NordSec 2014 Conference Program
October 15th (Wednesday)
14:00 – 16:00: Registration
16.00 – 16:15: Welcome, Conference Opening (Karin Bernsmed, Simone Fischer-Hübner, Ragnar Soleng)
16:15 – 16:45: Security research and education at the University of Tromsø
16:45 – 18:30: Nordic PhD Poster Session (organized by COINS and SWITS)
Short (5 min) Poster Introductions (the main conference room):
• Bart Van Delft and Pablo Buiras. Dynamic Enforcement of Dynamically Changing Policies
• Roberto Vigo, Flemming Nielson and Hanne Riis Nielson. Availability by Design
• Zaruhi Aslanyan and Flemming Nielson. Pareto Efficient Solutions of Attack Trees
• Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson and Hanne Riis Nielson. Verification of Stateful Protocols, Set-based Abstractions in the Applied π-Calculus
• Dijana Vukovic, Danilo Gligoroski and Zoran Djuric. Improvement proposal for the CryptoCloak application
• Yi-Ching Liao and Hanno Langweg. Process Tracking for Forensic Readiness
• Britta Hale and Colin Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol
• Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa and Benjamin I.P. Rubinstein. Differential Privacy and Private Bayesian Inference
• Guillermo Rodríguez-Cano, Benjamin Greschbach and Sonja Buchegger. Event Invitations in Privacy-Preserving Decentralized Online Social Networks
• Aysajan Abidin, Elena Pagnin and Aikaterini Mitrokotsa. Attacks on Privacy-Preserving Biometric Authentication

18:30: Welcome Reception (the main conference room)
October 16th (Thursday)
09:00 –10.00: Keynote 1: Accountability in Cloud Service Provision Ecosystems (Dr. Siani Pearson, HP Labs)
10:00 – 10:30: Coffee break
10:30 – 12:00: Paper session 1. Information management and data privacy
• Erik Bergström and Rose-Mharie Åhlfeldt. Information Classification Issues
• Kalpana Gondi, A. Prasad Sistla and Venkat Venkatakrishnan. DEICS: Data Erasure In Concurrent Software
• Dan Bogdanov, Sven Laur and Riivo Talviste. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation
12:00 – 13:00: Lunch (+ NordSec Steering Committee meeting)
13:00 – 15:10: Paper session 2: Cloud, big data and virtualization security
• Elena Reshetova, Janne Karhunen, Thomas Nyman and N. Asokan. Security of OS-level virtualization technologies
• Alberto Trombetta, Giuseppe Persiano and Stefano Braghin. Processing private queries over an obfuscated database using hidden vector encryption
Short break
• Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Haakon Jacobsen,Rune Erlend Jensen and Mohamed El-Hadedy. $\pi$-Cipher: Authenticated Encryption for Big Data
• Julio Angulo, Erik Wästlund and Johan Högberg. What would it take for you to tell your secrets to a cloud?
15:10 – 15:30: Coffee break
15:30 – 17:00: Paper session 3: Network security and logging
• Ahto Buldas, Ahto Truu, Risto Laanoja and Rainer Gerhards. Efficient Record-Level Keyless Signatures for Logs
• Marco Giunti. Static semantics of secret channel abstractions
• Frédéric Besson, Nataliia Bielova and Thomas Jensen. Browser Randomisation against Fingerprinting: a Quantitative Information Flow Approach
17:00 – 19:00 Social event: Excursion
20:00: Conference dinner
October 17th (Friday)
09:00 – 10.30: Paper session 4: Attacks and defenses
• Aleksandr Lenin, Jan Willemson and Dyan Sari. Attacker profiling in quantitative security assessment based on attack trees
• Aapo Kalliola, Tuomas Aura and Sanja Šćepanović. Denial-of-service mitigation for Internet services
• Markku Antikainen, Tuomas Aura and Mikko Särelä. Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch
10:30 – 11:00: Coffee break
11:00 – 12:00: Keynote 2: Differential Privacy: Now it’s Getting Personal (Prof. David Sand, Chalmers University of Technology)
12:00 – 13:00: Lunch
13:00 – 14:00: Paper session 5: Security in healthcare and biometrics
• Liangyu Xu and Amin B. Cremers. Patients’ Privacy Protection against Insurance Companies in eHealth Systems
• Anika Pflug and Christoph Busch. Segmentation and Normalization of Human Ears using Cascaded Pose Regression
14:00 – 14:15: Conference closing

Leave a Reply

Your email address will not be published. Required fields are marked *