FPS’2013 Programme
Sunday, October 20th |
---|
19:00 – 20:00 Welcome drinks and Early Registration |
Monday, October 21st |
8:30 – 9:00 Registration |
9:00 – 9:15 Welcome – Introduction |
9:15 – 10:15 Invited talk: Jean Goubault-Larrecq Does mathematical rigor have its place in intrusion detection? |
10:15 – 10:45 Break |
10:45 – 11:55 Session 1: Security Protocols Position Paper : On the Feasibility of a Censorship Resistant Decentralized Naming System Matthias Wachs, Martin Schanzenbach and Christian Grothoff. A General Framework for Group Authentication and Key Exchange Protocols Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange |
11:55 – 12:45 Session 2: Formal Methods Model-based Specification and Validation of Security and Dependability Patterns Enforcing information flow by combining static and dynamic analysis |
12:45 – 14:15 Lunch |
14:15 – 15:45 Tour of La Rochelle |
15:45 – 16:15 Break |
16:15 – 17:30 Session 3: Physical Security Fault Injection to Reverse Engineer DES-like Cryptosystems Hélène Le Bouder, Sylvain Guilley, Bruno Robisson and Assia Tria Software Camouflage Investigation of Parameters Influencing the Success of Optical Fault Attacks |
17:30 – 18:15 Session 4: Attack Classification and Assessment ONTIDS: A highly flexible context-aware and ontology-based alert correlation framework Quantitative Evaluation of Enforcement Strategies (Position Paper) |
18:15 – 19:30 Session 5: Access Control Collusion Resistant Inference Control for Cadastral Databases Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model Content-based Protection and Release for Access Control in NATO Operations |
20:00 – 23:00 Gala Diner |
Tuesday, October 22nd |
9:00 – 10:00 Invited talk: Bruno Crispo Attacks on The Internet of Things: Why Your Actual Antivirus Suite won’t Work. |
10:00 – 10:30 Break |
10:30 – 11:45 Session 6: Cipher Attack Computational Soundness of Symbolic Blind Signatures under Active Attacker Hideki Sakurada. Improved Davies-Murphy’s Attack on DES Revisited Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts |
11:45 – 13:00. Session 7: Ad-hoc and Sensor Networks A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs |
13:00 – 14:30 Lunch |
14:30 – 15:45 Session 8: Resilience CheR: Cheating Resilience in the Cloud via Smart Resource Allocation Roberto Di Pietro, Flavio Lombardi, Fabio Martinelli and Daniele Sgandurra. Evaluation of Software-Oriented Block Ciphers on Smartphones Don’t Push it: Breaking iButton Security |
15:45 – 16:15 Break |
16:15 – 17:30 Session 9: Intrusion Detection Attacking IDS by Characterizing their Inputs On the Reverse Engineering of the Citadel Malware The Carna Botnet Through the Lens of a Network Telescope |