LISTSERV mailing list manager LISTSERV 16.5

Help for P2P Archives


P2P Archives

P2P Archives


P2P@LISTSERV.UTK.EDU


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

P2P Home

P2P Home

P2P  August 2017

P2P August 2017

Subject:

ESORICS 2017: Call for Participation

From:

Cristina Alcaraz <[log in to unmask]>

Reply-To:

Peer-to-Peer <[log in to unmask]>

Date:

Mon, 7 Aug 2017 16:28:04 +0200

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (284 lines)

 =============================================================================
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
 =============================================================================

WWW: https://www.ntnu.edu/web/esorics2017/

Overview
------------------------------------
ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.


ESORICS 2017 spans a total of 3 days, featuring:
   * 3 keynote speeches
     (Cormac Herley, Paul Syverson, Sandro Etalle)
   * 54 paper presentations in 3 days (Sep 11-13)
   * NN workshops (Sept 14 - 15)


Registration
------------------------------------
Early Registration for ESORICS+Workshops 2017 is open, but will end 
soon. Early registration deadline is ***August, 15th 2017***

Registration rates:
https://www.ntnu.edu/web/esorics2017/registration

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:[log in to unmask]

Venue page:
https://www.ntnu.edu/web/esorics2017/venue

Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation

We hope to see you in Oslo, Norway!


Presentations Program
------------------------------------
The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:

* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###########
09:30 - 10:30
* Keynote: Cormac Herley

11:00 - 12:30

* Session 1: Security of embedded things
   - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios
       Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
   - Analyzing the Capabilities of the CAN Attacker
       Sibylle Froeschle and Alexander Stühring
   - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
       André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan 
Katzenbeisser

* Session 2: Cryptographic Application I
   - Per-Session Security: Password-Based Cryptography Revisited
       Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
   - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
       Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
   - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
       Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart

14:00 - 15:30

* Session 3: Documents and Authorship
   - Identifying Multiple Authors in a Binary Program
       Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
   - Verifiable Document Redacting
       Herve Chabanne, Rodolphe Hugel and Julien Keuffer
   - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
       Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt

* Session 4: Analysis of Security Protocols
   - Automated analysis of equivalence properties for security protocols 
using else branches
        Ivan Gazeau and Steve Kremer and Levente Buttyán
   - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
       Cas Cremers, Martin Dehnel-Wild and Kevin Milner
   - Modular Verification of Protocol Equivalence in the Presence of 
Randomness
       Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
   - Preventing Advanced Persistent Threats in Complex Control Networks
       Juan E. Rubio, Cristina Alcaraz and Javier Lopez
   - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
       Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach
   - Is my attack tree correct?
       Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
   - On-Demand Time Blurring to Support Side-Channel Defense
        Weijie Liu, Debin Gao and Mike Reiter
   - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
       Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici
   - Practical Keystroke Timing Attacks in Sandboxed JavaScript
       Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard

### September 12 - Day 2 ###########
09:00 - 10:00
* Keynote: Paul Syverson

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
   - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android
       Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
   - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples
       Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
   - Adversarial Examples for Malware Detection
       Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Backes 
Michael and Patrick McDaniel Russo

* Session 8: Privacy in Systems
   - PerfWeb: How to Violate Web Privacy with Hardware Performance Events
       Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth and Berk Sunar
   - SePCAR: A Secure and Privacy-enhancing Protocol for Car Access 
Provision
       Iraklis Symeonidis, Abdelrahaman Aly, Mustafa Asan Mustafa, Bart 
Mennink, Siemen Dhooghe and Bart Preneel
   - Privacy Implications of Room Climate Data
       Philipp Morgner, Christian Müller, Matthias Ring, Björn 
Eskofier, Christian Riess, Frederik Armknecht and Zinaida Benenson

13:30 - 15:00

* Session 9: Network security
   - Link-Layer Device Type Classification on Encrypted Wireless Traffic 
with COTS Radios
       Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan and Nils Ole 
Tippenhauer
   - Preventing DNS amplification attacks using the history of DNS 
queries with SDN
       Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon 
Paul Jeong and Hyoungshick Kim
   - Zero Round-Trip Time for the Extended Access Control Protocol
       Jacqueline Brendel and Marc Fischlin

* Session 10: Controlling Access
   - No sugar but all the taste! Memory Encryption without Architectural 
Support
       Panagiotis Papadopoulos, George Christou, Giorgos Vasiliadis, 
Evangelos Markatos and Sotiris Ioannidis
   - Tree-based Cryptographic Access Control
       James Alderman, Naomi Farley and Jason Crampton
   - Securing Data Analytics on SGX With Randomization
       Swarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat 
Kantarcioglu and Bhavani Thuraisingham

15:30 - 17:00

* Session 11: Information Flow
   - We are Family: Relating Information-Flow Trackers
       Musard Balliu, Daniel Schoepe and Andrei Sabelfeld
   - A Better Composition Operator for Quantitative Information Flow 
Analyses
       Kai Engelhardt
   - WebPol: Fine-grained Information Flow Policies for Web Browsers
       Abhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg and 
Christian Hammer

* Session 12: Blockchain and social networks
   - A Traceability Analysis of Monero’s Blockchain
       Amrit Kumar, Clément Fischer, Shruti Tople and Prateek Saxena
   -RingCT 2.0: A Compact Linkable Ring Signature Based Protocol for 
Blockchain Cryptocurrency Monero
       Shi-Feng Sun, Man Ho Au, Joseph Liu and Tsz Hon Yuen
   - Secure Computation in Online Social Networks
       Foteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, 
Alessandra Scafuro and Nikos Triandopoulos


### September 13 - Day 3 ###########
09:00 - 10:00
* Keynote: Sandro Etalle

10:30 - 12:30

* Session 13: Web Security
   - DeltaPhish: Detecting Phishing Webpages in Compromised Websites
       Igino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto 
Corda, Mauro Mereu, Guido Mureddu, Davide Ariu and Fabio Roli
   - DOMPurify: Client-Side Protection against XSS and Markup Injection
       Mario Heiderich, Jörg Schwenk and Christopher Spaeth
   - Quantifying Web Adblocker Privacy
       Arthur Gervais, Alexandros Filios, Vincent Lenders and Srdjan 
Capkun

* Session 14: Cryptographic signatures
   - Reusing Nonces in Schnorr Signatures
       Marc Beunardeau, Aisling Connolly, Remi Geraud, David Naccache and 
Damien Vergnaud
   - How to Circumvent the Structure-Preserving Signatures Lower Bounds
       MEssam Ghadafi
   - Server-Supported RSA Signatures for Mobile Devices
        Ahto Buldas, Aivo Kalu, Peeter Laud and Mart Oruaas

13:30 - 15:00

* Session 15: Formal techniques
   - Inference-Proof Updating of a Weakened View under the Modification 
of Input Parameters
       Marcel Preuß and Joachim Biskup
   - Verifying Constant-Time Implementations by Abstract Interpretation
       Sandrine Blazy, David Pichardie and Alix Trieu
   - AVR Processors as a Platform for Language-Based Security
       Florian Dewald, Heiko Mantel and Alexandra Weber

* Session 16: Privacy and garbled circuits
   - Labeled Homomorphic Encryption: Scalable and Privacy-Preserving 
Processing of Outsourced Data
       Manuel Barbosa, Dario Catalano and Dario Fiore
   - New Way for Privacy-Preserving Decision Tree Evaluation
       Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao and Sherman S. M. 
Chow
   - Enforcing Input Correctness via Certification in Garbled Circuit 
Evaluation
       Yihua Zhang, Marina Blanton and Fattaneh Bayatbabolghani

15:30 - 17:00

* Session 17: Intrusion Detection
   - Secure IDS Offloading with Nested Virtualization and Deep VM 
Introspection
       Shohei Miyama and Kenichi Kourai
   - Network Intrusion Detection based on Semi-Supervised Variational 
Auto-Encoder
       Genki Osada, Kazumasa Omote and Takashi Nishide
   - LeaPS: Learning-Based Proactive Security Auditing for Clouds
       Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir 
Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi

* Session 18: Cryptographic Applications II
   - Multiple Rate Threshold FlipThem
       David Leslie, Chris Sherfield and Nigel Smart
   - Stringer: Measuring the Importance of Static Data Comparisons to 
Detect Backdoors and Undocumented Functionality
       Sam L. Thomas, Tom Chothia and Flavio D. Garcia
   - Generic Constructions for Fully Secure Revocable Attribute-Based 
Encryption
       Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro 
Hanaoka and Keisuke Tanaka

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
May 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
October 2018
September 2018
August 2018
June 2018
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
November 2016
October 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
July 2015
June 2015
April 2015
March 2015
February 2015
January 2015
September 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
January 2013
December 2012
November 2012
September 2012
August 2012
June 2012
May 2012
March 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
April 2009
January 2009
July 2008
October 2007
July 2007
June 2007
May 2007
February 2007
October 2006
July 2006
June 2006
March 2006
January 2006
September 2005
June 2005
April 2005
March 2005
February 2005
November 2004
October 2004
September 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000

ATOM RSS1 RSS2



LISTSERV.UTK.EDU

CataList Email List Search Powered by the LISTSERV Email List Manager