![]() |
|
Wednesday, September 30, 2009 | |||||||
09:30 - 10:30 | Key Note | ||||||
Ahmad-Reza SADEGHI (Ruhr-Universität Bochum, Germany) Trusted Virtual Domains and Challenges |
|||||||
10:30 - 11:00 |
Coffee Break |
||||||
11:00 - 12:45 |
Session 1 Chair: Amir HERZBERG (Bar Ilan University, Israel) |
||||||
A general model for hiding program control flow Jan CAPPAERT (K.U.Leuven - Belgium) Brecht WYSEUR (K.U.Leuven - Belgium) » Presentation |
|||||||
Tools and Methodologies for Layered, Diverse, and Renewable Security in Tethered Systems Clifford LIEM (Cloakware/IRDETO - Canada) » Presentation |
|||||||
Software Integrity based on the Problem of large Finite Automata Decomposition Wulf HARDER (Syncrosoft - Latvia) » Presentation |
|||||||
12:45 - 14:00 |
Lunch |
||||||
14:00 - 15:45 |
Session 2 Chair: Igor KOTENKO (SPIIRAS, Russia) |
||||||
A Solution based on Cryptographic Hardware for Agent Protection Antonio MUÑOZ (Universidad de Málaga - Spain), Antonio MAÑA (Universidad de Málaga - Spain) » Presentation |
|||||||
A Signature Scheme for Distributed Executions based on Macro-Dataflow Analysis Sebastien VARRETTE (University of Luxembourg - Luxembourg) » Presentation |
|||||||
Individually obfuscated program files - increasing the attacker's variable cost Martin BOESGAARD (Codesealer - Denmark) |
|||||||
15:45 - 16:00 |
Discussions on presentations |
||||||
16:15 - 16:30 |
Coffee Break |
||||||
16:30 - 18:00 |
Panel discussion Organizer and Chair: Yoram OFEK (University of Trento, Italy) What and why we trust in TCG, RE-TRUST, etc.: The role, location and functionality of core of trust |
||||||
Thursday, October 1, 2009 | |||||||
10:00 - 12:30 |
Session 3 Chair: Alessandro ZORAT (University of Trento, Italy) |
||||||
Obfuscation: from Theory to Practice Amir HERZBERG (Bar Ilan University - Israel), Haya SHULMAN (Bar Ilan University - Israel) » Presentation |
|||||||
Practical Secure Remote Computing Amir HERZBERG (Bar Ilan University - Israel), Haya SHULMAN (Bar Ilan University - Israel) » Presentation |
|||||||
Performance and Scalability of Remote Entrusting Protection Igor KOTENKO (SPIIRAS - Russia), Vasily DESNITSKY (SPIIRAS - Russia) » Presentation |
|||||||
Towards a Formal Model for Software Tamper Resistance Stefano DI CARLO (Politecnico di Torino - Italy), Cataldo BASILE (University of Trento - Italy), Brecht WYSEUR (K.U.Leuven - Belgium), Thomas HERLEA (K.U.Leuven - Belgium), Jasvir NAGRA (Google - USA) » Presentation |
|||||||
12:30 - 14:00 |
Lunch |
||||||
14:00 - 16:00 |
Panel discussion Organizer and Chair: Igor KOTENKO (SPIIRAS, Russia) Security and/(vs?) Trust: what are the main similarities and differences? Is it reasonable to consider them as one? |
||||||
|