{"id":1034,"date":"2012-09-05T08:08:42","date_gmt":"2012-09-05T08:08:42","guid":{"rendered":"http:\/\/www.syslog.cl.cam.ac.uk\/?p=1034"},"modified":"2013-04-11T19:27:49","modified_gmt":"2013-04-11T19:27:49","slug":"1034","status":"publish","type":"post","link":"https:\/\/www.syslog.cl.cam.ac.uk\/2012\/09\/05\/1034\/","title":{"rendered":"Communications and Multimedia Security Workshop"},"content":{"rendered":"

Communications and Multimedia Security
\nUniversity of Kent, Cantervury
\nSponsor IFIP
\nSep 3-4, 2012<\/p>\n

Proceedings are LNCS - will give to CL library if people want to look up any
\npaper there<\/p>\n

Basic conference is fairly good- lots of low level detailed work...mainly securty, but some systems stuff<\/p>\n

<\/p>\n

9.30 - 10.30 Keynote Talk<\/p>\n

Privacy Management in Global Organisations
\nSiani Pearson, HP Labs<\/p>\n

This was a high level definitional view of the proble space - key takehomes were
\n1. there are different jurisdictional areas with different legal and social definitions of privacy - if you are doing business across these, then you need to consider how the different privacy policy and legal systems interact and basicalyl work out the cross product of permissable (and non-permissable) things you can do with PII<\/p>\n

2. HP have a pretty nice toolset for walking people through privacy policy - instead of asking their employees to read (and cmprehened) their corporate policy doc (of 300 pp), they ask them to run the wizardd...<\/p>\n

11.00 - 12.30 Research Papers 1 - Image and Handwriting Analysis<\/p>\n

Robust Resampling Detection in Digital Images
\nHieu Cuong Nguyen, Stefan Katzenbeisser<\/p>\n

this is what it says on the tin<\/p>\n

Feature Selection on Handwriting Biometrics: Security Aspects of Arti\u00ef\u00ac\u0081cial Forgeries
\nKarl Kummel, Tobias Scheidat, Claus Vielhauer<\/p>\n

ditto - lots of machine learning<\/p>\n

Security Analysis of Image-based PUFs for Anti-Counterfeiting
\nSaloomeh Shariati, Francois Koeune, Francois-Xavier Standaert<\/p>\n

PUFs are phsyical differences in things like printers - you get to know which particular printer made something - you can seed watermarks from those differences - this was a formal framework for understanding the security properties of PUFs just like other security entities (MACs, Marks, Identfiers etc) and was a nice talk..paper looks quite good<\/p>\n

12.30 - 13.30 Lunch<\/p>\n

13.30 - 15.00 Work in Progress 1 - Biometrics, Forensics and Watermarking<\/p>\n

Computer-aided contact-less localization of latent \u00ef\u00ac\u0081ngerprints in low-resolution CWL scans
\nAndrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann<\/p>\n

neat way of using low cost cameras to get 2.5-3D images of prints fro ma crime scene - looks like the group has work with company that has patents&prototypes that could work...device right now is size of a carboot, but they hope to get it down to a fryingpan:)<\/p>\n

A Method for Reducing the Risk of Errors in Digital Forensic Investigations
\nGraeme Horsman, Christopher Laing, Paul Vickers<\/p>\n

Nice talk by a CS\/Forensics guy now retraining as a barriste (folow the money)r:)<\/p>\n

Short Term Template Aging E\u00ef\u00ac\u20acects on Biometric Dynamic Handwriting Authentication Performance
\nTobias Scheidat, Karl Kummel, Claus Vielhauer
\nNot about aging as in decrepit - just about how even over short periods (e.g. a term in college) some biometrics (handwriting, esp.) can alter enouh that the reference version starts to give more false negative\/positives quite quickly...<\/p>\n

A New Approach to Commutative Watermarking-Encryption
\nRoland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang<\/p>\n

This is a formal paper on hw to design codes that can be used for make the order of crypt & mark irrelevant - think generalized homomorphic crypto\/watermark...<\/p>\n

15.00 - 15.15 Extended Abstracts 1<\/p>\n

OOXML File Analysis of the July 22nd Terrorist Manual
\nHanno Langweg<\/p>\n

THis was real work on Anders Breivik's document that was sent out 2 horus before he bombed and shot dead 70 people. THe study was to determine that the document was largely or completely by one person kept almost as a diar over 4 years, and not likely to have hda other contributers (obvioiusly this matters in the poice followup to help to determine that the crinal acted aone and wasn't (as he claimed in court and before ) part of a movement.<\/p>\n

15.15 - 15.45 Tea\/Coffee Break<\/p>\n

15.45 - 19.00 Tour of Canterbury<\/p>\n

We went, of course, to the Crypt in the Cathedral and I also visited a Bazaar (the Shed by Caterbury West station:)<\/p>\n

19.00 - 21.00 Welcome Reception with Poster Display<\/p>\n

Tuesday 4th September 2012<\/p>\n

9.00 - 9.30 Registration<\/p>\n

9.30 - 10.30 Keynote Talk<\/p>\n

From Panopticon to Fresnel, dispelling a False Sense of Security
\nJon Crowcroft, University of Cambridge
\nYou have the slides
\nhttp:\/\/www.cl.cam.ac.uk\/~jac22\/talks\/<\/p>\n

10.30 - 11.00 Tea\/Coffee Break<\/p>\n

11.00 - 12.30 Research Papers 2 - Authentication and Performance<\/p>\n

Document authentication using 2D codes: Maximizing the decoding performance using statistical inference.
\nMouhamadou Diong, Patrick Bas, Wahih Sawaya, Chloe Pelle<\/p>\n

what it says on tin<\/p>\n

Data-minimizing Authentication goes Mobile
\nPatrick Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer<\/p>\n

Password free access - basically attribute based login - e.g. are you allowed in this bar (are you over 18\/21) doesn't require proof of id, just proof of attribute) - later talk presented work on revokation (not sure how ou revoke being 18:)<\/p>\n

No Tradeo\u00ef\u00ac\u20ac Between Con\u00ef\u00ac\u0081dentiality and Performance: An Analysis on H.264\/SVC Partial Encryption
\nZhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu<\/p>\n

looked at scaleable video codig and how you can crypt base codes but not enhancement layers and still get ok privay\/integrity - the paper quantifies temporal and sptaial leakage in different codecs...<\/p>\n

12.30 - 13.30 Lunch<\/p>\n

13.30 - 15.00 Work in Progress 2 - Communications Security<\/p>\n

Systematic Engineering of Control Protocols for Covert Channels
\nSte\u00ef\u00ac\u20acen Wendzel, Jorg Keller<\/p>\n

Nice solid work on desigb&capacity of different cover channels in TCP\/IP and the like (think low order bits in TTL, etc)<\/p>\n

E\u00ef\u00ac\u0192ciency of Secure Network Coding Schemes
\nElke Franz, Stefan Pfennig, Andre Fischer<\/p>\n

showed that you can secure network coded transmission without incurring too much overhead - actualy I think for wireless net coding, its easier than they think...but they concentraded on multicast coding classic..<\/p>\n

A new Approach for Private Searches on Public-Key Encrypted Data
\nAmar Siad
\nno show<\/p>\n

Multi-Level Authentication Based Single Sign-On for IMS Services
\nMohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman<\/p>\n

what it says on the tin!<\/p>\n

15.00 - 15.30 Tea\/Coffee Break<\/p>\n

15.30 - 17.15 Extended Abstracts 2<\/p>\n

Cuteforce Analyzer: Implementing a Heterogeneous Bruteforce Cluster with Specialized Coprocessors
\nJurgen Fu\u00c3\u0178, Wolfgang Kastl, Robert Kolmhofer, Georg Schonberger, Florian Wex<\/p>\n

crazy brute force cryptanalysis toollike<\/p>\n

A framework for enforcing user-based authorization policies on packet \u00ef\u00ac\u0081lter \u00ef\u00ac\u0081rewalls
\nAndre Zuquete, Pedro Correia, Miguel Rocha<\/p>\n

Uses national ID cards to setup an IP option to make packets accountable (i.e. linkable to specific person)...arghhh!!<\/p>\n

From Biometrics to Forensics: A Feature Collection and \u00ef\u00ac\u0081rst Feature Fusion Approaches for latent Fingerprint Detection using a Chromatic White Light (CWL) Sensor
\nRobert Fischer, Tobias Kiertscher, Stefan Gruhn, Tobias Scheidat, Claus Vielhauer
\n2nd talk about some detail of the low cost fingerprint tech talked about earlier<\/p>\n

Practical Revocable Anonymous Credentials
\nJan Hajny, Lukas Malina<\/p>\n

Another connected talk, which showed how to revoke credntials (club membership etc)<\/p>\n

Are 128 bits long keys possible in Watermarking?
\nPatrick Bas, Teddy Furon<\/p>\n

Answer yes - see paper for nice math on why<\/p>\n

Predicate-Tree based Pretty Good Privacy of Data
\nWilliam Perrizo, Arjun G. Roy<\/p>\n

no show<\/p>\n

Privacy-Preserving Scheduling Mechanism for eHealth Systems
\nMilica Milutinovic, Vincent Naessens, Bart De Decker<\/p>\n

solid work to do cover\/crowd timing stuff so health sensor\/monitor reports are kept reasonable private and not subject to timing analysis attacks...<\/p>\n","protected":false},"excerpt":{"rendered":"

Communications and Multimedia Security University of Kent, Cantervury Sponsor IFIP Sep 3-4, 2012 Proceedings are LNCS – will give to CL library if people want to look up any paper there Basic conference is fairly good- lots of low level detailed work…mainly securty, but some systems stuff<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,30],"tags":[],"_links":{"self":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1034"}],"collection":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/comments?post=1034"}],"version-history":[{"count":6,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1034\/revisions"}],"predecessor-version":[{"id":1085,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/posts\/1034\/revisions\/1085"}],"wp:attachment":[{"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/media?parent=1034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/categories?post=1034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syslog.cl.cam.ac.uk\/wp-json\/wp\/v2\/tags?post=1034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}