Our annual demo day will be held on June 20th, 2017. This event is jointly organized by the Secure Systems Group at Aalto University and the University of Helsinki. The demo day provides an opportunity to present our work and seek valuable inputs from external visitors. This is a public event and we welcome your attendance. But we ask you to register for the event.
At 11.30 we begin with a mini-workshop titled “Privacy in the Real World“, with presentations by Matthias Schunter from Intel and Pern Hui Chia from Google. We welcome all attendees to join!
The welcome event starts after the workshop at 13.00.
Venue and Date
Date: 20 June 2017
Time: 11:30 – 17:00
Location: T-Building, Konemiehentie 2, Espoo
Below is the program (pdfs of posters will be updated as they become available; so please check back).
Presenter | Title | Affiliation | ||
---|---|---|---|---|
11.30 – 12.45 Mini-workshop: Privacy in the Real World
Lecture Hall T2 |
Matthias Schunter
|
Benefits, risks, and potential mitigations of Web-Tracking
(abstract) |
Intel labs | |
Pern Hui Chia | Characterizing Dataset for Privacy at Scale
(abstract) |
Google Privacy & Security team | ||
13:00-13:45 Welcome and Overview
Lecture Hall T2 |
N. Asokan, Valtteri Niemi, Tuomas Aura | “State of the Union” and demo teasers
[slides] |
||
14:00 – 16:45 Demos and Posters
Library, ground floor |
Presenter | Title | Research Program | Additional Info |
Secure Systems Group, Aalto University | Klaudia Krawiecka | SafeKeeper: Protecting Web Credentials with Trusted Hardware | ICRI-SC | Demo + poster |
Rakesh G N | Faster Cryptocurrency Payments using Trusted Hardware | ICRI-SC | Demo + poster | |
Radek Tomšů | Automated Deauthentication using Web Transaction Analysis | ICRI-SC / ConSec | Poster | |
Hans Liljestrand | Linux Kernel Memory Safety | ICRI-SC | Poster | |
Aaro Lehikoinen | Hardware enforced scoping | Cloud-assisted Security Services (CloSer) / ICRI-SC | Demo + poster | |
Setareh Roshan | Estimating and Predicting Path Loss for Fake Base Station Detection | CloSer | Poster | |
Thomas Nyman | CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers | CloSer | Poster | |
Jian Liu | Oblivious Neural Network Predictions | CloSer | Demo + poster | |
Arseny Kurnikov | Live Migration of SGX Enclaves | CloSer | Demo + poster | |
Samuel Marchal | IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT | SELIoT / ICRI-SC | Demo + poster | |
Md Sakib Nizam Khan | Securing Ownership Change of IoT Devices | SELIoT | Demo + poster | |
Mika Juuti | STASH: Securing transparent authentication using prover-side proximity verification | Contextual Security | Demo + poster | |
Jian Liu | Scalable Byzantine Consensus | Blockchains | Poster | |
Tommi Gröndahl | Stylometry and Information Security: A Survey of the State-of-the-art and Future Prospects | Poster | ||
Ashish Sultania | Monitoring the Failure Recovery of Cloud-Managed Digital Signage | Cyber Trust SHOK | Demo + poster | |
Viswanathan Manihatty Bojan | Security Evaluation of Password Manager Web Extensions | Cyber Trust SHOK | Demo + poster | |
Nadin Vazquez Torralba | Security Analysis of Mobile Payments | Cyber Trust SHOK | Demo + poster | |
Shiva Prasad Thagadur Prakash | Simple and secure IoT bootstrapping with EAP-NOOB | Cyber Trust SHOK | Demo + poster | |
Alberto Geniola | Analysis of Download Portals and Freeware Installers | Cyber Trust | Demo + poster | |
Secure Systems Group, University of Helsinki | Sara Ramezanian | Private Membership Test with Low Communication Complexity | CloSer | Demo + poster |
Tommi Meskanen | Private Graph Search | CloSer | Poster | |
Mohsin Khan | How a pseudonym based solution to a privacy problem of 3G/4G opens a vulnerability to DoS | Poster | ||
Zheng Yang | Database leakage attack against a WiFi fingerprint location scheme using Paillier encyption | Poster | ||
Visitor Groups | Jose Viquez Zamora | IoT Application Provisioning | Security on IoT Devices | Demo + poster |
Le Nguyen | Context-based User Authentication and Device Pairing | Ambient Intelligence Group, Aalto University | Demo + poster | |
Kubilay Ahmet Küçük | Framework of Secret Differential Privacy on Private Data | System Security Group, University of Oxford | Poster |