[Om-announce] ESORICS 2017: Call for Participation

2017-08-30 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * 8 workshops (Sept 14 - 15)


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley
  - Justifying Security Measures - a Position Paper

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript
  Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard


### September 12 - Day 2 ###
09:00 - 10:00
* Keynote: Paul Syverson
  - The Once and Future Onion

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
  - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android

  Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
  - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples

  Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
  - Adversarial Examples for Malware 

[Om-announce] ESORICS 2017: Call for Participation

2017-08-22 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * 8 workshops (Sept 14 - 15)


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley
  - Justifying Security Measures - a Position Paper

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  Steffen Schulz, André Schaller, Florian Kohnhäuser, and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript
  Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, 
Clémentine Maurice and Stefan Mangard


### September 12 - Day 2 ###
09:00 - 10:00
* Keynote: Paul Syverson
  - The Once and Future Onion

10:30 - 12:00

* Session 7: Vulnerabilities and Malware
  - Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for 
Android

  Lorenzo Bordoni, Mauro Conti and Riccardo Spolaor
  - VuRLE: Automatic Vulnerability Detection and Repair by Learning from 
Examples

  Siqi Ma, Ferdian Thung, David Lo, Cong Sun and Robert Deng
  - Adversarial Examples for Malware 

[Om-announce] ESORICS 2017: Call for Participation

2017-08-08 Thread Cristina Alcaraz

==
ESORICS 2017:   CALL FOR PARTICIPATION
22nd European Symposium on Research in Computer Security
Oslo, Norway — September  11-15, 2017
==

WWW: https://www.ntnu.edu/web/esorics2017/

Overview

ESORICS is the annual European research event in Computer Security. The 
Symposium started in 1990 and has been held in several European 
countries, attracting a wide international audience from both the 
academic and industrial communities.
The 22nd European Symposium on Research in Computer Security (ESORICS 
2017) will be held in Oslo, Norway.



ESORICS 2017 spans a total of 3 days, featuring:
  * 3 keynote speeches
(Cormac Herley, Paul Syverson, Sandro Etalle)
  * 54 paper presentations in 3 days (Sep 11-13)
  * NN workshops (Sept 14 - 15)


Registration

Early Registration for ESORICS+Workshops 2017 is open, but will end 
soon. Early registration deadline is ***August, 15th 2017***


Registration rates:
https://www.ntnu.edu/web/esorics2017/registration

If an invitation letter is needed (e.g. VISA) the letter will be 
provided after the registration. To do this, it is necessary to send an 
email to the organizing committee: mailto:esorics2...@ntnu.edu


Venue page:
https://www.ntnu.edu/web/esorics2017/venue

Travel and accommodation page:
https://www.ntnu.edu/web/esorics2017/travel-accomodation

We hope to see you in Oslo, Norway!


Presentations Program

The 54 papers of ESORICS 2017 are distributed between **18 sessions**
in **two parallel tracks**.

Following is the list of paper presentations for the main ESORICS 
conference. For the workshop programs, please consult their 
corresponding websites:


* SECPRE 2017: https://samosweb.aegean.gr/secpre2017/
* SecSE 2017: http://secse.org
* CBT 2017: http://www.deic.uab.cat/~jherrera/CBT/
* DPM 2017: http://deic.uab.cat/conferences/dpm/dpm2017/
* STM 2017: http://stm2017.di.unimi.it
* QASA 2017: http://www.iit.cnr.it/qasa2017/
* CyberICPS: http://www.ds.unipi.gr/cybericps2017/
* SIoT 2017: http://siot-workshop.org

### September 11 - Day 1 ###
09:30 - 10:30
* Keynote: Cormac Herley

11:00 - 12:30

* Session 1: Security of embedded things
  - Shortfall-based Optimal Placement of Security Resources for Mobile 
IoT Scenarios

  Antonino Rullo, Edoardo Serra, Elisa Bertino and Jorge Lobo
  - Analyzing the Capabilities of the CAN Attacker
  Sibylle Froeschle and Alexander Stühring
  - Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT 
Sensors
  André Schaller, Florian Kohnhäuser, Steffen Schulz and Stefan 
Katzenbeisser


* Session 2: Cryptographic Application I
  - Per-Session Security: Password-Based Cryptography Revisited
  Gregory Demay, Peter Gazi, Ueli Maurer and Björn Tackmann
  - Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime 
Generation Algorithm
  Fabrice Benhamouda, Houda Ferradi, Rémi Géraud and David 
Naccache
  - Tightly Secure Ring-LWE Based Key Encapsulation with Short 
Ciphertexts
  Martin Albrecht, Emmanuela Orsini, Kenneth Paterson, Guy Peer and 
Nigel Smart


14:00 - 15:30

* Session 3: Documents and Authorship
  - Identifying Multiple Authors in a Binary Program
  Xiaozhu Meng, Barton Miller and Kwang-Sung Jun
  - Verifiable Document Redacting
  Herve Chabanne, Rodolphe Hugel and Julien Keuffer
  - Source Code Authorship Attribution using Long Short-Term Memory 
Based Networks
  Bander Alsulami, Edwin Dauber, Richard Harang, Spiros Mancoridis 
and Rachel Greenstadt


* Session 4: Analysis of Security Protocols
  - Automated analysis of equivalence properties for security protocols 
using else branches

   Ivan Gazeau and Steve Kremer and Levente Buttyán
  - Secure Authentication in the Grid: A formal analysis of DNP3: SAv5
  Cas Cremers, Martin Dehnel-Wild and Kevin Milner
  - Modular Verification of Protocol Equivalence in the Presence of 
Randomness

  Matthew Bauer, Rohit Chadha and Mahesh Viswanathan

16:00 - 17:30

* Session 5: Threat Analysis
  - Preventing Advanced Persistent Threats in Complex Control Networks
  Juan E. Rubio, Cristina Alcaraz and Javier Lopez
  - MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  Alexandru G. Bardas, Sathya C. Sundaramurthy, Xinming Ou and Scott 
A. Deloach

  - Is my attack tree correct?
  Maxime Audinot, Sophie Pinchinat and Barbara Kordy

* Session 6: Side Channels and data leakage
  - On-Demand Time Blurring to Support Side-Channel Defense
   Weijie Liu, Debin Gao and Mike Reiter
  - Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via 
Covert Hard-Drive Noise
  Mordechai Guri, Yosef Solewicz, Andrey Daidakulov and Yuval 
Elovici

  - Practical Keystroke Timing Attacks in Sandboxed JavaScript