Se­mi­nar: Cur­rent To­pics in IT Se­cu­ri­ty


1) Nonce misuse-resistant encryption: objective, goals, definitions, constructions


2) May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519


3) Walkie-Talkie: An Efficient Défense Against Passive Website Fingerprinting Attacks


4) DolphinAttack: Inaudible Voice Commands


5) A Surfeit of Cipher Suites


 6) Removing Secrets from Android’s TLS


7) Trojaning Attack on Neural Networks


8) The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli


9) Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves


10) Indiscreet Logs: Diffie-Hellman Backdoors in TLS


11) VulDeePecker: A Deep Learning-Based System for Vulnerability Detection


12) Revive: Rebalancing Off-Blockchain Payment Networks


13) Bolt: Anonymous Payment Channels for Decentralized Currencies


14) On the Security and Performance of Proof of Work Blockchains


15) Generic Semantic Security against a Kleptographic Adversary


16)Deterministic Browser


17) Simple Proofs of Sequential Work


18) Don’t Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains


19) T/Key: Second-Factor Authentication From Secure Hash Chains