MONDAY SEPTEMBER 26, 2016
09:15 - 09:30 Opening Remarks
09:30 - 10:30 Session 1: Sotiris Ioannidis, Security applications of GPUs
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 2: Authentication and Key Management
- Securing Transactions with the eIDAS Protocols
Frank Morgner, Paul Bastian, and Marc Fischlin - Novel Lightweight Signcryption-based Key Distribution Mechanisms for MIKEY
Kim Thuat Nguyen, Nouha Oualha, and Maryline Laurent - Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms
Vlasta Stavova, Vashek Matyas, and Mike Just
12:30 - 14:00 Lunch
14:00 - 15:30 Session 3: Secure Hardware Systems
- An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
Jan Tobias Muhlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, and Frank Piessens - Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
Vassilios Vassilakis, Emmanouil Panaousis, and Haralambos Mouratidis - An HMM-based Anomaly Detection Approach for SCADA Systems
Kyriakos Stefanidis and Artemios G. Voyiatzis
15:30 - 16:00 Coffee Break
16:00 - 17:30 Session 4: Attacks to Software and Network Systems
- Towards Automatic Risk Analysis and Mitigation of Software Applications
Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, and Antonio Lioy - Runtime Code Polymorphism as a Protection against Side Channel Attacks
Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, and Jean-Louis Lanet - Analysis of a Code-based Countermeasure against Side-Channel and Fault Attacks
Guillaume Barbu and Alberto Battistello
------------------------------------------------------------------------
TUESDAY SEPTEMBER 27, 2016
09:00 - 10:00 Session 5: Jean-Jacques Quisquater, Old stories, new results: public-key cryptosystems, coprocessors, blockchains ...
10:00 - 10:30 Session 6: Watermarks
- Fault-Channel Watermarks
Peter Samarin, Alexander Skripnik, and Kerstin Lemke-Rust
10:30 - 11:00 Coffee Break
11:00 - 12:30 Session 7: Privacy and Malware Detection
- LAMP - Label-based Access-control for More Privacy in Online Social Networks
Leila Bahri, Barbara Carminati, Elena Ferrari, and William Lucia - Privacy-Preserving Two-Party Skyline Queries over Horizontally Partitioned Data
Ling Chen, Ting Yu, and Rada Chirkova - Attacking and Defending Dynamic Analysis System-Calls Based IDS
Ishai Rosenberg and Ehud Gudes
12:30 - 14:00 Lunch
14:00 - 16:00 Session 8: Short Papers
- The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs — An Empirical Experiment
Ahmad Sabouri - Delegating Biometric Authentication with the Sumcheck Protocol
Hervé Chabanne, Julien Keuffer, and Roch Lescuyer - Password Generators: Old Ideas and New
Fatma Al Maqbali and Chris J. Mitchell - Provable Network Activity for Protecting Users against False Accusation
Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, and Evangelos P. Markatos - Combining Third Party Components Securely in Automotive Systems
Madeline Cheah, Siraj A. Shaikh, Jeremy Bryans, and Hoang Nga Nguyen