Program
Time | Title |
---|---|
14:00 | Introduction — A look back: 10 years of IoT security and malware protection Georg Becker, Paolo Palmieri, and Francesco Regazzoni |
14:15 | Paper 1 — Classification of S-Boxes According to Hardware Implementation Cost Pierre-Antoine Tissot, Vincent Grosso, and Lilian Bossuet |
14:45 | Paper 2 — Leveraging gem5 for Hardware Trojan Research: Simulation for Machine-Learning-Based Detection Alessandro Palumbo, and Ruben Salvador |
15:15 | Coffee break |
15:30 | Panel — The road ahead: the next big challenges in IoT security Ingrid Verbauwhede, Gerog Becker, Andrey Bogdanov, and Rubén Salvador |