Seminar: Current Topics in IT Security
- this course in the course catalog
- further material can be found in koaLA
Topics
1) Nonce misuse-resistant encryption: objective, goals, definitions, constructions
https://eprint.iacr.org/2015/102
https://tools.ietf.org/html/draft-irtf-cfrg-gcmsiv-06
2) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
https://eprint.iacr.org/2017/806
3) Walkie-Talkie: An Efficient Défense Against Passive Website Fingerprinting Attacks
http://www.cypherpunks.ca/~iang/pubs/walkie-usenix17.pdf
4) DolphinAttack: Inaudible Voice Commands
https://acmccs.github.io/papers/p103-zhangAemb.pdf
5) A Surfeit of Cipher Suites
http://www.isg.rhul.ac.uk/~kp/surfeit.pdf
6) Removing Secrets from Android’s TLS
http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_01B-3_Lee_paper.pdf
7) Trojaning Attack on Neural Networks
http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_03A-5_Liu_paper.pdf
8) The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli
https://acmccs.github.io/papers/p1631-nemecA.pdf
9) Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
https://acmccs.github.io/papers/p859-xiaoA.pdf
10) Indiscreet Logs: Diffie-Hellman Backdoors in TLS
11) VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_03A-2_Li_paper.pdf
12) Revive: Rebalancing Off-Blockchain Payment Networks
https://acmccs.github.io/papers/p439-khalilA.pdf
13) Bolt: Anonymous Payment Channels for Decentralized Currencies
https://acmccs.github.io/papers/p473-greenA.pdf
14) On the Security and Performance of Proof of Work Blockchains
https://eprint.iacr.org/2016/555.pdf
15) Generic Semantic Security against a Kleptographic Adversary
https://acmccs.github.io/papers/p907-russellA.pdf
16)Deterministic Browser
https://acmccs.github.io/papers/p163-caoA.pdf
17) Simple Proofs of Sequential Work
https://eprint.iacr.org/2018/183.pdf
18) Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains
https://acmccs.github.io/papers/p537-liuA.pdf
19) T/Key: Second-Factor Authentication From Secure Hash Chains