Se­mi­nar: Sys­tem Se­cu­ri­ty SS25

In our seminar, you should learn to present research results in a concise manner, both in writing (Seminar Thesis) and speaking (Seminar Presentation). Additionally, you should learn to give proper feedback, for both the presentation and the thesis of other students in this seminar.

To achieve these goals, we have the following main parts in our seminar (in chronological order):

  1. Submission of a preliminary version of the seminar paper.
    This submission is intended to provide a very early feedback on your paper.
  2. Submission of a pre-final version of the seminar paper.
    This is a finished version of your seminar paper that is then reviewed by other students in the seminar.
  3. Submission of the reviews.
    Each student is assigned and has to submit two reviews of their peers papers. The reviews you receive should help you to improve your own paper.
  4. Presentation of your paper.
    This presentation is held in front of the whole seminar, and you grade each other, the presentation that receives the highest grade from their peers receives the “Best Presentation” award. (This grade is independent of the grade you receive from us for the presentation.)
  5. Submission of the final version of the seminar paper.
    This version includes the feedback from the reviews and is the one graded by us.

Additionally, we have presentations on the topics of research, writing, review, and presentation skills.

Dates

  • The topics are distributed in the first week of the semester.
  • The presentations of the seminar papers will be held as a block seminar at the end of the semester.
    • The date is TBD

Deadlines

  • TBD: Partial Seminar Paper Submission
  • TBD: Final Seminar Paper Submission
  • TBD: Peer Review Submission
  • TBD: Presentation Slide Submission (you can still change your slides a bit before the talk)
  • TBD: Camera-Ready Seminar Paper Submission

The seminar will be organized over Panda. Deadlines are till the end of the day (23:59 local time/as according to Panda).

Presentations

We will have five meetings, with different topics which will (hopefully) be helpful for you to pass the seminar:

  • TBD Introduction
  • TBD Research Skills
  • TBD Writing Skills
  • TBD Review Skills
  • TBD Presentation Skills

Topics

The central topic of this seminar are security papers presented at top conferences.

  1. A Large-scale and Longitudinal Measurement Study of DKIM Deployment
  2. A Worldwide View of Nation-state Internet Censorship
  3. Advancing the Art of Censorship Data Analysis
  4. Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations
  5. Do Users Write More Insecure Code with AI Assistants?
  6. Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones
  7. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations
  8. Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
  9. Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies
  10. How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations
  11. How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
  12. Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
  13. Measuring and Evading Turkmenistan’s Internet Censorship: A Case Study in Large-Scale Measurements of a Low-Penetration Country
  14. Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom
  15. Network measurement methods for locating and examining censorship devices
  16. Open to a fault: On the passive compromise of TLS keys via transient errors
  17. OpenVPN is Open to VPN Fingerprinting
  18. SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities
  19. Three Lessons From Threema: Analysis of a Secure Messenger
  20. Trojan Source: Invisible Vulnerabilities
  21. TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers
  22. Uncovering and Exploiting Hidden APIs in Mobile Super Apps
  23. We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets
  24. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

Grading, Demands, and Expectations

The final grade consists of your presentation (30%), your paper (60%), and your reviews (10%). Additionally, you must meet all deadlines. Getting 0% (i.e., not submitting/not presenting) means failing the seminar.

Seminar Paper

Preliminary Version

  • at least 5 pages of text (excluding title page, table of contents, references, figures, …)
  • describes the main paper problem
  • briefly describe 2 related papers citing your paper

Final Version

  • Essay written according to the standards of a scientific paper.
    Unless otherwise discussed with us:
    • Your paper should summarize the original paper.
    • You should introduce concepts so that any other student in the seminar can understand your paper. (This does not include basic cryptographic/computer science terms.)
    • Like the preliminary, the final paper version has to describe two papers that cite the original. This should give a broader context for your paper.
  • It MUST be written using our LaTeX template (unchanged).
  • We expect around 15 pages of content, the hard lower limit is 9 pages of text (excluding title page, table of contents, references, figures, …). In most cases, the paper should not be longer than 20 pages of content.

Presentation

  • 20 minutes presentation. 5 minutes discussion and questions.

The best presentation will be awarded! More information will be given in the first meeting.

Reviews

We will follow a peer review procedure similar to scientific publications:

  • You submit your paper on PANDA
  • Some (2) peers (other students) review your submission:
    • Read and understand the submitted paper
    • Criticize your paper
    • Make recommendations on how to improve
    • Be honest, polite, and helpful when writing your reviews
  • The reviews you receive will not influence your final grade (but you should address/apply them in your final version)
  • Each student has to write 2 reviews (each 1–2 pages)