Agenda & Program
Program
All sessions will be held at the Vienna University of Technology. Please find all details about the venue >>here<<.
[Preliminary Program Overview for printing]
[Preliminary Program for printing]
Accepted Papers
Technical Strand:
Authenticated encryption primitives for size-constrained trusted computing
Jan-Erik Ekberg (Nokia), Alexandra Afanasyeva (St Petersburg Univ. of Aerospace) and N. Asokan (Nokia)
Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing
Matt Smart (University of Birmingham) and Eike Ritter (University of Birmingham)
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms
Amit Vasudevan (CyLab/CMU), Bryan Parno (Microsoft Research), Ning Qu (Google Inc.), Virgil D. Gligor (CyLab/CMU) and Adrian Perrig (CyLab/CMU)
Experimenting with Fast Private Set Intersection
Emiliano De Cristofaro (UC Irvine) and Gene Tsudik (UC Irvine)
Reliable Device Sharing Mechanisms for Dual-OS Embedded Trusted Computing
Daniel Sangorrin (Nagoya University), Shinya Honda (Nagoya University) and Hiroaki Takada (Nagoya University)
Modelling User-Centered-Trust (UCT) in Software Systems
Zahid Hasan (University of Salzburg), Alina Krischkowsky (University of Salzburg), and Manfred Tscheligi (University of Salzburg)
Clockless Physical Unclonable Functions
Julian Murphy (Queens University Belfast)
Lightweight Distributed Heterogeneous Attested Android Clouds (LDHAAC)
Martin Pirker (IAIK / TU Graz), Johannes Winter (IAIK / TU Graz) and Ronald Toegl (IAIK / TU Graz)
Converse PUF-based Authentication
Ünal Kocabas (TU Darmstadt), Andreas Peter (TU Darmstadt), Stefan Katzenbeisser (TU Darmstadt) and Ahmad-Reza Sadeghi (TU Darmstadt)
Trustworthy Execution on Mobile Devices: What security properties can my mobile platform give me?
Amit Vasudevan (CyLab/CMU), Emmanuel Owusu (CyLab/CMU), Zongwei Zhou (CyLab/CMU), James Newsome (CyLab/CMU) and Jonathan M. McCune (CyLab/CMU)
Verifying System Integrity by Proxy
Joshua Schiffman (Pennsylvania State University), Hayawardh Vijayakumar (Pennsylvania State University) and Trent Jaeger (Pennsylvania State University)
Virtualization Based Password Protection Against Malware In Untrusted Operating Systems
Yueqiang Cheng (Singapore Management University and Xuhua Ding (Singapore Management University)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Alexandra Dmitrienko (Fraunhofer SIT Darmstadt), Ahmad-Reza Sadeghi (TU Darmstadt (CASED) and Fraunhofer SIT Darmstadt), Sandeep Tamrakar (Aalto University School of Science) and Christian Wachsmann (TU Darmstadt (CASED))
A Belief Logic for Analyzing Security of Web Protocols
Apurva Kumar (IBM Research)
Provenance-based Model for Verifying Trust-properties
Cornelius Namiluko (University of Oxford) and Andrew Martin (University of Oxford)
Socio-economic Strand:
On the Practicality of Motion Based Keystroke Infernce Attack
Liang Cai (UC Davis) and Hao Chen (UC Davis)
AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large Scale
Clint Gibler (UC Davis), Jonathan Crussell (UC Davis), Jeremy Erickson (UC Davis) and Hao Chen (UC Davis)
Why Trust Seals Don’t Work: A study of user perceptions and behavior
Iacovos Kirlappos (University College London), M. Angela Sasse (University College London) and Nigel Harvey (University College London)
Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns
Saijing Zheng (Pennsylvania State University, University Park), Pan Shi (Pennsylvania State University, University Park) and Heng Xu (Pennsylvania State University, University Park)
Knowledge protection in firms: Theory and evidence from HP Labs
Andrea Patacconi (University of Aberdeen), Joseph Swierzbinski (University of Aberdeen) and Julian Williams (University of Aberdeen)