|
|
|
Program
|
|
|
|
Wednesday, September 7, 2016 - Day 1 |
|
|
|
|
|
Thursday, September 8, 2016 - Day 2 |
|
|
|
07:30 - 08:30 |
Welcome and Registration
Location: Ballroom Foyer
|
|
08:30 - 10:30 |
Session #4:
Network and Systems Security and Access Control
Session chair: Depeng Li
Location: Prince Edward
- Cyber Security Risk Assessment of a DDoS Attack
Gaute Wangen, Andrii Shalaginov and Christoffer V. Hallstensen
(Norwegian University of Science and Technology)
- Moving Target Defense Against Network Reconnaissance with Software Defined Networking
Li Wang and Dinghao Wu
(The Pennsylvania State University)
- Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control
Prosunjit Biswas, Ravi Sandhu, and Ram Krishnan
(University of Texas at San Antonio)
- SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time
Information Sharing
George Webster, Zachary Hanif, Andre Ludwig, Tamas Lengyel, Apostolis Zarras and Claudia
Eckert (Technical University of Munich)
|
|
10:30 - 11:00 |
Coffee Break
Location: Ballroom Foyer
|
|
11:00 - 12:00 |
Session #5:
Cryptographic Protocols II
Session chair: Anderson Nascimento
- Yet Another Note on Block Withholding Attack
on Bitcoin Mining Pools
Samiran Bag (Newcastle University) and Kouichi Sakurai (Kyushu University)
- Universally Composable Two-Server PAKE
Franziskus Kiefer (Mozilla) and Mark Manulis
(University of Surrey)
|
|
12:00 - 13:30 |
Lunch
Location: Prince David
|
|
13:30 - 15:30 |
Session #6:
Cryptanalysis II
Session chair: Liam Kehiler
- Damaging Simplifying, and Salvaging p-OMD
Tomer Ashur and Bart Mennink
(KU Leuven)
- Enhanced Correlation Power Analysis by Biasing Power Traces
Changhai Ou (Chinese Academy of Sciences, University of Chinese Academy of Sciences), Zhu Wang (Chinese Academy of Sciences), Degang Sun (Chinese Academy of Sciences), Xinping Zhou (Chinese Academy of Sciences, University of Chinese Academy of Sciences), Juan Ai (Chinese Academy of Sciences, University of Chinese Academy of Sciences), and
Na Pang (Chinese Academy of Sciences, University of Chinese Academy of Sciences)
- Cryptanalysis of Multi-Prime Phi-Hiding Assumption
Jun Xu, Lei Hu (Chinese Academy of Sciences), Santanu Sarkar (Indian Institute of Technology), Xiaona Zhang, Zhangjie Huang and Liqiang Peng (Chinese Academy of Sciences)
- Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication
Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng and Zhangjie Huang (Chinese Academy of Sciences)
|
|
15:30 - 16:00 |
Coffee Break
Location: Ballroom Foyer
|
|
16:00 - 17:00 |
Rump Session
|
|
18:00 - 20:30 |
Banquet Dinner
|
|
|
|
Friday, September 9, 2016 - Day 3 |
|
|
|
09:00 - 10:00 |
Invited Talk 2: Electronic Voting: Danger and Opportunities
Alex Halderman, Professor of Computer Science & Engineering, University of Michigan
Location: Prince Edward
|
|
10:00 - 10:30 |
Coffee Break
Location: Ballroom Foyer
|
|
10:30 - 12:00 |
Session #7:
Privacy and Watermarking
Session chair: Alex Halderman
- Leveraging Internet Services to Evade Censorship
Apostolis Zarras
(Technical University of Munich)
- Analyzing Randomized Response Mechanisms under Differential Privacy
Atsushi Waseda and Ryo Nojima (National Institute of Information and Communications Technology)
- Models and Algorithms for Graph Watermarking
David Eppstein, Michael Goodrich (University of California, Irvine), Jenny Lam (San Jose State University), Nil Mamano (University of California, Irvine), Michael Mitzenmacher (Harvard University) and Manuel
Torres (University of California, Irvine)
|
|
12:00 - 13:30 |
Lunch
Location: Prince David
|
|
13:30 - 15:30 |
Session #8:
Software Security
Session chair: Rui Zhang
- Policy-based Implicit Attestation for Microkernel-based Virtualized Systems
Steffen Wagner (Fraunhofer Institute AISEC) and Claudia Eckert
(Technische Universitat Munchen)
- Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
Dongpeng Xu, Jiang Ming and Dinghao Wu
(The Pennsylvania State University)
- A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability
Testing
Guanhua Yan (Binghamton University, State University of New York), Yunus Kucuk (Binghamton University, State University of New York, Turkish Military Academy), Max Slocum (Binghamton University, State University of New York) and David Last (Air Force Research Laboratory)
- Control Flow Integrity Enforcement with Dynamic Code Optimization
Yan Lin, Xiaoxiao Tang, Debin Gao (Singapore Management University) and Jianming Fu (Wuhan University)
|
|
15:30 - 16:00 |
Coffee Break
Location: Ballroom Foyer
|
|
16:00 - 16:10 |
Closing Remark
|
|
Download the ISC 2016 proceeding here. |
|
Copyright
© 2016,
Information Security Conference
|
|