University of Trier
Room HS 13
To get here from the city center, you can take the bus number 4. To take the bus number 3 or 13 is also an option, but then you will have to walk a bit (about 10 minutes) to reach the campus.
Security and reliability are interdisciplinary areas, drawing from several fields: mathematics (number theory, statistics, logic), computer science (algorithms, information theory, cryptology, formal methods, computational complexity, software engineering), electrical engineering (electronics, signal acquisition and processing, secure hardware design), management (security and quality policies, risk assessment) and social aspects (security awareness, ethical and legal issues, privacy).
The objective of the Grande Region Security and Reliability Day (GRSRD) is to increase scientific interaction in security and reliability at the regional level. The workshop provides a platform for exchange of ideas, discussion and co-operation. It focuses on the Grande Region, but is open to submissions and participation of the whole scientific community working in security and reliability. The GRSRD is jointly organized by the University of Luxembourg, LORIA-INRIA Nancy, Saarland University, and the University of Trier.
Previous editions of GRSRD were held in:
Topics of interest include, but are not limited to:
Registration fee for GRSRD 2015 is 35€. It covers coffee breaks, lunch, and workshop materials. The registration deadline is February 27 2015.
We are happy to announce that Prof. Alex Biryukov will give an invited lecture at GRSRD 2015 on anonymity networks and crypto-currencies. Alex Biryukov is a professor at University of Luxembourg, specialized in cryptology and/or security of information systems.
|8:30 – 9:00||Registration Coffee|
|9:00 – 9:05||Opening|
|9:05 – 10:25||
Session 1: Privacy in Social Networks
Michael Backes, Praveen Manoharan, and Pascal Berrang. How well do you blend into the crowd? – d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data
Huu-Hiep Nguyen, Abdessamad Imine, and Michael Rusinowitch. Anonymizing Social Graphs via Uncertainty Semantics
Marcos Cramer, Jun Pang, and Yang Zhang. A Logical Approach to Restricting Access in Online Social Networks
Michael Backes, Pascal Berrang and Praveen Manoharan. Assessing the Effectiveness of Countermeasures Against Authorship Recognition
|10:25 – 11:00||Coffee break and posters|
|11:00 – 11:40||
Session 2: Web Services and Web Security
Walid Belkhir, Maxime Bride, Yannick Chevalier, and Michael Rusinowitch. Secure Service Mediator Synthesis with Parametrized Automata
Daniel Fett, Ralf Kuesters, and Guido Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web
|11:40 – 12:30||
Alex Biryukov. Overview of Research on Anonymity Networks and Crypto-currencies
Prof. Biryukov will present his recent research on anonymity networks and crypto-currencies and will outline some directions for the future work. In particular the talk will cover work on enumeration and deanonymization of Tor hidden services, research on anonymity and privacy of Bitcoin.
|12:30 – 14:00||Lunch|
|14:00 – 15:00||
Session 3: Electronic Payment Systems
Tim Ruffing, Aniket Kate, and Dominique Schröder. One Bitcoin at the Price of Two – Preventing Double-Spending and Equivocation using Bitcoin
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Kim Pecina. Privacy Preserving Payments in Credit Networks. Enabling trust with privacy in online marketplaces
|15:00 – 15:20||Coffee break and posters|
|15:20 – 16:40||
Session 4: Application Security and Access Control
Andreas Zeller. Mining Apps for Abnormal Usage of Sensitive Data
Li Li, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. Using an Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps
Matteo Maffei, Giulio Malavolta, Manuel Reinert, and Dominique Schroeder. Privacy and Access Control for Outsourced Personal Records
Marcos Cramer and Agustin Ambrossio. A logic of trust for reasoning about delegation and revocation
|16:40 – 17:00||Coffee break and posters|
|17:00 – 17:40||
Session 5: Anonymous Communications
Ralf Kuesters and Tomasz Truderung. Saving Re-Encryption Randomized Partial Checking Mix Nets for Risk-Avoiding Adversaries
Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi. MATor: Towards Measuring the Degree of Anonymity in Tor
|17:40 – 17:45||Closing|
All the accepted papers (including papers accepted for poster presentation) are available in our online proceedings.
Prospective authors are encouraged to submit an extended abstract of 1-2 pages. The workshop will not have formal proceedings. Therefore, abstracts submitted to the GRSRD 2015 may report on work in progress, be submitted to other places, and they may even already have appeared or been accepted elsewhere. We particularly welcome submissions that have the potential to stimulate the scientific interaction within the Grande Region. The reviewing process will mainly determine whether a submitted abstract promises to fit into the scope of this workshop. This will be the major reason for acceptance of presentation. This year we will feature both regular presentation and poster presentations in order to accommodate a broader discussion forum. Both of these presentation styles are required to submit an extended abstract.
The authors of the papers accepted for presentation at GRSRD 2015 will be invited to submit the final versions of their abstracts for an on-line publication at this web page.