Program
| Time | Title |
|---|---|
| 14:00 | Introduction — A look back: 10 years of IoT security and malware protection Georg Becker, Paolo Palmieri, and Francesco Regazzoni |
| 14:15 | Paper 1 — Classification of S-Boxes According to Hardware Implementation Cost Pierre-Antoine Tissot, Vincent Grosso, and Lilian Bossuet |
| 14:45 | Paper 2 — Leveraging gem5 for Hardware Trojan Research: Simulation for Machine-Learning-Based Detection Alessandro Palumbo, and Ruben Salvador |
| 15:15 | Coffee break |
| 15:30 | Panel — The road ahead: the next big challenges in IoT security Ingrid Verbauwhede, Gerog Becker, Andrey Bogdanov, and Rubén Salvador |