Post on 29-Jun-2020
C
Consiglio Nazionale delle Ricerche
Progetto Immagine coordinata ESORICS2012
P. Andronico
IIT B4-04/2012
Nota Interna
Ottobre 2012
Iit
Istituto di Informatica e Telematica
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 1
PROGETTO IMMAGINE COORDINATA
ESORICS2012 Patrizia Andronico
ESORICS 20
ESORICS 20
2 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
Premessa
ESORICS - European Symposium on Research in Computer Security - è considerato un evento importante a livello europeo nel campo della sicurezza informatica, come si legge sul sito ufficiale dell’edizione 2012:
Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.
Progressively organized in a series of European countries, the symposium is confirmed as the European research event in computer security.
Per l’edizione 2012 è stato scelto di ospitarla a Pisa nei locali dell’Area della Ricerca del CNR con il supporto del gruppo Trustworthy and Secure Future Internet, general chair il dott. Fabio Martinelli. L’organizzazione dell’evento è stata curata dalla Segreteria Scientifica dello IIT come sempre in stretta collaborazione con il general chair dell’evento.
ESORICS2012 oltre al Simposio, dal 10 al 12 settembre, aveva in programmazione anche 5 workshop satelliti specifici, dal 13 al 14 settembre. Una settimana completa di impegni scientifici e un buon numero di oggetti grafici da progettare e realizzare dopo aver studiato una immagine coordinata che accompagnasse tutti gli eventi in agenda.
Il presente documento raccoglie i risultati di tutti gli oggetti grafici realizzati per l’immagine coordinata dell’evento.
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 3
Contents
Premessa 2
aggiornamento logo 4
Banner WeB 4
scelta colori Per l’immagine coordinata 4
scelta Borsa congressuale e Personalizzazione 5
Personalizzazione Borsa con logo conferenza 5
Banner esterno e Poster PuBBlicitario da distriBuire 6
Poster simPosio e Programma 8
immagine WorkshoP stm: colori, Badge, Poster 10
immagine WorkshoP Qasa: colori, Badge, Poster 12
immagine WorkshoP euroPki: colori, Badge, Poster 14
immagine WorkshoP dPm: colori, Badge, Poster 16
immagine WorkshoP euroPki: colori, Badge, Poster 18
cartellonistica evento 20
4 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
aggiornamento logo
sCelta Colori Per l’immagine Coordinata
ESORICS 2012
Banner WeB
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 5
ESORICS 201217th European Symposium on Research in Computer Security
sCelta Borsa Congressuale e Personalizzazione
ESORICS 201217th European Symposium on Research in Computer Security
ESORICS 2012
17th European Symposium on Research in Computer Security
Patrizia Andronicobozza logo per zainetti ESORICS201220120724
Personalizzazione Borsa Con logo Conferenza
6 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r S e c u r i t y
ES
OR
ICS
20
12
t h
Banner esterno
e Poster PuBBliCitario da distriBuire
banner esterno 5mtx1mt (stampa tipografica su PVC)
poster pubblicitario(stampa tipografica e piegatura)
invio imbustato via posta di superficie
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 7
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
I N V I T E D S P E A K E RG i l l e s B a r t h e , I M D E A S o f t w a r e I n s t i t u t e , S p a i n
C h r i s t i a n C a c h i n , I B M R e s e a r c h - Z u r i c h , S w i t z e r l a n d
A h m a d - R e z a S a d e g h i , T U D a r m s t a d t , G e r m a n y
C O - L O C A T E D W O R K S H O P S
• 7 t h I n t e r n a t i o n a l W o r k s h o p o n D a t a P r i v a c y M a n a g e m e n t ( D P M )
• 9 t h E u r o p e a n P K I W o r k s h o p : R e s e a r c h a n d A p p l i c a t i o n s ( E u r o P K I )
• I n t e r n a t i o n a l W o r k s h o p o n Q u a n t i t a t i v e A s p e c t s i n S e c u r i t y A s s u r a n c e ( Q A S A )
• 5 t h I n t e r n a t i o n a l W o r k s h o p o n A u t o n o m o u s a n d S p o n t a n e o u s S e c u r i t y ( S E T O P )
• 8 t h I n t e r n a t i o n a l W o r k s h o p o n S e c u r i t y a n d T r u s t M a n a g e m e n t ( S T M )
Program Committee Claudio A. Ardagna, Università degli Studi di Milano, Italy Alessandro Armando, Università di Genova, Italy Mikhail Atallah, Purdue University, USA Michael Backes, Saarland University, Germany David A. Basin, ETH Zurich, Switzerland Kevin Bauer, University of Waterloo, Canada Joachim Biskup, University of Dortmund, Germany Marina Blanton, University of Notre Dame, USA Carlo Blundo, Università degli Studi di Salerno, Italy Kevin R.B. Bulter, University of Oregon, USA Srdjan Capkun, ETH Zurich, Switzerland Liqun Chen, HP Labs, UK Seung-Geol Choi, University of Maryland, USA Veronique Cortier, LORIA, France Marco Cova, University of Birmingham, UK Jason Crampton, University of London, UK Frederic Cuppens, Telecom Bretagne, France Anupam Datta, Carnegie Mellon University, USA Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy Claudia Diaz, K.U. Leuven, Belgium Sven Dietrich, Stevens Institute of Technology, USA Roberto Di Pietro, Roma Tre University of Rome, Italy Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Wenliang Du, Syracuse University, USA Riccardo Focardi, University of Venice, Italy Simon Foley, University College Cork, Ireland Keith B. Frikken, Miami University, USA Dieter Gollmann, TU Hamburg-Harburg, Germany Dimitris Gritzalis, AUEB, Greece Ryan Henry, University of Waterloo, Canada Amir Herzberg, Bar-Ilan University, Israel Sushil Jajodia, George Mason University, USA Aaron Johnson, U.S. Naval Research Lab, USA Stefan Katzenbeisser, TU Darmstadt, Germany KwangJo Kim, KAIST, Korea Markulf Kohlweiss, Microsoft Research, UK Michiharu Kudo, IBM Tokyo Research Laboratory, Japan Miroslaw Kutylowski, Wroclaw Univ. of Technology, Poland Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA Dongdai Lin, Chinese Academy of Sciences, China Javier Lopez, University of Malaga, Spain Wenjing Lou, Virginia Polytechnic Inst. and State Univ., USA John C. Mitchell, Stanford University, USA Atsuko Miyaji, JAIST, Japan David Naccache, ENS, France Peng Ning, North Carolina State University, USA Stefano Paraboschi, Università degli Studi di Bergamo, Italy Guenther Pernul, University of Regensburg, Germany Benny Pinkas, Bar Ilan University, Israel Michalis Polychronakis, Columbia University, USA Jean-Jacques Quisquater, UCL, Belgium Indrakshi Ray, Colorado State University, USA Kui Ren, Illinois Institute of Technology, USA Peter Ryan, University of Luxembourg, Luxembourg Ahmad-Reza Sadeghi, TU Darmstadt, Germany Rei Safavi-Naini, University of Calgary, Canada Kouichi Sakurai, Kyushu University, Japan Pierangela Samarati, Università degli Studi di Milano, Italy R. Sekar, Stony Brook University, USA Elaine Shi, PARC/UC Berkley, USA Einar Snekkenes, Gjovik University College, Norway Abhinav Srivastava, AT&T Labs - Research, USA Carmela Troncoso, K.U. Leuven, Belgium Yevgeniy Vahlis, AT&T, USA Jaideep Vaidya, Rutgers University, USA Michael Waidner, TU Darmstadt, Germany Shouhai Xu, University of Texas at San Antonio, USA Ting Yu, North Carolina State University, USA Jianying Zhou, Institute for Infocomm Research, Singapore
general Chair Fabio Martinelli - National Research Council - CNR, Italy
Program Chairs Sara Foresti - Università degli Studi di Milano, Italy Moti Yung - Google Inc. and Columbia University, USA
PubliCity Chair Giovanni Livraga - Università degli Studi di Milano, Italy
loCal organizing Committe Adriana Lazzaroni (chair) - IIT - CNR, Italy Patrizia Andronico - IIT - CNR, Italy Raffaella Casarosa - IIT - CNR, Italy Ilaria Matteucci - IIT - CNR, Italy Paolo Mori - IIT - CNR, Italy Marinella Petrocchi - IIT - CNR, Italy Daniele Sgandurra - IIT - CNR, Italy
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
8 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
Poster simPosio e Programma
ES
OR
ICS
20
12 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
Istituto di Informatica
e Telematica
09:00-10:15 plenary sessionAUDITORIUM
• Welcomeandopening• InvitedTalk:MindtheGap:SmartPhoneSecurityandPrivacyinTheoryandPracticeby Ahmad-Reza Sadeghi
10:45-12:45 parallel sessionsAUDITORIUM ROOM 27Session 1A: Security and data protection in real systems (chair: Amir Herzberg)
• ModelingandEnhancingAndroid’sPermissionSystemby Elli Fragkaki, Lujo Bauer, Limin Jia and David Swasey
• HardeningAccessControlandDataProtectioninGFS-likeFileSystemsby James Kelley, Roberto Tamassia and Nikos Triandopoulos
• AttackoftheClones:DetectingClonedApplicationsonAndroidMarketsby Jonathan Crussell, Clint Gibler and Hao Chen
• BoostingthePermissivenessofDynamicInformation-FlowTrackingbyTestingby Arnar Birgisson, Daniel Hedin and Andrei Sabelfeld
Session 1B: Formal models for cryptography and access control (chair: Luigi Mancini)
• EffectiveSymbolicProtocolAnalysisviaEquationalIrreducibilityConditionsby Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, Jose Meseguer, Paliath Narendran, Sonia Santiago and Ralf Sasse
• DecidingEpistemicandStrategicPropertiesofCryptographicProtocolsby Henning Schnoor• SatisfiabilityandFeasibilityinaRelationship-basedWorkflowAuthorizationModelby Arif
Khan and Philip Fong• DecidingSecurityforaFragmentofASLanby Sebastian A. Mödersheim
14:15-15:45 parallel sessionsAUDITORIUM ROOM 27Session 2A: Security and privacy in mobile and wireless networks (chair: Roberto Di Pietro)
• AProbabilisticFrameworkforLocalizationofAttackersinMANETsby Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia and Paulo Shakarian
• RobustProbabilisticFakePacketInjectionforReceiver-LocationPrivacyinWSNby Ruben Rios, Jorge Cuellar and Javier Lopez
• Privacy-AwareMessageExchangesforGeographicallyRoutedHumanMovementNetworksby Adam Aviv, Micah Sherr, Matt Blaze and Jonathan Smith
Session 2B: Counteracting Man-in-the-Middle attacks (chair: Lujo Bauer)• TrustNoOneElse:DetectingMITMAttacksAgainstSSL/TLSwithoutThird-Partiesby Italo
Dacosta, Mustaque Ahamad and Patrick Traynor• X.509Forensics:DetectingandLocalisingtheSSL/TLSMen-in-the-middleby Ralph Holz,
Thomas Riedmaier, Nils Kammenhuber and Georg Carle• APracticalMan-In-The-MiddleAttackonSignal-basedKeyGenerationProtocolsby Simon
Eberz, Martin Strohmeier, Matthias Wilhelm and Ivan Martinovic
16:15-17:45 parallel sessionsAUDITORIUM ROOM 27Session 3A: Network security (chair: Ivan Martinovic)
• TheSilenceoftheLANs:EfficientLeakageResilienceforIPsecVPNsby Ahmad-Reza Sadeghi, Steffen Schulz and Vijay Varadharajan
• SecurityofPatchedDNSby Amir Herzberg and Haya Shulman• RevealingAbusesofChannelAssignmentProtocolsinMulti-ChannelWirelessNetworks:AnInvestigationLogicApproachby Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu and Peng Liu
Session 3B: Users privacy and anonymity (chair: Einar Snekkenes)• ExploringLinkablilityofUserReviewsby Mishari Almishari and Gene Tsudik• FormalAnalysisofPrivacyinaneHealthProtocolby Naipeng Dong, Hugo Jonker and Jun Pang• PRIVATUS:Wallet-FriendlyPrivacyProtectionforSmartMeters
by Jinkyu Koo, Xiaojun Lin and Saurabh Bagchi
09:15-10:15 plenary sessionAUDITORIUM
• InvitedTalk:Computer-AidedCryptographicProofsandDesignsby Gilles Barthe
10:45-12:45 parallel sessionsAUDITORIUM ROOM 27Session 4A: Location privacy (chair: Keith Frikken)
• SHARP:PrivateProximityTestandSecureHandshakewithCheat-ProofLocationTagsby Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou
• SecureProximityDetectionforNFCDevicesbasedonAmbientSensorDataby Tzipora Halevi, Di Ma, Nitesh Saxena and Tuo Xiang
• EnhancingLocationPrivacyforElectricVehicles(attheRightTime)by Joseph Liu, Man Ho Au, Willy Susilo and Jianying Zhou
• DesignandImplementationofaTerroristFraudResilientDistanceBoundingSystemby Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelee and Srdjan Capkun
Session 4B: Voting protocols and anonymous communication (chair: Mirek Kutylowski)• ApplyingDivertibilitytoBlindBallotCopyingintheHeliosInternetVotingSystemby Yvo Desmedt
and Pyrros Chaidos• DefiningPrivacyforWeightedVotes,SingleandMulti-VoterCoercionby Jannik Dreier, Pascal
Lafourcade and Yassine Lakhnech• TorScan:TracingLong-livedConnectionsandDifferentialScanningAttacksby Alex Biryukov, Ivan
Pustogarov and Ralf Philipp Weinmann• IntroducingthegMixOpenSourceFrameworkforMixImplementationsby Karl-Peter Fuchs,
Dominik Herrmann and Hannes Federrath
14:15-15:45 parallel sessionsAUDITORIUM ROOM 27Session 5A: Private computation in cloud systems (chair: Emiliano De Cristofaro)
• SecureandEfficientOutsourcingofSequenceComparisonsby Marina Blanton, Mikhail J. Atallah, Keith B. Frikken and Qutaibah Malluhi
• Third-PartyPrivateDFAEvaluationonEncryptedFilesintheCloudby Lei Wei and Michael Reiter
• NewAlgorithmsforSecureOutsourcingofModularExponentiationsby Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang and Wenjing Lou
Session 5B: Formal security models (chair: Gilles Barthe)• TowardsSymbolicEncryptionSchemesby Naveed Ahmed, Christian Damsgaard Jensen and
Erik Zenner• DecisionProceduresforSimulatabilityby Charanjit Jutla and Arnab Roy• Model-CheckingBisimulation-basedInformationFlowPropertiesforInfiniteStateSystemsby
Deepak D’Souza and K. R. Raghavendra
16:15-17:45 parallel sessionsAUDITORIUM ROOM 27Session 6A: Identity based encryption and group signature (chair: Joachim Posegga)
• Identity-BasedTraitorTracingwithShortPrivateKeyandShortCiphertextby Fuchun Guo, Yi Mu and Willy Susilo
• Identity-BasedEncryptionwithMasterKey-DependentMessageSecurityandLeakage-ResiliencebyDavid Galindo, Javier Herranz and Jorge Villar
• UniqueGroupSignaturesby Matthew Franklin and Haibin Zhang
Session 6B: Authentication (chair: Nora Cuppens)• RelationsamongNotionsofPrivacyforRFIDAuthenticationProtocolsby Daisuke Moriyama,
Shin’Ichiro Matsuo and Miyako Ohkubo• PE(AR)^2:Privacy-EnhancedAnonymousAuthenticationwithReputationandRevocationby Kin
Ying Yu, Tsz Hon Yuen, Sherman S.M. Chow, S.M. Yiu and Lucas C.K. Hui• DismantlingiClassandiClassEliteby Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
and Milosch Meriac
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
09:00-10:15 plenary sessionAUDITORIUM
• InvitedTalk:IntegrityofStorageandComputationsintheCloudby Christian Cachin
10:45-12:45 plenary sessionAUDITORIUMSession 7: Encryption key and password security (chair: Joaquin Garcia-Alfaro)
• EvaluationofStandardizedPassword-basedKeyDerivationagainstParallelProcessingPlatformsby Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalcin and Ralf Zimmermann• BeyondeCK:PerfectForwardSecrecyunderActorCompromiseandEphemeral-KeyRevealby Cas Cremers and Michele Feltz• Bleichenbacher’sAttackStrikesAgain:BreakingPKCS#1v1.5inXMLEncryptionby Tibor Jager, Sebastian Schinzel and Juraj Somorovsky• OnTheSecurityofPasswordManagerDatabaseFormatsby Paolo Gasti and Kasper Rasmussen
14:15-15:45 plenary sessionAUDITORIUMSession 8: Malware and phishing (chair: Frédéric Cuppens)
• ScalableTelemetryClassificationforAutomatedMalwareDetectionby Jack Stokes, John Platt, Helen Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas and Marius Gheorghescu• Abstraction-basedMalwareAnalysisUsingRewritingandModelCheckingby Philippe Beaucamps, Isabelle Gnaedig and Jean-Yves Marion• DetectingPhishingEmailstheNaturalLanguageWayby Rakesh Verma, Narasimha Shashidhar and Nabil Hossain
16:15-17:45 plenary sessionAUDITORIUMSession 9: Software security (chair: Dieter Gollmann)
• JVM-PortableSandboxingofJava’sNativeLibrarieby Mengtao Sun and Gang Tan• Codejail:Application-transparentIsolationofLibrarieswithTightProgramInteractionsby Yongzheng Wu, Sai Sathyanarayan Venkatraman, Roland Yap and Zhenkai Liang• SocialImpact:SystematicAnalysisofUndergroundSocialDynamicsby Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi
stampa in A0 su plotter, carta fotografica
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 9
programma SImposio e Workshops collegati (stampa tipografica)
ESORICS 2012
ESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
ESORICS 2012
badge Simposio fronte/retro
10 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
STMimmagine WorkshoP stm:
Colori, Badge, Poster
ESORICS 2012
ESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
STM
ESORICS 2012
QASASTM
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
STM
ESORICS 2012
STM
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 11
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
T h u r s d a y, S e p t e m b e r 1 3 t h , 2 0 1 2
0 9 : 1 0 - 1 0 : 4 5S e s s i o n 1 : P o l i c y E n f o r c e m e n t a n d M o n i t o r i n g
• C o s t - a w a r e R u n t i m e E n f o r c e m e n t o f S e c u r i t y P o l i c i e s b y P e t e r D r a b i k , F a b i o M a r t i n e l l i , a n d C h a r l e s M o r i s s e t • E n f o r c i n g M o r e w i t h L e s s : F o r m a l i z i n g Ta r g e t - a w a r e R u n - t i m e M o n i t o r s b y Y a n n i s M a l l i o s , L u j o B a u e r , D i l s u n K a y n a r , a n d J a y L i g a t t i • L a z y S e c u r i t y C o n t r o l l e r s b y G i u l i o C a r a v a g n a , G a b r i e l e C o s t a , a n d G i o v a n n i P a r d i n i
1 1 : 1 5 - 1 2 : 4 5S e s s i o n 2 : A c c e s s c o n t r o l
• A u t o m a t e d A n a l y s i s o f S c e n a r i o - b a s e d S p e c i f i c a t i o n s o f D i s t r i b u t e d A c c e s s C o n t r o l P o l i c i e s w i t h N o n - M e c h a n i z a b l e A c t i v i t i e s b y M i c h e l e B a r l e t t a , S i l v i o R a n i s e , a n d L u c a V i g a n ò
• L a b e l e d G o a l - d i r e c t e d S e a r c h i n A c c e s s C o n t r o l L o g i c b y V a l e r i o G e n o v e s e , D e e p a k G a r g , a n d D a n i e l e R i s p o l i • A U s e - b a s e d A p p r o a c h f o r E n h a n c i n g U C O N b y C h r i s t o s G r o m p a n o p o u l o s , A n t o n i o s G o u g l i d i s , a n d I o a n n i s M a v r i d i s • A n a l y s i s o f C o m m u n i c a t i n g A u t h o r i z a t i o n P o l i c i e s b y S i m o n e F r a u a n d M o h a m m a d T o r a b i D a s h t i
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 3 : T r u s t , R e p u t a t i o n , a n d P r i v a c y
• B u i l d i n g T r u s t a n d R e p u t a t i o n I n : A D e v e l o p m e n t F r a m e w o r k f o r T r u s t M o d e l s I m p l e m e n t a t i o n b y F r a n c i s c o M o y a n o , C a r m e n F e r n a n d e z - G a g o , a n d J a v i e r L o p e z
• M a t r i x P o w e r s A l g o r i t h m s f o r T r u s t E v a l u a t i o n i n P u b l i c - K e y I n f r a s t r u c t u r e s b y J e a n - G u i l l a u m e D u m a s a n d H i c h a m H o s s a y n i • F o r m a l M o d e l l i n g o f ( D e ) P s e u d o n y m i s a t i o n : A C a s e S t u d y i n H e a l t h C a r e P r i v a c y b y M e i l o f V e e n i n g e n , B e n n e d e W e g e r , a n d N i c o l a Z a n n o n e
1 6 : 1 5 - 1 7 : 4 5E R C I M P h D A w a r d Ta l k
8TH INTERNATIONAL WORKSHOP ON
SECURITY AND TRUST MANAGEMENT
F r i d a y, S e p t e m b e r 1 4 t h , 2 0 1 20 9 : 1 5 - 1 0 : 4 5S e s s i o n 5 : D i s t r i b u t e d S y s t e m s a n d P h y s i c a l S e c u r i t y
• S w i t c h w a l l : A u t o m a t e d To p o l o g y F i n g e r p r i n t i n g & B e h a v i o r D e v i a t i o n I d e n t i f i c a t i o n b y N e l s o n N a z z i c a r i , J a v i e r A l m i l l a t e g u i , A n g e l o s S t a v r o u , a n d S u s h i l J a j o d i a
• D O T - C O M : D e c e n t r a l i z e d O n l i n e T r a d i n g a n d C O M m e r c e b y M o t i G e v a a n d A m i r H e r z b e r g
• F o r m a l i z i n g P h y s i c a l S e c u r i t y P r o c e d u r e s b y C a t h e r i n e M e a d o w s a n d D u s k o P a v l o v i c
1 1 : 1 5 - 1 2 : 4 5S e s s i o n 6 : A u t h e n t i c a t i o n
• A P U F - b a s e d A u t h e n t i c a t i o n P r o t o c o l t o A d d r e s s T i c k e t - S w i t c h i n g o f R F I D - t a g g e dI t e m s b y S j o u k e M a u w a n d S e l w y n P i r a m u t h u • A u t h e n t i c a t i n g E m a i l S e a r c h R e s u l t s b y O l g a O h r i m e n k o , H o b a r t R e y n o l d s , a n d
R o b e r t o T a m a s s i a • S o f t w a r e A u t h e n t i c a t i o n t o E n h a n c e T r u s t i n B o d y S e n s o r N e t w o r k s b y J o e p d e
G r o o t , V i n h B u i , J e a n - P a u l L i n n a r t z , J o h a n L u k k i e n , a n d R i c h a r d V e r h o e v e n • Y u b i S e c u r e ? F o r m a l S e c u r i t y A n a l y s i s R e s u l t s f o r t h e Y u b i k e y a n d
Y u b i H S M b y R o b e r t K ü n n e m a n n a n d G r a h a m S t e e l
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 7 : S e c u r i t y P o l i c i e s
• B o o s t i n g M o d e l C h e c k i n g t o A n a l y s e L a r g e A R B A C P o l i c i e s b y S i l v i o R a n i s e , A n h T r u o n g , a n d A l e s s a n d r o A r m a n d o • C o n s t r a i n e d R o l e M i n i n g b y C a r l o B l u n d o a n d S t e l v i o C i m a t o • A D a t a l o g S e m a n t i c s f o r P a r a l o c k s b y B a r t v a n D e l f t , N i k l a s B r o b e r g , a n d D a v i d S a n d s
STM
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
12 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
QASAimmagine WorkshoP Qasa:
Colori, Badge, Poster
ESORICS 2012
QASAESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
QASA
ESORICS 2012
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
ESORICS 2012
QASANESSoS
QASA
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
QASA
ESORICS 2012
QASA
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 13
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
F r i d a y, S e p t e m b e r 1 4 t h , 2 0 1 2 0 9 : 1 0 - 1 0 : 4 5S e s s i o n 1 : Q u a n t i t a t i v e i n f o r m a t i o n f l o w
• I n v i t e d T a l k : Q u a n t i t a t i v e I n f o r m a t i o n - F l o w - F u n d a m e n t a l T e c h n i q u e s a n d A p p l i c a t i o n s t o S i d e - C h a n n e l A n a l y s i s b y B o r i s K o e p f
• P r e c i s e Q u a n t i t a t i v e I n f o r m a t i o n F l o w A n a l y s i s U s i n g S y m b o l i c M o d e l C o u n t i n g b y V l a d i m i r K l e b a n o v
1 1 : 1 5 - 1 2 : 4 5S e s s i o n 2 : I n f o r m a t i o n f l o w , r i s k , c o o p e r a t i o n a n d d e c i s i o n m a k i n g
• F r o m Q u a l i t a t i v e t o Q u a n t i t a t i v e I n f o r m a t i o n E r a s u r e b y A d e d a y o A d e t o y e a n d M i c h a e l G o l d s m i t h• T r a d i n g P e r f o r m a n c e a n d C o o p e r a t i o n I n c e n t i v e s i n U s e r - C e n t r i c N e t w o r k s b y A l e s s a n d r o A l d i n i a n d A l e s s a n d r o
B o g l i o l o• A s s e s s i n g t h e U s e f u l n e s s o f T e s t i n g f o r V a l i d a t i n g t h e C o r r e c t n e s s o f S e c u r i t y R i s k M o d e l s B a s e d o n a n I n d u s t r i a l
C a s e S t u d y b y G e n c e r E r d o g a n , F r e d r i k S e e h u s e n , K e t i l S t ø l e n a n d a n d J a n A a g e d a l• S y s t e m a t i c d e c i s i o n m a k i n g i n s e c u r i t y m a n a g e m e n t : M o d e l l i n g p a s s w o r d u s a g e a n d s u p p o r t b y A d a m B e a u t e m e n t ,
A n g e l a S a s s e , D a v i d P y m , S i m o n A r n e l l , P h i l i p I n g l e s a n t a n d B r i a n M o n a h a n
INTERNATIONAL WORKSHOP ON
QUANTITATIVE ASPECTS IN
QASA
SECURITY ASSURANCE
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 3 : P a n e l o n Q u a n t i t a t i v e A s p e c t s o f S e c u r i t y
1 6 : 1 5 - 1 7 : 4 5S e s s i o n 4 : Q u a n t i t a t i v e a s p e c t s i n a c c e s s a n d u s a g e c o n t r o l
• I m p l e m e n t i n g T r u s t a n d R e p u t a t i o n S y s t e m s : A F r a m e w o r k f o r D e v e l o p e r s ’ U s a g e b y F r a n c i s c o M o y a n o , C a r m e n F e r n á n d e z G a g a n d J a v i e r L o p e z
• Q u a n t i t a t i v e M e t h o d s f o r U s a g e C o n t r o l b y L e a n i d K r a u t s e v i c h , A l i a k s a n d r L a z o u s k i , P a o l o M o r i a n d A r t s i o m Y a u t s i u k h i n
• I m p l e m e n t i n g A c c e s s C o n t r o l M a r k o v D e c i s i o n P r o c e s s e s w i t h G L P K / G M P L b y C h a r l e s M o r i s s e t
14 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
EUROPKI
ESORICS 2012
EUROPKIESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
EUROPKI
ESORICS 2012
immagine WorkshoP euroPki:
Colori, Badge, Poster
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
EUROP-KI
ESORICS 2012
EUROPKI
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 15
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
T h u r s d a y, S e p t e m b e r 1 3 t h , 2 0 1 2 0 9 : 1 5 - 0 9 : 3 0W e l c o m e
0 9 : 3 0 - 1 0 : 4 5I n v i t e d Ta l k : K e y R e u s e i n P u b l i c K e y C r y p t o g r a p h y : T h e o r y a n d P r a c t i c e b y K e n n y P a t e r s o n
1 1 : 1 5 - 1 2 : 4 5S e s s i o n 1 : C r y p t o g r a p h i c S c h e m a s a n d P r o t o c o l s
• A n a l y s i s o f L a t t i c e R e d u c t i o n A t t a c k a g a i n s t t h e S o m e w h a t H o m o m o r p h i c E n c r y p t i o n B a s e d o n I d e a l L a t t i c e s b y M a s a y a Y a s u d a , J u n Y a j i m a , T a k e s h i S h i m o y a m a , J u n K o g u r e
• G r o u p K e y E x c h a n g e R e s i l i e n t t o L e a k a g e o f E p h e m e r a l S e c r e t K e y s w i t h S t r o n g C o n t r i b u t i v e n e s s b y C h e n g C h e n , Y a n f e i G u o , R u i Z h a n g
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 2 : P u b l i c K e y I n f r a s t r u c t u r e
• H o w t o a v o i d t h e B r e a k d o w n o f P u b l i c K e y I n f r a s t r u c t u r e s - F o r w a r d S e c u r e S i g n a t u r e s f o r C e r t i f i c a t e A u t h o r i t i e s b y J o h a n n e s B r a u n , A n d r e a s H u l s i n g , A l e x W i e s m a i e r , M a r t i n A . G . V i g i l , J o h a n n e s B u c h m a n n
• P e r s o n a l P K I f o r t h e S m a r t D e v i c e E r a b y J o h n L y l e , A n d r e w P a v e r d , J u s t i n K i n g - L a c r o i x , A n d r e a A t z e n i , H a b i b V i r j i , I v a n F l e c h a i s , S h a m a l F a i l y
• T h e N o t a r y B a s e d P K I b y M a r t i n V i g i l , C r i s t i a n M o e c k e , R i c a r d o C u s t o d i o , M e l a n i e V o l k a m e r
1 6 : 1 5 - 1 7 : 1 5S e s s i o n 3 : W i r e l e s s A u t h e n t i c a t i o n a n d T r u s t e d C o m p u t i n g
• H o w t o b o o t s t r a p t r u s t a m o n g d e v i c e s i n h o m e w i r e l e s s e n v i r o n m e n t s v i a E A P - S T L S b y M a s s i m i l i a n o P a l a
• A n o n y m i t y R e v o c a t i o n t h r o u g h S t a n d a r d I n f r a s t r u c t u r e s b y J e s u s D i a z , D a v i d A r r o y o , F r a n c i s c o B . R o d r i g u e z
9TH EUROPEAN PKI WORKSHOP:
RESEARCH AND APPLICATIONS
F r i d a y, S e p t e m b e r 1 4 t h , 2 0 1 20 9 : 3 0 - 1 0 : 4 5
I n v i t e d Ta l k : R o b e r t o D i P i e t r o
1 1 : 1 5 - 1 2 : 4 5S e s s i o n 4 : D i g i t a l S i g n a t u r e a n d T r u s t e d C o m p u t i n g
• C r o s s - U n l i n k a b l e H i e r a r c h i c a l G r o u p S i g n a t u r e s b y J u l i e n B r i n g e r , H e r v e C h a b a n n e , A l a i n P a t e y
• N o n - I n t e r a c t i v e P u b l i c A c c o u n t a b i l i t y f o r S a n i t i z a b l e S i g n a t u r e s b y C h r i s t i n a B r z u s k a , H e n r i c h C . P o h l s , a n d K a i S a m e l i n
• W a l t z i n g t h e B e a r , o r : A T r u s t e d V i r t u a l S e c u r i t y M o d u l e b y R o n a l d T o e g l , F l o r i a n R e i m a i r , a n d M a r t i n P i r k e r
1 4 : 1 5 - 1 5 : 1 5S e s s i o n 5 : C e r t i f i c a t e s a n d P u b l i c K e y E n c r y p t i o n
• G e o P K I : T r a n s l a t i n g S p a t i a l T r u s t i n t o C e r t i f i c a t e T r u s tb y T i f f a n y H y u n - J i n K i m , A d r i a n P e r r i g , V i r g i l G l i g o r • E f f i c i e n t P u b l i c K e y E n c r y p t i o n A d m i t t i n g D e c r y p t i o n b y S e n d e r b y P u w e n W e i , Y u l i a n g Z h e n g
EUROPKI
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
16 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
DPM
ESORICS 2012
DPMESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
DPM
ESORICS 2012
immagine WorkshoP dPm:
Colori, Badge, Poster
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
DPM
ESORICS 2012
DPM
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 17
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
T h u r s d a y, S e p t e m b e r 1 3 t h , 2 0 1 2 0 9 : 0 0 - 1 0 : 4 5S e s s i o n 1 : A u t h e n t i c a t i o n , A n o n y m i t y a n d L o c a t i o n - B a s e d S y s t e m s
• F a i r A n o n y m o u s A u t h e n t i c a t i o n f o r L o c a t i o n B a s e d S e r v i c e s , b y P a n a y i o t i s K o t z a n i k o l a o u , E m m a n o u i l M a g k o s a n d N i k o l a o s P e t r a k o s .
• E n h a n c i n g P r i v a c y i n L T E P a g i n g S y s t e m u s i n g P h y s i c a l L a y e r I d e n t i f i c a t i o n , b y T u a n T a a n d J o h n B a r a s .• P o s t - h o c U s e r T r a c e a b i l i t y A n a l y s i s i n E l e c t r o n i c To l l P r i c i n g S y s t e m s , b y X i h u i C h e n , D a v i d F o n k w e a n d J u n P a n g .• A n E f f i c i e n t a n d S e c u r e C o d i n g - b a s e d A u t h e n t i c a t e d E n c r y p t i o n , b y M o h a m m e d M e z i a n i a n d R a c h i d E l B a n s a r k h a n i
1 1 : 1 5 - 1 3 : 0 5S e s s i o n 2 : C a s e S t u d i e s o n C i t i z e n s ’ P r i v a c y
• I n v i t e d l e c t u r e : O n t h e F o u n d a t i o n s o f T r u s t i n N e t w o r k s o f H u m a n s a n d C o m p u t e r s b y V i r g i l G l i g o r• P r o p o s a l o f N o n - I n v a s i v e F i n g e r p r i n t A g e D e t e r m i n a t i o n t o I m p r o v e D a t a P r i v a c y M a n a g e m e n t i n P o l i c e W o r k f r o m a L e g a l
P e r s p e c t i v e u s i n g t h e E x a m p l e o f G e r m a n y , b y R o n n y M e r k e l , M a t t h i a s P o c s , J a n a D i t t m a n n a n d C l a u s V i e l h a u e r . • D i f f e r e n t i a l P r i v a c y i n T r i p a r t i t e I n t e r a c t i o n : A C a s e S t u d y w i t h L i n g u i s t i c M i n o r i t i e s i n C a n a d a , b y A r n a u d C a s t e i g t s , M a r i e - H é l è n e
C h o m i e n n e , L o u i s e B o u c h a r d a n d G u y - V i n c e n t J o u r d a n
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 3 : P r i v a c y i n D i s t r i b u t e d S y s t e m s
• E s P R E S S o : E f f i c i e n t P r i v a c y - P r e s e r v i n g E v a l u a t i o n o f S a m p l e S e t S i m i l a r i t y , b y C a r l o B l u n d o , E m i l i a n o D e C r i s t o f a r o a n d P a o l o G a s t i .
• S l o p P y : S l o p e O n e w i t h P r i v a c y , b y S e b a s t i e n G a m b s a n d J u l i e n L o l i v e . • A S e m i - L a t t i c e M o d e l f o r M u l t i - L a t e r a l S e c u r i t y , b y F l o r i a n K a m m u e l l e r .
1 6 : 1 5 - 1 7 : 4 5• I n v i t e d l e c t u r e : R e - u s i n g e x i s t i n g s e c u r i t y i n f r a s t r u c t u r e s b y C h r i s M i t c h e l l
7TH INTERNATIONAL WORKSHOP ON
DATA PRIVACY MANAGEMENT
F r i d a y, S e p t e m b e r 1 4 t h , 2 0 1 21 0 : 0 0 - 1 0 : 5 0S e s s i o n 4 : P r i v a c y P o l i c i e s
• P r i o r i t i z e d e x e c u t i o n o f p r i v a c y p o l i c i e s , b y I l a r i a M a t t e u c c i , P a o l o M o r i a n d M a r i n e l l a P e t r o c c h i .
• W h a t W e b s i t e s K n o w A b o u t Y o u - P r i v a c y P o l i c y A n a l y s i sU s i n g I n f o r m a t i o n E x t r a c t i o n , b y E l i s a C o s t a n t e , J e r r y D e n H a r t o g a n d M i l a n P e t k o v i c .
1 1 : 1 5 - 1 2 : 4 5
• I n v i t e d l e c t u r e : D a t a P r o t e c t i o n i n C l o u d S c e n a r i o s :I s s u e s a n d D i r e c t i o n s b y P i e r a n g e l a S a m a r a t i
DPM
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
18 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
SETOPimmagine WorkshoP euroPki:
Colori, Badge, Poster
ESORICS 2012
SETOPESORICS
Nome COGNOMEAffiliazione
Nome COGNOMECountry
SETOP
ESORICS 2012
ESORICS 2012
Nome COGNOMEAffiliazione
Nome COGNOMECountry
SETOP
ESORICS 2012
SETOP
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 19
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
T h u r s d a y, S e p t e m b e r 1 3 t h , 2 0 1 2 0 9 : 1 5 - 1 0 : 4 5S e s s i o n 1
• A n a l y z i n g H T T P U s e r A g e n t A n o m a l i e s f o r M a l w a r e D e t e c t i o n b y N i z a r K h e i r• A S 5 : A S e c u r e S e a r c h a b l e S e c r e t S h a r i n g S c h e m e f o r P r i v a c y P r e s e r v i n g D a t a b a s e O u t s o u r c i n g b y M o h a m m a d A l i H a d a v i , E r n e s t o
D a m i a n i , R a s o o l J a l i l i , S t e l v i o C i m a t o a n d Z e i n a b G a n j e i
1 1 : 1 5 - 1 2 : 4 5S h a r e d S e s s i o n w i t h D P M ( i n t h e D P M r o o m )
1 4 : 1 5 - 1 5 : 4 5S e s s i o n 2
• O n A d a p t a b l e M a r k o v C h a i n b a s e d A n o m a l y D e t e c t i o n i n W i r e l e s s S e n s o r N e t w o r k s b y D e n i s e D u d e k• μ S e c : A S e c u r i t y P r o t o c o l f o r U n i c a s t C o m m u n i c a t i o n i n W i r e l e s s S e n s o r N e t w o r k s b y A m r i t a G h o s a l , S a n j i b S u r a n d S i p r a D a s B i t• S e c u r i t y M o n i t o r i n g f o r C o n t e n t - C e n t r i c N e t w o r k i n g b y D a v i d G o e r g e n , T h i b a u l t C h o l e z , J é r ô m e F r a n ç o i s a n d T h o m a s E n g e l
1 6 : 1 5 - 1 7 : 4 5S e s s i o n 3
• A u t o m a t e d S m a r t p h o n e S e c u r i t y C o n f i g u r a t i o n b y W i l l i a m M i c h a e l F i t z g e r a l d , U l t a n N e v i l l e a n d S i m o n F o l e y• C o n f i g u r a t i o n A s s e s s m e n t a s a S e r v i c e b y M a t t e o M a r i a C a s a l i n o , H e n r i k P l a t e a n d S e r e n a E l i s a P o n t a
5TH SETOP INTERNATIONAL WORKSHOP ON
AUTONOMOUS AND SPONTANEOUS
F r i d a y, S e p t e m b e r 1 4 t h , 2 0 1 20 9 : 1 5 - 1 0 : 4 5S e s s i o n 4
• To w a r d s S e s s i o n - A w a r e R B A C D e l e g a t i o n : F u n c t i o nS w i t c h b y M e r i a m B e n G h o r b e l T a l b i , F r é d é r i c C u p p e n s , N o r a C u p p e n s - B o u l a h i a a n d S t e p h a n e M o r r u c c i
• P o l i c y C h a i n f o r S e c u r i n g S e r v i c e O r i e n t e d A r c h i t e c t u r e sb y W i h e m A r s a c , A n n e t t L a u b e a n d H e n r i k P l a t e
• To w a r d s a Te m p o r a l R e s p o n s e Ta x o n o m y b y W a e l K a n o u n , L a y a l S a m a r j i , N o r a C u p p e n s - B o u l a h i a , S a m u e l D u b u s a n d F r é d é r i c C u p p e n s
1 1 : 1 5 - 1 2 : 4 5S h a r e d S e s s i o n w i t h D P M ( i n t h e D P M r o o m )
SETOP
SECURITY
GRAPHIC DESIGN: Patrizia Andronico - IIT - CNR, Italy
20 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
registration
desk A-L1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l yESORICS 2012
1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h
i n C o m p u t e r S e c u r i t y
CartellonistiCa evento
registration desk
M-Z
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m o n R e s e a r c h
i n C o m p u t e r S e c u r i t y
parte della cartellonistica realizzata per l’evento
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 21
BUS TRANSFER
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m o n R e s e a r c h
i n C o m p u t e r S e c u r i t y
B&B Pisa - AccademiaSan Ranieri
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012
lunch coffee break
&
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012
the entrance
is next door
22 - Patrizia Andronico, Segreteria Scientifica IIT-CNR
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012
1 7 t h E u r o p e a n S y m p o s i u m o n R e s e a r c h i n C o m p u t e r S e c u r i t y
CO-LOCATED WORKSHOPSSETOP
DPMroom 27
room 28STM
room 30
Network of Excellence on
Engineering Secure Future Internet
Software Services and Systems
Project co-funded by the European Union under
the Information and Communication Technologies (ICT) theme
of the 7th Framework Programme for R&D contract n. 256980.
ESORICS 2012 1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r
S e c u r i t y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
1 0 - 1 4 S e p t e m b e r 2 0 1 2 - C N R R e s e a r c h A r e a o f P i s a , I t a l y
ESORICS 2012
1 7 t h E u r o p e a n S y m p o s i u m
o n R e s e a r c h i n C o m p u t e r S e c u r i t y
Patrizia Andronico, Segreteria Scientifica IIT-CNR - 23
ESORICS 20ESORICS 2012