Stacks Image 119

Programme

The number of submitted papers was 234, two papers have been withdrawn before notification time, 58 papers have been accepted for presentation. The acceptance rate of ESORICS 2014 was 24.79%.

Program of ESORICS 2014

Conference PDF printable version , Workshops PDF printable version

6.09.2014 7.09.2014 8.09.2014 9.09.2014
8:30 - 9:00 Registration Registration Registration
9:00 - 10:00 Invited talk 1
Room 10D
Invited talk 2
Room 10D
Invited talk 3
Room 10D
10:00 - 11:15
Network Security
Room 10B
Cryptography and Practice
Room 10D
Privacy Aware Computing
Room 10B
Cryptography 1
Room 10D
Code Analysis
Room 10B
Password Authentication
Room 10D
11:15 - 11:45 Coffee Break Coffee Break Coffee Break
11:45 - 13:00 Cloud Computing 1
Room 10D
Attribute Based Cryptography
Room 10B
Cryptography 2
Room 10D
E-voting and E-cash
Room 10D
13:00 - 14:30 Lunch Break Lunch Break Lunch Break
14:30 - 16:10
Mobile Devices and Hardware Security
Room 10B
Cloud Computing 2
Room 10D
Privacy Panel
Room 10B
Secure
Wireless Communication

Room 10D
Attack Detection and Defence 1
Room 10D
16:10 - 16:40 Coffee Break Coffee Break Coffee Break
16:40 - 18:20 Registration+Welcome Drink Cloud Computing 3
Room 10D
Privacy
Room 10D
Attack Detection and Defence 2
Room 10D
Evening Registration+Welcome Drink (till 8PM) Snack + time for a city walk
SC Meeting
Conference Dinner Industrial Reception


Preliminary Workshops Program of ESORICS 2014

10.09.2014 11.09.2014
 
Room 113 Room 114 Room 115
Room 115 Room 113 Room 114 Room 406
8:30 - 9:00 Registration Registration
9:00 - 10:00
SIOT Welcome STM Welcome +Invited Talk
STM Award QASA/SETOP Invited Talk BADGERS Welcome +Keynote UaESMC Welcome +Invited Talk
10:00 - 11:15
DPM Welcome and Invited Talk SIOT Invited Talk STM Session 1
STM Session 4 QASA Session 2 BADGERS Session 1 UaESMC Session 1
11:15 - 11:45 Coffee Break Coffee Break
11:45 - 13:00
DPM Session 1 SIOT Session 1 STM Session 2
STM Session 5 QASA/SETOP Session 3 BADGERS Session 2 UaESMC Session 2
13:00 - 14:30 Lunch Break Lunch Break
14:30 - 16:10
DPM Session 2 SIOT Invited Talk 2 STM Session 3
STM Session 6 QASA Invited Talk+ Session 4 (from 14:00) BADGERS Session 3 UaESMC Session 3 (from 14:00)
16:10 - 16:40 Coffee Break Coffee Break
16:40 - 18:20
DPM Session 3 SIOT Session 2 ERCIM STM Business Meeting
BADGERS Keynote + Discussion
Evening Workshops' Dinner


Details

7.09.2014

Invited Talk 1

chair: Jaideep Vaidya

Network Security

chair: Einar Snekkenes back to top

Cryptography and Practice

chair: Rober Deng back to top

Cloud Computing 1

chair: Marek Klonowski back to top

Mobile Devices and Hardware Security

chair: Shlomi Dolev back to top

Cloud Computing 2

chair: Xiaofeng Chen back to top

Cloud Computing 3

chair: Reihaneh Safavi-Naini back to top

8.09.2014

Invited Talk 2

chair: Pierangela Samarati

Privacy Aware Computing

chair: Aniket Kate back to top

Cryptography 1

chair: Jianying Zhou back to top

Attribute Based Cryptography

chair: Mark Manulis back to top

Cryptography 2

chairman: Yingjiu Li back to top

Privacy Panel

chair: Miroslaw Kutylowski
  • Wojciech Wiewiorowski, Poland's Inspector General for Personal Data Protection
  • Moti Yung, Google Inc. and Columbia University
  • Peter Schoo, Huawei
  • Joseph K. Liu, Institute for Infocomm Research, Singapore
back to top

Secure Wireless Communication

chair: Mauro Conti back to top

Privacy

chair: Jaideep Vaidya back to top

9.09.2014

Invited Talk 3

chair: Nora Cuppens

Code Analysis

chair: Frederic Cuppens back to top

Password Authentication

chair: Xun Yi back to top

E-voting and E-cash

chair: Moti Yung back to top

Attack Detection and Defence 1

chair: Elisa Bertino back to top

Attack Detection and Defence 2

chair: Angelos Stavrou back to top

Industrial Reception + Presentation

  • GPU - Powerful Tool + Significant Threats. Lessons learnt from Reverse Engineering.
    Witold Waligora, REC Global

10.09.2014

SIOT Welcome

  • Welcome
back to top

STM Session

  • STM Welcome
  • Traffic analysis countermeasures in WSN
    Javier Lopez
back to top

DPM Welcome + Invited Talk

  • Welcome
  • Is bitcoin suitable as a research topic?
    Jordi Herrera-Joancomartí
back to top

SIOT Invited Talk

  • TBA
back to top

STM Session - Verification

  • A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA
    Sonia Santiago, Santiago Escobar, Catherine Meadows and Jose Meseguer
  • Ensuring Secure Non-interference of Programs by Game Semantics
    Aleksandar S. Dimovski
back to top

DPM Session 1: Cryptographic Solutions for Privacy

  • Group Discounts Compatible with Buyer Privacy
    Josep Domingo-Ferrer, Alberto Blanco-Justicia
  • Towards an Image Encryption Scheme with Content-Based Image Retrieval Properties
    Bernardo Ferreira, Joao Rodrigues, Joao Leitao and Henrique Domingos
  • The crypto-democracy and the Trustworthy
    Sebastien Gambs, Samuel Ranellucci and Alain Tapp
back to top

SIOT Session 2

  • Access Control for Apps Running on Constrained Devices in the Internet of Things
    Andrei Mituca, Amir H. Moin and Christian Prehofer
  • Federated Identity and Access Management for the Internet of Things
    Paul Fremantle, Benjamin Aziz, Jacek Kopecky and Philip Scott
  • Lightweight Display Virtualization For Mobile Devices
    Mihai Carabas, Lucian Mogosanu, Razvan Deaconescu, Laura Gheorghe and Nicolae Tapus
back to top

STM Session 2 - Privacy and Implementation Security

  • Privacy Architectures: Reasoning About Data Minimisation and Integrity
    Thibaud Antignac and Daniel Le Métayer
  • Lime: Data Lineage in the Malicious Environment
    Michael Backes, Niklas Grimm and Aniket Kate
  • Efficient Java Code Generation of Security Protocols specified in AnB/AnBx
    Paolo Modesti
back to top

DPM Session 2 - Emerging challenges

  • Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sites
    Markus Tschersich
  • Toward Inherent Privacy Awareness in Workflows
    Maria Koukovini, Eugenia Papagiannakopoulou, Georgios Lioudakis, Nikolaos Dellas, Dimitra I. Kaklamani, Iakovos S. Venieris
  • Index Optimization for L-Diversified Database-as-a-Service
    Jens Kohler and Hannes Hartenstein
  • A-PPL: An Accountability Policy Language for Cloud Computing
    Monir Azraoui, Kaoutar Elkhiyaoui, Melek Onen , Karin Bernsmed, Anderson Santana De Oliveira and Jakub Sendor
back to top

SIOT Invited Talk

back to top

STM Session 3 - Access Control 1

  • ALPS: An Action Language for Policy Specification and Automated Safety Analysis
    Silvio Ranise and Riccardo Traverso
  • Monotonicity and Completeness in Attribute-based Access Control
    Jason Crampton and Charles Morisset
  • ROMEO: ReputatiOn Model Enhancing OpenID Simulator
    Ginés Dólera Tormo, Félix Gómez Mármol and Gregorio Martínez Pérez
  • Hybrid Enforcement of Category-Based Access Control
    Asad Ali and Maribel Fernández
back to top

DPM Session 3, Privacy-Preserving, Protocols and Applications

  • Privacy-preserving Loyalty Programs
    Alberto Blanco-Justicia and Josep Domingo-Ferrer
  • Secure Improved Cloud-Based RFID Authentication Protocol
    Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes
  • Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low Emission Zones
    Roger Jardi-Cedo, Jordi Castella-Roca and Alexandre Viejo
  • Association Rule Mining on Fragmented Database
    Amel Hamzaoui, Qutaibah Malluhi, Riley Ryan and Clifton Chris
back to top

SIOT Session 2

  • A Novel Key Generating Architecture for Wireless Low-resource Devices
    Christian T. Zenger, Markus-Julian Chur, Gerhard Wunder and Christof Paar
  • Threat-based Security Analyses for the Internet of Things
    Ahmad Atamli and Andrew Martin
  • UNCHAIN - Ubiquitous Wireless Network Communication Architecture for Ambient Intelligence and Health scenarios
    Daniel Rosner, Laura Gheorghe, Razvan Tataroiu and Razvan Tilimpea
back to top

ERCIM STM Business Meeting

back to top

11.09.2014

STM Award

  • STM award ceremony
  • Presentation by the award winner
back to top

QASA/SETOP Invited Talk

  • Assessing Data Trustworthiness - Concepts and Research Challenges,
    Elisa Bertino
back to top

BADGERS Welcome and Keynote

back to top

UaESMC Welcome and Invited Talk

  • Welcome
  • Efficient Two-Party Computations from Oblivious Transfer
    Thomas Schneider
back to top

STM Session 4 - Access Control 2

  • Caching and Auditing in the RPPM Model
    Jason Crampton and James Sellwood
  • Stateful Usage Control for Android Mobile Devices
    Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori and Andrea Saracino
back to top

QASA Session 2

  • Calculating adversarial risk from attack trees: Control strength and probabilistic attackers
    Wolter Pieters and Mohsen Davarynejad
  • Analysis of Social Engineering Threats with Attack Graphs
    Kristian Beckers, Leanid Krautsevich and Artsiom Yautsiukhin
  • Probabilistic Modeling of Humans in Security Ceremonies (Short paper)
    Cristian Prisacariu and Audun Jøsang
back to top

BADGERS Session 1

  • ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors
    Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen and Christian Platzer
  • The Vulnerability Dataset of a Large Software Ecosystem
    Dimitris Mitropoulos, Georgios Gousios, Panagiotis Papadopoulos, Vassilios Karakoidas, Panos Louridas and Diomidis Spinellis
back to top

UaESMC Session 1

  • Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC
    Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov
  • Is it possible to perform statistical analysis in a cryptographically secure manner?
    Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk
back to top

STM Session 5 - Education and Evaluation

  • A Formal Model for Soft Enforcement: Influencing the Decision-Maker
    Charles Morisset, Iryna Yevseyeva, Thomas Gross and Aad Van Moorsel
  • NoPhish - An Anti-Phishing Education App
    Gamze Canova, Melanie Volkamer, Clemens Bergmann and Roland Borza
  • Evaluation of key management schemes in wireless sensor networks
    Filip Jurnecka, Martin Stehlík and Vashek Matyas
back to top

SETOP Session 3

  • Metric for Security Activities assisted by Argumentative Logic
    Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frederic Cuppens and Fabien Autrel
  • Environment-Reactive Malware Behavior: Detection and Categorization
    Smita Naval, Vijay Laxmi, Manoj Gaur, Sachin Raja, Muttukrishnan Rajarajan and Mauro Conti
  • High-Level Simulation for Multiple Fault Injection Evaluation (QASA Short paper)
    Maxime Puys, Lionel Rivière, Thanh-Ha Le and Julien Bringer
back to top

BADGERS Session 2

  • Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned
    Iasonas Polakis, Federico Maggi, Stefano Zanero and Angelos D. Keromytis
  • Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment
    Sirikarn Pukkawanna, Youki Kadoyabashi, Gregory Blanc, Joaquin Garcia-Alfaro and Herve Debar
  • Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research
    Sebastian Abt and Harald Baier
back to top

UaESMC Session 2

  • Minimizing Information Leakage Against Selective Failures in Consistent Multi-party Computation
    Aggelos Kiayias, Yiannis Tselekounis, Bingsheng Zhang
  • Privacy Preserving Business Process Fusion
    Roberto Guanciale, Dilian Gurov
back to top

STM Session 6 - Economic Domain

  • Using Prediction Markets to Hedge Information Security Risks
    Pankaj Pandey and Einar Snekkenes
  • Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation
    Vangalur Alagar and Kaiyu Wan
  • BlueWallet: The Secure Bitcoin Wallet
    Tobias Bamert, Christian Decker, Roger Wattenhofer and Samuel Welten
back to top

QASA Invited Talk

  • Defining assurance levels for user and server authentication
    Audun Jøsang
back to top

QASA Session 4

  • Introducing Probabilities in Controller Strategies
    Jerry Den Hartog and Ilaria Matteucci
  • Automatically Calculating Quantitative Integrity Measures for Imperative Programs
    Tom Chothia, Chris Novakovic and Rajiv Ranjan Singh
  • Risk-Aware Information Disclosure
    Alessandro Armando, Michele Bezzi, Nadia Metoui and Antonino Sabetta
back to top

BADGERS Session 3

  • Collaborative Repository for Cybersecurity Data and Threat Information
    Jean Lorchat, Cristel Pelsser and Romain Fontugne
  • MATATABI: Multi-layer Threat Analysis Platform with Hadoop
    Hajime Tazaki, Kazuya Okada, Yuji Sekiya and Youki Kadobayashi
  • EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits
    Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki and Youki Kadobayashi
back to top

UaESMC Session 3 (starts at 14:00)

  • Practical Universally Verifiable Linear Programming
    Meilof Veeningen, Sebastiaan de Hoogh, Berry Schoenmakers, Niels de Vreede
  • Transformation-Based Privacy-Preserving Linear Programming
    Peeter Laud, Alisa Pankova
  • When the users don't know what to want: exploring privacy preserving technology adoption in highly uncertain conditions
    Laur Kanger, Pille Pruulmann-Vengerfeldt
back to top

BADGERS Keynote + Discussion

back to top