Home Call For Papers Committees Program
Submission Author Kit Registration Venue


9:00 Welcome and Introduction
9:15 Invited Paper - Hash Function Vulnerability Index and Hash Chain Attacks. David Lee (Ohio State University)
10:00 Coffee Break
Session 1 - Large Scale Attacks
Chair: Reynold Cheng (Hong Kong Polytechnic University)
10:30 Engaging Edge Networks in Preventing and Mitigating Undesirable Network Traffic. Lan Wang (University of Memphis), Qishi Wu (University of Memphis), Dung Luong (University of Memphis)
11:00 DDoS Attacks by Subverting Membership Management in P2P Systems. Ruben D. Torres (Purdue University) , Xin Sun (Purdue University) , Sanjay Rao (Purdue University)
11:30 Observations from the DNSSEC Deployment. Eric Osterweil (UCLA), Dan Massey (Colorado State University), Lixia Zhang (UCLA)
12:00 Lunch Break
Session 2 - Network Protocols
Chair: Dan Massey (Colorado State University)
1:30 Minutiae: A Formal Methodology for Accurate Protocol Fingerprinting. Guoqiang Shu (Ohio State University), David Lee (Ohio State University)
2:00 Voice Interactive Personalized Security Protocol: Definition and Security Analysis. Dimitris K.Zisiadis (University of Thessaly), Spyros Kopsidas (University of Thessaly), Leandros Tassiulas
2:30 Packet Cloaking: Protecting Receiver Privacy Against Traffic Analysis. Reynold Cheng (Hong Kong Polytechnic University) , David Yau (Purdue University), Jianyun Fu (Hong Kong Polytechnic University)
3:00 Coffee Break
Session 3 - Cryptographic Protocols
Chair: Lan Wang (University of Memphis)
3:30 Efficient and Robust Secure Aggregation for Sensor Networks. Parisa Haghani (EPFL), Panos Papadimitratos (EPFL), Marcin Poturalski (EPFL), Karl Aberer (EPFL), Jean-Pierre Hubaux (EPFL)
4:00 Efficient Blind Signatures for Accountability. Saikat Chakrabarti (University of Kentucky), Santosh Chandrasekhar (University of Kentucky), Kenneth L. Calvert (University of Kentucky), Mukesh Singhal (University of Kentucky)
4:30 Closing Remarks and Discussion


Contact: Conference Organizer