Program
Monday - December 5th, 2016
- 9:30 - 10:00: Registration
- 10:00 - 10:10: Welcome
Keynote I10:10 - 11:10
-
10:10 - 11:10: More than a Password: On the (In)security of Electronic Access Control (Invited Speaker)
- 11:10 - 11:40: Coffee Break
Session I11:40 - 13:00
-
11:40 - 12:20: Two-Factor Authentication in Major Mobile Platforms [Android, iOS, and Windows 10 Mobile] (Hacker Talk)
-
12:20 - 13:00: Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication (Full Paper)
- 13:00 - 14:30: Lunch Break
Session II14:30 - 15:50
-
14:30 - 15:10: EpisoPass: Password Management based on Episodic Memories (Full Paper)
-
15:10 - 15:50: Improving Recall and Security of Passphrases Through Use of Mnemonics (Full Paper)
- 15:50 - 16:10: Coffee Break
Session III16:10 - 17:30
-
16:10 - 16:50: Trust No WAN (Hacker Talk)
-
16:50 - 17:30: Protecting Global Email: DNSSEC + DANE TLSA (Hacker Talk)
Social Event I18:00 - 21:00
- 18:00 - 21:00: Reception and Lightning Talks at Beckmanns Hof
Tuesday - December 6th, 2016
Keynote II10:00 - 10:40
Session IV10:40 - 11:20
-
10:40 - 11:20: Enabling Automatic Password Change in Password Managers Through Crowdsourcing (Short Paper)
- 11:20 - 11:40: Coffee Break
Session V11:40 - 13:00
-
11:40 - 12:20: Analysis of Publicly Leaked Credentials and the Long Story of Password (Re-)use (Full Paper)
-
12:20 - 13:00: On Locational Privacy in the Absence of Anonymous Payments (Hacker Talk)
- 13:00 - 14:30: Lunch Break
Session VI14:30 - 15:50
-
14:30 - 15:10: Adopted Keystroke Rhythm for Password Hardening (Full Paper)
-
15:10 - 15:50: User Experience of Current Authentication Mechanisms and a Proposal for Future Ones (Hacker Talk)
- 15:50 - 16:10: Coffee Break
Session VII16:10 - 17:30
-
16:10 - 16:50: Mobile Device Security: Hopes and Fears (Full Paper)
-
16:50 - 17:30: How I Talk About Password Security With My Mom, Her Boss and John: Feedback on My Awareness Talks (Hacker Talk)
Social Event II18:30 - 21:30
- 18:30 - 21:30: Fiege Brewery Tour
Wednesday - December 7th, 2016
Session VIII10:00 - 11:00
- 10:00 - 10:20: History and Concluding Remarks
-
10:20 - 11:00: Cracking PwdHash: A Bruteforce Attack on Client-Side Password Hashing (Full Paper)
- 11:00 - 11:30: Coffee Break
Session IX11:30 - 12:50
-
11:30 - 12:10: The Service Desk as a Threat Vector (Hacker Talk)
-
12:10 - 12:50: Account Recovery in 1Password. Whys and Hows (Hacker Talk)
- 12:50: Lunch Break
Speaker / Author Information
Slides / Talk:
- Please format your slides in 4:3.
- Each presentation in the conference is scheduled for 40 minutes (including time for questions and setup).
- The lecture hall will be equipped with a Windows laptop that you may use for your presentation; Microsoft Office and Adobe Reader will be installed. Technical support will be available before each session. Before your session starts, you can hand a USB drive with your slides to our technical support team. If you want to use your own device, please bring a VGA adapter (no adapters available at the venue). Please make sure to be on time so that we can check if everything works.
Recording:
- By default, all presentations held will be recorded and uploaded to the Internet (video and slides).
- Please let us know if you DO NOT want your talk to be recorded before the start of your session.
Technical Support:
- If you need any further technical details or have any questions, please let us know via maximilian.golla@rub.de.