The 9th International Conference on Availability, Reliability and Security (ARES 2014 )

     
    September 8, 2014
    07:30 - 18:00

    R : Registation for all events

     
    September 8, 2014
    10:30 - 11:00

    CB : Coffee Break

     
    September 8, 2014
    12:30 - 14:00

    L : Lunch

     
    September 8, 2014
    14:30 - 16:00

    ARES Full I : Best Paper Session

  • A New Access Control Scheme for Facebook-style Social Networks
    Jun Pang, Yang Zhang

  • No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
    Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery

  • BitTorrent Sync: Network Investigation Methodology
    Mark Scanlon, Jason Farina, M-Tahar Kechadi

  •  
    September 8, 2014
    16:00 - 16:30

    CB : Coffee Break

     
    September 8, 2014
    16:30 - 18:00

    ARES Full II : Mobile Security & Attack Prevention

  • Divide-and-Conquer: Why Android Malware cannot be stopped
    Dominik Maier, Tilo Müller, Mykola Protsenko

  • DroidForce: Enforcing Complex, Data-Centric, System-Wide Policies in Android
    Siegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden

  • Lobotomy: An Architecture for JIT Spraying Mitigation
    Martin Jauernig, Matthias Neugschwandtner, Paolo Milani-Comparetti, Christian Platzer

  •  
    September 9, 2014
    08:00 - 17:30

    R : Registation for all events

     
    September 9, 2014
    09:00 - 10:30

    Keynote : Keynote I - Bart Preneel, Katholieke Universiteit Leuven, Belgium

     
    September 9, 2014
    10:30 - 11:00

    CB : Coffee Break

     
    September 9, 2014
    11:00 - 12:30

    ARES Short I : Ontologies & Integrated Devices

  • EM Leakage of RFID Devices - Comparison of Two Measurement Approaches
    Thomas Korak, Thomas Plos

  • Supporting Security Automation for Multi-Chassis Link Aggregation Groups via the Interconnected-asset Ontology
    Henk Birkholz, Ingo Sieverdingbeck

  • Concurrent Queries in Location Based Services
    Emad Elabd, Mohand-Said Hacid

  •  
    September 9, 2014
    12:30 - 14:00

    L : Lunch

     
    September 9, 2014
    14:00 - 15:30

    ARES Full III : Secure Protocols

  • A Formal Model and Analysis of the MQ Telemetry Transport Protocol
    Benjamin Aziz

  • Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices
    Thomas Unterluggauer, Erich Wenger

  • A Model-based Security Toolkit for the Internet of Things
    Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda

  •  
    September 9, 2014
    15:30 - 16:00

    CB : Coffee Break

     
    September 9, 2014
    16:00 - 17:30

    ARES Full IV : Trust & Availability

  • Rethread: A Low-cost Transient Fault Recovery Scheme for Multithreaded Processors
    Jian Fu, Qiang Yang, Raphael Poss, Chris Jesshope, Chunyuan Zhang

  • Visualizing Transaction Context in Trust and Reputation Systems
    Johannes Sänger, Günther Pernul

  • Enhanced Configuration Generation Approach for Highly Available COTS Based Systems
    Parsa Pourali, Maria Toeroe, Ferhat Khendek

  • Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website
    Jeffrey Soon Fatt Choo, Kang Leng Chiew, San Nah Sze

  •  
    September 10, 2014
    08:00 - 17:00

    R : Registation for all events

     
    September 10, 2014
    09:00 - 10:30

    Keynote : Keynote II - Volkmar Lotz, SAP Research, Germany

     
    September 10, 2014
    10:30 - 11:00

    CB : Coffee Break

     
    September 10, 2014
    11:00 - 12:30

    ARES Short II : Security & Privacy

  • What does the Fox Say? On the Security Architecture of Firefox OS.
    Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar

  • Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings
    François Lesueur , Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben Ghorbel-Talbi

  • Privacy Dashboards: Reconciling data-driven business models and privacy
    Christian Zimmermann, Rafael Accorsi, Günter Müller

  • Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward
    Karin Bernsmed, Daniela Soares Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære

  •  
    September 10, 2014
    12:30 - 14:00

    L : Lunch

     
    September 10, 2014
    14:00 - 15:30

    ARES Short III : Software Security & Authentication

  • Continuous and Non-Intrusive Reauthentication of Web Sessions based on Mouse Dynamics
    Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao

  • Verification of Implementing Security Design Patterns Using a Test Template
    Masatoshi Yoshizawa, Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa

  • An Incident Management Ontology
    David Mundie, Samuel Perl, Ruefle Robin

  • AES-SEC: Improving software obfuscation through hardware-assistance
    Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar Weippl

  •  
    September 10, 2014
    15:30 - 16:00

    CB : Coffee Break

     
    September 10, 2014
    16:00 - 17:00

    Keynote : Keynote III - Allison Mankin, Director of Verisign Labs, Verisign, Inc., US

     
    September 11, 2014
    08:00 - 18:00

    R : Registation for all events

     
    September 11, 2014
    10:30 - 11:00

    CB : Coffee Break

     
    September 11, 2014
    12:30 - 13:30

    L : Lunch

     
    September 11, 2014
    13:00 - 18:00

    Seminar : (ISC)2 SecureFribourg

  • (ISC)2 SecureFribourg (free for ARES delegates)
    What do we really know about our Security Position?