DIKU Security Research Workshop 2019

Are you interested in the latest research in System-level Security and wish to learn more about the technical side?

DIKU will be hosting a day filled with technical talks about cutting-edge topics in security research. The workshop will feature leading researchers in Systems-level Security giving scientific talks. Topics will include hardware-assisted security, security for active storage, Security challenges for WebAssembly, DSL to generate memory-safe IoT code, and other topics. The target audience is anyone interested in technical aspects of security.

Join the workshop, become updated and get the change to interact with leading experts/researchers. Coffeebreaks and sandwiches are complementary. Participation is free but sign up is required - deadline for registration is Monday 5 August.

Programme

Find abstracts below the programme.

09.00 - 09-15 Welcome by Mads Nielsen, Head of Department of Computer Science, University of Copenhagen
09.15 - 10.45 IoT
Alejandro Russo: DPella: A Programming Framework for Differential Privacy with Accuracy
Boris Düdder: Production Infrastructure and Cybersecurity: Potentials and risks in sensor applications
10.45 - 11.00 Coffee break
11.00 - 12.30 WebAssembly
Conrad Watt: Constant-time WebAssembly
Ken Friis Larsen: WebAssembly in the Linux kernel
12.30 - 13.15 Lunch
13.15 - 14.45 Hardware
Mads Dam: Hypervisor Verification
Michael Kirkedal Thomsen: Reversible Cryptography
14.45 - 15.00 Coffee break
15.00 - 16.30 Security protocols and policies
David Basin: Security Protocols: Model Checking Standards
Thomas Hildebrandt: Security Policies, Processes and Workflows as Dynamic Condition Response (DCR) Graphs

Speakers

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

More info about Mads Dam, Professor, Kungliga Tekniska Högskolan.

Title
Hypervisor Verification

Abstract
TBA

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Slides from presentations (still under update)

Boris Düdder: Production Infrastructure and Cybersecurity: Potentials and risks in sensor applications