Programme

SUNDAY / AUGUST 23
20:00 Welcome cocktail

MONDAY / AUGUST 24
09:00 - 10:00 Keynote 1: George Spanoudakis
"Continuous certification of Cloud Service Security: Novel monitoring and hybrid approaches"
10:00 - 11:00 Coffee break and Poster Session (See List of poster at the bottom)
11:00 - 12:30

Session 1 - Hardware-enhanced Trusted Execution

Florian Kohnhäuser, André Schaller and Stefan Katzenbeisser. "PUF-based Software Protection for low-end Embedded Devices"

Fatemeh Ganji, Shahin Tajik and Jean-Pierre Seifert. "Why Attackers Win: On the Learnability of XOR Arbiter PUFs"

Zhao Shijun and Qianying Zhang. "A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0"

Thomas Nyman, Brian McGillion and N. Asokan. "On Making Emerging Trusted Execution Environments Accessible to Developers"

12:30 - 14:00 Lunch
14:00 - 15:30

Session 2 (90min) - Trust and Users

Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros and Wim Vanobberghen. "Computing trust levels based on user’s personality and observed system trustworthiness"

Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos and Sotiris Ioannidis. "Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering"

Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova and Benjamin Reinheimer. "Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness"

15:30 - 16:00 Coffee break
16:00 - 17:00 Keynote 2: Elizabeth Quaglia
"The practice of theory: Challenges in provable security for public-key encryption" Presentation in PDF
20:00 Gala dinner

TUESDAY / AUGUST 25
09:30 - 10:30 Keynote 3: Anand Rajan
"Security for the Internet of Things (IoT) - Challenges & Opportunities" Presentation in PDF
10:30 - 11:00 Coffee break
11:00 - 12:30

Session 3 - Trusted Systems and Services

Hamed Nemati, Mads Dam and Roberto Guanciale. "Trustworthy Memory Isolation of Linux on Embedded Devices"

Sourav Bhattacharya, Otto Huhta and N Asokan. "LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling"

Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef and Erik Zenner. "Ripple: Overview and Outlook"

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz and Maria Zhdanova. "Time to Rethink: Trust Brokerage using Trusted Execution Environments"

12:30 - 14:00 Lunch
14:00 - 15:30

Session 4 - Trust and Privacy

David Förster, Hans Löhr, Jan Zibuschka and Frank Kargl. "REWIRE -- Revocation without Resolution: A Privacy-friendly Revocation Mechanism for Vehicular Ad-Hoc Networks"

Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng and Shijun Zhao. "DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone"

Rainer Urian and Liqun Chen." DAA-A: Direct Anonymous Attestation with Attributes"

15:30 - 16:00 Coffee break
16:00 - 17:00 Keynote 4: Louis Marinos
"Presentation of ENISA Threat Landscape"
18:00 - 21:00 Visit to the archaelogical museum of Heraklion

WEDNESDAY / AUGUST 26
09:30 - 11:00

Session 5 - Building Blocks for Trust

Andrei Lutas, Sandor Lukacs, Adrian Colesa and Dan Lutas. "Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection"

Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif and Ulf Schlichtmann. "MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography"

Ghassan Karame and Wenting Li. "Secure Erasure and Code Update in Legacy Sensors"

Adrian Colesa, Sandor Lukacs, Vlad Topan, Radu Ciocas and Adrian Pop. "Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications"

12:30 - 14:00 Lunch (optional)
14:00 End of the conference

 

LIST OF ACCEPTED PAPERS:

Full Papers:

  1. Florian Kohnhäuser, André Schaller and Stefan Katzenbeisser. PUF-based Software Protection for low-end Embedded Devices
  2. Fatemeh Ganji, Shahin Tajik and Jean-Pierre Seifert. Why Attackers Win: On the Learnability of XOR Arbiter PUFs
  3. Zhao Shijun and Qianying Zhang. A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
  4. Michalis Kanakakis, Shenja van der Graaf, Costas Kalogiros and Wim Vanobberghen. Computing trust levels based on user’s personality and observed system trustworthiness
  5. Christos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos and Sotiris Ioannidis. Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote Filtering
  6. Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova and Benjamin Reinheimer. Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
  7. Hamed Nemati, Mads Dam and Roberto Guanciale. Trustworthy Memory Isolation of Linux on Embedded Devices
  8. Sourav Bhattacharya, Otto Huhta and N Asokan. WebRep: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling
  9. Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef and Erik Zenner. Ripple: Overview and Outlook
  10. David Förster, Hans Löhr, Jan Zibuschka and Frank Kargl. REWIRE -- Revocation without Resolution: A Privacy-friendly Revocation Mechanism for Vehicular Ad-Hoc Networks
  11. Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng and Shijun Zhao. DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
  12. Rainer Urian and Liqun Chen. DAA-A: Direct Anonymous Attestation with Attributes
  13. Andrei Lutas, Sandor Lukacs, Adrian Colesa and Dan Lutas. Proposed Processor Extensions for Significant Speedup of Hypervisor Memory Introspection
  14. Qingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif and Ulf Schlichtmann. MWA Skew SRAM Based SIMPL Systems for Public-Key Physical Cryptography
  15. Ghassan Karame and Wenting Li. Secure Erasure and Code Update in Legacy Sensors

Short papers:

  1. Thomas Nyman, Brian McGillion and N. Asokan. On Making Emerging Trusted Execution Environments Accessible to Developers
  2. Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz and Maria Zhdanova. Time to Rethink: Trust Brokerage using Trusted Execution Environments
  3. Adrian Colesa, Sandor Lukacs, Vlad Topan, Radu Ciocas and Adrian Pop. Efficient Provisioning of a Trustworthy Environment for Security-Sensitive Applications

Posters:

  1. Jonathan Ouoba, Tegawendé F. Bissyandé and Cyril Cassagnes. Towards a Trust Model for Social Network of Wireless Smart Objects
  2. Mohamed Abdelshafy and Peter King. DSR under Attacks
  3. Jessica Buttigieg, Mark Vella and Christian Colombo. BYOD for Android — Just add Java
  4. John Galea and Mark Vella. Script fuzzing with an attacker's mind-set
  5. Mohamed Bishr, Christian Heinz, Torsten Bandyszak, Abigail Goldsteen and Micha Moffie. Trust and Trustworthiness Maintenance: from Architecture to Evaluation
  6. Elias Athanasopoulos, Martin Boehner, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis and John Thomson. Increasing the Trustworthiness of Embedded Applications
  7. Nidhi Rastogi and Dr. James Hendler. Exploring graph centralities for detecting anomalous behavior in large networks
  8. Vassilis Prevelakis and Mohammad Hamad. Extending the Operational Envelope of Applications