[FM-India] Call for Participation - 17th European Symposium on Research in Computer Security (ESORICS 2012)

ESORICS 2012 esorics2012 at unimi.it
Fri Jul 13 13:58:28 IST 2012

[Apologies if you receive multiple copies of this message]


17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy -- September 10-12, 2012

** Registration now open (early bird registration: August 5, 2012) **


ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
The 17th European Symposium on Research in Computer Security
(ESORICS 2012) will be held in Pisa, Italy.

The ESORICS 2012 conference is organized as a 5-day event featuring:
- three keynote speakers
- ESORICS technical program (50 papers)
- six co-located workshops:
* 7th DPM International Workshop on Data Privacy Management (DPM 2012)
* 9th European PKI Workshop: Research and Applications (EuroPKI 2012)
* International Workshop on Quantitative Aspects in Security
Assurance (QASA 2012)
* 8th International Workshop on Software Engineering for Secure
Systems (SESS 2012)
* 5th SETOP International Workshop on Autonomous and Spontaneous
Security (SETOP 2012)
* 8th International Workshop on Security and Trust Management
(STM 2012)


Registration information is available at:

Early registration fees apply until August 5, 2012.


- Prof. Gilles Barthe
IMDEA Software Institute, Spain

- Prof. Christian Cachin
IBM Research - Zurich, Switzerland

- Prof. Ahmad-Reza Sadeghi
TU Darmstadt, Germany

(in alphabetical order of title)

- Abstraction-based Malware Analysis Using Rewriting and
Model Checking
(Philippe Beaucamps, Isabelle Gnaedig, and Jean-Yves Marion)

- Applying Divertibility to Blind Ballot Copying in the Helios
Internet Voting System
(Yvo Desmedt and Pyrros Chaidos)

- A Practical Man-In-The-Middle Attack on Signal-based
Key Generation Protocols
(Simon Eberz, Martin Strohmeier, Matthias Wilhelm,
and Ivan Martinovic)

- A Probabilistic Framework for Localization of Attackers in MANETs
(Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia,
and Paulo Shakarian)

- Attack of the Clones: Detecting Cloned Applications on
Android Markets
(Jonathan Crussell, Clint Gibler, and Hao Chen)

- Beyond eCK: Perfect Forward Secrecy under Actor Compromise
and Ephemeral-Key Reveal
(Cas Cremers and Michele Feltz)

- Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5
in XML Encryption
(Tibor Jager, Sebastian Schinzel, and Juraj Somorovsky)

- Boosting the Permissiveness of Dynamic Information-Flow
Tracking by Testing
(Arnar Birgisson, Daniel Hedin, and Andrei Sabelfeld)

- Codejail: Application-transparent Isolation of Libraries with
Tight Program Interactions
(Yongzheng Wu, Sai Sathyanarayan, Roland Yap, and Zhenkai Liang)

- Deciding Epistemic and Strategic Properties of Cryptographic
(Henning Schnoor)

- Deciding Security for a Fragment of ASLan
(Sebastian A. Modersheim)

- Decision Procedures for Simulatability
(Charanjit S. Jutla and Arnab Roy)

- Defining Privacy for Weighted Votes, Single and
Multi-Voter Coercion
(Jannik Dreier, Pascal Lafourcade, and Yassine Lakhnech)

- Design and Implementation of a Terrorist-Fraud Resilient
Distance Bounding System
(Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric,
Dave Singelee, and Srdjan Capkun)

- Detecting Phishing the Natural Language Way
(Rakesh Verma, Narasimha Shashidhar, and Nabil Hossain)

- Dismantling iClass and iClass Elite
(Flavio D. Garcia, Gerhard De Koning Gans, Roel Verdult,
and Milosch Meriac)

- Effective Symbolic Protocol Analysis via Equational
Irreducibility Conditions
(Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu,
Christopher Lynch, Catherine Meadows, Jose Meseguer,
Paliath Narendran, Sonia Santiago, and Ralf Sasse)

- Enhancing Location Privacy for Electric Vehicles
(at the right time)
(Joseph Liu, Man Ho Au, Willy Susilo, and Jianying Zhou)

- Evaluation of Standardized Password-based Key Derivation
against Parallel Processing Platforms
(Markus Durmuth, Tim Guneysu, Markus Kasper, Christof Paar,
Tolga Yalcin, and Ralf Zimmermann)

- Exploring Linkablility of User Reviews
(Mishari Almishari and Gene Tsudik)

- Formal Analysis of Privacy in an eHealth Protocol
(Naipeng Dong, Hugo Jonker, and Jun Pang)

- Hardening Access Control and Data Protection in GFS-like
File Systems
(James Kelley, Roberto Tamassia, and Nikos Triandopoulos)

- Identity-Based Encryption with Master Key-Dependent Message
Security and Leakage-Resilience
(David Galindo, Javier Herranz, and Jorge Villar)

- Identity-Based Traitor Tracing with  Short  Private Key and
Short Ciphertext
(Fuchun Guo, Yi Mu, and Willy Susilo)

- Introducing the gMix Open Source Framework for Mix Implementations
(Karl-Peter Fuchs, Dominik Herrmann, and Hannes Federrath)

- JVM-Portable Sandboxing of Java’s Native Libraries
(Mengtao Sun and Gang Tan)

- Model-checking Bisimulation-based Information Flow Properties
for Infinite State Systems
(Deepak D'Souza and K.R. Raghavendra)

- Modeling and Enhancing Android's Permission System
(Elli Fragkaki, Lujo Bauer, Limin Jia, and David Swasey)

- New Algorithms for Secure Outsourcing of Modular Exponentiations
(Xiaofeng Chen, Jin Li, Qiang Tang, and Wenjing Lou)

- On The Security of Password Manager Database Formats
(Paolo Gasti and Kasper B. Rasmussen)

- PE(AR)^2: Privacy-Enhanced Anonymous Authentication with
Reputation and Revocation
(Kin Ying Yu, Tsz Hon Yuen, Sherman S.M. Chow, Siu Ming Yiu,
and Lucas C.K. Hui)

- Privacy-Aware Message Exchanges for Geographically Routed
Human Movement Networks
(Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith)

- PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters
(Jinkyu Koo, Xiaojun Lin, and Saurabh Bagchi)

- Relations among Notions of Privacy for RFID Authentication Protocols
(Daisuke Moriyama, Shin'Ichiro Matsuo, and Miyako Ohkubo)

- Revealing Abuses of Channel Assignment Protocols in Multi-Channel
Wireless Networks: An Investigation Logic Approach
(Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, and Peng Liu)

- Robust Probabilistic Fake Packet Injection for Receiver-Location
Privacy in WSN
(Ruben Rios, Jorge Cuellar, and Javier Lopez)

- Satisfiability and Feasibility in a Relationship-based
Workflow Authorization Model
(Arif Akram Khan and Philip W.L. Fong)

- Scalable Telemetry Classification for Automated Malware Detection
(Jack Stokes, John Platt, Helen Wang, Joe Faulhaber, Jonathan Keller,
Mady Marinescu, Anil Thomas, and Marius Gheorghescu)

- Secure and Efficient Outsourcing of Sequence Comparisons
(Marina Blanton, Mikhail Atallah, Keith Frikken,
and Qutaibah Malluhi)

- Secure Proximity Detection for NFC Devices Based on
Ambient Sensor Data
(Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang)

- Security of Patched DNS
(Amir Herzberg and Haya Shulman)

- SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof
Location Tags
(Yao Zheng, Ming Li, Wenjing Lou, and Y. Thomas Hou)

- SocialImpact: Systematic Analysis of Underground Social Dynamics
(Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, and Deepinder Mahi)

- The Silence of the LANs: Efficient Leakage Resilience for
IPsec VPNs
(Ahmad-Reza Sadeghi, Steffen Schulz, and Vijay Varadharajan)

- Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
(Lei Wei and Michael Reiter)

- TorScan: Tracing Long-lived Connections and
Differential Scanning Attacks
(Alex Biryukov, Ivan Pustogarov, and Ralf Philipp Weinmann)

- Towards Symbolic Encryption Schemes
(Naveed Ahmed, Christian Damsgaard Jensen, and Erik Zenner)

- Trust No One Else: Detecting MITM Attacks Against SSL/TLS
Without Third-Parties
(Italo Dacosta, Mustaque Ahamad, and Patrick Traynor)

- Unique Group Signatures
(Matthew Franklin and Haibin Zhang)

- X.509 Forensics: Detecting and Localising the
SSL/TLS Men-in-the-middle
(Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, and Georg Carle)


Additional information about the conference can be found at:

More information about the FMIndia mailing list