Thursday, September 14, 2017

8.45 - 9.00 Welcome and opening
9.00 - 10.30 Session 1: Cryptosystems and Applied Cryptography (Chair: Hiroaki Kikuchi)

Key Management for Versatile Pay-TV Services
Kazuto Ogawa, Sakurako Tamura and Goichiro Hanaoka

Dynamic Similarity Search over Encrypted Data with Low Leakage
Daniel Homann, Christian Göge and Lena Wiese

Enhanced Modelling of Authenticated Key Exchange Security
Papa B. Seye and Augustin P. Sarr
10.30 - 11.00 Coffee Break
11.00 - 12.30 Session 2: Software Security and Risk Management (Chair: Andrea Saracino)

Authentic Execution of Distributed Event-Driven Applications with a Small TCB
Job Noorman, Jan Tobias Mühlberg and Frank Piessens

Exploring Botnet Evolution via Multidimensional Models and Visualisation
William Dash and Matthew J. Craven

Facing uncertainty in cyber insurance policies
Per Håkon Meland, Inger Anne Tøndel, Marie Moe and Fredrik Seehusen

12.30 - 14.00 Lunch Break
14.00 - 15.20 Session 3: Authorization (Chair: TBA)

How much is risk increased by sharing credential in a group?
Hiroaki Kikuchi, Koichi Niihara and Michihiro Yamada

Smart Parental Advisory: A Usage Control and Deep Learning-based Framework for Dynamic Parental Control on Smart TV
Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori and Andrea Saracino

A Consistent Definition of Authorization
Audun Jøsang

15.30 - 16.00 Coffee Break
16.00 - 17.00 Session 4: ERCIM STM Ph.D. award talk
David Núñez
New Security Notions, Constructions and Applications of Proxy Re-Encryption

Friday, September 15, 2017

9.10 - 10.30 Session 5: Security Vulnerabilities and Protocols (Chair: Jan Tobias Mühlberg)

Formal Analysis of V2X Revocation Protocols
Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne and Steve Wesemeyer

Refinement-Aware Generation of Attack Trees
Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua and Tim A. C. Willemse

Exploit Prevention, Quo Vadis?
László Erdödi and Audun Jøsang

10.30 - 11.00 Coffee Break
11.00 - 12.20 Session 6: Secure Systems (Chair: Helen Treharne)

Estimating Software Obfuscation Potency with Artificial Neural Networks
Daniele Canavese, Leonardo Regano, Cataldo Basile and Alessio Viticchié

EigenTrust for Hierarchically Structured Chord
Kalonji Kalala, Tao Feng and Iluju Kiringa

Cover Traffic: A Trade of Anonymity and Efficiency
Tim Grube, Markus Thummerer, Jörg Daubert and Max Mühlhäuser

Quantitative Analysis of DoS attacks & Client Puzzles in IoT Systems
Luca Arnaboldi and Charles Morisset

12.30 - 14.00 Lunch Break