Talks Archive
← Back to main page · Contact Carsten Schürmann to propose a talk.
Past Talks
| Date | Time | Speaker | Topic | Location |
|---|---|---|---|---|
| 16 Apr 2026 | 10:00 - 11:00 | Jens Myrup Pedersen, Aalborg University (CPH), Denmark | Cyber Ranges: Learning Cybersecurity through gamification and virtual labs | 3A08 |
| 15 Apr 2026 | 13:00 - 14:00 | Sepideh Ghanavati, University of Maine, USA | From Developer Insights to LLM-Powered Privacy Solutions | 2A08 |
| 27 Mar 2026 | 12:00 - 13:00 | Rob Gleasure, CBS, Denmark | Cognitive warfare and scientific research in the Nordics | 3A08 |
| 24 Mar 2026 | 13:00 - 14:00 | David Sands, Chalmers University of Technology and the University of Gothenburg, Sweden | The LLMbda Calculus: AI Agents, Conversations, and Information Flow | 3A07 |
| 13 Mar 2026 | 12:00 - 13:00 | Peter Meyer, SDU, Denmark | Cybersecurity and Privacy for Everyone | 5A09 |
| 03 Mar 2026 | 12:00 - 13:00 | Markus Krabbe Larsen, IT University of Copenhagen, Denmark | Sound rules for building Sigma-protocols (in Rocq) | 3A08 |
| 11 Dec 2025 | 12:00 - 13:00 | Jonas Kastberg Hinrichsen, IT University of Copenhagen, Denmark | Decentral Business Networks: Governance and Security | 3A07 |
| 09 Dec 2025 | 10:00 - 11:00 | Ralf Küsters, University of Stuttgart, Germany | Modeling the Web to Secure the Web: Formal Analysis of Single Sign-On Authentication and Authorization Protocol Standards | 3A07 |
| 08 Dec 2025 | 13:00 - 14:00 | Marino Miculan, University of Udine, Italy | Towards a Formally Verified Language for Stateful Authorization Policies | 4A05 |
| 01 Dec 2025 | 15:00 - 16:00 | Andrei Sabelfeld, Chalmers University, Sweden | CodeX and FakeX: Exposing Privacy Violations and Fake Reviews in Browser Extensions | 3A08 |
| 27 Nov 2025 | 12:15 - 13:15 | Peter Ryan, University of Luxembourg | From Individual Verifiability to Universally Verified Elections | 5A09 |
| 26 Nov 2025 | 13:00 - 14:00 | Eike Ritter, University of Birmingham, UK | Skolemisation for Intuitionistic Linear Logic | 5A09 |
| 06 Nov 2025 | 12:00 - 13:00 | Tobias Liebetrau, University of Copenhagen, Denmark | Infrastructuring public-private relations: Big Tech, the Ukraine War and implications to security governance | 5A09 |
| 30 Oct 2025 | 12:00 - 13:00 | Hanne Marie Motzfeldt, University of Copenhagen, Denmark | The legal clash between Danish legislative tradition and EU tech law | 2A08 |
| 21 Oct 2025 | 11:00 - 12:00 | abhi shelat, Google, USA | The Modern Credential | 2A08 |
| 20 Oct 2025 | 13:00 - 14:00 | David Hook, Legion of the Bouncy Castle | Bouncy Castle and a Post-Quantum future: API Changes, Protocol Issues, and Performance slides | 3A08 |
| 26 Sep 2025 | 12:30 - 13:00 | Takafumi Saikawa, Nagoya University, Japan | Formalization of matching numbers with finmap and mathcomp-classical | 5A08 |
| 25 Sep 2025 | 12:00 - 12:30 | Alessandro Bruni, ITU | Formalizing Concentration Inequalities in Rocq: Infrastructure and Automation | 5A09 |
| 11 Sep 2025 | 12:00 - 13:00 | Karel Panchártek, Univerzita Palackého v Olomouci, Czech Republic | HTTP flood attacks mitigation | 5A09 |
| 26 Aug 2025 | 15:00 - 16:00 | Mugdha Khedkar | Static Analysis for Android GDPR Compliance Assurance | 3A08 |
| 23 Jun 2025 | 15:00 - 16:00 | Philip Haselwater, Aarhus University | Security Proofs via Approximate Relational Reasoning for Higher-Order Probabilistic Programs | 5A09 |
| 09 Mar 2025 | 12:15 - 13:00 | Lukas Hundt Petersen | Reverse engineering MitID | 4A56 |
| 03 Mar 2025 | 12:00 - 13:00 | Raha Asadi, IT University of Copenhagen | No Silver Bullet: Towards Demonstrating Secure Software Development for Danish SMEs in a B2B Model | 5A09 |
| 10 Dec 2024 | 10:00 - 11:00 | Marino Miculan, University of Udine, Italy | A bigraph-based Formal Model and Verification Framework for Container-Based Systems | 5A09 |
| 15 Oct 2024 | 13:00 - 14:00 | Irit Hadar, University of Haifa, Israel | With great data comes great responsibility: Paving the way to responsibility by design | 3A08 |
| 25 Sep 2024 | 12:00 - 13:00 | Christina Frederikke Nissen, IT University of Copenhagen, Denmark | Tracking Code-based Verification—Design and Evaluation | 4A09 |
| 30 May 2024 | 14:00 - 15:00 | Markus Krabbe Larsen, IT University of Copenhagen, Denmark | Mechanizing state separation for modular cryptographic proofs | 4A05 |
| 01 May 2024 | 12:00 - 13:00 | Esra Yeniaras, IT University of Copenhagen, Denmark | Post Quantum Cryptography and Efficient Implementation of NIST Competition Candidates | 5A09 |
| 11 Jan 2024 | 10:00 - 11:00 | Hans Peter Reiser, Reykjavík University, Iceland | Security and systems research | 4C lounge |
| 30 Oct 2023 | 13:00 - 14:00 | Christian Jensen, DTU, Denmark | Trust, Security and Zero Trust Architectures | 2A20 |
| 28 Sep 2023 | 13:00 - 14:00 | Victor Zhora | Cyberdefense of Ukraine | Auditorium 4 |
| 20 Feb 2023 | 12:00 - 13:00 | Niek Janssen and Jens Dalgaard, IT University of Copenhagen, Denmark | Security Awareness Training Through Experiencing the Adversarial Mindset | 3A08 |
| 04 Nov 2022 | 13:00 - 14:00 | Harri Hursti | Governments are now mandating Zero Trust and Software Supply Chain Security. What do they want? | 4C hallway |
| 01 Nov 2022 | 12:00 - 13:00 | Adele Veschetti, University of Bologna, Italy | A formal analysis of blockchain consensus protocols | 2A08 |
| 17 Jun 2022 | 13:00 - 14:00 | Sebastian Mödersheim, DTU, Denmark | Rewriting Privacy | 3A08 |
| 01 Jun 2022 | 14:00 - 15:00 | David Basin, ETH Zurich, Switzerland | Using Formal Methods to Analyze Modern Payment Protocols | 4A09 |
| 25 May 2022 | 10:30 - 11:30 | Christoph Matheja, DTU, Denmark | Towards an Intermediate Verification Language for Probabilistic Programs | 3F07 |
| 25 Nov 2021 | 16:30 - 17:30 | Erwin Lansing and Jacob Buchholz Bech, DK Hostmaster / IT University of Copenhagen | DNS Security: From phonebook to global distributed database | Auditorium 2 |
| 15 Nov 2021 | 15:00 - 16:00 | Peter Y A Ryan, University of Luxembourg | Trust and Trustworthiness of Voting Systems | Online |
| 08 Nov 2021 | 15:00 - 16:00 | Christian Berghoff and Arndt von Twickel, Federal Office for Information Security, Bonn, Germany | Towards Auditable AI Systems | Online |
| 03 Nov 2021 | 14:00 - 15:00 | Bernardo Machado David, IT University of Copenhagen, Denmark | Mt. Random: Multi-Tiered Randomness Beacons | 5A10 |
| 22 Oct 2021 | 15:00 - 16:00 | Mathias Oliver Valdbjørn Jørgensen, IT University of Copenhagen, Denmark | A formal approach to coercion-resistance and its application to e-voting | 5A10 |
| 18 Oct 2021 | 15:00 - 16:00 | Dana Drachsler Cohen, Technion, Israel | Ai2: Safety and robustness certification of neural networks with abstract interpretation | Online |
| 11 Oct 2021 | 09:00 - 10:00 | Rajeev Goré, Australian National University, Australia | Modular Synthesis of Certifying STV Counting Programs | Online |
| 27 Sep 2021 | 15:00 - 16:00 | Asmita Dalela, IT University of Copenhagen, Denmark | Voters perception of Trust in Risk Limiting Audits | Online |
| 13 Sep 2021 | 15:00 - 16:00 | Karl Palmskog and Pengyu Nie, KTH Royal Institute of Technology, Sweden / University of Texas at Austin, USA | Improving proof assistant user productivity using language models | Online |
| 02 Sep 2021 | 13:00 - 14:00 | Carsten Baum, Aarhus University, Denmark | Secure Computations | 3A08 |
| 30 Aug 2021 | 15:00 - 16:00 | Tanvir Arafin | Hardware Lottery and the Perils of Computer Security | Online |
| 23 Aug 2021 | 15:00 - 16:00 | Zsolt István, IT University of Copenhagen, Denmark | Software-Defined Data Protection: Low Overhead Policy Compliance at the Storage Layer is Within Reach! | 3A08 |
| 14 Jun 2021 | 15:00 - 16:00 | Peter Mayer, Karlsruhe Institute of Technology, Germany | "Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them | Online |
| 31 May 2021 | 09:00 - 10:00 | Zhe Hou, Griffith University, Australia | Silas: High-Performance Computing, Automated Reasoning and Machine Learning at the Core of Trustworthy AI | Online |
| 17 May 2021 | 15:00 - 16:00 | Diego Sempreboni, King's College London, UK | X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies | Online |
| 10 May 2021 | 15:00 - 16:00 | Koundinya Vajjha, University of Pittsburgh, USA | CertRL: Formalizing Convergence Proofs for Value and Policy Iteration in Coq | Online |
| 03 May 2021 | 15:00 - 16:00 | Gordon Stewart, Ohio University, USA | Certifying the True Error: Machine Learning in Coq with Verified Generalization Guarantees | Online |
| 26 Apr 2021 | 15:00 - 16:00 | Rosario Giustolisi, IT University of Copenhagen, Denmark | Modelling Human Threats in Socio-Technical Systems | Online |
| 19 Apr 2021 | 15:00 - 16:00 | Rasmus Munksgaard, Aalborg University, Denmark | Research on illicit online markets, mainly for drugs and other goods | Online |
| 12 Apr 2021 | 15:00 - 16:00 | Carsten Baum, Aarhus University, Denmark | PESTO: Proactive Secure Distributed SSO, or How to Trust a Hacked Server | Online |
| 23 Mar 2021 | 15:00 - 16:00 | Bruce Schneier | Securing a World of Physically Capable Computers | Online |
| 08 Mar 2021 | 15:00 - 16:00 | Asmita Dalela, IT University of Copenhagen, Denmark | "It's Not Something They Really Care About": A Study on Security and Privacy Practices in Danish Companies | Online |
| 08 Feb 2021 | 15:00 - 16:00 | Robert Künnemann | Accountability without bounds! | Online |
| 11 Jan 2021 | 15:00 - 16:00 | Lorenzo Gentile | FAST: Fair Auctions via Secret Transactions | Online |
| 14 Dec 2020 | 15:00 - 16:00 | Marino Miculan, University of Udine, Italy | Automated Symbolic Verification of Telegram's MTProto 2.0 | Online |
| 07 Dec 2020 | 15:00 - 16:00 | Dmytro Khutkyy | Internet Voting in Ukraine: Context, Cases, and Considerations | Online |
| 16 Nov 2020 | 15:00 - 16:00 | Carlo Brunetta, Chalmers University, Sweden | Turn Based Communication Channels: Crypto meets Time! | Online |
| 11 Nov 2020 | 10:00 - 11:00 | Patricia Cabarcos, Karlsruhe Institute of Technology, Germany | Usable Authentication | Online |
| 02 Nov 2020 | 15:00 - 16:00 | Asmita Dalela | Assessment on the status of cybersecurity in Denmark | Online |
| 26 Oct 2020 | 15:00 - 16:00 | Edlira Dushku | Remote attestation for IoT systems | Online |
| 19 Oct 2020 | 15:00 - 16:00 | Bernardo David, IT University of Copenhagen, Denmark | Flying TARDIS with CRAFT: Modelling Time, Building Time-Based Primitives and Designing Time-based Protocols in the Universal Composability Framework | Online |
| 07 Oct 2020 | 09:40 - 10:25 | David Hook, Crypto Workshop | A Window on the Post-Quantum World: Using Merkle-Based Signature Schemes | Online |
| 01 Jul 2020 | 13:00 - 14:00 | Frederik Madsen | On the Subject of Non-Equivocation: Defining Non-Equivocation in Synchronous Agreement Systems | Online |
| 29 Jun 2020 | 14:00 - 15:00 | Ziya Alper Genc, University of Luxembourg | Key-Oriented Defense Against Cryptographic Ransomware: Challenges and Opportunities | Online |
| 02 Apr 2020 | 14:30 - 15:30 | Peter Schneider | Intrusion Detection for Cyber-Physical Systems | Online |
| 10 Mar 2020 | 09:00 - 10:00 | Thomas Edmund Haines, NTNU, Norway | Verified Verifiers for Verifiable Elections | 3A08 |
| 18 Feb 2020 | 14:00 - 15:00 | Jens Myrup Pedersen, Aalborg University, Denmark | Haaukins - an Automated Platform for Security Education | 2A08 |