Yuval Yarom

191 Followers
61 Following
57 Posts
Professor of Computer Science at Ruhr University Bochum
Websitehttps://yuval.yarom.org
@gannimo Congrats!

The Cycle 2 deadline for the USENIX WOOT Conference is in just one week (March 3, 2026).

Full details are available in the Call for Papers:
https://www.usenix.org/conference/woot26/call-for-papers

WOOT '26 Call for Papers

The 20th USENIX WOOT Conference on Offensive Technologies (WOOT '26) will take place at the Baltimore Marriott Waterfront in Baltimore, MD, USA, on August 10–11, 2026. The USENIX WOOT Conference aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security.

USENIX

I just registered for https://uasc.cc/ -- uASC (the Microarchitecture Security Conference) is on February 3rd, in Leuven, Belgium.

**Registration is free but mandatory!**

I would be happy to see all of you there :)

Especially from the Cologne and Ruhr area, it's just a train ride to Leuven -> join us!

2nd Microarchitecture Security Conference (uASC '26)

USENIX WOOT Conference 2026: two submission deadlines this year!

- Cycle 1: December 12, 2025 *only one month away* !
- Cycle 2: March 3, 2026

WOOT still has a SoK track and an "Up-and-coming track" (~Industry), CFP for details:
https://www.usenix.org/conference/woot26/call-for-papers

WOOT '26 Call for Papers

The 20th USENIX WOOT Conference on Offensive Technologies (WOOT '26) will take place at the Baltimore Marriott Waterfront in Baltimore, MD, USA, on August 10–11, 2026. The USENIX WOOT Conference aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security.

USENIX

uASC 2026 will take place on February 3, 2026, in Leuven, Belgium, hosted by KU Leuven. Have you submitted your paper yet? 🤔

Cycle 2 Paper Submission Deadline is November 4, 2025!
👉 https://uasc.cc #uasc26

Falls nochmal jemand das Märchen erzählt, das Client-Side-Scanning der #Chatkontrolle sei kein Angriff auf Verschlüsselung, bitte schickt ihnen dieses FAQ:
https://csa-scientist-open-letter.org/FAQ

Wissenschaftler*innen versuchen es jetzt der Politik schon wirklich so einfach wie möglich zu machen, damit sie diesen total fehlgeleiteten Angriff auf sichere Kommunikation endlich aufhalten.
#ChatkontrolleStoppen

End-to-end encrypted communication in messengers like Signal, WhatsApp or Threema must be reliable, German government must reject the disastrous plan of chat control! https://www.ccc.de/en/updates/2025/absage-chatkontrolle #Chatkontrolle #chatControl
Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home 😉. Check out our work at https://wiretap.fail
First WOOT session today was on Hardware Security - two talks on a variety of cutting-edge attacks against the RP2350 and a talk about automating the identification of hardware fault injection attacks against software using pre-silicon analysis.

Ever wanted to do practical security research on platforms like iOS and Android? Obsessed with digging through system internals, tearing apart proprietary firmware and hardware or breaking down wireless protocols? Maybe you've spent weekends battling in CTFs?

✨📱 🐞💥 🔬 🛰️

I'm growing my team at Hasso Plattner Institute and am looking for a PhD student or Postdoc. It's a full-time, paid position in a supportive academic environment with a focus on impactful, real-world systems security research.