Program
Financial Cryptography and Data Security 2012
Sixteenth International Conference
February 27–March 2, 2012
Divi Flamingo Beach Resort
Bonaire
All events take place in the Peter Hughes Meeting Room unless otherwise noted. |
|
Thursday-Sunday, February 23-26, 2012 | |
Dive Certification Course Location: Divi Dive Bonaire |
|
Sunday, February 26, 2012 | |
5:00pm–6:00pm | Registration Reception Location: Calabas Garden |
Monday, February 27, 2012 | |
8:30am–9:00am | Registration |
9:00am–9:15am | Opening Remarks |
Scott M Zoldi, Ph.D. Vice President Analytic Science FICO Analytic Techniques for Combating Financial Fraud
Effective detection and prevention of financial transaction fraud requires analytic techniques capable of characterizing the transaction stream and determining the likelihood of fraud or misuse in real time. The nature of fraud makes the development of transaction monitoring models challenging, and inspires new Analytic innovations to respond to the ever changing tactics taken on by fraudsters. In this talk, we will review traditional payment card fraud detection analytic techniques such as transaction profiling and neural network models, and then expand to new analytic techniques. These new techniques include Adaptive Analytics which allows a model in production to adjust its scores dynamically based on analyst fraud case dispositions; Self-Calibrating Analytics which determines outlier fraud features in streaming transactions through real-time estimations of variable distributions; and Global Intelligent Profiles which enable profiling of various entities in the fraud decision such as ATMs, countries, and compromise clusters.
|
|
10:30am–11:00am | Break |
11:00am–12:20pm |
Session Chair: Angelos Keromytis Hyoungshick Kim, John Tang and Ross Anderson Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan and Robert Biddle Joseph Bonneau, Sören Preibusch and Ross Anderson |
12:20pm–1:20pm | Lunch Location: Calabas Restaurant |
1:20pm–2:30pm |
Session Chair: Sonia Chiasson Tyler Moore, Jie Han and Richard Clayton Dan Bogdanov, Riivo Talviste and Jan Willemson Christopher Thorpe and Steven Willis |
2:30pm–3:00pm | Break |
3:00pm–4:20pm |
Session Chair: Sven Dietrich Zi Lin, Denis Foo Kune and Nicholas Hopper Benjamin Johnson, John Chuang, Jens Grossklags and Nicolas Christin Tao Wang, Kevin Bauer, Clara Forero and Ian Goldberg |
6:00pm–7:00pm | Welcome Reception Location: Flamingo's Nest |
Tuesday, February 28, 2012 | |
8:30am–10:00am |
Session Chair: Nicolas Christin Scott Wolchok, Eric Wustrow, Dawn Isabel and J. Alex Halderman Rainer Boehme Attila A. Yavuz, Peng Ning and Mike Reiter |
10:00am–10:30am | Break |
10:30am–12:00pm |
Session Chair: Moti Yung Morten Dahl, Chao Ning and Tomas Toft Rafik Chaabouni, Helger Lipmaa and Bingsheng Zhang T-H. Hubert Chan, Elaine Shi and Dawn Song |
12:00pm–4:00pm | Island Tour and Lunch at Rose Inn in Rincon |
8:00pm–9:00pm | IFCA General Meeting |
9:00pm–12:00am | Rump Session Chair: Tyler Moore |
Wednesday, February 29, 2012 | |
8:40am–10:00am |
Session Chair: Lenore Zuck Daniel Slamanig Mariana Raykova, Hang Zhao and Steven Bellovin Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy and David Irwin |
10:00am–10:30am | Break |
10:30am–12:00pm |
Session Chair: Angelos Keromytis Benjamin Mood, Lara Letaw and Kevin Butler Payman Mohassel and Salman Niksefat Kaoru Kurosawa and Yasuhiro Ohtaki |
12:00pm–1:00pm | Lunch Location: Calabas Restaurant |
1:00pm–1:50pm |
Session Chair: Helger Lipmaa Jeremy Clark and Aleksander Essex Simon Barber, Xavier Boyen, Elaine Shi and Ersin Uzun |
Moderator: Jason Cronk Panelists: Peter Swire, Stuart Shapiro, Travis Breaux Laws against adopting PETs (Privacy Enhancing Technologies)
As organizations look to mitigate their privacy risks, they are increasing being encouraged by regulatory authorities to consider privacy by design (PbD) and privacy enhancing technologies (PETs). PETs present an alternative to the standard model of most organizations: data collection coupled with data protection. PETs can either increase transparency, by allowing individual or collective auditing of company privacy practices (Google's Privacy Center) or increase opacity, by hiding or eliminating some of the links between data points (TOR anonymity network). Laws and regulations can also affect the transparency and opacity of personal data. While some laws may adversely affect privacy for organizations following the standard model, other laws may directly impede privacy enhancement by requiring the collection of personal data that are not necessary for organization operations. This panel aims to look at laws and regulations that either directly or inadvertently are not PET friendly.
Dr. Stuart S. Shapiro is a Principal Information Privacy and Security Engineer and a member of the Privacy Community of Practice at the MITRE Corporation, a not-for-profit company performing technical research and consulting primarily for the U.S. government. At MITRE he has supported a wide range of privacy activities, including privacy impact assessments, for major government programs and coordinates MITRE research on enterprise privacy-enhancing technologies (ePETs). Prior to joining MITRE he was Director of Privacy at CareInsite, an e-health company, where his responsibilities included both policy and technical issues revolving around privacy and security. He has also held academic positions at several institutions, including the Centre for Research into Innovation, Culture and Technology at Brunel University in the U.K. and the Department of Science and Technology Studies at Rensselaer Polytechnic Institute in the U.S. He has taught courses on the history, politics, and ethics of information and communication technologies (ICTs), while his research and writing have focused on ICTs and privacy and on the history and sociology of software development. Travis D. Breaux is an Assistant Professor of Computer Science, appointed in the Institute for Software Research of the School of Computer Science at Carnegie Mellon University. Dr. Breaux's research program searches for new methods and tools for developing correct software specifications and ensuring that software systems conform to those specifications in a transparent, reliable and trustworthy manner. This includes demonstrating compliance with U.S. and international privacy and security laws across multiple jurisdictions in finance and healthcare. Dr. Breaux has several publications in ACM and IEEE-sponsored journals and conference proceedings. Dr. Breaux is a member of the ACM SIGSOFT, IEEE Computer Society and a Council Member of the USACM Public Policy Committee. R. Jason Cronk is licensed attorney in Florida, Certified Information Privacy Professional and currently works as a software architect in the Information Security Department of Verizon, Inc. Mr. Cronk lectures frequently on the topics of privacy and privacy by design with a special emphasis on employing PETs (Privacy Enhancing Techniques) in information systems. Mr. Cronk was an original attendee of Financial Cryptography 97, where he gave a rump session speech on using statistical sampling for authenticating streaming microcash. | |
6:30pm–8:30pm | BBQ Location: Calabas Restaurant and Calabas Garden |
Thursday, March 1, 2012 | |
8:30am–10:00am |
Session Chair: Burt Rosenberg Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler Aleksander Essex and Urs Hengartner Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann |
10:00am–10:30am | Break |
10:30am–12:00pm |
Session Chair: Alex Halderman Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider Michael Weiß, Benedikt Heinz and Frederic Stumpf Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi and Steffen Schulz |
12:00pm–12:15pm | Closing Remarks |
12:15pm–1:15pm | Lunch Location: Calabas Restaurant |
1:15pm–6:00pm | Free Afternoon with Activities |
6:00pm–7:00pm | Workshop Reception (for workshop registrants) Location: Flamingo's Nest |
Friday, March 2, 2012 | |
9:00am–5:00pm | Workshops Locations: Peter Hughes Meeting Room and Capture Shop |
7:00pm–10:00pm | Paranda Party Bus (for workshop registrants) |
Saturday, March 3, 2012 | |
Jeep Excursion to Washington Slagbaai National Park | |
This conference is organized annually by the International Financial Cryptography Association.