[PET] ESORICS 2016: Call for Participation

Manolis Stamatogiannakis manolis.stamatogiannakis at vu.nl
Tue Jul 26 15:10:23 BST 2016

Call for Participation: ESORICS 2016
21st European Symposium on Research in Computer Security
Heraklion, Crete -- September 26-30, 2016

WWW: http://bit.ly/esorics2016 / http://www.ics.forth.gr/esorics2016/
Twitter: @sharcs_project, Hashtag: #esorics2016

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
The 21st European Symposium on Research in Computer Security (ESORICS
2016) will be held near Heraklion, on the island of Crete, Greece.

ESORICS 2016 spans a total of 5 days, featuring:
     * 3 keynote speeches
     * 60 paper presentations in 3 days (Sep 28-30)
     * 5 co-located workshops (Sep 26-27)

Registration information is available at: http://bit.ly/esorics2016-reg

ESORICS offers very low student registration rates, starting as low
as 200EUR.

In addition to the affiliated workshops, ESORICS shares its venue
with WISTP 2016 (http://www.wistp.org/) which will be held on Sep
26-28. Both students and non-students can benefit from a discounted
combined registration for the two conferences. See our website for
more information.

We're looking forward to seeing you on Crete!

Presentations Program
The 60 papers of ESORICS 2016 are distributed between **20 sessions**
in **two parallel tracks**.
Following is the list of paper presentations for the main ESORICS
conference. For the workshop programs, please consult their
corresponding websites:

* DPM 2016: http://dpm2016.di.unimi.it/
* STM 2016: http://stm2016.ics.forth.gr/
* QASA 2016: http://www.iit.cnr.it/qasa2016/
* CyberICPS: http://www.ds.unipi.gr/cybericps2016/
* SIoT 2016: http://siot-workshop.org/

### September 28 - Day 1 ###########
11:00 - 12:30
* Session 1: Network and Web Security
     - Understanding Cross-Channel Abuse with SMS-Spam Support 
Infrastructure Attribution
         Bharat Srinivasan, Payas Gupta, Manos Antonakakis and Mustaque 
     - Toward an Efficient Website Fingerprinting Defense
         Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz and Matthew 
     - Proactive Verification of Security Compliance for Clouds through 
Pre-Computation: Application to OpenStack
         Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir 
Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi
* Session 2: Authentication
     - Comparing Password Ranking Algorithms on Real-world Password Datasets
         Weining Yang, Ninghui Li, Ian Molloy, Youngja Park and Suresh Chari
     - Scalable Two-factor Authentication using Historical Data
         Aldar C-F. Chan, Jianying Zhou, Jun Wen Wong and Joseph C. M. Teo
     - On the Implications of Zipf's Law in Passwords
         Ding Wang and Ping Wang

14:00 - 15:30
* Session 3: Encrypted Search
     - PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching
         Jun Zhou, Zhenfu Cao and Xiaolei Dong
     - An Efficient Non-Interactive Multi-client Searchable Encryption 
with Support for Boolean Queries
         Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld and Tsz 
Hon Yuen
     - Efficient Encrypted Keyword Search for Multi-User Data Sharing
         Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang and 
Bing Wang
* Session 4: Detection and Monitoring
     - Membrane: A posteriori detection of malicious code loading by 
memory paging analysis
         Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi and 
Levente Buttyán
     - Mobile Application Impersonation Detection Using Dynamic User 
Interface Extraction
         Luka Malisa, Kari Kostiainen, Srdjan Capkun and Michael Och
     - A Machine Learning Approach for Detecting Third-Party Trackers on 
the Web
         Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu and Guanxing Wen

16:00 - 17:30
* Session 5: Cryptography for Cloud Computing I
     - Privately Outsourcing Exponentiation to a Single Server: 
Cryptanalysis and Optimal Constructions
         Céline Chevalier, Fabien Laguillaumie and Damien Vergnaud
     - Attribute-based Signatures for supporting Anonymous Certification
         Nesrine Kaaniche and Maryline Laurent
     - Privacy Preserving Computation in Cloud Using Noise-Free Fully 
Homomorphic Encryption (FHE) Schemes
         Yongge Wang and Qutaibah Malluhi
* Session 6: Operating Systems Security I
     - Intentio Ex Machina: Android Intent Access Control via an 
Extensible Application Hook
         Carter Yagemann and Wenliang Du
     - Hey, You, Get Off of My Image: Detecting Data Residue in Android 
         Xiao Zhang, Yousra Aafer, Kailiang Ying and Wenliang Du
     - AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves
         Nico Weichbrodt, Anil Kurmus, Peter Pietzuch and Rüdiger Kapitza

### September 29 - Day 2 ###########
10:30 - 12:00
* Session 7: Information Flow
     - Spot the Difference: Secure Multi-Execution and Multiple Facets
         Nataliia Bielova and Tamara Rezk
     - On Reductions from Multi-Domain Noninterference to the Two-level Case
         Oliver Woizekowski and Ron van der Meyden
     - Flexible Manipulation of Labeled Values for Information-Flow 
Control Libraries
         Marco Vassena, Pablo Buiras, Lucas Waye and Alejandro Russo
* Session 8: Attacks
     - The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor
         Johanna Ullrich and Edgar Weippl
     - Autocomplete Injection Attack
         Nethanel Gelernter and Amir Herzberg
     - Breaking Into the KeyStore: A Practical Forgery Attack Against 
Android KeyStore
         Mohamed Sabt and Jacques Traoré

13:30 - 15:00
* Session 9: Cryptography for Cloud Computing II
     - Lightweight Delegatable Proofs of Storage
         Jia Xu, Anjia Yang, Jianying Zhou and Duncan Wong
     - Anonymous RAM
         Michael Backes, Amir Herzberg, Aniket Kate and Ivan Pryvalov
     - Efficient Sanitizable Signatures without Random Oracles
         Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow and Dominique 
* Session 10: Leakage Management and Obfuscation
     - Towards Efficient Evaluation of a Time-Driven Cache Attack on 
Modern Processors
         Andreas Zankl, Katja Miller, Johann Heyszl and Georg Sigl
     - More Practical and Secure History-Independent Hash Tables
         Michael Goodrich, Evgenios Kornaropoulos, Michael Mitzenmacher 
and Roberto Tamassia
     - On Manufacturing Resilient Opaque Constructs Against Static Analysis
         Brendan Sheridan and Micah Sherr

15:30 - 17:00
* Session 11: Secure Multiparty Computation
     - Robust Password-Protected Secret Sharing
         Michel Abdalla, Mario Cornejo, Anca Nitulescu and David Pointcheval
     - Compiling Low Depth Circuits for Practical Secure Computation
         Niklas Buescher, Andreas Holzer, Alina Weber and Stefan 
     - Secure Computation of MIPS Machine Code
         Xiao Wang, S. Dov Gordon, Allen McIntosh and Jonathan Katz
* Session 12: Operating Systems Security II
     - NaClDroid: Native Code Isolation for Android Applications
         Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios 
Portokalidis and Angelos Keromytis
     - Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on 
         Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu and Wenjie Wang
     - Android Permission Recommendation Using Transitive Bayesian 
Inference Model
         Bahman Rashidi, Carol Fung, Anh Nguyen and Tam Vu

17:30 - 18:30
* Session 13: Secure Logging
     - Insynd: Improved Privacy-Preserving Transparency Logging
         Roel Peeters and Tobias Pulls
     - Secure Logging Schemes and Certificate Transparency
         Benjamin Dowling, Felix Günther, Udyani Herath and Douglas Stebila
* Session 14: Economics of Security
     - Banishing Misaligned Incentives for Validating Reports in 
Bug-Bounty Platforms
         Aron Laszka, Mingyi Zhao and Jens Grossklags
     - Efficient Numerical Frameworks for Multi-Objective Cyber Security 
         Mhr Khouzani, Pasquale Malacaria, Chris Hankin, Andrew Fielder 
and Fabrizio Smeraldi

### September 30 - Day 3 ###########
10:30 - 12:30
* Session 15: E-voting and E-commerce
     - On Bitcoin Security in the Presence of Broken Cryptographic 
         Ilias Giechaskiel, Cas Cremers and Kasper B. Rasmussen
     - DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
         Siamak Shahandashti and Feng Hao
     - When are Three voters are enough for privacy properties?
         Myrto Arapinis, Véronique Cortier and Steve Kremer
     - Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies 
Without Scripts
         Wacław Banasik, Stefan Dziembowski and Daniel Malinowski
* Session 16: Security of the Internet of Things
     - LeiA: A Lightweight Authentication Protocol for CAN
         Andreea-Ina Radu and Flavio D. Garcia
     - Privacy, Discovery, and Authentication for the Internet of Things
         David J. Wu, Ankur Taly, Asim Shankar and Dan Boneh
     - Secure Code Updates for Mesh Networked Commodity Low-End Embedded 
         Florian Kohnhäuser and Stefan Katzenbeisser
     - Authenticated Key Agreement mediated by a Proxy Re-encryptor for 
the Internet of Things
         Kim Thuat Nguyen, Nouha Oualha and Maryline Laurent

14:00 - 15:30
* Session 17: Data Privacy
     - Information Control by Policy-Based Relational Weakening Templates
         Joachim Biskup and Marcel Preuß
     - Quantifying Location Privacy Leakage from Transaction Prices
         Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders 
and Srdjan Capkun
     - A Formal Treatment of Privacy in Video Data
         Tobias Nilges, Joern Mueller-Quade and Valerie Fetzer
* Session 18: Security of Cyber-physical systems
     - On Attacker Models and Profiles for Cyber-Physical Systems
         Marco Rocchetto and Nils Ole Tippenhauer
     - Towards the Automated Verification of Cyber-Physical Security 
Protocols: Bounding the Number of Timed Intruders
         Vivek Nigam, Carolyn Talcott and Abraão Aires Urquiza
     - Safeguarding Structural Controllability in Cyber-Physical Control 
         Cristina Alcaraz and Javier Lopez

16:00 - 17:30
* Session 19: Software Security
     - Let's Face It: Faceted Values for Taint Tracking
         Daniel Schoepe, Musard Balliu, Frank Piessens and Andrei Sabelfeld
     - IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming
         Spandan Veggalam, Sanjay Rawat, Istvan Haller and Herbert Bos
     - Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets
         Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin 
Kollenda and Thorsten Holz
* Session 20: Attribute-based cryptography
     - Traceable CP-ABE with Short Ciphertexts: How to Catch People 
Selling Decryption Devices on eBay Efficiently
         Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong and Jie Chen
     - Server-Aided Revocable Attribute-Based Encryption
         Hui Cui, Robert H. Deng, Yingjiu Li and Baodong Qin
     - Online/Offline Public-Index Predicate Encryption for Fine-Grained 
Mobile Access Control
         Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin and Kaitai Liang

More information about the PET mailing list