meeting.xidian.edu.cn · web viewwilly susilo) 10:00-10:25 credential wrapping: from anonymous...
TRANSCRIPT
ASIACCS 2016 Conference Schedule
Day 1(May 30, 2016)
Day 2(May 31, 2016)
Day 3(June 1, 2016)
Day 4(June 2, 2016)
Day 5(June 3, 2016)
4 Rooms Main Conference Room(Level 2)
Room 1(Level 2)
Room 2(Level 3)
Room 1(Level 2)
Room 2(Level 3)
Room 1(Level 2)
Room 2(Level 3)
08:30 - 09:00 Registration (All Day) Opening Keynote 2(08:30 - 09:30)
Keynote 3(08:30 - 09:30)09:00 - 09:30
Workshops Keynote 1(09:00 - 10:00) Session 16
Privacy(09:00 - 11:05)
Session 17Short Papers(09:00 - 11:05)
09:30 - 10:00 Coffee Break Coffee Break
10:00 - 10:30 Coffee Break Coffee BreakSession 4Password
Authentication and Security
(10:00 - 12:05)
Session 7System Security
(10:00 - 12:05)
Session 10Authentication(10:00 - 12:05)
Session 13Web and Network Security
(10:00 - 12:05)
10:30 - 11:00
WorkshopsSession 1
Software Security(10:30 - 12:10)
11:00 - 11:30Closing
11:30 - 12:00
12:00 - 12:30Lunch Buffet(12:00 - 14:00)
(Level 1, 雨林咖啡厅)
Lunch Buffet(12:10 - 14:00)
(Level 1, 雨林咖啡厅)
Lunch Buffet(12:05 - 13:30)
(Level 1, 雨林咖啡厅)
Lunch Buffet(12:05 - 13:30)
(Level 1, 雨林咖啡厅)
Lunch Buffet(12:00 - 13:30)
(Level 1, 雨林咖啡厅)12:30 - 13:00
13:00 - 13:30
13:30 - 14:00
Workshops
Invited Talk (Huawei)(14:00 - 14:45) Session 5
Identity-Based Encryption
(13:30 - 15:35)
Session 8Mobile Security
I(13:30 - 15:35)
Session 11Security
Protocols I(13:30 - 15:35)
Session 14Mobile Security
II(13:30 - 15:35)
14:00 - 14:30
14:30 - 15:00 Session 2Cloud Security I(14:45 - 16:00)15:00 - 15:30
15:30 - 16:00 Coffee Break Coffee Break Coffee Break Coffee Break
16:00 - 16:30
Workshops
Invited Talk (CloverSec)(16:20 - 17:05) Session 6
Outsourcing(16:00 - 17:40)
Session 9IoT and CPS
(16:00 - 17:40)
Session 12Security
Protocols II(16:00 - 18:05)
Session 15Malware and
Attacks(16:00 - 18:05)
16:30 - 17:00
17:00 - 17:30 Session 3Cloud Security II
(17:05 - 18:20)17:03 - 18:00
18:00Dinner Buffet
(Level 1, 雨林咖啡厅)Dinner Buffet
(Level 1, 雨林咖啡厅)Conference Banquet
(Level 2, Dragon Palace, 腾龙阁)Dinner Buffet
(Level 1, 雨林咖啡厅)
ASIACCS 2016 Workshops Schedule
Day 1(May 30, 2016)
Level 2 Room 1 (行政会议室) Lever 2 Room 2 (多二 1厅) Lever 2 Room 3 (多二 3厅) Lever 2 Room 4 (多二 5厅)
08:30 - 09:00 Registration Opens All Day
09:00 - 09:30 CPSS 2016 Opening & Keynote 1(09:00 - 10:10)
SCC 2016 Opening & Keynote(09:00 - 10:30)
AsiaPKC 2016 Opening &Session 1 MPC and PIR
(08:55 - 10:15)09:30 - 10:00
10:00 - 10:30 Coffee Break
10:30 - 11:00 CPSS 2016 Session 1Threat Modelling and Vulnerability
Analysis for CPS(10:30 - 12:00)
SCC 2016 Session 1Infrastructure Support
(10:45 - 12:05)
AsiaPKC 2016 Session 2Authentication and ECC &
Closing(10:45 - 12:30)
11:00 - 11:30
11:30 - 12:00
12:00 - 12:30Lunch Buffet
(Level 1, 雨林咖啡厅)(12:00 - 13:30)
12:30 - 13:00
13:00 - 13:30
13:30 - 14:00 CPSS 2016 Keynote 2(13:30 - 14:30) SCC 2016 Session 2
Data Processing(13:30 - 14:50)
WTMC 2016 Opening & Keynote(14:00 - 15:00)
IoTPTS 2016 Opening & Keynote(13:30 - 14:30)14:00 - 14:30
14:30 - 15:00 CPSS 2016 Session 2Intrusion Detection for CPS
(14:30 - 15:30)
IoTPTS 2016 Session 1Primitives
(14:30 - 15:35)15:00 - 15:30
15:30 - 16:00 Coffee Break
16:00 - 16:30 CPSS 2016 Session 3Availability and Privacy for CPS
(15:50 - 16:50) SCC 2016 Session 3Applications
(15:05 - 16:25)
WTMC 2016 Session 1 Measurements of Security, Attacks, and Fraud
(15:15 - 16:30)
IoTPTS 2016 Session 2Attacks & Applications
(16:15 - 17:30)16:30 - 17:00
17:00 - 17:30 CPSS 2016 Session 4 Embedded Systems Security & Closing
(16:50 - 18:00)
WTMC 2016 Session 2 Algorithms & Closing
(16:45 - 18:10)
IoTPTS 2016 Closing(17:30 - 17:45)17:03 - 18:00
18:00Dinner Buffet
(Level 1, 雨林咖啡厅)
Conference Program
2016-05-30 (Day 1): Registration Desk
09:00-22:00 Registration
12:00 Lunch (Buffet @ 雨林咖啡厅, Level 1)
18:00 Dinner (Buffet @ 雨林咖啡厅, Level 1)
2016-05-30 (Day 1): CPSS 2016 Workshop (Level 2 Room 1:行政会议室)
09:00-09:10 Opening
Keynote 1 (Chair: Jianying Zhou)
09:10-10:10Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical SystemsProf. David M. Nicol, University of Illinois at Urbana-Champaign, USA
10:10-10:30: Coffee Break
Session 1: Threat Modelling and Vulnerability Analysis for CPS (Chair: David M. Nicol)
10:30-11:00 A Risk Assessment Framework for Automotive Embedded SystemsMafijul Islam, Aljoscha Lautenbach, Christian Sandberg and Tomas Olovsson
11:00-11:30Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical SystemWei He, Jakub Breier, Shivam Bhasin and Anupam Chattopadhyay
12:00-13:30: Lunch (Buffet@雨林咖啡厅, Level 1)
Keynote 2 (Chair: Jianying Zhou)
13:30-14:30 N-Version ObfuscationProf. Michael R. Lyu (Chinese University of Hong Kong, China)
Session 2: Intrusion Detection for CPS (Chair: Miroslaw Kutylowski)
14:30-15:00Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine LearningKhurum Nazir Junejo and Jonathan Goh
15:00-15:30Exploiting Bro for Intrusion Detection in a SCADA systemRobert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi and Mathias Ekstedt
15:30-15:50: Coffee Break
Session 3: Availability and Privacy for CPS (Chair: Michael R. Lyu)
15:50-16:20
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller FailuresUttam Gosh, Xinshu Dong, Rui Tan, Zbigniew Kalbarczyk, David K. Y. Yau and Ravishankar K. Iyer
16:20-16:50BES - Differentially Private and Distributed Event Aggregation in Advanced Metering InfrastructuresVincenzo Gulisano, Valentin Tudor, Magnus Almgren and Marina Papatriantafilou
Session 4: Embedded Systems Security (Chair: Jinguang Han)
16:50-16:20Binding Hardware and Software to Prevent Firmware Modification and Device CounterfeitingRobert Lee, Konstantinos Markantonakis and Raja Naeem Akram
16:20-17:50 Enhancing TPM Security by Integrating SRAM PUFs TechnologyDong Li, Huaqun Guo and Jia Xu
17:50-18:00 Closing and Best Paper Award
18:00 Dinner (Buffet@雨林咖啡厅, Level 1)
--------------------------------------------------End of CPSS 2016-----------------------------------------------------------
2016-05-30 (Day 1): SCC 2016 Workshop (Lever 2 Room 2: 多二 1厅)
09:00-09:10 Opening
Keynote
09:10-10:30 Giano – toward Large Scale Access Security Management in Private CloudDr. Ye Wu, Baidu Inc, China
10:30-10:45: Coffee Break
Session 1: Infrastructure Support (Chair: Cong Wang)
10:45-11:05 SPLM: Security Protection of Live Virtual Machine Migration in Cloud ComputingDegang Sun, Jie Zhang, Wei Fan, Tingting Wang, Chao Liu and Weiqing Huang
11:05-11:25 Lightweight Examination of DLL Environments in Virtual Machines to Detect MalwareXiongwei Xie and Weichao Wang
11:25-11:45 Enabling Assured Deletion in the Cloud Storage by OverwritingYuchuan Luo, Ming Xu, Shaojing Fu and Dongsheng Wang
11:45-12:05 Cloud Storage Integrity Checking: Going From Theory To PracticeFei Chen, Taoyi Zhang, Jianyong Chen and Tao Xiang
12:05-13:30: Lunch (Buffet @雨林咖啡厅, Level 1)
Session 2: Data Processing (Chair: Sheng Zhong)
13:30-13:50
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang
13:50-14:10A new secure index supporting efficient index updating and similarity search on clouds Baojia Zhang, Yuan Zhang and He Zhang
14:10-14:30 Another compression method for homomorphic ciphertexts Sergiu Carpov and Renaud Sirdey
14:30-14:50 Dynamic execution of secure queries over homomorphic encrypted databases Oana Stan, Sergiu Carpov and Renaud Sirdey
14:50-15:05: Coffee Break
Session 3: Applications (Chair: Yuan Zhang)
15:05-15:25 Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds Seungmin Kang, Khin Mi Mi Aung and Bharadwaj Veeravalli
15:25-15:45 Privacy Preserving Distributed Permutation Test Yunlong Mao and Yuan Zhang
15:45-16:05Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis Holger Kuehner and Hannes Hartenstein
16:05-16:25 Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Yun Zhang, Farhan Patwa and Ravi Sandhu
18:00 Dinner (Buffet @雨林咖啡厅, Level 1)
----------------------------------------------------End of SCC 2016------------------------------------------------------------
2016-05-30 (Day 1) Morning: AsiaPKC 2016 Workshop (Lever 2 Room 3: 多二 3厅)
08:55-09:00 Opening
Session 1: MPC and PIR (Chair: Keita Emura)
09:00-09:25
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE ChallengeJohannes Buchmann, Niklas Büscher, Florian Goepfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, and Michael Walter
09:25-09:50 An Implementation of Non-Uniform Shuffle for Secure Multi-Party ComputationAkihiro Nishimura, Yu-Ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
09:50-10:15 Cryptanalysis of a Fast Private Information Retrieval ProtocolJiayang Liu and Jingguo Bi
10:15-10:45: Coffee Break
Session 2: Authentication and ECC (Chair: Rui Zhang)
10:45-11:10 Blind Password Registration for Verifier-based PAKEFranziskus Kiefer and Mark Manulis
11:10-11:35Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical AnalysisBagus Santoso
11:35-12:00Key compression for isogeny-based cryptosystemsReza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, and Christopher Leonardi
12:00-12:25 Improved Atomicity to prevent HCCA on NIST curvesPoulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay
12:25--12:30 Closing
12:30-13:30: Lunch (Buffet @雨林咖啡厅, Level 1)
-------------------------------------------------End of AsiaPKC 2016 ----------------------------------------------------
2016-05-30 (Day 1) Afternoon: WTMC 2016 Workshop (Lever 2 Room 3: 多二 3厅)
14:00-14:10 Opening
Keynote
14:10-15:00It's Time for An Internet-wide Recommitment to Measurement. And Here's How We Should Do It.Paul Vixie, Farsight Security
15:00-15:15: Coffee Break
Session 1: Measurements of Security, Attacks, and Fraud (Chair: Michel van Eeten)
15:15-15:40An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern AnalysisJiawei Su, Katsunari Yoshioka, Junji Shikata, and Tsutomu Matsumoto
15:40-16:05Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale NetworksRomain Fontugne, Johan Mazel, and Kensuke Fukuda
16:05-16:30 FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart GridWenlin Han and Yang Xiao
16:30-16:45: Coffee Break
Session 2: Algorithms (Chair: Maciej Korczyński)
16:45-17:10 A High Performance IPv6 Flow Table Lookup Algorithm Based on HashHuan Guo, Zhengmin Li, Qingyun Liu, Jia Li, and Li Guo
17:10-17:35Fast and Accurate Identification of Active Recursive Domain Name Servers in high-speed NetworkXiaomei Liu, Yong Sun, Caiyun Huang, Xueqiang Zou, and Zhi-Guang Qin
17:35-18:00Image Processing Pipeline Model Integrating Steganographic Algorithms for Mobile CamerasPrabhat Dahal, Dongming Peng, and Hamid Sharif
18:00-18:10 Closing
18:00 Dinner (Buffet @雨林咖啡厅, Level 1)
--------------------------------------------------End of WTMC 2016 -------------------------------------------------
2016-05-30 (Day 1) Afternoon: IoTPTS 2016 Workshop (Lever 2 Room 4 : 多二 5厅)
13:30-13:40 Opening
Keynote
13:40-14:30 Functional Credentials for Internet of ThingsSherman S.M. Chow, Chinese University of Hong Kong, Hong Kong
Session 1: Primitives (Chair: Ned Smith)
14:30-14:55High-Performance and Lightweight Lattice-Based Public-Key EncryptionJohannes Buchmann, Florian Goepfert, Tim Güneysu, Tobias Oder, and Thomas Pöppelmann
14:55-15:20 Physical Unclonable Functions for IoT SecurityMuhammad N. Aman, Kee Chaing Chua, and Biplab Sikdar
15:20-15:45Trusted Sensors for Participatory Sensing and IoT Applications based on Physically Unclonable FunctionsIhtesham Haider, Michael Höberl, and Bernhard Rinner
15:45-16:15: Coffee Break
Session 2: Attacks & Applications (Chair: Gokay Saldamli)
16:15-16:40 Analyzing the Security and Privacy of Cloud-based Video Surveillance SystemsJohannes Obermaier and Martin Hutle
16:40-17:05 Cloud-Based Commissioning of Constrained Devices using Permissioned BlockchainsThomas Hardjono and Ned Smith
17:05-17:30 Mind The Plug! Laptop-User Recognition Through Power ConsumptionMauro Conti, Michele Nati, Enrico Rotundo, and Riccardo Spolaor
17:30-17:45 Closing
18:00 Dinner (Buffet @雨林咖啡厅, Level 1)
----------------------------------------------------End of IoTPTS 2016 -----------------------------------------------
2016-05-31(Day 2): Main Conference Room (Level 2)
08:30-09:00 Opening
Keynote 1 (Chair: Robert H. Deng)
09:00-10:00 Security and Privacy in Social Networks: Challenges and OpportunitiesProfessor Yang Xiang, Deakin University, Australia
10:00-10:30: Coffee Break
Session 1: Software Security (Chair: Guofei Gu)
10:30-10:55ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory AnalysisQian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, and Heng Yin
10:55-11:20Juggling the Gadgets: Binary-level Code Randomization using Instruction DisplacementHyungjoon Koo and Michalis Polychronakis
11:20-11:45No-Execute-After-Read: Preventing Code Disclosure in Commodity SoftwareJan Werner, George Baltas, Rob Dallara, Nathan Otternes, Kevin Snow, Fabian Monrose, and Michalis Polychronakis
11:45-12:10 ROPMEMU: A Framework for the Analysis of Complex Code-Reuse AttacksMariano Graziano, Davide Balzarotti, and Alain Zidouemba
12:10-14:00: Lunch (Buffet @ 雨林咖啡厅, Level 1)
Invited Talk (Huawei) (Chair: Xinyi Huang)
14:00-14:45 IoT Security: Challenges and OpportunitiesDr Feng Bao, Shield Lab, Huawei
Session 2: Cloud Security I (Chair: Sherman S.M. Chow)
14:45-15:10 Enabling Ciphertext Deduplication for Secure Cloud Storage and Access ControlHeyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, and Kui Ren
15:10-15:35 Privacy-Preserving Spectral Analysis of Large Graphs in Public CloudsSagar Sharma, James Powers, and Keke Chen
15:35-16:00Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted DataKaitai Liang, Chunhua Su, Jiageng Chen, and Joseph K Liu
16:00-16:20: Coffee Break
Invited Talk (CloverSec) (Chair: Xiaofeng Chen)
16:20-17:05 Research and Applications of Distributed Risk-Award Model Based on CommunityMr Peiyuan Zhao, CloverSec
Session 3: Cloud Security II (Chair: Joseph Liu)
17:05-17:30FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare SystemCheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, and Xiaodong Lin
17:30-17:55Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network CodingBinanda Sengupta and Sushmita Ruj
17:55-18:20 Efficient Techniques for Publicly Verifiable Delegation of ComputationKaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, and Refik Molva
18:20: Dinner (Buffet @雨林咖啡厅, Level 1)----------------------------------------------------------End of Day 2----------------------------------------------------------
2016-06-01 (Day 3): Room 1, Level 2, Main Conference Room
Keynote 2 (Chair: XiaoFeng Wang )
08:30-09:30 Towards Assessing and Controlling Privacy in Large-Scale, Open NetworksProfessor Michael Backes, CISPA, Saarland University & MPI-SWS
09:30-10:00: Coffee Break
Session 4: Password Authentication and Security (Chair: Willy Susilo)
10:00-10:25
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric AuthenticationYanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang, and Jianying Zhou
10:25-10:50 UC-secure Two-Server Password-Based Authentication Protocol and Its ApplicationsLin Zhang, Zhenfeng Zhang, and Xuexian Hu
10:50-11:15 Client-CASH: Protecting Master Passwords against Offline AttacksJeremiah Blocki and Anirudh Sridhar
11:15-11:40 Device-Enhanced Password Protocols with Optimal Online-Offline ProtectionStanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, and Nitesh Saxena
11:40-12:05 Friend or Foe? Your Wearable Devices Reveal Your Personal PINChen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, and Bo Liu
12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
Session 5: Identity-Based Encryption (Chair: Dawu Gu)
13:30-13:55Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the PlaintextWilly Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, and Yang-Wai Chow
13:55-14:20 Dealerless Corporate Key Generation for Identity-Based Encryption SchemesZhen Liu, Duncan Wong, and Jack Poon
14:20-14:45Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong SecurityPeng Xu, Jingnan Li, Wei Wang, and Hai Jin
14:45-15:10 Password-Controlled Encryption with Accountable Break-Glass AccessTao Zhang, Sherman S. M. Chow, and Jinyuan Sun
15:10-15:35 Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityKai He, Jian Weng, Jia-Nan Liu, Joseph Liu, Wei Liu, and Robert H. Deng
15:35-16:00: Coffee Break
Session 6: Outsourcing (Chair: Cong Wang)
16:00-16:25SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the CloudQian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, and Kui Ren
16:25-16:50
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable ComputationKai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, and Zhenfu Cao
16:50-17:15 Efficient Secure Outsourcing of Quadratic ProgramsSergio Salinas, Changqing Luo, Weixian Liao, and Pan Li
17:15-17:40Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved CheckabilityYanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, and Dawu Gu
18:00 Banquet (Level 2, Dragon Palace, 腾龙阁)
2016-06-01 (Day 3): Room 2, Level 3, 多三厅Keynote 2 (Chair: XiaoFeng Wang) @ Room 1
08:30-09:30 Towards Assessing and Controlling Privacy in Large-Scale, Open NetworksProfessor Michael Backes, CISPA, Saarland University & MPI-SWS
09:30-10:00: Coffee Break
Session 7: System Security (Chair: Kehuan Zhang)
10:00-10:25 NFPS: Adding Undetectable Secure Deletion to Flash Translation LayerShijie Jia, Luning Xia, Bo Chen, and Peng Liu
10:25-10:50 Preventing Page Faults from Telling your SecretsShweta Shinde, Zheng Leong Chua, Viswesh Narayanan, and Prateek Saxena
10:50-11:15 Identifying and Utilizing Dependencies Across Cloud Security ServicesAhmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, and Neeraj Suri
11:15-11:40 Hardening OpenStack Cloud Platforms against Compute Node CompromisesWai Kit Sze, Abhinav Srivastava, and R. Sekar
11:40-12:05 Cross Processor Cache AttacksGorka Irazoqui, Thomas Eisenbarth, and Berk Sunar
12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
Session 8: Mobile Security I (Chair: Kai Chen)
13:30-13:55Mystique: Evolving Android Malware for Auditing Anti-Malware ToolsGuozhu Meng, Yinxing Xue, Chandramohan Mahinthan, Annamalai Narayanan, Yang Liu, Jie Zhang, and Tieming Chen
13:55-14:20StormDroid: A Streaminglized Machine Learning-based System for Detecting Android MalwareSen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, and Haojin Zhu
14:20-14:45FLEX: A Flexible Code Authentication Framework for Delegating Mobile App CustomizationGabriele Costa, Paolo Gasti, Alessio Merlo, and Shung-Hsi Yu
14:45-15:10 DroidDisintegrator: Intra-Application Information Flow Control in Android AppsRoei Schuster and Eran Tromer
15:10-15:35
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery MechanismsMathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso, and Frank Piessens
15:35-16:00: Coffee Break
Session 9: IoT and CPS (Chair: Tieyan Li)
16:00-16:25 Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver RecognitionIan Markwood and Yao Liu
16:25-16:50Automatic Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web InterfacesAndrei Costin, Apostolis Zarras, and Aurélien Francillon
16:50-17:15Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment PlantAditya Mathur and Sridhar Adepu
17:15-17:40Smart Locks: Lessons for Securing Commodity Internet of Things DevicesGrant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner
18:00 Banquet (Level 2, Dragon Palace, 腾龙阁)---------------------------------------------------End of Day 3---------------------------------------------------------------
2016-06-02 (Day 4): Room 1, Level 2, Main Conference Room
Keynote 3 (Chair: XiaoFeng Wang)
08:30-09:30 Binary Analysis for Autonomous HackingProfessor Giovanni Vigna, University of California in Santa Barbara, United States
09:30-10:00: Coffee Break
Session 10: Authentication (Chair: Qianhong Wu)
10:00-10:25The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication SchemesDing Wang, Qianchen Gu, Haibo Cheng, and Ping Wang
10:25-10:50A General Construction of Homomorphic Linear Authentication Schemes from \epsilon-Authentication CodesShuai Han, Shengli Liu, Fangguo Zhang, and Kefei Chen
10:50-11:15 Forgery-Resistant Touch-based Authentication on Mobile DevicesNeil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, and Mario Frank
11:15-11:40 Practical "Signatures with Efficient Protocols" from Simple AssumptionsBenoît Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung
11:40-12:05 Bilateral-secure Signature by Key EvolvingTao Xiang, Xiaoguo Li, Fei Chen, and Yi Mu
12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
Session 11: Security Protocols I (Chair: Wen Tao Zhu )
13:30-13:55 Secure Dynamic SSE via Access Indistinguishable StorageTianhao Wang and Yunlei Zhao
13:55-14:20 Building an Encrypted, Distributed, and Searchable Key-value StoreXingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin
14:20-14:45 Anonymous Role-Based Access Control on E-Health RecordsXingguang Zhou, Jianwei Liu, Weiran Liu, and Qianhong Wu
14:45-15:10 Gait-Based Wi-Fi Signatures for Privacy-PreservingYan Li and Ting Zhu
15:10-15:35 Anonymous Identification for Ad Hoc GroupXingye Lu and Man Ho Au
15:35-16:00: Coffee Break
Session 12: Security Protocols II (Chair: Man Ho Au )
16:00-16:25 Efficient Authenticated Multi-Pattern MatchingZhe Zhou, Tao Zhang, Sherman S.M. Chow, Yupeng Zhang, and Kehuan Zhang
16:25-16:50Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted DataNgoc Hieu Tran, Hwee Hwa Pang, and Robert H. Deng
16:50-17:15Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic EncryptionSungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, and Junbum Shin
17:15-17:40 Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and
CountermeasureChong Guan, Kun Sun, Zhan Wang, and Wen Tao Zhu
17:40-18:05 Fault Attacks on Efficient Pairing ImplementationChen Qian and Pierre-Alain Fouque
18:05 Dinner (Buffet @ 雨林咖啡厅, Level 1)
2016-06-02 (Day 4): Room 2, Level 3, 多三厅Keynote 3 (Chair: XiaoFeng Wang ) @ Room 1, Level 2
08:30-09:30 Binary Analysis for Autonomous HackingProfessor Giovanni Vigna, University of California in Santa Barbara, United States
09:30-10:00: Coffee Break
Session 13: Web and Network Security (Chair: Zonghua Zhang)
10:00-10:25 Model-based Security Testing: an Empirical Study on OAuth 2.0 ImplementationsRonghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, and Pili Hu
10:25-10:50 Discovering Malicious Domains through Passive DNS Data Graph AnalysisIssa M. Khalil, Ting Yu, and Bei Guan
10:50-11:15 Half-Baked Cookies Hardening Cookie-Based Authentication for the Modern WebYogesh Mundada, Nick Feamster, and Balachander Krishnamurthy
11:15-11:40 Attestation Transparency: Building secure Internet services for legacy clientsJethro Beekman, John Manferdelli, and David Wagner
11:40-12:05 Congesting the Internet with Coordinated And Decentralized Pulsating AttacksYu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, and Vyas Sekar
12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
Session 14: Mobile Security II (Chair: Wei Wang)
13:30-13:55 CDRep: Automatic Repair of Cryptographic-Misuses in Android ApplicationsSiqi Ma, David Lo, Teng Li, and Robert H. Deng
13:55-14:20 MobiPot: Understanding Mobile Telephony Threats with HoneycardsMarco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, and Mustaque Ahamad
14:20-14:45 Checking Intent-based Communication in Android with Intent Space AnalysisYiming Jing, Gail-Joon Ahn, Adam Doupé, and Jeong Hyun Yi
14:45-15:10
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android AppsZheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, and Hao Chen
15:10-15:35 Attacks and Defence on Android Free Floating WindowsLingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, and Dengguo Feng
15:35-16:00: Coffee Break
Session 15: Malware and Attacks (Chair: Yu Wang)
16:00-16:25 MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis TestingPhani Vadrevu and Roberto Perdisci
16:25-16:50Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph MiningBabak Rahbarinia, Marco Balduzzi, and Roberto Perdisci
16:50-17:15Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection MechanismsAnindya Maiti, Oscar Armbruster, Murtuza Jadliwala, and Jibo He
17:15-17:40 Leakage Fingerprints — A Non-negligible Vulnerability in Side-Channel AnalysisZeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, and Yuan Zhao
17:40-18:05 Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher
Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, and Victor Debrunner18:05 Dinner (Buffet @ 雨林咖啡厅, Level 1)
------------------------------------------------------End of Day 4------------------------------------------------------------
2016-06-03 (Day 5): Room 1, Level 2, Main Conference Room
Session 16: Privacy (Chair: Haojin Zhu)
09:00-09:25 Privacy and Utility of Inference Control Mechanisms for Social Computing ApplicationsSeyed Hossein Ahmadinejad, Philip W. L. Fong, and Rei Safavi-Naini
09:25-09:50 Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)Qinghan Xue, Mooi Choo Chuah, and Yingying Chen
09:50-10:15 Data Exfiltration in the Face of CSPSteven Van Acker, Daniel Hausknecht, and Andrei Sabelfeld
10:15-10:40 StemJail: Dynamic Role CompartmentalizationMickaël Salaün, Marion Daubignard, and Hervé Debar
10:40-11:05 SkypeLine Robust Hidden Data Transmission for VoIPKatharina Kohls, Thorsten Holz, Dorothea Kolossa, and Christina Pöpper
11:10 Closing @ Level 2, Main Conference Room
12:00-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
2016-06-03 (Day 5): Room 2, Level 3, 多三厅 (8 short papers)
Session 17: 8 short papers (Chair: Kaitai Liang)
09:00-09:15Generic Construction of Publicly Veriable Predicate EncryptionChuting Tan, Zoe L Jiang, S.M Yiu, Junbin Fang, Xuan Wang, Ye Li, Zechao Liu, Xiaoyan Liu, Lei Cui, Yabin Jin, and Jin Li
09:15-09:30Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyJing Li, Licheng Wang, Zonghua Zhang, and Xinxin Niu
09:30-09:45 Efficient Construction of Completely Non-Malleable CCA Secure Public Key EncryptionShi-Feng Sun, Dawu Gu, Joseph Liu, Udaya Parampalli, and Tsz Hon Yuen
09:45-10:00(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small ModulusFuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, and Haiyang Xue
10:00-10:15Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic CloudsPeng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, and Deqing Zou
10:15-10:30RamCrypt: Kernel-based Address Space Encryption for User-mode ProcessesJohannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, and Michael Backes
10:30-10:45 Your Credentials Are Compromised, Do Not Panic: You Can Be Well ProtectedIssa Khalil, Zuochao Dou, and Abdallah Khreishah
10:45-11:00 Inside Attack Filtering for Robust Sensor LocalizationJongho Won and Elisa Bertino
11:10 Closing @ Level 2, Main Conference Room
12:00-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)
百度安全公司介绍百度昊天镜威胁情报平台简介: 百度昊天镜威胁情报平台(Baidu CyMIRR)是支撑百度安全业务的下一代大数据智能情报分析平台。昊天镜威胁情报平台打通了移动、云、PC的完整生态安全数据,构建了全面的互联网安全事件地貌及知识图谱;同时充分发挥百度在大数据和人工智能领域多年积累的优势,构建了面向安全决策的复合机器学习引擎,支持高性能分布式图计算、超高维安全事件深度学习以及辅助安全专家人工决策的复合智能学习。从海量的安全事件中进行深度关联学习,识别出潜在的互联网威胁,告别被动防御局面,有效提升互联网业务应对黑产困扰和入侵攻击的对抗能力,并为用户提供更加安全的互联网体验。
强大漏洞库
全面:漏洞插件覆盖移动应用、物联网、web及应用、云服务、工控领域等。精准:每个上线漏洞插件都是经过严格测试和专业审计,漏洞精确扫描 100%准确率。高效:社区推动漏洞库快速更新。
分布式架构
快速:所有任务服务器端完成,不受本地资源影响,可达到单节点上千扫描任务几分钟内完成。负载均衡:增加系统的可用性,稳定性和灵活性,负载平均地均摊处理,每个节点都可以处理一部分负载,并且可以在节点之间动态分配负载,以实现平衡。分布式架构:不同业务部署在独立的服务器上提供服务,根据具体情况为高负载的服务实现负载均衡和集群,以更好地对外提供服务。报表系统
数据动态化:根据扫描状态数据实时更新到前端。格式多样化:不同的数据使用不同的图表达到最佳的呈现效果。
专业修复建议
完整方案:发现漏洞,只是其中一步,针对漏洞给出采取哪些措施,才是一个完整的方案。专业修复:系统会对扫描结果进行分析,并提供修复建议。分析准确:提供有效的修复建议,包含详细漏洞修复报告。
四叶草公司介绍西安四叶草信息技术有限公司,简称四叶草安全,成立于 2012年,由国内早期从事信息安全研
究的 cnfjhh创办,是一家专业安全服务提供商。旗下有安全服务、安全产品研发、CloverSec实验室等三个业务模块。公司依托西安丰富的人才资源,立足本土,服务全国。目前,公司在职人员 50+人,高校研究生常年实习人员 20+人/年。其中,核心技术人员均具备 10年以上的安全经验,大部门来自国内知名信息安全公司。产品优势: