Acccepted papers

An arbiter PUF secured by remote random reconfigurations of an FPGA
Alexander Spenke (Hochschule Bonn-Rhein Sieg, Germany), Ralph Breithaupt and Rainer Plaga (Federal Office for Information Security (BSI), Germany)

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Jan Camenisch, Manu Drijvers and Anja Lehmann (IBM Research Zurich, Switzerland)

Bundling Evidence for Layered Attestation
Paul Rowe (The MITRE Corporation, US)

Controversy in trust networks
Paolo Zicari, Roberto Interdonato, Andrea Tagarelli and Sergio Greco (DIMES, University of Calabria, Italy)

Enabling key migration between non-compatible TPM versions
Linus Karlsson and Martin Hell (Lund University, Sweden)

Practical Signing-Right Revocation
Michael Till Beck (Ludwig-Maximilians-Universität München, Germany), Stephan Krenn (AIT Austrian Institute of Technology GmbH, Austria), Franz-Stefan Preiss and Kai Samelin (IBM Research Zurich, Switzerland)

Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices
Matthias Neugschwandtner (IBM Research Zurich, Switzerland), Collin Mulliner (Square Inc., US), William Robertson and Engin Kirda (Northeastern University, US)

Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness
Thomas Hupperich (Ruhr-University Bochum, Germany), Katharina Krombholz (SBA Research, Austria) and Thorsten Holz (Ruhr-University Bochum, Germany)