This program is preliminary and therefore subject to change.
Saturday 08 December |
Sunday 09 December |
Monday 10 December |
Tuesday 11 December |
|
---|---|---|---|---|
8:30 | Breakfast | |||
9:00 | Welcome | Breakfast | Breakfast | |
9:30 | Invited Speaker | Invited Speaker | Invited Speaker | |
10:00 | ||||
10:30 | Break | Break | Break | |
11:00 | Session 1 | Session 4 | Session 5 | |
11:30 | ||||
12:00 | ||||
12:30 | Lunch | Lunch | Lunch | |
14:00 | Session 2 | Excursion | Session 6 | |
14:30 | ||||
15:00 | Break | |||
15:30 | Break | Session 7 | ||
16:00 | Session 3 | |||
16:30 | ||||
17:00 | Closing | |||
17:30 | ||||
19:00 | Welcome Reception | Conference dinner |
19:00 |
Four Seasons Hotel
Reception
|
8:30 |
LAS Lecture Hall C
Breakfast and Registration
|
9:00 |
LAS Lecture Hall C
WELCOME
Iliano Cervesato (Carnegie Mellon University, Qatar), Program Chair Kazunori Ueda (Waseda University, Japan), General Chair Chuck Thorpe (Carnegie Mellon University, Qatar), Dean Abdelali Haoudi (Qatar Foundation), Vice-President for Research |
9:30 |
LAS Lecture Hall C
Invited Speaker:
Andrei Sabelfeld (Chalmers University, Sweden)
Dimensions of Declassification in Theory and Practice |
10:30 |
LAS Lecture Hall C
Break
|
11:00 |
LAS Lecture Hall C
Program Security
(chaired by Andrei Sabelfeld)
A Static Birthmark of Binary Executables Based on API call Structure
Takahiro Kosakai, Toshiyuki Maeda and Akinori Yonezawa (University of Tokyo, Japan) Information Flow Testing Gurvan Le Guernic (IRISA, France) |
12:30 |
LAS Cafeteria
Lunch
|
14:00 |
LAS Lecture Hall C
Short Papers on Computer Security
(chaired by Joshua Guttman)
Large Scale Simulation of Tor: Stream Correlation Attacks Gavin O'Gorman and Stephen Blott (Dublin City University, Ireland) Privacy Enhancing Credentials Junji Nakazato, Lihua Wang and Akihiro Yamamura (NICT, Japan) Browser-Based Agile e-Voting System Simhalu Sriperumbuduru Kandala and Keiji Takeda (Carnegie Mellon University, Japan) Risk Balance in Exchange Protocols Mohammad Torabi Dashti and Yanjing Wang (CWI, The Netherlands) Scalable DRM System for Media Portability Hyoungshick Kim (Samsung, Korea) Computational Semantics for Basic Protocol Logic - A Stochastic Approach Gergei Bana (Tulane University, USA), Koji Hasebe (AIST, Japan) and Mitsuhiro Okada (Keio University, Japan) |
15:30 |
LAS Lecture Hall C
Break
|
16:00 |
LAS Lecture Hall C
Access Control
(chaired by Thierry Sans)
Management Advantages of Object Classification in Role-Based Access Control Mohammad Jafari and Mohammad Fathian (University of Science and Technology, Iran) An integrated model for access control and information flow requirements Samiha Ayed, Nora Cuppens-Boulahia and Frederic Cuppens (ENST-Bretagne, France) Digital Rights Management Using a Master Control Device Imad Abbadi (Royal Holloway, UK) |
19:00 |
Assaha Restaurant
Conference dinner
|
9:00 |
LAS Lecture Hall C
Breakfast and Registration
|
9:30 |
LAS Lecture Hall C
Invited Speaker:
Joshua Guttman (MITRE, USA)
How to do Things with Cryptographic Protocols |
10:30 |
LAS Lecture Hall C
Break
|
11:00 |
LAS Lecture Hall C
Protocols
(chaired by Iliano Cervesato)
A Formal Analysis for Capturing Replay Attacks in Communication Protocols Han Gao (Technical University, Denmark), Pierpaolo Degano, Chiara Bodei (University of Pisa, Italy) and Hanne Riis Nielson (Technical University, Denmark) An abstract and refinement framework for verifying security protocols Li MengJun (National University of Defence Technology, China), Zhou Ti (Beihang University, China), Li ZhouJun and Chen HuoWang (National University of Defence Technology, China) Secure Verification of Location Claims with Simultaneous Distance Modification Ming-Hsiu Wang and Vitaly Shmatikov (UT-Austin, USA) |
12:30 |
LAS Cafeteria
Lunch
|
14:00 | Excursion |
9:00 |
LAS Lecture Hall C
Breakfast and Registration
|
9:30 |
LAS Lecture Hall C
Invited Speaker:
Kazuhiko Kato (University of Tsukuba, Japan)
Modeling and Virtualization for Secure Computing Environments |
10:30 |
LAS Lecture Hall C
Break
|
11:00 |
LAS Lecture Hall C
Intrusion Detection
(chaired by Kazuhiko Kato)
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces Eduardo Ramirez-Silva and Marc Dacier (Eurocom, France) A Logical Framework for Evaluating Network Resilience Against Faults and Attacks Elie Bursztein and Jean Goubault-Larrecq (ENS-Cachan, France) Masquerade Detection based upon GUI User Profiling in Linux Systems Wilson Naik Bhukya, Suneel Kumar Kommuru and Atul Negi (University of Hyderabad, India) |
12:30 |
LAS Cafeteria
Lunch
|
14:00 |
LAS Lecture Hall C
Short Papers on Network Security
(chaired by Marc Dacier)
One-Time Receiver Address in IPv6 for Protecting Unlinkability Atsushi Sakurai, Takashi Minohara, Ryota Sato and Keisuke Mizutani (Takushoku University, Japan) A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira (Kyoto University, Japan) and Yongjin Kwon (Aerospace University, Korea) Combining Heterogeneous Classifiers for Network Intrusion Detection Ali Borji (IPM, Iran) Managing Uncertainty in Access Control decisions, in Distributed Autonomous Collaborative Environments Petros Belsis, Stefanos Gritzalis (University of the Aegean, Greece), Christos Skourlas (TEI-Athens, Greece) and Vassilis Tsoukalas (TEI-Kevala, Greece) |
15:00 |
LAS Lecture Hall C
Break
|
15:30 |
LAS Lecture Hall C
Safe Execution
(chaired by Vitaly Shmatikov)
On Run-time Enforcement of policies Harshit Shah (University of Trento, Italy) and Rudrapatna Shyamasundar (Tata Institute, India) Static vs Dynamic Typing for Access Control in Pi-Calculus Michele Bugliesi, Damiano Macedonio and Sabina Rossi (University of Venice, Italy) A Sandbox with Dynamic Policy Based on Execution Contexts of Applications Tomohiro Shioya, Yoshihiro Oyama and Hideya Iwasaki (University of Electro-Communications, Japan) |
17:00 | LAS Lecture Hall C
Closing Remarks
Kazunori Ueda (Waseda University, Japan), General Chair Iliano Cervesato (Carnegie Mellon University, Qatar), Program Chair |