Conference Program
Program Overview
Monday, October 15, 2012, Pre-Conference Full Day Workshops and Welcome Reception | |||
7:30 - 8:45 |
Breakfast -- Governors I&II |
||
8:45 - 17:50 |
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) -- Hannover 2 | ||
Workshop on Scalable Trusted Computing (STC) -- Willow Oak | |||
Workshop on Privacy in the Electronic Society (WPES) -- Hannover 3 | |||
18:00 - 21:00 | Welcome Reception -- Oak Forest | ||
Tuesday, October 16, 2012, Main Conference | |||
7:30 - 9:00 |
Continental Breakfast -- Hannover |
||
9:00 - 10:15 | Opening remarks and invited talk 1 Keynote talk by Virgil Gligor -- Oak Forest A/B | ||
10:15 - 10:45 |
Coffee-Break -- Esplanade/Atrium |
||
10:45 - 12:00 |
Session 1: System security Session chair: Bryan Parno -- Oak Forest A |
Session 2: Transport Layer Security Session chair: Adrian Perrig -- Oak Forest B |
|
12:00 - 13:30 | Lunch -- Hannover |
||
13:30 - 15:35 |
Session 3: Anonymity & Censorship Session chair: Paul Syverson -- Oak Forest A |
Session 4: Software Security Session chair: Andy Gordon -- Oak Forest B |
|
15:35 - 15:55 | Coffee-Break -- Esplanade/Atrium |
||
15:55 - 18:00 |
Session 5
: Mobile Security Session chair: Ahmad-Reza Sadeghi -- Oak Forest A |
Session 6: Cloud Security Session chair: Srdjan Capkun -- Oak Forest B |
|
19:00 - 22:00 | Buffet Dinner and Concert | ||
14:00 - 17:00 | Tutorial 1: The State and Evolution of Privacy by Design -- Willow Oak | ||
Wednesday, October 17, 2012, Main Conference | |||
7:30 - 9:45 |
Continental Breakfast -- Hannover |
||
9:45 - 11:30 |
Session 7: Intrusions & Abuse Session chair: Phillip B. Gibbons -- Oak Forest A |
Session 8: Usability, Authentication & Trust Session chair: Ulfar Erlingsson -- Oak Forest B |
|
11:30 - 13:30 | Lunch -- Hannover |
||
13:30 - 15:35 |
Session 9: Infrastructure Security & Privacy Session chair: Nikita Borisov -- Oak Forest A |
Session 10: Applied Cryptography I Session chair: Stefan Katzenbeisser -- Oak Forest B |
|
15:35 - 15:55 | Coffee-Break -- Esplanade/Atrium |
||
15:55 - 18:00 |
Session 11: Network Security Session chair: Mike Reiter -- Oak Forest A |
Session 12: Privacy Session chair: Emiliano De Cristofaro -- Oak Forest B |
|
9:00 - 12:00 | Tutorial 2: Hardware-Enhanced Security -- Willow Oak | ||
18:30 - 20:00 | Reception: Poster and Demo Sessions -- Hannover | ||
Thursday, October 18, 2012, Main Conference | |||
7:30 - 8:45 |
Continental Breakfast -- Hannover |
||
8:45 - 10:00 |
Session 13: Advertising Security & Privacy Session chair: Apu Kapadia -- Oak Forest A |
Session 14: Verification Session chair: Véronique Cortier -- Oak Forest B |
|
10:00 - 10:30 |
Coffee-Break -- Esplanade/Atrium |
||
10:30 - 11:45 |
Session 15: Web Security Session chair: Chris Kruegel -- Oak Forest A |
Session 16: Secure Computation Session chair: Ian Goldberg -- Oak Forest B |
|
11:45 - 13:30 | Lunch -- Hannover |
||
13:30 - 15:10 |
Session 17: Badware Session chair: Guofei Gu -- Oak Forest A |
Session 18: Theory Session chair: Gregory Neuven -- Oak Forest B |
|
15:10 - 15:40 | Coffee-Break -- Esplanade/Atrium |
||
15:40 - 17:20 |
Session 19: Payments, Votes & Reputation Session chair: Nick Hopper -- Oak Forest A |
Session 20: Applied Cryptography II Session chair: Moti Yung -- Oak Forest B |
|
17:20 - 17:30 | Closing Remarks: -- Oak Forest A/B | ||
9:00 - 12:00 | Tutorial 3: Large-Scale DNS Data Analysis -- Willow Oak | ||
Friday, October 19, 2012, Post-Conference Full Day Workshops | |||
7:30 - 8:45 |
Breakfast -- Room 302/Raleigh Convention Center |
||
8:45 - 17:50 |
Workshop on Security and Artificial Intelligence (AISec)
-- Room 303/Raleigh Convention Center |
||
Cloud Computing Security Workshop (CCSW)
-- Room 301 A/Raleigh Convention Center |
|||
Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM)
-- Room 301 B/Raleigh Convention Center |
|||
12:00 - 13:30 | Lunch
-- Room 302/Raleigh Convention Center |
Detailed Program :
Tuesday, October 16, 2012
9:00 - 10:15 | Welcome remarks and Keynote Talk: Virgil Gligor |
10:15 - 10:45 | Coffee-break |
10:45 - 12:00 |
Session 1: Systems Security Session chair: Bryan Parno |
Fides: Selectively Hardening Software Application Components against Kernel-level or Process-level Malware A Software-Hardware Architecture for Self-Protecting Data Vigilare: Toward Snoop-based Kernel Integrity Monitor |
|
Session 2: Transport Layer Security Session chair: Adrian Perrig |
|
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security A Cross-Protocol Attack on the TLS Protocol |
|
12:00 - 13:30 | Lunch |
13:30 - 15:35 |
Session 3: Anonymity & Censorship Session chair: Paul Syverson |
Enhancing Tor's Performance using Real-time Traffic Classification Routing Around Decoys SkypeMorph: Protocol Obfuscation for Tor Bridges StegoTorus: A Camouflage Proxy for the Tor Anonymity System CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing |
|
Session 4: Software Security Session chair: Andy Gordon |
|
Adaptive Defenses for Commodity Software through Virtual Application Partitioning Leveraging Choice to Automate Authorization Hook Placement Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code Aligot: Cryptographic Function Identification in Obfuscated Binary Programs An Historical Examination of Open Source Releases and Their Vulnerabilities |
|
15:35 - 15:55 | Coffee-break |
15:55 - 18:00 |
Session 5: Mobile Security Session chair: Ahmad-Reza Sadeghi |
Mobile Data Charging: New Attacks and Countermeasures New Privacy Issues in Mobile Telephony: Fix and Verification PScout: Analyzing the Android Permission Specification CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Using Probabilistic Generative Models for Ranking Risks of Android Apps |
|
Session 6: Cloud Security Session chair: Srdjan Capkun |
|
Self-service Cloud Computing Hourglass Schemes: How to Prove that Cloud Files Are Encrypted Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense) Single Round Access Privacy on Outsourced Storage Cross-VM Side Channels and Their Use to Extract Private Keys |
|
19:00 - 22:00 | Buffet Dinner and Concert |
14:00 - 17:00 |
Tutorial 1: The State and Evolution of Privacy by Design |
Wednesday, October 17, 2012
9:45 - 11:30 |
Session 7: Intrusions & Abuse Session chair: Phillip B. Gibbons |
Kargus: a Highly-scalable Software-based Intrusion Detection System Populated IP Addresses -- Classification and Applications Blacksheep: Detecting Compromised Hosts in Homogeneous Crowds Innocent by Association: Early Recognition of Legitimate Users |
|
Session 8: Usability, Authentication & Trust Session chair: Ulfar Erlingsson |
|
Operating System Framed in Case of Mistaken Identity The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems OTO: Online Trust Oracle for User-Centric Trust Establishment Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions |
|
9:00 - 12:00 |
Tutorial 2: Hardware-Enhanced Security |
11:30 - 13:30 | Lunch |
13:30 - 15:35 |
Session 9: Infrastructure Security & Privacy Session chair: Nikita Borisov |
Minimizing Private Data Disclosures in the Smart Grid How Secure are Power Network Signature Based Time Stamps? SABOT: Specification-based Payload Generation for Programmable Logic Controllers GPS Software Attacks Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems |
|
Session 10: Applied Cryptography I Session chair: Stefan Katzenbeisser |
|
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications Secure Two-Party Computation in Sublinear (Amortized) Time Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing |
|
15:35 - 15:55 | Coffee-break |
15:55 - 18:00 |
Session 11: Network Security Session chair: Mike Reiter |
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense DCast: Sustaining Collaboration in Overlay Multicast despite Rational Collusion PeerPress: Utilizing Enemies' P2P Strength against Them Collaborative TCP Sequence Number Inference Attack |
|
Session 12: Privacy Session chair: Emiliano De Cristofaro |
|
Touching from a Distance: Website Fingerprinting Attacks and Defenses Protecting Location Privacy: Optimal Strategy against Localization Attacks Deanonymizing Mobility Traces: Using Social Network as a Side-Channel Differentially Private Sequential Data Publication via Variable-Length N-Grams On Significance of the Least Significant Bits For Differential Privacy |
|
18:30 - 20:00 |
Poster and Demo Sessions |
POSTER: Towards Measuring Warning Readability. POSTER: Context-Aware Web Security Threat Prevention. POSTER: Understanding New Anonymity Networks From a User’s Perspective. DEMO: Demonstrating the Effectiveness of MOSESdroid for Separation of Execution Modes. POSTER: Protecting Access Privacy of Cached Contents in Information Centric Networks. POSTER: Network-Based Intrusion Detection Systems Go Active! POSTER: Real-time continuous iris recognition for authentication using an eye tracker. DEMO: ReasONets: A Fuzzy-based approach for Reasoning on Network Incidents. DEMO: How Privacy Leaks from Bluetooth Mouse. POSTER: Marlin - Making it harder to fish for gadgets. POSTER: Advanced Triple-Channel Botnets: Model and Implementation. DEMO: Demonstrating a Lightweight Data Provenance for Sensor Networks. POSTER: Location Privacy Leaking from Spectrum Utilization Information in Database-driven Cognitive Radio Network. POSTER: Authenticated Secret Key Extraction using Channel Characteristics for Body Area Networks. POSTER: Privacy Preserving Boosting in the Cloud with Secure Half-Space Queries. POSTER: Detecting Money-Stealing Apps in Alternative Android Markets. POSTER: Automatic Generation of Vaccines for Malware Immunization. POSTER: A Covert Channel Construction in a Virtualized Environment. POSTER: Robust Dynamic Remote Data Checking for Public Clouds. POSTER: Model-based Context Privacy For Personal Data Streams. DEMO: Direct Queries over Encrypted Databases Practically. |
Thursday, October 18, 2012
8:45 - 10:00 |
Session 13: Advertising Security & Privacy Session chair: Apu Kapadia |
Privacy-Aware Personalization for Mobile Advertising Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising Non-tracking Web Analytics |
|
Session 14: Verification Session chair: Véronique Cortier |
|
Computational Soundness Without Protocol Restrictions Computational Verification of C Protocol Implementations by Symbolic Execution Verified Security of Redundancy-Free Encryption from Rabin and RSA |
|
10:00 - 10:30 | Coffee-break |
10:30 - 11:45 |
Session 15: Web Security Session chair: Chris Kruegel |
You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions FlowFox: a Web Browser with Flexible and Precise Information Flow Control Scriptless Attacks |
|
Session 16: Secure Computation Session chair: Ian Goldberg |
|
Secure Two-Party Computations in ANSI C Foundations of Garbled Circuits Salus: A System for Server-Aided Secure Function Evaluation |
|
9:00 - 12:00 |
Tutorial 3: Large-Scale DNS Data Analysis |
11:45 - 13:30 | Lunch |
13:30 - 15:10 |
Session 17: Badware Session chair: Guofei Gu |
Vanity, Cracks and Malware Manufacturing Compromise: The Emergence of Exploit-as-a-Service Before We Knew It: An Empirical Study of Zero-Day Attacks In The Real World Priceless: The Role of Payments in Abuse-advertised Goods |
|
Session 18: Theory Session chair: Gregory Neuven |
|
On the Parameterized Complexity of the Workflow Satisfiability Problem Intransitive Noninterference in Nondeterministic Systems Precise Enforcement of Progress-Sensitive Security TreeDroid: A Tree Automaton Based Approach to Enforcing Data Processing Policies |
|
15:10 - 15:40 | Coffee-break |
15:40 - 17:20 |
Session 19: Payments, Votes & Reputation Session chair: Nick Hopper |
Double-Spending Fast Payments in Bitcoin Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices PERM: Practical Reputation-Based Blacklisting without TTPs Measuring Vote Privacy, Revisited |
|
Session 20: Applied Cryptography II Session chair: Moti Yung |
|
Verifiable Data Streaming Dynamic Searchable Symmetric Encryption PrivateFS: A Parallel Oblivious File System |
|
17:20 - 17:30 | Closing remarks |