Talks and presentations

A Formal Treatment of End-to-End Encrypted Cloud Storage

August 21, 2024

RSA Conference 2025, RealWorldCrypto 2025, CRYPTO 2024, Berkeley Security Seminar, Trails...

We present a formal syntax and security notions for end-to-end encrypted cloud storage and design the first, provably secure protocol for this widespread application.

Blast-RADIUS: Breaking Enterprise Authentication

July 26, 2024

RealWorldCrypto 2025, BlackHat Europe 2024, IETF meeting 120, UCSD Security Seminar, CNS ...

Blast-RADIUS is a vulnerability that affects the RADIUS protocol, the de-facto standard protocol for enterprise authentication used in various places from Internet backbone routers to industrial control systems.

MFKDF: Multiple Factors Knocked Down Flat

June 05, 2024

UCSD Sysnet Seminar

We find several attacks against the idea and construction of Multi-Factor Key Derivation Function (MFKDF) that was introduced by Nair and Song at USENIX 2023.

Key Overwriting Attacks

November 30, 2023

CSE 207b, MIT CSAIL

This talk reflects on recent attacks where a malicious server overwrites encrypted key material outsourced by clients to learn secret information.

MEGA: Malleable Encryption Goes Awry

May 25, 2023

IEEE Symposium on Security and Privacy 2023, Brave Research Group

We found five attacks on the user-controlled end-to-end security MEGA. They show that a malicious provider can break authentication and compromise file confidentiality and integrity.

Climbing the Hacking /mnt/ain

October 12, 2021

Swiss Cyber Storm 2021

This talk discusses my experience as team coach of the Swiss National Hacking Team and preparing it for the European Cyber Security Challenge 2021.

Revisiting Microarchitectural Side-Channels

June 01, 2020

Security and Cryptography Laboratory (LASEC), EPFL

This talks presents the results of applying cache side-channels to contemporary hardware and investigating AES lookup tables, AES key scheduling, and Argon2.

SGX Accurate Time Measurements

June 06, 2019

Bachelor Thesis Presentation at ETH Zurich

This talk briefly summarizes our improvements on time measurements inside SGX enclaves. It discusses our discovery of the “Poor man’s CMOV” phenomenon, which later led to the USENIX Security paper on the Frontal Attack.