System and IoT Security

In this seminar, each student will perform a literature study and analysis on a timely topic in the area of system and IoT security based on a selection of scientific papers. To do this, students need to summarize, compare, and validate the work presented in these publications and write a report in the form of a scientific research paper. In addition, each student will present his or her seminar work in an oral presentation of approximately 20 minutes to the other participants of the seminar and answer questions related to his or her work.

Kick-off meeting

The kick-off meeting of the seminar takes place on

April 30th 2019 at 2.30 p.m.

in building S4|14 room 3.2.06 (Mornewegstraße 30)

Important dates

Registration deadline 07.05.2019
Deregistration deadline (in case you don't want to participate after all) 09.06.2019 12:59 p.m.
Submission of the final seminar paper 09.08.2019 12:59 p.m.
Oral presentation 28.08.2019 10:15 a.m. to 3 p.m.

Please note: Registration and deregistration to the seminar needs to be done over the TUCaN system!

Other information

Credits 3 CP
Max. number of participants 18
Materials LaTeX template, Kick-off slides

Available topics

# Title Supervisor Root paper
1 Leaking Processors and Dripping Caches: On Microarchitectural Side Channels Ghada Dessouky [1, 2]
2 I Know What You Cached Last Time: How Secure is Your Cache? Ghada Dessouky [1]
3 Catch Me if You Can: The Challenges in Detecting Hardware Bugs Ghada Dessouky [1]
4 Application Debloating for Security Patrick Jauernig [1, 2, 3, 4]
5 Recent Advances in Dynamic Analysis Patrick Jauernig [1, 2, 3, 4]
6 Forget me not: Security of non-volatile processors for IoT devices Shaza Zeitouni [1]
7 On Safety First (and Security Second) in Time-Critical Systems Ferdinand Brasser [1, 2, 3]
8 IoT Botnets Thien Duc Nguyen [1, 2, 3]
9 Poisoning Federated Learning Attacks Thien Duc Nguyen [1, 2, 3, 4]
10 Side-channel defenses for SGX Tommasso Frassetto [1, 2, 3, 4, 5]
11 Decentralized Federated Machine Learning via Distrubted Ledger Technologies (DLTs) Hossein Fereidooni [1, 2, 3]
12 Recent techniques in cyber deception Markus Miettinen [1]
13 IoT Honeypots Markus Miettinen [1]