Day 5 (Sept. 26) - Thesis room (IRIT)
9:00 - 10:30: Session 1
- Claudia Greco: Welcome speech
- SERICS keynote*
- Konrad-Felix Krentz: Streamlining Security Patches and Remote Attestations for the Internet of Things
10:30 - 10:50: Coffee break
10:50 - 12:20: Session 2
- Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese: Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation
- Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel: Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols
- Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari: Function-Level Syscall Fingerprinting for IoT Malware Capability Classification
- Julian Gagel, Kris Heid and Jens Heider: Permission Granted? How Android’s App List Protection Fails in Practice
12:20 - 13:50: Lunch break (Main building)
13:50 - 15:20: Session 3
- Muhammad Irfan and Nelson Uto: Revisiting the Effectiveness of Jailbreak Detection
- Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano: PIM: A Metric to Empower Mobile App Users in Privacy Management
- Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi: Policy Enforcement Protocols with Split Keys
- Claudia Greco: Closing remarks
15:20 - 15:40: Coffee break
*The MIST workshop will include a dedicated session focusing on topics related to the SERICS (SEcurity and RIghts in the CyberSpace) Project. The session will provide an overview of some of the research directions addressed by the initiative and encourage dialogue with the scientific community.
Accepted papers
- Streamlining Security Patches and Remote Attestations for the Internet of Things, Konrad-Felix Krentz
- Lightweight IoT Intrusion Detection with Hybrid Feature Selection and CNN-Driven Image Transformation, Negar Mansouri, Seyedeh Leili Mirtaheri, Seyyed Amir Asghari and Andrea Pugliese
- Breaking the Silence: Fuzzing LTE-M and NB-IoT protocols, Ilja Siroš, Rafael Cavalcanti, Dave Singelée and Bart Preneel
- Function-Level Syscall Fingerprinting for IoT Malware Capability Classification, Yutaro Osako, Hayato Hamano, Yuto Aono, Toshihiro Yamauchi, Katsunari Yoshioka, Takahiro Kasama, Takuya Fujihashi and Shunsuke Saruwatari
- Permission Granted? How Android’s App List Protection Fails in Practice, Julian Gagel, Kris Heid and Jens Heider
- Revisiting the Effectiveness of Jailbreak Detection, Muhammad Irfan and Nelson Uto
- PIM: A Metric to Empower Mobile App Users in Privacy Management, Amador Aparicio, M. Mercedes Martínez-González, Alejandro Pérez-Fuente and Pablo A. Criado-Lozano
- Policy Enforcement Protocols with Split Keys, Gizem Akman, Philip Ginzboorg, Sampo Sovio and Valtteri Niemi