26 November 2015






Opening talk




Learning Behavioral Fingerprints from NetFlows using Timed Automata

By Nino Pellegrino, Christian Hammerschmidt, Qin Lin and Sicco Verwer


Semantics-aware Intrusion Detection for Industrial Control Systems

By Omer Yuksel, Jerry den Hartog, and Sandro Etalle


Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers

By Wouter Lueks, Gergely Alp ́ar, Jaap-Henk Hoepman, and Pim Vullers


Publicly Verifiable Private Aggregation of Time-Series Data

By Bence Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker


Poster session with coffee:

An Anomaly Analysis Framework for Database Systems
Sokratis Vavilis, Alexandru Egner, Milan Petkovi ́c, and Nicola Zannone

Indicators of Malicious SSL Connections
Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts and Damiano Bolzoni

Analyzing IPv4 Backscatter
Norbert Blenn and Vincent Ghiëtte

Towards The Mitigation Of Booters And The Ddos For Hire Phenomenon
Jose ́ Jair Santanna, Ricardo de O. Schmidt and Aiko Pras

Comparison of Performance and Practicality of Authenticated Data Structures
D. Mast, Z. Erkin and Thijs Veugen

Risk-based Analysis of Business Process Executions
Mahdi Alizadeh and Nicola Zannone

On The Enhancement Of Time Anomaly-based Intrusion Detection
Marco Caselli, Emmanuele Zambon and Frank Kargl

Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
Mingxiao Ma, Zekeriya Erkin and Jos Weber

Mental Models of Cyber Security Attacks and their Influence on the Design of Cyber Security Dashboards
Janosch Maier

Application of homomorphic encryption in eID schemes to enhance the privacy of users
Kris Shrishak Sridaran, Zekeriya Erkin and Remco Schaar

Secure Transmission on the Two-hop Relay Channel with Scaled Compute-and-Forward
Zhijie Ren, Jasper Goseling, Jos Weber and Michael Gastpar

Understanding the elements and the involved actors of data breach notification laws to evaluate the effectiveness of their implementation, Delft University of Technology (not attending)
Fabio Bisogni

Blockchaing and its application in finance
Joris Oudejans and Hidde Lycklama


Invited speaker Dr. Emiliano de Cristofaro (University College London)

Privacy-preserving Information Sharing: Tools and Applications

Modern society is increasingly dependent on massive amounts of electronic information. There are numerous everyday scenarios where sensitive data must be -- sometimes reluctantly or suspiciously -- shared between two or more entities with limited mutual trust. This prompts the need for mechanisms to enable limited (privacy-preserving) sharing of information. We face three main technical challenges: (1) how to enable this type of sharing such that only the required minimum amount of information is disclosed, (2) how to do so efficiently, and (3) how to deploy these techniques on real-world applications. We take on such challenges by adopting novel building blocks and deploying practical systems to both established and emerging applications, including database screening, genetic testing, social networking, and threat mitigation. In the process, we identify and address a number of open problems as well as items for future work.

Emiliano De Cristofaro is a Senior Lecturer (British English for Associate Professor) in the Computer Science Department of the University College London (UCL). Prior to joining UCL, he was a Research Scientist at PARC (a Xerox company). He received a PhD in Networked Systems from the University of California Irvine, advised -- mostly while running on the beach -- by Gene Tsudik. His research interests include privacy technologies, applied cryptography, and web security/privacy measurements. In 2012, he received an Excellency Award from PARC's Computer Science Lab. He co-chaired the Privacy Enhancing Technologies Symposium (PETS) in 2013-2014, and the Workshop on Genome Privacy and Security (GenoPri) in 2015.

More info at https://emilianodc.com.