-------- Original-Nachricht --------
[Apologies if you receive multiple copies of this message]
CALL FOR PARTICIPATION
***********************************************************************
15th European Symposium on Research in Computer Security
Hotel AMARILIA, Vouliagmeni, Athens, Greece
20-22 September 2010
www.esorics2010.org
***********************************************************************
ABOUT THE CONFERENCE
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
Computer security is concerned with the protection of information in
environments where there is a possibility of intrusion or malicious
action. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing
together researchers in this area, by promoting the exchange of ideas
with system developers and by encouraging links with researchers in
related areas.
Progressively organized in a series of European countries, the
symposium is confirmed as the European research event in computer
security.
The Symposium is under the aegis of the Greek:
* Ministry of of Infrastructure, Transport and Networks
* Ministry of Economy and Finance:
General Secretariat for Information Systems
* Ministry of Interior, Decentralization and e-Government:
General Secretariat for Electronic Governance
REGISTRATION
Registration information is available at:
https://www.triaenatours.gr/esorics.php
PROGRAM
Sunday, 19 September 2010
-------------------------
18:30 - 20:00 Registration
______________________________________________________________________
Monday, 20 September 2010
-------------------------
09:00 - 10:00 Registration
10:00 - 10:30 Opening
* Welcome address
S. Katsikas, ESORICS-2010 General Chair
* Technical Program Overview
B. Preneel and D. Gritzalis, Program Committee Chairs
* Local arrangements
N. Kyrloglou and M. Theoharidou, Organizing Committee Chairs
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 1: RFID and Privacy
* Deng R., Li Y., Yung M., Zhao Y.
"A New Framework for RFID Privacy"
* Nithyanand R., Tsudik G., Uzun E.,
"Readers Behaving Badly: Reader Revocation in PKI-Based
RFID Systems"
* Androulaki E., Vo B., Bellovin S.,
"Privacy-Preserving, Taxable Bank Accounts"
* Dahl M., Delaune S., Steel G.,
"Formal Analysis of Privacy for Vehicular Mix-Zones"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 2: Software Security
* Zhang C., Wang T., Wei T., Chen Y., Zou W.,
"IntPatch: Automatically Fix Integer Overflow-to-Buffer-Overflow
Vulnerability at Compile-Time"
* Ligatti J., Reddy S.,
"A Theory of Runtime Enforcement, with Results"
* Hubert L., Jensen T., Monfort V., Pichardie D.,
"Enforcing Secure Object Initialization in Java"
* Mantel H., Sudbrock H.,
"Flexible Scheduler-Independent Security"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 3: Cryptographic Protocols
* Catrina O., de Hoogh S.,
"Secure Multiparty Linear Programming Using Fixed-Point Arithmetic"
* Almeida J.-B., Bangerter E., Barbosa M., Krenn S.,
Sadeghi A.-R., Schneider T.,
"A Certifying Compiler for Zero-Knowledge Proofs of
Knowledge based on S-Protocols"
* Liu J., Au M.-H., Susilo W., Zhou J.,
"Short Generic Transformation to Strongly Unforgeable
Signature in the Standard Model"
* Xu W., Ahn G.-J., Hu H., Zhang X., Seifert J.-P.,
"DR@FT: Efficient Remote Attestation Framework for Dynamics Systems"
20:00 - 22:00 Symposium Dinner
______________________________________________________________________
Tuesday, 21 September 2010
--------------------------
08:30 - 10:30 Session 4: Traffic Analysis
* Lu L., Chang E.-C., Chan M.-C.,
"Website Fingerprinting and Identification Using Ordered
Feature Sequences"
* Janc A., Olejnik L.,
"Web Browser History Detection as a Real-World Privacy Threat"
* Luo X., Zhang J., Perdisci R., Lee W.,
"On the Secrecy of Spread-Spectrum Flow Watermarks"
* Chakravarty S., Stavrou A., Keromytis A.,
"Traffic Analysis against Low-Latency Anonymity Networks
Using Available Bandwidth Estimation"
10:30 - 11:00 Coffee/tea
11:00 - 12:00 Invited talk
Chairperson: Gritzalis D., AUEB
* Helmbrecht U., ENISA,
"Cryptography and Privacy in Cloud Computing"
12:00 - 13:00 Session 5: End-User Security
* Xiang G., Pendleton B., Hong J., Rose C.,
"A Hierarchical Adaptive Probabilistic Approach
for Zero Hour Phish Detection"
* Bojinov H., Bursztein E., Boneh D., Boyen X.,
"Kamouflage: Loss-Resistant Password Management"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 6: Formal Analysis
* Escobar S., Meadows C., Meseguer J., Santiago S.,
"Sequential Protocol Composition in Maude-NPA"
* Dinh T.-T.-A., Ryan M.,
"Verifying Security Property of Peer-to-Peer Systems Using CSP"
* Basin D., Cremers C.,
"Modeling and Analyzing Security in the Presence of
Compromising Adversaries"
* Yasuoka H., Terauchi T.,
"On Bounding Problems of Quantitative Information Flow"
16:00 - 16:30 Coffee/tea
16:30 - 18:30 Session 7: E-voting and Broadcast
* Heiberg S., Lipmaa H., van Laenen F.,
"On E-Vote Integrity in the Case of Malicious Voter Computers"
* Kremer S., Smyth B., Ryan M.,
"Election Verifiability in Electronic Voting Protocols"
* Heather J., Ryan P., Teague V.,
"Pretty Good Democracy for more expressive voting schemes"
* Blanton M., Frikken K.,
"Efficient Multi-Dimensional Key Management in Broadcast Services"
______________________________________________________________________
Wednesday, 22 September 2010
----------------------------
08:30 - 10:30 Session 8: Authentication, Access Control,
Authorization and Attestation
* Meier J., Gollmann D.,
"Caught in the Maze of Security Standards"
* Gofman M., Luo R., Yang P.,
"User-Role Reachability Analysis of Evolving Administrative
Role Based Access Control"
* Crampton J., Huth M.,
"An Authorization Framework Resilient to Policy Evaluation Failures"
* Kupcu A., Lysyanskaya A.,
"Optimistic Fair Exchange with Multiple Arbiters"
10:30 - 11:00 Coffee/tea
11:00 - 13:00 Session 9: Anonymity and Unlinkability
* Backes M., Doychev G., Duermuth M., Koepf B.,
"Speaker Recognition in Encrypted Voice Streams"
* Pashalidis A., Schiffner S.,
"Evaluating Adversarial Partitions"
* Ardagna C., Jajodia S., Samarati P., Stavrou A.,
"Providing Mobile Users' Anonymity in Hybrid Networks"
* Tiplea F.-L., Vamanu L., Varlan C.,
"Complexity of Anonymity for Security Protocols"
13:00 - 14:00 Lunch
14:00 - 16:00 Session 10: Network Security and Economics
* Wang L., Jajodia S., Singhal A., Noel S.,
"k-Zero Day Safety: Measuring the Security Risk of
Networks against Unknown Attacks"
* Johnson B., Grossklags J., Christin N., Chuang J.,
"Are Security Experts Useful? Bayesian Nash Equilibria for Network
Security Games with Limited Information"
* Backes M., Ciobotaru O., Krohmer A.,
"RatFish: A File Sharing Protocol Provably Secure
Against Rational Users"
* Kheir N., Cuppens-Boulahia N., Cuppens F., Debar H.,
"A Comprehensive Approach for Cost-Sensitive Intrusion Response"
16:00 - 16:30 Coffee/tea
16:00 - 18:00 Session 11: Secure Update, DOS and Intrusion Detection
* Perito D., Tsudik G.,
"Secure Code Update for Embedded Devices via Proofs of
Secure Erasure"
* Kapravelos A., Polakis I., Athanasopoulos E., Ioannidis S.,
Markatos E.,
"D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks"
* Karame G., Capkun S.,
"Low-Cost Client Puzzles based on Modular Exponentiation"
* Tokhtabayev A., Skormin V., Dolgikh A.,
"Expressive, Efficient and Obfuscation Resilient Behavior Based IDS"
18:00 Farewell
MORE INFORMATION
Additional information about the conference can be found at:
www.esorics2010.org
---------------------------------------------------------------------
To unsubscribe, e-mail: computational.science-unsubscribe@lists.iccsa.org
For additional commands, e-mail: computational.science-help@lists.iccsa.org