SUNDAY / AUGUST 23 |
|
20:00 | Welcome cocktail |
MONDAY / AUGUST 24 |
|
09:00 - 10:00 | Keynote 1: George Spanoudakis "Continuous certification of Cloud Service Security: Novel monitoring and hybrid approaches" |
10:00 - 11:00 | Coffee break and Poster Session (See List of poster at the bottom) |
11:00 - 12:30 | Session 1 - Hardware-enhanced Trusted Execution Florian Kohnhäuser, André Schaller and Stefan Katzenbeisser. "PUF-based Software Protection for low-end Embedded Devices" Fatemeh Ganji, Shahin Tajik and Jean-Pierre Seifert. "Why Attackers Win: On the Learnability of XOR Arbiter PUFs" Zhao Shijun and Qianying Zhang. "A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0" Thomas Nyman, Brian McGillion and N. Asokan. "On Making Emerging Trusted Execution Environments Accessible to Developers" |
12:30 - 14:00 | Lunch |
14:00 - 15:30 | Session 2 (90min) - Trust and Users Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros and Wim Vanobberghen. "Computing trust levels based on user’s personality and observed system trustworthiness" Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos and Sotiris Ioannidis. "Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering" Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova and Benjamin Reinheimer. "Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness" |
15:30 - 16:00 | Coffee break |
16:00 - 17:00 | Keynote 2: Elizabeth Quaglia "The practice of theory: Challenges in provable security for public-key encryption" |
20:00 | Gala dinner |
TUESDAY / AUGUST 25 |
|
09:30 - 10:30 | Keynote 3: Anand Rajan "Security for the Internet of Things (IoT) - Challenges & Opportunities" |
10:30 - 11:00 | Coffee break |
11:00 - 12:30 | Session 3 - Trusted Systems and Services Hamed Nemati, Mads Dam and Roberto Guanciale. "Trustworthy Memory Isolation of Linux on Embedded Devices" Sourav Bhattacharya, Otto Huhta and N Asokan. "LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling" Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef and Erik Zenner. "Ripple: Overview and Outlook" Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz and Maria Zhdanova. "Time to Rethink: Trust Brokerage using Trusted Execution Environments" |
12:30 - 14:00 | Lunch |
14:00 - 15:30 | Session 4 - Trust and Privacy David Förster, Hans Löhr, Jan Zibuschka and Frank Kargl. "REWIRE -- Revocation without Resolution: A Privacy-friendly Revocation Mechanism for Vehicular Ad-Hoc Networks" Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng and Shijun Zhao. "DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone" Rainer Urian and Liqun Chen." DAA-A: Direct Anonymous Attestation with Attributes" |
15:30 - 16:00 | Coffee break |
16:00 - 17:00 | Keynote 4: Louis Marinos "Presentation of ENISA Threat Landscape" |
18:00 - 21:00 | Visit to the archaelogical museum of Heraklion |
WEDNESDAY / AUGUST 26 |
|
09:30 - 11:00 | Session 5 - Building Blocks for Trust Andrei Lutas, Sandor Lukacs, Adrian Colesa and Dan Lutas. "Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection" Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif and Ulf Schlichtmann. "MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography" Ghassan Karame and Wenting Li. "Secure Erasure and Code Update in Legacy Sensors" Adrian Colesa, Sandor Lukacs, Vlad Topan, Radu Ciocas and Adrian Pop. "Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications" |
12:30 - 14:00 | Lunch (optional) |
14:00 | End of the conference |
LIST OF ACCEPTED PAPERS:
Full Papers:
- Florian Kohnhäuser, André Schaller and Stefan Katzenbeisser. PUF-based Software Protection for low-end Embedded Devices
- Fatemeh Ganji, Shahin Tajik and Jean-Pierre Seifert. Why Attackers Win: On the Learnability of XOR Arbiter PUFs
- Zhao Shijun and Qianying Zhang. A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
- Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros and Wim Vanobberghen. Computing trust levels based on user’s personality and observed system trustworthiness
- Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos and Sotiris Ioannidis. Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering
- Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova and Benjamin Reinheimer. Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
- Hamed Nemati, Mads Dam and Roberto Guanciale. Trustworthy Memory Isolation of Linux on Embedded Devices
- Sourav Bhattacharya, Otto Huhta and N Asokan. WebRep: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling
- Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef and Erik Zenner. Ripple: Overview and Outlook
- David Förster, Hans Löhr, Jan Zibuschka and Frank Kargl. REWIRE -- Revocation without Resolution: A Privacy-friendly Revocation Mechanism for Vehicular Ad-Hoc Networks
- Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng and Shijun Zhao. DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
- Rainer Urian and Liqun Chen. DAA-A: Direct Anonymous Attestation with Attributes
- Andrei Lutas, Sandor Lukacs, Adrian Colesa and Dan Lutas. Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection
- Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif and Ulf Schlichtmann. MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography
- Ghassan Karame and Wenting Li. Secure Erasure and Code Update in Legacy Sensors
Short papers:
- Thomas Nyman, Brian McGillion and N. Asokan. On Making Emerging Trusted Execution Environments Accessible to Developers
- Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz and Maria Zhdanova. Time to Rethink: Trust Brokerage using Trusted Execution Environments
- Adrian Colesa, Sandor Lukacs, Vlad Topan, Radu Ciocas and Adrian Pop. Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications
Posters:
- Jonathan Ouoba, Tegawendé F. Bissyandé and Cyril Cassagnes. Towards a Trust Model for Social Network of Wireless Smart Objects
- Mohamed Abdelshafy and Peter King. DSR under Attacks
- Jessica Buttigieg, Mark Vella and Christian Colombo. BYOD for Android — Just add Java
- John Galea and Mark Vella. Script fuzzing with an attacker's mind-set
- Mohamed Bishr, Christian Heinz, Torsten Bandyszak, Abigail Goldsteen and Micha Moffie. Trust and Trustworthiness Maintenance: from Architecture to Evaluation
- Elias Athanasopoulos, Martin Boehner, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis and John Thomson. Increasing the Trustworthiness of Embedded Applications
- Nidhi Rastogi and Dr. James Hendler. Exploring graph centralities for detecting anomalous behavior in large networks
- Vassilis Prevelakis and Mohammad Hamad. Extending the Operational Envelope of Applications