| ||||||||
| ||||||||
Here the preliminary information about meeting and venue.
Here the preliminary program of the meeting. | ||||||||
|
June 19, 2007 - Morning Session | |
Jerome D'Annoville |
Archiecture meeting reporting (Paris, June 8, 2007) (Presentation) |
Brecht Wyseur |
Task 3.2 - Hw/Sw co-obfuscation meeting (Torino, June 18, 2007) (Presentation) |
June 19, 2007 - Afternoon Session | |
Subgroup Break-Out |
WP2: Software-based Tamper Resistance Methods for Remote Entrusting
WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting WP4: Trust and Security Analysis |
Subgroup Reporting |
WP2: Software-based Tamper Resistance Methods for Remote Entrusting
WP3: Hardware/Software-based Tamper Resistance Methods for Remote Entrusting WP4: Trust and Security Analysis |
June 20, 2007 - Morning Session | |
Mariano Ceccato |
Barrier Slicing for Remote Software Trusting (Presentation) |
Vasily Desnitsky, Igor Kotenko |
Review of Aspect Oriented Approaches and their Use in RE-TRUST for Mobile Module Implementation (Presentation) |
Jasvir Nagra |
Is Obfuscation Really Impossible? (Presentation) |
Amithab Saxena |
Techniques for Obfuscation: more Notions and Definitions (Presentation) |
June 19, 2007 - Afternoon Session | |
Roberta Guidolin |
Presentation about Financial Planning (Presentation) |
Mariano Ceccato |
Formal Review Process for Deliverables |