Technical University of Denmark
Anker Engelunds Vej 1
Building 101, Room S09
2800 Kgs. Lyngby
Denmark
Session 1 | |
09:00-09:30 | Defeating Android security solutions by exploiting fuzzy hashing |
Arash Vahidi (RISE) | |
09:30-10:00 | Wireless Body Area Networks: Security Issues and Challenges |
Mohsen Toorani (LU) | |
10:00-10:30 | Grain-128AEAD |
Jonathan Sönnerup (LU) and Martin Hell (LU) | |
Session 2 | |
10:50-11:20 | WebAssembly from a Security Perspective |
Ken Friis Larsen (KU) | |
11:20-11:50 | Secure compilation (?) |
Thomas Jensen (INRIA and KU) | |
11:50-12:20 | Secure Software Updates for Critical Infrastructures |
Ludwig Seitz (RISE), Marco Tiloca (RISE) and Martin Gunnarsson (RISE) | |
Session 3 | |
13:20-13:50 | How to create public confidence in election systems |
Carsten Schuermann (ITU) | |
13:50-14:20 | Formalizing and Proving Privacy Properties of Voting Protocols using Alpha-Beta Privacy |
Sébastien Gondron (DTU) and Sebastian A. Mödersheim (DTU) | |
14:20-14:50 | Human factors in coercion-resistant Internet voting |
Oksana Kulyk (ITU) | |
14:50-15:20 | Perspectives on Privacy and Accountability for Blockchain Applications |
Bernardo David (ITU) | |
Session 4 | |
15:40-16:10 | Metadata Filtering for User-Friendly Centralized Biometric Authentication |
Christian Gehrmann (LU), Marcus Rodan (Fingerprint Cards AB) and Niklas Jönsson (Fingerprint Cards AB) | |
16:10-16:40 | An Equivalence Result Between Linear Logic and Process Calculi |
Alessandro Bruni (ITU) | |
16:40-17:10 | Automated and machine-verified security proofs of stateful protocols |
Andreas Hess (DTU), Sebastian Mödersheim (DTU), Achim Brucker (University of Exeter) and Anders Schlichtkrull (DTU) |