NordSec 2013

Program

 
18 October 2013
16:15 - 16:30Welcome
Formal analysis of security protocols
16:30 - 17:30  Basin. Developing Security Protocols by Refinement
17:30 - 18:30  Barthe. Towards Verified Implementations of Cryptographic Constructions
18:30 - 19:00  Panel: The difficult problems are those that no one is working on [Jim Massey]: security research vs security practice
19 October 2013
Cyber-Physical Systems
09:00 - 09:30  Di Mauro, Fafoutis, Mödersheim, Dragoni. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs
09:30 - 10:00  Vigo, Bruni, Yüksel. Security Games for Cyber-Physical Systems
10:00 - 10:30  Burgers, Verdult, van Eekelen. Prevent session hijacking by binding the session to the cryptographic network credentials
Security Policies
11:00 - 11:30  Hasu, Bagge, Haveraaen. Inferring Required Permissions for Statically Composed Programs
11:30 - 12:00  Ter Louw, Phung, Krishnamurti, Venkatakrishnan. SAFESCRIPT: JavaScript transformation for policy enforcement
First optional excursion
Information Flow
16:00 - 16:30  Balliu. A Logic for Information Flow Analysis of Distributed Programs
16:30 - 17:00  Pettai, Laud. Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus
17:00 - 17:15  Buiras, Russo. Lazy Programs Leak Secrets
Security Experiences
17:30 - 18:00  Ansper, Buldas, Freudenthal, Willemson. High-performance qualified digital signatures for X-Road
18:00 - 18:30  Carlsson, Ayalew, Kidane. Identification and Evaluation of Security Activities in Agile Projects
18:30 - 18:45  Nagy, Asokan, Ott. PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts
20 October 2013
Cyber-Physical Systems
09:00 - 09:30  Krotofil, Cárdenas. Resilience of Process Control Systems to Cyber-Physical Attacks
09:30 - 10:00  Van Den Broek, Wichers Schreur. Femtocell Security in Theory and Practice
10:00 - 10:30  Antonini, Barenghi, Pelosi. Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques
Web Security
11:00 - 11:30  Sans, Cervesato, Hussein. Controlling Data Flow with a Policy-Based Programming Language for the Web
11:30 - 12:00  Braun, Pollak, Posegga. A Survey on Control-Flow Integrity Means in Web Application Frameworks
Second optional excursion
Security Policies
16:00 - 16:30  Milushev, Clarke. Incremental hyperproperty model checking via games
16:30 - 17:00  Stokes. Graph k-Anonymity through k-Means and as Modular Decomposition
Network Security
17:15 - 17:45  Paladi, Gehrmann, Morenius. Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds
17:45 - 18:15  Hachem, Garcia-Alfaro, Debar. An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies
18:15 - 18:30  Buldas, Kroonmaa, Laanoja. Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees