No slides


  • Dongyan Xu From Control Model to Control Program: A Cross-Layer Approach to Robotic Vehicle Security
  • Michele Mosca Security in the Quantum Era
  • Benny Pinkas Private Intersection Analytics
  • Moti Yung The Exodus of Secure Computations: From Theory to Core Business Deployment
  • Srdjan Capkun Secure Positioning: From GPS to IoT
  • Engin Kirda Using AI to Detect Advanced Threats – Done Right
  • Rosario Cammarota & Anand Rajan Security for Emerging Paradigms & Private AI Systems
  • Farinaz Koushanfar Privacy-preserving Machine Learning
  • Lejla Batina SCA strikes back: attacking neural networks via physical leakage… and the other way around
  • Carmela Troncoso Privacy Engineering


  • Prof. Dr. Johannes Buchmann An Overview of CROSSING: Goals, Challenges & Opportunities
  • Gordon Mühl Security is not enough
  • Dr. Rosario Cammarota Enabling Data Scientists to incorporate Users’ Privacy in their Inference Models Seamlessly
  • Prof. Dr.-Ing. Mira Mezini CogniCrypt: Effective Secure Integration of Cryptographic Software
  • Prof. Moti Yung Layers of Abstractions and Layers of Obstructions and the U2F
  • Gerold Hübner Aspects of Encryption in Cloud Computing and Privacy Regulation (GDPR)
  • Prof. Dr. Sebastian Faust The Perun Project: Bringing Scalability and Security to Blockchains

Summer School

  • Wenyuan Xu A Sound Story – Analog Security of Cyber-Physical Systems
  • Jean Paul Degabriele The Security of Onion Encryption in Tor
  • Christian Reuter Sustainable Security? Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
  • Georgios Nikolopoulos Quantum-safe entity authentication with physical unclonable keys
  • Matteo Maffei Browsec: Foundations and Tools for Client-Side Web Security
  • Christopher Liebchen Separating Chaff from the Wheat: On Security Isolation Technologies
  • Marc Fischlin The TLS 1.3 Standard from a Cryptographic Point of View