Advanced Program

The 5th International Workshop on Security in Systems and Networks (SSN 2009)

May 29 2009, Rome Italy

OPENING REMARKS (9:00am-9:05am)

KEYNOTE SPEECH: (9:05am-10:00am)

  • Trade-off or a Balance: Security v.s. Privacy
    Li Xiao (Michigan State University, US)

 

BREAK: (10:00am-10:30am)

REGULAR PRESENTATIONS:

Each presentation has 20 minutes, plus 5 minutes of questions and answers.

Session 1 (10:30am-12:10pm) Intrusion Detection, session chair: David Boyd (University of London, UK)

  • Intrusion detection and tolerance for transaction based applications in wireless environments.
    Yacine Djemaiel (CN&S Research Lab, TN); Noureddine Boudriga (
    University of Carthage, TN)
  • A Topological Approach to Detect Conflicts in Firewall Policies
    Subana Thanasegaran (Nagoya institute of technology, JP); Yi Yin (Nagoya institute of technology, JP); Yuichiro Tateiwa (Nagoya institute of technology, JP); Yoshiaki Katayama (Nagoya institute of technology, JP); Naohisa Takahashi (Nagoya Institute of Technology, JP)
  • Automated Detection of Confidentiality Goals
    Anders Hagalisletto (
    University of Oslo, NO)
  • Performance Analysis of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems
    Jin-Hee Cho (
    U.S. Army Research Laboratory, US); Ing-Ray Chen (Virginia Tech, US)


Lunch (12:10pm-1:30pm)


Session 2 (1:30pm-3:10pm) Authentication and Application, session chair: Geng Yang (Nanjing University of Posts And Telecommunications, CN)

  • A New RFID Authentication Protocol with Resistance to Server Impersonation
    Mete Akgün (Tubitak UEKAE, TR); M. Ufuk Caglayan (Bogazici University, TR); Emin Anarim (Bogazici University, TR)
  • TLS Client Handshake with a Payment Card
    David Boyd (Royal Holloway,
    University of London, UK)
  • Combating Side-Channel Attacks Using Key Management
    Donggang Liu (
    University of Texas at Arlington, US); Qi Dong (University of Texas at Arlington, US)
  • Design of a Parallel AES for Graphics Hardware using the CUDA framework
    Giovanni Agosta (Politecnico di Milano, IT); Alessandro Barenghi (Politecnico di Milano, IT); Andrea Di Biagio (Politecnico di Milano, IT); Gerardo Pelosi (Universita' degli Studi di Bergamo, IT)

 

Break (3:10pm-3:30pm)

 

Session 3 (3:30pm-4:45pm) Network Security, session chair: Donggang Liu (University of Texas at Arlington, US)

  • Security Analysis of Micali’s Fair Contract Signing Protocol by Using Coloured Petri Nets : Multi-session case
    Panupong Sornkhom (
    Naresuan University, TH); Yongyuth Permpoontanalarp (King Mongkut's University of Technology Thonburi, TH)
  • Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks
    Jiaqing Luo (The Hong Kong Polytechnic University, CN); Bin Xiao (Hong Kong Polytechnic University, HK); Guobin Liu (The Hong Kong Polytechnic University, CN); Qingjun Xiao (The Hong Kong Polytechnic University, CN); Shijie Zhou (University of Electronic Science and Technology of China, CN)
  • SFTrust: A Double Trust Metric Based Trust Model in Unstructured P2P System
    Yunchang Zhang (NanJing University of posts and telecommunications, CN); Shanshan Chen (NanJing University of posts and telecommunications, CN); Geng Yang (Nanjing University of Posts And Telecommunications, CN)