ADIoT 2018 Program
Room: Salon 5
Wednesday, May 30, 2018 | ||||||||
9:00 – 9:30 | Hardware Security Threats Against Bluetooth Mesh Networks Alexandre Adomnicai (Trusted Objects & EMSE, France); Jacques Fournier (CEA-Leti, France); Laurent Masson (Trusted Objects, France) |
|||||||
9:30 – 10:00 | Revisiting OAKE in the eCK Security Model Guangye Sui (Fudan University, P.R. China) |
|||||||
10:00 – 10:30 | Status-based Detection of malicious code in Internet of Things (IoT) devices Dongdi Wei and Xiaofeng Qiu (Beijing University of Posts and Telecommunications, P.R. China) |
|||||||
10:30 - 11:00 | Networking Break | |||||||
11:00 – 11:30 | Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations (short paper) Nataliia Neshenko (Cyber Threat Intelligence Laboratory, Florida Atlantic University, USA); Martin Husák (Masaryk University, Czech Republic); Elias Bou-Harb (Cyber Threat Intelligence Laboratory, Florida Atlantic University, USA); Pavel Celeda (Masaryk University, Czech Republic) |
|||||||
11:30 – 12:00 | Blind Rendezvous: A Promising Candidate of Secure Spectrum Access for D2D communications in IoT (short paper) Xingya Liu (Lamar University, USA) |
|||||||
12:00 – 12:15 | Workshop Overview & Special Issue Info | |||||||
12:30 - 14:00 | Lunch |