[Om-announce] Call for Participation - 20th European Symposium on Research in Computer Security (ESORICS 2015)
Giovanni Livraga
giovanni.livraga at gmail.com
Fri Aug 28 10:56:56 CEST 2015
CALL FOR PARTICIPATION
******************************************************************************
20th European Symposium on Research in Computer Security (ESORICS 2015)
Vienna, Austria -- September 23-25, 2015
http://www.esorics2015.sba-research.org
******************************************************************************
** Early bird registration: August 31, 2015 **
ABOUT THE CONFERENCE
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been hosted in several European
countries, attracting a wide international audience from both the academic
and industrial communities.
The 20th European Symposium on Research in Computer Security
(ESORICS 2015) will be held in Vienna, Austria.
The ESORICS 2015 conference is organized as a 5-day event featuring:
- two keynote speeches
- 59 scientific paper presentation in 3 days! (Sept 23-25)
- 7 co-located workshops! (Sept 21-22)
- 3 social events
REGISTRATION
Registration information is available at:
http://esorics2015.sba-research.org/venue/registration/
Early registration fees apply until August 31, 2015.
HOTEL & FlIGHT
As Austrian Airlines is our Official Carrier for ESORICS 2015 you get a
15% discount on all applicable fares. Our special flight offer as well
as the online hotel booking form can be found here:
http://esorics2015.sba-research.org/venue/.
We recommend to book your hotel as soon as possible, as September is
a quite busy time in Vienna.
PhD CONSORTIUM
A PhD Consortium will take place in conjunction with ESORICS 2015,
to be held on September 25, 2015. Send your contribution for the
ESORICS 2015 PhD Consortium to Edgar Weippl eweippl at sba-research.org
and Yvonne Poul ypoul at sba-research.org by August 28, 2015. If you are
accepted to present in the PhD Consortium, you will have the opportunity
to attend the full ESORICS Symposium from September 23 ñ 25, 2015 for free!
More information:
http://esorics2015.sba-research.org/call-for-papers/call-for-phd-presentations/
PROGRAM
Wednesday, September 23, 2015
--------------------------
09:00-10:00 Keynote Session
Richard Clayton, University of Cambridge, UK
10:00-10:30 Coffee Break
10:30-12:00 Session 1A: Network & Web Security
Haya Shulman and Michael Waidner. DNS-Scopy: Towards Security of Internet Naming
Infrastructure
Joerg Schwenk, Mario Heiderich and Marcus Niemietz. Waiting for CSP ó Securing
Legacy Web Applications with JSAgents
Daniel Fett, Ralf Kuesters and Guido Schmitz. Analyzing the BrowserID SSO System
with Primary Identity Providers Using an Expressive Model of the Web
10:30-12:00 Session 1B: Cryptography I
Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness
for Interactive Primitives
Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak.
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors
over Rings
Gildas Avoine, Xavier Carpent and CÈdric Lauradoux. Interleaving Cryptanalytic
Time-memory Trade-offs on Non-Uniform Distributions
12:00-13:30 Lunch
13:30-15:00 Session 2A: System Security
Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu. A Practical
Approach for Adaptive Data Structure Layout Randomization
Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl.
Trustworthy prevention of code injection in Linux on embedded devices
Daniel Gruss, David Bidner and Stefan Mangard. Practical Memory Deduplication
Attacks in Sandboxed Javascript
13:30-15:00 Session 2B: Cryptography II
Kazuhiko Minematsu. Efficient Message Authentication Codes with Combinatorial
Group Testing
Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu. A
Symmetric-Key
Based Proofs of Retrievability Supporting Public Verification
Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and
Jose-Luis Torre-Arce. DTLS-HIMMO: Achieving DTLS certificate security with
symmetric key overhead
15:00-15:30 Coffee Break
15:30-17:00 Session 3A: Risk Analysis
Aron Laszka and Jens Grossklags. Should Cyber-Insurance Providers Invest
in Software Security?
Jan Tobias Muehlberg, Job Noorman and Frank Piessens. Lightweight and
Flexible Trust Assessment Modules for the Internet of Things
Paul Beaumont, Neil Evans, Michael Huth and Tom Plant. Confidence analysis
for nuclear arms control: SMT abstractions of Bayesian Belief Networks
15:30-17:00 Session 3B: Cryptography III
Tibor Jager, Jˆrg Schwenk and Juraj Somorovsky. Small Subgroup Attacks
on TLS-ECDH
Aggelos Kiayias and Qiang Tang. Making any Identity Based Encryption
Accountable, Efficiently
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens
Groth and Christophe Petit. Short Accountable Ring Signatures Based on DDH
17:00-22:00 Welcome Reception
Thursday, September 24
--------------------------
09:00-10:00 Keynote Session
Sushil Jajodia, George Mason University Fairfax, US
10:00-10:30 Coffee Break
10:30-12:00 Session 4A: Privacy I
Christof Torres, Hugo Jonker and Sjouke Mauw. FP-Block : usable web
privacy by controlling browser fingerprinting
Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li. Mind-Reading:
Privacy Attacks Exploiting Cross-App KeyEvent Injections
Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang. Enabling Privacy-assured
Similarity Retrieval over Millions of Encrypted Records
10:30-12:00 Session 4B: Signatures
Christian Hanser, Max Rabkin and Dominique Schrˆder. Verifiably
Encrypted Signatures: Security Revisited and a New Construction
Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and
Zuoxia Yu. Updatable Hash Proof System and Its Applications
Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu. Server-Aided
Revocable Identity-Based Encryption
12:00-13:30 Lunch
13:30-15:00 Session 5A: Privacy II
Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou. Privacy-Preserving
Link Prediction in Decentralized Online Social Networks
Florian Kerschbaum and Hoon Wei Lim. Privacy-Preserving Observation in
Public Spaces
Qiang Tang and Jun Wang. Privacy-preserving Context-aware Recommender
Systems: Analysis and New Solutions
13:30-15:00 Session 5B: Applied Security I
Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai
Liang. Web-to-Application Injection Attacks on Android: Characterization
and Detection
Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes. Enhancing
Java Runtime Environment for Smart Cards Against Runtime Attacks
Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer.
Making Bitcoin Exchanges Transparent
15:00-15:30 Coffee Break
15:30-17:30 Session 6A: Cloud Security
Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C.
Rosu and Michael Steiner. Rich Queries on Encrypted Data: Beyond Exact Matches
Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou.
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud
Data Encryption
Liang Feng Zhang and Reihaneh Safavi-Naini. Batch Verifiable Computation
of Polynomials on Outsourced Data
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang.
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification
in the Cloud
15:30-17:30 Session 6B: Protocols & Attribute-based encryption
Omar Almousa, Sebastian A. Mˆdersheim, Paolo Modesti and Luca ViganÚ.
Typing and Compositionality for Security Protocols: A Generalization
to the Geometric Fragment
RÈmy ChrÈtien, Veronique Cortier and Stephanie Delaune. Checking trace
equivalence: How to get rid of nonces?
Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo. Attribute Based
Broadcast Encryption with Short Ciphertext and Decryption Key
Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei. Accountable
Authority Ciphertext-Policy Attribute-Based Encryption with White-Box
Traceability and Public Auditing in the Cloud
18:00-23:00 Conference Dinner
Friday, September 25
--------------------------
09:00-10:30 Session 7A: Code Analysis & Side-Channels
Yueqian Zhang, Xiapu Luo and Haoyang Yin. DexHunter: Toward Extracting
Hidden Code from Packed Android Applications
Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena. Identifying
Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia. vBox:
Proactively Establishing Secure Channels between Wireless Devices
without Prior Knowledge
09:00-10:30 Session 7B: Crypto Applications & Attacks
Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and
Stefano Sanfilippo. Challenging the Trustworthyness of PGP: Is the
Web-of-Trust Tear-proof?
Heiko Mantel and Artem Starostin. Transforming Out Timing Leaks,
More or Less
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu,
Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie. Small Tweaks do Not
Help: Differential Power Analysis of MILENAGE Implementations in
3G/4G USIM Cards
10:30-11:00 Coffee Break
11:00-12:30 Session 8A: Authentication I
Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding. On Security
of Content-based Video Stream Authentication
Marina Blanton and Siddharth Saraph. Oblivious Maximum Bipartite
Matching Size Algorithm with Applications to Secure Fingerprint
Identification
Xun Yi, Feng Hao, Liqun Chen and Joseph Liu. Practical Threshold
Password-Authenticated Secret Sharing Protocol
11:00-12:30 Session 8B: Policies
Donald Ray and Jay Ligatti. A Theory of Gray Security Policies
Ximeng Li, Flemming Nielson and Hanne Riis Nielson. Factorization
of Behavioral Integrity
Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey
Foster and Michael Clarkson. Checking Interaction-Based Declassification
Policies for Android Using Symbolic Execution
12:30-14:00 Lunch
14:00-15:30 Session 9A: Authentication II
Jingyu Hua, Shaoyong Du and Sheng Zhong. Towards Attack-Resistant
Peer-Assisted Indoor Localization
Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon
Scielzo. Leveraging Real-Life Facts to Make Random Passwords More Memorable
Ding Wang and Ping Wang. The Emperorís New Password Creation Policies
14:00-15:30 Session 9B: Detection & Monitoring
Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing.
Accurate Specification for Robust Detection of Malicious Behavior
in Mobile Environments
Maximilian Seitzer, Michael Gruhn and Tilo M¸ller. A Bytecode
Interpreter for Secure Program Execution in Untrusted Main Memory
Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and
Ninghui Li. Learning from Others: User Anomaly Detection Using Anomalous
Samples from Other Users
15:30-15:45 Coffee Break
15:45-17:15 Session 10: Applied Security II
Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena. All Your
Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines
Tobias Pulls and Roel Peeters. Balloon: A Forward-Secure Append-Only
Persistent Authenticated Data Structure
LÈa Samarji, Nora Cuppens-Boulahia, FrÈdÈric Cuppens, Serge Papillon,
WaÎl Kanoun and Samuel Dubus. On the Fly Design and Co-simulation of
Responses against Simultaneous Attacks
MORE INFORMATION
Additional information about the conference can be found at:
http://esorics2015.sba-research.org/
More information about the Om-announce
mailing list