Detailed program of TC-11 SEC
Tuesday, 18 September, 2018
Tuesday, 09:30 – 11:00: SEC Opening session
lecture hall: 6 CW
INVITED TALK: Cryptographic failures: how and why they happen Krystian Matusiewicz
Tuesday, 11:00 – 11:30, Coffee break
Tuesday, 11:30 – 12:00, WCC 2018 Opening
Tuesday, 12:00 – 13:00, WCC 2018 KEYNOTE
Responsible Data Science in a Dynamic World Wil van der Aalst
Tuesday, 13:00 – 14:30, Lunch break
Tuesday, 14:30 – 16:00, SEC Parallel Session 1: Authentication weaknesses
lecture hall: 6 CW
session chair: Krystian Matusiewicz
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols Paolo D'Arco, Roberto De Prisco
Attacking RO-PUFs with Enhanced Challenge-Response Pairs Nils Wisiol, Marian Margraf
Hunting Password Leaks in Android Applications Johannes Feichtner
Tuesday, 14:30 – 16:00, SEC Parallel Session 2: Privacy
lecture hall: 12 CW
session chair: Mirosław Kutyłowski
Assessing Privacy Policies of Internet of Things Services Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter, Sebastian Pape
Usability Characteristics of Security and Privacy Tools: the User's Perspective Ioanna Topa, Karyda Maria
JonDonym Users' Information Privacy Concerns David Harborth, Sebastian Pape
Tuesday, 16:00 – 16:30, Coffee break
Tuesday, 16:30 – 18:00, SEC Parallel Session 3: Security of systems
lecture hall: 6 CW
session chair: Lech Janczewski
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter Clemens Sauerwein, Christian Sillaber, Michael Huber, Andrea Mussmann, Ruth Breu
A Security Analysis of FirstCoin Alexander Marsalek, Christian Kollmann, Thomas Zefferer
EMPower: Detecting Malicious Power Line Networks from EM Emissions Richard Baker, Ivan Martinovic
Tuesday, 16:30 – 18:00, SEC Parallel Session 4: Passwords
lecture hall: 12 CW
session chair: Yuko SJ Murayama
CPMap: Design of Click-Points Map-based Graphical Password Authentication Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su, Jinguang Han
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye
A Hypergame Analysis for ErsatzPasswords Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford, Saurabh Bagchi
Wednesday, 19 September, 2018
Wednesday, 09:30 – 11:00, SEC Session 5: Data protection
lecture hall: 6 CW
session chair: Jan Camenisch
Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations Wei Chen, Yuhui Lin, Vashti Galpin, Vivek Nigam, Myungjin Lee, David Aspinall
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Milan Brož, Mikuláš Patočka, Vashek Matyáš
Detection and response to Data Exfiltration from Internet of Things Android Devices Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey
Wednesday, 11:00 – 11:30, Coffee break
Wednesday, 11:30 – 12:30, WCC 2018 KEYNOTE
The Pros and Cons of Blockchain for Privacy Jan Camenisch
Wednesday, 12:30 – 14:00, Lunch break
Wednesday, 14:00 – 15:30, SEC Session 6: Security in Web
lecture hall: 6 CW
session chair: Kai Rannenberg
When George Clooney is not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs Keeyoung Kim, Simon Woo
When Your Browser Becomes The Paper Boy: An Anonymous Browser Network Juan D. Parra Rodriguez, Eduard Brehm, Joachim Posegga
On the Integrity of Cross-Origin JavaScripts Jukka Ruohonen, Joonas Salovaara,Ville Leppänen
Wednesday, 15:30 – 16:00, Coffee break
Wednesday, 16:00 – 18:00, SEC Session 7: Malware
lecture hall: 6 CW
session chair: Nora Cuppens
Smashing the Stack Protector for Fun and Profit Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, Apostolis Zarras
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection Sergej Proskurin, Julian Kirsch, Apostolis Zarras
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides its Network Traffic Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman, Yuval Elovici
Wednesday, 19:00, Congress grill
Thursday, 20 September, 2018
Thursday, 09:30 – 11:00, SEC Parallel Session 8: Data analysis
lecture hall: 6 CW
session chair: Frédéric Cuppens
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces Choongin Lee, Jeonghan Bae, Heejo Lee
Walking Through the Deep: Gait Analysis for User Authentication through Deep Learning Giacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi
Optimal Security Configuration for Cyber Insurance Ganbayar Uuganbayar, Artsiom Yautsiukhin, Fabio Martinelli
Thursday, 09:30 – 11:00, SEC Parallel Session 9: Behavior and side channels
lecture hall: 12 CW
session chair: Jukka Ruohonen
Efficient Identification of Applications in Co-Resident VMs via a Memory Side-Channel Jens Lindemann, Mathias Fischer
Performance Improvements in Behavior Based Malware Detection Solutions Gheorghe Florin, Gheorghe Hăjmăşan, Alexandra Mondoc, Radu Marian Portase, Octavian Creț
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel, Johannes Schickel
Thursday, 11:00 – 11:30, Coffee break
Thursday, 14:00, SEC Closing Session
lecture hall: 6 CW