Statistics and General Information about SEC@SAC 2012.
The Security Track has reached its eleventh edition at the 2012 Symposium on Applied Computing, appearing among its most established tracks.
SEC@SAC received 50 submissions this year. These were, as usual, anonymous and received 3 ample reviews. A resulting number of 12 papers were accepted, defining a very selective acceptance rate of 24%. This edition's programme was as follows:
- Scholte et al. show how to prevent some of the most common web application vulnerabilities using validation mechanisms based on common data types
- Balduzzi et al. investigate in detail the security problems of public images that are available on the Amazon EC2 service
- Mavrogiannopoulos et al. describe a cryptographic service framework for the Linux kernel
- Anwar et al. develop a prototypical visualisation tool that helps users of social networks analyse their access control policies through reﬂective policy assessment
- Kerschbaum presents a non-interactive, encrypted solution to the computation of the set intersection using an untrusted service provider
- Mann et al. investigate the use of techniques for static information flow analysis to identify privacy leaks in Android applications
- Cuellar et al. discuss different location-privacy problems, and introduce the notion of indistinguishability regions
- Hua et al. address the problem of enforcing PC kernel integrity using hardware-supported memory virtualisation techniques of hypervisors
- Schreckling et al. introduce a data-centric security policy management framework for Android
- Davtyan et al. give an overview of the typical vulnerabilities found in most electronic election systems
- Rodoper et al. present a security framework for WiMAX
- Bartsch et al. deal with the security issues linked with decisions about changing authorisation policies