Communications and Multimedia Security Workshop
Communications and Multimedia Security
University of Kent, Cantervury
Sponsor IFIP
Sep 3-4, 2012
Proceedings are LNCS - will give to CL library if people want to look up any
paper there
Basic conference is fairly good- lots of low level detailed work...mainly securty, but some systems stuff
9.30 - 10.30 Keynote Talk
Privacy Management in Global Organisations
Siani Pearson, HP Labs
This was a high level definitional view of the proble space - key takehomes were
1. there are different jurisdictional areas with different legal and social definitions of privacy - if you are doing business across these, then you need to consider how the different privacy policy and legal systems interact and basicalyl work out the cross product of permissable (and non-permissable) things you can do with PII
2. HP have a pretty nice toolset for walking people through privacy policy - instead of asking their employees to read (and cmprehened) their corporate policy doc (of 300 pp), they ask them to run the wizardd...
11.00 - 12.30 Research Papers 1 - Image and Handwriting Analysis
Robust Resampling Detection in Digital Images
Hieu Cuong Nguyen, Stefan Katzenbeisser
this is what it says on the tin
Feature Selection on Handwriting Biometrics: Security Aspects of Artiï¬cial Forgeries
Karl Kummel, Tobias Scheidat, Claus Vielhauer
ditto - lots of machine learning
Security Analysis of Image-based PUFs for Anti-Counterfeiting
Saloomeh Shariati, Francois Koeune, Francois-Xavier Standaert
PUFs are phsyical differences in things like printers - you get to know which particular printer made something - you can seed watermarks from those differences - this was a formal framework for understanding the security properties of PUFs just like other security entities (MACs, Marks, Identfiers etc) and was a nice talk..paper looks quite good
12.30 - 13.30 Lunch
13.30 - 15.00 Work in Progress 1 - Biometrics, Forensics and Watermarking
Computer-aided contact-less localization of latent ï¬ngerprints in low-resolution CWL scans
Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann
neat way of using low cost cameras to get 2.5-3D images of prints fro ma crime scene - looks like the group has work with company that has patents&prototypes that could work...device right now is size of a carboot, but they hope to get it down to a fryingpan:)
A Method for Reducing the Risk of Errors in Digital Forensic Investigations
Graeme Horsman, Christopher Laing, Paul Vickers
Nice talk by a CS/Forensics guy now retraining as a barriste (folow the money)r:)
Short Term Template Aging Effects on Biometric Dynamic Handwriting Authentication Performance
Tobias Scheidat, Karl Kummel, Claus Vielhauer
Not about aging as in decrepit - just about how even over short periods (e.g. a term in college) some biometrics (handwriting, esp.) can alter enouh that the reference version starts to give more false negative/positives quite quickly...
A New Approach to Commutative Watermarking-Encryption
Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang
This is a formal paper on hw to design codes that can be used for make the order of crypt & mark irrelevant - think generalized homomorphic crypto/watermark...
15.00 - 15.15 Extended Abstracts 1
OOXML File Analysis of the July 22nd Terrorist Manual
Hanno Langweg
THis was real work on Anders Breivik's document that was sent out 2 horus before he bombed and shot dead 70 people. THe study was to determine that the document was largely or completely by one person kept almost as a diar over 4 years, and not likely to have hda other contributers (obvioiusly this matters in the poice followup to help to determine that the crinal acted aone and wasn't (as he claimed in court and before ) part of a movement.
15.15 - 15.45 Tea/Coffee Break
15.45 - 19.00 Tour of Canterbury
We went, of course, to the Crypt in the Cathedral and I also visited a Bazaar (the Shed by Caterbury West station:)
19.00 - 21.00 Welcome Reception with Poster Display
Tuesday 4th September 2012
9.00 - 9.30 Registration
9.30 - 10.30 Keynote Talk
From Panopticon to Fresnel, dispelling a False Sense of Security
Jon Crowcroft, University of Cambridge
You have the slides
http://www.cl.cam.ac.uk/~jac22/talks/
10.30 - 11.00 Tea/Coffee Break
11.00 - 12.30 Research Papers 2 - Authentication and Performance
Document authentication using 2D codes: Maximizing the decoding performance using statistical inference.
Mouhamadou Diong, Patrick Bas, Wahih Sawaya, Chloe Pelle
what it says on tin
Data-minimizing Authentication goes Mobile
Patrick Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
Password free access - basically attribute based login - e.g. are you allowed in this bar (are you over 18/21) doesn't require proof of id, just proof of attribute) - later talk presented work on revokation (not sure how ou revoke being 18:)
No Tradeoff Between Conï¬dentiality and Performance: An Analysis on H.264/SVC Partial Encryption
Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu
looked at scaleable video codig and how you can crypt base codes but not enhancement layers and still get ok privay/integrity - the paper quantifies temporal and sptaial leakage in different codecs...
12.30 - 13.30 Lunch
13.30 - 15.00 Work in Progress 2 - Communications Security
Systematic Engineering of Control Protocols for Covert Channels
Steffen Wendzel, Jorg Keller
Nice solid work on desigb&capacity of different cover channels in TCP/IP and the like (think low order bits in TTL, etc)
Efficiency of Secure Network Coding Schemes
Elke Franz, Stefan Pfennig, Andre Fischer
showed that you can secure network coded transmission without incurring too much overhead - actualy I think for wireless net coding, its easier than they think...but they concentraded on multicast coding classic..
A new Approach for Private Searches on Public-Key Encrypted Data
Amar Siad
no show
Multi-Level Authentication Based Single Sign-On for IMS Services
Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman
what it says on the tin!
15.00 - 15.30 Tea/Coffee Break
15.30 - 17.15 Extended Abstracts 2
Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
Jurgen Fuß, Wolfgang Kastl, Robert Kolmhofer, Georg Schonberger, Florian Wex
crazy brute force cryptanalysis toollike
A framework for enforcing user-based authorization policies on packet ï¬lter ï¬rewalls
Andre Zuquete, Pedro Correia, Miguel Rocha
Uses national ID cards to setup an IP option to make packets accountable (i.e. linkable to specific person)...arghhh!!
From Biometrics to Forensics: A Feature Collection and ï¬rst Feature Fusion Approaches for latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor
Robert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
2nd talk about some detail of the low cost fingerprint tech talked about earlier
Practical Revocable Anonymous Credentials
Jan Hajny, Lukas Malina
Another connected talk, which showed how to revoke credntials (club membership etc)
Are 128 bits long keys possible in Watermarking?
Patrick Bas, Teddy Furon
Answer yes - see paper for nice math on why
Predicate-Tree based Pretty Good Privacy of Data
William Perrizo, Arjun G. Roy
no show
Privacy-Preserving Scheduling Mechanism for eHealth Systems
Milica Milutinovic, Vincent Naessens, Bart De Decker
solid work to do cover/crowd timing stuff so health sensor/monitor reports are kept reasonable private and not subject to timing analysis attacks...
September 22nd, 2012 - 17:28
I found the Analysis on H.264/SVC Partial Encryption rather interesting when they visited us.