MIST 2025
Important Dates
| Paper Submission Deadline | 30th June 2025 |
| Notification to authors | 10th August 2025 |
| Camera-ready versions | 25th August 2025 |
Program
Day 5 (Sept. 26) - Thesis room (IRIT)
9:00 - 10:30: Session 1
- Claudia Greco: Welcome speech
- Opening Keynote: Michele Ianni
- Konrad-Felix Krentz: Streamlining Security Patches and Remote Attestations for the Internet of Things
10:30 - 10:50: Coffee break
10:50 - 12:20: Session 2
- Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese: Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation
- Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel: Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols
- Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari: Function-Level Syscall Fingerprinting for IoT Malware Capability Classification
- Julian Gagel, Kris Heid and Jens Heider: Permission Granted? How Android’s App List Protection Fails in Practice
12:20 - 13:50: Lunch break (Main building)
13:50 - 15:20: Session 3
- Muhammad Irfan and Nelson Uto: Revisiting the Effectiveness of Jailbreak Detection
- Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano: PIM: A Metric to Empower Mobile App Users in Privacy Management
- Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi: Policy Enforcement Protocols with Split Keys
- Claudia Greco: Closing remarks
15:20 - 15:40: Coffee break
Accepted papers
- Streamlining Security Patches and Remote Attestations for the Internet of Things, Konrad-Felix Krentz
- Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation, Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese
- Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols, Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel
- Function-Level Syscall Fingerprinting for IoT Malware Capability Classification, Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari
- Permission Granted? How Android’s App List Protection Fails in Practice, Julian Gagel, Kris Heid and Jens Heider
- Revisiting the Effectiveness of Jailbreak Detection, Muhammad Irfan and Nelson Uto
- PIM: A Metric to Empower Mobile App Users in Privacy Management, Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano
- Policy Enforcement Protocols with Split Keys, Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi