online web builder

Program

KEYNOTE SPEAKERS

Martin Eian

Mnemonic AS

Lothar Fritsch

Karlstad University

Christoph Sorge

Saarland University

Day 1

Wednesday, 28. November 2018

09:00 – 11:00

Registration + Coffee

11:00 – 11:30

Conference Opening

11:30 – 12:30

Keynote 1: Martin Eian (mnemonic as)

Cybersecurity Threats to the Academic Sector

12:30 – 14:00

Lunch

14:00 – 16:00

Session 1-A

Privacy

Session 1-B

Cryptography I

16:00 – 16:30

Coffee

16:30 – 17:00

Poster session

17:00 – 19:00

Reception

Day 2

Thursday, 29. November 2018

09:00 – 09:30

Registration

09:30 – 10:30

Keynote 2: Lothar Fritsch (Karlstad University)

From Risk to Treatment: Privacy impact assessment and privacy controls

10:30 – 11:00

Coffee

11:00 – 12:30

Session 2-A

Network and Cloud Security I

Session 2-B

Security for Software and Software Development I

12:30 – 14:00

Lunch

14:00 – 15:00

Session 3-A

Malware

Session 3-B

Security for Software and Software Development II

15:00 – 15:30

Coffee

15:30 – 17:00

Session 4-A

Cryptography II

Session 4-B

Cybersecurity I

19:00 – 20:00

Social Event (City Hall)

20:00 –

Conference Dinner (Restaurant Louise)

Day 3

Friday, 30. November 2018

09:00 – 09:30

Registration

09:30 – 11:00

Session 5-A

Network and Cloud Security II

Session 5-B

Cybersecurity II

11:00 – 11:30

Coffee

11:30 – 12:30

Keynote 3: Christoph Sorge (Saarland University)

Smart Meter Privacy: An interdisciplinary perspective

12:30 – 14:00

Lunch

Session Details


Session 1-A

Privacy 

Chair: Lothar Fritsch 


Avikarsha Mandal, Frederik Armknecht, Erik Zenner

Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid

Iulia Bastys, Frank Piessens, Andrei Sabelfeld

Tracking Information Flow via Delayed Output: Addressing Privacy in IoT and Emailing Apps

Mirja Nitschke, Philipp Holler, Lukas Hartmann, Doğan Kesdoğan

MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix-Zones

Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu

AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications

 

Session 1-B

Cryptography I

Chair: Ronan Lashermes 


George Teseleanu

Unifying Kleptographic Attacks

Tobias Pulls, Rasmus Dahlberg

Steady: A Simple End-to-End Secure Logging System

Arash Atashpendar, Guru Vamsi Policharla, Peter B. Roenne, Peter Y. A. Ryan

Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

Ahto Buldas, Risto Laanoja, Ahto Truu

A Blockchain-Assisted Hash-Based Signature Scheme

 

Session 2-A

Network and Cloud Security I

Chair: Tobias Pulls

 

Charalampos Stylianopoulos, Linus Johansson, Oskar Olsson, Magnus Almgren

CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs

Sebastian Zillien, Steffen Wendzel

Detection of covert channels in TCP retransmissions

Simon Foley, Vivien Rooney

What you can change and what you can't: human experience in computer network defenses

 

Session 2-B

Security for Software and Software Development I

Chair: Audun Jøsang

Ronan Lashermes, Hélène Le Bouder, Gaël Thomas

Hardware-Assisted Program Execution Integrity: HAPEI

Roberto Guanciale

Protecting Instruction Set Randomization from Code Reuse Attacks

Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider, Markus Tasch

A Uniform Information-Flow-Security Benchmark Suite for Source Code and Bytecode

 

Session 3-A

Malware

Chair: Roberto Guanciale

 

Kursat Aktas, Sevil Sen

UpDroid : Updated Android Malware and Its Familial Classification

Ziya Alper Genc, Gabriele Lenzini, Peter Y. A. Ryan

Next Generation Cryptographic Ransomware

 

Session 3-B

Security for Software and Software Development II

Chair: Steffen Wendzel

Kim Kuyju, Kim Taeyun, Lee Seungjin, Kim Soolin, Kim Hyoungshick

When Harry met Tinder: Security analysis of dating apps on Android

Hanne Rygge, Audun Jøsang

Threat Poker: Solving Security and Privacy Threats in Agile Software Development

 

Session 4-A

Cryptography II

Chair: Chi Man Pun

 

Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun

The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants

Rasmus Dahlberg, Tobias Pulls

Verifiable Light-Weight Monitoring for Certificate Transparency Logs

Zheng Yang, Mohsin Khan, Wanping Liu, Jun He

On Security Analysis of Generic Dynamic Authenticated Group Key Exchange

 

Session 4-B

Cybersecurity I

Chair: Simon Foley

 

Alexander Reinthal, Magnus Almgren, Lef Filippakis

Data Modelling for Predicting Exploits

Barbara Krumay, Edward W. N. Bernroider, Roman Walser

Evaluation of Cyber Security Management of Critical Infrastructures: A Literature Review Guided by the NIST Cybersecurity Framework

 

Session 5-A

Network and Cloud Security II

Chair: Christoph Sorg

 

Alexander Bajic, Georg T. Becker

Attack simulation for a realistic evaluation and comparison of network security techniques

Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser

Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots using Virtual Machine Introspection

Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin

Authorization Policies Specification and Consistency Management within Multi-Cloud Environments

 

Session 5-B

Cybersecurity II

Chair: Sevil Sen

 

Kaie Maennel, Sten Mäses, Olaf Maennel

Cyber Hygiene: The Big Picture

Ahmed Seid Yesuf, Christian W. Probst

Estimating the Risk of Fraud against E-services

Juha Nurmi, Mikko Niemelä

PESTEL Analysis of Hacktivism Campaign Motivations

© Copyright 2018 SecurityLab (University of Oslo) - All Rights Reserved. Developed by: kamervishi.com