6th International Conference on Information Systems Security

(ICISS 2010)

 

 

Programme Schedule

 

 

December 15, 2010

 

8:30 – 9:30

Registration

9:30 – 11:00

Tutorial 1

Cancelled

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Tutorial 1 (continued)

Cancelled

13:00 – 14:00

Lunch Break

14:00 – 15:30

Tutorial 2

Title: Secure Multiparty Computation and Applications

Speaker: Amitabh Saxena

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:30

Tutorial 2 (continued)

 

 

 

December 16, 2010

 

8:30 – 9:30

Registration

9:30 – 11:00

Tutorial 3

Title: Verification of Multithreaded Shared-memory Programs

Speaker: Alexandar Malkis

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Tutorial 3 (continued)

13:00 – 14:00

Lunch Break

14:00 – 15:30

Tutorial 4

Title: Semantics-Based Techniques for Security Analysis and Verification

Speaker: Agostino Cortesi

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:30

Tutorial 4 (continued)

 


 

 

December 17, 2010

 

8:30 – 9:30

Registration

9:30 – 10:00

Inauguration

10:00 – 11:00

Keynote Talk 1

Title: Towards Securely Programming the Internet

Speaker: Andrew Myers, Cornell University, USA

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Paper Session: Access Control and Auditing

Ravi Kumar, Shamik Sural and Arobinda Gupta Mining RBAC Roles under Cardinality Constraint

Fathiyeh Faghih, Morteza Amini, Rasool Jalili Specification of History based Constraints for Access Control in Conceptual Level

Wei Wang, Xiangliang Zhang, Georgios Pitsilis Abstracting Audit Data for Lightweight Intrusion Detection

13:00 – 14:00

Lunch Break

14:00 – 15:00

Keynote Talk 2

Title: Analyzing Explicit Information Flow

Speaker: Sriram Rajamani, Microsoft Research India

15:00 – 15:30

Tea/Coffee Break

15:30 – 17:00

Paper Session: System Security

Raju Halder and Agostino Cortesi A Persistent Public Watermarking of Relational Databases

Mathieu Jaume Security rules versus Security properties

Shaoying Cai, Chunhua Su, Yingjiu Li, Tieyan Li and Robert H. Deng Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains

 


 

 

December 18, 2010

 

10:00 – 11:00

Keynote Talk 3

Title: WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications

Speaker: Venkat Venkatakrishnan, University of Illinois Chicago, USA

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Poster Session

13:00 – 14:00

Lunch Break

14:00 – 15:30

Paper Session: Web and Data Security I

Michelle Zhou, Prithvi Bisht, V.N. Venkatakrishnan Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation

Thanh Binh Dao and Etsuya Shibayama Coverage Criteria for Automatic Security Testing Of Web Applications

Moritz Y. Becker, Alexander Malkis, and Laurent Bussard A Practical Generic Privacy Language

15:30 – 16:00

Tea/Coffee Break

16:00 – 17:00

Paper Session: Web and Data Security II

Ping Chen, Han Hao, Bing Mao, and Li Xie Efficient Detection of the Return-Oriented Programming Malicious Code

Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan and Frank Piessens ValueGuard: Protection of native applications against data-only buffer overflows

17:00 onwards

Cultural Function + Banquet

 

 


 

 

December 19, 2010

 

10:00 – 11:00

Keynote Talk 4

Title: Attribution of Malicious Behavior

Speaker: Jon Giffin, Georgia Institute of Technology, USA

11:00 – 11:30

Tea/Coffee Break

11:30 – 13:00

Paper Session: Integrity and Verifiability

Arnar Birgisson, Alejandro Russo and Andrei Sabelfeld Unifying Facets of Information Integrity

Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad and Amiya Bhattacharya Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation

Mridul Nandi, Stefan Popoveniuc, and Poorvi Vora Stamp-It: A Method for Enhancing Universal Verifiability

13:00 – 14:00

Lunch