GRAMSEC PROGRAM
Sunday, July 8th
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00-10:30 Session 34G: Opening and Keynote
Chair:
Location: Maths Seminar C1
09:00 | Opening remarks and introductions (abstract) |
09:10 | Intrusion Tolerance in Complex Cyber Systems (abstract) |
10:10 | Disclosure Analysis of SQL Workflows (abstract) |
10:30-11:00Coffee Break
11:00-12:30 Session 38G: Technical Papers
Chair:
Location: Maths Seminar C1
11:00 | A state machine system for insider threat detection (abstract) |
11:45 | Combining Bayesian Networks and Fishbone Diagrams to Distinguish between Intentional Attacks and Accidental Technical Failures (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 40G: Technical Papers
Chair:
Location: Maths Seminar C1
14:00 | Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins (abstract) |
14:45 | Deciding the Emptiness of Attack trees (abstract) |
15:30-16:00Coffee Break
16:00-18:00 Session 42F: Technical Papers and Closing Remarks
Chair:
Location: Maths Seminar C1
16:00 | The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement (abstract) |
16:45 | On Linear Logic, Functional Programming, and Attack Trees (abstract) |
17:30 | Closing remarks and discussions (abstract) |