Programme
Sunday, June 16th
17:00-19:00
Registration
Monday, June 17th
08.00-09.00
Registration
08.50-09.00
Welcome
Introductory Talks - Part I
09.00-10.00
10.00-10.30
Coffee break
10.30-11.30
11.30-12.30
12.30-14.00
Lunch
14.00-15.00
15.00-16.00
16.00-16:30
Coffee Break
16.30-18.00
19.00-21.00
Tuesday, June 18th
Introductory Talks - Part II
09.00-10.00
From Smart Cities to Smart Sex Toys: A Hitchhiker’s Security & Privacy Guide to The Galaxy of Things – Ahmad-Reza Sadeghi
[abstract]
[abstract]
10.00-10.30
Coffee break
10.30-11.30
SCA workshop (10:30 - 17:30, in Sibenik XI (Hotel Ivan))
Evaluating the Security of Implementations Against Side Channel Attacks – Emmanuel Prouff [slides]
Evaluating the Security of Implementations Against Side Channel Attacks – Emmanuel Prouff [slides]
11.30-12.30
(i) Power analysis of degree-2 round functions [slides]
(ii) XKCP internals [slides] – Gilles Van Assche
(ii) XKCP internals [slides] – Gilles Van Assche
12.30-14.00
Lunch
14.00-15.00
Fault attacks on Embedded Software – Patrick Schaumont [slides]
15.00-15.30
Coffee Break
15.30-16.30
Smaller and faster public-key cryptosystems for IoT from genus-2 curves – Ben Smith [slides]
Security on the Line: Modern Curve-based Cryptography – Joost Renes [slides]
Security on the Line: Modern Curve-based Cryptography – Joost Renes [slides]
16:30-17:49
Lightning talks by (Master, PhD) students & postdocs
16:30: Mohammed B. M. Kamel: Addressing Model in DHT based Networks
16:38: Ján Jančár: JavaCard at CRoCS
16:48: Levente Kovács: Analysis of pseudorandom sequences
16:56: Muhammad Shujaat Mirza: Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
17:04: Michael Lewellen: CERES Technology
17:14: David Stainton: The Katzenpost Mix Network System
17:24: Piotr Krasnowski: Key exchange protocols over voice channels and verification using Tamarin Prover
17:34: Kacper Zujko: Improving Side Channel Analysis of XMSS
17:39: Anna Kaplan: Universally Composable and Privacy-Preserving Audit Logs Using Bulletin Board
16:30: Mohammed B. M. Kamel: Addressing Model in DHT based Networks
16:38: Ján Jančár: JavaCard at CRoCS
16:48: Levente Kovács: Analysis of pseudorandom sequences
16:56: Muhammad Shujaat Mirza: Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting
17:04: Michael Lewellen: CERES Technology
17:14: David Stainton: The Katzenpost Mix Network System
17:24: Piotr Krasnowski: Key exchange protocols over voice channels and verification using Tamarin Prover
17:34: Kacper Zujko: Improving Side Channel Analysis of XMSS
17:39: Anna Kaplan: Universally Composable and Privacy-Preserving Audit Logs Using Bulletin Board
Isogeny based cryptography implementation for FPGA – Pedro Massolino [slides]
Machine Learning and Side-channel Analysis – Stjepan Picek [slides]
Machine Learning and Side-channel Analysis – Stjepan Picek [slides]
Wednesday, June 19th
09:00-17:00
Thursday, June 20th
Session I (morning)
Session II (morning)
09.00-10.00
Run-time attack tutorial (09:00 - 12:30) – Lucas Davi & Ahmad-Reza Sadeghi
10.00-10.30
Coffee break
10.30-11.30
Verified Cryptography for Verified Protocols – Karthikeyan Bhargavan
[abstract] [slides] [Link to GitHub]
[abstract] [slides] [Link to GitHub]
11.30-12.30
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities – Juraj Somorovsky
[abstract] [slides]
[abstract] [slides]
12.30-14.00
Lunch
Session I (afternoon)
Session II (afternoon)
14.00-15.00
Hands-on hardware tutorial (14:00 - 17:30) – Nele Mentens
15.00-15.30
Coffee break
15.30-16.30
Selected Topics in Web Security – Engin Kirda
[abstract]
[abstract]
16.30-17.30
20.00
Friday, June 21st
Session I (morning)
Session II (morning)
09.00-10.00
Challenges in Real-world "Secure" Cryptographic Hardware Implementations – Elif Bilge Kavun
[abstract] [slides]
[abstract] [slides]
10.00-10.30
Coffee break
10.30-11.30
When foes are friends: adversarial examples as protective technologies – Carmela Troncoso
[abstract] [slides]
[abstract] [slides]
11.30-12.30
Recent advances in side-channel analysis using machine learning techniques – Annelie Heuser
[abstract] [slides]
[abstract] [slides]
12.30-14.00
Lunch
Session I (afternoon)
Session II (afternoon)
14.00-15.00
Advanced Malware: Attacks, Defenses, and Open Challenges – Engin Kirda
[abstract]
[abstract]
15.00-16.00
What makes a cipher efficient? Design choices and relevant metrics – Joan Daemen
[abstract] [slides]
[abstract] [slides]
16.00-16:45
Coffee break & Farewell