CODASPY 2013 Draft Program
Monday, February 18 | |
8:20-8:30 | Welcome |
Elisa Bertino (Purdue
University), Ravi Sandhu (University of Texas at San Antonio), Lujo Bauer (Carnegie Mellon University) |
|
8:30-10:10 | Session 1: Social networks and location-based privacy |
Session chair: Lujo Bauer (Carnegie Mellon University) | |
For Some Eyes Only: Protecting Online Information Sharing | |
Iulia Ion (ETH Zurich), Filipe Beato (KULeuven and IBBT), Srdjan Capkun (ETH Zurich), Bart Preneel (KULeuven and IBBT), and Marc Langheinrich (University of Lugano) | |
Do Online Social Network Friends Still Threaten My Privacy? | |
Sebastian Labitzke, Florian Werling, Jens Mittag, and Hannes Hartenstein (Karlsruhe Institute of Technology) | |
Geolocation of Data in the Cloud | |
Mark Gondree and Zachary N. J. Peterson (Naval Postgraduate School) | |
Exploring Dependency for Query Privacy Protection in Location-based Services | |
Xihui Chen and Jun Pang (University of Luxembourg) | |
10:10-10:40 | Break |
10:40-11:55 | Session 2: Privacy-preserving techniques and usage control |
Session chair: Michael K. Reiter (University of North Carolina at Chapel Hill) | |
Expression Rewriting for Optimizing Secure Computation | |
Florian Kerschbaum (SAP Research) | |
Efficient Discovery of De-identification Policy Options Through a Risk-Utility Frontier | |
Weiyi Xia and Raymond Heatherly (Vanderbilt University), Xiaofeng Ding and Jiuyong Li (University of South Australia), and Bradley Malin (Vanderbilt University) | |
Data Usage Control Enforcement in Distributed Systems | |
Florian Kelbert and Alexander Pretschner (Technische Universität München) | |
11:55-1:15 | Lunch |
1:15-2:15 | Keynote: Michael K. Reiter (UNC Chapel Hill) |
Session chair: Elisa Bertino (Purdue University) | |
2:15-2:45 | Break |
2:45-4:00 | Session 3: Usable security and privacy |
Session chair: Gabriel Ghinita (University of Massachusetts at Boston) | |
The Usability of TrueCrypt, or How I Learned to Stop Whining and Fix an Interface | |
Sumeet Gujrati and Eugene Y. Vasserman (Kansas State University) | |
Privacy by design: A Framework for the Analysis of Architectural Choices | |
Daniel Le Métayer (INRIA) | |
Comparative Eye Tracking of Experts and Novices in Web Single Sign-on | |
Majid Arianezhad (Queensland University of Technology), L. Jean Camp and Timothy Kelley (Indiana University Bloomington), and Douglas Stebila (Queensland University of Technology) | |
4:00-4:30 | Break |
4:30-5:45 | Session 4: Web security |
Session chair: Elisa Bertino (Purdue University) | |
JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code | |
Wei Xu, Fangfang Zhang, and Sencun Zhu (Pennsylvania State University) | |
TamperProof: A Server-Agnostic Defense for Parameter Tampering Attacks on Web Applications | |
Nazari Skrupsky, Prithvi Bisht, Timothy Hinrichs, V. N. Venkatakrishnan, and Lenore Zuck (University of Illinois at Chicago) | |
Cross-Layer Detection of Malicious Websites | |
Li Xu, Zhenxin Zhan, Shouhuai Xu and Keying Ye (University of Texas at San Antonio) | |
6:00-8:00 | Session 5: Poster Session and Reception |
Tuesday, February 19 | |
8:30-10:10 | Session 6: Mobile-device security and privacy |
Session chair: Alexander Pretschner (Technische Universität München) | |
Fast, Scalable Detection of "Piggybacked" Mobile Applications | |
Wu Zhou, Yajin Zhou, Michael Grace, and Xuxian Jiang (North Carolina State University), and Shihong Zou (Beijing University of Posts and Telecommunications) | |
Sweetening Android Lemon Markets: Measuring and Curbing Malware in Application Marketplaces | |
Timothy Vidas and Nicolas Christin (Carnegie Mellon University) | |
AppsPlayground: Automatic Large-scale Dynamic Analysis of Android Applications | |
Vaibhav Rastogi and Yan Chen (Northwestern University), and William Enck (North Carolina State University) | |
AppProfiler: A Flexible Method of Exposing Privacy-Related Behavior in Android Applications to End Users | |
Sanae Rosen, Zhiyun Qian, and Z. Morley Mao (University of Michigan) | |
10:40-11:55 | Session 7: Access control for applications |
Session chair: Adam Lee (University of Pittsburgh) | |
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer | |
Christoph Busold (Intel CRI-SC at TU Darmstadt), Alexandra Dmitrienko (Fraunhofer SIT), Hervé Seudié, Ahmed Taha, and Majid Sobhani (TU Darmstadt), Christian Wachsmann (Intel CRI-SC at TU Darmstadt), and Ahmad-Reza Sadeghi (Fraunhofer SIT and Intel CRI-SC at TU Darmstadt) | |
FENCE: Continuous Access Control Enforcement in Dynamic Data Stream Environments | |
Rimma Nehme (Microsoft), Hyo-Sang Lim (Yonsei University), and Elisa Bertino (Purdue University) | |
Mining Parameterized Role-Based Policies | |
Zhongyuan Xu and Scott D. Stoller (Stony Brook University) | |
11:55-1:15 | Lunch |
1:15-2:15 | Keynote: Ronnie Killough (Southwest Research Institute) |
Session chair: Ravi Sandhu (University of Texas at San Antonio) | |
2:45-4:00 | Session 8: Short papers: Access control and usage control for distributed systems |
Session chair: Jae Park (University of Texas at San Antonio) | |
A New Approach For Delegations In Usage Control | |
Xiao Liang Hu and Sylvia L. Osborn (The University of Western Ontario) | |
An Infrastructure for Provenance-Based Access Control in Cloud Environments | |
Adam Bates, Ben Mood, Masoud Valafar, and Kevin Butler (University of Oregon) | |
Engineering Access Control Policies for Provenance-aware Systems | |
Lianshan Sun (Shaanxi University of Science and Technology), Jaehong Park and Ravi Sandhu (University of Texas at San Antonio) | |
Linking Anonymous Location Traces Through Driving Characteristics | |
Bin Zan (Rutgers University), Zhanbo Sun (RPI), Marco Gruteser (Rutgers University), and Xuegang Ban (RPI) | |
4:30-5:30 | Panel: Security and Privacy
in Human-centered Computing and Big Data Management |
Moderator: Gail-Joon Ahn (Arizona State University) | |
6:00-8:00 | Social Event |
Wednesday, February 20 | |
8:30-10:00 | Session 9: Short papers: Users and security economics |
Session chair: Anna Squicciarini (Penn State University) | |
Insured Access: An Approach to Ad-hoc Information Sharing for Virtual Organizations | |
Naoki Tanaka and Marianne Winslett (University of Illinois at Urbana-Champaign), Adam J. Lee (University of Pittsburgh), David K. Y. Yau (Purdue University), and Feng Bao (Institute for Infocomm Research) | |
Mediums: Visual Integrity Preserving Framework | |
Tongbo Luo, Xing Jin, and Wenliang Du | |
Effect of Grammar on Security of Long Passwords | |
Ashwini Rao (Carnegie Mellon University), Birendra Jha (Massachusetts Institute of Technology), and Gananand Kini (Carnegie Mellon University) | |
Accepting the Inevitable: Factoring the User into Home Computer Security | |
Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele Howe, and Zinta Byrne (Colorado State University) | |
All Your Browser-saved Passwords Could Belong to Us: A Security Analysis and A Cloud-based New Design | |
Rui Zhao and Chuan Yue (University of Colorado at Colorado Springs) | |
10:00-10:30 | Break |
10:30-12:10 | Session 10: Cloud and distributed computing security and privacy |
Session chair: Lujo Bauer (Carnegie Mellon University) | |
iBigTable: Practical Data Integrity for BigTable in Public Cloud | |
Wei Wei and Ting Yu (North Carolina State University), and Rui Xue (Chinese Academy of Sciences) | |
Multi-user Dynamic Proofs of Data Possession using Trusted Hardware | |
Stephen R. Tate, Roopa Vishwanathan, and Lance Everhart (UNC Greensboro) | |
Adaptive Data Protection in Distributed Systems | |
Anna Squicciarini and Giuseppe Petracca (Pennsylvania State University), and Elisa Bertino (Purdue University) | |
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds | |
Bo Chen and Reza Curtmola (New Jersey Institute of Technology) | |
12:10 | Closing Remarks |