
The City of Gothenburg welcomes all participants at Dicksonska palatset was designed by the English architect AW Boulnois, and Oscar Dickson moved in in 1862. Oscar Dickson, born in Gothenburg in 1823, was a member of the City Council, but he was best known for his generous support for polar research, he helped fund Nordenskiöld, Nansen and Andrée expeditions. There is a Dickson Bay and a Dickson island in the polar regions in memory of this. Oscar Dickson passed away in 1897, but his family remained in the palace until 1921. The house has since served as a household school with associated food service, but is now used by the City for representation. |
![]() ![]() |
The conference will take place at the Conference Center Wallenberg, Medicinaregatan 20.
8:00 - 09:15 | Registration |
09:15 - 09:30 | Angelos Stavrou & Herbert Bos |
09:30 - 10:30 |
Evolution of Badness: A Safe Browsing Perspective Niels Provos, Distinguished Engineer at Google |
10:30 - 11:00 | Coffee |
11:00 - 11:30 |
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks
Johanna Amann; Seth Hall; Robin Sommer
|
||
11:30 - 12:00 |
Formal Analysis of Security Procedures in LTE - A Feasibility Study
Noomene Ben Henda; Karl Norrman
|
||
12:00 - 12:30 |
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
Il-Gu Lee; Hyunwoo Choi; Yongdae Kim; Seungwon Shin; Myungchul Kim
|
12:30 - 14:00 | Lunch (provided) |
14:00 - 14:30 |
A Comparative Evaluation of Implicit Authentication Schemes
Hassan Khan; Aaron Atwater; Urs Hengartner
|
||
14:30 - 15:00 |
Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Yinzhi Cao; Yan Shoshitaishvili; Kevin Borgolte; Christopher Kruegel; Giovanni Vigna; Yan Chen
|
||
15:00 - 15:30 |
Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui; Mehmet Sinan Inci; Thomas Eisenbarth; Berk Sunar
|
15:30 - 15:45 | Coffee |
15:45 - 18:00 |
The session will be organized into 5 minutes presentations followed by the poster exhibit. The boards where posters can be fastened is portrait; height: 1,60m, width: 1,20m. Poster Abstract: Forensically extracting encrypted contents from Stego-files using NTFS artefacts Poster Abstract: Economic Denial of Sustainability (EDoS) Attack in the Cloud Using Web-Bugs Poster Abstract: CITRIN: Extracting Adversaries Strategies Hidden in a Large-Scale Event Log Poster Abstract: On Security Monitoring of Mobile Networks – Future threats and leveraging of network information Poster Abstract: Data Leakage Detection Algorithm including Sequences of Activities Poster abstract: BPIDS - Using business model specification in intrusion detection Poster Abstract: Highlighting Easily How Malicious Applications Corrupt Android Devices Poster Abstract: Improving intrusion detection on SSL/TLS channels by classifying certificates Poster Abstract: Using Financial Synthetic Data Sets for Fraud Detection Research Poster Abstract: Automatic Discovery for Common Protocol Mimicry Exploitation of vulnerabilities - if, when and how often (paper poster)
|
19:00 - | Reception at the Dicksonska Palatset |
8:30 - 09:00 | Registration |
09:00 - 10:00 |
The Internet of Things and the Four Horsemen of the Apocalypse
Timothy Grance, NIST |
10:00 - 10:30 | Coffee |
10:30 - 11:00 |
On Emulation-Based Network Intrusion Detection Systems
Ali Abbasi; Jos Wetzels; Wouter Bokslag; Emmanuele Zambon; Sandro Etalle
|
||
11:00 - 11:30 |
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism
Hamed Okhravi; James Riordan; Kevin Carter
|
||
11:30 - 12:00 |
Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Kartik Nayak; Daniel Marino; Petros Efstathopoulos; Tudor Dumitras
|
||
12:00 - 12:30 |
Towards a Masquerade Detection System based on User's Tasks
J. Benito Camiña; Raúl Monroy; Jorge Rodríguez
|
12:30 - 14:00 | Lunch (provided) |
14:00 - 14:30 |
Unsupervised Anomaly-based Malware Detection using Hardware Features
Adrian Tang; Simha Sethumadhavan; Salvatore Stolfo
|
||
14:30 - 15:00 |
GOLDENEYE: Efficiently and Effectively Unveiling Malware’s Targeted Environment
Zhaoyan Xu; Jialong Zhang; Guofei Gu; Zhiqiang Lin
|
||
15:00 - 15:30 |
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging
Kevin Bowers; Catherine Hart; Ari Juels; Nikos Triandopoulos
|
15:30 - 16:00 | Coffee |
16:00 - 16:30 |
Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection
Jacopo Corbetta; Luca Invernizzi; Christopher Kruegel; Giovanni Vigna
|
||
16:30 - 17:00 |
You Can't Be Me: Enabling Trusted Paths & User Sub-Origins in Web Browsers
Enrico Budianto; Yaoqi Jia; Xinshu Dong; Prateek Saxena; Zhenkai Liang
|
||
17:00 - 17:30 |
Measuring Drive-by Download Defense in Depth
Nathaniel Boggs; Senyao Du; Salvatore J. Stolfo
|
18:00 - | Banquet (transportation will be provided from the conference venue) |
8:30 - 09:00 | Registration |
09:00 - 09:30 |
Dynamic Reconstruction of Relocation Information for Stripped Binaries
Vasilis Pappas; Michalis Polychronakis; Angelos D. Keromytis
|
||
09:30 - 10:00 |
Evaluating the Effectiveness of Current Anti-ROP Defenses
Felix Schuster; Thomas Tendyck; Jannik Pewny; Andreas Maass; Martin Steegmanns; Moritz Contag; Thorsten Holz
|
||
10:00 - 10:30 |
Paint it Black: Evaluating the Effectiveness of Malware Blacklists
Marc Kührer; Christian Rossow; Thorsten Holz
|
10:30 - 11:00 | Coffee |
11:00 - 11:30 |
A Lightweight Formal Approach for Analyzing Security of Web Protocols
Apurva Kumar
|
||
11:30 - 12:00 |
Why is CSP Failing? Trends and Challenges in CSP Adoption
Michael Weissbacher; Tobias Lauinger; William Robertson
|
||
12:00 - 12:30 |
Synthetic Data Generation and Defense in Depth Measurement of Web Applications
Nathaniel Boggs; Hang Zhao; Senyao Du; Salvatore J. Stolfo
|
12:30 - 14:00 | Lunch (provided) |