Program
| Time | Title | 
|---|---|
| 14:00 | Introduction — A look back: 10 years of IoT security and malware protection Georg Becker, Paolo Palmieri, and Francesco Regazzoni | 
| 14:15 | Paper 1 — Classification of S-Boxes According to Hardware Implementation Cost Pierre-Antoine Tissot, Vincent Grosso, and Lilian Bossuet | 
| 14:45 | Paper 2 — Leveraging gem5 for Hardware Trojan Research: Simulation for Machine-Learning-Based Detection Alessandro Palumbo, and Ruben Salvador | 
| 15:15 | Coffee break | 
| 15:30 | Panel — The road ahead: the next big challenges in IoT security Ingrid Verbauwhede, Gerog Becker, Andrey Bogdanov, and Rubén Salvador |