{"id":7532,"date":"2019-02-01T10:33:25","date_gmt":"2019-02-01T09:33:25","guid":{"rendered":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/"},"modified":"2019-02-01T10:33:25","modified_gmt":"2019-02-01T09:33:25","slug":"snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/","title":{"rendered":"SnT Distinguished Lecture &#8211; Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p><strong>Booking essential<\/strong><\/p><p><strong>Please book online <a href=\"https:\/\/www.eventbrite.com\/e\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-tickets-55751080984\" target=\"_blank\" title=\"\" rel=\"noopener\">here<\/a><\/strong><\/p><p>After years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.<\/p><p>This talk will provide an overview of hardware-assisted security. We will discuss the impact of deployed solutions, their strengths and shortcomings, as well as new research directions.<\/p><p><strong>Ahmad-Reza Sadeghi<\/strong> is a professor of Computer Science at the TU Darmstadt, Germany. He is the head of the Systems Security Lab at the Cybersecurity Research Center of TU Darmstadt. He is also the director of the Intel Research Institute for Collaborative Autonomous Resilient Systems (ICRI-CARS) at TU Darmstadt. He holds a Ph.D. in Computer Science from the University of Saarland, Germany. Prior to academia, he worked in R&#038;D of Telecommunications enterprises, amongst others Ericsson Telecommunications.<\/p><p>He has been continuously contributing to security and privacy research.<\/p><p>He was Editor-In-Chief of IEEE Security and Privacy Magazine, served 5 years on the editorial board of the ACM Transactions on Information and System Security (TISSEC), and is currently on the editorial boards of ACM Books, ACM TODAES, ACM TIOT and ACM DTRAP.<\/p><p>For his influential research on Trusted and Trustworthy Computing he received the renowned German \u201cKarl Heinz Beckurts\u201d award. This award honors excellent scientific achievements with high impact on industrial innovations in Germany. In 2018 Prof. Sadeghi received the ACM SIGSAC Outstanding Contributions Award for dedicated research, education, and management leadership in the security community and for pioneering contributions in content protection, mobile security and hardware-assisted security. SIGSAC is ACM\u2019s Special Interest Group on Security, Audit and Control.<\/p><p><i><strong>Please note that a photographer will be present at this event. The images may be published by the University, e.g. on its social media, its website and in print products. If you do not wish to be photographed, please alert the organisers and the photographer.<\/strong><\/i><\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.<\/p>\n","protected":false},"author":0,"featured_media":7533,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2019-03-13 11:45:00","event_end_date":"2019-03-13 12:45:00","event_speaker_name":"Prof. Ahmad-Reza Sadeghi, TU Darmstadt","event_speaker_link":"","event_is_online":false,"event_location":"Room 3.010, Maison du Savoir,\r\nBelval Campus, 2, avenue de l'Universit\u00e9,\r\nL-4365 Esch-sur-Alzette","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[184,226],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security - Universit\u00e9 du Luxembourg<\/title>\n<meta name=\"description\" content=\"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security\" \/>\n<meta property=\"og:description\" content=\"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/\" \/>\n<meta property=\"og:site_name\" content=\"UNI FR\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uni.lu\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/\",\"url\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/\",\"name\":\"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security - Universit\u00e9 du Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg\",\"datePublished\":\"2019-02-01T09:33:25+00:00\",\"dateModified\":\"2019-02-01T09:33:25+00:00\",\"description\":\"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"name\":\"Uni.lu\",\"description\":\"Universit\u00e9 du Luxembourg\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\"},\"alternateName\":\"Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#organization\",\"name\":\"Universit\u00e9 du Luxembourg\",\"alternateName\":\"Uni.lu\",\"url\":\"https:\/\/www.uni.lu\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Universit\u00e9 du Luxembourg\"},\"image\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg\",\"sameAs\":[\"https:\/\/www.facebook.com\/uni.lu\",\"https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/\",\"https:\/\/www.instagram.com\/uni.lu\",\"https:\/\/www.youtube.com\/@uni_lu\",\"https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg\"],\"email\":\"communication@uni.lu\",\"telephone\":\"+352 46 66 44 1\",\"address\":{\"@type\":\"PostalAddress\",\"streetAddress\":\"2, place de l\u2019Universit\u00e9\",\"addressLocality\":\"Esch-sur-Alzette\",\"postalCode\":\"4365\",\"addressCountry\":\"LU\"},\"description\":\"Universit\u00e9 du Luxembourg\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security - Universit\u00e9 du Luxembourg","description":"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/","og_locale":"fr_FR","og_type":"article","og_title":"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security","og_description":"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.","og_url":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/","og_site_name":"UNI FR","article_publisher":"https:\/\/www.facebook.com\/uni.lu","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/","url":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/","name":"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security - Universit\u00e9 du Luxembourg","isPartOf":{"@id":"https:\/\/www.uni.lu\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg","datePublished":"2019-02-01T09:33:25+00:00","dateModified":"2019-02-01T09:33:25+00:00","description":"Booking essentialPlease book online hereAfter years of research in hardware security, we are still missing adequate solutions to protect modern computing platforms. Deployed hardware solutions like PUFs, TPMs, and Trusted Execution Environments (TEEs) are lacking widespread usage, or have been attacked through various side-channels. Additionally, we are witnessing a shift towards cross-layer attacks, exploiting hardware vulnerabilities from software, also remotely, as demonstrated recently by attacks like CLKScrew, Meltdown, and Spectre, which affect even systems with advanced defenses such as Control Flow Integrity (CFI). Moreover, the Hack@DAC 2018 hardware security competition revealed a protection gap for current chip designs, since existing verification approaches may fail to detect certain classes of vulnerabilities in RTL code.","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2019\/02\/snt_distinguished_lecture_promises_pitfalls_and_opportunities_of_hardware_assisted_security.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fr\/events\/snt-distinguished-lecture-mind-the-gap-promises-pitfalls-and-opportunities-of-hardware-assisted-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/www.uni.lu\/fr\/events\/"},{"@type":"ListItem","position":3,"name":"SnT Distinguished Lecture - Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fr\/#website","url":"https:\/\/www.uni.lu\/fr\/","name":"Uni.lu","description":"Universit\u00e9 du Luxembourg","publisher":{"@id":"https:\/\/www.uni.lu\/fr\/#organization"},"alternateName":"Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fr\/#organization","name":"Universit\u00e9 du Luxembourg","alternateName":"Uni.lu","url":"https:\/\/www.uni.lu\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"Universit\u00e9 du Luxembourg"},"image":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/04\/24120552\/20200609-Belval-Campus_Henri-Goergen-23.jpg","sameAs":["https:\/\/www.facebook.com\/uni.lu","https:\/\/www.linkedin.com\/school\/university-of-luxembourg\/","https:\/\/www.instagram.com\/uni.lu","https:\/\/www.youtube.com\/@uni_lu","https:\/\/en.wikipedia.org\/wiki\/University_of_Luxembourg"],"email":"communication@uni.lu","telephone":"+352 46 66 44 1","address":{"@type":"PostalAddress","streetAddress":"2, place de l\u2019Universit\u00e9","addressLocality":"Esch-sur-Alzette","postalCode":"4365","addressCountry":"LU"},"description":"Universit\u00e9 du Luxembourg"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7532"}],"collection":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/comments?post=7532"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events\/7532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media\/7533"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/media?parent=7532"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-topic?post=7532"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/events-type?post=7532"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fr\/wp-json\/wp\/v2\/organisation?post=7532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}