NordSec 2011 Conference Program

Wednesday, October 26th

17:30 - 19:30 welcome reception and poster session

Thursday, October 27th

9:00 - 9:15 Peeter Laud. Welcome
Session 1 (chair: Peeter Laud)
9:15 - 9:45 Hakem Beitollahi. A Ring Based Onion Circuit for Hidden Services
9:45 - 10:15 Jaydip Sen and Subhamoy Maitra. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
10:15 - 10:45 Radu Lupu, Eugen Borcoci and Tinku Rasheed. Identity-based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service
10:45 - 11:00 Kristjan Valur Jonsson and Ymir Vigfusson. Securing Distributed Aggregation with Trusted Devices
11:00 - 11:30 Coffee Break
Session 2 (chair: Raimundas Matulevičius)
11:30 - 12:30 Arne Ansper. Designing a Governmental Backbone (invited talk)
12:30 - 12:45 Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC
12:45 - 13:00 Monika Desoi, Matthias Pocs and Benjamin Stach. The “Three-Step-Model” – Legally Compatible Design of Future Biometric Systems for Crime Prevention
13:00 - 14:00 Lunch
Session 3 (chair: Erland Jonsson)
14:00 - 14:30 Jordi Cucurull, Simin Nadjm-Tehrani and Massimiliano Raciti. Modular anomaly detection for smartphone ad-hoc communication
14:30 - 15:00 Assem Nazar, Mark M. Seeger and Harald Baier. Rooting Android  —  Extending the ADB by an Auto-Connecting WiFi-Accessible Root Service
15:00 - 15:15 Benedikt Westermann, Lars Fischer, Vinh Pham and Dogan Kesdogan. 50 Bucks Attack on Tor
15:15 - 15:30 Hanno Langweg. Comparison of Malware Protection of Electronic Signature Applications
15:30 - 15:45 Igor Kotenko, Alexey Konovalov and Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments
15:45 - 16:15 coffee break
Session 4 (chair: Dominique Unruh)
16:15 - 16:45 Deian Stefan, David Mazieres, John Mitchell and Alejandro Russo. Disjunction Category Labels
16:45 - 17:15 Frédérick Lemay, Raphael Khoury and Nadia Tawbi. Optimized Inlining of Runtime Monitors
17:15 - 17:30 Ashar Javed. CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications
19:00 - late Dinner in restaurant “Troika”, Town Hall Square

Friday, October 28th

Session 5 (chair: Igor Kotenko)
9:15 - 9:45 Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to speed up Malware Classification
9:45 - 10:15 Kirsi Helkala and Nils Kalstad Svendsen. Security and Memorability Analysis of Passwords Generated by Using Association Element and Personal Factor
10:15 - 10:45 Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga. Methods for Privacy Protection Considering Status of Service Provider and User Community
10:45 - 11:15 coffee break
Session 6 (chair: Jan Willemson)
11:15 - 12:15 Priit Vinkel. Internet Voting in Estonia: the current system, emerged issues and future developments (invited talk)
12:15 - 12:45 Jérôme Dossogne and Frédéric Lafitte. Mental Voting Booths
12:45 - 13:00 Dalia Khader, Ben Smyth, Peter Ryan and Feng Hao. A Fair and Robust Voting System by Broadcast
13:00 - 14:00 Lunch
Session 7 (chair: Svein Johan Knapskog)
14:00 - 14:30 Erich Wenger and Michael Hutter. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations
14:30 - 15:00 Mathias Claes, Vincent Van Der Leest and An Braeken. Comparison of SRAM and D Flip-Flop PUFs in 65nm technology
15:00 - 15:30 coffee break
Session 8 (chair: Bengt Carlsson)
15:30 - 16:00 Inger Anne Tøndel. Visualization Control for Event-Based Public Display Systems used in a Hospital Setting
16:00 - 16:30 Elahe Kani-Zabihi and Martin Helmhout. Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features
16:30 - 17:00 Károly Boda, Ádám Máté Földes, Gábor György Gulyás and Sándor Imre. User Tracking on the Web via Cross-Browser Fingerprinting
17:00 - 17:15 Adjourns