Monday, August 24 | |
---|---|
08:00 – 17:00 | Registration desk open |
09:15 – 10:45 | Parallel Sessions – ARES EU Symposium |
ARES EU Symposium – AU2EU I 1. Invited Talk by Jan Camenisch, IBM Research Anonymous Authentication in a Cloud Context Abstract 2. AU2EU: Integrated eAuthentication and eAuthorization platform for Collaborative Services (presentation only) Milan Petkovic 3. A secure integrated platform for rapidly formed multiorganisation collaboration John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen 4. Attribute Based Authentication and Authorization for Collaborative Services Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens ARES EU Symposium – FCCT I ARES EU Symposium – STAM I – Security Testing and Monitoring Solutions |
|
10:45 – 11:15 | Coffee Break |
11:15 – 12:45 | Parallel Sessions – ARES EU Symposium |
ARES EU Symposium – AU2EU II 1. Virtual Machine Introspection_c_ Techniques and Applications Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud 2. The Measurement of Data Locations in the Cloud Ulrich Waldmann, Annika Selzer, Sebastian Luhn, Reiner Kraft, Bernd Jaeger 3. Nomad: A Framework for Developing Mission-Critical Cloud-based Applications Mamadou Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach ARES EU Symposium – FCCT II ARES EU Symposium – STAM II – Security in Virtualized and Cloud environments |
|
12:45 – 14:00 | Lunch |
14:00 – 14:20 | Plenary Session |
14:20 – 15:50 | Opening
ARES Full I – Best Paper Session |
15:50 – 16:20 | Coffee Break |
16:20 – 17:50 | Parallel Sessions |
ARES EU Symposium Get2Gether and Poster Session ARES Full II – Identity and Privacy Workshop IWCC I – Cyber Crime Techniques & Prevention I |
|
18:30 – 22:00 | Mayor’s Reception City Hall Toulouse Details |
Tuesday, August 25 | |
---|---|
08:00 – 17:00 | Registration desk open |
09:00 – 09:45 | Plenary Session |
Invited Talk
Afonso Ferreira, European Commission |
|
09:45 – 10:45 | Plenary Session |
Keynote
Peter Eckersley, EFF Technology Projects Director |
|
10:45 – 11:15 | Coffee Break |
11:15 – 12:45 | Parallel Sessions |
ARES Full III – Networks and Protocols 1. Accountable Redactable Signatures Henrich C. Pöhls, Kai Samelin 2. Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks Shane Clark, Aaron Paulos, Brett Benyo, Partha Pal, Rick Schantz 3. The Role and Security of Firewalls in IaaS Cloud Computing Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar Weippl Workshop IWCC II – Cyber Crime Techniques & Prevention II Workshop MFSec I – Web & social media data analytics for privacy awareness and terrorist-related content identification |
|
12:45 – 14:00 | Lunch |
14:00 – 15:30 | Parallel Sessions |
ARES Full IV – Software Security 1. Fair fingerprinting protocol for attesting software misuses Raphael Machado, Davidson Boccardo, Vinícius de Sá, Jayme Szwarcfiter 2. Uncovering Use-After-Free Conditions In Compiled Code David Dewey, Bradley Reaves, Patrick Traynor 3. All-Solution Satisfiability Modulo Theories: applications, algorithms and benchmarks Quoc-Sang Phan, Pasquale Malacaria Workshop IWCC III – Information Hiding I Workshop MFSec II – Forensic analysis of audiovisual data |
|
15:30 – 16:00 | Coffee Break |
16:00 – 17:30 | Parallel Sessions |
ARES Full V – Mobile Security & Cyber Physical Systems 1. A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl 2. Dynamic Self-Protection and Tamperproofing for Android Apps using Native Code Mykola Protsenko, Sebastien Kreuter, Tilo Müller 3. Don’t brick your car: Firmware confidentiality and rollback for vehicles Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes Workshop IWCC IV – Information Hiding II Workshop WCSF – International Workshop on Cloud Security and Forensics |
|
18:30 – 20:00 | Sightseeing Tour – Toulouse’s Hidden Treasures Details |
Wednesday, August 26 | |
---|---|
08:00 – 15:00 | Registration desk open |
09:00 – 10:00 | Plenary Session |
Keynote
Pierangela Samarati, Università degli Studi di Milano, Italy |
|
10:00 – 10:15 | Coffee Break |
10:15 – 11:45 | Parallel Sessions |
ARES Full VI – Security Management 1. Modeling Fraud Prevention of Online Services using Incident Response Trees and Value at Risk Dan Gorton 2. The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001 Bahareh Shojaie, Hannes Federrath, Iman Saberi ARES Short I – Network and Probing Workshop ASSD I – Experiences in agile development of secure software Workshop WSDF I – 8th International Workshop on Digital Forensics Workshop IWSMA I – Android Security |
|
11:45 – 12:00 | Coffee Break |
12:00 – 13:00 | Plenary Session |
Keynote
Rainer Böhme, University of Innsbruck, Austria |
|
13:00 – 14:15 | Lunch |
14:15 – 15:45 | Parallel Sessions |
ARES Short II – Hardware and Physical Layer Security 1. Hardware Security Evaluation Using Assurance Case Models Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento 2. Error_s_Intrusion target identification on the physical layer over a BICM scheme Sihem Chaabouni, Amel Makhlouf 3. Physically Secure Code and Data Storage in Autonomously Booting Systems Johannes Götzfried, Johannes Hampel, Tilo Müller 4. Towards Abuse Detection and Prevention in IaaS Cloud Computing Jens Lindemann ARES Short III – Social Networks, Voting and Usable Security Workshop ASSD II – Assessment of research on agile development of secure software Workshop WSDF II – 8th International Workshop on Digital Forensics Workshop IWSMA II – Networks Security |
|
16:00 – 23:30 | Sightseeing tour Carcassonne Conference Dinner Château de Pennautier Details |
Thursday, August 27 | |
---|---|
08:30 – 11:00 | Registration desk open |
09:15 – 10:45 | Parallel Sessions |
Workshop FARES I – Monitoring and Identification 1. Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps Hessel Shut, Mark Scanlon, Jason Farina, NhienAn LeKhac 2. Privacy and Trust in Smart camera sensor networks Michael Loughlin, Asma Adnane 3. Security Monitoring of HTTP Traffic Using Extended Flows Martin Husák, Petr Velan, Jan Vykopal Workshop SAW I – Security Design and Validation |
|
10:45 – 11:15 | Coffee Break |
11:15 – 12:45 | Parallel Sessions |
Workshop FARES II – Cryptography and Resilience 1. Towards a process centered resilience framework Thomas Koslowski, Christian Brenig, Richard M. Zahoransky 2. Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Jürgen Fuß, Robert Kolmhofer 3. Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction Yu Ichifuji, Noriaki Koide, Noboru Sonehara Workshop SAW II – Software Testing and Assurance |
|
15:15 – 19:00 | Tour I – Let’s visit Airbus Details |
Friday, August 28 | |
---|---|
15:15 – 19:00 | Tour II – Let’s visit Airbus Details |