Program: Long papers (20 min), Short papers (15 min)

DAY 1: WEDNESDAY, JULY 23, 2014 (Two sessions)

  George Vari Engineering and Computing Centre (ENG), Ryerson University, 245 Church Street
ENG105 ENG-LG12
08:00-08:45 Registration
08:45-09:00 Opening Remarks
09:00-10:00
Keynote Talk I

Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada

Title: Get Smart: Embed Privacy, by Design to Avoid the Risk of Unintended Consequences

10:00-10:30 Coffee Break
10:30-12:10
Security I
"Business security and Security software Evaluation"
Chair: Saeed Samet
  • #158 "Zarathustra: Extracting WebInject Signatures from Banking Trojans" Claudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi
  • #120 "Quantifying the Financial Impact of IT Security Breaches on Business Processes: A CPN-based approach" Clemens Martin, Amina Kadry, Ghada Abu-Shady
  • #68 "Semi-Synthetic Data Set Generation for Security Software Evaluation" Florian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg
  • #121 "Towards Efficient Evaluation of XACML Policies" Azzam Mourad, Hussein Jebbaoui
  • #94 "An Integrated Memory Forensic Approach for Recovering Encryption Keys and BB10 Backup Decryption" Halima Al Shehhi, Dua'a Abu Hamdi, Izzeddin Asaad, Farkhund Iqbal
Trust I
"Trust models"
Chair: Robin Cohen
  • #129 "A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty" Khalid Bijon, Munirul Haque, Ragib Hasan
  • #21 "Validating trust models against realworld data sets" Noel Sardana, Robin Cohen
  • #75 "Demonstrating the value of credibility modeling for trust-based approaches to online message recommendation" Noel Sardana, Robin Cohen
  • #151 "TRAAC: Trust and Risk Aware Access Control" Chris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman
  • #28 "A typed natural deduction calculus to reason about secure trust (Short Paper)" Giuseppe Primiero, Franco Raimondi
12:10-14:00 Lunch (Pitman Hall Cafe)
14:00-15:20
Security II
"Authentication and Passwords"
Chair: Marina Gavrilova
  • #39 "Continuous Authentication using Micro-Messages" Marcelo Luiz Brocardo, Issa Traore
  • #91 "Improving Usability of Passphrase Authentication" Glen Nielsen, Michael Vedel, Christian D. Jensen
  • #80 "Secure VANET Applications with a refined Group Signature" Mohammad Mamun, Atsuko Miyaji
  • #22 "A Study of Mnemonic Image Passwords" Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
Security III
"Web Application security"
Chair: Issa Traore
  • #77 "Data-Centric Phishing Detection based on Transparent Virtualization Technologies" Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser
  • #153 "Clickjuggler: Checking for Incomplete Defenses against Clickjacking" Yusuke Takamatsu, Kenji Kono
  • #99 "Identifying Users with Application-Specific Command Streamss" Alaa El Masri, Harry Wechsler, Brent Byunghoon Kang, Peter Likarish
  • #136 "Granularity Based Flow Control" Omar Abahmane, Luigi Logrippo
15:20-15:50 Coffee Break
15:50-17:05
Privacy I
"Privacy for Mobile and Social Applications"
Chair: Natalija Vlajic
  • #142 "Can Apps Play by the COPPA rules?" Ilaria Liccardi, Monica Bulger, Hal Abelson, Daniel J. Weitzner, Wendy Mackay
  • #72 "Privacy-Preserving Mobility-Casting in Opportunistic Networks" Gianpiero Costantino, Fabio Martinelli, Paolo Santi
  • #104 "Undetectable Communication: The Online Social Networks Case" Filipe Beato, Emiliano De Cristofaro, Kasper B. Rasmussen
  • #84 "Building Privacy-preserving Location-based Apps (Short Paper)" Brian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentland
Trust II
"Perceptions of trustworthiness"
Chair: Steve Marsh
  • #12 "Two Trust Networks in One: Using Bipolar Structures to Fuse Trust and Distrust" Stefano Bistarelli, Francesco Santini
  • #43 "Communicating and Visualising Multicriterial Trustworthiness under Uncertainty" Florian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser
  • #89 "What can the hashtag #trust tell us about how users conceptualise trust? (Short Paper)" Natasha Dwyer, Stephen Marsh
  • #108 "Analyzing trustworthiness of Virtual Machines in Data-Intensive Cloud Computing (Short Paper)" Dipen Contractor, Dhiren Patel
18:00-21:00 Banquet Dinner (Atlantis)

DAY 2: THURSDAY, JULY 24, 2014 (Two sessions)

  George Vari Engineering and Computing Centre (ENG), Ryerson University, 245 Church Street
ENG105 ENG-LG12
08:00-08:50 Registration
08:50-09:00 Opening Remarks
09:00-10:00
Keynote Talk II

Dr. Rei Safavi-Naini, AITF Strategic Chair in Information Security and Professor of Computer Science, University of Calgary, Alberta, Canada

Title: Private Communication without Computational Assumptions

10:00-10:30 Coffee Break
10:30-11:30
Privacy II
"Privacy Leaks"
Chair: Joaquin Garcia-Alfaro
  • #139 ""You are what you play": Breaching privacy and identifying users in online gaming" Dragana Martinovic, Victor Ralevich, Joshua Mcdougall, Michael Perklin
  • #83 "Inferring Social Relationships from Technology-Level Device Connections" Jason Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese
  • #55 "MindYourPrivacy: Design and Implementation of a Visualization System for Third-Party Web Tracking" Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue
Privacy III
"Privacy-oriented Cryptography"
Chair: Saeed Samet
  • #59 "A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations" Fabian Förg, Daniel Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer
  • #58 "Direct Anonymous Attestation in Practice: Implementation and Efficient Revocation" Li Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang
  • #47 "Using Biometric Key Commitments to Prevent Unauthorized Lending of Cryptographic Credentials" David Bissessar, Carlisle Adams, Dong Liu
11:30-12:30
Privacy IV
"Privacy-focused Data Analysis"
Chair: Victor Ralevich
  • #16 "Mining YouTube Metadata for Detecting Privacy Invading Harassment and Misdemeanor Videos" Nisha Aggarwal, Swati Agarwal, Ashish Sureka
  • #25 "Who Uses Bitcoin? An exploration of the Bitcoin community" Jeremiah Bohr, Masooda Bashir
  • #73 "Desperately Seeking Assurances: Segmenting Users by their Information-Seeking Preferences" Anthony Morton, Angela Sasse
Privacy V
"Privacy-Preserving Frameworks"
Chair: Natalia Stakhanova
  • #62 "Private Intersection of Regular Languages" Roberto Guanciale, Dilian Gurov, Peeter Laud
  • #45 "Enabling Privacy Through Transparency" Oshani Seneviratne, Lalana Kagal
  • #52 "Privacy-Respecting Digital Investigation" Ali Dehghantanha, Katrin Franke
12:30-14:00 Lunch (Pitman Hall Cafe)
14:00-15:20
Security IV
"Malware and Malicious Detection"
Chair: Miguel Vargas Martin
  • #85 "Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware" Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz
  • #119 "P–SPADE: GPU accelerated malware packer detection" Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Gaur and Muttukrishnan Rajarajan
  • #86 "Detection and Mitigation Of Malicious JavaScript Using Information Flow Control" Bassam Sayed, Issa Traore, Amany Abdelhalim
  • #117 "Secure Exams despite Malicious Management" Giampaolo Bella, Rosario Giustolisi and Gabriele Lenzini
Security V
"Mobile security and Protocols security"
Chair: Marijke Coetzee
  • #97 "Another Free App: Does It Have the Right Intentions" Mohamed Fazeen, Ram Dantu
  • #125 "Specifying and Enforcing Constraints in Dynamic Access Control Policies" Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam
  • #74 "Design Requirements to Counter Parallel Session Attacks in Security Protocols" Anca Jurcut, Tom Coffey, Reiner Dojen
  • #29 "Automata-Based Approach to Design and Analyze Security Policies" Wadie Krombi, Mohammed Erradi, Ahmed Khoumsi
15:20-15:40 Coffee Break
15:40-17:10
Security VI
"Encryption and Secret Sharing"
Chair: Natalia Stakhanova
  • #50 "Efficient Verification of Data Encryption on Cloud Servers" Keji Hu, Wensheng Zhang
  • #19 "Assessing cryptographic signature schemes from a legal perspective" Dan T.F. Chan, Lucas C.K. Hui, S.M. Yiu
  • #88 "Distributed Searchable Symmetric Encryption" Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter Hartel, Willem Jonker
  • #96 "Generalization of Socio-Rational Secret Sharing with a New Utility Function (Short Paper)" Mehrdad Nojoumian
  • #27 "Crypto-Assistant: Towards Facilitating Developer’s Encryption of Sensitive Data (Short Paper)" Ricardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin
Trust III
"Reputation systems"
Chair: Thomas Tran
  • #114 "i/k-Contact: a context-aware user authentication using physical social trust" Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba
  • #107 "Weighting Peer Reviewers" Arnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi
  • #135 "TRUSTcv: Reputation-based trust for collectivist digital business ecosystems (Short Paper)" Donovan Isherwood, Marijke Coetzee