Markus Kuhn
| Name: | Markus Kuhn |
| Affiliation: | University of Cambridge |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 14 Apr 2026, 11:26 p.m. |
Public lists managed by Markus Kuhn
- Cambridge University Self-Build Society
- Computer Laboratory Security Group meeting presentations
- Computer Laboratory Security Seminar
- Department of Computer Science and Technology talks and seminars
- Security-related talks
- Wednesday Seminars - Department of Computer Science and Technology
Talks given by Markus Kuhn
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
- Side-channel security requirements for electronic voting equipment
- GPS jamming & interference (workshop report)
- Version control with Subversion
- Electromagnetic eavesdropping on computers
Talks organised by Markus Kuhn
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Markus Kuhn actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- A detailed analysis of how locks and physical security become vulnerable to attack
- Side-channel security requirements for electronic voting equipment
- no meeting today
- no meeting today
- Benefits of coherent demodulation for eavesdropping on HDMI emissions
- New time for Security Group Friday meetings
- Room change: meeting in SS03
- Room change: meeting in SS03
- no meeting
- Title to be confirmed
- Title to be confirmed
- change of room: FW26
- change of room: FW26
- change of room: FW26
- Issues with using CVEs, CWE classification, and associated resources to perform system security evaluations
- Bribery, cryptocurrencies and smart contracts
- Antikernel: a decentralized secure hardware-software operating system architecture
- no meeting today due to SHB 2017
- 1000 days of UDP amplification DDoS attacks
- Verifyable random bit generation
- Title to be confirmed
- Hack the brain
- Hack the brain
- Putting wireless signal security in a system security context
- A new packet filtering technique
- Secure multipath communications
- Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit
- Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit
- Title to be confirmed
- John Ioannidis visits
- Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs
- Website Fingerprinting
- Introduction to DNSSEC
- Discussion on AG's recent Opinion concerning the Data Retention Directive
- GPU-mediated direct-memory-access attacks in a smart phone
- De-anonymizing D4D datasets
- (change of room)
- Global cyber security governance
- crypt@b-it, ECRYPT Summer School, CHES 2012
- Bromium: Task isolation through hardware-assisted virtualization
- Observation skill and personal safety â workshop
- BGP security and where BGPSEC is heading
- The security cost of cheap user interaction
- Hardware security in nanometer CMOS
- Defragmentation of compressed bitstreams for H.264/AVC video evidence recovery
- Smart card detective: an EMV interceptor
- A DRE-based e-voting scheme
- GPS jamming & interference (workshop report)
- Towards copy-evident JPEG images
- Faster and timing-attack resistant AES-GCM
- Title to be confirmed
- Mobile malware prevention using temporal information
- IPv6: the basics
- An introduction to EMV
- Public understanding of risk (discussion)
- On a new e-Voting scheme
- The eStream stream-cipher contest
- Short presentation on research by the AFP Computer Forensic Team
- A new approach to E-banking
- Protecting online games
- Cyberdice 2: Peer-to-peer gambling in presence of cheaters
- Cyberdice: peer-to-peer gambling in the presence of cheaters
- Boom! Headshot!
- On password-based key exchange
- Resiliency aspects of security protocols
- Version control with Subversion
- Informal discussion on FPGA core distribution
- Securing vehicular networks
- Towards a security policy for ubiquitous healthcare systems
- Identity-based and inter-domain password authenticated key exchange for pervasive systems
- Cache collision timing attacks against AES
![[Talks.cam]](/static/images/talkslogosmall.gif)
