Title |
Speakers |
Summary |
Topic Types |
Elastic Block Ciphers In Practice: Constructions And Modes Of Encyption |
Debra L. Cook
|
|
Cryptography
|
Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests |
Andreas Makridakis
,
Nikos Nikiforakis
,
Elias Athanasopoulos
,
Evangelos P. Markatos
|
|
Phishing
|
Signaling Vulnerabilities In Wiretapping Systems |
Eric Cronin
|
|
Exploitation
|
Isi-Lana - A Secure Basic Architecture For Networks Connected To The Internet |
Thomas Haeberlen
|
|
Web
Network Penetration
|
A Novel Approach For Anomaly Detection Over High-Speed Networks |
Osman Salem
,
Sandrine Vaton
,
Annie Gravey
|
|
Android
Intrusion Detection
Incident Response
|
Lessons Learned From The Vodafone Wiretapping Incident |
Vassilis Prevelakis
|
|
Mobile Security
|
Keynote Address It Security And The European Network And Information Security Agency |
Andrea Pirotti
|
|
Keynote
|
Vrda: Vulnerability Response Decision Assistance |
Hal Burch
,
Art Manion
,
Yurie Ito
|
|
Incident Response
Exploitation
|
Quigon : The First Tool Against Clone Attack On Internet Relay Chat |
Thibaut Henin
,
Corinne Huguennet
|
|
Security
Web
|
Defending Against Next Generation Attacks Through Network/Endpoint Collaboration And Interaction |
Spiros Antonatos
,
Michael E. Locasto
,
Stelios Sidiroglou
,
Angelos D. Keromytis
,
Evangelos P. Markatos
|
|
Intrusion Detection
Incident Response
Network Penetration
|
Intrusion Detection Using Cost-Sensitive Classification |
Aikaterini Mitrokotsa
,
Christos Dimitrakakis
,
Christos Douligeris
|
|
Intrusion Prevention
|
Towards High Assurance Networks Of Virtual Machines |
Daniele Sgandurra
,
Fabrizio Baiardi
|
|
Security
Network Penetration
|
Keynote Address The Future Of Internet Security |
Steven M. Bellovin
|
|
Keynote
|
Security And Virtual Machines |
Michalis Polychronakis
,
Michael Valkering
,
Asia Slowinska
,
Herbert Bos
|
|
Security
|