
Josef Ressel Center for User-friendly Secure Mobile Environments
Android Security Symposium 2015
Program 2015 (Last update: 2015-09-07)
>>> Download the program folder here <<<
>>> Playlist with all talks on YouTube <<<
Day 1: Wednesday, September 9th, 2015
| 08:30 | Registration |
| 09:15 | Welcome Speech |
| Exploring Android Security | |
| 09:30 | Improving mobile security with forensics, app analysis and big data Andrew Hoog, NowSecure, Oak Park, IL, USA |
| 10:30 | Coffee Break |
| 11:00 | Android security architecture Nikolay Elenkov, Sarion Systems Research, Tokyo, Japan |
| 12:00 | Lunch and Networking Break |
| 13:30 | Lessons from the trenches: An inside look at Android security Nick Kralevich, Android Security, Google, Mountain View, CA, USA |
| 14:15 | Exploit mitigation at the native level for RISC-based devices Matthias Neugschwandtner, IBM Research, Zurich, Switzerland |
| 15:00 | Coffee Break |
| PhD School | |
| 15:30 | Secure copy protection for mobile apps Nils T. Kannengiesser, Technische Universität München, Germany |
| 16:00 | Human factors in anonymous mobile communication Svenja Schröder, University of Vienna, Austria |
| 16:30 | Continuous risk-aware multi-modal authentication Daniel Hintze, FHDW University of Applied Sciences Paderborn, Germany Rainhard Findling and Muhammad Muaaz, University of Applied Sciences Upper Austria, Hagenberg, Austria |
| 17:00 | Closing of Day |
Day 2: Thursday, September 10th, 2015
| 08:30 | Registration |
| 09:15 | Welcome Speech |
| Security for Everyone | |
| 09:30 | Assessing Android applications using command-line fu Pau Oliva Fora, NowSecure, Barcelona, Spain |
| 10:30 | Coffee Break |
| 11:00 | The quest for usable security N. Asokan, Aalto University and University of Helsinki, Finland |
| 12:00 | Lunch and Networking Break |
| Trusted Computing | |
| 13:30 | Android and trusted execution environments Jan-Erik Ekberg, Trustonic Inc, Helsinki, Finland |
| 14:00 | An infestation of dragons: Exploring vulnerabilities in the ARM TrustZone architecture Josh Thomas, Atredis Partners, Houston, TX, USA Charles Holmes, Atredis Partners, Boston, MA, USA |
| 15:00 | Coffee Break |
| 15:30 | Using Android security for governmental PKI: Opportunities and challenges Pekka Laitinen, Population Register Centre, Helsinki, Finland |
| 16:00 | Secure elements for you and me: A model for programmable secure hardware in mobile ecosystems Alexandra Dmitrienko, Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany |
| 16:45 | Closing of Day |
Day 3: Friday, September 11th, 2015
| 08:30 | Registration |
| 09:15 | Welcome Speech |
| Incident Handling, Malware, and Countermeasures | |
| 09:30 | Mobile threats incident handling Yonas Leguesse, European Union Agency for Network and Information Security (ENISA), Athens, Greece |
| 10:30 | Coffee Break |
| 11:00 | ANANAS - ANalyzing ANdroid ApplicationS Dieter Vymazal, University of Applied Sciences Upper Austria, Hagenberg, Austria |
| 12:00 | Lunch and Networking Break |
| 13:30 | How Google killed two-factor authentication Victor van der Veen, VU University Amsterdam, Netherlands |
| 14:15 | A walk through the construction of the first mobile malware tracker Federico Maggi, Politecnico di Milano, Italy |
| 15:00 | Closing of Day |


