Workshop on Security Frameworks
WSF12 - The 2012
Workshop on Security Frameworks
"Socio-technical Security"
Tuesday, 11th December 2012
Dipartimento di
Matematica e Informatica
Università
di Catania
WSF12 - The 2012 edition
You can't neglect the human when you engineer security solutions! Humans cannot be expected to literally follow the instructions from a bulky manual or from a tiny screen footnote when they interact with computers. No matter gender or social background, humans are often in a hurry or tend to spare mental resources, for example by naturally performing `incomplete string matching' while they glance at their smartphones hopping on the tube. They are far from acting like deterministic algorithms, as experience shows, even when they engage with technology through security-sensitive tasks - whose implications they may not be fully aware of. At an extreme, humans have inadvertently broken popular security measures such as passwords by noting them down on sticky notes. Security flaws are therefore more and more frequently of socio-technical nature, consolidating a research area appeared in the topics of interest of the world-premiere venue `IEEE Computer Security Foundations Symposium' next year. In its tenth edition, WSF sees experts in purely techy security issues, such as program correctness and mobile networking, face researchers who also look at human aspects of security. A balanced discussion in line with this year's theme is guaranteed.
Talk Abstracts
Workshop Programme
- 15:00-15:15
G. Bella - Welcome and Opening Remarks
- 15:15-15:45 Denis Butin,
INRIA Grenoble, France: "Log Design for Accountability"
- 15:45-16:15 Luigi Grillo,
Università di Catania: "Formal Security Analysis under Homomorphic Encryption
"
- 16:15-16:30
Break
- 16:30-17:00 Dino Distefano, Queen Mary University of London: "A Voyage to the Deep-Heap"
- 16:30-17:00 Dino Distefano, Queen Mary University of London: "A Voyage to the Deep-Heap"
- 17:00-17:30 Rosario Giustolisi,
University of Luxembourg: "Security Risks with non-verifiable Certificates: A Socio-
Technical Analysis"
- 17:30-17:45
Break
- 17:45-18:15 Gianpiero Costantino, CNR Pisa, Italy: "An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast"
- 17:45-18:15 Gianpiero Costantino, CNR Pisa, Italy: "An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast"
- 18:15-18:45 Dario Catalano, Università di Catania: "Computing on authenticated data: practical homomorphic MACs for arithmetic circuits"
- 18:45-19:00 Wrap-up session
Workshop Location
11th
December 2012, room Aula Magna,
Dipartimento di
Matematica e Informatica,
Università di Catania, ITALY.