| ||||||||
| ||||||||
Here the preliminary program of the meeting. | ||||||||
|
December 19, 2006 - Morning | |
Louis Goubin |
Secure computations using smart cards (Presentation) |
Mila Dalla Preda |
Code obfuscation and malware detection by abstract interpretation (Presentation) |
Igor Kotenko |
State of the Art in Modeling of Computer Attacks (Presentation) |
Antonio Durante | Gerenic Applications |
Davide D'Aprile | Providing a RE-TRUST SDK: a (Semi) Formal Approach |
December 19, 2006 - Afternoon | |
Ceccato Mariano |
Pioneer: Verifying Code Integrity and Enforcing Untampered Code
Execution on Legacy Systems (Presentation) |
Paolo Falcarin |
Design alternatives (Presentation) |
Paolo Tonella |
Trust and attack model (Presentation) |
Vasily Desnitsky, Igor Kotenko |
Trust Model Supplements and Taxonomy (Presentation) |
Vasily Desnitsky, Igor Kotenko |
Attack Model: Graph based Attack Representation
and Taxonomy (Presentation) |
December 20, 2006 - Morning | |
Jerome D'Annoville | Generic applications |
Trust model ingredients | |
Smartcard & PC applications | |
Design alternative | |
Open session on the architecture (Presentation 1) (Presentation 2) |
|
December 20, 2006 - Afternoon | |
Brecht Wyseur |
White Box Cryptography (Presentation) |
Thomas Herlea |
Attack model (Presentation) |