09:15 - 09:30 Opening Remarks

09:30 - 10:30 Session 1: Sotiris Ioannidis, Security applications of GPUs

10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 2: Authentication and Key Management

  • Securing Transactions with the eIDAS Protocols
    Frank Morgner, Paul Bastian, and Marc Fischlin
  • Novel Lightweight Signcryption-based Key Distribution Mechanisms for MIKEY
    Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent
  • Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
    Vlasta Stavova, Vashek Matyas, and Mike Just

12:30 - 14:00 Lunch

14:00 - 15:30 Session 3: Secure Hardware Systems

  • An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
    Jan Tobias Muhlberg, Sara Cleemput, Mustafa A. Mustafa, 
    Jo Van Bulck, Bart Preneel, and Frank Piessens
  • Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
    Vassilios Vassilakis, Emmanouil Panaousis, and 
    Haralambos Mouratidis
  • An HMM-based Anomaly Detection Approach for SCADA Systems
    Kyriakos Stefanidis and Artemios G. Voyiatzis

15:30 - 16:00 Coffee Break

16:00 - 17:30 Session 4: Attacks to Software and Network Systems

  • Towards Automatic Risk Analysis and Mitigation of Software Applications
    Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, and Antonio Lioy
  • Runtime Code Polymorphism as a Protection against Side Channel Attacks
    Damien Couroussé, Thierno Barry, Bruno Robisson, 
    Philippe Jaillon, Olivier Potin, and Jean-Louis Lanet
  • Analysis of a Code-based Countermeasure against Side-Channel and Fault Attacks
    Guillaume Barbu and Alberto Battistello



09:00 - 10:00 Session 5: Jean-Jacques Quisquater, Old stories, new results: public-key cryptosystems, coprocessors, blockchains ... 

10:00 - 10:30 Session 6: Watermarks

  • Fault-Channel Watermarks
    Peter Samarin, Alexander Skripnik, and Kerstin Lemke-Rust

10:30 - 11:00 Coffee Break  

11:00 - 12:30 Session 7: Privacy and Malware Detection

  • LAMP - Label-based Access-control for More Privacy in Online Social Networks
    Leila Bahri, Barbara Carminati, Elena Ferrari, and William Lucia
  • Privacy-Preserving Two-Party Skyline Queries over Horizontally Partitioned Data
    Ling Chen, Ting Yu, and Rada Chirkova
  • Attacking and Defending Dynamic Analysis System-Calls Based IDS
    Ishai Rosenberg and Ehud Gudes

12:30 - 14:00 Lunch

14:00 - 16:00 Session 8: Short Papers

  • The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment
    Ahmad Sabouri
  • Delegating Biometric Authentication with the Sumcheck Protocol
    Hervé Chabanne, Julien Keuffer, and Roch Lescuyer
  • Password Generators: Old Ideas and New
    Fatma Al Maqbali and Chris J. Mitchell
  • Provable Network Activity for Protecting Users against False Accusation
    Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, and Evangelos P. Markatos
  • Combining Third Party Components Securely in Automotive Systems
    Madeline Cheah, Siraj A. Shaikh, Jeremy Bryans, and Hoang Nga Nguyen