Program (collaborated with SIOT)
ADIoT Paper Pre-proceedings Download
08:30 - 08:45
Registration
08:45 - 09:00
General Welcome
Chairs: Alfredo RIAL & Weizhi MENG
09:00 - 10:00
Session 1: SIOT-I
Chair: Alfredo RIAL, University of Luxembourg, Luxembourg
09:00-09:30 -
Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification, By Omar M. Alhawi, Mustafa A. Mustafa and Lucas C. Cordeiro
09:30-10:00 -
Automated Fuzzing of Automotive Control Units, By Timothy Werquin, Mathijs Hubrechtsen, Ashok Thangarajan, Frank Piessens and Jan Tobias Muehlberg
10:00 - 10:30
Coffee break
10:30 - 12:00
Session 2: SIOT-II
Chair: Alfredo RIAL, POLITEHNICA of Bucharest, Romania
10:30-11:00 -
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism, By Johann Groszschaedl
11:00-11:30 -
liOS: Lifting iOS Apps for Fun and Profit, By Julian Schutte and Dennis Titze
11:30-12:00 -
TIO - Secure Input/Output for Intel SGX Enclaves, By Florin-Alexandru Stancu, Dumitru Tranca and Mihai Chiroiu
12:00 - 13:15
Lunch Break
13:15 - 14:45
Session 3: ADIOT-I
Chair: Budi Arief, University of Kent, UK
13:15-13:45 -
A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme, By Deepak Kumar Dalai
13:45-14:15 -
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists, By Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto and Nozomu Togawa
14:15-14:45 -
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach, By Evgenia Novikova, Mikhail Bestuzhev and Igor Kotenko
14:45 - 15:00
Coffee break
15:00 - 16:45
Session 4: ADIOT-II
Chair: Dennis Tatang, Ruhr University Bochum, Germany
15:00-15:30 -
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things, By Philokypros Ioulianou and Vassilios Vassilakis
15:30-16:00 -
Secure Location Verification: Why You Want Your Verifiers to be Mobile, By Matthias Schafer, Carolina Nogueira, Jens B. Schmitt, and Vincent Lenders
16:00-16:20 -
Selective Forwarding Attack on IoT Home Security Kits, By Ali Hariri, Nicolas Giannelos and Budi Arief
16:20-16:40 -
Study of DNS Rebinding Attacks on Smart Home Devices, By Dennis Tatang, Tim Suurland and Thorsten Holz
17:30 - 20:30
Social Activity
20:30 - 22:00
Gala Dinner