Monday
The IoT Security Challenge
Tuesday
System Security I
Wednesday
Cryptography/System Security II
Thursday
Software Side-Channels
Friday
Hardware Side-Channels
Ivana Tomic

Security of wireless sensor networks

Manuel Rigger

Memory-Safe Execution of Low-Level Languages with Safe Sulong

Itzel Vazquez
Formal verification of Security Protocols’ implementations
Alexandre Adomnicai

Secure implementation and integration of lightweight cryptography for the IoT

Lars Tebelmann

EM Attack on BCH-based Error Correction for PUFs

Eyal Ronen

IoT Goes Nuclear: Creating a ZigBee Chain Reaction

Rohith Yanambaka Venkata

CLIPS:Customized levels of IoT Security and Privacy

Lukáš Němec

Fading channel as a shared source of randomness

Pablo Cañones

Security Analysis of Cache Replacement policies

Giovanni Camurati

Security close to the hardware

Filip Holík

Using SDN to enhance IoT security

Dorottya Pap

Detecting Trigger-Based Behavior

Omer Shwartz

Shattered Trust: When Replacement Smartphone Components Attack

Andreas Zankl

Microarchitectural Attacks – An Evaluator’s Perspective

Subhan Ullah

Smart Cameras with Onboard Signcryption for Securing IoT Applications

Emekcan Aras

Introduction to LPWAN and Exploring Security Vulnerabilities for LoRa

András Gazdag

Efficent Lossless Compression of CAN Traic Logs

Samuel Weiser

SGXIO: Generic Trusted I/O Path for Intel SGX

Md Habibur Rahman

Decentralized Secure Hazard Warning Dissemination Protocol in Car2X Applications

Timothy Claeys

Hardware-enforced Security for the IoT