Program

Proceedings available here (with one year of open access)


Location: Lecture Hall F, Hofburg conference center.  


09:00 – 10:30      Session 1: Welcome and Keynote  

                               Session Chair: Florian Kerschbaum 

  • Rainer Böhme. Back to the Roots: Information Sharing Economics and What We Can Learn for Security
10:30– 11:00      Coffee Break


11:00 – 12.30     Session 2: Models for Information Sharing Intelligence

                              Session Chair:  Rainer Böhme

  • Alex Davidson, Gregory Fenn and Carlos Cid. A Model for Secure and Mutually Beneficial Software Vulnerability Sharing
  • Roberto Garrido, Lorena Gonzalez and Sergio Pastrana. Shall we collaborate? A model to analyse the benefits of information sharing
  • Nadine Herold, Holger Kinkelin and Georg Carle. Collaborative Incident Handling Based on the Blackboard-Pattern

12:30 – 14:00      Lunch

 

14:00 – 15:30      Session 3: Tools for Information Sharing

                               Session Chair: Jose Such  

  • Tim R. van de Kamp, Andreas Peter, Maarten H. Everts and Willem Jonker. Private Sharing of IOCs and Sightings (short paper)
  • Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Daniele Guttadoro, Stefano Paraboschi, Marco Rosa, Pierangela Samarati and Alessandro Saullo. Managing Data Sharing in OpenStack Swift with Over-Encryption 
  • Cynthia Wagner, Alexandre Dulaunoy, Gérard Wagener and Andras Iklody. MISP - The design and implementation of a collaborative threat intelligence sharing platform 
15:30 – 16:00      Coffee Break


16:00 – 17:30      Session 4Real-World Studies

                               Session Chair: Erik-Oliver Blass

  • Jaspreet Bhatia, Travis Breaux, Liora Friedberg, Hanan Hibshi and Daniel Smullen. Privacy Risk in Cybersecurity Data Sharing 
  • Christian Sillaber, Clemens Sauerwein and Ruth Breu. Data quality challenges and future research directions in threat intelligence sharing practice 
  • Marie Vasek, Matthew Weeden and Tyler Moore. Measuring the Impact of Sharing Abuse Data with Web Hosting Providers