{"id":83,"date":"2022-04-15T06:56:16","date_gmt":"2022-04-15T06:56:16","guid":{"rendered":"https:\/\/securityweek.at\/2022\/?page_id=83"},"modified":"2022-10-27T09:50:35","modified_gmt":"2022-10-27T09:50:35","slug":"program","status":"publish","type":"page","link":"https:\/\/securityweek.at\/2022\/program\/","title":{"rendered":"PROGRAM"},"content":{"rendered":"\n
\n \n\n \n \n \n \n \n \n \n \n \n \n
\n <\/td>\n \n Monday 26.September <\/td>\n \n Tuesday\n
27.September<\/br> <\/td>\n
\n Wednesday\n
28.September<\/br> <\/td>\n
\n Thursday\n
29.September<\/br> <\/td>\n
\n Friday\n
30.September<\/br> <\/td>\n <\/tr>\n
\n 8:40 <\/td>\n \n Welcome <\/td>\n \n <\/td>\n \n <\/td>\n \n <\/td>\n \n <\/td>\n <\/tr>\n
\n 9:00 \u2013 10:30 <\/td>\n \n Daniel Gru\u00df<\/I>
\nSecurity: Can we afford to have it?\nCan we afford not to have it?\n<\/b>

<\/br>\nInffg. 16b, Lecture room i12 <\/td>\n
\n Samuel Pagliarini<\/I>
Hardware Trojan Horses: from Theory to Practice<\/b>

<\/br>
Inffg. 13, Lecture room i9 <\/td>\n
\n Ilaria Chillotti<\/I>
Introduction to Fully Homomorphic Encryption and Applications.<\/b>

Inffg. 13, Lecture room i9 <\/td>\n
\n Thomas Eisenbarth<\/i>
The many Flavors of Side Channel Analysis<\/b><\/br>
<\/br>
Inffg. 12, Lecture room i2 <\/td>\n
\n Peter Schwabe<\/i>
Engineering High-Assurance Crypto Software<\/b>
<\/br>
Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n
\n 10:30 \u2013 11:00 <\/td>\n \n Coffee <\/td>\n \n Coffee <\/td>\n \n Coffee <\/td>\n \n Coffee <\/td>\n \n Coffee <\/td>\n <\/tr>\n
\n 11:00 \u2013 12:30 <\/td>\n \n Andrea Fioraldi<\/i>
Modern Fuzzing Research and Engineering<\/b>


Inffg. 16b, Lecture room i12 <\/td>\n
\n Anders Fogh<\/i>
Product Security<\/b>



Inffg. 13, Lecture room i9 <\/td>\n
\n Matteo Maffei<\/i>
Computer-Aided Formal Security Analysis of the Web Platform<\/b><\/br>
Inffg. 13, Lecture room i9 <\/td>\n
\n Elisabeth Oswald<\/i>
Techniques and Schemes to Evaluate Side Channel Resilience<\/b><\/br>
Inffg. 12, Lecture room i2 <\/td>\n
\n Jo Van Bulck <\/i>
Privileged Side-Channel Attacks on Trusted Execution Environments <\/b>

Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n
\n 12:30 \u2013 14:00 <\/td>\n \n Lunch <\/td>\n \n Lunch <\/td>\n \n Lunch <\/td>\n \n Lunch <\/td>\n \n Lunch <\/td>\n <\/tr>\n
\n 14:00 \u2013 15:30 <\/td>\n \n Martin Schwarzl &
Stefan Gast<\/i>
Microarchitectural Side-Channels Lab I<\/b><\/br>

Inffg. 16b, Lecture room i12 <\/td>\n
\n Martin Schwarzl &
Stefan Gast<\/i>
Microarchitectural Side-Channels Lab II<\/b><\/br>

Inffg. 13, Lecture room i9 <\/td>\n
\n Michael Pehl<\/i>
Design and Assessment of Physical Unclonable Functions<\/b><\/br><\/br><\/br> Inffg. 13, Lecture room i9 <\/td>\n
\n Barbara Gigerl &
Robert Primas<\/i>
Physical Side-Channels<\/b><\/br> Lab I<\/b><\/br><\/br>
Inffg. 12, Lecture room i2 <\/td>\n
\n Johannes Haring,
Marcel Nageler &
Martin Unterguggenberger<\/i>
Runtime Security Lab II (CTF)<\/b>

Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n
\n 15:30 \u2013 16:00 <\/td>\n \n Coffee <\/td>\n \n Coffee <\/td>\n \n <\/td>\n \n Coffee <\/td>\n \n <\/td>\n <\/tr>\n
\n 16:00 \u2013 17:30 <\/td>\n \n Alberto Larrauri Borroto,
Robert Schilling &
Sujoy Sinha Roy<\/i>
PHD Forum<\/b>
<\/br>
Inffg. 11, Lecture room FSI 1 <\/td>\n
\n Johannes Haring,
Marcel Nageler &
Martin Unterguggenberger<\/i>
Runtime Security Lab I (CTF)<\/b>

Inffg. 13, Lecture room i9 <\/td>\n
\n Social Event<\/i> <\/td>\n \n Barbara Gigerl &
Robert Primas<\/i>
Physical Side-Channels<\/b><\/br> Lab II<\/b><\/br><\/br>
Inffg. 12, Lecture room i2 <\/td>\n
\n <\/td>\n <\/tr>\n
\n 17:30 <\/td>\n \n Welcome Dinner<\/i> <\/td>\n \n Paper-Generator Dinner<\/i> <\/td>\n \n <\/td>\n \n Dinner<\/i> <\/td>\n \n <\/td>\n <\/tr>\n <\/table>\n<\/div>