CALL FOR PARTICIPATION ****************************************************************************** 20th European Symposium on Research in Computer Security (ESORICS 2015) Vienna, Austria -- September 23-25, 2015 http://www.esorics2015.sba-research.org ******************************************************************************
** Early bird registration: August 31, 2015 ** ABOUT THE CONFERENCE ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been hosted in several European countries, attracting a wide international audience from both the academic and industrial communities. The 20th European Symposium on Research in Computer Security (ESORICS 2015) will be held in Vienna, Austria. The ESORICS 2015 conference is organized as a 5-day event featuring: - two keynote speeches - 59 scientific paper presentation in 3 days! (Sept 23-25) - 7 co-located workshops! (Sept 21-22) - 3 social events REGISTRATION Registration information is available at: http://esorics2015.sba-research.org/venue/registration/ Early registration fees apply until August 31, 2015. HOTEL & FlIGHT As Austrian Airlines is our Official Carrier for ESORICS 2015 you get a 15% discount on all applicable fares. Our special flight offer as well as the online hotel booking form can be found here: http://esorics2015.sba-research.org/venue/. We recommend to book your hotel as soon as possible, as September is a quite busy time in Vienna. PhD CONSORTIUM A PhD Consortium will take place in conjunction with ESORICS 2015, to be held on September 25, 2015. Send your contribution for the ESORICS 2015 PhD Consortium to Edgar Weippl [email protected] and Yvonne Poul [email protected] by August 28, 2015. If you are accepted to present in the PhD Consortium, you will have the opportunity to attend the full ESORICS Symposium from September 23 ñ 25, 2015 for free! More information: http://esorics2015.sba-research.org/call-for-papers/call-for-phd-presentations/ PROGRAM Wednesday, September 23, 2015 -------------------------- 09:00-10:00 Keynote Session Richard Clayton, University of Cambridge, UK 10:00-10:30 Coffee Break 10:30-12:00 Session 1A: Network & Web Security Haya Shulman and Michael Waidner. DNS-Scopy: Towards Security of Internet Naming Infrastructure Joerg Schwenk, Mario Heiderich and Marcus Niemietz. Waiting for CSP ó Securing Legacy Web Applications with JSAgents Daniel Fett, Ralf Kuesters and Guido Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web 10:30-12:00 Session 1B: Cryptography I Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness for Interactive Primitives Fabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky and Krzysztof Pietrzak. Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings Gildas Avoine, Xavier Carpent and CÈdric Lauradoux. Interleaving Cryptanalytic Time-memory Trade-offs on Non-Uniform Distributions 12:00-13:30 Lunch 13:30-15:00 Session 2A: System Security Ping Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao and Peng Liu. A Practical Approach for Adaptive Data Structure Layout Randomization Hind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam and Patrik Ekdahl. Trustworthy prevention of code injection in Linux on embedded devices Daniel Gruss, David Bidner and Stefan Mangard. Practical Memory Deduplication Attacks in Sandboxed Javascript 13:30-15:00 Session 2B: Cryptography II Kazuhiko Minematsu. Efficient Message Authentication Codes with Combinatorial Group Testing Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum and Jia Yu. A Symmetric-Key Based Proofs of Retrievability Supporting Public Verification Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose-Luis Torre-Arce. DTLS-HIMMO: Achieving DTLS certificate security with symmetric key overhead 15:00-15:30 Coffee Break 15:30-17:00 Session 3A: Risk Analysis Aron Laszka and Jens Grossklags. Should Cyber-Insurance Providers Invest in Software Security? Jan Tobias Muehlberg, Job Noorman and Frank Piessens. Lightweight and Flexible Trust Assessment Modules for the Internet of Things Paul Beaumont, Neil Evans, Michael Huth and Tom Plant. Confidence analysis for nuclear arms control: SMT abstractions of Bayesian Belief Networks 15:30-17:00 Session 3B: Cryptography III Tibor Jager, Jˆrg Schwenk and Juraj Somorovsky. Small Subgroup Attacks on TLS-ECDH Aggelos Kiayias and Qiang Tang. Making any Identity Based Encryption Accountable, Efficiently Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth and Christophe Petit. Short Accountable Ring Signatures Based on DDH 17:00-22:00 Welcome Reception Thursday, September 24 -------------------------- 09:00-10:00 Keynote Session Sushil Jajodia, George Mason University Fairfax, US 10:00-10:30 Coffee Break 10:30-12:00 Session 4A: Privacy I Christof Torres, Hugo Jonker and Sjouke Mauw. FP-Block : usable web privacy by controlling browser fingerprinting Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang and Zhou Li. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections Xingliang Yuan, Helei Cui, Xinyu Wang and Cong Wang. Enabling Privacy-assured Similarity Retrieval over Millions of Encrypted Records 10:30-12:00 Session 4B: Signatures Christian Hanser, Max Rabkin and Dominique Schrˆder. Verifiably Encrypted Signatures: Security Revisited and a New Construction Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu and Zuoxia Yu. Updatable Hash Proof System and Its Applications Baodong Qin, Robert Deng, Yingjiu Li and Shengli Liu. Server-Aided Revocable Identity-Based Encryption 12:00-13:30 Lunch 13:30-15:00 Session 5A: Privacy II Yao Zheng, Bing Wang, Wenjing Lou and Y. Thomas Hou. Privacy-Preserving Link Prediction in Decentralized Online Social Networks Florian Kerschbaum and Hoon Wei Lim. Privacy-Preserving Observation in Public Spaces Qiang Tang and Jun Wang. Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions 13:30-15:00 Session 5B: Applied Security I Behnaz Hassanshahi, Yaoqi Jia, Roland Yap, Prateek Saxena and Zhenkai Liang. Web-to-Application Injection Attacks on Android: Characterization and Detection Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes. Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks Christian Decker, James Guthrie, Jochen Seidel and Roger Wattenhofer. Making Bitcoin Exchanges Transparent 15:00-15:30 Coffee Break 15:30-17:30 Session 6A: Cloud Security Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel C. Rosu and Michael Steiner. Rich Queries on Encrypted Data: Beyond Exact Matches Yanjiang Yang, Joseph Liu, Alexander Liang, Raymond Choo and Jianying Zhou. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption Liang Feng Zhang and Reihaneh Safavi-Naini. Batch Verifiable Computation of Polynomials on Outsourced Data Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du and Zhibo Wang. CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud 15:30-17:30 Session 6B: Protocols & Attribute-based encryption Omar Almousa, Sebastian A. Mˆdersheim, Paolo Modesti and Luca ViganÚ. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment RÈmy ChrÈtien, Veronique Cortier and Stephanie Delaune. Checking trace equivalence: How to get rid of nonces? Tran Viet Xuan Phuong, Guomin Yang and Willy Susilo. Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud 18:00-23:00 Conference Dinner Friday, September 25 -------------------------- 09:00-10:30 Session 7A: Code Analysis & Side-Channels Yueqian Zhang, Xiapu Luo and Haoyang Yin. DexHunter: Toward Extracting Hidden Code from Packed Android Applications Hong Hu, Zheng Leong Chua, Zhenkai Liang and Prateek Saxena. Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang and Luning Xia. vBox: Proactively Establishing Secure Channels between Wireless Devices without Prior Knowledge 09:00-10:30 Session 7B: Crypto Applications & Attacks Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi and Stefano Sanfilippo. Challenging the Trustworthyness of PGP: Is the Web-of-Trust Tear-proof? Heiko Mantel and Artem Starostin. Transforming Out Timing Leaks, More or Less Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Rong Fu and Xinjun Xie. Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards 10:30-11:00 Coffee Break 11:00-12:30 Session 8A: Authentication I Swee-Won Lo, Zhuo Wei, Robert Deng and Xuhua Ding. On Security of Content-based Video Stream Authentication Marina Blanton and Siddharth Saraph. Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification Xun Yi, Feng Hao, Liqun Chen and Joseph Liu. Practical Threshold Password-Authenticated Secret Sharing Protocol 11:00-12:30 Session 8B: Policies Donald Ray and Jay Ligatti. A Theory of Gray Security Policies Ximeng Li, Flemming Nielson and Hanne Riis Nielson. Factorization of Behavioral Integrity Kristopher Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey Foster and Michael Clarkson. Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution 12:30-14:00 Lunch 14:00-15:30 Session 9A: Authentication II Jingyu Hua, Shaoyong Du and Sheng Zhong. Towards Attack-Resistant Peer-Assisted Indoor Localization Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright and Shannon Scielzo. Leveraging Real-Life Facts to Make Random Passwords More Memorable Ding Wang and Ping Wang. The Emperorís New Password Creation Policies 14:00-15:30 Session 9B: Detection & Monitoring Sufatrio, Tong-Wei Chua, Darell J. J. Tan and Vrizlynn L. L. Thing. Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments Maximilian Seitzer, Michael Gruhn and Tilo M¸ller. A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Chris Gates and Ninghui Li. Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users 15:30-15:45 Coffee Break 15:45-17:15 Session 10: Applied Security II Dibya Mukhopadhyay, Maliheh Shirvanian and Nitesh Saxena. All Your Voices Are Belong to Us: Stealing Voices to Fool Humans and Machines Tobias Pulls and Roel Peeters. Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure LÈa Samarji, Nora Cuppens-Boulahia, FrÈdÈric Cuppens, Serge Papillon, WaÎl Kanoun and Samuel Dubus. On the Fly Design and Co-simulation of Responses against Simultaneous Attacks MORE INFORMATION Additional information about the conference can be found at: http://esorics2015.sba-research.org/ ---- [[ Petri Nets World: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/ ]] [[ Mailing list FAQ: ]] [[ http://www.informatik.uni-hamburg.de/TGI/PetriNets/pnml/faq.html ]] [[ Post messages/summary of replies: ]] [[ [email protected] ]]
