Recent talks

Hardware-assisted Run-time Protection: on balancing security and deployability (slides, version of October 2021, [pdf], [slideshow])
Extraction of Complex DNN Models: Real Threat or Boogeyman (slides, version October 2021, [pdf], [slideshow])
Hardware-assisted Run-time Protection (slides, version of August 2021, [pdf], [slideshow])
Confidence in AI systems: Can we trust AI-based systems? (slides, version June 2021, [pdf], [slideshow - part 1, slideshow - part 2])
Security, Privacy, and Machine Learning (slides, version of January 2020, [pdf], [slideshow])
Trustworthy & Accountable Function-as-a-Service (slides, version of January 2020, [pdf], [slideshow])
Hardware-assisted Trusted Execution Environments: Look Back, Look Ahead (slides, version of November 2019, [pdf], [slideshow])
Common-sense applications of hardware-based trusted execution environments (slides, version of July 2019, [pdf], [slideshow])
Securing Cloud-assisted Services (slides, version of June 2019, [pdf], [slide show])
The Undeniable Truth: How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols (slides, version of May 2019, [pdf], [slideshow])
Can Blockchains be made better using hardware-assisted security (slides, version of September 2018, [pdf],[slide show])
Machine learning in the presence of adversaries [slides version of April 2018]


Last modified: Thu, 04 Nov 2021 15:23:09 +0200