logo CREDS DUMA MoST IWCC WRIT W2SP
title
Tentative Schedule
Thursday, May 23:

CREDS: Cyber-security Research Ethics Dialog & Strategy
DUMA: 4th International Workshop on Data Usage Management
MoST: Mobile Security Technologies

Friday, May 24:

IWCC: International Workshop on Cyber Crime
WRIT: 2nd Workshop on Research for Insider Threat
W2SP: Web 2.0 Security and Privacy


Thursday, May 23:

CREDS: Cyber-security Research Ethics Dialog & Strategy
DUMA: 4th International Workshop on Data Usage Management
MoST: Mobile Security Technologies (MoST) 2013
Time CREDS DUMA MoST
8:00-9:00 Breakfast
9:00-9:15 Welcome, Introductions, Opening Remarks
Michael Bailey and Erin Kenneally
Welcome
(9:00-9:10)
Opening Remarks
(9:00-9:10)
9:15-10:30 Henry Corrigan-Gibbs and Bryan Ford
Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

Sebastian Schrittwieser, Martin Mulazzani and Edgar Weippl
Ethics in Security Research: Which lines should not be crossed?

John Aycock and John Sullins
Why "No Worse Off" is Worse Off
Keynote: Alan Davidson (9:10-10:10) Keynote: David Molnar: Security and Privacy Challenges in Mobile Augmented Reality
10:30-10:50 Morning Break Morning Break
(10:10-10:40)
Morning Break
(10:10-10:30)
10:50-12:20 Stefan Savage and Tadayoshi Kohno
Vulnerability Research in the CyberPhysical World

Mark Allman
Traffic Monitoring Considered Reasonable

Ty Bross and Jean Camp
I Just Want Your Anonymized Contacts! Benefits and Education in Security & Privacy Research
(10:40-12:10)
Research Paper Presentations (30 mins each)
Log Design for Accountability

An Integrated Formal Approach to Usage Control

How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective
(10:30-12:15)
Kristopher Micinski, Philip Phelps and Jeffrey Foster
An Empirical Study of Location Truncation on Android

Kristen Kennedy, Eric Gustafson and Hao Chen
Quantifying the Effects of Removing Permissions from Android Applications

Theodore Book, Adam Pridgen and Dan Wallach
Longitudinal Analysis of Android Ad Library Permissions

Steffen Liebergeld, Matthias Lange and Collin Mulliner
Short Paper: Nomadic Honeypots: A Novel Concept for Smartphone Honeypots
12:20-1:20 Lunch (12:15-1:30)
Lunch
(12:15-1:30)
Lunch
1:20-2:35 Stuart Schechter, Cristian Bravo-Lillo, Cormac Herley, Serge Egelman and Janice Tsai
You Needn't Build That: Reusable Ethics-Compliance Infrastructure for Human Subjects Research

Ronen Margulies and Amir Herzberg
Conducting Ethical yet Realistic Usable Security Studies

Rula Sayaf, James B. Rule and Dave Clarke
Can Users Control their Data in Social Software? An Ethical Analysis of Control Systems
(1:30-3:00)
Position Paper Presentations (20 mins each)

The Cloud Needs Cross-Layer Data Handling Annotations

Privacy Preserving Data Analytics for Smart Homes

Toward Inference Control Mechanisms

The Probabilistic Provenance Graph
(1:30-3:15)
Tianhao Tong and David Evans
GuarDroid: A Trusted Path for Password Entry

Ugur Cil and Kemal Bicakci
gridWordX: Design, Implementation, and Usability Evaluation of an Authentication Scheme Supporting Both Desktops and Mobile Devices

Sarah Pidcock and Urs Hengartner
Zerosquare: A Privacy-Friendly Location Hub for Geosocial Applications

Jung-Sang Ahn and Seungryoul Maeng
Short Paper: Low-Overhead User Data Protection for Smartphones using Plaintext Cache
2:35-3:00 Discussions about the shifting roles, responsibilities, and relationships between Researchers, ERBs, Government, Professional Societies, and Program Committees in incentivizing and overseeing ethical research
3:00-3:15 Break
3:15-3:45 Discussions about the shifting roles, responsibilities, and relationships between Researchers, ERBs, Government, Professional Societies, and Program Committees in incentivizing and overseeing ethical research Break Break
3:45-4:30 A group discussion exploring the ethical underpinnings of other recent and impactful issues that beckon for policy recommendations (3:45-4:05)
Position paper:
``I hereby leave my email to...'': Data Usage Control and the Digital Estate
(3:45-4:45)
Lanier Watkins, Cherita Corbett, Benjamin Salazar, Kevin Fairbanks and William H. Robinson
Using Network Traffic to Remotely Identify the Type of Applications Executing on Mobile Devices

Salvador Mandujano
Privacy in the Mobile Hardware Space: Threats and Design Considerations
4:30-5:00 Wrap-up and Post-Op (4:05 - 5:30)
Panel : Data Usage Control - Where, when, how, at all?
Panelists:
Carl Gunter
Günter Karjoth
Fabio Martinelli
Ravi Sandhu
5:30-5:45 Thanks and wrap-up


Friday, May 24:

IWCC: International Workshop on Cyber Crime
WRIT: 2nd Workshop on Research for Insider Threat
W2SP: Web 2.0 Security and Privacy
Time IWCC: WRIT W2SP
8:00-9:00 Breakfast
9:00-9:15 Welcome and Opening Remarks
(9:00-10:10)
Keynote Speaker: Bob Hutchinson
(9:00-9:10)
Opening Remarks
9:15-10:00 Invited paper: Nicolas Courtois, Daniel Hulme, Jerzy Gawinecki, Kumail Hussain and Marek Grajek - On Bad Randomness And Cloning of Contactless Payment and Building Smart Cards (9:10-10:10)
Keynote: Neil Daswani
10:00-10:35 Coffee Break (10:10-10:40)
Coffee Break
10:35-12:15 E. Raftopoulos, X. Dimitropoulos
Understanding Network Forensics Analysis in an Operational Environment

A. F.Shosha, L. Tobin, P. Gladyshev
Digital Forensic Reconstruction of A Program Actions

V. Garg and S. Nilizadeh
Craigslist Scams and Community Composition: Investigating Online Fraud Victimization

V. A. Foroushani, N. Zincir-Heywood
On Evaluating IP Traceback Schemes: A Practical Perspective
(10:40-12:15) Hoda Eldardiry, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, and Oliver Brdiczka
Multi-Domain Information Fusion for Insider Threat Detection

Yingbo Song, Malek Ben Salem, Shlomo Hershkop, and Salvatore Stolfo
System Level User Behavior Biometrics Using Fisher Features and Gaussian Mixture Models

William Young, Henry Goldberg, Alex Memory, James Sartain, and Ted Senator
Use of Domain Knowledge to Detect Insider Threats in Computer Activities

(10:40-12:15)
Apurva Kumar (IBM India)
Security analysis of the identity federation transaction

Monica Chew and Sid Stamm (Mozilla)
Short paper: Contextual Identity: Freedom to be All Your Selves

Joseph Bonneau (Google Inc.)
Short paper: S-links: Why distributed security policy requires secure introduction

Discussion
12:15-1:30 Lunch
1:30-3:15 D. Ohana, N. Shashidhar
Do Private and Portable Web Browsers Leave Incriminating Evidence?

J. Isacenkova, O. Thonnard, A. Costin, D. Balzarotti, A. Francillon
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operation

P. Kopiczko, W. Mazurczyk, K. Szczypiorski
StegTorrent: a Steganographic Method for P2P Files Sharing Service

S. Grabski, K. Szczypiorski
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
David Muchene, Klevis Luli, and Craig Shue
Reporting Insider Threats via Covert Channels

Alexander Kent and Lorie Liebrock
Differentiating User Authentication Graphs

Florian Kammueller and Christian W. Probst
Invalidating Policies using Structural Information

Martin Mulazzani, Philipp Reschl, Markus Huber, Manuel Leithner, Sebastian Schrittwieser and Edgar Weippl
Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting

Christian Eubank, Marcela Melara, Diego Perez-Botero and Arvind Narayanan
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey

Jason Bau, Jonathan Mayer, Hristo Paskov and John C. Mitchell
Short paper: A Promising Direction for Web Tracking Countermeasures

Discussion
3:15-3:45 Coffee Break
3:45-4:45 L. Allodi, W. Shim, F. Massacci
Quantitative assessment of risk reduction with cybercrime black market monitoring

D. Ohana, L. Phillips, L. Chen
Preventing Cell Phone Intrusion and Theft using Biometrics
(3:45-5:00)
Elise Axelrad, Paul Sticha, Oliver Brdiczka, and Jianqiang Shen
Bayesian Network Model for Predicting Insider Threats

Frank Greitzer and Thomas Ferryman
Methods and Metrics for Evaluating Analytic Insider Threat Tools

Brian Lindauer and Joshua Glasser
Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data

(3:45-5:00)
Yuqing Zhang, Xiali Wang, Qihan Luo and Qixu Liu
Cross-Site Scripting Attacks in Social APIs

Aseem Rastogi, Jun Yuan and Rob Johnson
Short paper: Gone, But Not Forgotten: The Current State of Private Computing

Discussion
4:45-5:00 Closing and Best Paper Award

Our Supporters


  Gold

  Silver



Workshop News
Registration is open!
Feb 22, 2013
To register visit here.
Workshops are color-coded
October 31, 2012
Each workshop is assigned a specific color to facilitate better organization. The color codes will be maintained in the flyers, handouts, etc. during the event. See Workshops page for details.
Workshops Accepted
September 28, 2012
6 workshops are accepted this year. See Workshops page for details.
First call for workshops
July 18, 2012
Workshop submission deadline is September 7. See Call for Workshops page for details.
Sponsored by
IEEE Computer Society Technical Committee on Security and Privacy: website
ieee
ieee-cs