Program

Accepted Papers

Regular Papers

  • David Schwarzbeck, Daniela Novac, Michael Philippsen - Register Expansion and SemaCall: 2 low-overhead dynamic Watermarks suitable for Automation in LLVM
  • Sam Collins, Alex Poulopoulos, Marius Muench, Tom Chothia - Anti-Cheat: Attacks and the Effectiveness of Client-Side Defences
  • Thomas Faingnaert, Tianyi Zhang, Willem Van Iseghem, Gertjan Everaert, Bart Coppens, Christian Collberg, Bjorn De Sutter - Tools and Models for Software Reverse Engineering Research
  • Matti Schulze, Christian Lindenmeier, Jonas Röckl, Felix Freiling - IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone
  • Sebastián R. Castro, Alvaro Cardenas - Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts

Short Papers

  • Thomas Faingnaert, Willem Van Iseghem, Bjorn De Sutter - K-Hunt++: Improved Dynamic Cryptographic Key Extraction

Program

9:00 Morning Session 1
9:00 - 9:15 Welcome Message
9:15 - 9:35 Register Expansion and SemaCall: 2 low-overhead dynamic Watermarks suitable for Automation in LLVM
9:35 - 9:55 IlluminaTEE: Effective Man-At-The-End Attacks from within ARM TrustZone
9:55 - 10:10 K-Hunt++: Improved Dynamic Cryptographic Key Extraction (short)
10:10 - 11:00 Coffee Break
11:00 Morning Session 2
11:00 - 11:20 Anti-Cheat: Attacks and the Effectiveness of Client-Side Defences
11:20 - 11:40 Tools and Models for Software Reverse Engineering Research
11:40 - 12:00 Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts
12:00 - 12:10 Closing Remarks