Advanced Program
The 5th International Workshop on Security in
Systems and Networks (SSN 2009)
May
29 2009, Rome
Italy
OPENING
REMARKS (9:00am-9:05am)
KEYNOTE SPEECH:
(9:05am-10:00am)
- Trade-off or a Balance: Security
v.s. Privacy
Li Xiao (Michigan State University, US)
BREAK: (10:00am-10:30am)
REGULAR
PRESENTATIONS:
Each presentation has 20
minutes, plus 5 minutes of questions and answers.
Session 1 (10:30am-12:10pm) Intrusion Detection, session
chair: David Boyd (University of London, UK)
- Intrusion detection and tolerance for
transaction based applications in wireless environments.
Yacine Djemaiel
(CN&S Research Lab, TN); Noureddine Boudriga
(University of Carthage, TN)
- A Topological Approach to Detect Conflicts in
Firewall Policies
Subana Thanasegaran
(Nagoya institute of technology, JP); Yi Yin (Nagoya institute of
technology, JP); Yuichiro Tateiwa
(Nagoya institute of technology, JP); Yoshiaki Katayama (Nagoya institute
of technology, JP); Naohisa Takahashi (Nagoya
Institute of Technology, JP)
- Automated Detection of Confidentiality Goals
Anders Hagalisletto (University of Oslo, NO)
- Performance Analysis of Distributed Intrusion
Detection Protocols for Mobile Group Communication Systems
Jin-Hee Cho (U.S. Army Research Laboratory, US); Ing-Ray Chen (Virginia Tech, US)
Lunch (12:10pm-1:30pm)
Session 2 (1:30pm-3:10pm) Authentication and Application, session chair: Geng Yang (Nanjing University of Posts
And Telecommunications, CN)
- A New RFID Authentication Protocol with
Resistance to Server Impersonation
Mete Akgün (Tubitak
UEKAE, TR); M. Ufuk Caglayan
(Bogazici University, TR); Emin
Anarim (Bogazici
University, TR)
- TLS Client Handshake with a Payment Card
David Boyd (Royal Holloway, University of London, UK)
- Combating Side-Channel Attacks Using Key
Management
Donggang Liu (University of Texas at Arlington, US); Qi Dong (University of Texas at Arlington, US)
- Design of a Parallel AES for Graphics Hardware using the CUDA
framework
Giovanni Agosta (Politecnico di Milano, IT); Alessandro Barenghi
(Politecnico di Milano, IT); Andrea Di Biagio (Politecnico di Milano, IT);
Gerardo Pelosi (Universita' degli Studi di Bergamo, IT)
Break (3:10pm-3:30pm)
Session 3 (3:30pm-4:45pm) Network Security, session chair: Donggang Liu (University of Texas at
Arlington, US)
- Security Analysis of Micali’s
Fair Contract Signing Protocol by Using Coloured
Petri Nets : Multi-session case
Panupong Sornkhom
(Naresuan University, TH); Yongyuth Permpoontanalarp (King Mongkut's
University of Technology Thonburi, TH)
- Modeling and Analysis of Self-stopping BT
Worms Using Dynamic Hit List in P2P Networks
Jiaqing Luo
(The Hong Kong Polytechnic University, CN); Bin Xiao (Hong Kong
Polytechnic University, HK); Guobin Liu (The
Hong Kong Polytechnic University, CN); Qingjun
Xiao (The Hong Kong Polytechnic University, CN); Shijie
Zhou (University of Electronic Science and Technology of China, CN)
- SFTrust: A Double Trust Metric Based Trust Model in
Unstructured P2P System
Yunchang Zhang (NanJing
University of posts and telecommunications, CN); Shanshan
Chen (NanJing University of posts and
telecommunications, CN); Geng Yang (Nanjing University of Posts And Telecommunications,
CN)