Programme
Monday, 19 March
Afternoon | Warmup - failures and attacks |
“Raven Authentication Service: Attacks and Countermeasures” Graham Rymer and David Llewellyn-Jones | |
“Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations” Wanpeng Li, Chris Mitchell and Thomas Chen | |
“Non-Monotonic Security Protocols and Failures in Financial Intermediation” Fabio Massacci, Nam Ngo, Daniele Venturi and Julian Williams | |
New protocols | |
“HoneyPAKEs” José Becerra, Peter Roenne, P. Y. A. Ryan, Petra Sala and Marjan Skrobot | |
“Entropy crowdsourcing -- protocols for link key updates in wireless sensor networks” Lukas Nemec, Radim Ostadal, Vashek Matyas and Petr Svenda |
Tuesday, 20 March
Morning | Threat models & incentives (part 1) |
“Daemones non Operantur Nisi per Artem - Daemons do not Operate Save through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies” Taciane Martimiano and Jean Everson Martina | |
“Intentionality and agency in security” Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni and Frank Stajano | |
“Incentives in Security Protocols” Sarah Azouvi, Alexander Hicks and Steven Murdoch | |
“Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System” Tudor Dumitras, Yigitcan Kaya, Radu Marginean and Octavian Suciu | |
Afternoon | Threat models & incentives (part 2) |
“What does match-fixing inform computer game security?” Jeff Yan | |
“From Secure Messaging to Secure Collaboration” Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile and Alastair R. Beresford | |
“Necessary Conditions for Root of Trust Establishment ” Virgil Gligor and Maverick Woo | |
“User Authentication for the Internet of Things” Frank Stajano and Mark Lomas |
Wednesday, 21 March
Morning | Cryptomoney |
“Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough” Patrick McCorry, Malte Moeser and Syed Taha Ali | |
“Making Bitcoin Legal” Ross Anderson, Mansoor Ahmed and Ilia Shumailov | |
Crypto dissent | |
“On the incommensurability of laws and technical mechanisms: Lessons for encryption and surveillance” Joan Feigenbaum and Daniel J. Weitzner | |
“Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices” Erinn Atwater and Ian Goldberg |