test programme page

The ESORICS 2013 programme is outlined below. (Click here for short PDF version, or here for long PDF version.)

8th September 19:00- 23:00 Welcome drinks
9th September 08:30- 09:30 Registration
09:30- 10:00 Opening remarks
10:00- 11:00 Invited talk: Adrian Perrig (ETH)
11:00- 11:30 Coffee break
11:30- 13:00 Session 1a: Measurement and Evaluation Session 1b: Cryptography and Computation
13:00- 14:00 Lunch
14:00- 15:30 Session 2a: Code Analysis Session 2b: Applications of Cryptography
15:30- 16:00 Coffee break
16:00- 17:30 Session 3: Network Security
19:00- 20:00 Pre-dinner drinks
20:00- 23:00 Conference dinner
10th September 08:30- 09:00 Registration
09:00- 11:00 Session 4: Formal Methods and Models
11:00- 11:30 Coffee break
11:30- 13:00 Session 5a: Privacy Enhancing Models and Technologies Session 5b: Protocol Analysis
13:00- 14:00 Lunch
14:00- 15:30 Session 6a: Malware Detection Session 6b: E-voting and Privacy
15:30- 16:00 Coffee break
16:00- 17:30 Panel: Privacy in Cyberspace – Rights, Wrongs and Research
19:00- 20:00 Drinks
20:00- 23:00 Barbecue
11th September 08:30- 09:30 Registration
09:30- 10:30 Invited talk: Steven Murdoch (Cambridge University)
10:30- 11:00 Coffee break
11:00- 13:00 Session 7a: Attacks Session 7b: Access Control
13:00- 14:00 Lunch
14:00- 16:00 Session 8: Language-based Protection
16:00- 16:30 Closing remarks

Room Allocations

(All locations in Windsor Building unless stated)

Main Conference Sun Mon Tues Weds
Welcome Drinks/ Registration Foyer
Common/ A thread Auditorium Auditorium Auditorium
B thread 1-02/1-03 1-02/1-03 1-02/1-03
Video Stream from A (and display/ breakout room) 0-02/0-03 0-02/0-03 0-02/0-03
Video Stream from B (and breakout room) 0-05 0-05 0-05
Banquet and pre-drinks Founders Building Picture Gallery
BBQ and pre-drinks Founders Building Crosslands Quad
Session 1a: Measurement and Evaluation
  • Benjamin Lerner, Liam Elberty, Neal Poole and Shriram Krishnamurthi. Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
  • Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang. A Quantitative Evaluation of Privilege Separation in Web Browser Designs
  • Youngja Park, Christopher Gates and Stephen Gates. Estimating Asset Sensitivity by Profiling Users
Session 1b: Cryptography and Computation
  • Ivan Damgaard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel Smart. Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
  • Jan Camenisch, Robert R. Enderlein and Victor Shoup. Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn
  • Michael Backes, Dario Fiore and Esfandiar Mohammadi. Privacy-Preserving Accountable Computation Privacy Theory Models and Methods
Session 2a: Code Analysis
  • Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant and Dawn Song. HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism
  • Jonathan Crussell, Clint Gibler and Hao Chen. Scalable Semantics-Based Detection of Similar Android Applications
  • Zhui Deng, Xiangyu Zhang and Dongyan Xu. BISTRO: Binary Component Extraction and Embedding for Software Security Applications
Session 2b: Applications of Cryptography
  • Giorgia Azzurra Marson and Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators
  • Jun Furukawa. Request-Based Comparable Encryption
  • Lei Wei and Mike Reiter. Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
Session 3: Network Security
  • Amir Herzberg and Haya Shulman. Vulnerable Delegation of DNS Resolution
  • Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan. Formal Approach for Route Agility Against Persistent Attackers
  • Yossi Gilad and Amir Herzberg. Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
Session 4: Formal Models and Methods
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags and Rainer Böhme. Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats
  • Martin Gagne, Pascal Lafourcade and Yassine Lakhnech. Automated Security Proofs for Almost-Universal Hash for MAC verification
  • Max Kanovich, Tajana Ban Kirigin, Vivek Nigam and Andre Scedrov. Bounded Memory Protocols and Progressing Collaborative Systems
  • Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
Session 5a: Privacy-Enhancing Models and Technologies
  • Arjan Jeckmans, Andreas Peter and Pieter Hartel. Efficient Privacy-Enhanced Familiarity-Based Recommender System
  • Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe and Reginald L. Lagendijk. Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation
  • Mishari Almishari, Paolo Gasti, Ekin Oguz and Gene Tsudik. Privacy-Preserving Matching of Community-Contributed Content
Session 5b: Protocol Analysis
  • Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Marson, Arno Mittelbach and Cristina Onete. A Cryptographic Analysis of OPACITY
  • Bruno Conchinha, David Basin and Carlos Caleiro. Symbolic Probabilistic Analysis of Off-line Guessing
  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering and Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
Session 6a: Malware Detection
  • Hugo Daniel Macedo and Tayssir Touili. Mining malware specifications through static reachability analysis
  • Jun Dai, Xiaoyan Sun and Peng Liu. Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
  • Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li and Manos Antonakakis. Measuring and Detecting Malware Downloads in Live Network Traffic
Session 6b: E-Voting and Privacy
  • Ben Smyth and David Bernhard. Ballot secrecy and ballot independence coincide
  • Edouard Cuvelier, Olivier Pereira and Thomas Peters. Election Verifiability or Ballot Privacy: Do We Need to Choose?
  • Naipeng Dong, Hugo Jonker and Jun Pang. Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Session 7a: Attacks
  • Dvir Schirman, Yossef Oren and Avishai Wool. Range Extension Attacks on Contactless Smart Cards
  • Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas and Angelos Keromytis. CellFlood: Attacking Tor Onion Routers on the Cheap
  • Mathias Humbert, Théophile Studer, Matthias Grossglauser and Jean-Pierre Hubaux. Nowhere to Hide: Navigating around Privacy in Online Social Networks
  • Shane Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu and Wenyuan Xu. Current Events: Identifying Webpages by Tapping the Electrical Outlet
Session 7b: Access Control
  • Andreas Griesmayer and Charles Morisset. Automated Certification of Authorisation Policy Resistance
  • Jin Li, Xiaofeng Chen, Jianfeng Ma and Wenjing Lou. Fine-Grained Access Control System based on Outsourced Attribute-based Encryption
  • Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing. Purpose Restrictions on Information Use
  • Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality
Session 8: Language-Based Protection
  • Deian Stefan, Pablo Buiras, Edward Yang, Amit Levy, David Terei, Alejandro Russo and David Mazieres. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
  • Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena and Dawn Song. Data-confined HTML5 Applications
  • Jinpeng Wei, Feng Zhu and Calton Pu. KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
  • Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake. Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)

Workshop Programme (Outline)

(Note: for detailed workshop schedules please refer to the workshop web-sites.)

Thursday September 12th 2013 Friday September 13th 2013
Windsor Seminar Rooms (X = 1-8) Windsor Seminar Rooms (X = 1-8)
08:00 – 09:00 Registration
09:00 – 09:30 General Welcome (Main Auditorium) Registration
09:30 – 10:30 Session W1X * Session W5X
10:30 – 11:00 Tea/Coffee Break Tea/Coffee Break
11:00 – 13:00 Session W2X Session W6X
13:00 – 14:15 Lunch (Windsor Foyer) Lunch (Windsor Foyer)
14:15 – 15:45 Session W3X Session W7X
15:45 – 16:15 Tea/Coffee Break Tea/Coffee Break
16:15 – 17:45 Session W4X Session W8X
19:00 – 20:00 Pre dinner Drinks
20:00 – 23:00 Workshops Dinner

* Session W1X for QASA/SETOP/DPM has a joint guest speaker (Steven Murdoch) and will be in the auditorium

Room Allocations

(All locations in Windsor Building unless stated)

Thursday Friday
Workshops
Common/ welcome Auditorium
Cryptoforma 0-03 0-03
DPM 0-04 0-04
EuroPKI 0-05 0-05
QASA 1-02 1-02
SETOP 1-03 1-03
STM 1-04 1-04
Trustworthy Clouds 1-05 1-05
Display/ breakout room 0-02 0-02
Banquet and pre-drinks Founders Building
Picture Gallery

 

Scroll to Top