[PET] ESORICS 2016: Call for Participation

Manolis Stamatogiannakis manolis.stamatogiannakis at vu.nl
Mon Aug 29 20:33:01 BST 2016

  Call for Participation: ESORICS 2016
  21st European Symposium on Research in Computer Security
  Heraklion, Crete - September 26-30, 2016


  * WWW: http://bit.ly/esorics2016 / http://www.ics.forth.gr/esorics2016/
  * Twitter: @sharcs_project <https://twitter.com/sharcs_project>,
    Hashtag: #esorics2016 <https://twitter.com/hashtag/esorics2016>


    About the Conference

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities. The 21st European Symposium on 
Research in Computer Security (ESORICS 2016) will be held near 
Heraklion, on the island of Crete, Greece.

ESORICS 2016 spans a total of 5 days, featuring:

  * 3 keynote speeches (Adrian Perrig, Steve Bellovin, Panos Papadimitratos)
  * 60 paper presentations in 3 days (Sep 28-30)
  * 5 co-located workshops (Sep 26-27)


Registration information is available at:
http://bit.ly/esorics2016-reg / 

ESORICS offers very low student registration rates, starting as low as 

In addition to the affiliated workshops, ESORICS shares its venue with 
WISTP 2016 <http://www.wistp.org/> which will be held on Sep 26-28. Both 
students and non-students can benefit from a discounted combined 
registration for the two conferences. See our website for more information.

We're looking forward to seeing you on Crete!

    Presentations Program

The 60 papers of ESORICS 2016 are distributed between *20 sessions* in 
*two parallel tracks*. Following is the list of paper presentations for 
the main ESORICS conference. For the workshop programs, please consult 
their corresponding websites:

  * DPM 2016: http://dpm2016.di.unimi.it/
  * STM 2016: http//stm2016.ics.forth.gr/ <http://stm2016.ics.forth.gr/>
  * QASA 2016: http://www.iit.cnr.it/qasa2016/
  * CyberICPS: http://www.ds.unipi.gr/cybericps2016/
  * SIoT 2016: http://siot-workshop.org/

      September 28 - Day 1

        09:30 - 10:30

  * *Keynote:* Adrian Perrig

        11:00 - 12:30

  * *Session 1: Network and Web Security*
      o *Understanding Cross-Channel Abuse with SMS-Spam Support
        Infrastructure Attribution*
        Bharat Srinivasan, Payas Gupta, Manos Antonakakis and Mustaque
      o *Toward an Efficient Website Fingerprinting Defense*
        Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz and Matthew
      o *Proactive Verification of Security Compliance for Clouds
        through Pre-Computation: Application to OpenStack*
        Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir
        Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi
  * *Session 2: Authentication*
      o *Comparing Password Ranking Algorithms on Real-world Password
        Weining Yang, Ninghui Li, Ian Molloy, Youngja Park and Suresh Chari
      o *Scalable Two-factor Authentication using Historical Data*
        Aldar C-F. Chan, Jianying Zhou, Jun Wen Wong and Joseph C. M. Teo
      o *On the Implications of Zipf's Law in Passwords*
        Ding Wang and Ping Wang

        14:00 - 15:30

  * *Session 3: Encrypted Search*
      o *PPOPM: More Efficient Privacy Preserving Outsourced Pattern
        Jun Zhou, Zhenfu Cao and Xiaolei Dong
      o *An Efficient Non-Interactive Multi-client Searchable Encryption
        with Support for Boolean Queries*
        Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld and Tsz
        Hon Yuen
      o *Efficient Encrypted Keyword Search for Multi-User Data Sharing*
        Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang and
        Bing Wang
  * *Session 4: Detection and Monitoring*
      o *Membrane: A posteriori detection of malicious code loading by
        memory paging analysis*
        Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi and
        Levente Buttyán
      o *Mobile Application Impersonation Detection Using Dynamic User
        Interface Extraction*
        Luka Malisa, Kari Kostiainen, Srdjan Capkun and Michael Och
      o *A Machine Learning Approach for Detecting Third-Party Trackers
        on the Web*
        Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu and Guanxing Wen

        16:00 - 17:30

  * *Session 5: Cryptography for Cloud Computing I*
      o *Privately Outsourcing Exponentiation to a Single Server:
        Cryptanalysis and Optimal Constructions*
        Céline Chevalier, Fabien Laguillaumie and Damien Vergnaud
      o *Attribute-based Signatures for supporting Anonymous Certification*
        Nesrine Kaaniche and Maryline Laurent
      o *Privacy Preserving Computation in Cloud Using Noise-Free Fully
        Homomorphic Encryption (FHE) Schemes*
        Yongge Wang and Qutaibah Malluhi
  * *Session 6: Operating Systems Security I*
      o *Intentio Ex Machina: Android Intent Access Control via an
        Extensible Application Hook*
        Carter Yagemann and Wenliang Du
      o *Hey, You, Get Off of My Image: Detecting Data Residue in
        Android Images*
        Xiao Zhang, Yousra Aafer, Kailiang Ying and Wenliang Du
      o *AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves*
        Nico Weichbrodt, Anil Kurmus, Peter Pietzuch and Rüdiger Kapitza

      September 29 - Day 2

        09:00 - 10:00

  * *Keynote:* Steve Bellovin

        10:30 - 12:00

  * *Session 7: Information Flow*
      o *Spot the Difference: Secure Multi-Execution and Multiple Facets*
        Nataliia Bielova and Tamara Rezk
      o *On Reductions from Multi-Domain Noninterference to the
        Two-level Case*
        Oliver Woizekowski and Ron van der Meyden
      o *Flexible Manipulation of Labeled Values for Information-Flow
        Control Libraries*
        Marco Vassena, Pablo Buiras, Lucas Waye and Alejandro Russo
  * *Session 8: Attacks*
      o *The Beauty or The Beast? Attacking Rate Limits of the Xen
        Johanna Ullrich and Edgar Weippl
      o *Autocomplete Injection Attack*
        Nethanel Gelernter and Amir Herzberg
      o *Breaking Into the KeyStore: A Practical Forgery Attack Against
        Android KeyStore*
        Mohamed Sabt and Jacques Traoré

        13:30 - 15:00

  * *Session 9: Cryptography for Cloud Computing II*
      o *Lightweight Delegatable Proofs of Storage*
        Jia Xu, Anjia Yang, Jianying Zhou and Duncan Wong
      o *Anonymous RAM*
        Michael Backes, Amir Herzberg, Aniket Kate and Ivan Pryvalov
      o *Efficient Sanitizable Signatures without Random Oracles*
        Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow and Dominique
  * *Session 10: Leakage Management and Obfuscation*
      o *Towards Efficient Evaluation of a Time-Driven Cache Attack on
        Modern Processors*
        Andreas Zankl, Katja Miller, Johann Heyszl and Georg Sigl
      o *More Practical and Secure History-Independent Hash Tables*
        Michael Goodrich, Evgenios Kornaropoulos, Michael Mitzenmacher
        and Roberto Tamassia
      o *On Manufacturing Resilient Opaque Constructs Against Static
        Brendan Sheridan and Micah Sherr

        15:30 - 17:00

  * *Session 11: Secure Multiparty Computation*
      o *Robust Password-Protected Secret Sharing*
        Michel Abdalla, Mario Cornejo, Anca Nitulescu and David Pointcheval
      o *Compiling Low Depth Circuits for Practical Secure Computation*
        Niklas Buescher, Andreas Holzer, Alina Weber and Stefan
      o *Secure Computation of MIPS Machine Code*
        Xiao Wang, S. Dov Gordon, Allen McIntosh and Jonathan Katz
  * *Session 12: Operating Systems Security II*
      o *NaClDroid: Native Code Isolation for Android Applications*
        Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios
        Portokalidis and Angelos Keromytis
      o *Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on
        Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu and Wenjie Wang
      o *Android Permission Recommendation Using Transitive Bayesian
        Inference Model*
        Bahman Rashidi, Carol Fung, Anh Nguyen and Tam Vu

        17:30 - 18:30

  * *Session 13: Secure Logging*
      o *Insynd: Improved Privacy-Preserving Transparency Logging*
        Roel Peeters and Tobias Pulls
      o *Secure Logging Schemes and Certificate Transparency*
        Benjamin Dowling, Felix Günther, Udyani Herath and Douglas Stebila
  * *Session 14: Economics of Security*
      o *Banishing Misaligned Incentives for Validating Reports in
        Bug-Bounty Platforms*
        Aron Laszka, Mingyi Zhao and Jens Grossklags
      o *Efficient Numerical Frameworks for Multi-Objective Cyber
        Security Planning*
        Mhr Khouzani, Pasquale Malacaria, Chris Hankin, Andrew Fielder
        and Fabrizio Smeraldi

      September 30 - Day 3

        09:00 - 10:00

  * *Keynote:* Panos Papadimitratos

        10:30 - 12:30

  * *Session 15: E-voting and E-commerce*
      o *On Bitcoin Security in the Presence of Broken Cryptographic
        Ilias Giechaskiel, Cas Cremers and Kasper B. Rasmussen
      o *DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities*
        Siamak Shahandashti and Feng Hao
      o *When are Three voters are enough for privacy properties?*
        Myrto Arapinis, Véronique Cortier and Steve Kremer
      o *Efficient Zero-Knowledge Contingent Payments in
        Cryptocurrencies Without Scripts*
        Wac?aw Banasik, Stefan Dziembowski and Daniel Malinowski
  * *Session 16: Security of the Internet of Things*
      o *LeiA: A Lightweight Authentication Protocol for CAN*
        Andreea-Ina Radu and Flavio D. Garcia
      o *Privacy, Discovery, and Authentication for the Internet of Things*
        David J. Wu, Ankur Taly, Asim Shankar and Dan Boneh
      o *Secure Code Updates for Mesh Networked Commodity Low-End
        Embedded Devices*
        Florian Kohnhäuser and Stefan Katzenbeisser
      o *Authenticated Key Agreement mediated by a Proxy Re-encryptor
        for the Internet of Things*
        Kim Thuat Nguyen, Nouha Oualha and Maryline Laurent

        14:00 - 15:30

  * *Session 17: Data Privacy*
      o *Information Control by Policy-Based Relational Weakening
        Joachim Biskup and Marcel Preuß
      o *Quantifying Location Privacy Leakage from Transaction Prices*
        Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders
        and Srdjan Capkun
      o *A Formal Treatment of Privacy in Video Data*
        Tobias Nilges, Joern Mueller-Quade and Valerie Fetzer
  * *Session 18: Security of Cyber-physical systems*
      o *On Attacker Models and Profiles for Cyber-Physical Systems*
        Marco Rocchetto and Nils Ole Tippenhauer
      o *Towards the Automated Verification of Cyber-Physical Security
        Protocols: Bounding the Number of Timed Intruders*
        Vivek Nigam, Carolyn Talcott and Abraão Aires Urquiza
      o *Safeguarding Structural Controllability in Cyber-Physical
        Control Systems*
        Cristina Alcaraz and Javier Lopez

        16:00 - 17:30

  * *Session 19: Software Security*
      o *Let's Face It: Faceted Values for Taint Tracking*
        Daniel Schoepe, Musard Balliu, Frank Piessens and Andrei Sabelfeld
      o *IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic
        Spandan Veggalam, Sanjay Rawat, Istvan Haller and Herbert Bos
      o *Automated Multi-Architectural Discovery of CFI-Resistant Code
        Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin
        Kollenda and Thorsten Holz
  * *Session 20: Attribute-based cryptography*
      o *Traceable CP-ABE with Short Ciphertexts: How to Catch People
        Selling Decryption Devices on eBay Efficiently*
        Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong and Jie Chen
      o *Server-Aided Revocable Attribute-Based Encryption*
        Hui Cui, Robert H. Deng, Yingjiu Li and Baodong Qin
      o *Online/Offline Public-Index Predicate Encryption for
        Fine-Grained Mobile Access Control*
        Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin and Kaitai Liang

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20160829/0f6a11c4/attachment.html>

More information about the PET mailing list