Financial Cryptography and Data Security 2014

Eighteenth International Conference
March 3–7, 2014
Accra Beach Hotel & Spa
Barbados

Conference Program

Ross Anderson live-blogged FC14. You can read his excellent summaries of all presentations, including during the rump session, over at Light Blue Touchpaper.

All events take place in the Khiaroon at the Accra Beach Hotel unless otherwise noted.
Sunday, March 2, 2014

6:00pm–8:00pm Registration Reception
Location: Fig Tree
Monday, March 3, 2014

8:30am–9:00am Registration

9:00am–9:15am Opening Remarks

9:15am–10:15am
Session 1: Keynote Address
Prof. Ross Anderson FRS
University of Cambridge
Session Chair: Rei Safavi-Naini

EMV: Why Payment Systems Fail


10:15am–10:45am Break

10:45am–12pm
Session 2: Payment Systems
Session Chair: Nicolas Christin

Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, Rashid Ansari and V.N. Venkatakrishnan.
Digital Check Forgery Attacks on Client Check Truncation Systems
Paper

Steven Murdoch and Ross Anderson.
Security protocols and evidence: where many payment systems fail
Paper

Tyler Moore and Richard Clayton.
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites
Paper


12pm–1:30pm Lunch
Location: Fig Tree

1:30pm–3:10pm
Session 3: Case Studies
Session Chair: Jens Grossklags

Adam McCarthy, Ben Smyth and Elizabeth Quaglia.
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
Paper

Franziska Roesner, Brian T. Gill and Tadayoshi Kohno.
Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages
Paper

Benjamin Henne, Maximilian Koch and Matthew Smith.
Short Paper: On the Awareness, Control and Privacy of Photo Metadata
Paper

Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg and J. Alex Halderman.
Outsmarting Proctors with Smart Watches: A Case Study on Wearable Computing Security
Paper


3:10pm–3:40pm Break

3:40pm–4:30pm
Session 4: Cloud and Virtualization
Session Chair: Helger Lipmaa

Jan Stanek, Lukas Kencl, Alessandro Sorniotti and Elli Androulaki.
A Secure Data Deduplication Scheme for Cloud Storage
Paper

Clementine Maurice, Christoph Neumann, Olivier Heen and Aurélien Francillon.
Confidentiality Issues on a GPU in a Virtualized Environment
Paper


6:00pm–8:00pm Welcome Reception
Location: Fig Tree
Tuesday, March 4, 2014

9:00am–9:50am
Session 5: Elliptic Curve Cryptography
Session Chair: Tatsuaki Okamoto

Mehdi Tibouchi.
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Paper

Joppe Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig and Eric Wustrow.
Elliptic Curve Cryptography in Practice
Paper


9:50am–10:20am Break

10:20am–12:00pm
Session 6: Privacy-Preserving Systems
Session Chair: Kazuo Ohta

Berry Schoenmakers, Sebastiaan de Hoogh, Ping Chen and Harm Op den Akker.
Practical Secure Decision Tree Learning in a Teletreatment Application
Paper

Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian.
Scaling Private Set Intersection to Billion-Element Sets
Paper

Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang.
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Paper

Kaoru Kurosawa.
Garbled Searchable Symmetric Encryption
Paper


12:00pm–5:30pm Island Tour and Lunch

8:00pm–9:00pm IFCA General Meeting
Location: Khairoon

9:00pm–12:00am Rump Session
Location: Khairoon
Wednesday, March 5, 2014

9:00am–10:40am
Session 7: Authentication and Visual Encryption
Session Chair: Ahmad-Reza Sadeghi

Julien Bringer, Hervé Chabanne, Roch Lescuyer and Alain Patey.
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Paper

Lucjan Hanzlik and Kamil Kluczniak.
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates
Paper

Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski.
Attack on a U-Prove Revocation Scheme from FC’13 - Exploiting the Weakness of the Underlying Accumulator Scheme (Short Paper)
Paper

Sebastian Pape.
Sample or Random Security – A Security Model for Segment-Based Visual Encryption
Paper


10:40am–11:10am Break

11:10am–12:25pm
Session 8: Network Security
Session Chair: Roger Dingledine

Henning Perl, Sascha Fahl and Matthew Smith.
You Won't Be Needing These Any More: On Removing Unused Certificates From Trust Stores
Paper

Nicholas Hopper.
Challenges in protecting Tor hidden services from botnet abuse
Paper

Marie Vasek and Tyler Moore.
Identifying Risk Factors for Webserver Compromise
Paper


12:25pm–1:45pm Lunch
Location: Fig Tree

1:45pm–3:00pm
Session 9: Mobile System Security
Session Chair: Matthew Smith

Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong and N. Asokan.
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Paper

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow and Ahmad-Reza Sadeghi.
When More Becomes Less: On the (In)Security of Mobile Two-Factor Authentication
Paper

Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser and Ahmad-Reza Sadeghi.
MoP-2-MoP -- Mobile private microblogging
Paper


6:30pm–9:30pm Conference BBQ
Location: Accra Deck
Thursday, March 6, 2014

9:00am–10:15am
Session 10: Incentives, Game Theory and Risk
Session Chair: Rainer Boehme

John Ross Wallrabenstein and Chris Clifton.
Privacy Preserving Tatonnement; A Cryptographic Construction of an Incentive Compatible Market
Paper

Aron Laszka, Benjamin Johnson, Jens Grossklags and Mark Felegyhazi.
Estimating Systematic Risk in Real-World Networks
Paper

Ittay Eyal and Emin Gun Sirer.
Majority is not Enough: Bitcoin Mining is Vulnerable
Paper


10:15am–10:45am Break

10:45am–12:00pm
Session 11: Bitcoin Anonymity
Session Chair: Tyler Moore

Michele Spagnuolo, Federico Maggi and Stefano Zanero.
BitIodine: Extracting Intelligence from the Bitcoin Network
Paper

Philip Koshy, Diana Koshy and Patrick McDaniel.
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
Paper

Joseph Bonneau, Jeremy Clark, Joshua A. Kroll, Andrew Miller and Arvind Narayanan.
Mixcoin: Anonymity for Bitcoin with accountable mixes
Paper


12:00pm–12:15pm Closing Remarks

12:15pm–1:15pm Lunch
Location: Fig Tree

1:15pm–6:00pm Free Afternoon with Activities
  • Mount Gay Rum Tour -- depart 2pm, return by 6pm
  • Harrison's Cave Tour -- depart 2pm, return by 6pm
  • Catamaran Sail and Snorkel -- depart 2:30pm, return by 7pm
  • Scuba Dive -- depart 1pm, return by 6pm

6:00pm–8:00pm Workshop Reception (for workshop registrants)
Location: Accra Deck

8:00pm–9:00pm Floor Show: limbo dancing, fire eating, and stilt walking
(Open to Everyone)
Location: Fig Tree
Friday, March 7, 2014

9:00am–5:00pm Workshops

6:15pm–9:30pm Oistons Fish Fry (for workshop registrants)

This conference is organized annually by the International Financial Cryptography Association.