Radboud Digital Security group Lunch Talk homepage

Welcome to the site of the talks organised by Radboud Digital Security group. We organize a talk every Wednesday at 12:30.

Objectives:

Policy:

Resources:

Upcoming talks

  • Tuesday, 9th of September 2025 at 11:00 in room in Huygensbuilding (HG00.071, ground floor)
    DiS Lunch by Juan Caballero

    Cryptocurrency and Blockchain Abuse by Malware

    Cryptocurrencies have become a popular payment and financial investment
    mechanism. Unfortunately, they are also frequently abused by cybercriminals
    who use them to receive payments from victims affected by their malware (e.g.,
    ransomware, clippers, cryptojackers) and establish resilient
    command-and-control (C&C) channels. Cybercriminals are attracted to
    cryptocurrencies due to their decentralized nature, pseudo-anonymous
    properties, limited regulation, irreversible transactions, and the ease of
    buying and selling them. On the other hand, the public nature of blockchain
    ledgers offers defenders a privileged view of malware and other cybercriminal
    activities. This talk presents our research into the abuse of cryptocurrencies
    and blockchains by malware (and other cybercrime) to track financial flows,
    estimate the profits obtained by cybercriminal activities, and attribute the
    cybercriminals behind them.

  • Wednesday, 17th of September 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Hugo van de Pol & Marc Schoolderman of TweedeGolf

    You’re not secure by design, if you’re not memory safe!

    What if 70% of all vulnerabilities in the critical infrastructure of tomorrow could be prevented with one simple decision?
    Memory safety is not just an implementation detail that only engineers should talk about;
    it is a crucial requirement for building software that is safer and more secure by design.
    In this talk, we’ll explore what memory safety is, the link to secure by design, and why you should care.
    We’ll do so by going into CISA’s Secure by Design initiative and share insights from the Memory Safety in the EU Summit, held in Utrecht in May 2025.
    This talk will be given at ONE conference in The Hague later in September.

  • Thursday, 25th of September 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Marwan Darwish Khabbaz

    TBA

  • Wednesday, 1st of October 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by

    TBA

  • Friday, 10th of October 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Zahra Moti

    TBA

  • Wednesday, 15th of October 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Konstantina Miteloudi

    TBA

  • Wednesday, 22nd of October 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Vahid Jahandideh

    TBA

  • Wednesday, 29th of October 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Romaric Neveu

    TBA

  • Tuesday, 4th of November 2025 at 12:30 in room in Huygensbuilding (HG00.062, ground floor)
    DiS Lunch by Markku-Juhani O. Saarinen

    PQCP Support for RISC-V Vector, future Keccak Extensions

    The PQ Code Package (PQCP) project provides high-assurance software implementations of ML-KEM, ML-DSA, and SLH-DSA.
    We opine that security and adoption are impacted by *how* one implements things: The PQCP project applies formal verification to protect against common vulnerabilities,
    such as out-of-bounds memory accesses and integer overflows, and increasingly for functional correctness.
    The code is also performant: Compared to the C reference implementation, assembler-optimized mlkem-native offers a ~3x performance improvement on Arm64, x86_64, and RISC-V Vector targets.
    We have already obtained NIST CAVP certification for mlkem-native on x86. PQCP's current RISC-V optimization work is geared towards high-performance and application-class processors with vector extensions.
    PQCP is serving as a quantitative benchmarking platform for the development of possible ISA extensions at the RVI PQC Task Group,
    such as the Keccak extension, which is vital for PQC algorithms due to their extensive use of SHAKE (FIPS 202) extendable-output function.
    The speaker chairs the Cryptography SIG at RISC-V International.

  • Wednesday, 12th of November 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 19th of November 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 26th of November 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 3rd of December 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 10th of December 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 17th of December 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Wednesday, 24th of December 2025 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by TBA

    TBA

  • Past talks