Deduplication Side-Channels
- Erik Sy (SVS): On building a fast and privacy-friendly Internet
- 08.01.2019
- Matthias Marx (SVS): Anonymity Online
- 15.01.2019
- Prof. Kwok-yan Lam (Cyber Security Agency Singapore, SVA): Research Activities on Cybersecurity and Privacy-Preserving Technologies for Smart Nation
- 29.01.2019
- Tom Petersen (SVS): Enforcing the Four Eyes Principle via Cryptography
- Malte Hamann (ISS): Resilient and Efficient Future Networks
Summer Term 2018 (ZFW, Schlüterstr. 51, 20146 Hamburg, Room 3025, 17:15-18:45)
- 17.04.2018
- Steffen Haas (ISS): Large-Scale Alert Correlation for Collaborative Security
- Matthias Marx (SVS): Hashing of personally identifiable information is not sufficient
- 24.04.2018
- Florian Wilkens (ISS): Projektübersicht: IMMUNE
- David Jost (ISS): Projektübersicht: SANE
- 08.05.2018
- Matthias Valentin (Tenzir GmbH)
- Christian Burkert (SVS): Analysis of Timestamp Usage
- 29.05.2018
- Marius Stübs (SVS): IT Security in distributed virtual Power Plants
- 12.06.2018
- Stefan Kelm (DFN-CERT)
- Jonas Herskind Sejr (University of Southern Denmark)
- 26.06.2018
- Erik Sy (SVS): Tracking und Maßnahmen zum Selbstdatenschutz
- 10.07.2018
- Maximilian Blochberger (SVS): App Transport Security: TLS Configuration for iOS & macOS Applications
Winter Term 2017 (ZFW, Schlüterstr. 51, 20146 Hamburg, Raum 3025, 18:15-19:45)
- 24.10.2017
- Marius Stübs (SVS): IT Security in the Power Grid
- Tobias Mueller (SVS): Trusting the Web of the Web of Trust
- 07.11.2017
- Yvonne Küstermann (Gastvortrag): Formal Toolbox for Security
- Maximilian Blochberger (SVS): User-facing Privacy in Mobile Applications
- 21.11.2017
- Andreas Dondera (LKA Hamburg): Cybercrime aus polizeilicher Sicht – Aktuelle Phänomene und Handlungsempfehlungen der Polizei Hamburg
- 12.12.2017
- Steffen Haas (ISS): Large-Scale Alert Correlation for Collaborative Security
- Christian Burkert (SVS): Formalizing Privacy Assumptions (working title)
- 09.01.2018
- Erik Sy (SVS): Tracking und Maßnahmen zum Selbstdatenschutz
- Jens Lindemann (SVS): Confidentiality Issues in IaaS Cloud Computing
- 23.01.2018
- Ephraim Zimmer (SVS): Balancing Privacy of Individuals and Detectability of Insider Attackers
- Matthias Marx (SVS): Lightweight Anonymity
- 30.01.2018
- Hoai Viet Nguyen (TH Köln): Mind the Cache: Large-Scale Analysis of Web Caching Systems
Summer Term 2017 (AWW, Schlüterstr. 51, 20146 Hamburg, Raum 3025, 18:15-19:45)
- 11.04.2017
- Dieter Gollmann (SVA): Blockchain
- 25.04.2017
- Ephraim Zimmer (SVS): Insider vs. Inside - Distinct Types of Insider Attackers
- Erik Sy (SVS): Tracking und Targeting: Einblicke in die Gegenwart und Zukunft der Online-Werbung
- 09.05.2017
- Florian Gondesen (SVA): EEG-based Biometrics
- Ralf C. Staudemeyer (Uni Passau): Internet-of-Things integrity protection in practise
- 23.05.2017
- Stefanie Jasser (SVS): Architekturkonformanz von Informationssystemen hinsichtlich Security
- Joschka Hüllmann (ISS): Measurement of Social Capital in Enterprise Social Networks
- 13.06.2017
- Maximilian Blochberger (SVS): Causal Effects on Privacy from User Interactions for Mobile Applications
- Matthias Marx (SVS): Anonymous Communication Networks with Multiple Levels of Anonymity
- 20.06.2017
- Steffen Haas (ISS): Large-Scale Alert Correlation for Collaborative Security
- Matthias Kühl (dezera GmbH): Sicherheitsrelevante Aspekte der dezera-Plattform zur Handelsintegration flexibler Stromverbrauchs- und Erzeugungsanlagen
- 04.07.2017
- Jens Lindemann (SVS): Revealing Software in Co-Located VMs via Memory Deduplication Side Channels
- Christian Burkert (SVS): Timestamp Privacy by Design: Mitigating Human Performance Monitoring with DevOps Tools
Winter Term 2016 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 25.10.2016
- Nickolas Webb (SVS): Comparison and cultural background of training and awareness programs in national and international information security management standards
- Tobias Krichel (SVS): Analyse von Browser-Fingerprinting-Techniken und Evaluation von Gegenmaßnahmen
- 08.11.2016
- Stallone Jiokeng (SVS): Datenschutzfreundliche Erkennung von Insiderangriffen
- Ernesto Isaac Ramírez Silva (SVA): Framework for Detecting Cheating in Virtual Running Competitions: The Adidas MiCoach Winter Warrior Challenge Case Study
- Introduction Working Group Prof. Mathias Fischer
- 15.11.2016
- Fenio Hoffmann (SVS): Die Brute-Force-Resistenz von Verschlüsselungs-Implementationen am Beispiel von Bitcoin-Wallet-Software
- Tobias Scheidt (SVS): IPv6-Prefix-Anonymisierung
- 29.11.2016 Gastvortrag
- Hoai Viet Nguyen (TH Köln): Sicherheit für REST-basierte verteilte Systeme
- 13.12.2016
- Johanna Nehring-Ansohn (SVS): Konzeption, Implementation und Evaluation eines Wireless Access Point zum anonymen Surfen mit TOR und JAP
- Philipp Khan (SVS): Nutzbarmachung einer Anwendung zum IoT-Security Assessment unter Berücksichtigung bekannter IT-Sicherheitsstandards
- 20.12.2016
- Masterprojekt IT-Sicherheit Abschlusspräsentationen
- 10.01.2017
- Sadaf Momeni (SVS): Assessment and Improvement of IPTV Service Availability in Vehicular Networks
- 24.01.2017 Gastvortrag
- Falk Lindner (Silver Atena): Security Engineering bei SILVER ATENA: Schnittstelle aus IT-Sicherheit, Funktionaler Sicherheit und Entwicklung
Summer Term 2016 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 12.04.2016
- Christopher Grube (SVS): Konzeptionierung eines Verfahrens zur Gewinnung großer, anonymer, konsistenter Testdatenbestände im ERP-Umfeld
- 26.04.2016
- Nicolai Tschacher (SVS): Typo squatting in programming language package managers
- Martin Lebiedz (SVA): Anonymisierung in Tor
- 10.05.2016
- Sven M. Hallberg (SVA): Language-Theoretic Lessons in Protocol Design
- Philip Lysenko (SVS): Kryptanalyse von A5 im GSM-Standard
- 24.05.2016
- Jan-Niclas Fierenz (SVS): Geoblocking – Technische Möglichkeiten und praktische Realisierungen
- Roman Prosch (SVS): Handling budget-constraints in implementing an ISMS
- 07.06.2016
- Henning Pridöhl (SVS): Salzspeicher – An Encrypting File Synchronization And Sharing Tool
- 21.06.2016
- Timo Möhlmann (SVS): Neueste Entwicklungen des IT-Sicherheitsprotokolls TLS
- Philipp Krug (SVS): Analyse und Bewertung der Sicherheits- und Bedrohungslage von IoT-Anwendungen
- 05.07.2016
- Bahareh Shojaie (SVS): Getting the Full Benefits of the ISO 27001 to Develop an ISMS
Winter Term 2015 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 13.10.2015 SVS
- Lucas Henning (SVS): Konzeption und Implementierung einer zentralen Logging-Lösung unter Einhaltung deutscher Datensicherheits- und Datenschutzauflagen
- Jan Sönke Ruge (SVS): Seitenkanal-Angriffe auf RSA mithilfe eines Software Defined Radio
- 27.10.2015 SVA
- Christina Brzuska (SVA)
- 10.11.2015 Gastvortrag/SVS
- Heiner Grottendieck (T-Systems): Themenschwerpunkte bei Security und Datenschutz im Umfeld der Digitalen Transformation
- Lukas Skibowski (SVS): Entwicklung eines Protokolls zur sicheren Nutzung von Beacons
- 24.11.2015 SVS
- Rene Sichler (SVS): IT-Sicherheitsmanagement beim Betrieb von Windenergieanlagen
- Jens Lindemann (SVS): Detecting and Preventing Abuse of Resources in IaaS Cloud Computing
- 08.12.2015 SVS
- Jakob Rieck (SVS): On the security of firmware updates for fitness trackers
- Tim Klupp (SVS): Technische Möglichkeiten und Grenzen von Zensurmethoden und Zensurinfrastrukturen im Internet
- 15.12.2015 SVS
- Abschlusspräsentation des Masterprojekts (SVS): Konzeption, Implementation und Evaluation eines Wireless Access Point zum anonymen Surfen mit TOR und JAP
- 05.01.2016 Gastvortrag/SVA
- Hannes Molsen (Draeger): IT-Sicherheit in der Medizintechnik
- 12.01.2016 SVS
- Bahareh Shojaie (SVS): Cultural Aspects of Information Security Management
- Tom Petersen (SVS): Funktionsweise, Angriffe und Abwehrmechanismen von SSL/TLS
- 26.01.2016 SVA
- Matthias Marx (SVA): EEG-based visual P300 authentication
Summer Term 2015 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 07.04.2015 Gastvortrag
- Andreas Kurtz (Uni Erlangen): Dynamische Analyse und Privatsphäre-Auswirkungen von Apple iOS Apps
- 21.04.2015 SVA
- prepared by SVA group
- 05.05.2015 SVA
- Yuriy Varshavskyy: Security Analysis of XML-Encryption by SOAP-Communication in the Context of Web Services
- 19.05.2015 Gastvortrag
- Wilfried Honekamp (Akademie der Polizei Hamburg): IT-Forensik der Polizei: Ersteinschreiter, Beweissicherer und Auswerter
- 02.06.2015 Gastvortrag
- Jinwei Hu (TU Darmstadt): CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement
- 16.06.2015 SVS/Gastvortrag
- David Jost (SVS): Verschlüsselte kollaborative Echtzeit-Textbearbeitung auf nicht vertrauenswürdigen Servern
- Wulf Harder (QuBalt GmbH Neumünster): Informationstheoretisch sichere Authentifizierung
- 30.06.2015 SVS/SVA
- Fabian Beterke (SVS): Distributed Evolutionary Fuzzing
- Marius Hünert (SVA): High Frequency Steady State Visually Evoked Potential (SSVEP) Using 144 Hz Monitor Technology
Winter Term 2014 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 14.10.2014 Vorbesprechung und Vorträge SVS
- Florian Steffens: Kollaboratives Notfallmanagement – Entwicklung einer Anwendung zum Austausch von Notfallübungen
- Jan Carsten Lohmüller: Entwurf und Implementierung eines Berechtigungskonzepts für eine Bank
- 28.10.2014 SVS/SVA
- Henrik Losch (SVS): Unterstützung der Ziele von „Solvency II“ durch vorgehensmodellbasiertes IT-Sicherheitsmanagement
- Arne Kanese (SVA): Implementierung eines sicheren Updateverfahrens für ein Kiosksystem
- 11.11.2014 Gastvortrag
- Satyanarayana Vuppala (Uni Bremen): Physical Layer Secrecy in Wireless Random Networks
- 25.11.2014 SVS/SVA
- Florian Maier (SVS): A comparison of national and international Information Security Standards based on cultural differences
- Alexander Isakov (SVA): Entropie-basierte Erkennung von Anomalien in industriellen Steuerungssystemen
- Stephan Hoepfner (SVS): Fingerprinting Techniken auf Basis des Domain Name Systems
- 09.12.2014 SVS
- Felix Kiehn, Corvin Prigge: Mikroverkehrssimulation von mobilen Fahrzeugnetzen - Erweiterung des VANET-Simulators um GPS-Traces sowie das Intelligent-Driver Model (IDM)
- Stefan Rode: Automatisierte verteilte Versuchsdurchführung im gMix-Framework
- 13.01.2015 Gastvortrag
- Dr. Björn Fay (NXP): Secure Coding, Why and How
- 27.01.2015 Gastvortrag und Nachbesprechung
- Matthias Rohr (secodis GmbH): Security Test Automatisierung
Summer Term 2014 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 08.04.2014 SVS/SVA Vorbesprechung und Thema Sichere Softwarearchitekturen
- Tilmann Stehle (SWK): App-Stores und Software-Sicherheit
- Hannes Federrath: Access control models of iOS and Android
- 22.04.2014 SVS
- Bahareh Shojaie: ISO 27001 from 1995 until now
- 29.04.2014 SVA
- Nicolas Lang: Revisiting Traditional Stack Overflow Exploits on State-of-the-Art Linux Systems
- 20.05.2014 SVS
- Martin Hinsch: Über die geschichtliche Entwicklung des IT-Sicherheitsmanagements
- Sven Thöne: Überschreibungs- und Fälschunssicherheit von Patientendokumentationen im Gesundheitsbereich
- 27.05.2014 SVS
- Christian Schäff (Ohm-Hochschule Nürnberg): Browser taint analysis
- 17.06.2014 SVS
- Jacob Tiedemann: Schutz durch Honey Encryption und Honeywords
- 24.06.2014 SVS/SVA
- Tobias Mueller: Reliable mitigation of DOM-based XSS
- Barbara Kordy (University Luxemburg): On optimistic multi-party contract signing protocols
- 08.07.2014 Nachbesprechung
Winter Term 2013 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 15.10.2013 Vorbesprechung
- 29.10.2013 SVS
- Max Maaß: Semantische Schnittmengen-Angriffe auf Range Queries im DNS
- 12.11.2013 SVA
- Florian Gondesen: Interation visueller und taktiler Steady State Evoked Potentials bei multimodalen Brain-Computer-Interfaces
- 19.11.2013 SVS
- Miriam Wellhausen: Usability-Aspekte bei der Erzeugung von S/MIME-Zertifikaten und der Nutzung von S/MIME
- 10.12.2013 SVA/SVA
- Discussion on “Software Architectures and Security”
- 07.01.2014 SVS
- Ephraim Zimmer (TU Dresden): Post-Quantum Cryptography for IPsec
- 14.01.2014 SVS
- Thomas Reinhold (Institut für Friedensforschung und Sicherheitspolitik): Software als Waffe - Ein Überblick über staatliche und militärische Cyberwar-Programme und deren technisches Potential
- 21.01.2014 Nachbesprechung
Summer Term 2013 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 16.04.2013 SVA
- Stefan Wendzel (Hochschule Augsburg): Covert Channel-internal Control Protocols
- 30.04.2013 SVS
- Christoph Gerber: Kollaboratives IT-Sicherheitsmanagement
- 14.05.2013 SVS
- Jens Lindemann: Techniques for Confidential Transmission of Messages in the Domain Name System
- 11.06.2013 SVA/SVS
- Discussion of teaching concepts of SVA and SVS
- 25.06.2013 SVA
- Barbara Kordy (University Luxemburg): Probabilistic assessment of attack-defense scenarios
Winter Term 2012 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 16.10.2012 SVS
- Tim Krämer: Prototypische Erstellung eines Online-Bestellmoduls für Schließanlagen
- 30.10.2012 SVA/SVS
- Fabian Jürgens: Datenschutzfreundliche Techniken für das Smart Grid
- Dieter Gollmann: Veracity, Plausibility, and Reputation
- 13.11.2012 SVS
- Johannes Bumüller: Entwicklung einer Fortschrittsvisualisierungskomponente zur Vorgehensweise nach BSI-Grundschutz
- Sven Mutzl: Privatsphäre erhaltende Dokumentvergleichsysteme
- 27.11.2012 SVA/SVS
- Andrea Micheloni: A p2p network to thwart SSL/TLS-based MitM attacks
- Simon Stoye: Implementation Billinearer Maps und komplexer Sicherheitsprotokolle in einem Zero-Knowledge-Compiler
- 18.12.2012 SVA/SVS
- Sascha Leyer: Data Tainting in ActionScript
- Andreas Köhn: Entwicklung eines Kennzahlensystems zum überbetrieblichen Informationsaustausch im BSI-Grundschutz
- 08.01.2013 SVA/SVS
- Christian Schäff (Ohm-Hochschule Nürnberg): Client-side Privacy Awareness and Protection on the Internet
- Olga Lebsack: Veracity
- 22.01.2013 SVA
- Maryna Krotofil: Securing Critifcal Infrastructure: Cybergeddon is rescheduled
Summer Term 2012 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 24.04.2012 SVS
- Andreas Tomandl (Uni Regensburg): Evaluation of concepts to protect privacy in VANETs
- 08.05.2012 SVA
- Roland Schilling: Design of a minimal-overhead security concept for controller area networks
- 22.05.2012 SVS
- Lennart Burmeister: DNS Architecture, Protocols, Applications
- 19.06.2012 SVS/SVA
- Stephanie Herbstmann: About INDECT and the consequences for our society of a surveillance state
- Bradley Manning: Automatic Detection of Household Devices from Consumption Profiles
- 03.07.2012 SVS/SVA
- Daniel Lieck: Security of Virtual Systems
- Raimar Grosse: Entwicklung eines Test-Tools zur Überprüfung einer 2-Faktor-Radius-Authentifizierung
- 10.07.2012 SVS (in Stellingen)
- Christine Arndt: IPv6 Privacy Enhancements
- Stephanie Herbstmann: Schwächen der WLAN-Verschlüsselung mit didaktischer Aufbereitung (inkl. Filmvorführung)
Winter Term 2011 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 18.10.2011 SVS/SVA
- Sahil Sharma: Application of Smart Card Technology in a Smart Metering Gateway
- Brian Wetzl: Unsicherheiten von virtualisierten Systemen
- Andre Zoledziowski: Methoden zum Lauschangriff auf GSM-Netze
- 01.11.2011 SVA
- Sujaritha Vettukadu Sankarababu: Vulnerabilities in current session management approaches through the protocol layers
- 08.11.2011 SVS
- Dominik Herrmann: Exploiting Behavioral UsagePatterns to Track Web Users
- 15.11.2011 SVS
- Karl-Peter Fuchs: Performance Evaluation of Mix Cascades for Web Traffic - work in progress
- 22.11.2011 SVA
- Christian Reimann: Implementierung einer sicheren Übertragungsstrecke zwischen Smart Meter und Gateway basierend auf SML
- Lazarel Gjenari: Formale Analyse eines Smart-Card-Protokolls unter Berücksichtigung des inneren Verhaltens der Karte
- 29.11.2011 SVS
- Lukas Kucharski: Untersuchung zum unternehmensübergreifenden Datenaustausch im IT-Sicherheitsbereich
- Florian Scheuer (Uni Regensburg): Analyzing privacy protection techniques in VANETs
- Stefan Penninger: Usability of CAPTCHA-Systems
- 06.12.2011 SVA
- Prof. Dr. Dieter Gollmann: From Insider Threats to Business Processes that are Secure-by-Design
- 13.12.2011 SVS
- Philipp Haseloff: Beschreibung pseudonymer Bezahlverfahren am Beispiel Bitcoin
- Ömer Günyar: Kennzahlen und Methoden des quantitativen IT-Sicherheitsmanagements
- Behzad Zanjani: Penetrationstests - Methodik und Architektur
- 17.01.2012 SVA/SVS
- Johannes Twiefel: Sicherheitsprobleme der Windows-API und mögliche Gegenmaßnahmen
- 24.01.2012 SVS
- Christian Baumann für das Masterprojekt IT-Sicherheit: Electronic Envelope
Summer Term 2011 (RRZ, Schlüterstraße 70, Raum 304, 18:15-19:45)
- 12.04.2011 Vorbesprechung
- 10.05.2011 Vortrag SVS
- Prof. Dr. Hannes Federrath: Überblick über die aktuellen Forschungsthemen des Arbeitsbereichs SVS
- Dominik Herrmann: Techniken zum datenschutzfreundlichen Zugriff auf DNS-Server
- 17.05.2011 Lecture SVA
- Simon Stoye: Hardening an embedded Linux system for MUC applications
- Felix Kurth: Montgomery Exponentiation for Zero-Knowledge-Proofs on Graphics Cards
- 24.05.2011 by SVS
- Christoph Gerber: Cross-company security benchmarking
- 31.05.2011 SVS
- Karl-Peter Fuchs: Safety-preserving Mix zones for Vehicular ad-hoc networks (VANETs)
- 07.06.2011 SVA
- Assadarat Khurat: An OWL Ontology for P3P - Formalizing and Reasoning with P3P Policies Using a Semantic Web Ontology
- 28.06.2011 SVA
- Tobias Jeske: Privacy-Preserving Smart Metering without a Trusted-Third-Party
- 12.07.2011 Debriefing