WSF13 - The 2013
Workshop on Security Frameworks
WSF13 - The 11th edition
There are cool security properties out there that just seem to be waiting for the design of new, clever security protocols to accomplish them. And security is yet again reduced to a network problem. But... don't forget the nodes! Are they correspondingly secure? They really ought to. Loads of examples support this. You can't hope that one day there will be secure electronic exam marking at University if the lecturer's laptop runs nasty malware; you shouldn't rely on single-sign on if the credentials are not guardedly stored as the crown jewels; and you'd better configure your network so as to accommodate an Intrusion Detection System to actively monitor this and that nodes' activities. Security indeed is a network-and-node manifold property. And the real geek shall hands-on harden the nodes while she... dwells in the heights of formal protocol analysis.
- 15:00-15:15 G. Bella: Welcome and Opening Remarks
- 15:15-15:45 Luigi Grillo,
Università di Catania: "Towards automatic privacy verification"
- 15:45-16:15 Tiziana Spata,
Università di Catania: "A comparison of tools for malware analysis"
- 16:15-16:30 Break
- 16:30-17:00 Gianpiero Costantino, CNR Pisa:
"Limiting the permissions of Facebook applications"
- 17:00-17:30 Gabriele Grillo, Università di Catania: "Building the second generation of the Inductive Method"
- 17:30-17:45 Break
- 17:45-18:15 Rosario Giustolisi,
University of Luxembourg: "What security for e-exams?"
- 18:15-18:45 Simone Tino, Università di Catania: "Securing your network with Intrusion Prevention"
- 18:45-19:00 Wrap-up session
December 2013, Aula Magna,
Matematica e Informatica,
Università di Catania, ITALY.
Bella / firstname.lastname@example.org