Sem­in­ar: Cur­rent Top­ics in IT Se­cur­ity

Topics

1) Nonce misuse-resistant encryption: objective, goals, definitions, constructions

https://eprint.iacr.org/2015/102
https://tools.ietf.org/html/draft-irtf-cfrg-gcmsiv-06

 

2) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519

https://eprint.iacr.org/2017/806

 

3) Walkie-Talkie: An Efficient Défense Against Passive Website Fingerprinting Attacks

http://www.cypherpunks.ca/~iang/pubs/walkie-usenix17.pdf

 

4) DolphinAttack: Inaudible Voice Commands

https://acmccs.github.io/papers/p103-zhangAemb.pdf

 

5) A Surfeit of Cipher Suites 

http://www.isg.rhul.ac.uk/~kp/surfeit.pdf

 

 6) Removing Secrets from Android’s TLS

 http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_01B-3_Lee_paper.pdf

  

7) Trojaning Attack on Neural Networks

 http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_03A-5_Liu_paper.pdf

  

8) The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli

https://acmccs.github.io/papers/p1631-nemecA.pdf

 

9) Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves

https://acmccs.github.io/papers/p859-xiaoA.pdf

 

10) Indiscreet Logs: Diffie-Hellman Backdoors in TLS

http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/ndss2017_04A-2_Dorey_paper.pdf

 

11) VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_03A-2_Li_paper.pdf

  

12) Revive: Rebalancing Off-Blockchain Payment Networks

https://acmccs.github.io/papers/p439-khalilA.pdf

 

13) Bolt: Anonymous Payment Channels for Decentralized Currencies
https://acmccs.github.io/papers/p473-greenA.pdf

 

14) On the Security and Performance of Proof of Work Blockchains

https://eprint.iacr.org/2016/555.pdf

 

15) Generic Semantic Security against a Kleptographic Adversary

https://acmccs.github.io/papers/p907-russellA.pdf

 

16)Deterministic Browser

https://acmccs.github.io/papers/p163-caoA.pdf

 

17) Simple Proofs of Sequential Work

https://eprint.iacr.org/2018/183.pdf

 

18) Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains

https://acmccs.github.io/papers/p537-liuA.pdf

 

19) T/Key: Second-Factor Authentication From Secure Hash Chains

https://acmccs.github.io/papers/p983-koganA.pdf