The ESORICS 2013 programme is outlined below. (Click here for short PDF version, or here for long PDF version.)

8th September19:00- 21:00Welcome drinks and early registration
9th September08:30- 09:30Registration
09:30- 10:00Opening remarks
10:00- 11:00Invited talk: Adrian Perrig (ETH)
11:00- 11:30Coffee break
11:30- 13:00Session 1a: Measurement and EvaluationSession 1b: Cryptography and Computation
13:00- 14:00Lunch
14:00- 15:30Session 2a: Code AnalysisSession 2b: Applications of Cryptography
15:30- 16:00Coffee break
16:00- 17:30Session 3: Network Security
19:00- 20:00Pre-dinner drinks
20:00- 23:00Conference dinner
10th September08:30- 09:00Registration
09:00- 11:00Session 4: Formal Methods and Models
11:00- 11:30Coffee break
11:30- 13:00Session 5a: Privacy Enhancing Models and TechnologiesSession 5b: Protocol Analysis
13:00- 14:00Lunch
14:00- 15:30Session 6a: Malware DetectionSession 6b: E-voting and Privacy
15:30- 16:00Coffee break
16:00- 17:30Panel: Privacy in Cyberspace – Rights, Wrongs and Research
19:00- 20:00Drinks
20:00- 23:00Barbecue
11th September08:30- 09:30Registration
09:30- 10:30Invited talk: Steven Murdoch (Cambridge University)
10:30- 11:00Coffee break
11:00- 13:00Session 7a: AttacksSession 7b: Access Control
13:00- 14:00Lunch
14:00- 16:00Session 8: Language-based Protection
16:00- 16:30Closing remarks

Room Allocations

(All locations in Windsor Building unless stated)

Main ConferenceSunMonTuesWeds
Welcome Drinks/ RegistrationFoyer
Common/ A threadAuditoriumAuditoriumAuditorium
B thread1-02/1-031-02/1-031-02/1-03
Video Stream from A (and display/ breakout room)0-02/0-030-02/0-030-02/0-03
Video Stream from B (and breakout room)0-050-050-05
Banquet and pre-drinksFounders Building Picture Gallery
BBQ and pre-drinksFounders Building Crosslands Quad
Session 1a: Measurement and Evaluation
  • Benjamin Lerner, Liam Elberty, Neal Poole and Shriram Krishnamurthi. Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
  • Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang. A Quantitative Evaluation of Privilege Separation in Web Browser Designs
  • Youngja Park, Christopher Gates and Stephen Gates. Estimating Asset Sensitivity by Profiling Users
Session 1b: Cryptography and Computation
  • Ivan Damgaard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel Smart. Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
  • Jan Camenisch, Robert R. Enderlein and Victor Shoup. Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn
  • Michael Backes, Dario Fiore and Esfandiar Mohammadi. Privacy-Preserving Accountable Computation
Session 2a: Code Analysis
  • Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant and Dawn Song. HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism
  • Jonathan Crussell, Clint Gibler and Hao Chen. Scalable Semantics-Based Detection of Similar Android Applications
  • Zhui Deng, Xiangyu Zhang and Dongyan Xu. BISTRO: Binary Component Extraction and Embedding for Software Security Applications
Session 2b: Applications of Cryptography
  • Giorgia Azzurra Marson and Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators
  • Jun Furukawa. Request-Based Comparable Encryption
  • Lei Wei and Mike Reiter. Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
Session 3: Network Security
  • Amir Herzberg and Haya Shulman. Vulnerable Delegation of DNS Resolution
  • Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan. Formal Approach for Route Agility Against Persistent Attackers
  • Yossi Gilad and Amir Herzberg. Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Session 4: Formal Models and Methods
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags and Rainer Böhme. Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats
  • Martin Gagne, Pascal Lafourcade and Yassine Lakhnech. Automated Security Proofs for Almost-Universal Hash for MAC verification
  • Max Kanovich, Tajana Ban Kirigin, Vivek Nigam and Andre Scedrov. Bounded Memory Protocols and Progressing Collaborative Systems
  • Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
Session 5a: Privacy-Enhancing Models and Technologies
  • Arjan Jeckmans, Andreas Peter and Pieter Hartel. Efficient Privacy-Enhanced Familiarity-Based Recommender System
  • Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe and Reginald L. Lagendijk. Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation
  • Mishari Almishari, Paolo Gasti, Ekin Oguz and Gene Tsudik. Privacy-Preserving Matching of Community-Contributed Content
Session 5b: Protocol Analysis
  • Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Marson, Arno Mittelbach and Cristina Onete. A Cryptographic Analysis of OPACITY
  • Bruno Conchinha, David Basin and Carlos Caleiro. Symbolic Probabilistic Analysis of Off-line Guessing
  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering and Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Session 6a: Malware Detection
  • Hugo Daniel Macedo and Tayssir Touili. Mining malware specifications through static reachability analysis
  • Jun Dai, Xiaoyan Sun and Peng Liu. Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
  • Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li and Manos Antonakakis. Measuring and Detecting Malware Downloads in Live Network Traffic
Session 6b: E-Voting and Privacy
  • Ben Smyth and David Bernhard. Ballot secrecy and ballot independence coincide
  • Edouard Cuvelier, Olivier Pereira and Thomas Peters. Election Verifiability or Ballot Privacy: Do We Need to Choose?
  • Naipeng Dong, Hugo Jonker and Jun Pang. Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Session 7a: Attacks
  • Dvir Schirman, Yossef Oren and Avishai Wool. Range Extension Attacks on Contactless Smart Cards
  • Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas and Angelos Keromytis. CellFlood: Attacking Tor Onion Routers on the Cheap
  • Mathias Humbert, Théophile Studer, Matthias Grossglauser and Jean-Pierre Hubaux. Nowhere to Hide: Navigating around Privacy in Online Social Networks
  • Shane Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu and Wenyuan Xu. Current Events: Identifying Webpages by Tapping the Electrical Outlet
Session 7b: Access Control
  • Andreas Griesmayer and Charles Morisset. Automated Certification of Authorisation Policy Resistance
  • Jin Li, Xiaofeng Chen, Jianfeng Ma and Wenjing Lou. Fine-Grained Access Control System based on Outsourced Attribute-based Encryption
  • Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing. Purpose Restrictions on Information Use
  • Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality
Session 8: Language-Based Protection
  • Deian Stefan, Pablo Buiras, Edward Yang, Amit Levy, David Terei, Alejandro Russo and David Mazieres. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
  • Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena and Dawn Song. Data-confined HTML5 Applications
  • Jinpeng Wei, Feng Zhu and Calton Pu. KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
  • Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake. Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)

Workshop Programme (Outline)

(Note: for detailed workshop schedules please refer to the workshop web-sites.)

There will be welcome drinks for ESORICS Workshop delegates in Windsor Building Foyer between 19.00 – 21.00 on Wednesday September 11th.  Delegates will be able to collect their badges/packs from the Windsor Building Foyer during this time, as an alternative to the “rush” on Thursday morning.

Thursday September 12th 2013Friday September 13th 2013
Windsor Seminar Rooms (X = 1-8)Windsor Seminar Rooms (X = 1-8)
08:00 – 09:00Registration
09:00 – 09:30General Welcome (Main Auditorium)Registration
09:30 – 10:30Session W1X *Session W5X
10:30 – 11:00Tea/Coffee BreakTea/Coffee Break
11:00 – 13:00Session W2XSession W6X
13:00 – 14:15Lunch (Windsor Foyer)Lunch (Windsor Foyer)
14:15 – 15:45Session W3XSession W7X
15:45 – 16:15Tea/Coffee BreakTea/Coffee Break
16:15 – 17:45Session W4XSession W8X
19:00 – 20:00Pre dinner Drinks
20:00 – 23:00Workshops Dinner

* Session W1X for QASA/SETOP/DPM has a joint guest speaker (Steven Murdoch) and will be in the auditorium

Room Allocations

(All locations in Windsor Building unless stated)

Common/ welcomeAuditorium
Trustworthy Clouds1-051-05
Display/ breakout room0-020-02
Banquet and pre-drinksFounders Building
Picture Gallery