[Om-announce] Call for Participation - 20th European Symposium on Research in Computer Security (ESORICS 2015)

Giovanni Livraga giovanni.livraga at gmail.com
Fri Aug 28 10:56:56 CEST 2015


20th European Symposium on Research in Computer Security (ESORICS 2015)
Vienna, Austria -- September 23-25, 2015

** Early bird registration: August 31, 2015 **


ESORICS is the annual European research event in Computer Security. 
The Symposium started in 1990 and has been hosted in several European
countries, attracting a wide international audience from both the academic
and industrial communities.
The 20th European Symposium on Research in Computer Security
(ESORICS 2015) will be held in Vienna, Austria.

The ESORICS 2015 conference is organized as a 5-day event featuring:
- two keynote speeches
- 59 scientific paper presentation in 3 days! (Sept 23-25)
- 7 co-located workshops! (Sept 21-22)
- 3 social events


Registration information is available at:

Early registration fees apply until August 31, 2015.


As Austrian Airlines is our Official Carrier for ESORICS 2015 you get a 
15% discount on all applicable fares. Our special flight offer as well 
as the online hotel booking form can be found here: 
We recommend to book your hotel as soon as possible, as September is 
a quite busy time in Vienna.


A PhD Consortium will take place in conjunction with ESORICS 2015, 
to be held on September 25, 2015. Send your contribution for the 
ESORICS 2015 PhD Consortium to Edgar Weippl eweippl at sba-research.org 
and Yvonne Poul ypoul at sba-research.org by August 28, 2015. If you are 
accepted to present in the PhD Consortium, you will have the opportunity 
to attend the full ESORICS Symposium from September 23 ñ 25, 2015 for free!
More information: 


Wednesday, September 23, 2015
09:00-10:00 Keynote Session 
 Richard Clayton, University of Cambridge, UK 

10:00-10:30 Coffee Break 

10:30-12:00 Session 1A: Network & Web Security 
 Haya Shulman and Michael Waidner. DNS-Scopy: Towards Security of Internet Naming 
 Joerg Schwenk, Mario Heiderich and Marcus Niemietz. Waiting for CSP ó Securing 
 Legacy Web Applications with JSAgents 
 Daniel Fett, Ralf Kuesters and Guido Schmitz. Analyzing the BrowserID SSO System 
 with Primary Identity Providers Using an Expressive Model of the Web 

10:30-12:00 Session 1B: Cryptography I 
 Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness 
 for Interactive Primitives 
 Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak. 
 Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors 
 over Rings 
 Gildas Avoine, Xavier Carpent and CÈdric Lauradoux. Interleaving Cryptanalytic 
 Time-memory Trade-offs on Non-Uniform Distributions 

12:00-13:30 Lunch 

13:30-15:00 Session 2A: System Security 
 Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu. A Practical 
 Approach for Adaptive Data Structure Layout Randomization 
 Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl. 
 Trustworthy prevention of code injection in Linux on embedded devices 
 Daniel Gruss, David Bidner and Stefan Mangard. Practical Memory Deduplication 
 Attacks in Sandboxed Javascript
13:30-15:00 Session 2B: Cryptography II 
 Kazuhiko Minematsu. Efficient Message Authentication Codes with Combinatorial 
 Group Testing 
 Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu. A 
 Based Proofs of Retrievability Supporting Public Verification 
 Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and 
 Jose-Luis Torre-Arce. DTLS-HIMMO: Achieving DTLS certificate security with 
 symmetric key overhead 

15:00-15:30 Coffee Break 

15:30-17:00 Session 3A: Risk Analysis 
 Aron Laszka and Jens Grossklags. Should Cyber-Insurance Providers Invest 
 in Software Security? 
 Jan Tobias Muehlberg, Job Noorman and Frank Piessens. Lightweight and 
 Flexible Trust Assessment Modules for the Internet of Things 
 Paul Beaumont, Neil Evans, Michael Huth and Tom Plant. Confidence analysis 
 for nuclear arms control: SMT abstractions of Bayesian Belief Networks 

15:30-17:00 Session 3B: Cryptography III 
 Tibor Jager, Jˆrg Schwenk and Juraj Somorovsky. Small Subgroup Attacks 
 Aggelos Kiayias and Qiang Tang. Making any Identity Based Encryption 
 Accountable, Efficiently 
 Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens 
 Groth and Christophe Petit. Short Accountable Ring Signatures Based on DDH 

17:00-22:00 Welcome Reception 

Thursday, September 24 
09:00-10:00 Keynote Session 
 Sushil Jajodia, George Mason University Fairfax, US 

10:00-10:30 Coffee Break 

10:30-12:00 Session 4A: Privacy I 
 Christof Torres, Hugo Jonker and Sjouke Mauw. FP-Block : usable web 
 privacy by controlling browser fingerprinting 
 Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li. Mind-Reading: 
 Privacy Attacks Exploiting Cross-App KeyEvent Injections 
 Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang. Enabling Privacy-assured 
 Similarity Retrieval over Millions of Encrypted Records 

10:30-12:00 Session 4B: Signatures 
 Christian Hanser, Max Rabkin and Dominique Schrˆder. Verifiably 
 Encrypted Signatures: Security Revisited and a New Construction 
 Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and 
 Zuoxia Yu. Updatable Hash Proof System and Its Applications 
 Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu. Server-Aided 
 Revocable Identity-Based Encryption 

12:00-13:30 Lunch 

13:30-15:00 Session 5A: Privacy II 
 Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou. Privacy-Preserving 
 Link Prediction in Decentralized Online Social Networks 
 Florian Kerschbaum and Hoon Wei Lim. Privacy-Preserving Observation in 
 Public Spaces 
 Qiang Tang and Jun Wang. Privacy-preserving Context-aware Recommender 
 Systems: Analysis and New Solutions 

13:30-15:00 Session 5B: Applied Security I 
 Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai 
 Liang. Web-to-Application Injection Attacks on Android: Characterization 
 and Detection 
 Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes. Enhancing 
 Java Runtime Environment for Smart Cards Against Runtime Attacks 
 Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer. 
 Making Bitcoin Exchanges Transparent 

15:00-15:30 Coffee Break 

15:30-17:30 Session 6A: Cloud Security 
 Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. 
 Rosu and Michael Steiner. Rich Queries on Encrypted Data: Beyond Exact Matches 
 Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou. 
 Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud 
 Data Encryption 
 Liang Feng Zhang and Reihaneh Safavi-Naini. Batch Verifiable Computation 
 of Polynomials on Outsourced Data 
 Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang. 
 CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification 
 in the Cloud 

15:30-17:30 Session 6B: Protocols & Attribute-based encryption 
 Omar Almousa, Sebastian A. Mˆdersheim, Paolo Modesti and Luca ViganÚ. 
 Typing and Compositionality for Security Protocols: A Generalization 
 to the Geometric Fragment 
 RÈmy ChrÈtien, Veronique Cortier and Stephanie Delaune. Checking trace 
 equivalence: How to get rid of nonces? 
 Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo. Attribute Based 
 Broadcast Encryption with Short Ciphertext and Decryption Key 
 Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei. Accountable 
 Authority Ciphertext-Policy Attribute-Based Encryption with White-Box 
 Traceability and Public Auditing in the Cloud 

18:00-23:00 Conference Dinner 

Friday, September 25 
09:00-10:30 Session 7A: Code Analysis & Side-Channels 
 Yueqian Zhang, Xiapu Luo and Haoyang Yin. DexHunter: Toward Extracting 
 Hidden Code from Packed Android Applications 
 Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena. Identifying 
 Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software 
 Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia. vBox: 
 Proactively Establishing Secure Channels between Wireless Devices 
 without Prior Knowledge 

09:00-10:30 Session 7B: Crypto Applications & Attacks 
 Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and 
 Stefano Sanfilippo. Challenging the Trustworthyness of PGP: Is the 
 Web-of-Trust Tear-proof? 
 Heiko Mantel and Artem Starostin. Transforming Out Timing Leaks, 
 More or Less 
 Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, 
 Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie. Small Tweaks do Not 
 Help: Differential Power Analysis of MILENAGE Implementations in 
 3G/4G USIM Cards 

10:30-11:00 Coffee Break 

11:00-12:30 Session 8A: Authentication I 
 Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding. On Security 
 of Content-based Video Stream Authentication 
 Marina Blanton and Siddharth Saraph. Oblivious Maximum Bipartite 
 Matching Size Algorithm with Applications to Secure Fingerprint 
 Xun Yi, Feng Hao, Liqun Chen and Joseph Liu. Practical Threshold 
 Password-Authenticated Secret Sharing Protocol 

11:00-12:30 Session 8B: Policies 
 Donald Ray and Jay Ligatti. A Theory of Gray Security Policies 
 Ximeng Li, Flemming Nielson and Hanne Riis Nielson. Factorization 
 of Behavioral Integrity 
 Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey 
 Foster and Michael Clarkson. Checking Interaction-Based Declassification 
 Policies for Android Using Symbolic Execution 

12:30-14:00 Lunch 

14:00-15:30 Session 9A: Authentication II 
 Jingyu Hua, Shaoyong Du and Sheng Zhong. Towards Attack-Resistant 
 Peer-Assisted Indoor Localization 
 Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon 
 Scielzo. Leveraging Real-Life Facts to Make Random Passwords More Memorable 
 Ding Wang and Ping Wang. The Emperorís New Password Creation Policies 

14:00-15:30 Session 9B: Detection & Monitoring 
 Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing. 
 Accurate Specification for Robust Detection of Malicious Behavior 
 in Mobile Environments 
 Maximilian Seitzer, Michael Gruhn and Tilo M¸ller. A Bytecode 
 Interpreter for Secure Program Execution in Untrusted Main Memory 
 Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and
 Ninghui Li. Learning from Others: User Anomaly Detection Using Anomalous 
 Samples from Other Users 

15:30-15:45 Coffee Break 

15:45-17:15 Session 10: Applied Security II 
 Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena. All Your 
 Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines 
 Tobias Pulls and Roel Peeters. Balloon: A Forward-Secure Append-Only 
 Persistent Authenticated Data Structure 
 LÈa Samarji, Nora Cuppens-Boulahia, FrÈdÈric Cuppens, Serge Papillon, 
 WaÎl Kanoun and Samuel Dubus. On the Fly Design and Co-simulation of 
 Responses against Simultaneous Attacks 


Additional information about the conference can be found at:

More information about the Om-announce mailing list