PROGRAM

On Dec 18, the registration counter will open at 08:00hrs, and on all other days it will open at 09:00hrs.

Please note that all talks in the regular session will be 30 minutes including a question and answer period, while each short paper talk will be 15 minutes.

Tuesday, December 16, 2008
10:00 - 13:00 Tutorial I: Secure Multiparty Computation
Dr. Kannan Srinathan, International Institute of Information Technology, India
13:00 - 14:00
Lunch
14:00 - 17:00 Tutorial II: Symbolic verification of cryptographic protocols: theoretical issues
Dr. S. P. Suresh, Chennai Mathematical Institute, India

Wednesday, December 17, 2008
10:00 - 13:00 Tutorial III: Security Issues and Challenges in Wireless Networks
Dr. Bezawada Bruhadeshwar & Dr. Kishore Kothapalli, International Institute of Information Technology, India
13:00 - 14:00
Lunch
14:00 - 17:00 Tutorial IV: Biometric Technologies & Applications
Dr. Stephen J. Elliott & Dr. Shimon K. Modi, Purdue University, USA

Thursday, December 18, 2008
8:45 - 10:00
Opening remarks
10:00 - 10:30
Break
10:30 - 11:30 Keynote: BitBlaze: Binary-Analysis for Computer Security
Dawn Song, University of California, Berkeley
11:30 - 13:00 Session I: Languages and Formal Methods

On the Decidability of Model-Checking Information Flow Properties
Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra Kagalavadi Ramesh and Barbara Sprick.

Synthesizing Enforcement Monitors wrt. the Safety-Progress Properties
Ylies Falcone, Jean-Claude Fernandez and Laurent Mounier.

Implicit Flows: Can't Live With 'Em, Can't Live Without 'Em
Dave King, Boniface Hicks, Michael Hicks and Trent Jaeger.
13:00 - 14:30
Lunch
14:30 - 16:00 Session II: Protocols

A Robust Reputation Scheme for Decentralized Group Management Systems
Frederic Cuppens, Nora Cuppens-Boulahia and Julien A. Thomas

Complexity of Checking Freshness of Cryptographic Protocols
Zhiyao Liang and Rakesh Verma.

Secure Internet Voting Based on Paper Ballots
Lukasz Nitschke.
16:00 - 16:30
Break
16:30 - 18:00 Session III: Biometrics, Forensics and Steganography

Indexing Biometric Databases Using Kd-tree with Feature Level Fusion
Umarani Jayaraman, Surya Prakash and Phalguni Gupta.

Audio Watermarking based on Quantization in Wavelet Domain
Vivekananda Bhat K, Indranil Sengupta and Abhijit Das.

Overwriting Hard Drive Data: The Great Wiping Controversy
Craig Wright, Dave Kleiman and Shyaam Sundhar R.S..
18:00 Onwards       
Cultural Program

Friday, December 19, 2008
10:00 - 11:00 Keynote: Computing on Encrypted Data
Amit Sahai, University of California, Los Angeles
11:00 - 11:30
Break
11:30 - 12:30Session IV: Short papers

A Secure Round-based Timestamping Scheme with Absolute Timestamps
Duc-Phong Le, alban gabillon and Bonnecaze Alexis.

A Framework for Trustworthy Service-Oriented Computing
Sasikanth Avancha.

Revisiting Bluetooth Security
Manik Lal Das and Ravi Mukkamala.

A Verification Framework for Temporal RBAC with Role Hierarchy
Samrat Mondal and Shamik Sural.
12:30 - 12:50Session V: Ongoing Research

Cryptographically Strong and Weak Pseuorandom Bit Generators
Neelam Verma, Prasanna R Mishra and Gireesh Pandey.

Proxy Re-signature Schemes
Sunitha and Bharat B. Amberker.
12:50 - 14:15
Lunch
14:15 - 15:15 Keynote:
Basant Rajan, Symantec (India)
15:15 -15:45
Break
15:45 - 17:45 Industry Session
18:00 - 19:00 Business meeting
19:00 Onwards
Banquet

Saturday, December 20, 2008
10:00 - 11:00Keynote: Efficient Signature Matching with Extended Automata
Somesh Jha, University of Wisconsin
11:00 - 11:30
Break
11:30 - 13:00Session VI: Intrusion Detection

Real-Time Alert Correlation with Type Graphs
Gianni Tedesco and Uwe Aickelin.

Incorporation of Application Layer Protocol Syntax into Anomaly Detection
Patrick Duessel, Christian Gehl, Pavel Laskov and Konrad Rieck.

A Parallel Architecture for Stateful, High-Speed Intrusion Detection
Luca Foschini, Ashish Thapliyal, Lorenzo Cavallaro, Christopher Kruegel and Giovanni Vigna.
13:00 - 14:30
Lunch
14:30 - 16:00Session VII: Practical Applications

Optimizing the Block Ciphers for Wireless Sensor Networks
Devesh Jinwala, Dhiren Patel and Kankar Dasgupta.

Privacy Management for Facebook
Enkh-Amgalan Baatarjav, Ram Dantu and Santi Phithakkitnukoon.

HyDRo - Hybrid Development of Roles
Ludwig Fuchs and Guenther Pernul.
16:00 - 16:30
Break
16:30
Conference Closing