Präsentationen und Vorträge
Präsentationen und Vorträge sind auf unserem Youtube-Kanal zusammengestellt.
Publikationen
2021
        
    
    
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Max A.
                    Deppert,
                
        
    
        
        
        
            
            
                    Klaus
                    Jansen, and
                
        
    
        
        
        
            
            
                    Lars
                    Rohwedder,
                
        
    
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
| Datei: | 2107.13638 | 
        
    
    
    
    
        
        
        
            
            
                    Ilia
                    Polian,
                
        
    
        
        
        
            
            
                    Frank
                    Altmann,
                
        
    
        
        
        
            
            
                    Tolga
                    Arul,
                
        
    
        
        
        
            
            
                    Christian
                    Boit,
                
        
    
        
        
        
            
            
                    Ralf
                    Brederlow,
                
        
    
        
        
        
            
            
                    Lucas
                    Davi,
                
        
    
        
        
        
            
            
                    Rolf
                    Drechsler,
                
        
    
        
        
        
            
            
                    Nan
                    Du,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
        
        
        
            
            
                    Tim
                    Güneysu,
                
        
    
        
        
        
            
            
                    Sascha
                    Hermann,
                
        
    
        
        
        
            
            
                    Matthias
                    Hiller,
                
        
    
        
        
        
            
            
                    Rainer
                    Leupers,
                
        
    
        
        
        
            
            
                    Farhad
                    Merchant,
                
        
    
        
        
        
            
            
                    Thomas
                    Mussenbrock,
                
        
    
        
        
        
            
            
                    Stefan
                    Katzenbeisser,
                
        
    
        
        
        
            
            
                    Akash
                    Kumar,
                
        
    
        
        
        
            
            
                    Wolfgang
                    Kunz,
                
        
    
        
        
        
            
            
                    Thomas
                    Mikolajick,
                
        
    
        
        
        
            
            
                    Vivek
                    Pachauri,
                
        
    
        
        
        
            
            
                    Jean-Pierre
                    Seifert,
                
        
    
        
        
        
            
            
                    Frank
                    Sill Torres, and
                
        
    
        
        
        
            
            
                    Jens
                    Trommer,
                
        
    
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
Nano Security: From Nano-Electronics to Secure Systems, in Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021 , IEEE, 2021. pp. 1334-1339.
| DOI: | 10.23919/DATE51398.2021.9474187 | 
        
    
    
    
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Klaus
                    Jansen, and
                
        
    
        
        
        
            
            
                    Kim{-}Manuel
                    Klein,
                
        
    
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
| DOI: | 10.1137/1.9781611976496.3 | 
| Datei: | 1.9781611976496.3 | 
        
    
    
    
        
        
        
            
            
                    Eike
                    Petersen,
                
        
    
        
        
        
            
            
                    Yannik
                    Potdevin,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
        
        
        
            
            
                    Stephan
                    Zidowitz,
                
        
    
        
        
        
            
            
                    Sabrina
                    Breyer,
                
        
    
        
        
        
            
            
                    Dirk
                    Nowotka,
                
        
    
        
        
        
            
            
                    Sandra
                    Henn,
                
        
    
        
        
        
            
            
                    Ludwig
                    Pechmann,
                
        
    
        
        
        
            
            
                    Martin
                    Leucker,
                
        
    
        
        
        
            
            
                    Philipp
                    Rostalski, and
                
        
    
        
        
        
            
            
                    Christian
                    Herzog,
                
        
    
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions, CoRR , vol. abs/2107.09546, 2021.
| Datei: | 2107.09546 | 
        
    
    
    
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Kilian
                    Grage,
                
        
    
        
        
        
            
            
                    Klaus
                    Jansen,
                
        
    
        
        
        
            
            
                    Lukas
                    Johannsen, and
                
        
    
        
        
        
            
            
                    Maria
                    Kosche,
                
        
    
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
| DOI: | 10.1007/978-3-030-80049-9_4 | 
| Datei: | 978-3-030-80049-9_4 | 
        
    
    
    
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Klaus
                    Jansen, and
                
        
    
        
        
        
            
            
                    Alexandra
                    Lassota,
                
        
    
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
| DOI: | 10.1007/978-3-030-67731-2_25 | 
| Datei: | 978-3-030-67731-2_25 | 
        
    
    
    
    
        
        
        
            
            
                    Luca
                    Wilke,
                
        
    
        
        
        
            
            
                    Jan
                    Wichelmann,
                
        
    
        
        
        
            
            
                    Florian
                    Sieck, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation, in 2021 IEEE Security and Privacy Workshops (SPW) , 2021. pp. 456-466.
| DOI: | 10.1109/SPW53761.2021.00064 | 
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SPW53761.2021.00064 | 
| Datei: | 
        
    
    
    
    
        
        
        
            
            
                    Florian
                    Sieck,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Jan
                    Wichelmann, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
| DOI: | 10.1145/3460120.3484783 | 
| Datei: | 3460120.3484783 | 
2020
        
    
    
    
    
        
        
        
            
            
                    Samira
                    Briongos,
                
        
    
        
        
        
            
            
                    Pedro
                    Malagon,
                
        
    
        
        
        
            
            
                    Jose M.
                    Moya, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 1967-1984.
| ISBN: | 978-1-939133-17-5 | 
| Datei: | briongos | 
        
    
    
    
    
        
        
        
            
            
                    Daniel
                    Moghimi,
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Nadia
                    Heninger,
                
        
    
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
TPM-FAIL: TPM meets Timing and Lattice Attacks, in 29th USENIX Security Symposium (USENIX Security 20) , Boston, MA: USENIX Association, Aug.2020. pp. 2057-2073.
| ISBN: | 978-1-939133-17-5 | 
| Weblink: | https://tpm.fail/ | 
| Datei: | moghimi-tpm | 
        
    
    
    
        
        
        
            
            
                    Zane
                    Weissman,
                
        
    
        
        
        
            
            
                    Thore
                    Tiemann,
                
        
    
        
        
        
            
            
                    Daniel
                    Moghimi,
                
        
    
        
        
        
            
            
                    Evan
                    Custodio,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2020, no. 3, pp. 169-195, Jun. 2020.
| DOI: | 10.13154/tches.v2020.i3.169-195 | 
| Datei: | Dateilink | 
| Bibtex: |  @article{weissman2020jackhammer,
  author       = {Zane Weissman and
                  Thore Tiemann and
                  Daniel Moghimi and
                  Evan Custodio and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {169--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi          = {10.13154/TCHES.V2020.I3.169-195}
} | 
        
    
    
    
    
        
        
        
            
            
                    Luca
                    Wilke,
                
        
    
        
        
        
            
            
                    Jan
                    Wichelmann,
                
        
    
        
        
        
            
            
                    Mathias
                    Morbitzer, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, Mai2020. pp. 1431-1444.
SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions, in 2020 IEEE Symposium on Security and Privacy (SP) , Los Alamitos, CA, USA: IEEE Computer Society, Mai2020. pp. 1431-1444.
| DOI: | 10.1109/SP40000.2020.00080 | 
| Weblink: | https://uzl-its.github.io/SEVurity/ | 
| Weblink: | https://doi.ieeecomputersociety.org/10.1109/SP40000.2020.00080 | 
        
    
    
    
    
        
        
        
            
            
                    Debajyoti
                    Das,
                
        
    
        
        
        
            
            
                    Sebastian
                    Meiser,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi, and
                
        
    
        
        
        
            
            
                    Aniket
                    Kate,
                
        
    
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
Comprehensive Anonymity Trilemma: User Coordination is not enough, in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
| DOI: | 10.2478/popets-2020-0056 | 
| Datei: | article-p356.xml | 
        
    
    
    
    
        
        
        
            
            
                    Samira
                    Briongos,
                
        
    
        
        
        
            
            
                    Pedro
                    Malag'on,
                
        
    
        
        
        
            
            
                    Jose Manuel
                    Moya, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
Microarchitectural Isolation Guarantees Through Execution Based Signatures, in XXXV Conference on Design of Circuits and Integrated Systems, DCIS, 2020, Segovia, Spain, November 18-20, 2020 , IEEE, 2020. pp. 1-6.
| DOI: | 10.1109/DCIS51330.2020.9268660 | 
| Datei: | DCIS51330.2020.9268660 | 
        
    
    
    
        
        
            
                Sebastian
                Berndt, and
            
            
        
        
    
        
        
            
            
                Maciej
                Liskiewicz,
            
        
        
    
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
        
    
    
    
    
        
        
        
            
            
                    Max
                    Bannach,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Martin
                    Schuster, and
                
        
    
        
        
        
            
            
                    Marcel
                    Wienöbst,
                
        
    
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
        
    
    
    
    
        
        
        
            
            
                    Max
                    Bannach,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Martin
                    Schuster, and
                
        
    
        
        
        
            
            
                    Marcel
                    Wienöbst,
                
        
    
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
        
    
    
    
    
        
        
        
            
            
                    Okan
                    Seker,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Luca
                    Wilke, and
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth,
                
        
    
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
| DOI: | 10.1145/3372297.3417889 | 
| Datei: | 3372297.3417889 | 
        
    
    
    
    
        
        
        
            
            
                    Max
                    Bannach,
                
        
    
        
        
        
            
            
                    Sebastian
                    Berndt,
                
        
    
        
        
        
            
            
                    Marten
                    Maack,
                
        
    
        
        
        
            
            
                    Matthias
                    Mnich,
                
        
    
        
        
        
            
            
                    Alexandra
                    Lassota,
                
        
    
        
        
        
            
            
                    Malin
                    Rau, and
                
        
    
        
        
        
            
            
                    Malte
                    Skambath,
                
        
    
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
2019
        
    
    
    
    
        
        
        
            
            
                    David
                    Sommer,
                
        
    
        
        
        
            
            
                    Aritra
                    Dhar,
                
        
    
        
        
        
            
            
                    Luka
                    Malisa,
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
        
        
        
            
            
                    Daniel
                    Ronzani, and
                
        
    
        
        
        
            
            
                    Srdjan
                    Capkun,
                
        
    
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, Feb.2019. pp. 649--666.
Deniable Upload and Download via Passive Participation, in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, Feb.2019. pp. 649--666.
| ISBN: | 978-1-931971-49-2 | 
| Datei: | sommer | 
        
    
    
    
        
        
        
            
            
                    Berk
                    Gulmezoglu,
                
        
    
        
        
        
            
            
                    Ahmad
                    Moghimi,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning, arXiv e-prints , 2019.
| Datei: | 2019arXiv190703651G | 
        
    
    
    
        
        
        
            
            
                    Damien
                    Desfontaines,
                
        
    
        
        
        
            
            
                    Elisabeth
                    Krahmer, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
Passive and active attackers in noiseless privacy, CoRR , vol. abs/1905.00650, 2019.
| Datei: | 1905.00650 | 
        
    
    
    
        
        
        
            
            
                    David
                    Sommer,
                
        
    
        
        
        
            
            
                    Sebastian
                    Meiser, and
                
        
    
        
        
        
            
            
                    Esfandiar
                    Mohammadi,
                
        
    
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy, Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
| DOI: | https://doi.org/10.2478/popets-2019-0029 | 
| Datei: | article-p245.xml | 
        
    
    
    
    
        
        
        
            
            
                    Saad
                    Islam,
                
        
    
        
        
        
            
            
                    Ahmad
                    Moghimi,
                
        
    
        
        
        
            
            
                    Ida
                    Bruhns,
                
        
    
        
        
        
            
            
                    Moritz
                    Krebbel,
                
        
    
        
        
        
            
            
                    Berk
                    Gulmezoglu,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks, in 28th USENIX Security Symposium (USENIX Security 19) , Santa Clara, CA: USENIX Association, 2019. pp. 621-637.
| ISBN: | 978-1-939133-06-9 | 
| Datei: | islam | 
        
    
    
    
    
        
        
        
            
            
                    Berk
                    Gulmezoglu,
                
        
    
        
        
        
            
            
                    Andreas
                    Zankl,
                
        
    
        
        
        
            
            
                    M. Caner
                    Tol,
                
        
    
        
        
        
            
            
                    Saad
                    Islam,
                
        
    
        
        
        
            
            
                    Thomas
                    Eisenbarth, and
                
        
    
        
        
        
            
            
                    Berk
                    Sunar,
                
        
    
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
Undermining User Privacy on Mobile Devices Using AI, in Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security , New York, NY, USA: ACM, 2019. pp. 214-227.
| DOI: | 10.1145/3321705.3329804 | 
| Datei: | 3321705.3329804 | 

- Forschung
- Publikationen
- Dissertationen
- Tools
- Seminar
- Projekte
 
