Registration Form
Tuesday, October 02
| TIME | TOPIC | SPEAKER |
|---|---|---|
| 09:00-09:30 | Gathering | |
| 09:30-09:40 | Greetings | Eli Biham Mark Silberstein Yossi Oren |
| 09:40-11:15 | Software Guard Extension – from dream to reality - Part 1 Slides here | Ittai Anati |
| 11:15-11:40 | Coffee Break | |
| 11:40-13:15 | Software Guard Extension – from dream to reality - Part 2 Slides here | Ittai Anati |
| 13:15-14:15 | Lunch Break | |
| 14:15-15:50 | Attacks and Defenses for Intel SGX- Part 1 Slides here | Taesoo Kim |
| 15:50-16:05 | Coffee Break | |
| 16:05-17:40 | Attacks and Defenses for Intel SGX- Part 2 Slides here | Taesoo Kim |
Wednesday, October 03
| TIME | TOPIC | SPEAKER |
|---|---|---|
| 09:00-09:30 | Gathering | |
| 09:30-11:05 | Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 1 Slides here | Christof Fetzer |
| 11:05-11:30 | Coffee Break | |
| 11:30-13:05 | Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 2 Slides here | Christof Fetzer |
| 13:05-14:05 | Lunch Break | |
| 14:05-15:40 | The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 1 Slides here | Herbert Bos |
| 15:40-15:55 | Coffee Break | |
| 15:55-17:30 | The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 2 Slides here | Herbert Bos |
Thursday, October 04
| TIME | TOPIC | SPEAKER |
|---|---|---|
| 09:00-09:30 | ||
| 09:30-10:15 | Cache attacks against the Android TrustZone | Avishai Wool |
| 10:15-11:05 | From black to white (box) attacks on secure systems - Or why do your light bulbs need a firmware update Slides here | Eyal Ronen |
| 11:05-11:30 | Coffee Break | |
| 11:30-13:05 | Side Channel Attacks: How a Small Leakage Becomes a Big Problem-Part 1 | Daniel Genkin |
| 13:05-14:05 | Lunch Break | |
| 14:05-15:40 | Side Channel Attacks: How a Small Leakage Becomes a Big Problem Part 2 | Daniel Genkin |
| 15:40-15:55 | Coffee Break | |
| 15:55-16:45 | Side-Channel Attacks on Human Secrets Slides Here | Yossi Oren |
| 16:45-17:35 | What if your phone’s battery could talk? Inference attacks using malicious battery Slides here | Mark Silberstein |