Monday, Sep 08, 2014
07:30-18:00
Registation for all events - R
09:00-10:30
4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense - SeCIHD I
- Invited talks
Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)
Antonio J. Jara
Feature Grouping for Intrusion Detection System based on Hierarchical Clustering
Jingping Song, Zhiliang Zhu, Chris Price
Information and Participation for Response and Recovery - RISI I
- Organizing On-Site Volunteers: An App-based Approach
Stefan Sackmann, Marlen Hofmann, Hans J. Betke- Visualization of Recovery Situation in Disaster Area By Using Web Reservation Data
Yu Ichifuji, Noboru Sonehara
Secure Software Architectures - SAW I
- Vulnerability-based Security Pattern Categorization in Search of Missing Patterns
Priya Anand, Jung Woo Ryoo, Rick Kazman- Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns
Dae-kyoo Kim, Jungwoo Ryoo, Suntae Kim- Using Assurance Cases to Develop Iteratively Security Features Using Scrum
Lotfi ben Othmane, Pelin Angin, Bharat Bhargava
10:30-11:00
Coffee Break - CB
11:00-12:30
4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense - SeCIHD II
- One-time biometrics for Online Banking and Electronic Payment Authentication
Aude Plateaux, Patrick Lacharme, Audun Josang, Christophe Rosenberger- PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions
Shinsaku Kiyomoto, Yutaka Miyake- Crypto-biometric models for information secrecy
Marek Ogiela, Lidia Ogiela, Urszula Ogiela- Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang
k-Anonymization for Information Sharing - RISI II
- A k-anonymity method based on the statistics of search engine queries, for disaster impact statements
Noboru Sonehara, Hidenobu Oguri- A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure
Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen- Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation
Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura
Software Security Analysis - SAW II
- LiSTT: An Investigation into Unsound-incomplete Yet Practical Result Yielding Static Taintflow Analysis
Marie-Laure Potet, Laurent Mounier, Sanjay Rawat- Visualization of Security Metrics for Cyber Situation Awareness
Igor Kotenko, Evgenia Novikova
12:30-14:00
Lunch - L
14:30-16:00
Best Paper Session - ARES Full I
- A New Access Control Scheme for Facebook-style Social Networks
Jun Pang, Yang Zhang- No Smurfs: Revealing Fraud Chains in Mobile Money Transfers
Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery- BitTorrent Sync: Network Investigation Methodology
Mark Scanlon, Jason Farina, M-Tahar Kechadi
16:00-16:30
Coffee Break - CB
16:30-18:00
4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense - SeCIHD III
- Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices
Vasily Desnitsky, Igor Kotenko- Towards to analyze sophisticated Attacks, with conditional probability, genetic algorithm and a crime function
Wolfgang BOEHMER- Detection of Malicious Web Pages using System Calls Sequences
Gerardo Canfora, Francesco Mercaldo, Eric Medvet, Corrado Aaron Visaggio- Risk Reduction Overview: A visualization method for risk management
Hellen Havinga, Olivier Sessink
Mobile Security & Attack Prevention - ARES Full II
- Divide-and-Conquer: Why Android Malware cannot be stopped
Dominik Maier, Tilo Müller, Mykola Protsenko- DroidForce: Enforcing Complex, Data-Centric, System-Wide Policies in Android
Siegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden- Lobotomy: An Architecture for JIT Spraying Mitigation
Martin Jauernig, Matthias Neugschwandtner, Paolo Milani-Comparetti, Christian Platzer
Resilient Networks - RISI III
- RISI Keynote: Risk-Aware Design and Management of Resilient Networks
Prof. Dr. Piotr Cholda, Department of Telecommunications, AGH University of Science and Technology, Krakow, Poland
The Keynote presents a current view on the design of networks resilient to non-malicious failures supported by risk engineering.
Tuesday, Sep 09, 2014
08:00-17:30
Registation for all events - R
09:00-10:30
Keynote I - Bart Preneel, Katholieke Universiteit Leuven, Belgium - Keynote
10:30-11:00
Coffee Break - CB
11:00-12:30
4th IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense - SeCIHD IV
- Towards a Key Consuming Detection in QKD-VoIP Systems
Guohong Zhao, Wanrong Yu, Baokang Zhao, Chunqing Wu- A Structure P2P and Semantic based Web Service Registry System
Qian He, Baokang Zhao, Yunjian Long, Jinshu Su, Ilsun You- A High-Speed Network Content Filtering System
Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu- Amplication DDoS Attacks: Emerging Threats and Defense Strategies
Clara Maria Colombini, Antonio Colella
Knowledge Management - CD-ARES I
- Argumentation-based group decision support for collectivist communities
Marijke Coetzee- A Knowledge Integration approach for Safety-Critical Software Development and Operation based on the Method Architecture
Shuichiro Yamamoto- Metrics-based incremental determinization of finite automata
Sergiu Balan, Gianfranco Lamperti, Michele Scandale
Ontologies & Integrated Devices - ARES Short I
- EM Leakage of RFID Devices - Comparison of Two Measurement Approaches
Thomas Korak, Thomas Plos- Supporting Security Automation for Multi-Chassis Link Aggregation Groups via the Interconnected-asset Ontology
Henk Birkholz, Ingo Sieverdingbeck- Concurrent Queries in Location Based Services
Emad Elabd, Mohand-Said Hacid
12:30-14:00
Lunch - L
14:00-15:30
7th International Workshop on Digital Forensics - WSDF
- Real-time screen watermarking using overlaying layer
Maciej Piec, Andreas Rauber- An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning
Martin Steinebach, Oren Halvani- Efficient Cropping-Resistant Robust Image Hashing
York Yannikos, Martin Steinebach, Huajian Liu
Secure Protocols - ARES Full III
- A Formal Model and Analysis of the MQ Telemetry Transport Protocol
Benjamin Aziz- Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices
Thomas Unterluggauer, Erich Wenger- A Model-based Security Toolkit for the Internet of Things
Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda
Software Security - CD-ARES II
- Towards Developing Secure Software using Problem-oriented Security Patterns
Azadeh Alebrahim, Maritta Heisel- Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services
Igor Kotenko , Evgenia Novikova- A review of Security Requirements Engineering methods with respect to Risk Analysis and Model-Driven Engineering
Denisse Munante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorte
15:30-16:00
Coffee Break - CB
16:00-17:30
Mobile and Social Computing - CD-ARES III
- Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a Hospital
Andreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Carsten Röcker, Martina Ziefle- Adaptive User-Centered Security
Sven Wohlgemuth- Semantic-aware Mashups for Personal Resources in SemanticLIFE and SocialLIFE
Sao-Khue VO, Amin Anjomshoaa, A Min Tjoa- Towards Interactive Visualization of Longitudinal Data to support Knowledge Discovery on Multi-Touch Tablet Computers
Andreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, Carsten Roecker, Martina Ziefle
Session I - RAMSS I
- Practical Applications of Advanced Statistical Models in Reliability Data Analysis
Vasiliy Krivtsov, Olexandr Yevkin- Stochastic Model for Medical Image Segmentation
Zeev Volkovich, Zeev Barzily, Mingyue Ding- Fast Monte Carlo simulation methods adapted to simple Petri net models
Laurent Bordes, Stéphane Collas, Maïder Estecahandy, Christian Paroissin- Monte-Carlo based reliability modelling of a gas network using graph theory approach
Pavel Praks, Vytis Kopustinskas
Trust & Availability - ARES Full IV
- Rethread: A Low-cost Transient Fault Recovery Scheme for Multithreaded Processors
Jian Fu, Qiang Yang, Raphael Poss, Chris Jesshope, Chunyuan Zhang- Visualizing Transaction Context in Trust and Reputation Systems
Johannes Sänger, Günther Pernul- Enhanced Configuration Generation Approach for Highly Available COTS Based Systems
Parsa Pourali, Maria Toeroe, Ferhat Khendek- Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website
Jeffrey Soon Fatt Choo, Kang Leng Chiew, San Nah Sze
Wednesday, Sep 10, 2014
08:00-17:00
Registation for all events - R
09:00-10:30
Keynote II - Volkmar Lotz, SAP Research, Germany - Keynote
10:30-11:00
Coffee Break - CB
11:00-12:30
2nd International Workshop on Emerging Cyberthreats and Countermeasures - ECTCM I
- The SMM Rootkit Revisited: Fun with USB
Joshua Schiffman, David Kaplan- Towards a Hardware Trojan Detection Cycle
Edgar Weippl, Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski- PhiGARo: Automatic Phishing Detection and Incident Response Framework
Jakub Cegan, Martin Husák
ARES Industrial Track - ARES-IND I
- ARES-IND Keynote Speech: Cloud Security Issues for SMEs
Gerald Quirchmayr, University of Vienna and University of South Australia
Abstract: Cloud computing is a very cost effective technology that already has a great impact on business applications, especially for small and medium size enterprises. While the technology itself comes at a very low cost for users and frees them from having to bother with the maintenance of infrastructures and software, the security aspects lead to considerable challenges. Given the requirements imposed by privacy and other legislation, many small and medium size enterprises consequently wonder whether cloud technology is really the best solution for them. This talk therefore aims at giving an overview of the most relevant technical, organizational and legal issues and points to some selected solutions for small and medium size enterprises.
Security & Privacy - ARES Short II
- What does the Fox Say? On the Security Architecture of Firefox OS.
Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar- Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings
François Lesueur , Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben Ghorbel-Talbi- Privacy Dashboards: Reconciling data-driven business models and privacy
Christian Zimmermann, Rafael Accorsi, Günter Müller- Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward
Karin Bernsmed, Daniela Soares Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære
Session II - RAMSS II
- Performance Determination for MSS Manufacturing System by Lz-transform and Stochastic Processes Approach
Ilia Frenkel, Anatoly Lisnianski, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry- On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems using Markov Approach
Lev Khvatskin, Ilia Frenkel- Semi-Markov Modelling for Multi-State Systems
Andreas Makrides, Alex Karagrigoriou, Vlad Stefan Barbu- Optimizing the availability and the operational cost of a periodically inspected multi-stage deteriorating system with condition based maintenance policies
Sonia Malefaki, Vasilis Koutras, Agapios Platis
11:30-12:30
ARES Industrial Track - ARES-IND I
- Fighting Botnets with Cyber-Security Analytics
Beatriz Gallego-Nicasio Crespo, Alan Garwood- Network Security Analysis Using Behavior History Graph
Mirko Sailio, Matti Mantere, Sami Noponen
12:30-14:00
Lunch - L
14:00-15:30
2nd International Workshop on Emerging Cyberthreats and Countermeasures - ECTCM II
- Performance Measures of Behavior-based Signatures - An Anti-malware Solution for Platforms with Limited Computing Resource
Yanzhen Qu, Kelly Hughes- Network Security Monitoring in a Small-Scale Smart-Grid Laboratory
Matti Mantere, Sami Noponen, Pia Olli, Jarno Salonen- Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services
Eduardo Feitosa, Diego Kreutz, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin
ARES Industrial Track - ARES-IND III
- ARES-IND Tutorial: Open Source Information Analysis
Gerhard Backfried, SAIL LABS Technology and Gerald Quirchmayr, University of Vienna
Abstract: This tutorial will start with an overview of issues related to open source information analysis. It will then go deeper into the Sail Labs Media Mining System and the underlying technology. After discussing the architexture and functionality and giving some examples of current applications of the system, a case study on the use of the systems application in the context of the QuOIMA project will be presented.
Session III - RAMSS III
- Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams
Jozef Kostolny, Miroslav Kvassay, Elena Zaitseva- A Comparative Study of Control Charts for Zero-Inflated Binomial Processes
Athanasios Rakitzis, Petros Maravelakis, Philippe Castagliola- Statistical Inference for Heavy-Tailed Distributions in Technical Systems
Alex Karagrigoriou, Ilia Vonta- On Sensitivity of Reliability Models to the Shape Of Life and Repair Time Distributions
Vladimir Rykov, Dmitry Efrosinin, Vladimir Vishnevskiy
Software Security & Authentication - ARES Short III
- Continuous and Non-Intrusive Reauthentication of Web Sessions based on Mouse Dynamics
Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao- Verification of Implementing Security Design Patterns Using a Test Template
Masatoshi Yoshizawa, Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa- An Incident Management Ontology
David Mundie, Samuel Perl, Ruefle Robin- AES-SEC: Improving software obfuscation through hardware-assistance
Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar Weippl
15:30-16:00
Coffee Break - CB
16:00-17:00
Keynote III - Allison Mankin, Director of Verisign Labs, Verisign, Inc., US - Keynote
Thursday, Sep 11, 2014
08:00-18:00
Registation for all events - R
09:00-10:30
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES I
- A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Stephan Neumann, Oksana Kulyk, Melanie Volkamer- Complete SIP message obfuscation: PrivaSIP over Tor
Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis- Privacy Preservation in Location-based Mobile Applications: Research Directions
Asma Patel, Esther Palomar- Challenges of Composing XACML Policies
Bernard Stepien, Amy Felty, Stan Matwin
International Workshop on Security in Air Traffic Management and other Critical Infrastructures - SecATM I
- EMFASE - An Experimental Framework for Security Design and Economic Trade-Off
Fabio Massacci, Federica Paci, Bjornar Solhaug, Alessandra Tedeschi- The Social Acceptance of the Passivation of Misused Aircraft
Ana P. G. Martins- Mathematical Modelling in Air Traffic Management Security
Denis Kolev, Evgeniy Morozov- A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies
Alessandro Pollini, Alessandra Tedeschi, Fabio Massacci, Woohyun Shim
International Workshop on Security of Mobile Applications I - IWSMA I
- A Trust Management based Security Mechanism against Collusion Attacks in a MANET Environment
Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara EL Fatmi- A Resource-optimized Approach to Efficient Early Detection of Mobile Malware
Jelena Milosevic, Andreas Dittrich, Miroslaw Malek, Alberto Ferrante- An Improved Role-based Access to Android Applications with JCHR
Stefano Bistarelli, Gianpiero Costantino, Fabio Martinelli, Francesco Santini
10:30-11:00
Coffee Break - CB
11:00-12:30
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES II
- EmailCloak: A Practical and Flexible Approach to Improve Email Privacy
Italo Dacosta, Andreas Put, Bart De Decker- Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements
Christian Sillaber, Ruth Breu- Evaluating the effectiveness of ISO 27001:2013 based on Annex A
Bahareh Shojaie, Hannes Federrath, Iman Saberi- A Proposal for an Unified Identity Card for Use in an Academic Federation Environment
Felipe Coral Sasso, Jean Everson Martina, Ricardo Alexandre Reinaldo de Moraes
International Workshop on Security in Air Traffic Management and other Critical Infrastructures - SecATM II
- Design-in security for air traffic control
Martin Hawley, Karol Gotz, John Hird, Chris Machin- Learn to SWIM
Matias Krempel , Martin Gilje Jaatun- Security Situation Management
Rainer Koelle
International Workshop on Security of Mobile Applications II - IWSMA II
- Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform
Adam Pomothy, Jakub Breier
11:30-12:30
International Workshop on Security of Mobile Applications III - IWSMA III
- Panel Discussion: Future Topics in Mobile Security
12:30-13:30
Lunch - L
13:00-18:00
(ISC)2 SecureFribourg - Seminar
- (ISC)2 SecureFribourg (free for ARES delegates)
What do we really know about our Security Position?
Leave a reply