THURSDAY SEPTEMBER 28, 2017
09:00 - 10:00 Session 1: Prof. George Spanoudakis (City University London, UK), Managing Security Service Level Agreements
10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 2: Defences and Evaluation
- Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications
Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans and Siraj A. Shaikh - Examination of a New Defense Mechanism: Honeywords
Ziya A. Genc, Suleyman Kardas and Mehmet Sabir Kiraz - AndroNeo: Hardening Android malware sandboxes by predicting evasion heuristics
Yonas Leguesse, Mark Vella and Joshua Ellul
12:00 - 14:00 Lunch
14:00 - 15:00 Session 3: Trusted Execution
- EmLog: Tamper-Resistant System Logging for Constrained Devices with Trusted Execution Environments
Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis - How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip
Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet and Axel Legay
15:00 - 15:30 Coffee Break
15:30 - 16:30 Session 4: Security of Data
- Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello - JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
Hao Jiang and Ahmed Bouabdallah
16:30 - 17:30 Session 5: Security in Emerging Systems
- A Secure and Trusted Channel Protocol for UAVs Fleets
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron and Serge Chaumette - Philanthropy On The Blockchain
Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes
19:00 - 22:00 Gala dinner
------------------------------------------------------------------------
FRIDAY SEPTEMBER 29, 2017
09:00 - 10:00 Session 6: Prof. Fabio Martinelli (National Research Council of Italy, IT), Hybrid approaches for malware detection in android systems
10:00 - 10:30 Coffee Break
10:30 - 12:00 Session 7: Protocols and Algorithms
- A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps
Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya and Osmanbey Uzunkol - A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
Pau Conejero-Alberola, M. Francisca Hinarejos and Josep-Lluís Ferrer-Gomila - Revisiting Two-hop Distance-Bounding Protocols: Are you really close enough?
Nektaria Kaloudi and Aikaterini Mitrokotsa
12:00 - 12:30 Session 8: Dr. Louis Marinos (ENISA, GR), Cyber Threat Intelligence at ENISA: Course of Action
12:30 - 14:00 Lunch
14:00 - 18:00 Cybersure project meeting (by invitation)
Accepted papers

Security in Emerging Systems
F1
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron and Serge Chaumette.
A Secure and Trusted Channel Protocol for UAVs Fleets
S4
Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes. Philanthropy On The Blockchain
-----------
Security of Data
F4
Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello. Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
F7
Hao Jiang and Ahmed Bouabdallah. JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
------------
Trusted Execution
F3
Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis. EmLog: Tamper-Resistant System Logging for Constrained Devices with Trusted Execution Environments
F8
Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet and Axel Legay. How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip
------------
Defences and Evaluation
F6
Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans and Siraj A. Shaikh. Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications
S1
Ziya A. Genc, Suleyman Kardas and Mehmet Sabir Kiraz. Examination of a New Defense Mechanism: Honeywords
F5
Yonas Leguesse, Mark Vella and Joshua Ellul. AndroNeo: Hardening Android malware sandboxes by predicting evasion heuristics
---------------
Protocols and Algorithms
S2
Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya and Osmanbey Uzunkol. A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps
S3
Pau Conejero-Alberola, M. Francisca Hinarejos and Josep-Lluís Ferrer-Gomila. A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
F2
Nektaria Kaloudi and Aikaterini Mitrokotsa. Revisiting Two-hop Distance-Bounding Protocols: Are you really close enough?
----------------