Grande Region Security and Reliability Day 2014

2014 – Saarland University

logo Uni Saarland logo Uni Trier logo INRIA logo Uni Luxembourg

Main Page

Directions

Please refer to the directions on the page of our department. The campus map helps you locating the building E2 1 on campus. We recommend parking in the parking deck near the letter E. Registration includes a complementary exit ticket for parking.

Map


View Larger Map

Program

Download the extended abstracts.

8:40 – 9:10 Registration coffee
9:10 – 9:15 Opening
9:15 – 10:15 Session 1
PrivaDA: A Generic Framework for Privacy-preserving Data Aggregation
Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni and Ivan Pryvalov.
Quantifying Location Privacy Revisited: Preliminary Report
Xihui Chen, Andrzej Mizera and Jun Pang.
GORAM: Privacy, Access Control, and Verifiability in Group Outsourced Storage
Matteo Maffei, Giulio Malavolta, Manuel Reinert and Dominique Schröder.
10:15 – 10:25 Short break
10:25 – 11:25 Session 2
Micro-Policies: Formally Verified Low-Level Tagging Schemes for Safety and Security
Catalin Hritcu.
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System
Daniel Fett, Ralf Kuesters and Guido Schmitz.
Information Flow Control in WebKit’s JavaScript Bytecode
Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
11:25 – 11:50 Coffee break
11:50 – 12:35 Invited Lecture
Graham Steel
Cryptosense: Formal Analysis of Security APIs from Research to Spin-Off
Abstract:
In this talk I'll describe how our research project into adapting formal analysis technqiues for cryptographic protocols to security APIs turned into an industry collaboration and finally a spin-off company, Cryptosense, that was created in September 2013. Though the company is still in its early stages, we've already learned a lot about the journey from academic results to commercial product. I'll talk about what we're doing now, what we're developing for the future, and what its like to transition from full time researcher to start-up CEO.
12:35 – 14:15 Lunch and Poster Session
14:15 – 15:15 Session 3
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking
Ralf Kuesters, Tomasz Truderung and Andreas Vogt.
On the Resilience of the Newscast Protocol in the Presence of Cheaters
Jakub Muszynski, Sebastien Varrette, Juan Luis Jimenez Laredo and Pascal Bouvry.
Bridging the Gap from Trace Properties to Uniformity
Michael Backes, Esfandiar Mohammadi and Tim Ruffing.
15:15 – 15:25 Short break
15:25 – 16:25 Session 4
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
Ralf Kuesters, Enrico Scapin, Tomasz Truderung and Juergen Graf.
Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps
Li Li, Alexandre Bartel, Jacques Klein and Yves Le Traon.
Profiling of Return-Oriented Programming Behavior
David Pfaff, Sebastian Hack and Christian Hammer
16:25 – 16:45 Coffee break
16:45 – 17:45 Session 5
Differential Indistinguishability for Cryptography with (Bounded) Weak Sources
Michael Backes, Aniket Kate, Sebastian Meiser and Tim Ruffing.
Cryptographic Protocols for Enforcing Topology-based Access Control
Jun Pang and Yang Zhang.
When is it safe to compose cryptographic protocols ?
Véronique Cortier and Eric Le Morvan.
17:45 – 17:55 Closing
Posters
Semantic Detection of Drive-by Attacks in a Browser
Marie-Therese Walter, Alessandra Gorla and Christian Hammer.
Mitigating privacy leaks by controlling the discoverability of online information
Michael Backes, Fabian Bendun, Peter Druschel and Milivoj Simeonovski.
Three-Party, Password-Authenticated Key Exchange with Server Private Keys
Jean Lancrenon.
The KIARA Security Model
Philipp Slusallek, Andreas Nonnengart, Dmitri Rubinstein and Werner Stephan.
Large-Scale Machine Learning-based Malware Detection: Confronting the “10-Fold Cross Validation” Scheme with Reality
Kevin Allix, Tegawendé F. Bissyandé, Quentin Jerome, Jacques Klein, Radu State and Yves Le Traon.