Prof. Luca Viganò (Verona University, Italy) Dr. Keqin Li (SAP Research, France) Dr. Wissam Mallouli (Montimage, France) Affiliated with ICST 2012 Montreal,

Slides:



Advertisements
Similar presentations
1 The First International Workshop on Grid Computing Silicon Valley, India.
Advertisements

CSL 13 TORINO Some information. GENERAL SUBMISSIONS 103 ACCEPTED 37 ACCEPTANCE RATE0,36 REVIEWS332 EXTERNAL REVIEWERS199 EXTERNAL REVIEWS227.
Future home as operator control rooms and vice versa… - Panel Discussion- Matthias Rauterberg Department Industrial Design Technical University Eindhoven.
Welcome to the international conference “Composites Testing and Model Identification” CompTest2003 Professor Michael WISNOM, Bristol University, UK Professor.
Bienvenue à SCAM 2007 Bogdan Korel and Mike Godfrey Program co-chairs Leon Moonen General Chair.
Frankfurt (Germany), 6-9 June 2011 CIRED st International Conference and Exhibition on ELECTRICITY DISTRIBUTION Opening Forum Sven Lindgren President.
Welcome to PKCS ’99 Royal Institute of Technology, Stockholm 29 September – 1 October 1999.
ER 2006 Interesting Facts and Figures about the Program.
AsiaCrypt Program Committee Report Chi Sung Laih Nov.30~Dec.4,2003 Taipei, Taiwan.
Update on progress of training activities of MUSE Network Dr Domenico Gallipoli Durham University.
The DOCTOR Project DeplOyment and seCurisaTion of new functiOnalities in virtualized networking enviRonnements François-Xavier Aguessy – Thales Bertrand.
Emergence of identity and claim platforms Emergence of identity and claim platforms  Minimal disclosure claims vs identity citizen-centric eIdentity.
1 Presented by: Jan Hnátek, CSQ Vice-president 51st EOQ Congress Project Manager Jan Hnátek, CSQ Vice-president 51st EOQ Congress Project Manager EOQ 2007.
Poverty & Human Capability 101 Introductory Class.
1 Establishing a Pharmacovigilance Centre Sten Olsson the Uppsala Monitoring Centre.
TEMPLATE DESIGN © Efficient Crawling of Complex Rich Internet Applications Ali Moosavi, Salman Hooshmand, Gregor v. Bochmann,
Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Software Security Research Group (SSRG), University of Ottawa In.
Please insert a figure in the master transparency. KIT – University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association.
Interim Report Malaysia Section R10 Meet Kuching, 1-2 March 2014 Connect Analyze Collaborate.
TEMPLATE DESIGN © Non-URL-Based Crawling strategy :  In a RIA one URL corresponds to many states of DOM. Unlike traditional.
Discovery Science 2006 Report of the Program Chairs Klaus P. Jantke, General Chair Nada Lavrač and Ljupčo Todorovski, Program Chairs Ricard Gavalda, Local.
How much does the Government of Canada spend on Foreign Aid and Development? (as % of GDP)
PRIVP Huang Overview of Successes and Challenges
Brokerage Event 2014 Barcelona, February, Fira de Barcelona At a Glance.
Software Security Research Group (SSRG), University of Ottawa in collaboration with IBM Software Security Research Group (SSRG), University of Ottawa In.
International Conference EURO Mini Conference “Continuous Optimization and Knowledge Based Technologies” EurOPT-2008 May 20-23, 2008, Neringa, LITHUANIA.
Opening Session. RuleML-2008 Devoted to practical distributed rule technologies and rule- based applications Semantic Web, Intelligent Multi-Agent Systems,
Company analysis All major ‘ delegate providers ‘ on track Big plusses : Nielsen, Gillette, Nestle Approx : 500 companies.
1 st International Semantic Web Conference (ISWC2002) Sardinia, Italy, June 2002.
 All reviewed by PC and partner journals - Very fast turn around time: 6 weeks - Appear during meeting or soon thereafter  17 accepted.
DeFINE - PISA Dependable Technologies Verification & Validation (DeFINE) Ana CAVALLI INT- Evry France.
Road2CPS - Strategic action for future CPS through roadmaps, impact multiplication and constituency building Workshop on future Platforms Facilitated by.
Energy ECURIE Events 2010– 2012 ECURIE Competent Authorities' Meeting 2012 Luxembourg, September 2012 Vesa Tanner, ECURIE Coordinator.
A L I M E N T A T I O N A G R I C U L T U R E E N V I R O N N E M E N T 1 G20 – 12th May 2011 An International Research Initiative for Wheat Improvement.
TEMPLATE DESIGN © Non-URL-Based Crawling strategy :  In a RIA one URL corresponds to many states of DOM. Unlike traditional.
U.S. Goals of the Cold War Stop the spread of Communism 2. Spread/Promote Democracy 3. Avoid World War III 4. Limit American cost Every U.S.
HEPiX Spring 2013 CNAF Bologna / Italy Workshop wrap-up Helge Meinhard.
Entrepreneurship Indicators Steering Group Project Governance Proposed Mandate, Goals and Operational Arrangements Tim Davis, OECD Statistics Directorate.
Crawling Rich Internet Applications: The State of the Art Software Security Research Group (SSRG) University of Ottawa In collaboration with IBM Suryakant.
Welcome July 9, 2005 – Pittsburgh, Pennsylvania, USA W1 - Contexts and Ontologies: Theory, Practice and Applications C&O-2005 Pavel Shvaiko Deborah McGuinness.
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston,
The RESEARCH DATA ALLIANCE Individual & Organisational –
7th International Symposium on Tunnel Safety & Security ISTSS – 18 March, 2016 Montréal ∞ Canada Event partner ISTSS 2016 :
Submissions154 Accepted33 Acceptance rate0.21 Reviews339 External reviewers64 External reviews82 OverallDC track Submissions75 Accepted18 Acceptance rate0.24.
TEMPLATE DESIGN © Crawling is the process of automatically exploring a web application to discover the states of the application.
EKC 2016 EUROPE-KOREA CONFERENCE ON SCIENCE AND TECHNOLOGY 2016 한  유럽과학기술학술대회 org Date: July 2016 (Wednesday-Saturday) Place:
TEMPLATE DESIGN © Automatic Classification of Parameters and Cookies Ali Reza Farid Amin 1, Gregor v. Bochmann 1, Guy-Vincent.
Tax Policy Challenges in a Changing World. Unintended Consequences of Tax Rob Marston, “Window Tax”, 1 September 2010 uploaded via Flickr, creative commons.
How RDA is growing? Total RDA Community Members: 2668.
Some notes and background information for Andrew Hill writing about the evolution of G4S / Private Security Industry {10 October 2013}
BPM 2014 A word from the program chairs
Secure M2M communication in Wireless Sensor Network
Final Report Month xx, 20xx
HIMSS STANDARDS INITIATIVES
Incheon (2009) Registration
LP2017 Statistics LP2017 LOC.
The EU egg industry in transition
FLAIRS-30 Report Ingrid Russell FLAIRS-30 Conference Chair.
The 31st International FLAIRS Conference May 21-23, 2018
FLAIRS-29 Report.
2nd ARCTIC SCIENCE MINISTERIAL
Sophia Antipolis, 25 January 2012
Security Monitoring for Network Protocols and Applications
ROMS Cyber Infrastructure
International Patiënts Day Friday, November 17th – 15
UCAAT 2017 is hosted and organised by Fraunhofer FOKUS.
2006 Rank Adjusted for Purchasing Power
EUROMETAL DIGITAL FORUM
EUROMETAL INTERNATIONAL STEEL TRADE DAY WORLD PORT CENTER, ROTTERDAM
Presentation transcript:

Prof. Luca Viganò (Verona University, Italy) Dr. Keqin Li (SAP Research, France) Dr. Wissam Mallouli (Montimage, France) Affiliated with ICST 2012 Montreal, Canada April 21, 2012

 General Statistics ◦ Submissions22 ◦ Accepted 9 ◦ Acceptance rate 40.9 % ◦ Reviews 65  Authors from 11 countries (France, Canada, India, Italy, Luxembourg, Austria, Germany, Netherlands, Iran, Sweden, USA)  Submissions from academia and industry  5 security testing tools demonstrations

 ICST organizers  Streering committee ◦ Alessandro Armando (University of Genova, Italy) ◦ Ana Cavalli (Telecom SudParis, France) ◦ Jorge Cuellar (Siemens, Germany) ◦ Alexander Pretschner (KIT, Germany) ◦ Yves Le Traon (University of Luxembourg, Luxembourg)  Programm committee  Authors and speakers  Invited speaker: Prof Ina Schieferdecker

08: :00Registration Session IChairs: Wissam Mallouli and Luca Vigano 09: :00 Invited talk Model-Based Fuzz Testing Ina Schieferdecker (Fraunhofer Fokus, Germany) 10: :30 Managing Evolution by Orchestrating Requirements and Testing Engineering Processes Federica Paci, Fabio Massacci, Fabrice Bouquet and Stephane Debricon. 10: :00Coffee break Session IIChair: Ana Cavalli 11: :30 XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing Fabien Duchene, Roland Groz, Jean-Luc Richier and Sanjay Rawat. 11: :00 A Taint Based Approach for Smart Fuzzing Sofia Bekrar, Chaouki Bekrar, Roland Groz and Laurent Mounier. 12: :30 A Testing Model for Dynamic Malware Analysis Systems Frédéric Massicotte, Mathieu Couture, Hugues Normandin and Frédéric Michaud. 12: :00Lunch

12: :00Lunch Session IIIChair: Johan Oudinet 14: :45 Automatic XACML requests generation for policy testing Antonia Bertolino, Said Daoudagh, Francesca Lonetti and Eda Marchetti. 14: :30 Solving Some Modeling Challenges when Testing Rich Internet Aplications for Security Suryakant Choudhary, Mustafa Emre Dincturk, Gregor V. Bochmann, Guy-Vincent Jourdan, Iosif Viorel Onut and Paul Ionescu. 15: :00Coffee break Session IVChair: Roland Groz 16: :30 SPaCiTE - Web Application Testing Engine Matthias Büchler, Johan Oudinet and Alexander Pretschner. 16: :00 Events-Based Security Monitoring Using MMT Tool Bachar Wehbi, Edgardo Montes de Oca and Michel Bourdellès. 17: :30 The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans and Joeri de Ruiter. 17:30The end

 Next Sectest 2013 will be held in Luxembourg  Still affiliated to ICST conference  In a better hotel (without noise)