Accepted posters Glitch-Based Key Recovery with Shannon Entropy on the Last AES Round Haruka Hirata, Daiki Miyahara, Yang Li, Kazuo Sakiyama BioLeak: Cache attacks on biometric algorithms Owen Pemberton Attack by emulation: Gallagher access control system on MIFARE DESFire Tomáš Přeučil