Followor on Twitter to stay up to date with the workshop news.
|8:00 - 9:00||Registration|
|9:00 - 10:00||Keynote Speaker Herbert Bos||10:00 - 11:00||Session I - Hardware Trust|
|10:00 - 10:30||SEVered: Subverting AMD's Virtual Machine Encryption
Mathias Morbitzer, Manuel Huber,Julian Horsch, Sascha Wessel (Fraunhofer AISEC)
|10:30 - 11:00||Exclusive: How the (synced) Cookie Monster breached my
encrypted VPN session
Panagiotis Papadopoulos (FORTH-ICS, Greece), Nicolas Kourtellis (Telefonica Research, Spain), Evangelos P.Markatos
|11:00 - 11:30||Coffee Break||11:30 - 13:00||Session II - Privacy and Password Management|
|11:30 - 12:00||0pass: Zero-storage Password Management Based on Password Reminders
Giannis Tzagarakis (FORTH-ICS, Greece), Panagiotis Papadopoulos (FORTH-ICS, Greece), Antonios A. Chariton
(University of Crete, Greece), Elias Athanasopoulos (University of Cyprus, Cyprus), Evangelos P. Markatos (FORTH-ICS, Greece)
|12:00 - 12:30||
PIITracker: Automatic Tracking of Personally
Identifiable Information in Windows
Meisam Navaki Arefi, GeoffreyAlexander, Jedidiah R. Crandall (University of New Mexico)
|12:30 - 13:00||Using Differential Privacy to Efficiently Mitigate Side Channels in Distributed Analytics
Min Xu (University of Chicago), Antonis Papadimitriou (University of Pennsylvania), Ariel Feldman
(University of Chicago), AndreasHaeberlen (University of Pennsylvania)
|13:00 - 14:00||Lunch & Workshops Poster Session||14:00 - 16:00||Session III - Vulnerability Remediation|
|14:00 - 15:00||Invited talk Session chair: Pramod Bhatotia
How to do systems research
Peter Druschel (A joint keynote talk with EuroSec'18, and CrossCloud'18 workshops)
|15:00 - 15:30||Hardening Hypervisors against Vulnerabilities in
Kenta Ishiguro, Kenji Kono (Keio University)
|15:30 - 16:00||Towards Automated Vulnerability Scanning of Network Servers
NathanSchagen, KoenKoning, HerbertBos, Cristiano Giuffrida (Vrije Universiteit Amsterdam)
|16:00 - 16:30||Coffee Break||16:30 - 16:45||Closing Remarks|
The 11th European Workshop on Systems Security (EuroSec) aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work. The workshop will precede the EuroSys 2018 conference.
EuroSec encourages systems security researchers to share early iterations of bleeding-edge ideas with the community, before they are further developed into full papers. Reciprocally, authors receive feedback to help steer and improve their research to its full potential. Many EuroSec papers later form the basis for full conference papers presented at one of the top venues in computer security.
EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
In accordance with the spirit of EuroSys, we also seek:
You are invited to submit papers of up to 6 pages, with 9-point font, in a two-column format, including figures, tables and references. Submitted papers must use the 2017 ACM sigconf proceedings template. You should not modify key aspects of the template, such as font face, spacing, etc. The template, as well as instructions on how to use it, can be found here.
All submissions will be reviewed by the Program Committee. Only original, novel work will be considered for publication. Accepted papers will be published in the Proceedings of EuroSec in the ACM Digital Library.
Submissions should be made online at http://eurosec2018.sec.tu-bs.de.