The ESORICS 2013 programme is outlined below. (Click here for short PDF version, or here for long PDF version.)
8th September | 19:00- 21:00 | Welcome drinks and early registration | |
9th September | 08:30- 09:30 | Registration | |
09:30- 10:00 | Opening remarks | ||
10:00- 11:00 | Invited talk: Adrian Perrig (ETH) | ||
11:00- 11:30 | Coffee break | ||
11:30- 13:00 | Session 1a: Measurement and Evaluation | Session 1b: Cryptography and Computation | |
13:00- 14:00 | Lunch | ||
14:00- 15:30 | Session 2a: Code Analysis | Session 2b: Applications of Cryptography | |
15:30- 16:00 | Coffee break | ||
16:00- 17:30 | Session 3: Network Security | ||
19:00- 20:00 | Pre-dinner drinks | ||
20:00- 23:00 | Conference dinner | ||
10th September | 08:30- 09:00 | Registration | |
09:00- 11:00 | Session 4: Formal Methods and Models | ||
11:00- 11:30 | Coffee break | ||
11:30- 13:00 | Session 5a: Privacy Enhancing Models and Technologies | Session 5b: Protocol Analysis | |
13:00- 14:00 | Lunch | ||
14:00- 15:30 | Session 6a: Malware Detection | Session 6b: E-voting and Privacy | |
15:30- 16:00 | Coffee break | ||
16:00- 17:30 | Panel: Privacy in Cyberspace – Rights, Wrongs and Research | ||
19:00- 20:00 | Drinks | ||
20:00- 23:00 | Barbecue | ||
11th September | 08:30- 09:30 | Registration | |
09:30- 10:30 | Invited talk: Steven Murdoch (Cambridge University) | ||
10:30- 11:00 | Coffee break | ||
11:00- 13:00 | Session 7a: Attacks | Session 7b: Access Control | |
13:00- 14:00 | Lunch | ||
14:00- 16:00 | Session 8: Language-based Protection | ||
16:00- 16:30 | Closing remarks |
Room Allocations
(All locations in Windsor Building unless stated)
Main Conference | Sun | Mon | Tues | Weds |
Welcome Drinks/ Registration | Foyer | |||
Common/ A thread | Auditorium | Auditorium | Auditorium | |
B thread | 1-02/1-03 | 1-02/1-03 | 1-02/1-03 | |
Video Stream from A (and display/ breakout room) | 0-02/0-03 | 0-02/0-03 | 0-02/0-03 | |
Video Stream from B (and breakout room) | 0-05 | 0-05 | 0-05 | |
Banquet and pre-drinks | Founders Building Picture Gallery | |||
BBQ and pre-drinks | Founders Building Crosslands Quad |
- Session 1a: Measurement and Evaluation
-
- Benjamin Lerner, Liam Elberty, Neal Poole and Shriram Krishnamurthi. Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
- Xinshu Dong, Hong Hu, Prateek Saxena and Zhenkai Liang. A Quantitative Evaluation of Privilege Separation in Web Browser Designs
- Youngja Park, Christopher Gates and Stephen Gates. Estimating Asset Sensitivity by Profiling Users
- Session 1b: Cryptography and Computation
-
- Ivan Damgaard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl and Nigel Smart. Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits
- Jan Camenisch, Robert R. Enderlein and Victor Shoup. Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn
- Michael Backes, Dario Fiore and Esfandiar Mohammadi. Privacy-Preserving Accountable Computation
- Session 2a: Code Analysis
-
- Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant and Dawn Song. HI-CFG: Construction by Dynamic Binary Analysis, and Application to Attack Polymorphism
- Jonathan Crussell, Clint Gibler and Hao Chen. Scalable Semantics-Based Detection of Similar Android Applications
- Zhui Deng, Xiangyu Zhang and Dongyan Xu. BISTRO: Binary Component Extraction and Embedding for Software Security Applications
- Session 2b: Applications of Cryptography
-
- Giorgia Azzurra Marson and Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators
- Jun Furukawa. Request-Based Comparable Encryption
- Lei Wei and Mike Reiter. Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
- Session 3: Network Security
-
- Amir Herzberg and Haya Shulman. Vulnerable Delegation of DNS Resolution
- Jafar Haadi Jafarian, Ehab Al-Shaer and Qi Duan. Formal Approach for Route Agility Against Persistent Attackers
- Yossi Gilad and Amir Herzberg. Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
- Session 4: Formal Models and Methods
-
- Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags and Rainer Böhme. Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats
- Martin Gagne, Pascal Lafourcade and Yassine Lakhnech. Automated Security Proofs for Almost-Universal Hash for MAC verification
- Max Kanovich, Tajana Ban Kirigin, Vivek Nigam and Andre Scedrov. Bounded Memory Protocols and Progressing Collaborative Systems
- Steve Kremer, Robert Künnemann and Graham Steel. Universally Composable Key-Management
- Session 5a: Privacy-Enhancing Models and Technologies
-
- Arjan Jeckmans, Andreas Peter and Pieter Hartel. Efficient Privacy-Enhanced Familiarity-Based Recommender System
- Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe and Reginald L. Lagendijk. Privacy-Preserving User Data Oriented Services For Groups With Dynamic Participation
- Mishari Almishari, Paolo Gasti, Ekin Oguz and Gene Tsudik. Privacy-Preserving Matching of Community-Contributed Content
- Session 5b: Protocol Analysis
-
- Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Marson, Arno Mittelbach and Cristina Onete. A Cryptographic Analysis of OPACITY
- Bruno Conchinha, David Basin and Carlos Caleiro. Symbolic Probabilistic Analysis of Off-line Guessing
- Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering and Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
- Session 6a: Malware Detection
-
- Hugo Daniel Macedo and Tayssir Touili. Mining malware specifications through static reachability analysis
- Jun Dai, Xiaoyan Sun and Peng Liu. Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
- Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li and Manos Antonakakis. Measuring and Detecting Malware Downloads in Live Network Traffic
- Session 6b: E-Voting and Privacy
-
- Ben Smyth and David Bernhard. Ballot secrecy and ballot independence coincide
- Edouard Cuvelier, Olivier Pereira and Thomas Peters. Election Verifiability or Ballot Privacy: Do We Need to Choose?
- Naipeng Dong, Hugo Jonker and Jun Pang. Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
- Session 7a: Attacks
-
- Dvir Schirman, Yossef Oren and Avishai Wool. Range Extension Attacks on Contactless Smart Cards
- Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas and Angelos Keromytis. CellFlood: Attacking Tor Onion Routers on the Cheap
- Mathias Humbert, Théophile Studer, Matthias Grossglauser and Jean-Pierre Hubaux. Nowhere to Hide: Navigating around Privacy in Online Social Networks
- Shane Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu and Wenyuan Xu. Current Events: Identifying Webpages by Tapping the Electrical Outlet
- Session 7b: Access Control
-
- Andreas Griesmayer and Charles Morisset. Automated Certification of Authorisation Policy Resistance
- Jin Li, Xiaofeng Chen, Jianfeng Ma and Wenjing Lou. Fine-Grained Access Control System based on Outsourced Attribute-based Encryption
- Michael Carl Tschantz, Anupam Datta and Jeannette M. Wing. Purpose Restrictions on Information Use
- Sabrina De Capitani Di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi and Pierangela Samarati. Distributed Shuffling for Preserving Access Confidentiality
- Session 8: Language-Based Protection
-
- Deian Stefan, Pablo Buiras, Edward Yang, Amit Levy, David Terei, Alejandro Russo and David Mazieres. Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling
- Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena and Dawn Song. Data-confined HTML5 Applications
- Jinpeng Wei, Feng Zhu and Calton Pu. KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks
- Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto and Yutaka Miyake. Run-Time Enforcement of Information-Flow Properties on Android (Extended Abstract)
Workshop Programme (Outline)
(Note: for detailed workshop schedules please refer to the workshop web-sites.)
There will be welcome drinks for ESORICS Workshop delegates in Windsor Building Foyer between 19.00 – 21.00 on Wednesday September 11th. Delegates will be able to collect their badges/packs from the Windsor Building Foyer during this time, as an alternative to the “rush” on Thursday morning.
Thursday September 12th 2013 Friday September 13th 2013 Windsor Seminar Rooms (X = 1-8) Windsor Seminar Rooms (X = 1-8) 08:00 – 09:00 Registration 09:00 – 09:30 General Welcome (Main Auditorium) Registration 09:30 – 10:30 Session W1X * Session W5X 10:30 – 11:00 Tea/Coffee Break Tea/Coffee Break 11:00 – 13:00 Session W2X Session W6X 13:00 – 14:15 Lunch (Windsor Foyer) Lunch (Windsor Foyer) 14:15 – 15:45 Session W3X Session W7X 15:45 – 16:15 Tea/Coffee Break Tea/Coffee Break 16:15 – 17:45 Session W4X Session W8X 19:00 – 20:00 Pre dinner Drinks 20:00 – 23:00 Workshops Dinner * Session W1X for QASA/SETOP/DPM has a joint guest speaker (Steven Murdoch) and will be in the auditorium
Room Allocations
(All locations in Windsor Building unless stated)
Thursday Friday Workshops Common/ welcome Auditorium Cryptoforma 0-03 0-03 DPM 0-04 0-04 EuroPKI 0-05 0-05 QASA 1-02 1-02 SETOP 1-03 1-03 STM 1-04 1-04 Trustworthy Clouds 1-05 1-05 Display/ breakout room 0-02 0-02 Banquet and pre-drinks Founders Building
Picture Gallery