Decorative photo of one of the top-corners of the CISPA building
  • Mon, March 12th
  • Hosted by CISPA, Saarbruecken, Germany

General information

Security and reliability are interdisciplinary areas, drawing from several fields: mathematics (number theory, statistics, logic), computer science (algorithms, information theory, cryptology, formal methods, computational complexity, software engineering), electrical engineering (electronics, signal acquisition and processing, secure hardware design), management (security and quality policies, risk assessment) and social aspects (security awareness, ethical and legal issues, privacy).

The objective of the Grande Region Security and Reliability Day (GRSRD) is to increase scientific interaction in security and reliability at the regional level. The workshop provides a platform for exchange of ideas, discussion and co-operation. It focuses on the Grande Region, but is open to submissions and participation of the whole scientific community working in security and reliability. This year, the GRSRD is jointly organized by University of Luxembourg, LORIA-INRIA Nancy, and Saarland University and hosted by CISPA.

Previous editions of GRSRD were held in:

Programme

09:00 - 09:30 Registration
09:30 - 09:40 Welcome Note
09:40 - 11:10 Privacy and Cryptography
Session Chair: Johannes Krupp

  • M. Backes, L. Hanzlik, K. Kluczniak, J. Schneider: Signatures with Flexible Public Key
  • B. Pejo, Q. Tang: Together or Alone: The Price of Privacy in Collaborative Learning
  • I. Hagestedt, Y. Zhang, P. Berrang, M. Humbert, H. Tang, X. Wang, M. Backes: MBeacon: Privacy-preserving Beacons for DNA Methylation Data
  • A. Salem, P. Berrang, M. Humbert, M. Backes: Privacy-preserving Similar Patient Queries for Combined Biomedical Data
  • Y. Zhang, M. Humbert, T. Rahman, C. Li, J. Pang, M. Backes: Tagvisor: A Privacy Advisor for Sharing Hashtags
11:10 - 11:30 Coffee Break
11:30 - 12:30 Software Security
Session Chair: Jannik Dreier

  • A. Pilgun, O. Gadyatskaya, S. Dashevskyi, A. Kushniarou, Y. Zhauniarovich: ACVTool: Measuring Code Coverage in Black-Box Android App Testing
  • N. Havrikov, A. Zeller: Grammar-Based Fuzzing with Tribble
  • A. Fass, R. Krawczyk, M. Backes, B. Stock: JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript
12:30 - 14:00 Lunch
14:00 - 15:30 Network and System Security
Session Chair: Christian Rossow

  • P. Speicher, M. Steinmetz, R. Künnemann, M. Simeonovski, G. Pellegrino, J. Hoffmann, M. Backes: Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure
  • M. Steffens, M. Johns, M. Backes, B. Stock: How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security
  • J. Krupp, M. Backes, C. Rossow: Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks
  • G. Maisuradze, M. Backes, C. Rossow: Dachshund: Digging for and Securing Against (Non-)Blinded Constants in JIT Code
  • M. Walter, D. Pfaff, H. Nemati, S. Nürnberger, M. Backes: Proconda: Protected Control Data
15:30 - 15:50 Coffee Break
15:50 - 17:05 Cryptographic Protocols
Session Chair: Robert Künnemann

  • V. Cheval, V. Cortier, M. Turuani: A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif
  • J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse: Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
  • V. Cheval, S. Kremer, I. Rakotonirina: The DEEPSEC prover
  • R. Künnemann, I. Esiyok, M. Backes: Mechanized verification of accountability in security protocols
17:10 - 17:15 Closing Remarks

Scope of the workshop

Topics of interest include, but are not limited to:

  • Information security and cryptology
  • Communication and network security
  • System security and reliability
  • Formal methods in security and reliability
  • Access, information flow and usage control
  • Security and privacy policies
  • Data mining for security and privacy
  • Building secure and reliable software systems
  • Trust models and trust management
  • Fault tolerance
  • Risk management and business processes
  • Regulatory compliance
  • Socio-technical aspects of security

Important dates

  • Submission deadline: Sun, Feb 25th, 23:59 CET
  • Notifications: Mon, March 5th
  • Registration deadline: Thu, March 8th
  • GRSRD event: Mon, March 12th

Submissions

Prospective authors are encouraged to submit an extended abstract of 1–2 pages using this HotCrp instance

The workshop will not have formal proceedings. Therefore, abstracts submitted to the GRSRD 2018 may report on work in progress, be submitted to other places, and they may even already have appeared or been accepted elsewhere. We particularly welcome submissions that have the potential to stimulate the scientific interaction within the Grande Region. The reviewing process will mainly determine whether a submitted abstract promises to fit into the scope of this workshop. This will be the major reason for acceptance of presentation.

The authors of the papers accepted for presentation at GRSRD 2018 will be invited to submit the final versions of their abstracts for an on-line publication at this web page.

Program chairs

  • Christian Rossow, CISPA, Germany
  • Jannik Dreier, LORIA-INRIA, France

Program committee

  • Robert Kuennemann, CISPA, Germany
  • Jun Pang, University of Luxembourg, Luxembourg
  • Stephan Merz, LORIA-INRIA, France
  • Peter Y.A. Ryan, University of Luxembourg, Luxembourg

Local organisation

  • Sabine Nermerich, CISPA
  • Christian Rossow, CISPA