PA168 – Postgraduate seminar on IT security and cryptography Vašek Matyáš & Jan Staudek Email: matyas@fi.muni.cz Office hours: Mon 15:00-55 & Tue 9:00-9:55 (B415) Typical seminar structure •2 presentations for the start •Discussion related to above •News/developments update –Recent news •New results/achievements (no attack stats!) •Crypto-Gram (B. Schneier), comp.risk, •http://www.lightbluetouchpaper.org/ •http://www.theregister.co.uk/ –Own insight / analysis / view Your presentations •O (Own work) –On the topic of your current research / interest –Ideally as a training for your needs •Presentation for a conference/workshop, thesis, etc. •N (News) –Presentation of news from the last week (or so) –This talk can be replaced by your service as a seminar chair/moderator (recommended to PhD students!) •R (Reading) –Presentation of a recent paper •Papers proposed during the term •Detailed review of the paper with discussion • Marking & Language •The course primary language is English!!! –In Czech only when the ultimate target for your presentation requires this •M.Sc. thesis presentation •Czech conference presentation •Mark comprises: –O presentation 40% –R & N presentation 30% each –Resulting P(ass) for 75% or more •Other activities (conference report, etc.) can yield up to 10% bonus • All presentations •Well structured –Slides (projector care – Jirka Kur; laptop care is upon your mutual agreement!) –Agreed length respected (practice beforehand!) – •Time allowance is 30-35 minutes for O –20-25 minutes for R and N • •Book your dates with Vashek Matyas by Oct 1, noon!!! (e-mail) (R)eadings – choice for this term… •Any paper from the Proceedings 2010 IEEE Symposium on Security and Privacy –Berkeley, California, USA –May 16-19, 2010 –ISBN: 978-0-7695-4035-1 –All papers available in the IEEE Computer Society Digital Library trojan “O” Talk Dates •Oct 11 – Jan Michelfeit –Tomas Vymetal •Oct 18 – Michal Trunecka •Oct 25 – Shkodran Gerguri –Ladislav Tkac •Nov 1 – Antonín Víteček –Lukas Jakubik •Nov 8 – Jirka Kur –Martin Stehlik •Nov 15 – Jiří Vomáčka –Richard Barányi •Nov 22 – Tobias Smolka •Nov 29 – Stefan Koepsell (guest) –Vita Bukac •Dec 6 – Miroslav Buda – Australian Internet censorship system •Dec 13 – Marián Novotný (guest): Design and analysis of a data integrity protocol for Wireless Sensor Networks “N” Talk Dates •Oct 11 – –Moderator – Tobias Smolka •Oct 18 – Jiří Vomáčka –Moderator – Andriy Stetsko •Oct 25 – Miroslav Buda –Pavel Tucek •Nov 1 – Michal Trunecka •Nov 8 – Jan Michelfeit •Nov 15 – Vita Bukac •Nov 22 – Lukas Jakubik •Nov 29 – Martin Stehlik •Dec 6 – Ladislav Tkac •Dec 13 – Tomas Vymetal “R” Talk Dates •Oct 11 – Vita Bukac – Chip and PIN is broken •Oct 18 – Jirka Kur – A Practical Attack to De-Anonymize Soc… –Pavel Tucek – The password thicket:… •Oct 25 – Tobias Smolka - Inspector Gadget: Automated Extr… •Nov 1 – Jiří Vomáčka – Side-Channel Leaks in Web Apps… •Nov 8 – Miroslav Buda – How Good Are Humans at Solving… •Nov 15 – Michal Trunecka – Outside the Closed World: On… •Nov 22 – Antonín Víteček – –Martin Stehlik •Nov 29 – Jan Michelfeit – SCiFI - A System for Secure Face… •Dec 6 – Lukas Jakubik – Overcoming an Untrusted Comp… –Tomas Vymetal •Dec 13 – Richard Barányi – Identifying Dormant Functionality… •Sometimes – Andriy Stetsko – Combining Identity Federation…