THURSDAY SEPTEMBER 28, 2017

09:00 - 10:00 Session 1: Prof. George Spanoudakis (City University London, UK), Managing Security Service Level Agreements 

10:00 - 10:30 Coffee Break

10:30 - 12:00 Session 2: Defences and Evaluation

  • Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications
    Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans and Siraj A. Shaikh
  • Examination of a New Defense Mechanism: Honeywords
    Ziya A. Genc, Suleyman Kardas and Mehmet Sabir Kiraz
  • AndroNeo: Hardening Android malware sandboxes by predicting evasion heuristics
    Yonas Leguesse, Mark Vella and Joshua Ellul

12:00 - 14:00 Lunch

14:00 - 15:00 Session 3: Trusted Execution

  • EmLog: Tamper-Resistant System Logging for Constrained Devices with Trusted Execution Environments
    Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis
  • How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip
    Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet and Axel Legay

15:00 - 15:30 Coffee Break

15:30 - 16:30 Session 4: Security of Data

  • Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database
    Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello
  • JACPoL: A Simple but Expressive JSON-based Access Control Policy Language
    Hao Jiang and Ahmed Bouabdallah

16:30 - 17:30 Session 5: Security in Emerging Systems

  • A Secure and Trusted Channel Protocol for UAVs Fleets
    Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron and Serge Chaumette
  • Philanthropy On The Blockchain
    Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes

19:00 - 22:00 Gala dinner

------------------------------------------------------------------------

FRIDAY SEPTEMBER 29, 2017

09:00 - 10:00 Session 6: Prof. Fabio Martinelli (National Research Council of Italy, IT), Hybrid approaches for malware detection in android systems

10:00 - 10:30 Coffee Break  

10:30 - 12:00 Session 7: Protocols and Algorithms

  •  A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps
    Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya and Osmanbey Uzunkol
  • A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
    Pau Conejero-Alberola, M. Francisca Hinarejos and Josep-Lluís Ferrer-Gomila
  • Revisiting Two-hop Distance-Bounding Protocols: Are you really close enough?
    Nektaria Kaloudi and Aikaterini Mitrokotsa

12:00 - 12:30 Session 8: Dr. Louis Marinos (ENISA, GR), Cyber Threat Intelligence at ENISA: Course of Action

12:30 - 14:00 Lunch

14:00 - 18:00 Cybersure project meeting (by invitation)

Accepted papers



Security in Emerging Systems

 

F1

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron and Serge Chaumette.

A Secure and Trusted Channel Protocol for UAVs Fleets

 

S4

Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes. Philanthropy On The Blockchain

-----------

 

Security of Data

 

F4

Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar and Giovanni Russello. Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database

 

F7

Hao Jiang and Ahmed Bouabdallah. JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

------------

 

Trusted Execution

 

F3

Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis. EmLog: Tamper-Resistant System Logging for Constrained Devices with Trusted Execution Environments

 

F8

Sebanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet and Axel Legay. How TrustZone could be bypassed: Side-Channel Attacks on a modern System-on-Chip

 

------------

 

Defences and Evaluation

 

F6

Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans and Siraj A. Shaikh. Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications

 

S1

Ziya A. Genc, Suleyman Kardas and Mehmet Sabir Kiraz. Examination of a New Defense Mechanism: Honeywords

 

F5

Yonas Leguesse, Mark Vella and Joshua Ellul. AndroNeo: Hardening Android malware sandboxes by predicting evasion heuristics

 

---------------

 

Protocols and Algorithms

 

S2

Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya and Osmanbey Uzunkol. A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps

 

S3

Pau Conejero-Alberola, M. Francisca Hinarejos and Josep-Lluís Ferrer-Gomila. A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons

 

F2

Nektaria Kaloudi and Aikaterini Mitrokotsa. Revisiting Two-hop Distance-Bounding Protocols: Are you really close enough?

 

----------------