Program

Tuesday, September 6, 2011
Room 102 Room 104 Room 111
9:00 - 9:15 Opening and Welcome Remarks (room 211)
9:15 - 10:15 Keynote: Javier Lopez
Privacy in Wireless Sensor Networks (room 211)
10:15 - 10:45 Coffee Break
10:45 - 12:45 NSS
Client-side Vulnerabilities
NSS
Intrusion Detection
ICDKE
12:45 - 14:00 Lunch
14:00 - 15:30 NSS
Web security
NSS
Authentication and Watermarking Systems
ICDKE
15:30 - 16:00 Coffee Break
16:00 - 17:40 NSS
Key Management
NSS
Authentication
ICDKE
(ending at 18:10)
18:30 - 19:30 Welcome Cocktail (Loggiato del Rettore, via Festa del Perdono 7, Milano)
Wednesday, September 7, 2011
Room 102 Room 104 Room 111
9:15 - 10:15 Keynote: Ernesto Damiani
Toward Certifiably Secure Services (room 211)
10:15 - 10:45 Coffee Break
10:45 - 12:45 NSS
Security in Cloud and Peer to Peer Systems
NSS
Network Security
IWSSC
Security Validation and Verification
12:45 - 14:00 Lunch
14:00 - 15:30 NSS
Access Control
NSS
Hardware-based Security
IWSSC
Security and Trust
15:30 - 16:00 Coffee Break
16:00 - 17:40 NSS
Wi-Fi and Network security
NSS
Emerging Scenarios and e-Services
IWSSC
Security Mechanisms
19:45 Social Dinner (Restaurant "Isola dei Sapori", via Anfossi 10, Milano)
Thursday, September 8, 2011
Room 102 Room 104 Room 111
9:15 - 10:15 NSS
Risk Assessment and Usability
STAST
Invited Speaker: Luca Vigano
CSS
(starting at 9:00)
Cyberspace Safety and
Security Systems
10:15 - 10:45 Coffee Break
10:45 - 12:45 NSS
Malicious Code and Security Analysis
STAST
Security and Trust Models with Social/Human Aspect
CSS
Cyber Security Practices and Applications
12:45 - 14:00 Lunch
14:00 - 15:30 MOSN
(starting at 13:45)
Mobile and Online Social Networks
STAST
Security and Trust for Socio-Technical Systems
CMS
(ICDKE workshop)
15:30 - 16:00 Coffee Break
16:00 - 17:40  
 
STAST
Social/Human Perception of Security and Trust
 
 

Detailed NSS Program:

Tuesday, September 6, 2011

10:45 - 12:45 Client-side Vulnerabilities (chair: Roy Campbell)

Defeating Pharming Attacks at the Client-Side
Sophie Gastellier-Prevost and Maryline Laurent
Automated Extraction of Polymorphic Virus Signatures Using Abstract Interpretation
Serge Chaumette, Olivier Ly, and Renaud Tabary
Modeling Worms Propagation on Probability
Yini Wang, Sheng Wen, and Yang Xiang
Detecting Infection Onset With Behavior-Based Policies
Kui Xu, Danfeng Yao, Qiang Ma, and Alexander Crowell

10:45 - 12:45 Intrusion Detection (chair: David Zage)

A Misuse-Based Network Intrusion Detection System Using Temporal Logic and Stream Processing
Abdulbasit Ahmed, Alexei Lisitsa, and Clare Dixon
A Holistic Methodology for Evaluating Wireless Intrusion Detection Systems
Khalid Nasr, Anas Abou El Kalam, and Christian Fraboul
A Grid-Based Clustering for Low-Overhead Anomaly Intrusion Detection
Yang Zhong, Hirohumi Yamaki, and Hiroki Takakura
Towards Ground Truthing Observations in Gray-Box Anomaly Detection
Jiang Ming, Haibin Zhang, and Debin Gao

14:00 - 15:30 Web Security (chair: Debin Gao)

Privacy-enhanced Identity via Browser Extensions and Linking Services
Renato Accornero, Daniele Rispoli, and Francesco Bergadano
Reactive Non-Interference for a Browser Model
Nataliia Bielova, Dominique Devriese, Fabio Massacci, and Frank Piessens
Tracking End-Users in Web Databases
Boris Rozenberg, Yaron Gonen, Ehud Gudes, Erez Shmueli, and Nurit Gal-Oz

14:00 - 15:30 Authentication and Watermarking Systems (chair: Miodrag Potkonjak)

KL-F: Karhunen-Loève Based Fragile Watermarking
Marco Botta, Davide Cavagnino, and Victor Pomponiu
Designing Secure RFID Authentication Protocols is (still) a Non-Trivial Task
Panagiotis Rizomiliotis, Evangelos Rekleitis, and Stefanos Gritzalis
Make Mine a Quadruple: Strengthening the Security of Graphical One-Time PIN authentication
Ravi Jhawar, Philip Inglesant, Nicolas Courtois, and M. Angela Sasse

16:00 - 17:40 Key Management (chair: Xiaohui (Daniel) Tao)

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks
Tony Cheneau, Andrei Vlad Sambra, and Maryline Laurent
Automatic Security Verification for 3-Party Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, and Yutaka Miyake
On the Security of the ECKE-1N and EECKE-1N Elliptic-Curve Key Agreement Protocols
Maurizio Adriano Strangio
Channel State Information based Key Generation vs. Side-Channel Analysis Key Information Leakage
Huiyun Li, Qi Zhang, and Hai Yuan
A Microcontroller SRAM-PUF
Christoph Boehm, Maximilian Hofer, and Wolfgang Pribyl

16:00 - 17:40 Authentication (chair: Claudio A. Ardagna)

SMS Linguistic Profiling Authentication on Mobile Devices
Hataichanok Saevanee, Nathan L. Clarke, and Steven M. Furnell
User-Representative Feature Selection for Keystroke Dynamics
Eesa Al Soalmi, Colin Boyd, Andrew Clark, and Irfan Ahmed
STORK e-Privacy and Security
Vasilis Koulolias, Athanasios Kountzeris, Alberto Crespo, Herbert Leitold, Bernd Zwattendorfer, and Marc Stern
Towards a Metric for Recognition-Based Graphical Password Security
Rosanne English and Ron Poet
RCHB: A Light-weight, Provably-secure Variant of the HB Protocol Using Rotation and Complementation
Samia A. Ali, Refaat M. Mohamed, and Mahmoud H. Fahim

Wednesday, September 7, 2011

10:45 - 12:45 Security in Cloud and Peer to Peer Systems (chair: Christian Grothoff)

CloudSec: A Security Monitoring Appliance for Virtual Machines in the IaaS Cloud Model
Amani S. Ibrahim, James Hamlyn-Harris, John Grundy, and Mohamed Almorsy
An Efficient VM-based Software Protection
Amir Averbuch, Michael Kiperberg, and Nezer Jacob Zaidenberg
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays
David Zage, Charles Killian, and Cristina Nita-Rotaru
Improving P2P IPTV Random Peers Search Through User Similarity
Alessio Bonti, Ming Li, and Wen Shi

10:45 - 12:45 Network Security (chair: Anas Abou El Kalam)

A Distributed Client-Puzzle Mechanism to Mitigate Bandwidth Attacks
Mazdak Alimadadi and Mehran S. Fallah
Towards Safe and Optimal Filtering Rule Reordering for Complex Packet Filters
Nizar Ben Neji and Adel Bouhoula
DANAK: Finding the Odd!
Cynthia Wagner, Jérôme François, Radu State, and Thomas Engel
A Novel Semi-Supervised Approach for Network Traffic Clustering
Yu Wang, Yang Xiang, Jun Zhang, and Shunzheng Yu

14:00 - 15:30 Access Control (chair: Philip Inglesant)

A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework
Nathalie Baracaldo, Amirreza Masoumzadeh, and James Joshi
Model-based Safety Analysis of SELinux Security Policies
Peter Amthor, Winfried E. Kühnhauser, and Anja Pölck
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations
Steffen Bartsch

14:00 - 15:30 Hardware-based Security (chair: Florian Kerschbaum)

Scalable Consistency-based Hardware Trojan Detection and Diagnosis
Sheng Wei and Miodrag Potkonjak
FORTUNA - A Probabilistic Framework for Early Design Stages of Hardware-Based Secure Systems
Roberto Gallo, Henrique Kawakami, and Ricardo Dahab
Attack-resilient Compliance Monitoring for Large Distributed Infrastructure Systems
Mirko Montanari and Roy Campbell

16:00 - 17:40 Wi-Fi and Network Security (chair: Hiroki Takakura)

Enhancement of ZigBee and Wi-Fi Decurity by a Robust and Fast Chaotic Algorithm
Bassem Bakhache, Joseph Ghazal, and Safwan El-Assad
Flooding Attacks Against Network Coding and Countermeasures
Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, and Marine Minier
Avoiding DDoS with Active Management of Backlog Queues
Martine Bellaiche, and Jean-Charles Grégoire
R5N : Randomized Recursive Routing for Restricted-Route Networks
Nathan S. Evans and Christian Grothoff
Analysis of Prefix Hijacking Based on AS Hierarchical Model
Bo-Feng Zhang, Yuan Li, Yu-Jing Liu, and Jin-Shu Su

16:00 - 17:40 Emerging Scenarios and e-Services (chair: James Joshi)

Data Control in Social Networks
Robert Koch, Dominik Holzapfel, and Gabi Dreo Rodosek
Trustable Outsourcing of Business Processes to Cloud Computing Environments
Sami Alsouri, Stefan Katzenbeisser, and Sebastian Biedermann
Secure Conjunctive Keyword Searches for Unstructured Text
Florian Kerschbaum
The Power of Credit Card Numbers and Long CVVs
Valentim Oliveira and Tito Silva
A Privacy-Preserving eID Based Single Sign-On Solution
Thomas Zefferer, Arne Tauber, and Bernd Zwattendorfer

Thursday, September 8, 2011

9:15 - 10:15 Risk Assessment and Usability (chair: Giovanni Livraga)

Modelling Self-protected Networks and Dynamic Systems
Marta Fernández-Diego and Julián Marcelo-Cocho
A Conceptual Framework for Evaluating Usable Security in Authentication Mechanisms - Usability Perspectives
Martin Mihajlov, Borka Jerman-Blazic, and Saso Josimovski
Usability of Internet Security Software: Have They Got it Right?
Patryk Szewczyk

10:45 - 12:45 Malicious Code and Security Analysis (chair: Sara Foresti)

Semi-supervised Learning for Packed Executable Detection
Xabier Ugarte-Pedrero, Igor Santos, Pablo G. Bringas, Mikel Gastesi, and José Miguel Esparza
A Propagation Model of A Vulnerability Mitigation Computer Worm - Seawave
Ziyad Al-Salloum and Stephen Wolthusen
Towards Improving Security Testability of AADL Architecture Models
Ayda Saidane and Nicolas Guelfi
Reconstructing Security Types for Automated Policy Enforcement in FABLE
Arash Afshar, and Mehran S. Fallah
Measuring the Revised Guessability of Graphical Passwords
Rosanne English and Ron Poet

 

The 5th International Conference on Network and System Security
Copyright © 2011 NSS 2011. All rights reserved.

Locations of visitors to this page