11th international conference on information security...
TRANSCRIPT
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
11th International Conference on Information Security Practice and Experience
(ISPEC2015)
May 5-8, 2015
1st floor, New Main Building, Beihang University,
No. 37, Xueyuan Road, Haidian District, Beijing,100191
北航新主楼1层,北京市海淀区学院路37号, 邮编:100191
May 4 14:00-18:00 Registration 会议注册报到
May 5 08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (9)
开幕式、合影、大会学术报告 (1)、会议论文报告(9)
May 6
08:30-17:30 Keynote (1), Paper Presentation (11)
大会学术报告 (1)、会议论文报告(11)
18:00-20:30 Banquet (Beijing Vision Hotel)
晚宴(北京唯实国际文化交流中心)
May 7 08:30-18:00 Keynote (1), Paper Presentation (13)
大会学术报告 (1)、会议论文报告(13)
May 8 08:30-12:30 Industrial Talk (1), Paper Presentation (5), Closing
工业界技术报告(1),会议论文报告 (5),会议结束
Sponsored by:
大会赞助商
Organized by: Institute of Computing, Beihang University 承办单位: 北京航空航天大学计算机学院
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
Direction to Conference Venue
Route 1 (By taxi): Beijing airport to conference site, it takes less than 150RMB (US$25) or so.
Route 2 (By Metro): Airport line, transfer to line 10 at SanYuan Bridge station, alight at West
Tucheng, then walk 15 minutes or so. (机场线在三元桥站换 10 号线,西土城站下车,步行 15 分钟
即可)
Conference Venue &Registration site
Hotel option 1 & Banquet
Entry
Hotel option 2 & Lunch/Dinner
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
Conference Program
1st floor, New Main Building, Beihang University, Beijing (北航新主楼 1 层)
14:00-18:00 May 04, 2015
Registration and Conference Kit Collection Conference time
2015-05-05 (Day 1) : Meeting Room 2(第 2 报告厅)
8:30-9:00 Opening
Keynote 1: (Chair: Feng Bao )
9:00-10:00 Keynote: Techniques for Securing Scalable Multimedia Content in Server-Proxy-User Distribution Networks Prof. Robert H. Deng
10:00-11:00 Photo Shooting + Coffee Break
Session 1: Attribute-Based Encryption (Chair: Yongdong Wu)
11:00-11:30
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext- Policy
Attribute-Based Proxy Re-encryption (page 301)
Yutaka Kawai
11:30-12:00 Revocable Threshold Attribute-Based Signature against Signing Key Exposure
Jianghong Wei, Xinyi Huang, Xuexian Hu, and Wenfen Liu
12:00-12:30 Fully Secure Online/Offline Predicate and Attribute-Based Encryption
Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay
12:30-14:00: Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 2: Stream cipher I (Chair: Robert Deng )
14:00-14:30 Differential Fault Analysis of Streebog (page 35)
Riham AlTawy and Amr M. Youssef
14:30-15:00 Fault Attacks on Stream Cipher Scream Shaoyu Du, Bin Zhang, Zhenqi Li, and Dongdai Lin
15:00-15:30 New Related Key Attacks on the RAKAPOSHI Stream Cipher Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, and Wei Zhao
15:30-16:00: Coffee Break
Session 3: Security Analysis (Chair: Xinyi Huang)
16:00-16:30 Cramer-Shoup Like Chosen Ciphertext Security from LPN
Xiaochao Sun, Bao Li, and Xianhui Lu
16:30-17:00 Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant Liqiang Peng, Lei Hu, Zhangjie Huang, and Jun Xu
17:00-17:30 Analysis of Fractional ωmbNAF for Scalar Multiplication
Weixuan Li, Wei Yu, and Kunpeng Wang
17:30-18:00 On the Effectiveness of Different Botnet Detection Approaches Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood
18:00: Dinner (Canteen, Training Center of Beihang University) 北航培训中心餐厅晚餐
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
2015-05-06 (Day 2):Meeting Room 8 (第 8 报告厅)
Keynote 2: (Chair: Javier Lopez)
8:30-9:30 The NIST Randomness Beacon and Applications
Dr. Rene Peralta
Session 4: Key Exchange Protocol (Chair: Javier Lopez)
9:30-10:00 Strongly Secure Key Exchange Protocol with Minimal KEM
Baoping Tian, Fushan Wei, and Chuangui Ma
10:00-10:30 sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices
Shijun Zhao and Qianying Zhang
10:30-11:00: Coffee Break
Session 5: Elliptic Curve Cryptography (Chair: Feng Bao)
11:00-11:30 Models of Curves from GHS Attack in Odd Characteristic
Song Tian, Wei Yu, Bao Li, and Kunpeng Wang
11:30-12:00 Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves
Song Tian, Wei Yu, Bao Li, and Kunpeng Wang
12:00-12:30 Batch Blind Signatures on Elliptic Curves
Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, and Jianwei Liu
12:30-14:00: Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 6: Stream Cipher II (Chair: Rene Peralta)
14:00-14:30
Improved Differential Analysis of Block Cipher PRIDE
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, and
Xiaoshuang Ma
14:30-15:00 Estimating Differential-Linear Distinguishers and Applications to CTC2
Chun Guo, Hailong Zhang, and Dongdai Lin
15:00-15:30 Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI
Shaoyu Du, Zhenqi Li, Bin Zhang, and Dongdai Lin
15:30-16:00: Coffee Break
Session 7: Authentication (Chair: Guilin Wang)
16:00-16:30 Half a Century of Practice: Who Is Still Storing Plaintext Passwords?
Erick Bauman, Yafeng Lu, and Zhiqiang Lin
16:30-17:00 User Identity Verification Based on Touchscreen Interaction Analysis in Web
Contexts Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert
17:00-17:30
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset
Difference Method
Shantian Cheng and Juanyang Zhang
18:00-20:30 Banquet Beijing Vision Hotel (北京唯实国际文化交流中心)
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
2015-05-07 (Day 3):Meeting Room 8 (第 8 报告厅)
Keynote 3: (Chair: Yongdng Wu)
8:30-9:30 Breaking Mobile Social Networks for Automated User Location
Prof. Kui Ren
Session 8: System Security (Chair: Qinghua Cao)
9:30-10:00 Operating System Security Policy Hardening via Capability Dependency Graphs Zhihui Han, Liang Cheng, Yang Zhang, and Dengguo Feng (page 1)
10:00-10:30 Expanding an Operating System’s Working Space with a New Mode to Support Trust Measurement Chenglong Wei, Wenchang Shi, Bo Qin, and Bin Liang
10:30-11:00 Coffee Break
Session 9: Mobile Security (Chair: Tieyan Li)
11:00-11:30 A Rapid and Scalable Method for Android Application Repackaging Detection
Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng (page 349)
11:30-12:00 Comprehensive Analysis of the Android Google Play’s Auto-update Policy
Craig Sanders, Ayush Shah, and Shengzhi Zhang
12:00-12:30
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component
Communication
Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, and Zhiqiang Wang
12:30-14:00 Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 10: Theory (Chair: Cheng-Kang Chu)
14:00-14:30 New Constructions of T-function
Dibyendu Roy, Ankita Chaturvedi, and Sourav Mukhopadhyay
14:30-15:00 A New Lattice-Based Threshold Attribute-Based Signature Scheme
Qingbin Wang, Shaozhen Chen, and Aijun Ge
15:00-15:30 Hard Invalidation of Electronic Signatures
Lucjan Hanzlik, Miroslaw Kutylowski, and Moti Yung
15:30-16:00 Coffee Break
Session 11: Implementation I (Chair: Kui Ren)
16:00-16:30 Lightweight Function Pointer Analysis
Wei Zhang and Yu Zhang
16:30-17:00 Accelerating RSA with Fine-Grained Parallelism Using GPU
Yang Yang, Zhi Guan, Huiping Sun, and Zhong Chen
17:00-17:30
On the Impacts of Mathematical Realization over Practical Security of Leakage
Resilient Cryptographic Schemes
Guangjun Fan, Yongbin Zhou, Fran cois-Xavier Standaert, and Dengguo Feng
17:30-18:00
Non-interactive Revocable Identity-Based Access Control over e-Healthcare
Records
Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, and Lei Zhang
18:00 Dinner(Canteen, Training Center of Beihang University) 北航培训中心餐厅
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
2015-05-08 (Day 4):Meeting Room 8 (第 8 报告厅)
Industrial Talk: (Chair: Zhoujun Li)
8:30-9:30 Mobile Platform Security: Industrial Approaches on Building the Chain of Trust
Dr Tieyan Li
Session 12: Implementation II (Chair: Zhoujun Li)
9:30-10:00 Efficient File Sharing in Electronic Health Records
Clementine Gritti, Willy Susilo, and Thomas Plantard
10:00-10:30
A Framework for Analyzing Verifiability in Traditional and Electronic Exams
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade,
and Gabriele Lenzini
10:30-11:00 Coffee Break
Session 13: Privacy and Indistinguishability (Chair: Hua Guo)
11:00-11:30 ADKAM: A-Diversity K-Anonymity Model via Micro-aggregation
Liang Cheng, Shaoyin Cheng, and Fan Jiang
11:30-12:00 Visualizing Privacy Risks of Mobile Applications through a Privacy Meter
Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, and Jun Ho Huh
12:00-12:30 One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, and Fei Tang
12:30-14:00 Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Closing 会议结束
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)