IFIP SEC 2016
Keynotes
Bart de Decker, KU Leven, Belgium, Vice Chair IFIP TC11
IFIP-SEC2016-Reception_De-Decker-Bart_160530.pdf
Bart Preneel, COSIC KU Leuven and iMinds, Belgium
IFIP-SEC2016-Keynote_Preneel-Bart_system-security-after-snowden-160531.pdf
IFIP SEC 2016 Programm
Monday May 30th 2016
Invited Talk:
Crazy Time - Exploiting Software Without Bugs - Herbert Bos
Session 1a: IFIP SEC - Cryptographic Protocols (session chair: Frédéric Cuppens)
Coercion-resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi and Melanie Volkamer
A Posteriori Openable Public Key Encryption
Xavier Bultel and Pascal Lafourcade
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Sérgio Câmara, Dhananjay Anand, Victoria Pillitteri and Luiz Carmo
Session 1b: IFIP SEC - Human Aspects of Security I (session chair: Rossouw Von Solms)
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research
Gurpreet Dhillon, Spyridon Samonas and Ugo Etudo
Evaluating CVSS Base Score Using Vulnerability Rewards Programs
Awad Younis, Yashwant Malaiya and Indrajit Ray
Defining Objectives For Preventing Cyberstalking
Gurpreet Dhillon, Chandrashekar Challa and Kane Smith
Session 2a: IFIP SEC - Cyber Infrastructure (session chair: Indrajit Ray)
Using Process Invariants to Detect Cyber Attacks on a Water Treatment System
Sridhar Adepu and Aditya Mathur
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud
Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens and Vincent Frey
Software Defined Networking Reactive Stateful Firewall
Salaheddine Zerkane, Fréderic Cuppens, David Espes and Philippe Le Parc
Session 2b: IFIP SEC - Human Aspects of Security II (session chair: Gurpreet Dhillon)
Teaching Phishing-Security: Which Way is Best?
Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack and Daniel Lehmann
On Gender Specific Perception of Data Sharing in Japan
Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki and Kai Rannenberg
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Melanie Volkamer, Karen Renaud and Benjamin Reinheimer
Session 3a: IFIP SEC - Social Networks (session chair: Carlos Rieder)
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks
Dieudonne Mulamba, Indrajit Ray and Indrakshi Ray
Collateral Damage in Online Social Networks: Apps, Friends and Privacy Interdependence
Iraklis Symeonidis, Fateme Shirazi, Gergely Biczók, Cristina Perez-Sola and Bart Preneel
Session 3b: Industrial Track (session chair: Bart De Decker)
Security Strategy of a Hyperscale Cloud Provider
Bruno Schroder, Microsoft
Detecting Crypto Currency Mining in Corporate Environments
Jan D'Herdt, IBM
Building a Powerful Capturing and Analysis System based on ELK, Docker and Netflow
Pieter Van Goethem, Cronos Security
Tuesday May 31st 2016
IFIP SEC Kristian Beckman Award
The Post-Snowden Threat Landscape - Bart Preneel
Session 4a: IFIP SEC - Software Vulnerabilities (session chair: Philippos Peleties)
Automated Source Code Instrumentation for Vulnerability Discovery
Hongzhe Li, Jaesang Oh, Hakjoo Oh and Heejo Lee
An Information Flow-based Taxonomy to Understand the Nature of Software Vulnerabilities
Daniela Oliveira, Jedidiah Crandall, Harry Kalodner, Nicole Morin, Megan Maher, Jesus Navarro and Felix Emiliano
Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Scanners
Enrico Bazzoli, Claudio Criscione, Federico Maggi and Stefano Zanero
Session 4b: IFIP WG11.5 Workshop - IT Assurance & Audit
Vision on the Future of IT Assurance
Abbas Shahim, chairman
The Soft Side of IT Project Management
René Hombergen
Controls for Digital Payment Services
Arne de Boer
Session 5a: IFIP SEC - TPM and Internet of Things (session chair: Yuko Murayama)
A Utility-based Reputation Model for the Internet of Things
Benjamin Aziz, Paul Fremantle, Rui Wei and Alvaro Arenas
Advanced Remote Firmware Upgrades Using TPM 2.0
Andreas Fuchs, Christoph Krauß and Jürgen Repp
Session 5b: IFIP WG11.5 Workshop - IT Assurance & Audit
A View on Assurance within Digital Information Chains
René Matthijsse
Information Assurance in the Modern Age
Stef Schinagl
IT Assurance Trends 2016
Barry Derksen
Session 6a: IFIP SEC - Sidechannel Analysis (session chair: Jerzy Nawrocki)
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng and Ziqiang Ma
Uncertainly? No, it's very certainly! Recovering the Key from Guessing Entropy enhanced side channel distinguishers
Changhai Ou, Wang Zhu, Degang Sun, Xinping Zhou and Juan Ai
Session 6b: IFIP WG11.5 Workshop - IT Assurance & Audit
The CIO in the Boardroom versus the Three Lines of Defense
Aart van der Vlist
Assessing the Security of Cyber-Physical Systems - a Logic-Based Approach
Laurens Lemaire
How to avoid fraudulent IT products violating Ethical Principles; Code of Conduct should order IT Audits
Sebastian Paans
Wednesday June 1st 2016
Session 7a: IFIP SEC - Software Security (session chair: Nora Cuppens)
Advanced or not? A comparative study of the use of anti-debugging and anti-VM techniques in generic and targeted malware
Ping Chen, Lieven Desmet, Christophe Huygens and Wouter Joosen
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
Yu-Yang Hong, Yu-Ping Wang and Jie Yin
A progress-sensitive flow-sensitive inlined information-flow control monitor
Andrew Bedford, Stephen Chong, Josee Desharnais and Nadia Tawbi
Session 7b: IFIP SEC - Privacy (session chair: Kai Rannenberg)
Deducing User Presence From Inter-Message Intervals in Home Automation Systems
Frederik Möllers and Christoph Sorge
Privacy by design principles in design of new generation cognitive assistive technologies
Ella Kolkowska and Annica Kristoffersson
A trustless privacy-preserving reputation system
Alexander Schaub, Omar Hasan, Rémi Bazin and Lionel Brunie
Invited Talk: The risk-based approach to privacy: prospects and challenges - Daniel Le Métayer
OSA Award
IFIP SEC Best Student Paper Award and Closing