09:00 Welcome Desk & Registration (09:00 - 09:30)
09:30
09:30 - 11:30 - Room Planck Parallel Session 3 - Data and Software Security
  • 11: Understanding Information Technology Security Standards Diffusion - An Institutional Perspective Sylvestre Uwizeyemungu and Placide Poba-Nzaou
  • 37: A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files Davide Maiorca, Davide Ariu, Igino Corona and Giorgio Giacinto
  • 10: Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment and Olivier Festor
  • 14: Assessing Information Security Risks of AMI - What Makes it so Difficult? Inger Anne Tøndel, Maria B. Line and Gorm Johansen
09:30 - 11:30 - Room Einstein Parallel Session 3 - Privacy and Confidentiality & Data and Software Security
  • 12: Malfinder: Accelerated Malware Classification System through Filtering on Manycore System Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park and Kyu Ho Park
  • 15: Model-driven Privacy Assessment in the Smart Grid Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna
  • 27: A Scratch-based Graphical Policy Editor for XACML Henrik Nergaard, Nils Ulltveit-Moe and Terje Gjøsæter
  • 47: Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss Aderonke Busayo Sakpere and Anne V. D. M. Kayem
11:30 Coffee-Break (11:30 - 11:45)
12:45 Lunch (12:45 - 14:00)
14:00
14:00 - 16:00 - Room Planck Parallel Session 4 - Data and Software Security & Mobile Systems Security
  • 23: A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks Carsten Büttner and Sorin A. Huss
  • 26: Multi-sensor Authentication to Improve Smartphone Security Wei-Han Lee and Ruby B. Lee
  • 34: On Detection of Bitcoin Mining Redirection Attacks Nicolas T. Courtois, Pinar Emirdag and Zhouyixing Wang
  • 36: Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security Sriram Krishnamachari, Mehrdad Nojoumian and Kemal Akkaya
  • 44: On the Power Consumption of Cryptographic Processors in Civil Microdrones Abdulhadi Shoufan, Hassan Alnoon and Joonsang Baek
14:00
14:00 - 16:00 - Room Einstein Doctoral Consortium on Information Systems Security and Privacy - DCISSP
  • 3: User-friendly and Tailored Policy Administration Points Manuel Rudolph
  • 4: User-defined Privacy Preferences for k-Anonymization in Electronic Crime Reporting Systems for Developing Nations Aderonke Busayo Sakpere
  • 5: Trust-aware Social Recommender System Design Peixin Gao, John S. Baras and Jennifer Golbeck
16:00 Coffee-Break (16:00 - 16:15)
16:15
16:15 - 17:15 - Room Amphiteatre Jeanneteau Invited Talk Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution Philippe Desfray and Etienne Brosse, SOFTEAM, France
17:15
17:15 - 18:15 - Room Amphiteatre Jeanneteau Keynote Lecture Privacy in Social Networks - Existing Challenges and Proposals for Solution Günther Pernul, University of Regensburg, Germany
19:00 Social Event (19:00 - 23:30)