Send email Copy Email Address

2026-01-15
Andrea Ruffing

CISPA-UCT Summer School 2026

When:  February 16-18, 2026

Where: UCT, Cape Town, South Africa 

We are inviting applications from graduate students and researchers in the areas of Computer Science and Cybersecurity with a focus on AI. During our annual scientific event, students will have the opportunity to follow one week of scientific talks and workshops, present their own work during poster sessions and discuss relevant topics with fellow researchers and expert speakers. This year's edition is in collaboration with UCT, Cape Town and will take place in South Africa. 

Application Process: Please fill in our online application form. 

Notification of Acceptance: We will notify you via email.

Fee: none

Deadline for Regular Application: February 09, 2026.

 

Program

Invited Speakers

Daniel Arp, TU Wien

Title: Pitfalls in AI for Security

Abstract: Advances in computational power and the proliferation of massive datasets have propelled artificial intelligence (AI) to achieve major breakthroughs across a wide spectrum of applications—from image recognition and natural language processing to autonomous systems and scientific discovery. Yet when AI techniques are applied to security, they encounter a host of subtle pitfalls that can seriously undermine performance and, in the worst case, render learning-based systems unsuitable for real-world deployment. In this lecture, we will take an in-depth look at these pitfalls and explore how they manifest in various security domains, such as malware detection and vulnerability discovery, where they frequently lead to inflated assessments of system effectiveness. We’ll survey illustrative case studies drawn from academic literature to gauge the prevalence of these issues and, finally, discuss recommendations for avoiding them when designing experiments.

Bio: Daniel Arp is a tenure-track Assistant Professor in the Security and Privacy Research Unit at Technische Universität Wien. Previously, he held a postdoctoral research position at TU Berlin and a visiting research position at University College London and King’s College London. He received his Ph.D. with honours in Computer Science from TU Braunschweig. Additionally, he holds a master’s degree in Computer Engineering from TU Berlin. Daniel’s research interests encompass the development of learning-based methodologies to fortify the security and privacy of systems.

Kathrin Grosse, IBM

Title: From AI Vulnerabilities to AI Security Incident Reporting and Beyond

Abstract: In this talk, we revisit the evidence of vulnerabilities and exploits within the realm of Artificial Intelligence, encompassing both traditional AI and Large Language Models (LLMs). Such vulnerabilities necessitate prevention, which we suggest could be handled by incident reporting. Such a procedure has been established in non-AI security - yet AI security warrants special treatment due to AI being versatile, and AI models differ significantly from software with vulnerabilities. However, a significant challenge is not just the lack of a standardized reporting framework, but also a knowledge gap among practitioners. Even when they are aware of the risks, many lack the practical guidance needed to effectively evaluate and secure their models. Our discussion will thus also cover how to threat model real-world applications using AI.
 
Bio: In this talk, we revisit the evidence of vulnerabilities and exploits within the realm of Artificial Intelligence, encompassing both traditional AI and Large Language Models (LLMs). Such vulnerabilities necessitate prevention, which we suggest could be handled by incident reporting. Such a procedure has been established in non-AI security - yet AI security warrants special treatment due to AI being versatile, and AI models differ significantly from software with vulnerabilities. However, a significant challenge is not just the lack of a standardized reporting framework, but also a knowledge gap among practitioners. Even when they are aware of the risks, many lack the practical guidance needed to effectively evaluate and secure their models. Our discussion will thus also cover how to threat model real-world applications using AI.

 

Sofía Celi, Brave

Title: Practical Cryptography: From Deployed Primitives to Real-World Protocol Design
 
Abstract: This series examines how modern cryptographic techniques are used in real systems and how design choices shape their security and social impact. We will explore privacy in large-scale deployments, the guarantees and limitations of network and web protocols, and the use of zero-knowledge proofs in attestation and credential verification. 
Participants will learn how these mechanisms work, how they fail, and how such failures can affect vulnerable communities. We will also discuss private information retrieval in privacy-preserving services and advanced authentication mechanisms that combine several cryptographic tools.
 
Throughout the series, we will connect technical concepts to real-world consequences and highlight how to design systems that are secure, deployable, and protective in practice.
 
Bio: Sofía Celi is a Senior Cryptography and Security Researcher at Brave, specializing in privacy-enhancing technologies, post-quantum cryptography, and practical applications of zero-knowledge proofs. She contributed to the Off-the-Record (OTR) messaging protocol and co-authored the post-quantum signature scheme MAYO, submitted to NIST. Sofía is an Honorary Industrial Fellow at the University of Bristol, and sits on the Advisory Council of the Open Technology Fund. She also holds leadership roles within the IETF, IRTF, and W3C, and advises international human-rights organizations on the impact of emerging technologies. She is a co-founder of Criptolatinos and WinC.
 
CISPA Speakers
 
Lea Schönherr, CISPA 
 
Wouter Lueks, CISPA
 
Mridula Singh, CISPA 
Title: TRICK: Time and Range Integrity Checks  (Keep or remove word TRICK to keep consistency with other titles) 
 
Abstract: Wide-area positioning is foundational to applications ranging from aviation and maritime operations to drones and connected vehicles, yet the signals we rely on, especially GNSS, remain susceptible to spoofing attacks. In this lecture, we will build intuition for what “secure positioning” means and why it is harder than simply adding cryptography to existing systems. We will then look at verifiable multilateration (VM) as a representative secure positioning technique: VM forms a constrained geometric region using multiple two-way ranging (TWR) interactions, but its reliance on uplink receptions makes it difficult to deploy at a wide-area scale. We then introduce TRICK, a technique that bridges this gap by allowing authenticated broadcast signals to contribute in secure region formation, while requiring only a minimal number of TWR measurements. We close by discussing what TRICK changes for practical secure coverage at scale, and what it implies for designing the next generation of secure wide-area positioning systems.
 
Bio: Mridula Singh is a tenure-track faculty member at the CISPA Helmholtz Center for Information Security in Saarbrücken, Germany. Her primary research focus is systems security and wireless security, with emphasis on practical attacks and deployable defenses. Her work on physical-layer Message Time-of-Arrival Codes has been used for securing passive keyless entry and start systems in commercial vehicles. She is currently working on securing sensing modalities for autonomous vehicles and designing scalable positioning systems. Prior to joining CISPA, she co-founded Trishulam during her master’s studies and worked as a research engineer at Xerox Research Center India. She received her M.Tech. in Computer Science from IIIT-Delhi, India, and her Ph.D. in Computer Science from ETH Zurich, Switzerland.
 
 

More details will follow soon. 

Please have a look at last year's school,  2024's Summer School on Usable Security , 2024 Summer School on Privacy-Preserving CryptographySummer School 2023Summer School 2022, or our Digital Summer School 2021 to get a general idea of the event. 

If you have any questions or queries for any of our summer schools, our Summer-School team will be glad to help via summer-school@cispa.de

Please note that we are always publishing speakers and topics/titles on our website, as soon as they are confirmed. Please refrain from requesting titles and detailed topics etc. via e-mail. If you want to wait with your application until the detailed program is finished, that is perfectly fine. We just want to give interested students this opportunity to register early and secure their spot ahead of time.