<html>
  <head>
    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <h1
id="call-for-participation-esorics-2016-21st-european-symposium-on-research-in-computer-security-heraklion-crete---september-26-30-2016">Call
      for Participation: STM 2016 </h1>
    <div id="intro">
      <div id="pageHeader"> <span id="logo" style="left: 27px; top:
          15px;"></span>
        <div id="title">
          <h1><font size="+1"><span>12th International Workshop on
                Security and Trust Management</span><span><br>
                Heraklion, Crete, Greece - September 26-27, 2016</span></font><a
              href="http://stm2016.ics.forth.gr/"><br>
            </a></h1>
          <a href="http://stm2016.ics.forth.gr/">http://stm2016.ics.forth.gr/</a><br>
          <br>
          <hr size="2" width="100%"><br>
          You are warmly invited to participate in the 12th
          International Workshop on Security and Trust Management (STM
          2016).<br>
          <br>
          STM (Security and Trust Management) is a working group of
          ERCIM (European Research Consortium <br>
          <div id="document"> in Informatics and Mathematics). STM 2016
            is the eleventh workshop in this series and will be held <br>
            in Heraklion, Crete, Greece, on September 26-27, in
            conjunction with the 21st European Symposium <br>
            On Research in Computer Security (ESORICS 2016). <br>
            <h1 id="registration"><font size="+3">Registration</font></h1>
            <p>STM 2016 is co-located with the annual European research
              event in Computer Security (ESORICS)<br>
              Registration information is available at: <br>
              <a
                href="http://www.ics.forth.gr/esorics2016/registration.html">http://www.ics.forth.gr/esorics2016/registration.html
              </a><br>
              <br>
            </p>
            <p>We're looking forward to seeing you on Crete!</p>
            <h1>Program<br>
            </h1>
            <h3><font size="+2">Monday, September 26, 2016</font></h3>
            <dt class="program-entry"><b>8.45 - 9.00 Welcome and opening</b></dt>
            <b> </b><dt class="program-entry"><b>9.00 - 10.30 Session
                1: Invited talk (Chair: </b><b><em>Gilles Barthe</em></b><b>)</b></dt>
          </div>
          <p><i>Bogdan Warinschi, University of Bristol</i><br>
            Foundations of Hardware-based Attested Computation and
            Applications of SGX</p>
          <div id="document"> <b>10.30 - 11.00 Coffee Break </b><dt
              class="program-entry"><b>11.00 - 12.30 Session 2: Embedded
                Systems</b></dt>
            <dt class="program-entry"><br>
            </dt>
            <dt class="program-entry">Towards a Personal Security Device
            </dt>
            <dd class="program-subentry-first">
              <div class="authors"><i>Christof Rath, Thomas Niedermair
                  and Thomas Zefferer</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">Retrofitting mutual authentication
                to GSM using RAND hijacking</div>
              <div class="authors"><i>Mohammed Shafiul Alam Khan and
                  Chris J Mitchell</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">DAPA: Degradation-Aware Privacy
                Analysis of Android Apps</div>
              <div class="authors"><i>Gianluca Barbon, Enrico
                  Steffinlongo, Agostino Cortesi and Pietro Ferrara<br>
                  <br>
                </i></div>
            </dd>
            <dt class="program-entry"><b>12.30 - 14.00 Lunch Break</b></dt>
            <b> </b><dt class="program-entry"><b>14.00 - 15.30 Session
                3: Access Control</b></dt>
            <dd class="program-subentry-first">
              <div class="papertitle">Access Control Enforcement for
                Selective Disclosure of Linked Data</div>
              <div class="authors"><i>Tarek Sayah, Emmanuel Coquery,
                  Romuald Thion and Mohand-Said Hacid</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">History-based Usage Control Policy
                Enforcement</div>
              <div class="authors"><i>Fabio Martinelli, Ilaria
                  Matteucci, Paolo Mori and Andrea Saracino</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">Access Control for Weakly
                Consistent Replicated Information Systems</div>
              <div class="authors"><i>Mathias Weber, Annette Bieniusa
                  and Arnd Poetzsch-Heffter<br>
                  <b><br>
                  </b></i></div>
              <b> </b></dd>
            <b> </b><dt class="program-entry"><b>15.30 - 16.00 Coffee
                Break</b></dt>
            <b> </b><dt class="program-entry"><b>16.00 - 17.00 Session
                4: PhD award talk</b></dt>
            <dd class="program-subentry-first">
              <div class="authors"><i>Alexandra Dmitrienko, ETH</i></div>
              <div class="papertitle">Advances in Smartphone Security:
                Attacks, Defenses and Applications</div>
            </dd>
            <h3>-------------<br>
            </h3>
            <h3><font size="+2">Tuesday, September 27, 2016</font></h3>
            <dt class="program-entry"><b>9.00 - 10.30 Session 5: Privacy</b></dt>
            <dt class="program-entry"><br>
            </dt>
            <dt class="program-entry">Privacy-Aware Trust Negotiation<i><br>
                Ruben Rios, Carmen Fernandez-Gago and Javier Lopez</i> </dt>
            <dd class="program-subentry-first">
              <div class="papertitle">Securely derived identity
                credentials on smart phones via self-enrolment</div>
              <div class="authors"><i>Brinda Hampiholi, Fabian Van Den
                  Broek and Bart Jacobs</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">Distributed immutabilization of
                secure logs</div>
              <div class="authors"><i>Jordi Cucurull and Jordi Puiggali</i><br>
              </div>
            </dd>
            <dt><br>
            </dt>
            <b> </b><dt class="program-entry"><b>10.30 - 11.00 Coffee
                Break</b></dt>
            <b> </b><dt class="program-entry"><b>11.00 - 12.30 Session
                6: Analysis</b></dt>
            <dd class="program-subentry-first">
              <div class="papertitle">A Stochastic Framework for
                Quantitative Analysis of Attack-Defense Trees</div>
              <div class="authors"><i>Ravi Jhawar, Karim Lounis and
                  Sjouke Mauw</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">Information Security as Strategic
                (In)effectivity</div>
              <div class="authors"><i>Wojtek Jamroga and Masoud
                  Tabatabaei</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">Analysing the Efficacy of Security
                Policies in Cyber-Physical Socio-Technical Systems</div>
              <div class="authors"><i>Samir Ouchani, Gabriele Lenzini
                  and Sjouke Mauw</i><br>
                <br>
              </div>
            </dd>
            <dt class="program-entry"><b>12.30 - 14.00 Lunch Break</b></dt>
            <b> </b><dt class="program-entry"><b>14.00 - 15.30 Session
                7: Web and System Security</b></dt>
            <dd class="program-subentry-first">
              <div class="papertitle">Formal Analysis of Vulnerabilities
                of Web Applications Based on SQL Injection</div>
              <div class="authors"><i>Federico De Meo, Marco Rocchetto
                  and Luca Vigan</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">MalloryWorker: Stealthy
                Computation and Covert Channels using Web Workers</div>
              <div class="authors"><i>Michael Rushanan, David Russell
                  and Aviel Rubin</i></div>
            </dd>
            <dd class="program-subentry-first">
              <div class="papertitle">PSHAPE: Automatically Combining
                Gadgets for Arbitrary Method Execution</div>
              <div class="authors"><i>Andreas Follner, Alexandre Bartel,
                  Hui Peng, Yu-Chen Chang, Kyriakos Ispoglou, Mathias
                  Payer and Eric Bodden</i></div>
            </dd>
          </div>
        </div>
      </div>
    </div>
  </body>
</html>