Our annual demo day will be held on 1 June, 2015. This event is jointly organized by the Secure Systems Group at Aalto University and the University of Helsinki. The demo day provides an opportunity to present our work and seek valuable inputs from external visitors. This is a public event and we welcome your attendance. But we ask you to register for the event.
Venue and Date
Date: 1 June 2015
Time: 14:15 – 17:00
Location: T-Building, Konemiehentie 2, Espoo
Program
Presenter | Title | Additional Info | ||
---|---|---|---|---|
Presenter | Title | Additional Info | ||
14:15-15:00 Welcome and Overview
(Lecture Hall T1) |
N. Asokan, Valtteri Niemi, Tuomas Aura | “State of the Union” and demo teasers | Slides | |
15:00 – 17:00 Demos and Posters
(Library, ground floor) |
Presenter | Title | Research Program | |
Jian Liu and Sandeep Tamrakar | Secure Deduplication of Encrypted Data | Cloud Security Services (CloSe) | Poster and two demos, project page | |
Long Nguyen | OmniShare: Accessing Encrypted Cloud Storage from Multiple Devices | CloSe and ICRI-SC | Poster and demo, project page | |
Filippo Bonazzi, Ravishankar Borgaonkar | Analyzing SEAndroid Policies | Platform Security (ICRI-SC) | Poster and demo, project page | |
Lari Lehtomäki | Developing Apps for Emerging TEEs | Next Gen TEEs (ICRI-SC) | Poster, project page | |
Thomas Nyman | On Deploying TEE-based Authentication | Next Gen TEEs (ICRI-SC) | Poster and demo, project page | |
Juhani Toivonen, Hien Truong | Silence Signatures for Securely Forming IoT Device Domains | SWEN (ICRI-SC) | Poster and demo | |
Markku Antikainen | Commitment-based Device-pairing Protocol with Synchronised Drawing | Poster | ||
Kati Kyllonen, Hien Truong | Android Package Signing Key Analytics | Malware Insights | Poster, project page | |
Kalle Saari, Mika Juuti | LookAhead:
Augmenting Website Reputation Systems With Predictive Modeling |
LookAhead (ICRI-SC) | Poster and demo, project page | |
Sara Ramezanian | Private Membership Test with Bloom Filters | CloSe | Poster | |
Otto Huhta, Swapnil Udar | Perils in Designing Zero-Effort Deauthentication | Contextual Security (ConSec) | Poster, demo | |
Ravishankar Borgaonkar | Experimental Attacks on LTE Access Networks | Network Security | Poster | |
Thanh Bui, Markku Antikainen | Analysis of Topology Poisoning Attacks in Software-Defined Networking | Poster | ||
Marcin Nagy | Social Path Lengths of People Nearby – Example Applications: SpotShare and nearbyPeople | ConSec | Poster and Demo, project page |