Day 0 (June 29)

============== 

19:00: Welcome cocktail at KAFENEIO (a restaurant of the conference hotel)

 

Day 1 (June 30)

==============

08:00--09:00: Registration

09:00--10:00 Bart Preneel, Lightweight and Secure Cryptographic Implementations for the Internet of Things

10:00--10:30 Coffee break

10:30--12:30 Cryptography and Cryptanalysis session

  • A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
  • Towards More Practical Time-Driven Cache Attacks
  • Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks

12:30--14:00 Lunch

14:00--16:00 Privacy session

  • Usable Privacy for Mobile Sensing Applications
  • A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection
  • AU2EU: Privacy-Preserving Matching of DNA Sequences (short paper)

16:00-16:30 Coffee break 

16:30--17:30 Pierangela Samarati, Data Protection in the Cloud 

20:00 Gala dinner

 

Day 2 (July 1)

==============

08:00--09:00: Registration

09:00--10:00 Paul England, TPM2.0 

10:00--10:30 Coffee break

10:30--11:50 Smart Cards and Embedded Devices session

  • New Countermeasures against Fault & Software Type Confusion Attacks on Java Cards
  • A Pre-processing Composition for Secret Key Recovery on Android Smartphone

11:50--12:30 End of Privacy session

  • End-to-End Secure and Privacy Preserving Mobile Chat Application

12:30--14:00 Lunch

14:00--16:00 Short paper session

  • S-box, SET, Match: A Toolbox for S-box Analysis
  • Policy-based Access Control for Body Sensor Nodes
  • CAN bus risk analysis revisit
  • Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider
  • Early DDoS Detection Based on Data Mining Techniques

16:00--16:30 Coffee break

16:30--17:30 Timo Kasper, Sweet Dreams and Nightmares: Security in the Internet of Things

 

Day 3 (July 2)

==============

09:00--11:00

Special Session on Emerging Cyber Security Challenges in the Era of Future Internet
(organized by TRUST)

Moderator and Session Chair: Ioannis Askoxylakis, FORTH-ICS, GR

Trust in Future Internet: the potential of Trustworthiness Enabling Technologies
Pascal Bisson, Thales, FR

Who turned off the lights? Detecting ATPs in electricity networks
Jorge Cuellar, Siemens, DE

Talk: TBA
Claire Vishik, Intel, UK

Special Session on Hardware-entangled Primitives: PUFs and More
(organized by TRUST)

Moderator and Session Chair: Ahmad-Reza Sadeghi, TU Darmstadt / CASED, DE

PUFs : Where are we standing?
Jean-Pierre Seifert, Technische Universität Berlin & Telekom Innovation Laboratories, DE

How puffy are PUFs? - On the state of the art of PUF-based protocol design and analysis
Christian Wachsmann, CASED, DE

11:00--11:30 Coffee break

11:30--12:45 Poster session (shared with WISTP)

"Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems"
Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer and Klaus Pohl

"Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents"
John Zic

"Authentication System using Encrypted Discrete Biometrics Data"
Kazuo Ohzeki, YuanYu Wei, Masaaki Kajihara, Masahiro Takatsuka, Yutaka Hirakawa, and Toru Sugimoto

"On the Development of Automated Forensic Analysis Methods for Mobile Devices"
Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, and Vassilis Prevelakis

"A Trusted Knowledge Management System for Multi-layer Threat Analysis"
Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, and Pawel Pawlinski

"Diagraming approach to structure the security lessons: Evaluation using Cognitive Dimensions"
Ying He, Maria Evangelopoulou, and Zhengshuai Lin

"TRACER: A Platform for Securing Legacy Code"
Kostantinos Stroggylos, Dimitris Mitropoulos, Zacharias Tzermias, Panagiotis Papadopoulos, Fotios Rafailidis, Diomidis Spinellis, Sotiris Ioannidis, and Panagiotis Katsaros

"Facilitating Trust on Data through Provenance"
Manolis Stamatogiannakis, Paul Groth, and Herbert Bos

"Early Warning Intrusion Detection System"
Panos Chatziadam, Ioannis G. Askoxylakis, Nikolaos E. Petroulakis and Alexandros G. Fragkiadakis 

12:45 Closing remarks

13:00--14:30 Lunch

14:30--18h00 or 19h00: Visit to the archaelogical museum of Heraklion