Morning | |
9:15 – 10:15 |
Invited speaker (joint with QASA and DPM): Steven Murdoch |
Break | |
Session 1 |
Authentication and Authorization (Room: 1-03)
|
10:45 – 11:45 | Ronan-Alexandre Cherreau, Rémi Douence, Jean-Claude Royer, Mario Sudholt, Anderson Santana De Oliveira, Yves Roudier and Matteo Dell’amico. Reference monitors for security and interoperability in OAuth 2.0 Mads Ingerslew Ingwar and Christian Damsgaard Jensen. |
Session 2 |
Mobile Security (Room: 1-03)
|
11:45 – 12:45 | Fabio Martinelli, Andrea Saracino and Daniele Sgandurra. Classifying Android Malware through Subgraph Mining Gianluca Dini, Fabio Martinelli, Ilaria Matteucci, Andrea Saracino and Daniele Sgandurra. |
Lunch | |
Afternoon | |
Session 3 |
Vulnerabilities (Room: 1-03)
|
14:15 – 15:45 | Quentin Jerome, Samuel Marchal, Radu State and Thomas Engel. Advanced Detection Tool for PDF Threats Gabriel Serme, Theodoor Scholte and Anderson Santana De Oliveira. George Hatzivasilis, Konstantinos Fysarakis, Charalampos Manifavas and Konstantinos Rantos. |
Break | |
16:15 – 17:15 |
Invited speaker (joint with DPM): Emil Lupu |
17:15 – 18:15 |
Panel (joint with QASA): |
19:00 – 20:00 |
Pre-dinner drinks |
20:00 – 23:00 |
Dinner |
should be sent in a ZIP, by the 15th of November, to the following email: setop2013(at)mlistes.telecom-bretagne.eu
Workshop date/place:12th-13th September, 2013, Egham, U.K.
Submission deadline:
June 28th, 2013 firm deadline extension
Acceptance Notification:
July 19th, 2013
Camera ready:
August 12th, 2013