Past Editions

MIST 2025

Important Dates


Paper Submission Deadline 30th June 2025
Notification to authors 10th August 2025
Camera-ready versions 25th August 2025

Program

Day 5 (Sept. 26) - Thesis room (IRIT)

9:00 - 10:30: Session 1

  • Claudia Greco: Welcome speech
  • Opening Keynote: Michele Ianni
  • Konrad-Felix Krentz: Streamlining Security Patches and Remote Attestations for the Internet of Things

10:30 - 10:50: Coffee break

10:50 - 12:20: Session 2

  • Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese: Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation
  • Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel: Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols
  • Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari: Function-Level Syscall Fingerprinting for IoT Malware Capability Classification
  • Julian Gagel, Kris Heid and Jens Heider: Permission Granted? How Android’s App List Protection Fails in Practice

12:20 - 13:50: Lunch break (Main building)

13:50 - 15:20: Session 3

  • Muhammad Irfan and Nelson Uto: Revisiting the Effectiveness of Jailbreak Detection
  • Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano: PIM: A Metric to Empower Mobile App Users in Privacy Management
  • Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi: Policy Enforcement Protocols with Split Keys
  • Claudia Greco: Closing remarks

15:20 - 15:40: Coffee break

Accepted papers

  • Streamlining Security Patches and Remote Attestations for the Internet of Things, Konrad-Felix Krentz
  • Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation, Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese
  • Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols, Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel
  • Function-Level Syscall Fingerprinting for IoT Malware Capability Classification, Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari
  • Permission Granted? How Android’s App List Protection Fails in Practice, Julian Gagel, Kris Heid and Jens Heider
  • Revisiting the Effectiveness of Jailbreak Detection, Muhammad Irfan and Nelson Uto
  • PIM: A Metric to Empower Mobile App Users in Privacy Management, Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano
  • Policy Enforcement Protocols with Split Keys, Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi