RAID 2014

Program

Program

The City of Gothenburg welcomes all participants at
RAID 2014 to a reception at the "Dicksonska Palatset".
The reception will be held on September 17 at 7 pm.

Dicksonska palatset was designed by the English architect AW Boulnois, and Oscar Dickson moved in in 1862. Oscar Dickson, born in Gothenburg in 1823, was a member of the City Council, but he was best known for his generous support for polar research, he helped fund Nordenskiöld, Nansen and Andrée expeditions. There is a Dickson Bay and a Dickson island in the polar regions in memory of this. Oscar Dickson passed away in 1897, but his family remained in the palace until 1921.

The house has since served as a household school with associated food service, but is now used by the City for representation.



Program

The conference will take place at the Conference Center Wallenberg, Medicinaregatan 20.

Wednesday, September 17, 2014

Registration
8:00 - 09:15 Registration
Welcome by the chairs
09:15 - 09:30 Angelos Stavrou & Herbert Bos
Keynote I
09:30 - 10:30 Evolution of Badness: A Safe Browsing Perspective
Niels Provos, Distinguished Engineer at Google
Break
10:30 - 11:00 Coffee
Network Security
Session Chair: Will Robertson
11:00 - 11:30 Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks
Johanna Amann; Seth Hall; Robin Sommer
paper no presentation available
11:30 - 12:00 Formal Analysis of Security Procedures in LTE - A Feasibility Study
Noomene Ben Henda; Karl Norrman
paper presentation
12:00 - 12:30 Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
Il-Gu Lee; Hyunwoo Choi; Yongdae Kim; Seungwon Shin; Myungchul Kim
paper presentation
Lunch
12:30 - 14:00 Lunch (provided)
Authentication & Privacy
Session Chair: David Sands
14:00 - 14:30 A Comparative Evaluation of Implicit Authentication Schemes
Hassan Khan; Aaron Atwater; Urs Hengartner
paper no presentation available
14:30 - 15:00 Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Yinzhi Cao; Yan Shoshitaishvili; Kevin Borgolte; Christopher Kruegel; Giovanni Vigna; Yan Chen
paper presentation
15:00 - 15:30 Wait a minute! A fast, Cross-VM attack on AES
Gorka Irazoqui; Mehmet Sinan Inci; Thomas Eisenbarth; Berk Sunar
paper presentation
Break
15:30 - 15:45 Coffee
Presentations and Posters (template to where to post posters is portrait; height: 1,60m, width: 1,20m)
Session Chair: Herbert Bos
15:45 - 18:00

The session will be organized into 5 minutes presentations followed by the poster exhibit. The boards where posters can be fastened is portrait; height: 1,60m, width: 1,20m.

Poster Abstract: Forensically extracting encrypted contents from Stego-files using NTFS artefacts
Niall McGrath

Poster Abstract: Economic Denial of Sustainability (EDoS) Attack in the Cloud Using Web-Bugs
Natalija Vlajic and Armin Slopek

Poster Abstract: CITRIN: Extracting Adversaries Strategies Hidden in a Large-Scale Event Log
Satomi Honda, Yuki Unno, Koji Maruhashi, Masahiko Takenaka, and Satoru Torii

Poster Abstract: On Security Monitoring of Mobile Networks – Future threats and leveraging of network information
Michael Liljenstam, Prajwol Kumar Nakarmi, Oscar Ohlsson, and John Mattsson

Poster Abstract: Data Leakage Detection Algorithm including Sequences of Activities
César Guevara, Matilde Santos, and Victoria López

Poster abstract: BPIDS - Using business model specification in intrusion detection
João Pedro Lima, Nelson Escravana, and Carlos Ribeiro

Poster Abstract: Highlighting Easily How Malicious Applications Corrupt Android Devices
Radoniaina Andriatsimandefitra and Valérie Viêt Triêm Tông

Poster Abstract: Improving intrusion detection on SSL/TLS channels by classifying certificates
Zi-gang Cao, Gang Xiong, Zhen Li, and Li Guo

Poster Abstract: Using Financial Synthetic Data Sets for Fraud Detection Research
Edgar Alonso Lopez-Rojas and Stefan Axelsson

Poster Abstract: Automatic Discovery for Common Protocol Mimicry
Quan Bai, Gang Xiong, Yong Zhao, and Zhenzhen Li

Exploitation of vulnerabilities - if, when and how often (paper poster)
Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras

 

Reception
19:00 - Reception at the Dicksonska Palatset
Thursday, September 18, 2014

Registration
8:30 - 09:00 Registration
Keynote 2
09:00 - 10:00 The Internet of Things and the Four Horsemen of the Apocalypse
Timothy Grance, NIST
Break
10:00 - 10:30 Coffee
Intrusion detection & Vulnerability Analysis
Session Chair: Giovanni Vigna
10:30 - 11:00 On Emulation-Based Network Intrusion Detection Systems
Ali Abbasi; Jos Wetzels; Wouter Bokslag; Emmanuele Zambon; Sandro Etalle
paper presentation
11:00 - 11:30 Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism
Hamed Okhravi; James Riordan; Kevin Carter
paper presentation
11:30 - 12:00 Some Vulnerabilities Are Different Than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Kartik Nayak; Daniel Marino; Petros Efstathopoulos; Tudor Dumitras
paper presentation
12:00 - 12:30 Towards a Masquerade Detection System based on User's Tasks
J. Benito Camiña; Raúl Monroy; Jorge Rodríguez
paper presentation
Lunch
12:30 - 14:00 Lunch (provided)
Malware & Defenses
Session Chair: Christian Rossow
14:00 - 14:30 Unsupervised Anomaly-based Malware Detection using Hardware Features
Adrian Tang; Simha Sethumadhavan; Salvatore Stolfo
paper presentation
14:30 - 15:00 GOLDENEYE: Efficiently and Effectively Unveiling Malware’s Targeted Environment
Zhaoyan Xu; Jialong Zhang; Guofei Gu; Zhiqiang Lin
paper presentation
15:00 - 15:30 PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging
Kevin Bowers; Catherine Hart; Ari Juels; Nikos Triandopoulos
paper presentation
Break
15:30 - 16:00 Coffee
Web I
Session Chair: Andrei Sabelfeldt
16:00 - 16:30 Eyes of a Human, Eyes of a Program: Leveraging different views of the web for analysis and detection
Jacopo Corbetta; Luca Invernizzi; Christopher Kruegel; Giovanni Vigna
paper presentation
16:30 - 17:00 You Can't Be Me: Enabling Trusted Paths & User Sub-Origins in Web Browsers
Enrico Budianto; Yaoqi Jia; Xinshu Dong; Prateek Saxena; Zhenkai Liang
paper presentation
17:00 - 17:30 Measuring Drive-by Download Defense in Depth
Nathaniel Boggs; Senyao Du; Salvatore J. Stolfo
paper presentation
Banquet
18:00 - Banquet (transportation will be provided from the conference venue)
Friday, September 19, 2014

Registration
8:30 - 09:00 Registration
Malware & Binary Analysis
Session Chair: Marc Dacier
09:00 - 09:30 Dynamic Reconstruction of Relocation Information for Stripped Binaries
Vasilis Pappas; Michalis Polychronakis; Angelos D. Keromytis
paper presentation
09:30 - 10:00 Evaluating the Effectiveness of Current Anti-ROP Defenses
Felix Schuster; Thomas Tendyck; Jannik Pewny; Andreas Maass; Martin Steegmanns; Moritz Contag; Thorsten Holz
paper presentation
10:00 - 10:30 Paint it Black: Evaluating the Effectiveness of Malware Blacklists
Marc Kührer; Christian Rossow; Thorsten Holz
paper presentation
Break
10:30 - 11:00 Coffee
Web II
Session Chair: Hamed Ohkravi
11:00 - 11:30 A Lightweight Formal Approach for Analyzing Security of Web Protocols
Apurva Kumar
paper presentation
11:30 - 12:00 Why is CSP Failing? Trends and Challenges in CSP Adoption
Michael Weissbacher; Tobias Lauinger; William Robertson
paper presentation
12:00 - 12:30 Synthetic Data Generation and Defense in Depth Measurement of Web Applications
Nathaniel Boggs; Hang Zhao; Senyao Du; Salvatore J. Stolfo
paper presentation
Lunch
12:30 - 14:00 Lunch (provided)
RAID 2013 Credit - David Tagatac, Jill Jermyn, Nathaniel Boggs    |    Adapted for RAID 2014 - Anneli Andersson, Anna Wallin, Sandra Arvidsson