14:30 | Eröffnung |
14:45 | |
Kristina Hostakova
|
Foundations of Generalized State Channel Networks
State channels and state channel networks allow users of a (decentralized) payment system to perform complex payment transactions securely and privately while avoiding heavy load on the payment system itself. As I will explain in my talk, the key property of the developed state channel framework is its modularity. It not only helps us to formally define and prove security of our multi-party state channel protocols, but also enables future researchers to build on top of the constructed state channels without understanding all the design details. |
15:15 | |
Alena Naiakshina
|
Don't Blame Developers! Examining a Password-Storage Study Conducted with Students, Freelancers, and Company Developers
Software developers' programming security mistakes can threaten millions of end users' data. To deepen insights into developers' security behavior around the security-critical task of user-password storage, Naiakshina et al. conducted laboratory, online, and field studies with computer science students, freelancers, and professional developers from various companies. Besides investigating software developers' processes and security practices while storing user passwords in databases, they tested the usability of different application programming interfaces (APIs) and explored the methodological implications of several security-study parameters, including deception task design, sample variety, and the comparison of qualitative with quantitative research approaches. |
15:45 | Kaffeepause |
16:00 | |
Cristian-Alexandru Staicu
|
Enhancing the Security and Privacy of Full-Stack JavaScript Web Applications
Traditionally, the server-side code of websites was written in languages such as PHP or Java for which security issues are well-studied and well-understood. Recently, though, full-stack JavaScript web applications emerged, which have both their client-side and server-side code written in this language. The benefits of such an approach are obvious, e.g., easy knowledge transfer across tiers and uniform usage of tools. However, JavaScript was designed as a scripting language with a thin API and it was expected to run in a tightly-controlled environment, e.g., a sandbox. Taking JavaScript outside of the browser and using it as a general purpose programming language represents a paradigm shift for the web community and, thus, the npm ecosystem emerged to support this change. Npm is supposedly the largest software repository in the world with more than a million reusable packages. Nevertheless, the lack of code isolation and code vetting, the various ways to abuse the JavaScript language, and the plethora of reported vulnerabilities and malware incidents make npm a dangerous ecosystem with unique challenges for the security community. In this talk, we start by analyzing the attack surface of npm, showing that transitive dependencies and the large number of human agents in the ecosystem represent an important risk. We then continue with showing that vulnerabilities in npm packages affect real-world websites and that a motivated attacker can craft exploits against production websites by analyzing third-party, open-source code. Finally, we present a technique for boosting the recall of existing security analyses on JavaScript code that heavily relies on third-party libraries. More precisely, our approach extracts taint specifications for npm packages by using dynamic analysis and by leveraging test suites available in clients of the target package. |
16:30 | |
Christian Weinert
|
Practical Private Set Intersection Protocols for Privacy-Preserving Applications
PSI Protokolle sind kryptographische Protokolle zur privaten Schnittmengenberechnung, einer instrumentalen Funktionalität für eine Vielzahl von praktischen Anwendungen. In diesem Vortrag zeigen wir die Schwachstellen von derzeit leider oft genutzten unsicheren Alternativen auf und präsentieren neue, besonders effiziente PSI Protokolle für drei spezifische Anwendungsszenarien: Kontaktermittlung in mobilen Messengern, Authentifizierung für Apple AirDrop und Analyse von verteilten Datenbanken. |
17:00 | Diskussion und Abstimmung |
Wenn Sie noch Fragen haben, wenden Sie sich bitte an:
Zoltán Mann, University of Amsterdam, zoltan.mann@gmail.com
Michael Nüsken, b-it Bonn, nuesken@bit.uni-bonn.de
Christian Wressnegger, KIT, christian.wressnegger@kit.edu
Andreas Heinemann, CAST e.V., andreas.heinemann@cast-forum.de
Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
E-Mail: simone.zimmermanncast-forum.de
ID:SMART Workshop 2025 | 19.-20.02.2025 |
Recht und IT-Sicherheit | 06.03.2025 |
hot topic "Kryptoagilität" | 15.05.2025 |
MedCAST 25 - Sicheres digitales Gesundheitswesen | 22.05.2025 |
24th International Conference of the Biometrics Special Interest Group (BIOSIG 2025) | 25.-26.09.2025 |
Quantentechnologie und Quantencomputer-resistente Sicherheit | 23.10.2025 |