[Om-announce] ESORICS 2017: Call for Participation

Cristina Alcaraz alcaraz at lcc.uma.es
Mon Aug 7 16:28:04 CEST 2017

22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017

WWW: https://www.ntnu.edu/web/esorics2017/

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.

ESORICS 2017 spans a total of 3 days, featuring:
   * 3 keynote speeches
     (Cormac Herley, Paul Syverson, Sandro Etalle)
   * 54 paper presentations in 3 days (Sep 11-13)
   * NN workshops (Sept 14 - 15)

Early Registration for ESORICS+Workshops 2017 is open, but will end 
soon. Early registration deadline is ***August, 15th 2017***

Registration rates:

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:esorics2017 at ntnu.edu

Venue page:

Travel and accommodation page:

We hope to see you in Oslo, Norway!

Presentations Program
The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:

* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###########
09:30 - 10:30
* Keynote: Cormac Herley

11:00 - 12:30

* Session 1: Security of embedded things
   - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios
       Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
   - Analyzing the Capabilities of the CAN Attacker
       Sibylle Froeschle and Alexander Stühring
   - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
       André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan 

* Session 2: Cryptographic Application I
   - Per-Session Security: Password-Based Cryptography Revisited
       Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
   - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
       Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
   - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
       Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart

14:00 - 15:30

* Session 3: Documents and Authorship
   - Identifying Multiple Authors in a Binary Program
       Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
   - Verifiable Document Redacting
       Herve Chabanne, Rodolphe Hugel and Julien Keuffer
   - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
       Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt

* Session 4: Analysis of Security Protocols
   - Automated analysis of equivalence properties for security protocols 
using else branches
        Ivan Gazeau and Steve Kremer and Levente Buttyán
   - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
       Cas Cremers, Martin Dehnel-Wild and Kevin Milner
   - Modular Verification of Protocol Equivalence in the Presence of 
       Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
   - Preventing Advanced Persistent Threats in Complex Control Networks
       Juan E. Rubio, Cristina Alcaraz and Javier Lopez
   - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
       Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach
   - Is my attack tree correct?
       Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
   - On-Demand Time Blurring to Support Side-Channel Defense
        Weijie Liu, Debin Gao and Mike Reiter
   - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
       Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
   - Practical Keystroke Timing Attacks in Sandboxed JavaScript
       Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard

### September 12 - Day 2 ###########
09:00 - 10:00
* Keynote: Paul Syverson

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
   - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
       Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
   - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
       Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
   - Adversarial Examples for Malware Detection
       Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Backes 
Michael and Patrick McDaniel Russo

* Session 8: Privacy in Systems
   - PerfWeb: How to Violate Web Privacy with Hardware Performance Events
       Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar
   - SePCAR: A Secure and Privacy-enhancing Protocol for Car Access 
       Iraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart 
Mennink, Siemen Dhooghe and Bart Preneel
   - Privacy Implications of Room Climate Data
       Philipp Morgner, Christian Müller, Matthias Ring, Björn 
Eskofier, Christian Riess, Frederik Armknecht and Zinaida Benenson

13:30 - 15:00

* Session 9: Network security
   - Link-Layer Device Type Classification on Encrypted Wireless Traffic 
with COTS Radios
       Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan and Nils Ole 
   - Preventing DNS amplification attacks using the history of DNS 
queries with SDN
       Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon 
Paul Jeong and Hyoungshick Kim
   - Zero Round-Trip Time for the Extended Access Control Protocol
       Jacqueline Brendel and Marc Fischlin

* Session 10: Controlling Access
   - No sugar but all the taste! Memory Encryption without Architectural 
       Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis, 
Evangelos Markatos and Sotiris Ioannidis
   - Tree-based Cryptographic Access Control
       James Alderman, Naomi Farley and Jason Crampton
   - Securing Data Analytics on SGX With Randomization
       Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat 
Kantarcioglu and Bhavani Thuraisingham

15:30 - 17:00

* Session 11: Information Flow
   - We are Family: Relating Information-Flow Trackers
       Musard Balliu, Daniel Schoepe and Andrei Sabelfeld
   - A Better Composition Operator for Quantitative Information Flow 
       Kai Engelhardt
   - WebPol: Fine-grained Information Flow Policies for Web Browsers
       Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and 
Christian Hammer

* Session 12: Blockchain and social networks
   - A Traceability Analysis of Monero’s Blockchain
       Amrit Kumar, Clément Fischer, Shruti Tople and Prateek Saxena
   -RingCT 2.0: A Compact Linkable Ring Signature Based Protocol for 
Blockchain Cryptocurrency Monero
       Shi-Feng Sun, Man Ho Au, Joseph Liu and Tsz Hon Yuen
   - Secure Computation in Online Social Networks
       Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, 
Alessandra Scafuro and Nikos Triandopoulos

### September 13 - Day 3 ###########
09:00 - 10:00
* Keynote: Sandro Etalle

10:30 - 12:30

* Session 13: Web Security
   - DeltaPhish: Detecting Phishing Webpages in Compromised Websites
       Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto 
Corda, Mauro Mereu, Guido Mureddu, Davide Ariu and Fabio Roli
   - DOMPurify: Client-Side Protection against XSS and Markup Injection
       Mario Heiderich, Jörg Schwenk and Christopher Spaeth
   - Quantifying Web Adblocker Privacy
       Arthur Gervais, Alexandros Filios, Vincent Lenders and Srdjan 

* Session 14: Cryptographic signatures
   - Reusing Nonces in Schnorr Signatures
       Marc Beunardeau, Aisling Connolly, Remi Geraud, David Naccache and 
Damien Vergnaud
   - How to Circumvent the Structure-Preserving Signatures Lower Bounds
       MEssam Ghadafi
   - Server-Supported RSA Signatures for Mobile Devices
        Ahto Buldas, Aivo Kalu, Peeter Laud and Mart Oruaas

13:30 - 15:00

* Session 15: Formal techniques
   - Inference-Proof Updating of a Weakened View under the Modification 
of Input Parameters
       Marcel Preuß and Joachim Biskup
   - Verifying Constant-Time Implementations by Abstract Interpretation
       Sandrine Blazy, David Pichardie and Alix Trieu
   - AVR Processors as a Platform for Language-Based Security
       Florian Dewald, Heiko Mantel and Alexandra Weber

* Session 16: Privacy and garbled circuits
   - Labeled Homomorphic Encryption: Scalable and Privacy-Preserving 
Processing of Outsourced Data
       Manuel Barbosa, Dario Catalano and Dario Fiore
   - New Way for Privacy-Preserving Decision Tree Evaluation
       Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao and Sherman S. M. 
   - Enforcing Input Correctness via Certification in Garbled Circuit 
       Yihua Zhang, Marina Blanton and Fattaneh Bayatbabolghani

15:30 - 17:00

* Session 17: Intrusion Detection
   - Secure IDS Offloading with Nested Virtualization and Deep VM 
       Shohei Miyama and Kenichi Kourai
   - Network Intrusion Detection based on Semi-Supervised Variational 
       Genki Osada, Kazumasa Omote and Takashi Nishide
   - LeaPS: Learning-Based Proactive Security Auditing for Clouds
       Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir 
Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi

* Session 18: Cryptographic Applications II
   - Multiple Rate Threshold FlipThem
       David Leslie, Chris Sherfield and Nigel Smart
   - Stringer: Measuring the Importance of Static Data Comparisons to 
Detect Backdoors and Undocumented Functionality
       Sam L. Thomas, Tom Chothia and Flavio D. Garcia
   - Generic Constructions for Fully Secure Revocable Attribute-Based 
       Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro 
Hanaoka and Keisuke Tanaka

More information about the Om-announce mailing list