LECTURERS

Software-Based Trusted Computing Architectures for Isolation and Attestation

Machine learning and privacy

Data protection

Digital sovereignty

Micro-architectural attacks

Cyber physical systems security 

 Blockchain protocol modelling and security proofs

Automated verification and composition of security protocols in Isabelle/HOL