Maintained by:

Institute for         Cyber Security   UTSA

CODASPY 2013 Draft Program

 

Monday, February 18
8:20-8:30 Welcome
Elisa Bertino (Purdue University), Ravi Sandhu (University of Texas at San Antonio),
Lujo Bauer (Carnegie Mellon University)
8:30-10:10 Session 1: Social networks and location-based privacy
Session chair: Lujo Bauer (Carnegie Mellon University)
For Some Eyes Only: Protecting Online Information Sharing
Iulia Ion (ETH Zurich), Filipe Beato (KULeuven and IBBT), Srdjan Capkun (ETH Zurich), Bart Preneel (KULeuven and IBBT), and Marc Langheinrich (University of Lugano)
Do Online Social Network Friends Still Threaten My Privacy?
Sebastian Labitzke, Florian Werling, Jens Mittag, and Hannes Hartenstein (Karlsruhe Institute of Technology)
Geolocation of Data in the Cloud
Mark Gondree and Zachary N. J. Peterson (Naval Postgraduate School)
Exploring Dependency for Query Privacy Protection in Location-based Services
Xihui Chen and Jun Pang (University of Luxembourg)
10:10-10:40 Break
10:40-11:55 Session 2: Privacy-preserving techniques and usage control
Session chair: Michael K. Reiter (University of North Carolina at Chapel Hill)
Expression Rewriting for Optimizing Secure Computation
Florian Kerschbaum (SAP Research)
Efficient Discovery of De-identification Policy Options Through a Risk-Utility Frontier
Weiyi Xia and Raymond Heatherly (Vanderbilt University), Xiaofeng Ding and Jiuyong Li (University of South Australia), and Bradley Malin (Vanderbilt University)
Data Usage Control Enforcement in Distributed Systems
Florian Kelbert and Alexander Pretschner (Technische Universität München)
11:55-1:15 Lunch
1:15-2:15 Keynote: Michael K. Reiter (UNC Chapel Hill)
Session chair: Elisa Bertino (Purdue University)
2:15-2:45 Break
2:45-4:00 Session 3: Usable security and privacy
Session chair: Gabriel Ghinita (University of Massachusetts at Boston)
The Usability of TrueCrypt, or How I Learned to Stop Whining and Fix an Interface
Sumeet Gujrati and Eugene Y. Vasserman (Kansas State University)
Privacy by design: A Framework for the Analysis of Architectural Choices
Daniel Le Métayer (INRIA)
Comparative Eye Tracking of Experts and Novices in Web Single Sign-on
Majid Arianezhad (Queensland University of Technology), L. Jean Camp and Timothy Kelley (Indiana University Bloomington), and Douglas Stebila (Queensland University of Technology)
4:00-4:30 Break
4:30-5:45 Session 4: Web security
Session chair: Elisa Bertino (Purdue University)
JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code
Wei Xu, Fangfang Zhang, and Sencun Zhu (Pennsylvania State University)
TamperProof: A Server-Agnostic Defense for Parameter Tampering Attacks on Web Applications
Nazari Skrupsky, Prithvi Bisht, Timothy Hinrichs, V. N. Venkatakrishnan, and Lenore Zuck (University of Illinois at Chicago)
Cross-Layer Detection of Malicious Websites
Li Xu, Zhenxin Zhan, Shouhuai Xu and Keying Ye (University of Texas at San Antonio)
6:00-8:00 Session 5: Poster Session and Reception
Tuesday, February 19
8:30-10:10 Session 6: Mobile-device security and privacy
Session chair: Alexander Pretschner (Technische Universität München)
Fast, Scalable Detection of "Piggybacked" Mobile Applications
Wu Zhou, Yajin Zhou, Michael Grace, and Xuxian Jiang (North Carolina State University), and Shihong Zou (Beijing University of Posts and Telecommunications)
Sweetening Android Lemon Markets: Measuring and Curbing Malware in Application Marketplaces
Timothy Vidas and Nicolas Christin (Carnegie Mellon University)
AppsPlayground: Automatic Large-scale Dynamic Analysis of Android Applications
Vaibhav Rastogi and Yan Chen (Northwestern University), and William Enck (North Carolina State University)
AppProfiler: A Flexible Method of Exposing Privacy-Related Behavior in Android Applications to End Users
Sanae Rosen, Zhiyun Qian, and Z. Morley Mao (University of Michigan)
10:40-11:55 Session 7: Access control for applications
Session chair: Adam Lee (University of Pittsburgh)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer
Christoph Busold (Intel CRI-SC at TU Darmstadt), Alexandra Dmitrienko (Fraunhofer SIT), Hervé Seudié, Ahmed Taha, and Majid Sobhani (TU Darmstadt), Christian Wachsmann (Intel CRI-SC at TU Darmstadt), and Ahmad-Reza Sadeghi (Fraunhofer SIT and Intel CRI-SC at TU Darmstadt)
FENCE: Continuous Access Control Enforcement in Dynamic Data Stream Environments
Rimma Nehme (Microsoft), Hyo-Sang Lim (Yonsei University), and Elisa Bertino (Purdue University)
Mining Parameterized Role-Based Policies
Zhongyuan Xu and Scott D. Stoller (Stony Brook University)
11:55-1:15 Lunch
1:15-2:15 Keynote: Ronnie Killough (Southwest Research Institute)
Session chair: Ravi Sandhu (University of Texas at San Antonio)
2:45-4:00 Session 8: Short papers: Access control and usage control for distributed systems
Session chair: Jae Park (University of Texas at San Antonio)
A New Approach For Delegations In Usage Control
Xiao Liang Hu and Sylvia L. Osborn (The University of Western Ontario)
An Infrastructure for Provenance-Based Access Control in Cloud Environments
Adam Bates, Ben Mood, Masoud Valafar, and Kevin Butler (University of Oregon)
Engineering Access Control Policies for Provenance-aware Systems
Lianshan Sun (Shaanxi University of Science and Technology), Jaehong Park and Ravi Sandhu (University of Texas at San Antonio)
Linking Anonymous Location Traces Through Driving Characteristics
Bin Zan (Rutgers University), Zhanbo Sun (RPI), Marco Gruteser (Rutgers University), and Xuegang Ban (RPI)
4:30-5:30 Panel: Security and Privacy in Human-centered Computing and Big Data Management
Moderator: Gail-Joon Ahn (Arizona State University)
6:00-8:00 Social Event
Wednesday, February 20
8:30-10:00 Session 9: Short papers: Users and security economics
Session chair: Anna Squicciarini (Penn State University)
Insured Access: An Approach to Ad-hoc Information Sharing for Virtual Organizations
Naoki Tanaka and Marianne Winslett (University of Illinois at Urbana-Champaign), Adam J. Lee (University of Pittsburgh), David K. Y. Yau (Purdue University), and Feng Bao (Institute for Infocomm Research)
Mediums: Visual Integrity Preserving Framework
Tongbo Luo, Xing Jin, and Wenliang Du
Effect of Grammar on Security of Long Passwords
Ashwini Rao (Carnegie Mellon University), Birendra Jha (Massachusetts Institute of Technology), and Gananand Kini (Carnegie Mellon University)
Accepting the Inevitable: Factoring the User into Home Computer Security
Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele Howe, and Zinta Byrne (Colorado State University)
All Your Browser-saved Passwords Could Belong to Us: A Security Analysis and A Cloud-based New Design
Rui Zhao and Chuan Yue (University of Colorado at Colorado Springs)
10:00-10:30 Break
10:30-12:10 Session 10: Cloud and distributed computing security and privacy
Session chair: Lujo Bauer (Carnegie Mellon University)
iBigTable: Practical Data Integrity for BigTable in Public Cloud
Wei Wei and Ting Yu (North Carolina State University), and Rui Xue (Chinese Academy of Sciences)
Multi-user Dynamic Proofs of Data Possession using Trusted Hardware
Stephen R. Tate, Roopa Vishwanathan, and Lance Everhart (UNC Greensboro)
Adaptive Data Protection in Distributed Systems
Anna Squicciarini and Giuseppe Petracca (Pennsylvania State University), and Elisa Bertino (Purdue University)
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
Bo Chen and Reza Curtmola (New Jersey Institute of Technology)
12:10 Closing Remarks