Program

NordSec 2014 Conference Program

__________________________________
October 15th (Wednesday)
________________________________________________________

14:00 – 16:00: Registration

16.00 – 16:15: Welcome, Conference Opening (Karin Bernsmed, Simone Fischer-Hübner, Ragnar Soleng)

16:15 – 16:45: Security research and education at the University of Tromsø, Professor Randi Karlsen, Department of Informatics, UiT, Norway

16:45 – 18:30: Nordic PhD Poster Session (organized by COINS and SWITS)

Short (5 min) Poster Introductions (the main conference room):

  • Bart Van Delft and Pablo Buiras. Dynamic Enforcement of Dynamically Changing Policies
  • Roberto Vigo, Flemming Nielson and Hanne Riis Nielson. Availability by Design
  • Zaruhi Aslanyan and Flemming Nielson. Pareto Efficient Solutions of Attack Trees
  • Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson and Hanne Riis Nielson. Verification of Stateful Protocols, Set-based Abstractions in the Applied π-Calculus
  • Dijana Vukovic, Danilo Gligoroski and Zoran Djuric. Improvement proposal for the CryptoCloak application
  • Yi-Ching Liao and Hanno Langweg. Process Tracking for Forensic Readiness
  • Britta Hale and Colin Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
  • Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa and Benjamin I.P. Rubinstein. Differential Privacy and Private Bayesian Inference
  • Guillermo Rodríguez-Cano, Benjamin Greschbach and Sonja Buchegger. Event Invitations in Privacy-Preserving Decentralized Online Social Networks
  • Aysajan Abidin, Elena Pagnin and Aikaterini Mitrokotsa. Attacks on Privacy-Preserving Biometric Authentication

18:30: Welcome Reception (the main conference room)

__________________________________
October 16th (Thursday)
________________________________________________________

09:00 –10.00: Keynote 1: Accountability in Cloud Service Provision Ecosystems (Dr. Siani Pearson, HP Labs), chaired by Karin Bernsmed.

10:00 – 10:30: Coffee break

10:30 – 12:00: Paper session 1. Information management and data privacy, chaired by Bengt Carlsson, Blekinge Institute of Technology

  • Erik Bergström and Rose-Mharie Åhlfeldt. Information Classification Issues
  • Kalpana Gondi, A. Prasad Sistla and Venkat Venkatakrishnan. DEICS: Data Erasure In Concurrent Software
  • Dan Bogdanov, Sven Laur and Riivo Talviste. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation

12:00 – 13:00: Lunch (+ NordSec Steering Committee meeting)

13:00 – 15:10: Paper session 2: Cloud, big data and virtualization security, chaired by Peeter Laud, Cybernetica AS

  • Elena Reshetova, Janne Karhunen, Thomas Nyman and N. Asokan. Security of OS-level virtualization technologies
  • Alberto Trombetta, Giuseppe Persiano and Stefano Braghin. Processing private queries over an obfuscated database using hidden vector encryption

Short break

  • Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Haakon Jacobsen, Rune Erlend Jensen and Mohamed El-Hadedy. $\pi$-Cipher: Authenticated Encryption for Big Data
  • Julio Angulo, Erik Wästlund and Johan Högberg. What would it take for you to tell your secrets to a cloud?

15:10 – 15:30: Coffee break

15:30 – 17:00: Paper session 3: Network security and logging, chaired by Øyvind Ytrehus, University of Bergen

  • Ahto Buldas, Ahto Truu, Risto Laanoja and Rainer Gerhards. Efficient Record-Level Keyless Signatures for Logs
  • Marco Giunti. Static semantics of secret channel abstractions
  • Frédéric Besson, Nataliia Bielova and Thomas Jensen. Browser Randomisation against Fingerprinting: a Quantitative Information Flow Approach

17:00 – 19:00 Social event: Guided tour to the Polar Museum and to the Seal Hunting Wessel Polstjerna

20:00: Conference dinner

__________________________________
October 17th (Friday)
________________________________________________________

09:00 – 10.30: Paper session 4: Attacks and defenses, Chaired by Rose-Mharie Åhlfeldt

  • Aleksandr Lenin, Jan Willemson and Dyan Sari. Attacker profiling in quantitative security assessment based on attack trees
  • Aapo Kalliola, Tuomas Aura and Sanja Šćepanović. Denial-of-service mitigation for Internet services
  • Markku Antikainen, Tuomas Aura and Mikko Särelä. Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch

10:30 – 11:00: Coffee break

11:00 – 12:00: Keynote 2: Differential Privacy: Now it’s Getting Personal (Prof. David Sand, Chalmers University of Technology), chaired by Simone Fischer-Hübner

12:00 – 13:00: Lunch

13:00 – 14:00: Paper session 5: Security in healthcare and biometrics, Chaired by Tomas Olovsson, Chalmers

  • Liangyu Xu and Amin B. Cremers. Patients’ Privacy Protection against Insurance Companies in eHealth Systems
  • Anika Pflug and Christoph Busch. Segmentation and Normalization of Human Ears using Cascaded Pose Regression

14:00 – 14:15: Conference closing

 

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *