1st SysSec Workshop
July 6th, 2011 - Amsterdam, The Netherlands

8:50-9:00Introduction - Welcome (Chair: Stefano Zanero)
9:00-10:30Session 1 - Student papers (Chair: Evangelos Markatos)
Icon slides (372.3 KB) Unity in diversity: Phylogenetic-inspired techniques for reverse engineering and detection of malware families. Wei Ming Khoo, Pietro Lio (University of Cambridge)
Icon slides (833.6 KB) Detecting Insufficient Access Control in Web Applications. George Noseevich, Andrew Petukhov (Lomonosov Moscow State University)
Icon slides (995.3 KB) I/O Attacks in Intel PC-based Architectures and Countermeasures. Fernand Lone Sang, Vincent Nicomette, Yves Deswart (LAAS-CNRS)
Icon slides (723.6 KB) CAPTCHuring Automated (Smart)Phone Attacks. Iasonas Polakis, Georgios Kontaxis, Sotiris Ioannidis (Institute of Computer Science - Foundation for Research and Technology Hellas)
10:30-11:00Coffee Break
11:00-12:30Session 2 - 5' Position Papers (Chair: Federico Maggi)
Icon slides (151.8 KB) Systems Security research at Politecnico di Milano. Federico Maggi, Stefano Zanero (Politecnico di Milano)
Icon slides (288.4 KB) The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. Christian Grothoff (Technische Universitaet Muenchen)
Icon slides (60.5 KB) Adapting Econometric Models, Technical Analysis and Correlation Data to Computer Security Data. Spyros Kollias, Vassilis Assimakopoulos (National Technical University of Athens),
Vasileios Vlachos, Alexandros Papanikolaou (Technological Educational Institute of Larissa)
  A Trustworthy Architecture for Wireless Industrial Sensor Networks. Markus Wehner, Sven Zeisberg (University of Applied Sciences Dresden),
Alexis Olivereau, Nouha Oulha (CEA-LIST),
Laura Gheorghe, Emil Slusanschi (University Politehnica of Bucharest),
Basil Hess, Felix von Reischach (SAP),
Mike Ludwig (Dresden Elektronik Ingenieurtechnik GmbH),
David Bateman (Electricité de France)
Icon slides (381.5 KB) Mapping Systems Security Research at Chalmers. Magnus Almgren, Zhang Fu, Erland Jonsson, Pierre Kleberger, Andreas Larsson, Farnaz Moradi, Tomas Olovsson, Marina Papatriantafilou, Laleh Pirzadeh, Philippas Tsigas (Chalmers Technical University)
Icon slides (428.4 KB) Exploring the Landscape of Cybercrime. Zinaida Benenson, Andreas Dewald, Ben Stock, Johannes Stuettgen (University of Mannheim),
Hans-Georg Esser, Felix Freiling, Tilo Mueller, Christian Moch, Stefan Voemel, Sebastian Schinzel, Michael Spreitzenbarth (University of Erlangen)
Icon slides (109.7 KB) CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap. Levente Buttyan, Mark Felegyhazi, Boldizsar Bencsath (Budapest University of Technology and Economics, Laboratory of Cryptography and System Security - CrySyS)
Icon slides (377.8 KB) Towards malware-resistant networking environment. Dennis Gamayunov (Lomonosov Moscow State University)
Icon slides (1.7 MB) Research Roadmap on Security Measurements. Xenofontas Dimitropoulos (ETH Zurich)
Icon slides (2.5 MB) Towards a better understanding of the impact of emerging ICT on the safety and security of the Citizen. Jan Loeschner, Ioannis Kounelis, Vincent Mahieu, Jean-Pierre Nordvik, Pasquale Striparo (Joint Research Centre of the European Commission),
Sead Muftic (Royal Institute of Technology - KTH)
Icon slides (274.5 KB) From SSIR to CIDre: a New Security Research Group in Rennes, France. Emmanuelle Anceaume (CNRS),
Christophe Bidan, Guillaume Hiet, Ludovic Me, Guillaume Piolle, Nicolas Prigent, Eric Totel Frederic Tronel, Valerie Viet Triem Tong (SUPELEC)
Sebastien Gambs (Univ. Rennes 1 and INRIA),
Michel Hurfin (INRIA)
Icon slides (577.3 KB) Building a long term strategy for International Collaboration in Trustworthy ICT - Security, Privacy and Trust in Global Networks and Services. James Clarke (Waterford Institute of Technology),
Michel Riguidel (Telecom-Paris Tech Groupe Des Ecoles Des Telecommunications),
Neeraj Suri (Technische Universitat Darmstadt),
Aljosa Pasic (Atos Origin)
13:30-15:00Session 3 - BiC session
Building a long term INCO strategy in Trustworthy ICT

Icon Invitation (125.8 KB) - Icon Agenda (288.8 KB) - Icon Position Paper (334.8 KB)

Talks of the BiC session:

  1. Icon Session Overview (813.4 KB) Jim Clarke
  2. Icon Motivation and Vision (Opening Remarks) (150.8 KB) Samuel Weber
  3. Icon Motivation and Vision (US Perspective) (1.2 MB) Karl Levitt
  4. Icon Motivation and Vision (EU Perspective) (1.3 MB) Barbara Daskala
  5. Icon Threats and Actors (716.6 KB) Sotiris Ioannidis
  6. Icon Straw man architecture for International data exchange and collaborative analysis (1005.3 KB) John C. Mallery
  7. Icon Data exchange architecture used in a financial application in South Africa (248.9 KB) Barend Taute
  8. Icon Identity related issues for data handling and aggregation (132.3 KB) Glenn Gran
  9. Icon Legal, Regulatory, Privacy, and Political Challenges (3.2 MB) Jody Westby
  10. Icon Next steps for planning of workshop in Q4 2011 (636.3 KB) Jim Clarke

A number of additional positions were submitted to the organisers prior to the session and these are included here:

  1. Icon Challenges in streaming temporal and spatial network data (78.1 KB) Chalmers University
  2. Icon Multi-party computation approach as a privacy solution developed in the SEPIA project (314.5 KB) ETH Zurich
  3. Icon Different approaches for data sharing (78.0 KB) Moscow State University
  4. Icon Joint collaboration to guarantee an optimal incident response and post incident data analysis in mobile scenarios (148.2 KB) JRC & KTH
15:00-15:30Coffee Break
15:30-16:10Session 4 - Student Papers (Chair: Herbert Bos)
Icon slides (151.5 KB) Outsourcing Malicious Infrastructure to the Cloud. Georgios Kontaxis, Iasonas Polakis, Sotiris Ioannidis (Institute of Computer Science - Foundation for Research and Technology Hellas)
Icon slides (164.5 KB) Demarcation of Security in Authentication Protocols. Naveed Ahmed, Christian Damsgaard Jensen (DTU Informatics)
16:10-17:30Session 5 - 5' Position Papers (Chair: Stefano Zanero)
Icon slides (849.8 KB) System Security Research at Newcastle. Jeff Yan (Newcastle University)
Icon slides (175.5 KB) Security Research at NASK: Supporting the operational needs of a CERT team and more. Piotr Kijewski (NASK/CERT Polska),
Adam Kozakiewicz (NASK)
Icon slides (1.6 MB) The security aspects of the research activities in IICT-BAS. Kiril Boyanov (IPP-BAS)
Icon slides (246.9 KB) Less is More: A Secure Microkernel-Based Operating System. Adam Lackorzynski, Alexander Warg (Technische Universitat Dresden)
Icon slides (3.0 MB) Computer Security and Machine Learning: Worst Enemies or Best Friends? Konrad Rieck (Technische Universitat Berlin)
  Icon slides (566.7 KB) Systems Security at VU University Amsterdam. Herbert Bos, Lorenzo Cavallaro (VU Amsterdam)
Icon slides (2.4 MB) System Security Research at Birmingham: Current Status and Some Future Work. Marco Cova (University of Birmingham)
Icon slides (334.6 KB) The SPARCHS Project: Hardware Support for Software Security. Simha Sethumadhavan, Sal Stolfo, Angelos Keromytis, Junfeng Yang (Columbia University),
David August (Princeton University)
Icon slides (1.6 MB) Malicious Website Detection: Effectiveness and Efficiency Issues. Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam (Fondazione Bruno Kessler)
Icon slides (378.1 KB) The MINESTRONE Architecture: Combining Static and Dynamic Analysis Techniques for Software Security. Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang (Columbia University),
Angelos Stavrou, Anup Ghosh (George Mason University),
Dawson Engler (Stanford University),
Marc Dacier, Matthew Elder, Darrell Kienzle (Symantec Research Labs)
Icon slides (736.3 KB) Systems Security Research at Ruhr-University Bochum. Thorsten Holz (Ruhr-University Bochum)