Agenda

Agenda

Please click here to view the agenda in PDF format

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

REGISTRATION, SUNDAY, 2013-11-03
16:00-
18:00
Registration – Foyer (B02)
To avoid long waiting lines on Monday and Tuesday, please try to register on Sunday

 

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

PRE-CONFERENCE WORKSHOPS, MONDAY, 2013-11-04
WPES TrustED CyCAR AISec PETShop
Room C01 & B09 Room B05-B06 Room B95 Room B07-B08 B04
08:30 – 18:00 08:30 – 18:00 08:30 – 18:00 08:30 – 18:00 08:30 – 18:00
07:30-
08:30
Breakfast & Registration – Room B01/B02
10:30-
11:00
Coffee Break – Room B01/B02
12:30-
14:00
Lunch Break – Room B01/B02
15:30-
16:00
Coffee Break – Room B01/B02

 

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

CCS MAIN CONFERENCE, TUESDAY, 2013-11-05
TRACK A TRACK B TRACK C TUTORIALS/
INV. TALKS
Room C01 Room B05-B06 Room B09 Room B07-B08
07:30-
08:30
Breakfast & Registration – Room B01/B02
08:30-
09:10
Opening (General Chair, PC Chair, SIGSAC Chair) – Room C01
09:10-
09:40
OPENING KEYNOTE – Room C01
Cyber Security in Germany
Martin Schallbruch
(Chief Information Officer at the German Federal Ministry of the Interior)
09:40-
10:00
Coffee Break – Room B01/B02
Session 1-A
Trusted Systems
Session 1-B
How Crypto Breaks
Session 1-C
Malware
Session Chair
Radu Sion
Session Chair
Volker Roth
Session Chair
Thorsten Holz
10:00-
10:30
A Security Framework for the Analysis and Design of Software Attestation
Frederik Armknecht (Universität Mannheim, Germany), Ahmad-Reza Sadeghi (Technische Universität Darmstadt/CASED), Steffen Schulz (Intel Corporation), Christian Wachsmann (Intel Collaborative Research Institute for Secure Computing at TU Darmstadt)
Rethinking SSL Development in an Appified World
Sascha Fahl (Leibniz University Hannover), Marian Harbach (Leibniz Universität Hannover), Henning Perl (Leibniz Universität Hannover), Markus Koetter (Leibniz Universität Hannover), Matthew Smith (Leibniz Universität Hannover)
A Clinical Study of Risk Factors Related to Malware Infections
Fanny Lalonde Lévesque (École Polytechnique de Montréal), Jude Nsiempba (École Polytechnique de Montréal), José M. Fernandez (École Polytechnique de Montréal), Sonia Chiasson (Carleton University), Anil Somayaji (Carleton University)
10:30-
11:00
OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms
Emmanuel Owusu (Carnegie Mellon University), Jorge Guajardo (Robert Bosch LLC – Research and Technology Center, Pittsburgh, USA), Jonathan McCune (Carnegie Mellon University), Jim Newsome (Carnegie Mellon University), Adrian Perrig (ETH Zurich, CyLab / Carnegie Mellon University), Amit Vasudevan (Carnegie Mellon University)
Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer (Portland State University), Scott E. Coull (RedJack, LLC.), Thomas Ristenpart (University of Wisconsin-Madison), Thomas Shrimpton (Portland State University)
Delta: Automatic Identification of Unknown Web-Based Infection Campaigns
Kevin Borgolte (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)
11:00-
11:30
BIOS Chronomancy: Fixing the Core Root of Trust for Measurement
John Butterworth (MITRE), Corey Kallenberg (MITRE), Xeno Kovah (MITRE), Amy Herzog (MITRE)
An Empirical Study of Cryptographic Misuse in Android Applications
Manuel Egele (Carnegie Mellon University), David Brumley (Carnegie Mellon University), Yanick Fratantonio (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara)
Beheading Hydras: Performing Effective Botnet Takedowns
Yacin Nadji (Georgia Institute of Technology), Manos Antonakakis (Damballa Inc.), Roberto Perdisci (University of Georgia), David Dagon (Georgia Institute of Technology), Wenke Lee (Georgia Institute of Technology)
INVITED TALK: Vincenzo Iozzo
From One Ivory Tower to Another: Wish Listing for Filling the Gaps in Information (In)Security
11:30-
12:00
Flexible and Scalable Digital Signatures in TPM 2.0
Liqun Chen (HP Labs), Jiangtao Li (Intel Labs)
Detecting Stealthy, Distributed SSH Bruteforcing
Mobin Javed (UC Berkeley), Vern Paxson (UC Berkeley and ICSI)
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Gianluca Stringhini (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
12:00-
13:30
Lunch Break – Room B01/B02
Session 2-A
Passwords
Session 2-B
Control & Information Flow
Session 2-C
Storage Security
Session Chair
Rob Johnson
Session Chair
Ninghui Li
Session Chair
Florian Kerschbaum
13:30-
14:00
Honeywords: Making Password-Cracking Detectable
Ari Juels (RSA), Ronald Rivest (MIT)
Monitor Integrity Protection with Space Efficiency and Separate Compilation
Ben Niu (Lehigh University), Gang Tan (Lehigh University)
Multi-Cloud Oblivious Storage
Emil Stefanov (UC Berkeley), Elaine Shi (University of Maryland)
14:00-
14:30
Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
Sebastian Uellenbeck (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum), Christopher Wolf (Ruhr-University Bochum), Thorsten Holz (Ruhr-University Bochum)
Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties
Máté Kovács (Technische Universität München), Helmut Seidl (Technische Universität München), Bernd Finkbeiner (Saarland University)
Policy-based Secure Deletion
Christian Cachin (IBM Research – Zurich), Kristiyan Haralambiev (IBM Research – Zurich), Hsu-Chun Hsiao (Carnegie Mellon University), Alessandro Sorniotti (IBM Research – Zurich)
TUTORIAL 1: Lecturer: Christof Paar
Constructive and Destructive Aspects of Embedded Security in the Internet of Things
14:30-
15:00
Measuring Password Guessability for an Entire University
Michelle L. Mazurek (Carnegie Mellon University), Saranga Komanduri (Carnegie Mellon University), Timothy Vidas (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Patrick Gage Kelley (University of New Mexico), Richard Shay (Carnegie Mellon University), Blase Ur (Carnegie Mellon University)
Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel
Mads Dam (KTH), Roberto Guanciale (KTH), Narges Khakpour (CSC, KTH), Hamed Nemati (KTH), Oliver Schwarz (SICS Swedish Institute of Computer Science)
Secure Data Deletion from Persistent Media
Joel Reardon (ETH Zurich), Hubert Ritzdorf (ETH Zurich), David Basin (ETH Zurich), Srdjan Capkun (ETH Zurich)
15:00-
15:30
SAuth: Protecting User Accounts from Password Database Leaks
Georgios Kontaxis (Columbia University), Elias Athanasopoulos (Columbia University), Georgios Portokalidis (Stevens Institute of Technology), Angelos D. Keromytis (Columbia University)
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
Kangkook Jee (Columbia University), Vasileios P. Kemerlis (Columbia University), Angelos D. Keromytis (Columbia University), Georgios Portokalidis (Stevens Institute of Technology)
PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dan Dobre (NEC Labs Europe), Ghassan Karame (NEC Labs Europe), Wenting Li (NEC Labs Europe), Matthias Majuntke (Capgemini Deutschland ), Neeraj Suri (TU Darmstadt), Marko Vukolić (Eurecom)
15:30-
16:00
Coffee Break – Room B01/B02
Session 3-A
Oblivious RAM and Oblivious Computation
Session 3-B
Anonymous Channels
Session 3-C
Protocol Analysis & Synthesis
Session Chair
Stefan Katzenbeisser
Session Chair
Nicholas Christin
Session Chair
David Basin
16:00-
16:30
Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov (UC Berkeley), Marten van Dijk (University of Connecticut), Elaine Shi (University of Maryland), Christopher Fletcher (MIT), Ling Ren (MIT), Xiangyao Yu (MIT), Srinivas Devadas (MIT)
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
Aaron Johnson (U.S. Naval Research Laboratory), Chris Wacek (Georgetown University), Rob Jansen (U.S. Naval Research Laboratory), Micah Sherr (Georgetown University), Paul Syverson (U.S. Naval Research Laboratory)
An Analysis of the EMV Channel Establishment Protocol
Christina Brzuska (Tel Aviv University), Nigel P. Smart (University of Bristol), Bogdan Warinschi (University of Bristol), Gaven J. Watson (University of Bristol)
16:30-
17:00
PHANTOM: Practical Oblivious Computation in a Secure Processor
Martin Maas (UC Berkeley), Eric Love (UC Berkeley), Emil Stefanov (UC Berkeley), Mohit Tiwari (UT Austin), Elaine Shi (University of Maryland), Krste Asanovic (UC Berkeley), John Kubiatowicz (UC Berkeley), Dawn Song (UC Berkeley)
PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks
Mashael Alsabah (Qatar Computing Research Institute), Ian Goldberg (University of Waterloo)
On the Security of TLS Renegotiation
Florian Giesen (Ruhr-Universität Bochum), Florian Kohlar (Ruhr-Universität Bochum), Douglas Stebila (Queensland University of Technology)
17:00-
17:30
Practical Dynamic Proofs of Retrievability
Elaine Shi (University of Maryland), Emil Stefanov (UC Berkeley), Charalampos Papamanthou (University of Maryland)
Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
John Geddes (University of Minnesota), Maxfield Schuchard (University of Minnesota), Nicholas Hopper (University of Minnesota)
Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes
Joseph A. Akinyele (Johns Hopkins University), Matthew Green (Johns Hopkins University), Susan Hohenberger (Johns Hopkins University)
17:30-
18:30
PANEL Discussion – Room C01
Distributed Monitoring and Analytics: Finding the Needle in the Haystack in Real Time
Moderator: David McGrew (Cisco)
18:30-
20:30
Poster Session & Cocktail Reception – Room B01

 

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

CCS MAIN CONFERENCE, WEDNESDAY, 2013-11-06
TRACK A TRACK B TRACK C TUTORIALS/
INV. TALKS
Room C01 Room B05-B06 Room B09 Room B07-B08
07:30-
08:30
Breakfast – Room B01/B02
08:30-
09:30
KEYNOTE – Room C01
The Science, Engineering and Business of Cyber Security
Ravi Sandhu
(Executive Director of the Institute for Cyber Security at the UT San Antonio)
Session 4-A
Network Security
Session 4-B
Critical Infrastructures
Session 4-C
Attribute-based Encryption
Session Chair
Dongyan Xu
Session Chair
Klaus Kursawe
Session Chair
Liqun Chen
09:30-
10:00
AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks
Seungwon Shin (Texas A&M University), Vinod Yegneswaran (SRI International), Phillip Porras (SRI International), Guofei Gu (Texas A&M University)
Impact of Integrity Attacks on Real-Time Pricing in Smart Grids
Rui Tan (Advanced Digital Sciences Center, Illinois at Singapore), Varun Badrinath Krishna (Advanced Digital Sciences Center, Illinois at Singapore), David K. Y. Yau (Advanced Digital Sciences Center, Illinois at Singapore and Singapore Univeristy of Technology and Design), Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign)
Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis (University of Texas at Austin), Brent Waters (University of Texas at Austin)
TUTORIAL 2: Lecturers:
Jan-Erik Ekberg, Kari Kostiainen, N. Asokan

Trusted Execution Environments on Mobile Devices
10:00-
10:30
MinimaLT: Minimal-latency Networking Through Better Securit
Michael Petullo (University of Illinois at Chicago), Jon Solworth (University of Illinois at Chicago), Daniel Bernstein (University of Illinois at Chicago), Tanja Lange (TU Eindhoven), Xu Zhang (University of Illinois at Chicago)
Configuration-based IDS for Advanced Metering Infrastructure
Muhammad Qasim Ali (University of North Carolina at Charlotte), Ehab Al-Shaer (UNCC)
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu (Shanghai Jiao Tong University, City University of Hong Kong), Zhenfu Cao (Shanghai Jiao Tong University), Duncan Wong (City University of Hong Kong)
10:30-
11:00
Coffee Break – Room B01/B02
Session 5-A
Programming Securely
Session 5-B
Secure Multiparty Computation
Session 5-C
Formal Methods
Session Chair
Jose Fernandez
Session Chair
Michael Waidner
Session Chair
Claudia Diaz
11:00-
11:30
Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming
Junyuan Zeng (University of Texas at Dallas), Yangchun Fu (University of Texas at Dallas), Kenneth Miller (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas), Xiangyu Zhang (Purdue University), Dongyan Xu (Purdue University)
Fast Two-Party Secure Computation with Minimal Assumptions
Abhi Shelat (University of Virginia), Chih-Hao Shen (University of Virginia)
Belief Semantics of Authorization Logic
Andrew Hirsch (George Washington University), Michael Clarkson (George Washington University)
11:30-
12:00
Chucky: Exposing Missing Checks in Source Code for Vulnerability Discovery
Fabian Yamaguchi (University of Goettingen), Christian Wressnegger (idalab GmbH), Hugo Gascon (University of Goettingen), Konrad Rieck (University of Goettingen)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov (Bar-Ilan University), Yehuda Lindell (Bar-Ilan University), Thomas Schneider (TU Darmstadt), Michael Zohner (TU Darmstadt)
Automatic Verification of Protocols with Lists of Unbounded Length
Bruno Blanchet (INRIA Paris-Rocquencourt), Miriam Paiola (INRIA Paris-Rocquencourt)
12:00-
12:30
Scheduling Blackbox Mutational Fuzzing
Maverick Woo (Carnegie Mellon University), Sang Kil Cha (Carnegie Mellon University), Samantha Gottlieb (Carnegie Mellon University), David Brumley (Carnegie Mellon University)
An Architecture for Practical Actively Secure MPC with Dishonest Majority
Marcel Keller (University of Bristol), Peter Scholl (University of Bristol), Nigel Smart (University of Bristol)
Relational Abstraction in Community-Based Secure Collaboration
Philip Fong (University of Calgary), Pooya Mehregan (University of Calgary), Ram Krishnan (University of Texas at San Antonio)
12:30-
14:00
Lunch Break – Room B01/B02
Session 6-A
Mobile Security Issues
Session 6-B
Randomness
Session 6-C
Hardware Security
Session Chair
Kosta Beznosov
Session Chair
Giuseppe Ateniese
Session Chair
Ruby Lee
14:00-
14:30
When Kids Toys Breach Mobile Phone Security
Abdul Serwadda (Louisiana Tech University), Vir Phoha (Louisiana Tech University)
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis (New York University), David Pointcheval (Ecole Normale Superieure), Sylvain Ruhault (Ecole Normale Superieure and Oppida), Damien Vergnaud (Ecole Normale Superieure), Daniel Wichs (Northeastern University)
FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis
Adam Waksman (Columbia University), Matthew Suozzo (Columbia University), Simha Sethumadhavan (Columbia University)
14:30-
15:00
Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis
Yuan Zhang (Fudan University), Min Yang (Fudan University), Bingquan Xu (Fudan University), Zhemin Yang (Fudan University), Guofei Gu (Texas A&M University), Peng Ning (NC State University), X. Sean Wang (Fudan University), Binyu Zang (Fudan University)
Predictability of Android OpenSSL’s Pseudo Random Number Generator
Soo Hyeon Kim (The Attached Institute of ETRI and KOREA Unisversity), Daewan Han (The Attached Institute of ETRI), Dong Hoon Lee (KOREA University)
Security Analysis of Integrated Circuit Camouflaging
Jeyavijayan Rajendran (Polytechnic Institute of NYU), Michael Sam (Polytechnic Insitute of NYU), Ozgur Sinanoglu (New York University Abu Dhabi), Ramesh Karri (Polytechnic institute of NYU)
15:00-
15:30
The Impact of Vendor Customizations on Android Security
Lei Wu (North Carolina State University), Michael Grace (North Carolina State University), Yajin Zhou (North Carolina State University), Chiachih Wu (North Carolina State University), Xuxian Jiang (North Carolina State University)
Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias (National and Kapodistrian University of Athens), Stavros Papadopoulos (University of Science & Technology, Hong Kong), Nikos Triandopoulos (RSA Laboratories and Boston University), Thomas Zacharias (National and Kapodistrian University of Athens)
Low-Fat Pointers: Compact Encoding and Efficient Gate-Level Implementation of Fat Pointers for Spatial Safety and Capability-based Security
Albert Kwon (University of Pennsylvania, Philadelphia), Udit Dhawan (University of Pennsylvania, Philadelphia), Jonathan Smith (University of Pennsylvania, Philadelphia), Thomas Knight (BAE Systems), Andre Dehon (University of Pennsylvania, Philadelphia)
INVITED TALK: Ivan Martinovic
Fasten Your Seatbelts – An Overview and Security Considerations of Next Generation Air Traffic Communication
15:30-
16:00
Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation
Rui Wang (Microsoft Research), Luyi Xing (Indiana University), Xiaofeng Wang (Indiana University), Shuo Chen (Microsoft Research)
Ensuring High-Quality Randomness in Cryptographic Key Generation
Henry Corrigan-Gibbs (Stanford University), Wendy Mu (Stanford University), Dan Boneh (Stanford University), Bryan Ford (Yale University)
Breaking and Entering through the Silicon
Clemens Helfmeier (Semiconductor Devices, TU Berlin), Dmitry Nedospasov (Security in Telecommunications, TU Berlin), Christopher Tarnovsky (IOActive Inc.), Jan Krissler (Security in Telecommunications, TU Berlin), Christian Boit (Semiconductor Devices, TU Berlin), Jean-Pierre Seifert (Security in Telecommunications, TU Berlin)
16:00-
16:30
Coffee Break – Room B01/B02
Session 7-A
Web Attacks
Session 7-B
Privacy-Preserving Protocols
Session 7-C
Systems’ Attack Mitigation
Session Chair
Sotiris Ioannidis
Session Chair
Thomas Schneider
Session Chair
Weidong Cui
16:30-
17:00
Polyglots: Crossing Origins by Crossing Formats
Jonas Magazinius (Chalmers University of Technology), Billy Rios (Google), Andrei Sabelfeld (Chalmers University of Technology)
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong (University of Strathclyde), Liqun Chen (Hewlett-Packard Laboratories), Zikai Wen (University of Strathclyde)
Düppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud
Yinqian Zhang (University of North Carolina at Chapel Hill), Michael Reiter (University of North Carolina at Chapel Hill)
INVITED TALK: Jacob Appelbaum
The New Threat Models
17:00-
17:30
Catching Click-Spam in Search Ad Networks
Vacha Dave (UC San Diego), Saikat Guha (Microsoft Research India), Yin Zhang (The University of Texas at Austin)
Privacy-Preserving Matrix Factorization
Valeria Nikolaenko (Stanford), Stratis Ioannidis (Technicolor), Udi Weinsberg (Technicolor), Marc Joye (Technicolor), Nina Taft (Technicolor), Dan Boneh (Stanford)
Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection
Brendan Dolan-Gavitt (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), Josh Hodosh (MIT Lincoln Laboratory), Wenke Lee (Georgia Institute of Technology)
17:30-
18:00
mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations
Mario Heiderich (Ruhr-Universität Bochum), Jörg Schwenk (Ruhr-Universität Bochum), Tilman Frosch (Ruhr-Universität Bochum), Jonas Magazinius (Chalmers University of Technology), Edward Z. Yang (Stanford University)
PICCO: A General-Purpose Compiler for Private Distributed Computation
Yihua Zhang (University of Notre Dame), Aaron Steele (University of Notre Dame), Marina Blanton (University of Notre Dame)
Towards Reducing the Attack Surface of Software Backdoors
Felix Schuster (Ruhr-Universität Bochum), Thorsten Holz (Ruhr-Universität Bochum)
18:00-
18:45
Award Ceremony and Announcements – Room C01
19:00-
19:30
Bus Transfer to Wasserwerk (30 minutes)
20:00-
00:00
Gala Dinner at Wasserwerk

 

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

CCS MAIN CONFERENCE, THURSDAY, 2013-11-07
TRACK A TRACK B TRACK C TUTORIALS/
INV. TALKS
Room C01 Room B05-B06 Room B09 Room B07-B08
07:30-
08:30
Breakfast – Room B01/B02
Session 8-A
Secure Outsourcing Protocols
Session 8-B
Privacy Models
Session 8-C
Be Aware & Beware
Session Chair
Bryan Parno
Session Chair
George Danezis
Session Chair
Ari Juels
08:30-
09:00
Verifiable Delegation of Computation on Outsourced Data
Michael Backes (Saarland University and Max Planck Institute for Software Systems), Dario Fiore (Max Planck Institute for Software Systems), Raphael M. Reischuk (Saarland University)
Membership Privacy: A Unifying Framework For Privacy Definitions
Ninghui Li (Purdue University), Wahbeh Qardaji (Purdue University), Dong Su (Purdue University), Yi Wu (Purdue University), Weining Yang (Purdue University)
Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education
Tamara Denning (University of Washington), Adam Lerner (University of Washington), Adam Shostack, Tadayoshi Kohno (University of Washington)
09:00-
09:30
Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki (University of California, Irvine), Charanjit Jutla (IBM T.J. Watson Research Center), Hugo Krawczyk (IBM), Marcel C. Rosu (IBM T.J. Watson), Michael Steiner (IBM Research)
Geo-Indistinguishability: Differential Privacy for Location-Based Systems
Miguel E. Andres (École Polytechnique), Nicolás E. Bordenabe (INRIA and École Polytechnique), Konstantinos Chatzikokolakis (CNRS and École Polytechnique ), Catuscia Palamidessi (INRIA and École Polytechnique)
Security Analysis of a Widely Deployed Locking System
Michael Weiner (Technische Universität München), Maurice Massar (Technische Universität Kaiserslautern), Erik Tews (Technische Universität Darmstadt), Dennis Giese (Technische Universität Darmstadt), Wolfgang Wieser (Ludwig-Maximilians-Universität München)
09:30-
10:30
KEYNOTE – Room C01
The Arms Race
Mikko Hypponen
(Chief Research Officer of F-Secure)
10:30-
11:00
Coffee Break – Room B01/B02
Session 9-A
Crypto Tools
Session 9-B
Audit & Code Randomization
Session 9-C
Mobile Privacy
Session Chair
Frederik Armknecht
Session Chair
Simha Sethumadavan
Session Chair
Lujo Bauer
11:00-
11:30
How to Keep a Secret: Leakage Deterring Public-key Cryptosystems
Aggelos Kiayias (National and Kapodistrian University of Athens and University of Connecticut), Qiang Tang (National and Kapodistrian University of Athens and University of Connecticut)
ASIST: Architectural Support for Instruction Set Randomization
Antonis Papadogiannakis (Institute of Computer Science, Foundation for Research and Technology – Hellas), Laertis Loutsis (Institute of Computer Science, Foundation for Research and Technology – Hellas), Vassilis Papaefstathiou (Institute of Computer Science, Foundation for Research and Technology – Hellas), Sotiris Ioannidis (Institute of Computer Science, Foundation for Research and Technology – Hellas)
Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources
Xiaoyong Zhou (Indiana University, Bloomington), Soteris Demetriou (University of Illinois at Urbana-Champaign), Dongjing He (University of Illinois at Urbana-Champaign), Muhammad Naveed (University of Illinois at Urbana-Champaign), Xiaorui Pan (Indiana University, Bloomington), Xiaofeng Wang (Indiana University, Bloomington), Carl Gunter (University of Illinois at Urbana-Champaign), Klara Nahrstedt (University of Illinois at Urbana-Champaign)
11:30-
12:00
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek (SAP Research), Florian Kerschbaum (SAP Research), Claudio Orlandi (Aarhus University)
librando: Transparent Code Randomization for Just-in-Time Compilers
Andrei Homescu (University of California Irvine), Stefan Brunthaler (University of California, Irvine), Per Larsen (University of California, Irvine), Michael Franz (University of California, Irvine)
Preventing Accidental Data Disclosure in Modern Operating Systems
Adwait Nadkarni (North Carolina State University), William Enck (North Carolina State University)
INVITED TALK: Felix ‘FX’ Lindner
Resistance is Not Futile – Fighting Nation-State Actors and the Borg
12:00-
12:30
Elligator: Elliptic-Curve Points Indistinguishable from Uniform Random Strings
Daniel Bernstein (University of Illinois at Chicago), Mike Hamburg (Cryptography Research), Anna Krasnova (RU Nijmegen), Tanja Lange (Technische Universiteit Eindhoven)
LogGC: Garbage Collecting Audit Log
Kyu Hyung Lee (Purdue University), Xiangyu Zhang (Purdue University), Dongyan Xu (Purdue University)
AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
Zhemin Yang (Fudan University), Min Yang (Fudan University), Yuan Zhang (Fudan University), Guofei Gu (Texas A&M University), Peng Ning (NC State University), X. Sean Wang (Fudan University)
12:30-
14:00
Lunch Break – Room B01/B02
Session 10-A
Graphics, Vision & Security
Session 10-B
Authentication
Session 10-C
Privacy Issues
Session Chair
N. Asokan
Session Chair
Srdjan Capkun
Session Chair
Nick Hopper
14:00-
14:30
Cross-Origin Pixel Stealing: Timing Attacks Using CSS Filters
Robert Kotcher (Carnegie Mellon University), Yutong Pei (Carnegie Mellon University), Pranjal Jumde (Carnegie Mellon University), Collin Jackson (Carnegie Mellon University)
Anonymous Credentials Light
Foteini Baldimtsi (Brown University), Anna Lysyanskaya (Brown University)
FPDetective: Dusting the Web for Fingerprinters
Gunes Acar (KU Leuven), Marc Juarez (Institut d’Investigació en Intel-ligència Artificial and KU Leuven), Nick Nikiforakis (KU Leuven), Claudia Diaz (KU Leuven), Seda Gurses (New York University and KU Leuven), Frank Piessens (KU Leuven), Bart Preneel (KU Leuven)
TUTORIAL 3: Lecturer:
Eric Bodden

Easily Instrumenting Android Applications for Security Purposes
14:30-
15:00
Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflections
Yi Xu (University of North Carolina at Chapel Hill), Jared Heinly (University of North Carolina at Chapel Hill), Andrew White (University of North Carolina at Chapel Hill), Jan-Michael Frahm (University of North Carolina at Chapel Hill), Fabian Monrose (University of North Carolina at Chapel Hill)
Heart-to-Heart (H2H): Authentication for Implanted Medical Devices
Masoud Rostami (ECE Dept, Rice University), Ari Juels (RSA Laboratories), Farinaz Koushanfar (Rice University)
Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy
Mathias Humbert (EPFL), Erman Ayday (EPFL), Jean-Pierre Hubaux (EPFL), Amalio Telenti (Institute of Microbiology, University Hospital and University of Lausanne)
15:00-
15:30
The Robustness of Hollow CAPTCHAs
Haichang Gao (Xidian University), Wei Wang (Xidian University), Jiao Qi (Xidian University), Xuqin Wang (Xidian University), Xiyang Liu (Xidian University), Jeff Yan (Newcastle University)
OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols
Andrew C. Yao (IIIS, Tsinghua University, Beijing, China), Yunlei Zhao (Software School, Fudan University, Shanghai, China)
Hang with Your Buddies to Resist Intersection Attacks
David Wolinsky (Yale University), Ewa Syta (Yale University), Bryan Ford (Yale University)
15:30-
16:00
Coffee Break – Room B01/B02
Session 11-A
Web and Code Security
Session 11-B
Crypto Symbolic Analysis
Session 11-C
Security/Cryptographic Utilities
Session Chair
Amir Herzberg
Session Chair
Bruno Blanchet
Session Chair
Matthew Smith
16:00-
16:30
Content-Based Isolation: Rethinking Isolation Policy Design on Client Systems
Alexander Moshchuk (Microsoft Research), Helen Wang (Microsoft Research), Yunxin Liu (Microsoft Research Asia)
Certified Computer-Aided Cryptography: Efficient Provably Secure Machine Code from High-Level Implementations
José Bacelar Almeida (HASLab, INESC TEC and Universidade do Minho), Manuel Barbosa (HASLab, INESC TEC and Universidade do Minho), Gilles Barthe (IMDEA Software Institute), François Dupressoir (IMDEA Software Institute)
Efficient Targeted Key Subset Retrieval in Fractal Hash Sequences
Kelsey Cairns (Washington State University), Thoshitha Gamage (Washington State University), Carl Hauser (Washington State University)
16:30-
17:00
Diglossia: Detecting Code Injection Attacks With Precision and Efficiency
Sooel Son (The University of Texas at Austin), Kathryn McKinley (Microsoft Research and The University of Texas at Austin), Vitaly Shmatikov (The University of Texas at Austin)
Computationally Complete Symbolic Attacker and Key Exchange
Gergei Bana (INRIA, Paris), Koji Hasebe (University of Tsukuba), Mitsuhiro Okada (Keio University)
HIFS: History Independence for File Systems
Sumeet Bajaj (Stony Brook University), Radu Sion (Stony Brook University)
17:00-
17:30
25 Million Flows Later – Large-scale Detection of DOM-based XSS
Sebastian Lekies (SAP AG), Ben Stock (Friedrich-Alexander-University Erlangen-Nuremberg), Martin Johns (SAP AG)
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe (IMDEA Software Institute), Juan Manuel Crespo (IMDEA Software Institute), Benjamin Gregoire (INRIA Sophia-Antipolis), César Kunz (IMDEA Software Institute), Yassine Lakhnech (Université de Grenoble, VERIMAG ), Benedikt Schmidt (IMDEA Software Institute), Santiago Zanella-Béguelin (Microsoft Research)
AUTOCRYPT: Enabling Homomorphic Computation On Servers To Protect Sensitive Web Content
Shruti Tople (National University of Singapore), Shweta Shinde (National University of Singapore), Prateek Saxena (National University of Singapore), Zhaofeng Chen (National University of Singapore)
17:30-
18:00
deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation
Adam Doupe (University of California, Santa Barbara), Weidong Cui (Microsoft Research), Mariusz Jakubowski (Microsoft Research), Marcus Peinado (Microsoft Research), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
Deduction Soundness: Prove One, Get Five for Free
Florian Böhl (Karlsruhe Institute of Technology), Véronique Cortier (LORIA – CNRS), Bogdan Warinschi (University of Bristol)
Protecting Sensitive Web Content from Client-side Vulnerabilities with Cryptons
Xinshu Dong (National University of Singapore), Zhaofeng Chen (Peking University), Hossein Siadati (Polytechnic Institute of New York University), Shruti Tople (National University of Singapore), Prateek Saxena (National University of Singapore), Zhenkai Liang (National University of Singapore)
18:00-
18:20
Closing Remarks – Room C01

 

Sunday | Monday | Tuesday | Wednesday | Thursday | Friday

POST-CONFERENCE WORKSHOPS, FRIDAY, 2013-11-08
CCSW DIM SPSM SEGS
Room C01 Room B05-B06 Room B09 Room B07-B08
08:30 – 18:00 08:30 – 18:00 08:30 – 18:00 08:30 – 18:00
07:30-
08:30
Breakfast & Registration – Room B01/B02
10:30-
11:00
Coffee Break – Room B01/B02
12:30-
14:00
Lunch Break – Room B01/B02
15:30-
16:00
Coffee Break – Room B01/B02