CODASPY 2013 Draft Program
| Monday, February 18 | |
| 8:20-8:30 | Welcome |
| Elisa Bertino (Purdue
University), Ravi Sandhu (University of Texas at San Antonio), Lujo Bauer (Carnegie Mellon University) |
|
| 8:30-10:10 | Session 1: Social networks and location-based privacy |
| Session chair: Lujo Bauer (Carnegie Mellon University) | |
| For Some Eyes Only: Protecting Online Information Sharing | |
| Iulia Ion (ETH Zurich), Filipe Beato (KULeuven and IBBT), Srdjan Capkun (ETH Zurich), Bart Preneel (KULeuven and IBBT), and Marc Langheinrich (University of Lugano) | |
| Do Online Social Network Friends Still Threaten My Privacy? | |
| Sebastian Labitzke, Florian Werling, Jens Mittag, and Hannes Hartenstein (Karlsruhe Institute of Technology) | |
| Geolocation of Data in the Cloud | |
| Mark Gondree and Zachary N. J. Peterson (Naval Postgraduate School) | |
| Exploring Dependency for Query Privacy Protection in Location-based Services | |
| Xihui Chen and Jun Pang (University of Luxembourg) | |
| 10:10-10:40 | Break |
| 10:40-11:55 | Session 2: Privacy-preserving techniques and usage control |
| Session chair: Michael K. Reiter (University of North Carolina at Chapel Hill) | |
| Expression Rewriting for Optimizing Secure Computation | |
| Florian Kerschbaum (SAP Research) | |
| Efficient Discovery of De-identification Policy Options Through a Risk-Utility Frontier | |
| Weiyi Xia and Raymond Heatherly (Vanderbilt University), Xiaofeng Ding and Jiuyong Li (University of South Australia), and Bradley Malin (Vanderbilt University) | |
| Data Usage Control Enforcement in Distributed Systems | |
| Florian Kelbert and Alexander Pretschner (Technische Universität München) | |
| 11:55-1:15 | Lunch |
| 1:15-2:15 | Keynote: Michael K. Reiter (UNC Chapel Hill) |
| Session chair: Elisa Bertino (Purdue University) | |
| 2:15-2:45 | Break |
| 2:45-4:00 | Session 3: Usable security and privacy |
| Session chair: Gabriel Ghinita (University of Massachusetts at Boston) | |
| The Usability of TrueCrypt, or How I Learned to Stop Whining and Fix an Interface | |
| Sumeet Gujrati and Eugene Y. Vasserman (Kansas State University) | |
| Privacy by design: A Framework for the Analysis of Architectural Choices | |
| Daniel Le Métayer (INRIA) | |
| Comparative Eye Tracking of Experts and Novices in Web Single Sign-on | |
| Majid Arianezhad (Queensland University of Technology), L. Jean Camp and Timothy Kelley (Indiana University Bloomington), and Douglas Stebila (Queensland University of Technology) | |
| 4:00-4:30 | Break |
| 4:30-5:45 | Session 4: Web security |
| Session chair: Elisa Bertino (Purdue University) | |
| JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code | |
| Wei Xu, Fangfang Zhang, and Sencun Zhu (Pennsylvania State University) | |
| TamperProof: A Server-Agnostic Defense for Parameter Tampering Attacks on Web Applications | |
| Nazari Skrupsky, Prithvi Bisht, Timothy Hinrichs, V. N. Venkatakrishnan, and Lenore Zuck (University of Illinois at Chicago) | |
| Cross-Layer Detection of Malicious Websites | |
| Li Xu, Zhenxin Zhan, Shouhuai Xu and Keying Ye (University of Texas at San Antonio) | |
| 6:00-8:00 | Session 5: Poster Session and Reception |
| Tuesday, February 19 | |
| 8:30-10:10 | Session 6: Mobile-device security and privacy |
| Session chair: Alexander Pretschner (Technische Universität München) | |
| Fast, Scalable Detection of "Piggybacked" Mobile Applications | |
| Wu Zhou, Yajin Zhou, Michael Grace, and Xuxian Jiang (North Carolina State University), and Shihong Zou (Beijing University of Posts and Telecommunications) | |
| Sweetening Android Lemon Markets: Measuring and Curbing Malware in Application Marketplaces | |
| Timothy Vidas and Nicolas Christin (Carnegie Mellon University) | |
| AppsPlayground: Automatic Large-scale Dynamic Analysis of Android Applications | |
| Vaibhav Rastogi and Yan Chen (Northwestern University), and William Enck (North Carolina State University) | |
| AppProfiler: A Flexible Method of Exposing Privacy-Related Behavior in Android Applications to End Users | |
| Sanae Rosen, Zhiyun Qian, and Z. Morley Mao (University of Michigan) | |
| 10:40-11:55 | Session 7: Access control for applications |
| Session chair: Adam Lee (University of Pittsburgh) | |
| Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer | |
| Christoph Busold (Intel CRI-SC at TU Darmstadt), Alexandra Dmitrienko (Fraunhofer SIT), Hervé Seudié, Ahmed Taha, and Majid Sobhani (TU Darmstadt), Christian Wachsmann (Intel CRI-SC at TU Darmstadt), and Ahmad-Reza Sadeghi (Fraunhofer SIT and Intel CRI-SC at TU Darmstadt) | |
| FENCE: Continuous Access Control Enforcement in Dynamic Data Stream Environments | |
| Rimma Nehme (Microsoft), Hyo-Sang Lim (Yonsei University), and Elisa Bertino (Purdue University) | |
| Mining Parameterized Role-Based Policies | |
| Zhongyuan Xu and Scott D. Stoller (Stony Brook University) | |
| 11:55-1:15 | Lunch |
| 1:15-2:15 | Keynote: Ronnie Killough (Southwest Research Institute) |
| Session chair: Ravi Sandhu (University of Texas at San Antonio) | |
| 2:45-4:00 | Session 8: Short papers: Access control and usage control for distributed systems |
| Session chair: Jae Park (University of Texas at San Antonio) | |
| A New Approach For Delegations In Usage Control | |
| Xiao Liang Hu and Sylvia L. Osborn (The University of Western Ontario) | |
| An Infrastructure for Provenance-Based Access Control in Cloud Environments | |
| Adam Bates, Ben Mood, Masoud Valafar, and Kevin Butler (University of Oregon) | |
| Engineering Access Control Policies for Provenance-aware Systems | |
| Lianshan Sun (Shaanxi University of Science and Technology), Jaehong Park and Ravi Sandhu (University of Texas at San Antonio) | |
| Linking Anonymous Location Traces Through Driving Characteristics | |
| Bin Zan (Rutgers University), Zhanbo Sun (RPI), Marco Gruteser (Rutgers University), and Xuegang Ban (RPI) | |
| 4:30-5:30 | Panel: Security and Privacy
in Human-centered Computing and Big Data Management |
| Moderator: Gail-Joon Ahn (Arizona State University) | |
| 6:00-8:00 | Social Event |
| Wednesday, February 20 | |
| 8:30-10:00 | Session 9: Short papers: Users and security economics |
| Session chair: Anna Squicciarini (Penn State University) | |
| Insured Access: An Approach to Ad-hoc Information Sharing for Virtual Organizations | |
| Naoki Tanaka and Marianne Winslett (University of Illinois at Urbana-Champaign), Adam J. Lee (University of Pittsburgh), David K. Y. Yau (Purdue University), and Feng Bao (Institute for Infocomm Research) | |
| Mediums: Visual Integrity Preserving Framework | |
| Tongbo Luo, Xing Jin, and Wenliang Du | |
| Effect of Grammar on Security of Long Passwords | |
| Ashwini Rao (Carnegie Mellon University), Birendra Jha (Massachusetts Institute of Technology), and Gananand Kini (Carnegie Mellon University) | |
| Accepting the Inevitable: Factoring the User into Home Computer Security | |
| Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele Howe, and Zinta Byrne (Colorado State University) | |
| All Your Browser-saved Passwords Could Belong to Us: A Security Analysis and A Cloud-based New Design | |
| Rui Zhao and Chuan Yue (University of Colorado at Colorado Springs) | |
| 10:00-10:30 | Break |
| 10:30-12:10 | Session 10: Cloud and distributed computing security and privacy |
| Session chair: Lujo Bauer (Carnegie Mellon University) | |
| iBigTable: Practical Data Integrity for BigTable in Public Cloud | |
| Wei Wei and Ting Yu (North Carolina State University), and Rui Xue (Chinese Academy of Sciences) | |
| Multi-user Dynamic Proofs of Data Possession using Trusted Hardware | |
| Stephen R. Tate, Roopa Vishwanathan, and Lance Everhart (UNC Greensboro) | |
| Adaptive Data Protection in Distributed Systems | |
| Anna Squicciarini and Giuseppe Petracca (Pennsylvania State University), and Elisa Bertino (Purdue University) | |
| Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds | |
| Bo Chen and Reza Curtmola (New Jersey Institute of Technology) | |
| 12:10 | Closing Remarks |

