Invited Speakers

Keynote Talks

Shivam Bhasin, NTU, Singapore
Persistence Wears Down Resistance: Persistent Fault Analysis on Unprotected and Protected Block Cipher Implementations

Shay Gueron, University of Haifa, Israel
International NI: Surprising Usages of AES-NI for Various Ciphers

Avi Mendelson, Technion, Israel
Can Fault Tolerance help Hardware Security?

Mridul Nandi, ISI Kolkata, India
A Composition Result for Constructing BBB Secure PRF

Vanessa Teague, University of Melbourne, Australia
Electronic voting security and trust?

Eran Toch, Tel Aviv University, Israel
Humans in information security: why people are the weakest link and how can we change that?

 

Tutorials and Workshops

Nasour Bagheri, SRTTU Tehran, Iran
On the security of lightweight and ultra-lightweight protocols for constrained environments

Jo Van Bulck, KU Leuven, Belgium
Uncovering and Mitigating Side-Channel Leakage in Intel SGX Enclaves

Abhik Roychoudhury, NUS, Singapore
Symbolic Execution vs. Search for Software Vulnerability Detection and Patching

Ashu Sharma, IIT Kanpur, India
An overview of the evolution of malware and their analysis techniques

Sandeep Shukla, IIT Kanpur, India
Cyber Security Issues in Critical Infrastructures