{"id":83,"date":"2022-04-15T06:56:16","date_gmt":"2022-04-15T06:56:16","guid":{"rendered":"https:\/\/securityweek.at\/2022\/?page_id=83"},"modified":"2022-10-27T09:50:35","modified_gmt":"2022-10-27T09:50:35","slug":"program","status":"publish","type":"page","link":"https:\/\/securityweek.at\/2022\/program\/","title":{"rendered":"PROGRAM"},"content":{"rendered":"\n
\n <\/td>\n | \n Monday 26.September <\/td>\n | \n Tuesday\n 27.September<\/br> <\/td>\n | \n Wednesday\n 28.September<\/br> <\/td>\n | \n Thursday\n 29.September<\/br> <\/td>\n | \n Friday\n 30.September<\/br> <\/td>\n <\/tr>\n | ||||||||||||||||||||||||||||||||||||||||||
\n 8:40 <\/td>\n | \n Welcome <\/td>\n | \n <\/td>\n | \n <\/td>\n | \n <\/td>\n | \n <\/td>\n <\/tr>\n | ||||||||||||||||||||||||||||||||||||||||||
\n 9:00 \u2013 10:30 <\/td>\n | \n Daniel Gru\u00df<\/I> \nSecurity: Can we afford to have it?\nCan we afford not to have it?\n<\/b> <\/br>\nInffg. 16b, Lecture room i12 <\/td>\n | \n Samuel Pagliarini<\/I> Hardware Trojan Horses: from Theory to Practice<\/b> <\/br> Inffg. 13, Lecture room i9 <\/td>\n | \n Ilaria Chillotti<\/I> Introduction to Fully Homomorphic Encryption and Applications.<\/b> Inffg. 13, Lecture room i9 <\/td>\n | \n Thomas Eisenbarth<\/i> The many Flavors of Side Channel Analysis<\/b><\/br> <\/br> Inffg. 12, Lecture room i2 <\/td>\n | \n Peter Schwabe<\/i> Engineering High-Assurance Crypto Software<\/b> <\/br> Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n \n 10:30 \u2013 11:00 <\/td>\n | \n Coffee <\/td>\n | \n Coffee <\/td>\n | \n Coffee <\/td>\n | \n Coffee <\/td>\n | \n Coffee <\/td>\n <\/tr>\n | \n 11:00 \u2013 12:30 <\/td>\n | \n Andrea Fioraldi<\/i> | Modern Fuzzing Research and Engineering<\/b> Inffg. 16b, Lecture room i12 <\/td>\n \n Anders Fogh<\/i> | Product Security<\/b> Inffg. 13, Lecture room i9 <\/td>\n \n Matteo Maffei<\/i> | Computer-Aided Formal Security Analysis of the Web Platform<\/b><\/br> Inffg. 13, Lecture room i9 <\/td>\n \n Elisabeth Oswald<\/i> | Techniques and Schemes to Evaluate Side Channel Resilience<\/b><\/br> Inffg. 12, Lecture room i2 <\/td>\n \n Jo Van Bulck <\/i> | Privileged Side-Channel Attacks on Trusted Execution Environments <\/b> Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n \n 12:30 \u2013 14:00 <\/td>\n | \n Lunch <\/td>\n | \n Lunch <\/td>\n | \n Lunch <\/td>\n | \n Lunch <\/td>\n | \n Lunch <\/td>\n <\/tr>\n | \n 14:00 \u2013 15:30 <\/td>\n | \n Martin Schwarzl & | Stefan Gast<\/i> Microarchitectural Side-Channels Lab I<\/b><\/br> Inffg. 16b, Lecture room i12 <\/td>\n \n Martin Schwarzl & | Stefan Gast<\/i> Microarchitectural Side-Channels Lab II<\/b><\/br> Inffg. 13, Lecture room i9 <\/td>\n \n Michael Pehl<\/i> | Design and Assessment of Physical Unclonable Functions<\/b><\/br><\/br><\/br> Inffg. 13, Lecture room i9 <\/td>\n \n Barbara Gigerl & | Robert Primas<\/i> Physical Side-Channels<\/b><\/br> Lab I<\/b><\/br><\/br> Inffg. 12, Lecture room i2 <\/td>\n \n Johannes Haring, | Marcel Nageler & Martin Unterguggenberger<\/i> Runtime Security Lab II (CTF)<\/b> Inffg. 12, Lecture room i2 <\/td>\n <\/tr>\n \n 15:30 \u2013 16:00 <\/td>\n | \n Coffee <\/td>\n | \n Coffee <\/td>\n | \n <\/td>\n | \n Coffee <\/td>\n | \n <\/td>\n <\/tr>\n | \n 16:00 \u2013 17:30 <\/td>\n | \n Alberto Larrauri Borroto, | Robert Schilling & Sujoy Sinha Roy<\/i> PHD Forum<\/b> <\/br> Inffg. 11, Lecture room FSI 1 <\/td>\n \n Johannes Haring, | Marcel Nageler & Martin Unterguggenberger<\/i> Runtime Security Lab I (CTF)<\/b> Inffg. 13, Lecture room i9 <\/td>\n \n Social Event<\/i> <\/td>\n | \n Barbara Gigerl & | Robert Primas<\/i> Physical Side-Channels<\/b><\/br> Lab II<\/b><\/br><\/br> Inffg. 12, Lecture room i2 <\/td>\n \n <\/td>\n <\/tr>\n | \n 17:30 <\/td>\n | \n Welcome Dinner<\/i> <\/td>\n | \n Paper-Generator Dinner<\/i> <\/td>\n | \n <\/td>\n | \n Dinner<\/i> <\/td>\n | \n <\/td>\n <\/tr>\n <\/table>\n<\/div> | |