Program
Day 1 - July 12th
Day 2 - July 13th
Day 3 - July 14th
Day 1: July 12th
10:30-11:00 Welcome Coffee
11:00 Conference Opening
11:30 Keynote 1 (Giovanni Vigna) - Session Chair: TBD
Title: Make It or Take It: The Quest for Value Extraction in Decentralized Finance
12:45 Lunch
14:15 Paper Session #1: Side Channels are Everywhere - Session Chair: TBD
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
Jan Wichelmann, Anna Pätschke, Florian Sieck, Christopher Peredy, Thomas Eisenbarth (University of Lübeck)The Finger in the Power: How to Fingerprint PCs by Monitoring their Power Consumption
Marina Botvinnik (Ben-Gurion University of the Negev and Intel Corporation); Tomer Laor (Ben-Gurion University of the Negev); Thomas Rokicki (Univ Rennes, CNRS, IRISA); Clémentine Maurice (Univ Lille, CNRS, Inria); Yossi Oren (Ben-Gurion University of the Negev and Intel Corporation)PWRLEAK: Exploiting Power Reporting Interface for Side-channel Attacks on AMD SEV
Wubing Wang, Mengyuan Li (The Ohio State University); Yinqian Zhang (Southern University of Science and Technology); Zhiqiang Lin (The Ohio State University)
15:30 Break
16:00-18:00 Panel: Security of Generative AI and Generative AI in Security - Session Chair: TBD
19:00 Social Event at the Guest House of the Hamburg Senate
Day 2 - July 13th
09:30 Keynote 2 (Robin Sommer) - Session Chair: TBD
Title: Transition To Practice, They Say: How Two Decades of Security Research Ultimately Spawned a Silicon Valley Startup
10:45 Break
11:00 Paper Session #2: Security and Machine Learning - Session Chair: TBD
- Madvex: Instrumentation-based Adversarial Attacks on Machine
Learning Malware Detection
Nils Loose, Felix Mächtle (Universität zu Lübeck); Claudius Pott, Volodymyr Bezsmertnyi, Thomas Eisenbarth (University of Lübeck) - Honey, I Chunked the Passwords: Generating Semantic Honeywords
Resistant to Targeted Attacks using Pre-Trained Language Models
Fangyi Yu, Miguel Vargas Martin (Ontario Tech University)
11:45 Break
12:00 Paper Session #3: Security and the Physical World - Session Chair: TBD
White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems
Alessandro Erba, Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security)A Security Analysis of CNC Machines in Industry 4.0
Marco Balduzzi (Trend Micro); Francesco Sortino, Fabio Castello, Leandro Pierguidi (Celada)
12:45 Lunch
14:30 Tools Demo Session / DIMVA Arsenal / DIMVA Tools Arsenal
16:00 Break
16:30 Paper Session #4: Security Issues when Dealing with Users - Session Chair: TBD
A Deep Dive into the VirusTotal File Feed
Kevin van Liebergen, Juan Caballero (IMDEA Software Institute); Platon Kotzias (Norton Research Group); Chris Gates (NortonLifeLock Research Group)Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities
Yunsen Lei, Julian P. Lanson, Craig A. Shue (Worcester Polytechnic Institute); Timothy W. Wood (George Washington University)
17:45 Break
19:00 Conference Dinner at Restaurant Störtebecker, Elbphilharmonie
Day 3 - July 14th
09:30 Keynote 3 (Konrad Rieck) - Session Chair: TBD
Title: When Papers Choose their Reviewers: Adversarial Machine Learning in Peer Review
10:45 Break
11:00 Awards
11:15 Paper Session #5: Security Issues when Dealing with Users - Session Chair: TBD
Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses
René Helmke, Johannes vom Dorp (Fraunhofer FKIE)Divak: Non-invasive Characterization of Out-Of-Bounds Write Vulnerabilities
Linus Hafkemeyer (TU Delft); Jerre Starink, Andrea Continella (University of Twente)
12:00 Break
12:15 Paper Session #6: Go with the Flow Integrity - Session Chair: TBD
CEFI: Command Execution Flow Integrity for Embedded Devices
Anni Peng (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China); Dongliang Fang (Beijing Key Laboratory of IoT Information Security Technology, Institute of Information Engineering, CAS, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Wei Zhou (School of Cyber Science and Engineering, Huazhong University of Science and Technology); Erik van der Kouwe (Vrije Universiteit Amsterdam); Yin Li (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, China); Yuqing Zhang (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences)Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation
Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino (Politecnico di Milano)
13:00 Conference Closing + Lunch
14:00 Tours in Hamburg
- German Climate Computing Center
- More tours tba.