| 09:00 | |
|
Begrüßung zum CAST-Förderpreis IT-Sicherheit 2025 und Moderation
|
|
|
Andreas Heinemann
CAST e.V. / Hochschule Darmstadt / ATHENE
|
|
| FinalistInnen Kategorie 2 – Bachelorarbeiten | |
| 09:10 | |
|
Felix M. Cramer
Universität Paderborn
|
Evaluating the Interaction of TLS Client Certificates and Session Tickets in Virtual Hosting
This study probes web servers' behavior for inconsistencies and vulnerabilities when TLS session resumption, client authentication, and virtual hosting, interact. We design and implement an automated test framework. We find that the servers do not always behave according to the TLS and HTTP standards. We show differences between the servers in how they handle client authentication and session resumption and discuss the implications. Namely, we discover a security vulnerability in the Caddy web server. |
| 09:35 | |
|
Felix M. Cramer
|
Fragerunde
|
| 09:45 | |
|
Sven Gebhard
FAU Erlangen-Nürnberg
|
Covert Exfiltration of Cryptographic Keys from Android Devices
|
| 10:10 | |
|
Sven Gebhard
|
Fragerunde
|
| 10:20 | |
|
Mario Gemov
Karlsruhe Institute of Technology
|
Usability analysis of mail clients with regard to S/MIME
While S/MIME uses encryption and digital signatures to protect against threats like eavesdropping and spoofing, its real-world effectiveness depends on how well email clients handle different security and technical issues. This thesis tests modern email clients against problematic scenarios such as invalid certificates or tampered content and examines whether users receive clear and helpful information. The findings show that even though S/MIME has been available for many years, email clients still struggle to detect and properly communicate these security issues. |
| 10:45 | |
|
Mario Gemov
|
Fragerunde
|
| 10:55 | Kaffeepause (15 Minuten) |
| 11:10 | |
|
Tobias Käsmann
TH Nürnberg
|
Eine browserbasierte Unterstützung in der Erkennung von Deepfakes
Mensch-zentrierte Entwicklung und Evaluation eines Design Konzeptes
Die Bachelorarbeit untersucht in einer empirischen Nutzerstudie, wie Menschen Deepfakes wahrnehmen, welche visuellen Merkmale sie erkennen, und welche typischen Fehlurteile auftreten. Auf Grundlage dieser Erkenntnisse wird ein nutzerzentriertes, browserbasiertes Unterstützungssystem als Prototyp entwickelt, das durch gezielte visuelle Hinweise den Erkennungsprozess erleichtert. Ziel ist es, die Bewertung digitaler Inhalte zu verbessern und langfristig die Medien- und Urteilskompetenz im Umgang mit manipulierten Videos zu stärken. |
| 11:35 | |
|
Tobias Käsmann
|
Fragerunde
|
| 11:45 | |
|
Fidelius Lula
RWTH Aachen University
|
Deployment and Evaluation of Attacks on the Lower Layers of 5G New Radio
5G networks promise faster, more reliable communication but, as part of critical infrastructure, introduce new security challenges. In this thesis, we investigate the resilience of 5G against physical-layer jamming attacks, comparing it with its predecessor LTE, using realistic ns-3 simulations with custom implemented modules. Furthermore, we quantify how much more resistant 5G is under identical attack scenarios, confirming theoretical predictions. The study advances understanding of 5G’s security architecture and provides a reusable framework for future wireless-network resilience research. |
| 12:10 | |
|
Fidelius Lula
|
Fragerunde
|
| 12:20 | Mittagspause (40 Minuten) |
| FinalistInnen Kategorie 1 – Masterarbeiten | |
| 13:00 | |
|
Karla Friedrichs
Universität Potsdam
|
Game-based security for OPRFs
The security of cryptographic building blocks shapes the security of entire systems. One such building block are Oblivious Pseudorandom Functions (OPRFs), which allow two parties to jointly compute pseudorandom values in a privacy-preserving manner, and in recent years have been built into many applications. Yet, as this thesis shows, there is no mature and agreed-upon security model, eroding confidence in the guarantees OPRFs claim to provide. To address this gap, this work develops a structured, unifying approach to OPRF security. An abridged version is published at Asiacrypt 2025. |
| 13:25 | |
|
Karla Friedrichs
|
Fragerunde
|
| 13:35 | |
|
Laurenz Grote
RWTH Aachen University
|
Cyber Security Risks in Grid-Oriented Control of Residential Power Assets
Grid-Oriented Control (GOC) is essential for integrating residential electrification technologies (e.g., heat pumps, EVs) into power grids as it prevents local grid overloads through curtailments and price signals. We review GOC cyber risks in Germany through system analysis, virtual co-simulation, and proof-of-concept attacks. Our testbed demonstrates attacks that could cause device Denial of Service, increased household costs, or local power outages. These threats highlight the need for holistic security measures across the entire GOC implementation, including the residential installation. |
| 14:00 | |
|
Laurenz Grote
|
Fragerunde
|
| 14:10 | |
|
Konrad Hanff
Universität Potsdam
|
Security Analysis of Privately Verifiable Privacy Pass
Privacy Pass is a cryptographic protocol for anonymous authentication. It was recently standardized by the IETF. The new standard deviates from previously studied versions of the protocol, but no formal security analysis has existed until now. This is the first security analysis of the newly standardized privately verifiable Privacy Pass. We formally model the protocol and introduce new, stronger privacy and unforgeability properties. Finally, we prove the IETF construction secure when instantiated with a secure generic Oblivious PRF (OPRF). The results were published at ACM CCS 2025. |
| 14:35 | |
|
Konrad Hanff
|
Fragerunde
|
| 14:45 | Kaffeepause (15 Minuten) |
| 15:00 | |
|
Melina Kleber
Universität Paderborn
|
Investigating public attitudes towards data collection and use in Virtual Reality
As VR use expands, its numerous sensors collect increasing amounts of data. A user study investigated users' and non-users' awareness of data collection, conditions that influence the acceptance of VR data sharing, and users' privacy-protecting behaviors when using VR. The results show that consent is central to acceptance, with academic and medical as recipient rated positively. While participants display some awareness, most protect their privacy by providing minimal personal information. The results emphasize the need for improved VR privacy, awareness, and accessibility. |
| 15:25 | |
|
Melina Kleber
|
Fragerunde
|
| 15:35 | |
|
Maximilian Stillger
TU Darmstadt
|
LORELEI: Locally Rewriting Logic with Ensemble Improvements
Secure Multiparty Computation (MPC) protocols allow to compute a function over private data like medical data, financial transactions, and many ML/statistical calculations. In this thesis, we generalize the MPC protocols ASTRA (CCSW'19) and ABY2.0 (USENIX Security'21) for more efficient computations of sums of products, which are common in statistics. We also propose an optimizer called LORELEI that partitions a function into a network of terms and samples improvements via cost estimation. Our optimizations give a 1−66% communication- and 10−90% run time improvement across practical circuits. |
| 16:00 | |
|
Maximilian Stillger
|
Fragerunde
|
| 16:10 | Beratungsrunde der Jury |
| 16:40 | Preisverleihung & Abschluss |
| 16:55 | Ende der Veranstaltung |
Um den Workshop optimal vorbereiten zu können bitten wir Sie, sich bis zum 24.11.2025 zu registrieren.
| Bei Anmeldung ... | bis zum Stichtag | nach dem Stichtag |
|---|---|---|
| Teilnahmegebühr des Workshops | kostenfrei | kostenfrei |
| für Inhaber eines CAST-Leistungspaketes | kostenfrei | kostenfrei |
Die Teilnahme ist kostenlos, eine Anmeldung zum Zweck der Planung jedoch notwendig.
Für diese Veranstaltung kann keine CPE-Bescheinigung ausgestellt werden.
Wenn Sie noch Fragen haben, wenden Sie sich bitte an:
Andreas Heinemann
CAST e.V. / Hochschule Darmstadt / ATHENE
E-Mail: andreas.heinemann@cast-forum.de
Simone Zimmermann
CAST e.V.
Tel.: +49 6151 869-230
E-Mail: simone.zimmermann
cast-forum.de
Bitte beachten Sie, dass wir Anmeldungen zu unseren Veranstaltungen nur über das Online-Formular nicht jedoch über unsere Fax-Nummern entgegen nehmen können.
| CAST-Förderpreis IT-Sicherheit 2025 | 04.12.2025 |
| ID:SMART 2026 Workshop | 18.-19.02.2026 |
| Recht und IT-Sicherheit | 05.03.2026 |
| 25th International Conference of the Biometrics Special Interest Group (BIOSIG 2026) | 25.-26.11.2026 |