Shivam Bhasin, NTU, Singapore
Persistence Wears Down Resistance: Persistent Fault Analysis on Unprotected and Protected Block Cipher Implementations
Shay Gueron, University of Haifa, Israel
International NI: Surprising Usages of AES-NI for Various Ciphers
Avi Mendelson, Technion, Israel
Can Fault Tolerance help Hardware Security?
Mridul Nandi, ISI Kolkata, India
A Composition Result for Constructing BBB Secure PRF
Vanessa Teague, University of Melbourne, Australia
Electronic voting security and trust?
Eran Toch, Tel Aviv University, Israel
Humans in information security: why people are the weakest link and how can we change that?
Tutorials and Workshops
Nasour Bagheri, SRTTU Tehran, Iran
On the security of lightweight and ultra-lightweight protocols for constrained environments
Jo Van Bulck, KU Leuven, Belgium
Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves
Abhik Roychoudhury, NUS, Singapore
Symbolic Execution vs. Search for Software Vulnerability Detection and Patching
Ashu Sharma, IIT Kanpur, India
An overview of the evolution of malware and their analysis techniques
Sandeep Shukla, IIT Kanpur, India
Cyber Security Issues in Critical Infrastructures