Following is the EuroSec 2015 programme. Followor on Twitter to stay up to date with the workshop news.
|9:00-10:30||Welcome and Keynote|
|Welcome and introductionJuan Caballero (Workshop Chair)|
Invited talk: Security applications of GPUs: The Good, the Bad, and the Ugly Giorgos Vasiliadis
Abstract: Modern graphics processors have been traditionally used for gaming, but in the last few years they have been used more and more in the area of high performance computing. In this talk we will explore alternate uses of graphics processors, in the area of security. We will discuss how a defender can use graphics hardware to bolster system defenses, and how miscreants can exploit them to build better and stealthier malware.
|11:00-12:30||Session 1 - Large Systems & Insiders|
|Deployment Challenges in Log-Based PKI Enhancements. Stephanos Matsumoto (Carnegie Mellon University), Pawel Szalachowski, Adrian Perrig (ETH Zurich)|
|A study on data de-pseudonymization in the smart grid. Valentin Tudor, Magnus Almgren, Marina Papatriantafilou (Chalmers University of Technology)|
|Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment. Jonathan Voris (New York Institute of Technology), Jill Jermyn, Nathaniel Boggs, Salvatore Stolfo (Columbia University)|
|14:00-16:00||Session 2 - Web & Mobile|
|Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption. Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis (FORTH)|
|Collaborative Filtering Under a Sybil Attack: Analysis of a Privacy Threat.Davide Frey, Anne-Marie Kermarrec, Antoine Rault (INRIA), Rachid Guerraoui (EPFL)|
|Mobile Device Fingerprinting Considered Harmful for Risk-based Authentication. Jan Spooren, Davy Preuveneers, Wouter Joosen (iMinds-DistriNet, KU Leuven)|
|Exploring Reverse Engineering Symptoms in Android apps. Hugo Gonzalez, Natalia Stakhanova (University of New Brunswick)|