Warning: This is only the archive. For currently scheduled talks see here.
|13.11.2014||Mathias Velten||"A practical Introduction to Docker Containers"|
|Christoph Rauterberg||"Android Malware Detection using Machine Learning and Feature Analysis"|
|18.12.2014||Robin Martinjak||"I did an Internship at Google ... and All I Got Was this Stupid T-Shirt"|
|Fabian Yamaguchi||Mining for Bugs with Graph Database Queries|
|15.01.2015||Azat Khuziyakhmetov & Bakhodir Ashirmatov||"Competitive programming and algorithms"|
|Kevin Freeman||"A small insight into Anti-Virus scanners"|
|12.03.2015||Kevin Freeman||Gaining access to other processes memory|
|Steffen Herbold||Intuition vs. Truth: Evaluation of Common Myths about StackOverflow Posts|
|25.06.2015||Omar Shaya||Just Do it! Entrepreneurship and Computer Science. How to start and grow.|
|16.07.2015||Salke Hartung||The Warez Scene - Get An Insight|
|Mathias Velten||Software Operability - Dreams of a Sysadmin|
|12.11.2015||Jan Michal||Gründungstreffen einer Hochschulgruppe der Gesellschaft für Informatik|
|Dr. Marco Buechler||Digital Humanities for Computer Scientists … or: How I became infected with the Indiana Jones virus|
|10.12.2015||Arne Bochem||Sensors, Networks and RC Cars|
|Felix Schelle||"The awesome Shakespeare Programming Language"|
|14.04.2016||Christian Roth||Reverse Engineering the Software of Life|
|Ole Reglitzki||NodeBB - Plugin development for a modern forum platform|
|14.07.2016||Kevin Freeman||Coming from kernel space|
|Azat Khuziyakhmetov||Graphs and Game of Throne|
|24.11.2016||Hauke Kaulbersch||Extended Object tracking|
|Marc Zöller||Event Correlation and Root Cause Analysis|
|Jan Michal||Schwefelwasser und Polarlichter und woran man sich nicht gewöhnt. A semester in Iceland.|
|Anna Bösemann||Computação no Brasil - Computer Science in Brazil|
|09.02.2017||Linus Weber||Presentations with reveal.js & markdown|
|26.10.2017||Lorenz Glißmann||cool stuff about linux|
|09.11.2017||Antonio||Text Generation with LSTM Units|
|07.12.2017||Felix Schelle, Ole Reglitzki||JSFuck|
|11.01.2017||Fabiola Buschendorf||Building an Intrusion Detection System - Internship in Canada|
|Benjamin Leiding||The (Mystical) World of Blockchain Technology|
|16.02.2018||Wiebke Dirks||Studying Computer Science in Ireland|
|Danny Cooper||Working as a Software Developer in Ireland|
|15.03.2018||David||Funktionale Programmierung in C|
|Troll||Dein Compiler hat in Mathe besser aufgepasst als du - eine Einführung in Compileroptimierung und x86 Assembly|
|05.04.2018||Prof. Delphine Reinhardt||From Electrical Engineering to Privacy|
|Jan Maximilian Michal||How to encrypt your Mail with PGP with Key-signing party afterwards|
Abstracts of previous talks
Coming from kernel space
In the previous cookie talk "Gaining access to other processes memory", we saw how easy it this can be. Nevertheless, there are mechanisms to block simple accesses. At the sIT talk "ProxyDLL and Clientless - Emulating the engine of online applications" we faced some of these mechanisms and found a way into the address space of the process by letting it load our own library. However, new mechanisms prevent accesses from user space. Therefore, this talk shows methods to gain access to any address in user space by writing an own kernel mode driver for Windows. This is useful, as it is the same way how anti-virus scanners scan memory. Hereby, it will circumvent all restrictions and is undetectable by other programs.
Graph Theory and Game of Thrones
You might have already read many articles about various statistics in Game of Thrones and speculations of who is going to die next in the story. Here is another one, based on graph theory. In the following research I’m not using the TV show rather it will be based on the main source - the first 5 books of epic fantasy novels of George R. R. Martin, “A Song of Ice and Fire” (ASOIAF). But well, don’t be disappointed if you only watch TV shows, they intersect a lot and hopefully the show will continue to take advises from the author. I have used the most popular algorithms in the Graph Theory to find out some interesting statistics and predict most popular or vulnerable characters in the whole story.
Virtual Reality - The Vision Becomes Reality
When Facebook announced the acquisition of Virtual Reality Startup Oculus for 2 billion dollars in March 2014, many observers were confused about this bold move. In his statement Facebook's founder and CEO Mark Zuckerberg drew up a vision of the enormous potential of this technology and predicted that VR will develop into a platform, a medium for many more experiences. Text, pictures and videos already enable us to experience situations and events, but this effect reaches a whole new level with VR. Using VR headsets like the Oculus Rift, we feel like we are right in the middle of events, as if we were a witness or even participating.
In early 2014 the vision still sounded pretty incredible, but is slowly turning into reality ever since. After four years of development, the Oculus Rift finally enters the mass market in 2016, as well as its main competitors HTC Vive and Playstation VR. Today, VR is one of the hottest topics in technology with the likes of Facebook, Google and Amazon hopping on the bandwagon. The presentation will give an overview over the development of the hype, the state of the technology, the potential of the market and fascinating applications.
Reverse Engineering the Software of Life
Just like computers, organisms have to be programmed. Although being developed for about five billion years, the operating system of life and all required software is completely free of charge and we are allowed to share it with others as often as we want. But there is a catch: the code is messy, the developers didn’t bother to document - there is not a single line of comment in the code… Welcome to biology, the biggest reverse engineering challenge of the 21st century!
Biologists now generate an incredible volume of high dimensional data. A meaningful analysis is not possible without advanced skills in computer science and statistics. In my talk I give a quick introduction into the field of genomics and cherry-pick interesting biological and medical questions that can be answered by sequencing experiments. Biology is now rapidly transforming into a quantitative science. My goal is to give a glimpse into the current state and the future of medicine and biology.
The awesome Shakespeare Programming Language
Wolltest du schon immer mal literarische Werke wie Shakespeare schreiben? Aber du studierst keine Literaturwissenschaft? Mit der Programmiersprache Shakespear kannst du jetzt deinen literarischen Fähigkeiten ausdruck verleihen. Und dein Drama sieht nicht nur toll aus, sondern es ist sogar funktionierender Programmcode! In diesem Vortrag bekommst du eine Einführung in diese Sprache.
Sensors, Networks and RC Cars
Wireless sensor networks (WSNs) allow gathering various data about environments in which they are deployed, but there is little point to the data if the location at which it was measured is unknown. Different approaches to localization in WSNs allow estimating the positions, but they vary in cost, efficiency and effectiveness. This short talk gives some information on an approach called sensor assisted monte carlo localization (SA-MCL) and how we used RC cars for science.
Gründungstreffen einer Hochschulgruppe der Gesellschaft für Informatik
Wir treffen uns, um eine Hochschulgruppe der Gesellschaft für Informatik hier an unserem Institut in Göttingen zu gründen. Worum soll es gehen: Was kommt da auf uns zu? Wer ist eigentlich die GI? Was haben wir davon? Was habe ich davon? Was wollen wir machen? Ein Vortrag zum warm werden beantwortet genau diese Fragen. Anschließend geht’s ans Eingemachte und wir müssen uns entscheiden, was die ersten Projekte der GI HSG Göttingen sein sollen und wer dabei sein will.
Digital Humanities for Computer Scientists … or: How I became infected with the Indiana Jones virus
Many definitions have been formulated to describe the Digital Humanities, driven either by political interests or born out of one's own approach to it. This cookie talk describes my understanding of the Digital Humanities as an IT person and aims to show what computer scientists can contribute to our cultural heritage. The talk summarises several applications and developments that have been designed by my teams and me since 2008.
I did an Internship at Google ... and All I Got Was this Stupid T-Shirt
Somewhat off-topic, because instead of talking about the project work I did, I'll focus more on the overall experience. If you have a question, let me know at https://docs.google.com/document/d/16Nzecw_X45xdGbu15sDAV02ZXSxhdc3pYg1VClwDMPQ/edit?usp=sharing so I can prepare. (DISCLAIMER: the title is quite the opposite of the truth; go and play The Secret of Monkey Island if you didn't understand the reference).
Mining for Bugs with Graph Database Queries
While graph databases are primarily known as the backbone of the modern dating world, this nerd has found a much more interesting application for them: program analysis. This talk aims to demonstrate that graph databases and the typical program representations developed in compiler construction are a match made in heaven, allowing large code bases to be mined for vulnerabilities using complex bug descriptions encoded in simple, and not so simple graph database queries.
Competitive programming and algorithms
Why is it so popular? Do we really need efficient algorithms in software industry?
A small insight into Anti-Virus scanners
Many people make use of anti-virus scanners to detect malicious software. But how do they actually work and what are they actually detecting? The detection methods and databases are commonly not publicly accessible. What if we could gain an insight into these by analyzing the programs inspected by an AV scanner?
Gaining access to other processes memory
Is it easy to influence other processes or read out their memory? What methods exist to gain access to arbitrary memory parts of processes? We will see how easy it is to modify own programs and will also have a look at other processes.
Intuition vs. Truth: Evaluation of Common Myths about StackOverflow Posts
Posting and answering questions on StackOverflow (SO) is everyday business for many developers. We asked a group of developers what they expect to be true about questions and answers on SO. Most of their expectations were related to the likelyhood of getting an answer or to voting behavior. From their comments, we formulated nine myths that they think are true about the platform. Then, we proceeded to use rather simple methods from statistics to check if these myths are supported by the data in the SO dump provided. Through our analysis, we determined that there is an effect for eight of the nine myths the developers believed in. However, for only four of the myths the effect size is large enough to actually make a difference. Hence, we could bust five myths the developers believed in.
Just Do it! Entrepreneurship and Computer Science. How to start and grow.
If you came to study Computer Science. You probably think about working for a giant tech company. But have you thought that these companies were once started by people just like you now. From his experience, Omar will tell you all about it. How to start a tech company and what are the essentials to grow your company and succeed.
Software Operability - Dreams of a Sysadmin
A short introduction to the problems of operating Software in a production Environment and some suggestions, what Developers could do, to make the life of a Sysadmin easier by looking on real world examples.
Might contain traces of swearing.
The Warez Scene - Get an Insight
Disclaimer: This talk will be in German!
Die Warez-Szene ist eine Vereinigung von Schwarzkopierern, die aus der BBS-Szene der 80er entstanden ist. Erdacht als elitärer Kreis weniger Eingeweihter hatte sie den Anspruch die bestmögliche Qualität von Schwarzkopien zu liefern. Dabei stand stets der Wettbewerbsgedanke im Vordergrund und nicht das zugänglich machen von Schwarzkopien für die breite Masse. Dieser Talk gibt einen kleinen Einblick in diese Szene und stellt Teile der Infrastruktur vor. Gespickt ist der Talk mit der ein oder anderen Anekdote und schließt mit der Auflistung von Gründen, warum der Niedergang besiegelt ist.
Extended Object tracking - Kekse scannen und erkennen im EM Ansatz
Heutzutage gibt es viele Anwendung die versuchen einem System ein Verständnis seiner Umgebung zu ermöglichen. Scanner werden präziser und man hat nicht wie früher eine Einzelmessung eines Objekts sondern ganze Punktwolken dessen. Die Ziele haben sich somit stark erweitert. Von "Wo ist dieses Ding" und "Wie schnell ist" es hin zu der Frage "Wie sieht es eigentlich aus". Das Hauptproblem: Die Messungen sind leider rauschbehaftet und auf größere Entfernung nicht sehr dicht. Der Vortrag gibt Einsichten in die Grundlagen meiner Masterarbeit und erklärt Anhand von Keksen, wie ich versuche Objekte zu erkennen.
Event Correlation and Root Cause Analysis
Modern Computersysteme sind sehr komplex. Zur einfacheren Wartung und Pflege bieten die meisten Systeme Informationen über den inneren Zustand an - oft in Form von Logging. Das Ziel meiner Masterarbeit ist es an Hand von Log Dateien Zusammenhänge und Abhängigkeit im System zu finden. Dadurch kann zukünftiges Verhalten vorhergesagt und Ursachen von Fehlern leichter gefunden werden.
"Let's be honest here, what does a programmer fundamentally do? A programmer moves data from one memory location to another. Over and over. In this respect, a programmer is not unlike a taxi driver. A taxi driver moves people from place to place all day long. The people get dropped off, do their things, and new people get loaded back up to be taken someplace else - except unlike programmers, the things taxi drivers shuffle around all day pay them for the service! Well programmers no longer need to put up with that kind of ingratitude from their data: introducting the Taxi Programming Language!" -Sean Heber
Text Generation with LSTM Units
One of the cool things one can do with neural networks is making them learn from text in an unsupervised manner. The text could be English text, but it could also be any other kind of text, like for example source code. After learning, the neural network should be able to produce new text that is remarkably similar to the text which it learned from. The talk is about a project where this was experimented with.
Building an Intrusion Detection System - Internship in Canada
Industry computer networks are a vulnerable but attractive target by attacks. Supervisory Control and Data Acquisition (SCADA) network protocols lack of common security means and are exposed to modern threats. In the need of protection, an Intrusion Detection System (IDS) can identify malicious actions and classify network data into harmful or normal packets. A Honeypot can be deployed to attract attacker and gather data, which was analyzed using machine learning algorithms. I will refer about research and life in Canada and possibilities for students to go abroad for the next summer.
The (Mystical) World of Blockchain Technology
Blockchain technology is probably the most confusing term since Bitcoin. Most people have no real clue what a blockchain or a Bitcoin actually is, except that they should have invested in Bitcoins some years ago. Depending on who you ask, blockchains are either the greatest innovation since the Internet or a hyped bubble. Nevertheless, governments as well as private companies are rushing to implement blockchain technology in a range of areas that might change the future of our daily lives within a few years - but the question remains, is blockchain technology really one of the greatest technological revolutions in history? This presentations provides an introduction to the mystical world of blockchains, its applications and cryptocurrencies such as Bitcoins. We will also talk about the potential of blockchain applications as well as current blockchain-related phenomena such as smart contracts, decentralized applications, ICOs and the advantages and disadvantages of blockchain technology.
Studying Computer Science in Ireland
Wiebke will talk about studying computer science in Maynooth, Ireland. She will compare the different educational systems in Ireland and Germany, and talk about advantages and disadvantages of doing a year abroad. Computer science lectures in Ireland are more hands-on and praxis-oriented but focus less on maths. She will also talk about student life in genreal and offer advice for anyone interested in studying in Ireland.
Working as a Software Developer in Ireland
Danny will talk about working as a software developer in Dublin, Ireland where he currently works for Bank of America. He did mostly Python in his previous job and has switched to Scala recently. He will talk about work routines, how to find a job and living in Ireland in gerneral. He will also briefly compare this job to his previous job in London. If you are interested in working in the UK/Ireland, this is a good oportunity to ask questions.
Dein Compiler hat in Mathe besser aufgepasst als du - eine Einführung in Compileroptimierung und x86 Assembly.
Moderne C/C++ Compiler optimieren deinen Code, wenn du sie nett darum bittest, wie zum Beispiel das Entfernen ungenutzter Variablen oder überflüssiger Programmpfade. Aber wie gut ist das Ergebnis wirklich? Helfen micro-optimizations beim Programmieren oder sind das Überbleibsel aus den 90ern? Für diesen Vortrag sind keine Assembly Vorkenntnisse nötig.
Funktionale Programmierung in C
Immer mehr Sprachen greifen heutzutage Ideen aus der funktionalen Programmierung auf. Wie diese Konzepte auch in C verwendet werden können, soll dieser Vortrag zeigen. (Knüpft an den C-Programmierkurs an)
From Electrical Engineering to Privacy
Prof. Delphine Reinhardt will first talk about her motivations to teach and do research on privacy. She will then present selected research areas and topics she has addressed in the past years and also projects she is currently working on.
PGP and Cryptoparty
There will be a short talk about the "Pretty Good Privacy" encryption sheme, how and why it works and a "Cryptoparty", an opportunity to exchange and sign each others keys for secure communication. Bring your laptop!