Josef Ressel Center for User-friendly Secure Mobile Environments
Android Security Symposium 2015
Program 2015 (Last update: 2015-09-07)
>>> Download the program folder here <<<
>>> Playlist with all talks on YouTube <<<
Day 1: Wednesday, September 9th, 2015
08:30 | Registration |
09:15 | Welcome Speech |
Exploring Android Security | |
09:30 | Improving mobile security with forensics, app analysis and big data Andrew Hoog, NowSecure, Oak Park, IL, USA |
10:30 | Coffee Break |
11:00 | Android security architecture Nikolay Elenkov, Sarion Systems Research, Tokyo, Japan |
12:00 | Lunch and Networking Break |
13:30 | Lessons from the trenches: An inside look at Android security Nick Kralevich, Android Security, Google, Mountain View, CA, USA |
14:15 | Exploit mitigation at the native level for RISC-based devices Matthias Neugschwandtner, IBM Research, Zurich, Switzerland |
15:00 | Coffee Break |
PhD School | |
15:30 | Secure copy protection for mobile apps Nils T. Kannengiesser, Technische Universität München, Germany |
16:00 | Human factors in anonymous mobile communication Svenja Schröder, University of Vienna, Austria |
16:30 | Continuous risk-aware multi-modal authentication Daniel Hintze, FHDW University of Applied Sciences Paderborn, Germany Rainhard Findling and Muhammad Muaaz, University of Applied Sciences Upper Austria, Hagenberg, Austria |
17:00 | Closing of Day |
Day 2: Thursday, September 10th, 2015
08:30 | Registration |
09:15 | Welcome Speech |
Security for Everyone | |
09:30 | Assessing Android applications using command-line fu Pau Oliva Fora, NowSecure, Barcelona, Spain |
10:30 | Coffee Break |
11:00 | The quest for usable security N. Asokan, Aalto University and University of Helsinki, Finland |
12:00 | Lunch and Networking Break |
Trusted Computing | |
13:30 | Android and trusted execution environments Jan-Erik Ekberg, Trustonic Inc, Helsinki, Finland |
14:00 | An infestation of dragons: Exploring vulnerabilities in the ARM TrustZone architecture Josh Thomas, Atredis Partners, Houston, TX, USA Charles Holmes, Atredis Partners, Boston, MA, USA |
15:00 | Coffee Break |
15:30 | Using Android security for governmental PKI: Opportunities and challenges Pekka Laitinen, Population Register Centre, Helsinki, Finland |
16:00 | Secure elements for you and me: A model for programmable secure hardware in mobile ecosystems Alexandra Dmitrienko, Fraunhofer Institute for Secure Information Technology (SIT), Darmstadt, Germany |
16:45 | Closing of Day |
Day 3: Friday, September 11th, 2015
08:30 | Registration |
09:15 | Welcome Speech |
Incident Handling, Malware, and Countermeasures | |
09:30 | Mobile threats incident handling Yonas Leguesse, European Union Agency for Network and Information Security (ENISA), Athens, Greece |
10:30 | Coffee Break |
11:00 | ANANAS - ANalyzing ANdroid ApplicationS Dieter Vymazal, University of Applied Sciences Upper Austria, Hagenberg, Austria |
12:00 | Lunch and Networking Break |
13:30 | How Google killed two-factor authentication Victor van der Veen, VU University Amsterdam, Netherlands |
14:15 | A walk through the construction of the first mobile malware tracker Federico Maggi, Politecnico di Milano, Italy |
15:00 | Closing of Day |