From Tweets to Quantum
Darmstadt, Germany | May 15 – 16, 2017
Monday, May 15 | |
---|---|
08:00 – 09:00 | Registration |
09:00 – 09:10 |
Ahmad-Reza Sadeghi (TU Darmstadt), CROSSING PI and Organizer Opening and Welcome |
09:10 – 09:40 |
Johannes Buchmann (TU Darmstadt), Speaker of CROSSING Overview of CROSSING Project |
09:40 – 10:35 |
Bart Preneel (University of Leuven) The Future of Security |
10:35 – 11:00 | Coffee Break |
11:00 – 11:55 |
Peter Ryan (University of Luxembourg) Securing the Foundations of Democracy |
11:55 – 12:50 |
Sunny Consolvo (Google) Exploratory studies of privacy- & security-related beliefs and practices |
12:50 – 14:00 | Lunch Break |
14:00 – 14:55 |
N. Asokan (Aalto University) Fast client-side phishing detection: a case-study in applying machine learning to solve security/privacy problems |
14:55 – 15:50 |
George Danezis (University College London) Modern anonymous Communications |
15:50 – 16:15 | Coffee Break |
16:15 – 17:10 |
Ramesh Karri (NYU Polytechnic School of Engineering) Bio Chip Security |
17:10 – 18:05 |
Moti Yung (Snapchat) Live and Let Die: Stalking-Free Tracking of Your Internet Things |
18:05 – 18:35 |
Ammar Alkassar (Rohde & Schwarz) TBA |
18:35 – 19:15 | Break & Discussion |
19:15 – 21:00 | Get-together |
|
|
Tuesday, May 16 | |
08:30 – 09:00 | Coffee Break |
09:00 – 09:55 |
Krishna Gummadi (Max Planck Institute for Software Systems) Privacy and Fairness Concerns with PII-based Targeted Advertising on Social Media |
09:55 – 10:50 |
Gang Qu (University of Maryland) Hardware Security: A Battle of Information |
10:50 – 11:15 | Coffee Break |
11:15 – 12:10 |
J. Trevor Hughes (President & CEO of IAPP) Three Apples: The History of Privacy and Technology |
12:10 – 13:05 |
Christof Paar (Ruhr-Universität Bochum) How to Attack the IoT with hardware Trojans |
13:05 – 14:00 | Lunch Break |
14:00 – 14:55 |
Norbert Lütkenhaus (University of Waterloo) Protecting Privacy using Optical Quantum Communication |
14:55 – 15:50 |
Jens Grossklags (TU München) Bug Bounty Platforms: Empirical Analysis and Economic Challenges |
15:50 – 16:30 |
Sridhar Iyengar (Intel) Securing the Autonomous Automobile |
16:30 – 16:50 | Coffee Break |
16:50 – 17:20 |
Robert Broberg (CISCO) L3 Source Attribution: Can trust be built in to internet transport? |
17:20 – 18:15 |
Lucas Davi (University of Duisburg-Essen) Dangerous Bit Flips in Memory: Rowhammer Attacks and Defenses |
18:15 – 18:30 | Closing |