|
George Vari Engineering and Computing Centre (ENG), Ryerson University, 245 Church Street |
ENG105 |
ENG-LG12 |
08:00-08:45 |
Registration |
08:45-09:00 |
Opening Remarks |
|
09:00-10:00 |
Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada
Title: Get Smart: Embed Privacy, by Design to Avoid the Risk of Unintended Consequences
|
|
10:00-10:30 |
Coffee Break |
10:30-12:10 |
Security I "Business security and Security software Evaluation" Chair: Saeed Samet
- #158
"Zarathustra: Extracting WebInject Signatures from Banking Trojans"
Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi
- #120
"Quantifying the Financial Impact of IT Security Breaches on Business Processes: A CPN-based approach"
Clemens Martin, Amina Kadry, Ghada Abu-Shady
- #68
"Semi-Synthetic Data Set Generation for Security Software Evaluation"
Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg
- #121
"Towards Efficient Evaluation of XACML Policies"
Azzam Mourad, Hussein Jebbaoui
- #94
"An Integrated Memory Forensic Approach for Recovering Encryption Keys and BB10 Backup Decryption"
Halima Al Shehhi, Dua'a Abu Hamdi, Izzeddin Asaad, Farkhund Iqbal
|
Trust I "Trust models" Chair: Robin Cohen
- #129
"A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty"
Khalid Bijon, Munirul Haque, Ragib Hasan
- #21
"Validating trust models against realworld data sets"
Noel Sardana, Robin Cohen
- #75
"Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation"
Noel Sardana, Robin Cohen
- #151
"TRAAC: Trust and Risk Aware Access Control"
Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman
- #28
"A typed natural deduction calculus to reason about secure trust (Short Paper)"
Giuseppe Primiero, Franco Raimondi
|
12:10-14:00 |
Lunch (Pitman Hall Cafe) |
14:00-15:20 |
Security II "Authentication and Passwords" Chair: Marina Gavrilova
- #39
"Continuous Authentication using Micro-Messages"
Marcelo Luiz Brocardo, Issa Traore
- #91
"Improving Usability of Passphrase Authentication"
Glen Nielsen, Michael Vedel, Christian D. Jensen
- #80
"Secure VANET Applications with a refined Group Signature"
Mohammad Mamun, Atsuko Miyaji
- #22
"A Study of Mnemonic Image Passwords"
Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
|
Security III "Web Application security" Chair: Issa Traore
-
#77
"Data-Centric Phishing Detection based on Transparent Virtualization Technologies"
Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser
- #153
"Clickjuggler: Checking for Incomplete Defenses against Clickjacking"
Yusuke Takamatsu, Kenji Kono
- #99
"Identifying Users with Application-Specific Command Streamss"
Alaa El Masri, Harry Wechsler, Brent Byunghoon Kang, Peter Likarish
- #136
"Granularity Based Flow Control"
Omar Abahmane, Luigi Logrippo
|
15:20-15:50 |
Coffee Break |
15:50-17:05 |
Privacy I "Privacy for Mobile and Social Applications" Chair: Natalija Vlajic
- #142
"Can Apps Play by the COPPA rules?"
Ilaria Liccardi, Monica Bulger, Hal Abelson, Daniel J. Weitzner, Wendy Mackay
- #72
"Privacy-Preserving Mobility-Casting in Opportunistic Networks"
Gianpiero Costantino, Fabio Martinelli, Paolo Santi
- #104
"Undetectable Communication: The Online Social Networks Case"
Filipe Beato, Emiliano De Cristofaro, Kasper B. Rasmussen
- #84
"Building Privacy-preserving Location-based Apps (Short Paper)"
Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland
|
Trust II "Perceptions of trustworthiness" Chair: Steve Marsh
- #12
"Two Trust Networks in One: Using Bipolar Structures to Fuse Trust and Distrust"
Stefano Bistarelli, Francesco Santini
- #43
"Communicating and Visualising Multicriterial Trustworthiness under Uncertainty"
Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser
- #89
"What can the hashtag #trust tell us about how users conceptualise trust? (Short Paper)"
Natasha Dwyer, Stephen Marsh
- #108
"Analyzing trustworthiness of Virtual Machines in Data-Intensive Cloud Computing (Short Paper)"
Dipen Contractor, Dhiren Patel
|
18:00-21:00 |
Banquet Dinner (Atlantis) |
|
George Vari Engineering and Computing Centre (ENG), Ryerson University, 245 Church Street |
ENG105 |
ENG-LG12 |
08:00-08:50 |
Registration |
08:50-09:00 |
Opening Remarks |
|
09:00-10:00 |
Dr. Rei Safavi-Naini, AITF Strategic Chair in Information Security and Professor of Computer Science, University of Calgary, Alberta, Canada
Title: Private Communication without Computational Assumptions
|
|
10:00-10:30 |
Coffee Break |
10:30-11:30 |
Privacy II "Privacy Leaks" Chair: Joaquin Garcia-Alfaro
- #139
""You are what you play": Breaching privacy and identifying users in online gaming"
Dragana Martinovic, Victor Ralevich, Joshua Mcdougall, Michael Perklin
- #83
"Inferring Social Relationships from Technology-Level Device Connections"
Jason Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese
- #55
"MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking"
Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue
|
Privacy III "Privacy-oriented Cryptography" Chair: Saeed Samet
- #59
"A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations"
Fabian Förg, Daniel Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer
- #58
"Direct Anonymous Attestation in Practice: Implementation and Efficient Revocation"
Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang
- #47
"Using Biometric Key Commitments to Prevent Unauthorized Lending of Cryptographic Credentials"
David Bissessar, Carlisle Adams, Dong Liu
|
11:30-12:30 |
Privacy IV "Privacy-focused Data Analysis" Chair: Victor Ralevich
- #16
"Mining YouTube Metadata for Detecting Privacy Invading Harassment and Misdemeanor Videos"
Nisha Aggarwal, Swati Agarwal, Ashish Sureka
- #25
"Who Uses Bitcoin? An exploration of the Bitcoin community"
Jeremiah Bohr, Masooda Bashir
- #73
"Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences"
Anthony Morton, Angela Sasse
|
Privacy V "Privacy-Preserving Frameworks" Chair: Natalia Stakhanova
- #62
"Private Intersection of Regular Languages"
Roberto Guanciale, Dilian Gurov, Peeter Laud
- #45
"Enabling Privacy Through Transparency"
Oshani Seneviratne, Lalana Kagal
- #52
"Privacy-Respecting Digital Investigation"
Ali Dehghantanha, Katrin Franke
|
12:30-14:00 |
Lunch (Pitman Hall Cafe) |
14:00-15:20 |
Security IV "Malware and Malicious Detection" Chair: Miguel Vargas Martin
- #85
"Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware"
Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz
- #119
"P–SPADE: GPU accelerated malware packer detection"
Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Gaur and Muttukrishnan Rajarajan
- #86
"Detection and Mitigation Of Malicious JavaScript Using Information Flow Control"
Bassam Sayed, Issa Traore, Amany Abdelhalim
- #117
"Secure Exams despite Malicious Management"
Giampaolo Bella, Rosario Giustolisi and Gabriele Lenzini
|
Security V "Mobile security and Protocols security" Chair: Marijke Coetzee
- #97
"Another Free App: Does It Have the Right Intentions"
Mohamed Fazeen, Ram Dantu
- #125
"Specifying and Enforcing Constraints in Dynamic Access Control Policies"
Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam
- #74
"Design Requirements to Counter Parallel Session Attacks in Security Protocols"
Anca Jurcut, Tom Coffey, Reiner Dojen
- #29
"Automata-Based Approach to Design and Analyze Security Policies"
Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi
|
15:20-15:40 |
Coffee Break |
15:40-17:10 |
Security VI "Encryption and Secret Sharing" Chair: Natalia Stakhanova
- #50
"Efficient Verification of Data Encryption on Cloud Servers"
Keji Hu, Wensheng Zhang
- #19
"Assessing cryptographic signature schemes from a legal perspective"
Dan T.F. Chan, Lucas C.K. Hui, S.M. Yiu
- #88
"Distributed Searchable Symmetric Encryption"
Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter Hartel, Willem Jonker
- #96
"Generalization of Socio-Rational Secret Sharing with a New Utility Function (Short Paper)"
Mehrdad Nojoumian
- #27
"Crypto-Assistant: Towards Facilitating Developer’s Encryption of Sensitive Data (Short Paper)"
Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin
|
Trust III "Reputation systems" Chair: Thomas Tran
- #114
"i/k-Contact: a context-aware user authentication using physical social trust"
Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba
- #107
"Weighting Peer Reviewers"
Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi
- #135
"TRUSTcv: Reputation-based trust for collectivist digital business ecosystems (Short Paper)"
Donovan Isherwood, Marijke Coetzee
|