Registration Form
Tuesday, October 02
TIME | TOPIC | SPEAKER |
---|---|---|
09:00-09:30 | Gathering | |
09:30-09:40 | Greetings | Eli Biham Mark Silberstein Yossi Oren |
09:40-11:15 | Software Guard Extension – from dream to reality - Part 1 Slides here | Ittai Anati |
11:15-11:40 | Coffee Break | |
11:40-13:15 | Software Guard Extension – from dream to reality - Part 2 Slides here | Ittai Anati |
13:15-14:15 | Lunch Break | |
14:15-15:50 | Attacks and Defenses for Intel SGX- Part 1 Slides here | Taesoo Kim |
15:50-16:05 | Coffee Break | |
16:05-17:40 | Attacks and Defenses for Intel SGX- Part 2 Slides here | Taesoo Kim |
Wednesday, October 03
TIME | TOPIC | SPEAKER |
---|---|---|
09:00-09:30 | Gathering | |
09:30-11:05 | Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 1 Slides here | Christof Fetzer |
11:05-11:30 | Coffee Break | |
11:30-13:05 | Application-oriented Security: Secrets Management and Side-Channel Protection for TEEs - Part 2 Slides here | Christof Fetzer |
13:05-14:05 | Lunch Break | |
14:05-15:40 | The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 1 Slides here | Herbert Bos |
15:40-15:55 | Coffee Break | |
15:55-17:30 | The house is built on sand: exploiting hardware glitches and side channels in perfect software - Part 2 Slides here | Herbert Bos |
Thursday, October 04
TIME | TOPIC | SPEAKER |
---|---|---|
09:00-09:30 | ||
09:30-10:15 | Cache attacks against the Android TrustZone | Avishai Wool |
10:15-11:05 | From black to white (box) attacks on secure systems - Or why do your light bulbs need a firmware update Slides here | Eyal Ronen |
11:05-11:30 | Coffee Break | |
11:30-13:05 | Side Channel Attacks: How a Small Leakage Becomes a Big Problem-Part 1 | Daniel Genkin |
13:05-14:05 | Lunch Break | |
14:05-15:40 | Side Channel Attacks: How a Small Leakage Becomes a Big Problem Part 2 | Daniel Genkin |
15:40-15:55 | Coffee Break | |
15:55-16:45 | Side-Channel Attacks on Human Secrets Slides Here | Yossi Oren |
16:45-17:35 | What if your phone’s battery could talk? Inference attacks using malicious battery Slides here | Mark Silberstein |