2010-07-07

[Tccc] ESORICS 2010 - call for participation (program now available)

[Apologies if you receive multiple copies of this message]

CALL FOR PARTICIPATION

***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************

ABOUT THE CONFERENCE

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing
together researchers in this area, by promoting the exchange of ideas
with system developers and by encouraging links with researchers in
related areas.

Progressively organized in a series of European countries, the
symposium is confirmed as the European research event in computer
security.

The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance


REGISTRATION

Registration information is available at:
https://www.triaenatours.gr/esorics.php


PROGRAM

Sunday, 19 September 2010
-------------------------

18:30 - 20:00 Registration

______________________________________________________________________


Monday, 20 September 2010
-------------------------

09:00 - 10:00 Registration

10:00 - 10:30 Opening

* Welcome address
S. Katsikas, ESORICS-2010 General Chair

* Technical Program Overview
B. Preneel and D. Gritzalis, Program Committee Chairs

* Local arrangements
N. Kyrloglou and M. Theoharidou, Organizing Committee Chairs

10:30 - 11:00 Coffee/tea

11:00 - 13:00 Session 1: RFID and Privacy

* Deng R., Li Y., Yung M., Zhao Y.
"A New Framework for RFID Privacy"

* Nithyanand R., Tsudik G., Uzun E.,
"Readers Behaving Badly: Reader Revocation in PKI-Based
RFID Systems"

* Androulaki E., Vo B., Bellovin S.,
"Privacy-Preserving, Taxable Bank Accounts"

* Dahl M., Delaune S., Steel G.,
"Formal Analysis of Privacy for Vehicular Mix-Zones"

13:00 - 14:00 Lunch

14:00 - 16:00 Session 2: Software Security

* Zhang C., Wang T., Wei T., Chen Y., Zou W.,
"IntPatch: Automatically Fix Integer Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time"

* Ligatti J., Reddy S.,
"A Theory of Runtime Enforcement, with Results"

* Hubert L., Jensen T., Monfort V., Pichardie D.,
"Enforcing Secure Object Initialization in Java"

* Mantel H., Sudbrock H.,
"Flexible Scheduler-Independent Security"

16:00 - 16:30 Coffee/tea

16:30 - 18:30 Session 3: Cryptographic Protocols

* Catrina O., de Hoogh S.,
"Secure Multiparty Linear Programming Using Fixed-Point Arithmetic"

* Almeida J.-B., Bangerter E., Barbosa M., Krenn S.,
Sadeghi A.-R., Schneider T.,
"A Certifying Compiler for Zero-Knowledge Proofs of
Knowledge based on S-Protocols"

* Liu J., Au M.-H., Susilo W., Zhou J.,
"Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model"

* Xu W., Ahn G.-J., Hu H., Zhang X., Seifert J.-P.,
"DR@FT: Efficient Remote Attestation Framework for Dynamics Systems"

20:00 - 22:00 Symposium Dinner

______________________________________________________________________

Tuesday, 21 September 2010
--------------------------

08:30 - 10:30 Session 4: Traffic Analysis

* Lu L., Chang E.-C., Chan M.-C.,
"Website Fingerprinting and Identification Using Ordered
Feature Sequences"

* Janc A., Olejnik L.,
"Web Browser History Detection as a Real-World Privacy Threat"

* Luo X., Zhang J., Perdisci R., Lee W.,
"On the Secrecy of Spread-Spectrum Flow Watermarks"

* Chakravarty S., Stavrou A., Keromytis A.,
"Traffic Analysis against Low-Latency Anonymity Networks
Using Available Bandwidth Estimation"

10:30 - 11:00 Coffee/tea

11:00 - 12:00 Invited talk
Chairperson: Gritzalis D., AUEB

* Helmbrecht U., ENISA,
"Cryptography and Privacy in Cloud Computing"

12:00 - 13:00 Session 5: End-User Security

* Xiang G., Pendleton B., Hong J., Rose C.,
"A Hierarchical Adaptive Probabilistic Approach
for Zero Hour Phish Detection"

* Bojinov H., Bursztein E., Boneh D., Boyen X.,
"Kamouflage: Loss-Resistant Password Management"

13:00 - 14:00 Lunch

14:00 - 16:00 Session 6: Formal Analysis

* Escobar S., Meadows C., Meseguer J., Santiago S.,
"Sequential Protocol Composition in Maude-NPA"

* Dinh T.-T.-A., Ryan M.,
"Verifying Security Property of Peer-to-Peer Systems Using CSP"

* Basin D., Cremers C.,
"Modeling and Analyzing Security in the Presence of
Compromising Adversaries"

* Yasuoka H., Terauchi T.,
"On Bounding Problems of Quantitative Information Flow"

16:00 - 16:30 Coffee/tea

16:30 - 18:30 Session 7: E-voting and Broadcast

* Heiberg S., Lipmaa H., van Laenen F.,
"On E-Vote Integrity in the Case of Malicious Voter Computers"

* Kremer S., Smyth B., Ryan M.,
"Election Verifiability in Electronic Voting Protocols"

* Heather J., Ryan P., Teague V.,
"Pretty Good Democracy for more expressive voting schemes"

* Blanton M., Frikken K.,
"Efficient Multi-Dimensional Key Management in Broadcast Services"

______________________________________________________________________

Wednesday, 22 September 2010
----------------------------

08:30 - 10:30 Session 8: Authentication, Access Control,
Authorization and Attestation

* Meier J., Gollmann D.,
"Caught in the Maze of Security Standards"

* Gofman M., Luo R., Yang P.,
"User-Role Reachability Analysis of Evolving Administrative
Role Based Access Control"

* Crampton J., Huth M.,
"An Authorization Framework Resilient to Policy Evaluation Failures"

* Kupcu A., Lysyanskaya A.,
"Optimistic Fair Exchange with Multiple Arbiters"

10:30 - 11:00 Coffee/tea

11:00 - 13:00 Session 9: Anonymity and Unlinkability

* Backes M., Doychev G., Duermuth M., Koepf B.,
"Speaker Recognition in Encrypted Voice Streams"

* Pashalidis A., Schiffner S.,
"Evaluating Adversarial Partitions"

* Ardagna C., Jajodia S., Samarati P., Stavrou A.,
"Providing Mobile Users' Anonymity in Hybrid Networks"

* Tiplea F.-L., Vamanu L., Varlan C.,
"Complexity of Anonymity for Security Protocols"

13:00 - 14:00 Lunch

14:00 - 16:00 Session 10: Network Security and Economics

* Wang L., Jajodia S., Singhal A., Noel S.,
"k-Zero Day Safety: Measuring the Security Risk of
Networks against Unknown Attacks"

* Johnson B., Grossklags J., Christin N., Chuang J.,
"Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information"

* Backes M., Ciobotaru O., Krohmer A.,
"RatFish: A File Sharing Protocol Provably Secure
Against Rational Users"

* Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H.,
"A Comprehensive Approach for Cost-Sensitive Intrusion Response"

16:00 - 16:30 Coffee/tea

16:00 - 18:00 Session 11: Secure Update, DOS and Intrusion Detection

* Perito D., Tsudik G.,
"Secure Code Update for Embedded Devices via Proofs of
Secure Erasure"

* Kapravelos A., Polakis I., Athanasopoulos E., Ioannidis S.,
Markatos E.,
"D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"

* Karame G., Capkun S.,
"Low-Cost Client Puzzles based on Modular Exponentiation"

* Tokhtabayev A., Skormin V., Dolgikh A.,
"Expressive, Efficient and Obfuscation Resilient Behavior Based IDS"

18:00 Farewell

MORE INFORMATION

Additional information about the conference can be found at:
www.esorics2010.org
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: