Conference Program escar USA 2019

Tuesday, June 11th, 2019
07:00 - 10:00 pm

Social Kick-Off at Marriott Eagle Crest Golf Clubhouse

Wednesday, June 12th, 2019

08:00 - 09:00 Registration
09:00 - 09:15 Welcome

Session I | Chair: Tom Forest (General Motors)
09:15 - 10:00 Physics of Sensor Security
Invited Talk: Kevin Fu (University of Michigan)
CAN Fingerprinting
10:00 - 10:30 Transmitter Identification for CAN protocol using channel distortion
Azeem Hafeez, Sai Ponnapalli and Hafiz Malik (University of Michigan)
10:30 - 11:00 Two-Point Voltage Fingerprinting: Increasing Detectability of ECU Masquerading Attacks
Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Li Zhao and Manoj Sastry (Intel)
11:00 - 11:30 Break

Session II | Chair: Robert Lambert (ESCRYPT)
11:30 - 12:15 Building Secure Devices in Untrusted Factories
Invited Talk: Nate McFeters (NCC)
12:15 - 13:30 Lunch

Session III | Chair: Kevin Harnett (US DOT/Volpe Center)
13:30 - 14:15 Cyber Security Research in the Electric Vehicle Infrastructure
Invited Talk: Ken Rohde (Idaho National Labs)
Vulnerabilities I
14:15 - 14:45 On The CANT Bus, No One Can Hear You Scream
Timothy Brom (GRIMM)
14:45 - 15:15 The devil is in the fragments- The risks presented to automotive Ethernet networks by legacy & new protocols
Matan Atad and Amit Geynis (Argus Cyber Security)
15:15 - 15:45 Break

Session IV | Chair: André Weimerskirch (Lear Corporation)
Testing
15:45 - 16:30 Improving Fuzz Testing of Infotainment Systems and Telematics Units using Agent Instrumentation
Rikke Kuipers and Dennis Kengo Oka (Synopsys)
16:30 - 17:00 Incident Response - preserving Attorney-Client privilege
Invited Talk: Alex Muentz (Leviathan Security)
17:00 - 18:00 Social Hour (all)
18:30 Dinner (for pre-registered attendees)
   
   
Thursday June 13th, 2019

08:00 - 09:00 Registration

Session V | Chair: André Weimerskirch (Lear Corporation)
09:00 - 09:45 Strategies for avoiding and defending against cybersecurity-related product liability (IoT) litigation
Invited Talk: IJay Palanski (Armstrong Teasdale LLP)
Vulnerabilities II
09:45 - 10:15 Attacking AUTOSAR using Software and Hardware Attacks Crypto
Niek Timmers (Riscure) and Pascal Nasahl (TU Graz)   
10:15 - 10:45 Optimizing Group Key-agreement in Automotive In-Vehicle Networks
Marcos Vinicius M. Silva, Marcos A. Simplicio Jr., Eduardo Lopes Cominetti, Jefferson E. Ricardini (University of São Paulo), Henrique Ogawa, Helmiton Cunha and Harsh Kupwade Patil (LG)
10:45 - 11:15 Break

Session VI | Chair: Robert Lambert (ESCRYPT)
11:15 - 12:00 Update on NIST Cryptography Program
Invited Talk: Lily Chen (NIST)
12:00 - 13:15 Lunch

Session VII | Chair: Tom Forest (General Motors)
13:15 - 14:00 An Overview of the DHS Science and Technology Directorate’s Cyber-Physical Security Program
Invited Talk: Christos Papadopoulos (DHS)
Defense   
14:00 - 14:30 Reducing Risk Potential by Evaluating Specialized Countermeasures for Electronic Control Units
Sergei Bauer (KAI GmbH) and Peter Schartner (Klagenfurt University)
14:30 - 15:00 Vehicle Safe-Mode: An After-Market Proof-Of-Concept
Tsvika Dagan, Avishai Wool (Tel-Aviv University) and Yuval Montvelisky (Hamachvan Speedometer LTD)
15:00 - 15:30 Controller Area Network Security Data Diode
Jeremy Daily (University of Tulsa)
15:30 - 15:45 Closing Remarks