Posted by & filed under Uncategorized, Workshop.

Communications and Multimedia Security
University of Kent, Cantervury
Sponsor IFIP
Sep 3-4, 2012

Proceedings are LNCS – will give to CL library if people want to look up any
paper there

Basic conference is fairly good- lots of low level detailed work…mainly securty, but some systems stuff

9.30 – 10.30 Keynote Talk

Privacy Management in Global Organisations
Siani Pearson, HP Labs

This was a high level definitional view of the proble space – key takehomes were
1. there are different jurisdictional areas with different legal and social definitions of privacy – if you are doing business across these, then you need to consider how the different privacy policy and legal systems interact and basicalyl work out the cross product of permissable (and non-permissable) things you can do with PII

2. HP have a pretty nice toolset for walking people through privacy policy – instead of asking their employees to read (and cmprehened) their corporate policy doc (of 300 pp), they ask them to run the wizardd…

11.00 – 12.30 Research Papers 1 – Image and Handwriting Analysis

Robust Resampling Detection in Digital Images
Hieu Cuong Nguyen, Stefan Katzenbeisser

this is what it says on the tin

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries
Karl Kummel, Tobias Scheidat, Claus Vielhauer

ditto – lots of machine learning

Security Analysis of Image-based PUFs for Anti-Counterfeiting
Saloomeh Shariati, Francois Koeune, Francois-Xavier Standaert

PUFs are phsyical differences in things like printers – you get to know which particular printer made something – you can seed watermarks from those differences – this was a formal framework for understanding the security properties of PUFs just like other security entities (MACs, Marks, Identfiers etc) and was a nice talk..paper looks quite good

12.30 – 13.30 Lunch

13.30 – 15.00 Work in Progress 1 – Biometrics, Forensics and Watermarking

Computer-aided contact-less localization of latent fingerprints in low-resolution CWL scans
Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann

neat way of using low cost cameras to get 2.5-3D images of prints fro ma crime scene – looks like the group has work with company that has patents&prototypes that could work…device right now is size of a carboot, but they hope to get it down to a fryingpan:)

A Method for Reducing the Risk of Errors in Digital Forensic Investigations
Graeme Horsman, Christopher Laing, Paul Vickers

Nice talk by a CS/Forensics guy now retraining as a barriste (folow the money)r:)

Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance
Tobias Scheidat, Karl Kummel, Claus Vielhauer
Not about aging as in decrepit – just about how even over short periods (e.g. a term in college) some biometrics (handwriting, esp.) can alter enouh that the reference version starts to give more false negative/positives quite quickly…

A New Approach to Commutative Watermarking-Encryption
Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang

This is a formal paper on hw to design codes that can be used for make the order of crypt & mark irrelevant – think generalized homomorphic crypto/watermark…

15.00 – 15.15 Extended Abstracts 1

OOXML File Analysis of the July 22nd Terrorist Manual
Hanno Langweg

THis was real work on Anders Breivik’s document that was sent out 2 horus before he bombed and shot dead 70 people. THe study was to determine that the document was largely or completely by one person kept almost as a diar over 4 years, and not likely to have hda other contributers (obvioiusly this matters in the poice followup to help to determine that the crinal acted aone and wasn’t (as he claimed in court and before ) part of a movement.

15.15 – 15.45 Tea/Coffee Break

15.45 – 19.00 Tour of Canterbury

We went, of course, to the Crypt in the Cathedral and I also visited a Bazaar (the Shed by Caterbury West station:)

19.00 – 21.00 Welcome Reception with Poster Display

Tuesday 4th September 2012

9.00 – 9.30 Registration

9.30 – 10.30 Keynote Talk

From Panopticon to Fresnel, dispelling a False Sense of Security
Jon Crowcroft, University of Cambridge
You have the slides

http://www.cl.cam.ac.uk/~jac22/talks/

10.30 – 11.00 Tea/Coffee Break

11.00 – 12.30 Research Papers 2 – Authentication and Performance

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference.
Mouhamadou Diong, Patrick Bas, Wahih Sawaya, Chloe Pelle

what it says on tin

Data-minimizing Authentication goes Mobile
Patrick Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer

Password free access – basically attribute based login – e.g. are you allowed in this bar (are you over 18/21) doesn’t require proof of id, just proof of attribute) – later talk presented work on revokation (not sure how ou revoke being 18:)

No Tradeoff Between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption
Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu

looked at scaleable video codig and how you can crypt base codes but not enhancement layers and still get ok privay/integrity – the paper quantifies temporal and sptaial leakage in different codecs…

12.30 – 13.30 Lunch

13.30 – 15.00 Work in Progress 2 – Communications Security

Systematic Engineering of Control Protocols for Covert Channels
Steffen Wendzel, Jorg Keller

Nice solid work on desigb&capacity of different cover channels in TCP/IP and the like (think low order bits in TTL, etc)

Efficiency of Secure Network Coding Schemes
Elke Franz, Stefan Pfennig, Andre Fischer

showed that you can secure network coded transmission without incurring too much overhead – actualy I think for wireless net coding, its easier than they think…but they concentraded on multicast coding classic..

A new Approach for Private Searches on Public-Key Encrypted Data
Amar Siad
no show

Multi-Level Authentication Based Single Sign-On for IMS Services
Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman

what it says on the tin!

15.00 – 15.30 Tea/Coffee Break

15.30 – 17.15 Extended Abstracts 2

Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
Jurgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schonberger, Florian Wex

crazy brute force cryptanalysis toollike

A framework for enforcing user-based authorization policies on packet filter firewalls
Andre Zuquete, Pedro Correia, Miguel Rocha

Uses national ID cards to setup an IP option to make packets accountable (i.e. linkable to specific person)…arghhh!!

From Biometrics to Forensics: A Feature Collection and first Feature Fusion Approaches for latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor
Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
2nd talk about some detail of the low cost fingerprint tech talked about earlier

Practical Revocable Anonymous Credentials
Jan Hajny, Lukas Malina

Another connected talk, which showed how to revoke credntials (club membership etc)

Are 128 bits long keys possible in Watermarking?
Patrick Bas, Teddy Furon

Answer yes – see paper for nice math on why

Predicate-Tree based Pretty Good Privacy of Data
William Perrizo, Arjun G. Roy

no show

Privacy-Preserving Scheduling Mechanism for eHealth Systems
Milica Milutinovic, Vincent Naessens, Bart De Decker

solid work to do cover/crowd timing stuff so health sensor/monitor reports are kept reasonable private and not subject to timing analysis attacks…

  • http://dailysms.com/ Send SMS

    I found the Analysis on H.264/SVC Partial Encryption rather interesting when they visited us.