LECTURERS
Tom Chothia (University of Birmingham)
Verification of security protocols in ProVerif and Tamarin
Mauro Conti (University of Padova)
Side and Covert Channels: the Dr. Jekyll and Mr Hyde of Modern Technologies
Somesh Jha (University of Wisconsin)
Adversarial machine learning
Kenny Paterson (ETH Zurich)
Secure Messaging
Giuseppe Persiano (Università di Salerno)
Algorand Blockchain: introduction to blockchain and smart contract design
Shruti Tople (Microsoft Research)
Privacy and Security Analysis of Machine Learning Pipelines
TIMETABLE
Welcome buffet: Sunday 28 August, starting from 19:30 at the canteen.
Welcome dinner: Monday 29 August, starting from 19 at the balcony of the Rock.
Social dinner: Wednesday, 19:30, Loggia dei Britti.
Thursday, 17:00, guided tour of the museum and of the rock basement.
Breakfast and lunch are served at the canteen.
PhD Forum (Monday 29, August)
09:00 Opening
09:10-10:10
Niklas Reusch (Technical University of Denmark) - Safety & security for critical computer networks
Björn Leander (Mälardalen University) - Access control in industrial automation and control systems
Nathan Schiele (Leiden University) - Attack trees in practice
10:20-11:00
Mohammad Ahmadpanah (Chalmers University of Technology ) - SandTrap: Securing JavaScript-driven Trigger-Action Platforms
Laouen Fernet (DTU Lyngby) - How to verify privacy automatically
11:30-12:30
Arina Kudrivtseva (Leiden University) - Secure software development methodologies: A multi-vocal literature review
Hayyu Imanda (University of Oxford) - Ask for Alice: Online Covert Distress Signal in the Presence of a Strong Adversary
Soufian El Yadmani (Leiden University) - A study of fake and malicious CVE proof of concepts in github
12:40-13:20
Simone Bussa (Politecnico di Torino) - Formal verification for Cyber-Physical Systems
Daniele Bringhenti (Politecnico di Torino) - Automating security configuration in virtualized computer networks
PhD Forum (Tuesday 30, August)
17:15-18:15
Giovanni Ciaramella (CNR-IIT) - A proposal for continuous and silent user authentication through mouse dynamics and explainable deep learning
Stefano Fagnano (CNR-IIT) - Picker blinder: automated generation of collusive attacks through shared preferences injection
Giuseppe Crincoli (CNR-IIT) - Vulnerable smart contract detection by means of model checking
Marcello Di Giammarco (CNR-IIT) - Explainable deep learning models for biomedical images classification
Bonus track (Wednesday 31, August)
Wojtek Jamroga (University of Luxembourg and Polish Academy of Sciences) - Model Checking Strategic Ability. Why, What, and Especially: How?
Niklas Reusch, Francisco Blas Izquierdo Riera, Mohammad Ahmadpanah, Ivan Oleinikov - Capture the flag competitions, demo&challenge activity, experience with students, and open discussion