Login to access online version of proceedings
Day 0 (August 23)
==============
19:00--21:00: Welcome cocktail
Day 1 (August 24)
==============
08:00--09:00: Registration
09:00--10:00 Keynote 1
10:00--10:30 Coffee break
10:30--12:30 Security and Privacy Services
- Radim Ostadal, Petr Svenda and Vashek Matyas, On Secrecy Amplification Protocols
- Tassos Dimitriou and Ioannis Krontiris, Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
- Alejandro Calleja, Pedro Peris-Lopez and Juan E. Tapiador, Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
- Neyire Deniz Sarier, Private Minutia-based Fingerprint Matching
12:30--14:00 Lunch
14:00--16:00 Secure Resource Sharing and Access Control
- Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg and Frank Piessens, Secure Resource Sharing for Embedded Protected Module Architectures
- Hoi Le, Rei Safavi-Naini and Galib Asadullah, Secure Obfuscation of Authoring Style
- Miguel Morales-Sandoval and Arturo Diaz-Perez, DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
- Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas and Ioannis Papaefstathiou, WSACd - A Usable Access Control Framework for Smart Home Devices
- David Jaeger, Amir Azodi, Feng Cheng and Christoph Meinel, Normalizing Security Events with a Hierarchical Knowledge Base (short paper)
- Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos and Ioannis Askoxylakis, Secure and Authenticated Access to LLN Resources Through Policy Constraints (short paper)
16:00-16:30 Coffee break
16:30--17:30 Keynote 2
20:00 Gala dinner
Day 2 (August 25)
==============
08:30--09:30: Registration
09:30--10:30 Keynote 3
10:30--11:00 Coffee break
11:00--12:30 Secure Devices and Execution Environment
- Masoud Narouei and Hassan Takabi, Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
- Ghada Arfaoui, Saïd Gharout, Jean-Francois Lalande and Jacques Traoré, Practical and Privacy-Preserving TEE Migration
- Duc-Phong Le, Chik How Tan and Michael Tunstall, Randomizing the Montgomery Powering Ladder
- George Hatzivasilis, Ioannis Papaefsfathiou, Charalampos Manifavas and Ioannis Askoxylakis, Lightweight Password Hashing Scheme for Embedded Systems (short paper)
12:30--14:00 Lunch
14:00--15:30 Challenges of Security and Reliability
- Siegfried Rasthofer, Irfan Asrar, Stephan Huber and Eric Bodden, How Current Android Malware Seeks to Evade Automated Code Analysis
- Sietse Ringers, Jaap-Henk Hoepman and Wouter Lueks, On linkability and malleability in self-blindable credentials
- Qiao Hu, Lavinia Dinca and Gerhard Hancke, Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
- Marieta Georgieva Ivanova, René Rydhof Hansen, Florian Kammueller and Christian W. Probst, Attack Tree Generation by Policy Invalidation (short paper)
15:30--16:00 Coffee break
16:00--17:00 Keynote 4
18:00--21:00: Visit to the archaelogical museum of Heraklion
Accepted papers

Full Papers:
- Siegfried Rasthofer, Irfan Asrar, Stephan Huber and Eric Bodden, How Current Android Malware Seeks to Evade Automated Code Analysis
- Radim Ostadal, Petr Svenda and Vashek Matyas, On Secrecy Amplification Protocols
- Duc-Phong Le, Chik How Tan and Michael Tunstall, Randomizing the Montgomery Powering Ladder
- Tassos Dimitriou and Ioannis Krontiris, Privacy-respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing
- Masoud Narouei and Hassan Takabi, Automatic Top-down Role Engineering Framework Using Natural Language Processing Techniques
- Ghada Arfaoui, Saïd Gharout, Jean-Francois Lalande and Jacques Traoré, Practical and Privacy-Preserving TEE Migration
- Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg and Frank Piessens, Secure Resource Sharing for Embedded Protected Module Architectures
- Hoi Le, Rei Safavi-Naini and Galib Asadullah, Secure Obfuscation of Authoring Style
- Neyire Deniz Sarier, Private Minutia-based Fingerprint Matching
- Miguel Morales-Sandoval and Arturo Diaz-Perez, DET-ABE: a Java API for data confidentiality and fine-grained access control from Attribute Based Encryption
- Sietse Ringers, Jaap-Henk Hoepman and Wouter Lueks, On linkability and malleability in self-blindable credentials
- Alejandro Calleja, Pedro Peris-Lopez and Juan E. Tapiador, Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
- Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas and Ioannis Papaefstathiou, WSACd - A Usable Access Control Framework for Smart Home Devices
- Qiao Hu, Lavinia Dinca and Gerhard Hancke, Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality
Short Papers
- David Jaeger, Amir Azodi, Feng Cheng and Christoph Meinel, Normalizing Security Events with a Hierarchical Knowledge Base
- Marieta Georgieva Ivanova, René Rydhof Hansen, Florian Kammueller and Christian W. Probst, Attack Tree Generation by Policy Invalidation
- George Hatzivasilis, Ioannis Papaefsfathiou, Charalampos Manifavas and Ioannis Askoxylakis, Lightweight Password Hashing Scheme for Embedded Systems
- Konstantinos Rantos, Konstantinos Fysarakis, Othonas Soultatos and Ioannis Askoxylakis, Secure and Authenticated Access to LLN Resources Through Policy Constraints