|
Program
NordSec 2015 is held from lunch time on Monday, Oct. 19, to lunch time Wednesday, Oct. 21, 2015. at KTH Royal Institute of Technology in Stockholm, Sweden. The talks are held in room E1, Osquars Backe 2, entry floor. The meals are in ljusgarden, same building, Osquars Backe 2, 10044 Stockholm.
Schedule
Monday, Oct. 19
10:00 registration opens.
11:30am – 1:00pm
Lunch
1:00pm – 2:30pm
Welcome. Keynote address by Eugene H. Spafford from Purdue University on "Rethinking Cyber Security” (pdf slides).
2:30pm – 3:00pm
Coffee Break
3:00pm – 3:30pm
Poster Presentations (pdf with titles)
3:30pm – 5:00pm
Paper Session 1: Cyber-Physical Systems. Chair: Magnus Almgren
- Hayretdin Bahşi and Olaf Maennel (Centre For Digital Forensics and Cyber Security, Tallinn University of Technology): A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. (pdf slides)
- Hannes Holm, Martin Karresand, Arne Vidström and Erik Westring, Swedish Defence Research Agency (FOI) :A Survey of Industrial Control System Testbeds. (pdf slides)
- Martin Leth Pedersen, Michael Hedegaard Sørensen (Department of Computer Science, Aalborg University), Daniel Lux (Seluxit), Ulrik Nyman and Rene Rydhof Hansen (Aalborg University): The Timed Decentralised Label Model. (pdf slides)
Tuesday, Oct. 20
8:00am – 9:30am
Keynote address by Marit Hansen Marit Hansen, Data Protection Commissioner Schleswig-Holstein, Germany,
on "Protection Goals for Privacy Auditing and Privacy Engineering" (pdf slides).
9:30am – 10:00am
Coffee Break
10:00am – 11:30am
Paper Session 2: Privacy. Chair: Karin Bernsmed
- Hongyu Jin and Panos Papadimitratos (KTH Royal Institute of Technology): Resilient Collaborative Privacy for Location-Based Services. (pdf slides)
- Benjamin Greschbach, Guillermo Rodríguez-Cano, Tomas Ericsson and Sonja Buchegger(KTH Royal Institute of Technology): Design of a Privacy-Preserving Document Submission and Grading System. (pdf slides)
- Daniel Bosk (KTH Royal Institute of Technology), Martin Kjellqvist (Mid Sweden University), and Sonja Buchegger (KTH Royal Institute of Technology): Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. (pdf slides)
11:30am – 1:00pm
Lunch
1:00pm – 2:30pm
Paper Session 3: Cryptography. Chair: Peeter Laud.
- Billy Brumley (Finland Tampere University of Technology): Faster Binary Curve Software: A Case Study. (pdf slides)
- Markku-Juhani O. Saarinen (Queen's University Belfast), Billy Brumley (Finland Tampere University of Technology): WhirlBob, the Whirlpool Variant of StriBob: Lighter, Faster, and Constant Time. (pdf slides)
- Huihui Yang and Vladimir Oleshchuk (University of Agder): An Efficient Traceable Attribute-based Authentication Scheme with One-time Attribute Trees. (pdf slides)
2:30pm – 3:00pm
Coffee Break
2:30pm – 3:30pm
Poster Session (pdf files so far)
3:30pm – 5:00pm
Paper Session 4: Trust and Fraud. Chair: Stewart Kowalski.
- Ijlal Loutfi and Audun Josang (University of Oslo): FIDO Trust Requirements for Mitigating Murphy’s Law. (pdf slides)
- Edgar Alonso Lopez-Rojas and Stefan Axelsson (Blekinge Institute of Technology):Using the RetSim Fraud Simulation Tool to set Thresholds for Triage of Retail Fraud. (prezi slides)
- Dan Gorton (KTH Royal Institute of Technology): IncidentResponseSim: An Agent-Based Simulation Tool for Risk Management of Online Fraud. (pdf slides)
5:00pm – 9:00pm
Social Event and Dinner at Moderna Museet. Guided tours of the collection at 6pm (English and Swedish tours in parallel), dinner at 7.30pm. We leave from the lecture hall at 5pm, after the last session. We need to be at the museum at about a quarter to six.
Wednesday, Oct. 21
9:15am – 10:30am
Keynote address by N. Asokan from Aalto University in Finland on "Technology Transfer from Security Research Projects: A Personal Perspective". (pdf slides)
10:30am – 10:45am
Coffee Break
10:45am – 12:15am
Paper Session 5: Network Security, Software Security, Authentication. Chair: Simin Nadjm-Tehrani
- Artem Voronkov, Stefan Lindskog and Leonardo Martucci (Karlstad University): Challenges in Managing Firewalls. (pdf slides)
- Bernd Jäger (Nokia), Christian Röpke (Ruhr-University Bochum), Iris Adam (Nokia) and Thorsten Holz (Ruhr-University Bochum): Multi-Layer Access Control for SDN-based Telco Clouds. (pdf slides)
- Luigi Catuogno (Università degli Studi di Salerno), Clemente Galdi (Università di Napoli Federico II) and Giuseppe Persiano (Università Renato M. Capocelli): Guaranteeing Dependency Enforcement in Software Updates. (pdf slides)
- Sanna Suoranta, Lari Haataja and Tuomas Aura (Aalto University): Electronic Citizen Identities and Strong Authentication. (pdf slides)
12:15am – 1:00pm
Lunch
1:00 pm NordSec 2015 over.
|