3 September
8:15-8:45 Registration
8:45-9:00 Welcome
9:00-10:30 Keynote Speaker (Atul Prakash)
10:30-11:00 Coffee Break
Session I: Crypto and Electronic Money
11:00-11:30 Abubaker, Wu. DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem
11:30-12:00 Wang. Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
12:00-12:30 Chen, Tang, Mitchell. Building general-purpose security services on EMV payment cards
12:30-14:00 Lunch
14:00-14:30 Zhang, Li, Guo. Anonymous Transferable Conditional E-cash
Session II: Wireless Security
14:30-15:00 Kur, Matyas, Svenda. Two Improvements of Random Key Pre-distribution for Wireless Sensor Networks
15:00-15:30 Coffee Break
15:30-16:00 Kim, McDaniel, La Porta. A Detection Mechanism for SMS Flooding Attacks in Cellular Networks
16:00-16:30 de Souza, Wright, O'Hanlon, Brown. Set Difference Attacks in Wireless Sensor Networks
4th September
Session III: Web Security
8:30-9:00 Gu, Zhang, Bai, Champion, Qin, Xuan. JSGuard: Shellcode Detection in JavaScript
9:00-9:30 Casalino, Mangili, Plate, Ponta. Detection of Configuration Vulnerabilities in Distributed (Web) Environments
9:30-10:00 Eshete, Villafiorita, Weldemariam. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages
10:00-10:30 Coffee Break
Session IV: Intrusion Detection and Monitoring
10:30-11:00 Sreekarshenoy, Tubella, Gonzalez. Improving the Resilience of an IDS Against Performance Throttling Attacks
11:00- 11:30 Chothia, Cova, Novakovic, Gonzalez Toro. The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent
11:30-12:00 Meng, Kwok, Li. Towards Designing Packet Filter with A Trust-based Approach in Network Intrusion Detection
12:00-12:30 Shu, Yao. Data Leak Detection As a Service
12:30-14:00 Lunch
16.30 Gathering for Social Event(s)
* 17.00 Visit to the Scrovegni Chapel
* 18.15 concert in Palazzo del Liviano
20.00 Aperitif/Dinner at the Historical Caffe´ Pedrocchi
5th September
9:00-10:30 Keynote Speaker (Sabrina De Capitani di Vimercati)
10:30-11:00 Coffee Break
Session V: Anonymity and Privacy
11:00-11:30 Jusko, Rehak. Revealing Cooperating Hosts by Connection Graph Analysis
11:30-12:00 Mahmood, Kabir, Mustafa. New Multi-Dimensional Sorting based K-Anonymity Microaggregation for Statistical Disclosure Control
12:00- 12:30 Zhou, Luo, Chang. More Anonymity Through Trust Degree in Trust-based Onion Routing
12:30-14:00 Lunch
14:00 - 14:30 Yuan, Yu. Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing
Session VI: Miscellaneous
14:30-15:00 Al-Shaer, Duan, Jafarian. Random Host Mutation for Moving Target Defense
15:00-15:30 coffee break
15:30-16:00 Gerdes, Mina, Daniels. Evaluating the security of physical-layer identification systems
16:00-16:30 Iranmanesh, Sengar, Wang. A Voice Spam Filter to Clean Subscribers' Mailbox
16:30- 16:40 Concluding remarks