Conference
- Dongyan Xu From Control Model to Control Program: A Cross-Layer Approach to Robotic Vehicle Security
- Michele Mosca Security in the Quantum Era
- Benny Pinkas Private Intersection Analytics
- Moti Yung The Exodus of Secure Computations: From Theory to Core Business Deployment
- Srdjan Capkun Secure Positioning: From GPS to IoT
- Engin Kirda Using AI to Detect Advanced Threats – Done Right
- Rosario Cammarota & Anand Rajan Security for Emerging Paradigms & Private AI Systems
- Farinaz Koushanfar Privacy-preserving Machine Learning
- Lejla Batina SCA strikes back: attacking neural networks via physical leakage… and the other way around
- Carmela Troncoso Privacy Engineering
Industry
- Prof. Dr. Johannes Buchmann An Overview of CROSSING: Goals, Challenges & Opportunities
- Gordon Mühl Security is not enough
- Dr. Rosario Cammarota Enabling Data Scientists to incorporate Users’ Privacy in their Inference Models Seamlessly
- Prof. Dr.-Ing. Mira Mezini CogniCrypt: Effective Secure Integration of Cryptographic Software
- Prof. Moti Yung Layers of Abstractions and Layers of Obstructions and the U2F
- Gerold Hübner Aspects of Encryption in Cloud Computing and Privacy Regulation (GDPR)
- Prof. Dr. Sebastian Faust The Perun Project: Bringing Scalability and Security to Blockchains
Summer School
- Wenyuan Xu A Sound Story – Analog Security of Cyber-Physical Systems
- Jean Paul Degabriele The Security of Onion Encryption in Tor
- Christian Reuter Sustainable Security? Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
- Georgios Nikolopoulos Quantum-safe entity authentication with physical unclonable keys
- Matteo Maffei Browsec: Foundations and Tools for Client-Side Web Security
- Christopher Liebchen Separating Chaff from the Wheat: On Security Isolation Technologies
- Marc Fischlin The TLS 1.3 Standard from a Cryptographic Point of View