Accepted Papers
Regular Papers
- David Schwarzbeck, Daniela Novac, Michael Philippsen - Register Expansion and SemaCall: 2 low-overhead dynamic Watermarks suitable for Automation in LLVM
- Sam Collins, Alex Poulopoulos, Marius Muench, Tom Chothia - Anti-Cheat: Attacks and the Effectiveness of Client-Side Defences
- Thomas Faingnaert, Tianyi Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, Bjorn De Sutter - Tools and Models for Software Reverse Engineering Research
- Matti Schulze, Christian Lindenmeier, Jonas Röckl, Felix Freiling - IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone
- Sebastián R. Castro, Alvaro Cardenas - Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts
Short Papers
- Thomas Faingnaert, Willem Van Iseghem, Bjorn De Sutter - K-Hunt++: Improved Dynamic Cryptographic Key Extraction
Program
9:00 | Morning Session 1 |
9:00 - 9:15 | Welcome Message |
9:15 - 9:35 | Register Expansion and SemaCall: 2 low-overhead dynamic Watermarks suitable for Automation in LLVM |
9:35 - 9:55 | IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone |
9:55 - 10:10 | K-Hunt++: Improved Dynamic Cryptographic Key Extraction (short) |
10:10 - 11:00 | Coffee Break |
11:00 | Morning Session 2 |
11:00 - 11:20 | Anti-Cheat: Attacks and the Effectiveness of Client-Side Defences |
11:20 - 11:40 | Tools and Models for Software Reverse Engineering Research |
11:40 - 12:00 | Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts |
12:00 - 12:10 | Closing Remarks |