Program



All the technical sessions will be in School of Management (Moore Annex: Room 1 -- building 12 in the map)

Wednesday, June 20, 2012

13:00 Registration

14:00-14:30 Welcome

14:30-15:30 Keynote speaker 1
Prof Dieter Gollmann (TU Hamburg-Harburg), Veracity, Plausibility, and Reputation

15:30-16:00 Coffee break

16:00-17:15 Session: PROTOCOLS 

  • Yet Another Fallen Hash-Based RFID Authentication Protocol (30 min)
    Julio C. Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi
  • HTTP Botnet Detection using Adaptive Learning Rate Multilayer Feed-forward Neural Network (20 min)
    G.Kirubavathi Venkatesh and R.Anitha Nadarajan
  • How to Break EAP-MD5 (20 min)
    Fanbao Liu and Tao Xie

18:00 BBQ (Founders Building: Crosslands)


Thursday, June 21, 2012

 9:30-10:30 Keynote speaker 2
Paul Kearney (BT), Towards a C2I Platform for Combating the Cyber-threat

10:30-11:00 Coffee break

11:00-12:00 Session: MOBILE SECURITY

  • Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices (30 min)
    Johann Groszschaedl, Dan Page and Stefan Tillich
  • Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android (30 min) 
    Daniel Schreckling, Joachim Posegga, Johannes Kostler and Matthias Schaff

12:00-12:15 Break

12:15-13:15 Session: POLICY AND ACCESS CONTROL

  • HiPoLDS: A Security Policy Language for Distributed Systems (30 min)
    Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira and Yves Roudier
  • ROAC: A Role-Oriented Access Control Model (30 min)
    Nezar Nassr (Student) and Eric Steegmans

13:15-14:30 Lunch

14:30-15:30 Session: MULTI-PARTY COMPUTATION

  • Optimal Parameters For Efficient Two-Party Computation Protocols (30 min)
    Chaya Ganesh and C. Pandu Rangan
  • Assisting Server for Secure Multi-Party Computation (30 min) 
    Jens-Matthias Bohli, Jan Seedorf and Wenting Li

15:30-16:00 Coffee break

16:00-17:00 Session: CRYPTOGRAPHY

  • An Efficient Lattice-based Secret Sharing Construction (20 min)
    Rachid El Bansarkhani and Mohamed Meziani
  • On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems (20 min)
    Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Jean-Luc Danger and Ali Maalaoui
  • Impossible Differential Cryptanalysis of Reduced-Round LBlock (20 min)
    Ferhat Karakoc, Huseyin Demirci and A. Emre Harmanci 

18:30 Drinks Reception (Founders Building: Picture Gallery)

19:00 Dinner (Founders Building: Picture Gallery/Boardroom)


Friday, June 22, 2012

 9:30-10:30 Keynote speaker 3
Frank Piessens (KL Leuven), Recent Developments in Low-Level Software Security
(a common work with Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef)

10:30-11:00 Coffee break

11:00-12:20 Session: PRIVACY

  • Privacy Preserving Social Network Publication on Bipartite Graphs (30 min)
    Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang
  • Privacy Bubbles: User-centered Privacy Control for Mobile Content Sharing Applications (30 min)
    Delphine Christin, Pablo Sanchez Lopez, Andreas Reinhardt, Matthias Hollick and Michaela Kauer
  • Privacy Preservation of User History Graph (20 min) 
    Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake

12:30 Closing Remarks

Accepted papers



**** SHORT PAPERS:

Fanbao Liu and Tao Xie. How to Break EAP-MD5

Shinsaku Kiyomoto, Kazuhide Fukushima and Yutaka Miyake. Privacy Preservation of User History Graph

Ferhat Karakoç, Hüseyin Demirci and A. Emre Harmanci. Impossible Differential Cryptanalysis of Reduced-Round LBlock

Rachid El Bansarkhani and Mohamed Meziani. An Efficient Lattice-based Secret Sharing Construction

Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maaloui and Jean-Luc Danger. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

G.Kirubavathi Venkatesh and R.Anitha Nadarajan. HTTP Botnet Detection using Adaptive Learning Rate Multilayer Feed-forward Neural Network

**** FULL PAPERS:

Jian Zhou, Jiwu Jing, Ji Xiang and Lei Wang. Privacy Preserving Social Network Publication on Bipartite Graphs

Chaya Ganesh and C. Pandu Rangan. Optimal Parameters For Efficient Two-Party Computation Protocols

Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick and Michaela Kauer. Privacy Bubbles: User-centered Privacy Control for Mobile Content Sharing Applications

Nezar Nassr (Student) and Eric Steegmans. ROAC: A Role-Oriented Access Control Model

Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira and Yves Roudier. CSPL: A Security Policy Language for Distributed Systems

Julio C. Hernandez-Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri and Majid Naderi. Yet Another Fallen Hash-Based RFID Authentication Protocol

Jens-Matthias Bohli, Jan Seedorf and Wenting Li. Assisting Server for Secure Multi-Party Computation

Johann Groszschaedl and Dan Page. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

Daniel Schreckling, Johannes Köstler, Matthias Schaff and Joachim Posegga. Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android