When: Mar 27, 2026, 09:30 – 11:30
Where: VU Campus, Main building, room HG-11A24
Directions to NU building: https://vusec.net/directions
This mini workshop series features a strong line-up of leading systems security researchers from around the world. The event is freely accessible to everyone on a first come, first serve basis.
Speakers
Workshop program (Mar 27 at VU, HG-11A24)
| 09:30 | Coffee and tea |
| 09:55 | Opening by Cristiano Giuffrida (AMSec) |
| 10:00 | Speaker: Marius Muench Title: Game cheats, anticheats, and why we should care Abstract: All work and no play makes Jack a dull boy; all play and no work makes Jack a mere toy---So why can't we have both? This talk will discuss our recent research into the world of video games, their cheats, and anti-cheat solutions. By inspecting the state of the art of competitive online shooter games, we find a fascinating landscape, currently underexplored by academic research. We observe that strong adversary models generate some of the strongest software defenses, leading to a fast-paced cat-and-mouse game between attackers and defenders. We further find that cheats created a thriving gray market with a strong economy where technical sturdiness is a driving pricing factor. Throughout the talk, we will set our findings into the context of system security research and argue why your next research project should also be on video games. Bio: Marius Muench is an assistant professor at the University of Birmingham. His research interests cover (in-)security of embedded systems, binary & microarchitectural exploitation, and defenses. He obtained his PhD from Sorbonne University in cooperation with EURECOM and worked as a postdoctoral researcher at the Vrije Universiteit Amsterdam. He developed avatar2, a framework for analyzing embedded systems firmware, and FirmWire, an emulation and fuzzing platform for cellular basebands. Throughout his career, Marius publicly shared his findings and presented at venues such as Black Hat, DEFCON, Reverse.io, REcon, and Hardwear.io. |
| 10:45 | Speaker: Peter Schwabe Title: Cryptographic constant-time and beyond Abstract: The "constant-time" programming paradigm is widely accepted as a first-line defense against microarchitectural attacks. The idea is that programs avoid all data flow from secrets into branch conditions and memory addresses. Unfortunately, multiple recent works have shown that even code that is carefully written to follow this paradigm in C, Rust, or other high-level general-purpose programming languages, may compile to binaries that do not follow the property. Also, while the paradigm was originally believed to systematically protect against timing attacks, it has become clear that more advanced microarchitectural attacks are able to obtain software-visible leakage even from constant-time code. In my talk, I will show that we do not have to give up hope to systematically protect cryptographic software against microarchitectural attacks. However, such protections will require updating the tooling we use to write and compile such code. Bio: Peter Schwabe is a scientific director at MPI-SP and also a professor at the Institute for Computing and Information Sciences at Radboud University, Nijmegen, The Netherlands. His research is in the area of cryptography, specifically the design and secure implementation of cryptographic primitives. In recent years he is mainly working on post-quantum cryptography, i.e., cryptographic primitives that run on standard hardware, but remain secure even against attackers equipped with a large universal quantum computer. He was awarded an ERC Starting Grant for this work on engineering post-quantum cryptography. |
| 11:30 | Closing remarks |










