Login to access online version of proceedings

Ask credential to organizers
Login

 

Day 0 (August 23)

============== 

19:00--21:00: Welcome cocktail

 

Day 1 (August 24)

==============

08:00--09:00: Registration

09:00--10:00 Keynote 1

10:00--10:30 Coffee break

10:30--12:30 Security and Privacy Services

  • Radim Ostadal, Petr Svenda and Vashek Matyas, On Secrecy Amplification Protocols
  • Tassos Dimitriou and Ioannis Krontiris, Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
  • Alejandro Calleja, Pedro Peris-Lopez and Juan E. Tapiador, Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
  • Neyire Deniz Sarier, Private Minutia-based Fingerprint Matching

12:30--14:00 Lunch

14:00--16:00 Secure Resource Sharing and Access Control

  • Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg and Frank Piessens, Secure Resource Sharing for Embedded Protected Module Architectures
  • Hoi Le, Rei Safavi-Naini and Galib Asadullah, Secure Obfuscation of Authoring Style
  • Miguel Morales-Sandoval and Arturo Diaz-Perez, DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
  • Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas and Ioannis Papaefstathiou, WSACd - A Usable Access Control Framework for Smart Home Devices
  • David Jaeger, Amir Azodi, Feng Cheng and Christoph Meinel, Normalizing Security Events with a Hierarchical Knowledge Base (short paper)
  • Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos and Ioannis Askoxylakis, Secure and Authenticated Access to LLN Resources Through Policy Constraints  (short paper)

16:00-16:30 Coffee break 

16:30--17:30 Keynote 2

20:00 Gala dinner

 

Day 2 (August 25)

==============

08:30--09:30: Registration

09:30--10:30 Keynote 3

10:30--11:00 Coffee break

11:00--12:30 Secure Devices and Execution Environment

  • Masoud Narouei and Hassan Takabi, Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
  • Ghada Arfaoui, Saïd Gharout, Jean-Francois Lalande and Jacques Traoré, Practical and Privacy-Preserving TEE Migration
  • Duc-Phong Le, Chik How Tan and Michael Tunstall, Randomizing the Montgomery Powering Ladder
  • George Hatzivasilis, Ioannis Papaefsfathiou, Charalampos Manifavas and Ioannis Askoxylakis, Lightweight Password Hashing Scheme for Embedded Systems (short paper)

12:30--14:00 Lunch

14:00--15:30 Challenges of Security and Reliability

  • Siegfried Rasthofer, Irfan Asrar, Stephan Huber and Eric Bodden, How Current Android Malware Seeks to Evade Automated Code Analysis
  • Sietse Ringers, Jaap-Henk Hoepman and Wouter Lueks, On linkability and malleability in self-blindable credentials
  • Qiao Hu, Lavinia Dinca and Gerhard Hancke, Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
  • Marieta Georgieva Ivanova, René Rydhof Hansen, Florian Kammueller and Christian W. Probst, Attack Tree Generation by Policy Invalidation (short paper)

15:30--16:00 Coffee break

16:00--17:00 Keynote 4

18:00--21:00: Visit to the archaelogical museum of Heraklion 

Accepted papers



Full Papers:

 

  1. Siegfried Rasthofer, Irfan Asrar, Stephan Huber and Eric Bodden, How Current Android Malware Seeks to Evade Automated Code Analysis
  2. Radim Ostadal, Petr Svenda and Vashek Matyas, On Secrecy Amplification Protocols
  3. Duc-Phong Le, Chik How Tan and Michael Tunstall, Randomizing the Montgomery Powering Ladder
  4. Tassos Dimitriou and Ioannis Krontiris, Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
  5. Masoud Narouei and Hassan Takabi, Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
  6. Ghada Arfaoui, Saïd Gharout, Jean-Francois Lalande and Jacques Traoré, Practical and Privacy-Preserving TEE Migration
  7. Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg and Frank Piessens, Secure Resource Sharing for Embedded Protected Module Architectures
  8. Hoi Le, Rei Safavi-Naini and Galib Asadullah, Secure Obfuscation of Authoring Style
  9. Neyire Deniz Sarier, Private Minutia-based Fingerprint Matching
  10. Miguel Morales-Sandoval and Arturo Diaz-Perez, DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
  11. Sietse Ringers, Jaap-Henk Hoepman and Wouter Lueks, On linkability and malleability in self-blindable credentials
  12. Alejandro Calleja, Pedro Peris-Lopez and Juan E. Tapiador, Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
  13. Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas and Ioannis Papaefstathiou, WSACd - A Usable Access Control Framework for Smart Home Devices
  14. Qiao Hu, Lavinia Dinca and Gerhard Hancke, Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality


Short Papers

 

  1. David Jaeger, Amir Azodi, Feng Cheng and Christoph Meinel, Normalizing Security Events with a Hierarchical Knowledge Base
  2. Marieta Georgieva Ivanova, René Rydhof Hansen, Florian Kammueller and Christian W. Probst, Attack Tree Generation by Policy Invalidation
  3. George Hatzivasilis, Ioannis Papaefsfathiou, Charalampos Manifavas and Ioannis Askoxylakis, Lightweight Password Hashing Scheme for Embedded Systems
  4. Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos and Ioannis Askoxylakis, Secure and Authenticated Access to LLN Resources Through Policy Constraints