Child pages
  • Survey Presentation Schedule
Skip to end of metadata
Go to start of metadata

Day 1: Tuesday, 21.03 

Time: 10 - 12

Location: Lecture room T3

PresenterTopic
Adrián Wragg RuizThe Protection of Information in Computer Systems
Antti MyyräThe Protection of Information in Computer Systems
Anwar HassenHIMA: A Hypervisor-Based Integrity Measurement Agent
Borger VigmostadBloom Cookies: Web Search Personalization without User Tracking
Ivan ShabuninIs this app safe?: a large scale study on application permissions and risk signals
Mari NikkarinenIntuitive security policy configuration in mobile devices using context profiling
Nikola MandicFast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
Olli-Mikko OjamiesThe company you keep: mobile malware infection rates and inexpensive risk indicators
Samu AhvenainenExpectation and Purpose: Understanding Users’ Menta l Models of Mobile App Privacy through Crowdsourcing


Day 2: Wednesday, 22.03 

Time: 9 - 11
Location: Room A106 

PresenterSurvey Topic
Jouni PuputtiA Simple Generic Attack on Text Captchas
Maïa AlexandreThe Protection of Information in Computer Systems
Otto MangsMobility helps security in ad hoc networks
Rasmus EskolaThe company you keep: mobile malware infection rates and inexpensive risk indicators
Riccardo PretA Framework for Third Party Android Marketplaces to Identify Repackaged Apps
Rula AlhalasehThe company you keep: mobile malware infection rates and inexpensive risk indicators
Sami JaktholmBoxify: Full-fledged App Sandboxing for Stock Android
Adedayo AdisaMobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices

 

Day 3: Thursday, 23.03 

Time: 10 - 12

Location: Lecture room T3

PresenterTopic
Aisha SaeedSecurity in the Firefox OS and Tizen Mobile Platforms
Aku SilvennoinenMobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices
Bhavya OmkarappaWhen It’s Better to Ask Forgiveness than Get Permission: Attribution Mechanisms for Smartphone Resources
Maimuna SyedOld, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures
Muhammad TufailBoxify: Full-fledged App Sandboxing for Stock Android
Prasant SukumarPermission Re-Delegation: Attacks and Defenses
Teemu KekkonenSecurity in the Firefox OS and Tizen Mobile Platforms
Teemu MikkonenAUDACIOUS: User-Driven Access Control with Unmodified Operating Systems
Tuomas TiiraTowards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones
  • No labels