Conference Program
Program Overview
Monday, October 17, 2011, Pre-Conference Full Day Workshops, Tutorials, and Welcome Reception | |||
7:00 - 8:30 |
Breakfast -- Grand Foyer |
||
8:30 - 17:00 |
Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) -- Grand II | ||
Workshop on Scalable Trusted Computing (STC) -- Grand III | |||
Workshop on Privacy in the Electronic Society (WPES) -- Grand I | |||
9:00 - 12:00 | Tutorial 1: Analysing risk in practice: The CORAS approach to model-driven risk analysis -- Alpine I | ||
12:00 - 13:00 | Lunch
-- Geneva/Currents |
||
14:00 - 17:00 | Tutorial 2: Developing Standardized Processes for Incident Response: Challenges and Opportunities -- Alpine I | ||
18:00 - 21:00 | Welcome Reception -- Edelweiss | ||
Tuesday, October 18, 2011, Main Conference | |||
7:30 - 8:30 |
Continental Breakfast
-- Grand Foyer/Currents |
||
8:30 - 10:00 | Welcoming remarks and Keynote talk by Prof. Farnam Jahanian -- Grand I-II-III | ||
10:00 - 10:30 |
Coffee-Break -- Grand Foyer |
||
10:30 - 12:00 | Session 1A
: System security Session chair: Srjdan Capkun -- Grand I-II-III |
Session 1B :
Composability of cryptographic protocols Session chair: Cédric Fournet -- Alpine I-II |
|
12:00 - 13:30 | Lunch
-- Geneva/Currents/Edelweiss |
||
13:30 - 15:30 | Session 2A:
Hardware, SCADA, and physical security Session chair: Ahmad-Reza Sadeghi -- Grand I-II-III |
Session 2B:
Authentication, access control, and audit Session chair: Jaeyeon Jung -- Alpine I-II |
|
15:30 - 16:00 |
Coffee-Break
-- Grand Foyer |
||
16:00 - 17:30 | Session 3A: Wild Woolly Web Session chair: Apu Kapadia -- Grand I-II-III |
Session 3B:
Cloud computing Session chair: Thomas Ristenpart -- Alpine I-II |
|
19:00 - 22:00 | Tour of Chicago Shedd Aquarium and Buffet Dinner | ||
Wednesday, October 19, 2011, Main Conference | |||
7:30 - 8:30 |
Continental Breakfast
-- Grand Foyer/Currents |
||
8:30 - 10:30 | Session 4A:
Malware and intrusion detection Session chair: Ben Livshits -- Grand I-II-III |
Session
4B:
Formal methods and verification Session chair: Anupam Datta -- Alpine I-II |
|
10:30 - 11:00 |
Coffee-Break -- Grand Foyer |
||
11:00 - 12:00 | Keynote talk by Dr. Jan Camenisch -- Grand I-II-III | ||
12:00 - 13:30 | Lunch
-- Geneva/Currents/Edelweiss |
||
13:30 - 15:30 | Session
5A: Virtual machines and hypervisors Session chair: Úlfar Erlingsson -- Grand I-II-III |
Session
5B: Applied cryptography Session chair: Ralf Kuesters -- Alpine I-II |
|
15:30 - 16:00 |
Coffee-Break -- Grand Foyer |
||
16:00 - 18:00 | Session 6A: Anonymous communications Session chair: Nick Hopper -- Alpine I-II |
Session 6B: Web security
Session chair: XiaoFeng Wang -- Grand I-II-III |
|
18:00 - 20:00 | Poster Session and Receptions -- Grand II-III | ||
Thursday, October 20, 2011, Main Conference | |||
7:00 -
8:00 |
Continental Breakfast
-- Grand Foyer/Currents |
||
8:00 - 10:00 | Session
7A: Side-channel
attacks and defenses Session chair: Nikita Borisov -- Alpine I-II |
Session
7B: Securing Web applications Session chair: Chris Kruegel -- Grand I-II-III |
|
10:00 - 10:30 |
Coffee-Break -- Grand Foyer |
||
10:30 - 12:30 | Session
8A: Privacy and mobile
security Session chair: Yan Chen -- Grand I-II-III |
Session
8B: Making secure computation practical Session chair: Stefan Katzenbeisser -- Alpine I-II |
|
14:00 - 17:00 | Tutorial 3: Benchmarking Computer Security through the Worldwide -- Grand I-II | ||
Tutorial 4: Secure Distributed Programming Alpine I-II | |||
Friday, October 21, 2011, Post-Conference Full Day Workshops | |||
7:30 - 8:30 |
Breakfast -- Grand Foyer |
||
8:30 - 17:00 | |||
Cloud Computing Security Workshop (CCSW)
-- Grand I-II |
|||
Workshop on Digital Rights Management (DRM)
-- Alpine I |
|||
Workshop on Digital Identity Management (DIM)
-- Alpine II |
|||
12:00 - 13:30 | Lunch
-- Geneva/Currents |
Detailed Program :
Tuesday, October 18, 2011
08:30 - 10:00 | Welcome remarks and Keynote Talk: Farnam Jahanian |
10:00 - 10:30 | Coffee-break |
10:30 - 12:00 | Session 1A:
System security Session chair: Srjdan Capkun |
VIPER: Verifying the Integrity of PERipherals' Firmware Unicorn: Two-Factor Attestation for Data Security Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing |
|
Session 1B:
Composability of cryptographic protocols Session chair: Cédric Fournet |
|
Composition Theorems Without Pre-Established Session Identifiers Composability of Bellare-Rogaway Key Exchange Protocols A composable computational soundness notion |
|
12:00 - 13:30 | Lunch |
13:30 - 15:30 | Session 2A:
Hardware, SCADA, and physical security Session chair: Ahmad-Reza Sadeghi |
On the Requirements for Successful GPS Spoofing Attacks Protecting Consumer Privacy from Electric Load Monitoring PaperSpeckle: Microscopic fingerprinting of paper On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs |
|
Session 2B:
Authentication, access control, and audit Session chair: Jaeyeon Jung |
|
Text-based CAPTCHA Strengths and Weaknesses An Efficient User Verification System via Mouse Movements Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Automatic Error Finding in Access-Control Policies |
|
15:30 - 16:00 | Coffee-break |
16:00 - 17:30 | Session 3A:
Wild Woolly Web Session chair: Apu Kapadia |
Fashion Crimes: Trending-Term Exploitation on the Web SURF: Detecting and Measuring Search Poisoning Cloak and Dagger: Dynamics of Web Search Cloaking |
|
Session 3B:
Cloud computing Session chair: Thomas Ristenpart |
|
Proofs of Ownerhip in Remote Storage Systems How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes Sedic: Privacy-Aware Data Intensive Computing on Hybrid Cloud |
|
19:00 - 22:00 | Tour of Chicago Shedd Aquarium and Buffet Dinner |
Wednesday, October 19, 2011
Thursday, October 20, 2011
8:00 - 10:00 | Session
7A:
Side-channel attacks and defenses
Session chair: Nikita Borisov |
iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Televisions, Video Privacy, and Powerline Electromagnetic Interference (sp)iPhone: Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers Predictive Mitigation of Timing Channels in Interactive Systems |
|
Session
7B:
Securing Web applications Session chair: Chris Kruegel |
|
Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction Context-Sensitive Auto-Sanitization in Web Templating Languages Using Type Qualifiers
ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications Fortifying Web-Based Applications Automatically |
|
10:00 - 10:30 | Coffee-break |
10:30 - 12:30 | Session
8A:
Privacy and mobile security
Session chair: Yan Chen |
Android Permissions Demystified These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications Privacy and Accountability for Location-based Aggregate Statistics Auctions in Do-Not-Track Compliant Internet Advertising |
|
Session
8B: Making secure computation practical
Session chair: Stefan Katzenbeisser |
|
Practical PIR for Electronic Commerce Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes Automatically Optimizing Secure Computation VMCrypt - Modular Software Architecture for Scalable Secure Computation |
|
14:00 - 17:00 | Tutorial 3: Benchmarking Computer Security through the Worldwide |
Tutorial 4: Secure Distributed Programming |