|
Stream 1 |
Stream 2 |
Tuesday 18.09.2018 |
8:00 |
Congress registration desk open |
9:30 |
SEC Opening session, room 6CW
SEC Keynote: Krystian Matusiewicz
Cryptographic failures: how and why they happen
|
11:00 |
coffee break |
11:30 |
WCC Opening |
12:00 |
Keynote WCC |
13:00 |
lunch break |
14:30 |
SEC Session 1: Authentication weaknesses, room 6CW |
SEC Session 2: Privacy, room 12CW |
|
chair: Krystian Matusiewicz
-
Paolo D'Arco and Roberto De Prisco.
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols
-
Nils Wisiol and Marian Margraf.
Attacking RO-PUFs with Enhanced Challenge-Response Pairs
- Johannes Feichtner.
Hunting Password Leaks in Android Applications
|
chair: Mirosław Kutyłowski
- Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter and Sebastian Pape.
Assessing Privacy Policies of Internet of Things Services
-
Ioanna Topa and Karyda Maria.
Usability Characteristics of Security and Privacy Tools: the User's Perspective
- David Harborth and Sebastian Pape.
JonDonym Users' Information Privacy Concerns
|
16:00 |
coffee break |
16:30-18:00 |
SEC Session 3: Security of systems, room 6CW |
SEC Session 4: Passwords, room 12CW |
|
chair: Lech Janczewski
- Clemens Sauerwein, Christian Sillaber, Michael Huber, Andrea Mussmann and Ruth Breu.
The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter
-
Alexander Marsalek, Christian Kollmann and Thomas Zefferer.
A Security Analysis of FirstCoin
- Richard Baker and Ivan Martinovic.
EMPower : Detecting Malicious Power Line Networks from EM Emissions
|
chair: Yuko SJ Murayama
-
Weizhi Meng, Fei Fei, Lijun Jiang, Zhe Liu, Chunhua Su and Jinguang Han.
CPMap: Design of Click-Points Map-based Graphical Password Authentication
- Pardon Blessings Maoneke, Stephen Flowerday and Naomi Isabirye.
The Influence of Native Language on Password Composition and Security: A Socioculture Theoretical View
- Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford and Saurabh Bagchi.
A Hypergame Analysis for ErsatzPasswords
|
Wednesday 19.09.2018 |
8:00 |
Congress registration desk open |
9:30 |
SEC Session 5: Data protection, room 6CW |
|
|
chair: Jan Camenisch
-
Wei Chen, Yuhui Lin, Vashti Galpin, Vivek Nigam, Myungjin Lee and David Aspinall.
Formal Analysis of Sneak-Peek: A Data Centre Attack and its Mitigations
-
Milan Brož, Mikuláš Patočka and Vashek Matyáš.
Practical Cryptographic Data Integrity Protection with Full Disk Encryption
- Mariem Graa, Ivan Marco Lobe Kome,
Nora Cuppens-Boulahia,
Frédéric Cuppens
and Vincent Frey.
Detection and response to Data Exfiltration from Internet of Things Android Devices
|
|
11:00 |
cofeee break |
11:30 |
Keynote WCC: Jan Camenisch, room: Aula Magna |
12:30 |
lunch break |
14:00 |
SEC Session 6: Security in Web, room 6CW |
|
|
chair: Kai Rannenberg
-
Keeyoung Kim and Simon Woo.
When George Clooney is not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs
- Juan D. Parra Rodriguez, Eduard Brehm and Joachim Posegga.
When Your Browser Becomes The Paper Boy: An Anonymous Browser Network
- Jukka Ruohonen, Joonas Salovaara and Ville Leppänen.
On the Integrity of Cross-Origin JavaScripts
|
|
15:30 |
coffee break |
16:00-18:00 |
SEC Session 7: Malware, room 6CW |
|
|
chair: Nora Cuppens
- Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon and Apostolis Zarras.
Smashing the Stack Protector for Fun and Profit
-
Sergej Proskurin, Julian Kirsch and Apostolis Zarras.
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
-
Mayank Agarwal, Rami Puzis, Jawad Haj-Yahya, Polina Zilberman and Yuval Elovici.
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides its Network Traffic
|
|
19:00 |
WCC Congress Dinner |
Thursday 20.09.2018 |
8:00 |
Congress registration desk open |
9:30 |
SEC Session 8: Data analysis, room 6CW |
SEC Session 9: Behavior and side channels, room 12CW |
|
chair: Frédéric Cuppens
- Choongin Lee, Jeonghan Bae and Heejo Lee.
PRETT: Protocol Reverse Engineering Using Binary Tokens and Network Traces
-
Giacomo Giorgi, Fabio Martinelli, Andrea Saracino and Mina Sheikhalishahi.
Walking Through the Deep: Gait Analysis for User Authentication through Deep Learning
- Ganbayar Uuganbayar, Artsiom Yautsiukhin and Fabio Martinelli.
Optimal Security Configuration for Cyber Insurance
|
chair: Jukka Ruohonen
- Jens Lindemann and Mathias Fischer.
Efficient Identification of Applications in Co-Resident VMs via a Memory Side-Channel
- Gheorghe Florin, Gheorghe Hăjmăşan,
Alexandra Mondoc, Radu Marian Portase and
Octavian Creț.
Performance Improvements in Behavior Based Malware Detection Solutions
-
Yuri Gil Dantas, Richard Gay, Tobias Hamann, Heiko Mantel and Johannes Schickel.
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior
-
|
11:00 |
coffee break |
14:00 |
SEC Closing Session, room 6CW |