FPS’2014 Programme
Monday, November 3rd |
---|
8:00 – 9:00 Registration |
9:00 – 9:10 Welcome |
9:10 – 10:10 Invited talk: Kui Ren, University at Buffalo All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking |
10:10 – 10:40 Coffee Break |
10:40 – 12:00 Morning Session: Attacks and Vulnerabilities: On Acoustic Covert Channels Between Air-Gapped Systems
Brent Carrara and Carlisle Adams. Location-dependent EM Leakage of the ATxmega Microcontroller Data Confirmation for Botnet Traffic Analysis (SHORT)
Fariba Haddadi and A. Nur Zincir-Heywood. |
12:00 – 13:00 Lunch |
13:30-15:20 Afternoon Session 1: Privacy Privacy-Preserving Public Auditing in Cloud Computg with Data Deduplication
Naelah Alkhojandi and Ali Miri A Maximum Variance Approach for Graph Anonymization Privacy by Design: On the Conformance Between Protocols and Architecture Detection of illegal control flow in Android System: Protecting private data used by Smartphone Apps (SHORT) |
15:20 – 15:50 Coffee Break |
15:50 – 17:10 Afternoon Session 2: Software Security and Malware Analysis Position Paper: Moving Target Defense Against Cross-Site Scripting Attacks (POSITION) Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks Malware Message Classification by Dynamic Analysis |
Tuesday, November 4th |
9:10 – 10:10 Invited talk: Jean-Louis Lanet, Université de Limoges et INIRA Rennes Survey of recent software attacks and their mitigation against secure element |
10:10 – 10:40 Coffee Break |
10:40 – 11:50 Morning Session: Network Security A Game Approach for an Efficient Intrusion Detection System in Mobile Ad hoc networks Myria Bouhaddi, Mohammed Saïd Radjef and Kamel Adi. A Responsive Defense Mechanism against DDoS Attacks (SHORT) Automated Extraction of Vulnerability Information for Home Computer Security (SHORT) |
11:50 – 12:00. FPS 2015 announcement |
12:00 – 13:30 Lunch |
13:30 – 15:20 Afternoon Session 1: Access Control Models and Policy Analysis HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control Daniel Servos and Sylvia L. Osborn. A Logic Method for Reasoning about Access Control and Flow Control Models A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies A Formal Approach to Automatic Testing of Security Policies Specified in XACML (SHORT) |
15:20 – 15:50 Coffee Break |
15:50 – 17:10 Afternoon Session 2: Protocol Verification Position Paper: Debating Security or Securing a Debate? (POSITION) Formal Verification of e-Reputation Protocols (In)Corruptibility of Routing Protocols |
Banquet 17:30 |
Wednesday, November 5th |
09:00 – 10:00 Morning Session 1: Network Protocol Optimizing TLS for low Bandwidth Environments Automating MAC Spoofer Investigations |
10:00 – 10:30 Coffee Break |
10:30 – 12:00 Morning Session 2: Cryptographic Technologies Decentralized CRT-Based Efficient Verifiable (n,t,n) Multi-Secret Sharing Schemes Composable Oblivious Extended Permutations Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSB |