meeting.xidian.edu.cn · web viewwilly susilo) 10:00-10:25 credential wrapping: from anonymous...

21
ASIACCS 2016 Conference Schedule Day 1 (May 30, 2016) Day 2 (May 31, 2016) Day 3 (June 1, 2016) Day 4 (June 2, 2016) Day 5 (June 3, 2016) 4 Rooms Main Conference Room (Level 2) Room 1 (Level 2) Room 2 (Level 3) Room 1 (Level 2) Room 2 (Level 3) Room 1 (Level 2) Room 2 (Level 3) 08:30 - 09:00 Registration (All Day) Opening Keynote 2 (08:30 - 09:30) Keynote 3 (08:30 - 09:30) 09:00 - 09:30 Workshops Keynote 1 (09:00 - 10:00) Session 16 Privacy (09:00 - 11:05) Session 17 Short Papers (09:00 - 11:05) 09:30 - 10:00 Coffee Break Coffee Break 10:00 - 10:30 Coffee Break Coffee Break Session 4 Password Authenticati on and Security (10:00 - 12:05) Session 7 System Security (10:00 - 12:05) Session 10 Authenticati on (10:00 - 12:05) Session 13 Web and Network Security (10:00 - 12:05) 10:30 - 11:00 Workshops Session 1 Software Security (10:30 - 12:10) 11:00 - 11:30 Closing 11:30 - 12:00 12:00 - 12:30 Lunch Buffet (12:00 - 14:00) (Level 1, 雨雨雨雨雨) Lunch Buffet (12:10 - 14:00) (Level 1, 雨雨雨雨雨) Lunch Buffet (12:05 - 13:30) (Level 1, 雨雨雨雨雨) Lunch Buffet (12:05 - 13:30) (Level 1, 雨雨雨雨雨) Lunch Buffet (12:00 - 13:30) (Level 1, 雨雨雨雨雨) 12:30 - 13:00 13:00 - 13:30 13:30 - 14:00 Workshops Invited Talk (Huawei) (14:00 - 14:45) Session 5 Identity- Based Encryption (13:30 - 15:35) Session 8 Mobile Security I (13:30 - 15:35) Session 11 Security Protocols I (13:30 - 15:35) Session 14 Mobile Security II (13:30 - 15:35) 14:00 - 14:30 14:30 - 15:00 Session 2 Cloud Security I (14:45 - 16:00) 15:00 - 15:30 15:30 - 16:00 Coffee Break Coffee Break Coffee Break Coffee Break 16:00 - 16:30 Workshops Invited Talk (CloverSec) (16:20 - 17:05) Session 6 Outsourcing (16:00 - 17:40) Session 9 IoT and CPS (16:00 - 17:40) Session 12 Security Protocols II (16:00 - 18:05) Session 15 Malware and Attacks (16:00 - 18:05) 16:30 - 17:00 17:00 - 17:30 Session 3 Cloud Security II (17:05 - 18:20) 17:03 - 18:00 18:00 Dinner Buffet (Level 1, 雨雨雨雨雨) Dinner Buffet (Level 1, 雨雨雨雨雨) Conference Banquet (Level 2, Dragon Palace, 雨雨 雨) Dinner Buffet (Level 1, 雨雨雨雨雨)

Upload: duongnhi

Post on 04-May-2019

220 views

Category:

Documents


0 download

TRANSCRIPT

ASIACCS 2016 Conference Schedule

Day 1(May 30, 2016)

Day 2(May 31, 2016)

Day 3(June 1, 2016)

Day 4(June 2, 2016)

Day 5(June 3, 2016)

4 Rooms Main Conference Room(Level 2)

Room 1(Level 2)

Room 2(Level 3)

Room 1(Level 2)

Room 2(Level 3)

Room 1(Level 2)

Room 2(Level 3)

08:30 - 09:00 Registration (All Day) Opening Keynote 2(08:30 - 09:30)

Keynote 3(08:30 - 09:30)09:00 - 09:30

Workshops Keynote 1(09:00 - 10:00) Session 16

Privacy(09:00 - 11:05)

Session 17Short Papers(09:00 - 11:05)

09:30 - 10:00 Coffee Break Coffee Break

10:00 - 10:30 Coffee Break Coffee BreakSession 4Password

Authentication and Security

(10:00 - 12:05)

Session 7System Security

(10:00 - 12:05)

Session 10Authentication(10:00 - 12:05)

Session 13Web and Network Security

(10:00 - 12:05)

10:30 - 11:00

WorkshopsSession 1

Software Security(10:30 - 12:10)

11:00 - 11:30Closing

11:30 - 12:00

12:00 - 12:30Lunch Buffet(12:00 - 14:00)

(Level 1, 雨林咖啡厅)

Lunch Buffet(12:10 - 14:00)

(Level 1, 雨林咖啡厅)

Lunch Buffet(12:05 - 13:30)

(Level 1, 雨林咖啡厅)

Lunch Buffet(12:05 - 13:30)

(Level 1, 雨林咖啡厅)

Lunch Buffet(12:00 - 13:30)

(Level 1, 雨林咖啡厅)12:30 - 13:00

13:00 - 13:30

13:30 - 14:00

Workshops

Invited Talk (Huawei)(14:00 - 14:45) Session 5

Identity-Based Encryption

(13:30 - 15:35)

Session 8Mobile Security

I(13:30 - 15:35)

Session 11Security

Protocols I(13:30 - 15:35)

Session 14Mobile Security

II(13:30 - 15:35)

14:00 - 14:30

14:30 - 15:00 Session 2Cloud Security I(14:45 - 16:00)15:00 - 15:30

15:30 - 16:00 Coffee Break Coffee Break Coffee Break Coffee Break

16:00 - 16:30

Workshops

Invited Talk (CloverSec)(16:20 - 17:05) Session 6

Outsourcing(16:00 - 17:40)

Session 9IoT and CPS

(16:00 - 17:40)

Session 12Security

Protocols II(16:00 - 18:05)

Session 15Malware and

Attacks(16:00 - 18:05)

16:30 - 17:00

17:00 - 17:30 Session 3Cloud Security II

(17:05 - 18:20)17:03 - 18:00

18:00Dinner Buffet

(Level 1, 雨林咖啡厅)Dinner Buffet

(Level 1, 雨林咖啡厅)Conference Banquet

(Level 2, Dragon Palace, 腾龙阁)Dinner Buffet

(Level 1, 雨林咖啡厅)

ASIACCS 2016 Workshops Schedule

Day 1(May 30, 2016)

Level 2 Room 1 (行政会议室) Lever 2 Room 2 (多二 1厅) Lever 2 Room 3 (多二 3厅) Lever 2 Room 4 (多二 5厅)

08:30 - 09:00 Registration Opens All Day

09:00 - 09:30 CPSS 2016 Opening & Keynote 1(09:00 - 10:10)

SCC 2016 Opening & Keynote(09:00 - 10:30)

AsiaPKC 2016 Opening &Session 1 MPC and PIR

(08:55 - 10:15)09:30 - 10:00

10:00 - 10:30 Coffee Break

10:30 - 11:00 CPSS 2016 Session 1Threat Modelling and Vulnerability

Analysis for CPS(10:30 - 12:00)

SCC 2016 Session 1Infrastructure Support

(10:45 - 12:05)

AsiaPKC 2016 Session 2Authentication and ECC &

Closing(10:45 - 12:30)

11:00 - 11:30

11:30 - 12:00

12:00 - 12:30Lunch Buffet

(Level 1, 雨林咖啡厅)(12:00 - 13:30)

12:30 - 13:00

13:00 - 13:30

13:30 - 14:00 CPSS 2016 Keynote 2(13:30 - 14:30) SCC 2016 Session 2

Data Processing(13:30 - 14:50)

WTMC 2016 Opening & Keynote(14:00 - 15:00)

IoTPTS 2016 Opening & Keynote(13:30 - 14:30)14:00 - 14:30

14:30 - 15:00 CPSS 2016 Session 2Intrusion Detection for CPS

(14:30 - 15:30)

IoTPTS 2016 Session 1Primitives

(14:30 - 15:35)15:00 - 15:30

15:30 - 16:00 Coffee Break

16:00 - 16:30 CPSS 2016 Session 3Availability and Privacy for CPS

(15:50 - 16:50) SCC 2016 Session 3Applications

(15:05 - 16:25)

WTMC 2016 Session 1 Measurements of Security, Attacks, and Fraud

(15:15 - 16:30)

IoTPTS 2016 Session 2Attacks & Applications

(16:15 - 17:30)16:30 - 17:00

17:00 - 17:30 CPSS 2016 Session 4 Embedded Systems Security & Closing

(16:50 - 18:00)

WTMC 2016 Session 2 Algorithms & Closing

(16:45 - 18:10)

IoTPTS 2016 Closing(17:30 - 17:45)17:03 - 18:00

18:00Dinner Buffet

(Level 1, 雨林咖啡厅)

Conference Program

2016-05-30 (Day 1): Registration Desk

09:00-22:00 Registration

12:00 Lunch (Buffet @ 雨林咖啡厅, Level 1)

18:00 Dinner (Buffet @ 雨林咖啡厅, Level 1)

2016-05-30 (Day 1): CPSS 2016 Workshop (Level 2 Room 1:行政会议室)

09:00-09:10 Opening

Keynote 1 (Chair: Jianying Zhou)

09:10-10:10Risk Assessment of Cyber Access to Physical Infrastructure in Cyber-Physical SystemsProf. David M. Nicol, University of Illinois at Urbana-Champaign, USA

10:10-10:30: Coffee Break

Session 1: Threat Modelling and Vulnerability Analysis for CPS (Chair: David M. Nicol)

10:30-11:00 A Risk Assessment Framework for Automotive Embedded SystemsMafijul Islam, Aljoscha Lautenbach, Christian Sandberg and Tomas Olovsson

11:00-11:30Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical SystemWei He, Jakub Breier, Shivam Bhasin and Anupam Chattopadhyay

12:00-13:30: Lunch (Buffet@雨林咖啡厅, Level 1)

Keynote 2 (Chair: Jianying Zhou)

13:30-14:30 N-Version ObfuscationProf. Michael R. Lyu (Chinese University of Hong Kong, China)

Session 2: Intrusion Detection for CPS (Chair: Miroslaw Kutylowski)

14:30-15:00Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine LearningKhurum Nazir Junejo and Jonathan Goh

15:00-15:30Exploiting Bro for Intrusion Detection in a SCADA systemRobert Udd, Mikael Asplund, Simin Nadjm-Tehrani, Mehrdad Kazemtabrizi and Mathias Ekstedt

15:30-15:50: Coffee Break

Session 3: Availability and Privacy for CPS (Chair: Michael R. Lyu)

15:50-16:20

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller FailuresUttam Gosh, Xinshu Dong, Rui Tan, Zbigniew Kalbarczyk, David K. Y. Yau and Ravishankar K. Iyer

16:20-16:50BES - Differentially Private and Distributed Event Aggregation in Advanced Metering InfrastructuresVincenzo Gulisano, Valentin Tudor, Magnus Almgren and Marina Papatriantafilou

Session 4: Embedded Systems Security (Chair: Jinguang Han)

16:50-16:20Binding Hardware and Software to Prevent Firmware Modification and Device CounterfeitingRobert Lee, Konstantinos Markantonakis and Raja Naeem Akram

16:20-17:50 Enhancing TPM Security by Integrating SRAM PUFs TechnologyDong Li, Huaqun Guo and Jia Xu

17:50-18:00 Closing and Best Paper Award

18:00 Dinner (Buffet@雨林咖啡厅, Level 1)

--------------------------------------------------End of CPSS 2016-----------------------------------------------------------

2016-05-30 (Day 1): SCC 2016 Workshop (Lever 2 Room 2: 多二 1厅)

09:00-09:10 Opening

Keynote

09:10-10:30 Giano – toward Large Scale Access Security Management in Private CloudDr. Ye Wu, Baidu Inc, China

10:30-10:45: Coffee Break

Session 1: Infrastructure Support (Chair: Cong Wang)

10:45-11:05 SPLM: Security Protection of Live Virtual Machine Migration in Cloud ComputingDegang Sun, Jie Zhang, Wei Fan, Tingting Wang, Chao Liu and Weiqing Huang

11:05-11:25 Lightweight Examination of DLL Environments in Virtual Machines to Detect MalwareXiongwei Xie and Weichao Wang

11:25-11:45 Enabling Assured Deletion in the Cloud Storage by OverwritingYuchuan Luo, Ming Xu, Shaojing Fu and Dongsheng Wang

11:45-12:05 Cloud Storage Integrity Checking: Going From Theory To PracticeFei Chen, Taoyi Zhang, Jianyong Chen and Tao Xiang

12:05-13:30: Lunch (Buffet @雨林咖啡厅, Level 1)

Session 2: Data Processing (Chair: Sheng Zhong)

13:30-13:50

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang

13:50-14:10A new secure index supporting efficient index updating and similarity search on clouds Baojia Zhang, Yuan Zhang and He Zhang

14:10-14:30 Another compression method for homomorphic ciphertexts Sergiu Carpov and Renaud Sirdey

14:30-14:50 Dynamic execution of secure queries over homomorphic encrypted databases Oana Stan, Sergiu Carpov and Renaud Sirdey

14:50-15:05: Coffee Break

Session 3: Applications (Chair: Yuan Zhang)

15:05-15:25 Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds Seungmin Kang, Khin Mi Mi Aung and Bharadwaj Veeravalli

15:25-15:45 Privacy Preserving Distributed Permutation Test Yunlong Mao and Yuan Zhang

15:45-16:05Decentralized Secure Data Sharing with Attribute-Based Encryption: A Resource Consumption Analysis Holger Kuehner and Hannes Hartenstein

16:05-16:25 Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS Yun Zhang, Farhan Patwa and Ravi Sandhu

18:00 Dinner (Buffet @雨林咖啡厅, Level 1)

----------------------------------------------------End of SCC 2016------------------------------------------------------------

2016-05-30 (Day 1) Morning: AsiaPKC 2016 Workshop (Lever 2 Room 3: 多二 3厅)

08:55-09:00 Opening

Session 1: MPC and PIR (Chair: Keita Emura)

09:00-09:25

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE ChallengeJohannes Buchmann, Niklas Büscher, Florian Goepfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, and Michael Walter

09:25-09:50 An Implementation of Non-Uniform Shuffle for Secure Multi-Party ComputationAkihiro Nishimura, Yu-Ichi Hayashi, Takaaki Mizuki, and Hideaki Sone

09:50-10:15 Cryptanalysis of a Fast Private Information Retrieval ProtocolJiayang Liu and Jingguo Bi

10:15-10:45: Coffee Break

Session 2: Authentication and ECC (Chair: Rui Zhang)

10:45-11:10 Blind Password Registration for Verifier-based PAKEFranziskus Kiefer and Mark Manulis

11:10-11:35Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical AnalysisBagus Santoso

11:35-12:00Key compression for isogeny-based cryptosystemsReza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, and Christopher Leonardi

12:00-12:25 Improved Atomicity to prevent HCCA on NIST curvesPoulami Das, Debapriya Basu Roy, and Debdeep Mukhopadhyay

12:25--12:30 Closing

12:30-13:30: Lunch (Buffet @雨林咖啡厅, Level 1)

-------------------------------------------------End of AsiaPKC 2016 ----------------------------------------------------

2016-05-30 (Day 1) Afternoon: WTMC 2016 Workshop (Lever 2 Room 3: 多二 3厅)

14:00-14:10 Opening

Keynote

14:10-15:00It's Time for An Internet-wide Recommitment to Measurement. And Here's How We Should Do It.Paul Vixie, Farsight Security

15:00-15:15: Coffee Break

Session 1: Measurements of Security, Attacks, and Fraud (Chair: Michel van Eeten)

15:15-15:40An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern AnalysisJiawei Su, Katsunari Yoshioka, Junji Shikata, and Tsutomu Matsumoto

15:40-16:05Characterizing Roles and Spatio-Temporal Relations of C&C Servers in Large-Scale NetworksRomain Fontugne, Johan Mazel, and Kensuke Fukuda

16:05-16:30 FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart GridWenlin Han and Yang Xiao

16:30-16:45: Coffee Break

Session 2: Algorithms (Chair: Maciej Korczyński)

16:45-17:10 A High Performance IPv6 Flow Table Lookup Algorithm Based on HashHuan Guo, Zhengmin Li, Qingyun Liu, Jia Li, and Li Guo

17:10-17:35Fast and Accurate Identification of Active Recursive Domain Name Servers in high-speed NetworkXiaomei Liu, Yong Sun, Caiyun Huang, Xueqiang Zou, and Zhi-Guang Qin

17:35-18:00Image Processing Pipeline Model Integrating Steganographic Algorithms for Mobile CamerasPrabhat Dahal, Dongming Peng, and Hamid Sharif

18:00-18:10 Closing

18:00 Dinner (Buffet @雨林咖啡厅, Level 1)

--------------------------------------------------End of WTMC 2016 -------------------------------------------------

2016-05-30 (Day 1) Afternoon: IoTPTS 2016 Workshop (Lever 2 Room 4 : 多二 5厅)

13:30-13:40 Opening

Keynote

13:40-14:30 Functional Credentials for Internet of ThingsSherman S.M. Chow, Chinese University of Hong Kong, Hong Kong

Session 1: Primitives (Chair: Ned Smith)

14:30-14:55High-Performance and Lightweight Lattice-Based Public-Key EncryptionJohannes Buchmann, Florian Goepfert, Tim Güneysu, Tobias Oder, and Thomas Pöppelmann

14:55-15:20 Physical Unclonable Functions for IoT SecurityMuhammad N. Aman, Kee Chaing Chua, and Biplab Sikdar

15:20-15:45Trusted Sensors for Participatory Sensing and IoT Applications based on Physically Unclonable FunctionsIhtesham Haider, Michael Höberl, and Bernhard Rinner

15:45-16:15: Coffee Break

Session 2: Attacks & Applications (Chair: Gokay Saldamli)

16:15-16:40 Analyzing the Security and Privacy of Cloud-based Video Surveillance SystemsJohannes Obermaier and Martin Hutle

16:40-17:05 Cloud-Based Commissioning of Constrained Devices using Permissioned BlockchainsThomas Hardjono and Ned Smith

17:05-17:30 Mind The Plug! Laptop-User Recognition Through Power ConsumptionMauro Conti, Michele Nati, Enrico Rotundo, and Riccardo Spolaor

17:30-17:45 Closing

18:00 Dinner (Buffet @雨林咖啡厅, Level 1)

----------------------------------------------------End of IoTPTS 2016 -----------------------------------------------

2016-05-31(Day 2): Main Conference Room (Level 2)

08:30-09:00 Opening

Keynote 1 (Chair: Robert H. Deng)

09:00-10:00 Security and Privacy in Social Networks: Challenges and OpportunitiesProfessor Yang Xiang, Deakin University, Australia

10:00-10:30: Coffee Break

Session 1: Software Security (Chair: Guofei Gu)

10:30-10:55ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory AnalysisQian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, and Heng Yin

10:55-11:20Juggling the Gadgets: Binary-level Code Randomization using Instruction DisplacementHyungjoon Koo and Michalis Polychronakis

11:20-11:45No-Execute-After-Read: Preventing Code Disclosure in Commodity SoftwareJan Werner, George Baltas, Rob Dallara, Nathan Otternes, Kevin Snow, Fabian Monrose, and Michalis Polychronakis

11:45-12:10 ROPMEMU: A Framework for the Analysis of Complex Code-Reuse AttacksMariano Graziano, Davide Balzarotti, and Alain Zidouemba

12:10-14:00: Lunch (Buffet @ 雨林咖啡厅, Level 1)

Invited Talk (Huawei) (Chair: Xinyi Huang)

14:00-14:45 IoT Security: Challenges and OpportunitiesDr Feng Bao, Shield Lab, Huawei

Session 2: Cloud Security I (Chair: Sherman S.M. Chow)

14:45-15:10 Enabling Ciphertext Deduplication for Secure Cloud Storage and Access ControlHeyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, and Kui Ren

15:10-15:35 Privacy-Preserving Spectral Analysis of Large Graphs in Public CloudsSagar Sharma, James Powers, and Keke Chen

15:35-16:00Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted DataKaitai Liang, Chunhua Su, Jiageng Chen, and Joseph K Liu

16:00-16:20: Coffee Break

Invited Talk (CloverSec) (Chair: Xiaofeng Chen)

16:20-17:05 Research and Applications of Distributed Risk-Award Model Based on CommunityMr Peiyuan Zhao, CloverSec

Session 3: Cloud Security II (Chair: Joseph Liu)

17:05-17:30FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare SystemCheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, and Xiaodong Lin

17:30-17:55Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network CodingBinanda Sengupta and Sushmita Ruj

17:55-18:20 Efficient Techniques for Publicly Verifiable Delegation of ComputationKaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, and Refik Molva

18:20: Dinner (Buffet @雨林咖啡厅, Level 1)----------------------------------------------------------End of Day 2----------------------------------------------------------

2016-06-01 (Day 3): Room 1, Level 2, Main Conference Room

Keynote 2 (Chair: XiaoFeng Wang )

08:30-09:30 Towards Assessing and Controlling Privacy in Large-Scale, Open NetworksProfessor Michael Backes, CISPA, Saarland University & MPI-SWS

09:30-10:00: Coffee Break

Session 4: Password Authentication and Security (Chair: Willy Susilo)

10:00-10:25

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric AuthenticationYanjiang Yang, Haibing Lu, Joseph Liu, Jian Weng, Youcheng Zhang, and Jianying Zhou

10:25-10:50 UC-secure Two-Server Password-Based Authentication Protocol and Its ApplicationsLin Zhang, Zhenfeng Zhang, and Xuexian Hu

10:50-11:15 Client-CASH: Protecting Master Passwords against Offline AttacksJeremiah Blocki and Anirudh Sridhar

11:15-11:40 Device-Enhanced Password Protocols with Optimal Online-Offline ProtectionStanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, and Nitesh Saxena

11:40-12:05 Friend or Foe? Your Wearable Devices Reveal Your Personal PINChen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, and Bo Liu

12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

Session 5: Identity-Based Encryption (Chair: Dawu Gu)

13:30-13:55Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the PlaintextWilly Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, and Yang-Wai Chow

13:55-14:20 Dealerless Corporate Key Generation for Identity-Based Encryption SchemesZhen Liu, Duncan Wong, and Jack Poon

14:20-14:45Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong SecurityPeng Xu, Jingnan Li, Wei Wang, and Hai Jin

14:45-15:10 Password-Controlled Encryption with Accountable Break-Glass AccessTao Zhang, Sherman S. M. Chow, and Jinyuan Sun

15:10-15:35 Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityKai He, Jian Weng, Jia-Nan Liu, Joseph Liu, Wei Liu, and Robert H. Deng

15:35-16:00: Coffee Break

Session 6: Outsourcing (Chair: Cong Wang)

16:00-16:25SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the CloudQian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, and Kui Ren

16:25-16:50

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable ComputationKai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, and Zhenfu Cao

16:50-17:15 Efficient Secure Outsourcing of Quadratic ProgramsSergio Salinas, Changqing Luo, Weixian Liao, and Pan Li

17:15-17:40Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved CheckabilityYanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, and Dawu Gu

18:00 Banquet (Level 2, Dragon Palace, 腾龙阁)

2016-06-01 (Day 3): Room 2, Level 3, 多三厅Keynote 2 (Chair: XiaoFeng Wang) @ Room 1

08:30-09:30 Towards Assessing and Controlling Privacy in Large-Scale, Open NetworksProfessor Michael Backes, CISPA, Saarland University & MPI-SWS

09:30-10:00: Coffee Break

Session 7: System Security (Chair: Kehuan Zhang)

10:00-10:25 NFPS: Adding Undetectable Secure Deletion to Flash Translation LayerShijie Jia, Luning Xia, Bo Chen, and Peng Liu

10:25-10:50 Preventing Page Faults from Telling your SecretsShweta Shinde, Zheng Leong Chua, Viswesh Narayanan, and Prateek Saxena

10:50-11:15 Identifying and Utilizing Dependencies Across Cloud Security ServicesAhmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, and Neeraj Suri

11:15-11:40 Hardening OpenStack Cloud Platforms against Compute Node CompromisesWai Kit Sze, Abhinav Srivastava, and R. Sekar

11:40-12:05 Cross Processor Cache AttacksGorka Irazoqui, Thomas Eisenbarth, and Berk Sunar

12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

Session 8: Mobile Security I (Chair: Kai Chen)

13:30-13:55Mystique: Evolving Android Malware for Auditing Anti-Malware ToolsGuozhu Meng, Yinxing Xue, Chandramohan Mahinthan, Annamalai Narayanan, Yang Liu, Jie Zhang, and Tieming Chen

13:55-14:20StormDroid: A Streaminglized Machine Learning-based System for Detecting Android MalwareSen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, and Haojin Zhu

14:20-14:45FLEX: A Flexible Code Authentication Framework for Delegating Mobile App CustomizationGabriele Costa, Paolo Gasti, Alessio Merlo, and Shung-Hsi Yu

14:45-15:10 DroidDisintegrator: Intra-Application Information Flow Control in Android AppsRoei Schuster and Eran Tromer

15:10-15:35

Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery MechanismsMathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo Cardoso, and Frank Piessens

15:35-16:00: Coffee Break

Session 9: IoT and CPS (Chair: Tieyan Li)

16:00-16:25 Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver RecognitionIan Markwood and Yao Liu

16:25-16:50Automatic Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web InterfacesAndrei Costin, Apostolis Zarras, and Aurélien Francillon

16:50-17:15Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment PlantAditya Mathur and Sridhar Adepu

17:15-17:40Smart Locks: Lessons for Securing Commodity Internet of Things DevicesGrant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner

18:00 Banquet (Level 2, Dragon Palace, 腾龙阁)---------------------------------------------------End of Day 3---------------------------------------------------------------

2016-06-02 (Day 4): Room 1, Level 2, Main Conference Room

Keynote 3 (Chair: XiaoFeng Wang)

08:30-09:30 Binary Analysis for Autonomous HackingProfessor Giovanni Vigna, University of California in Santa Barbara, United States

09:30-10:00: Coffee Break

Session 10: Authentication (Chair: Qianhong Wu)

10:00-10:25The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication SchemesDing Wang, Qianchen Gu, Haibo Cheng, and Ping Wang

10:25-10:50A General Construction of Homomorphic Linear Authentication Schemes from \epsilon-Authentication CodesShuai Han, Shengli Liu, Fangguo Zhang, and Kefei Chen

10:50-11:15 Forgery-Resistant Touch-based Authentication on Mobile DevicesNeil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, and Mario Frank

11:15-11:40 Practical "Signatures with Efficient Protocols" from Simple AssumptionsBenoît Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung

11:40-12:05 Bilateral-secure Signature by Key EvolvingTao Xiang, Xiaoguo Li, Fei Chen, and Yi Mu

12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

Session 11: Security Protocols I (Chair: Wen Tao Zhu )

13:30-13:55 Secure Dynamic SSE via Access Indistinguishable StorageTianhao Wang and Yunlei Zhao

13:55-14:20 Building an Encrypted, Distributed, and Searchable Key-value StoreXingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, and Jianxiong Lin

14:20-14:45 Anonymous Role-Based Access Control on E-Health RecordsXingguang Zhou, Jianwei Liu, Weiran Liu, and Qianhong Wu

14:45-15:10 Gait-Based Wi-Fi Signatures for Privacy-PreservingYan Li and Ting Zhu

15:10-15:35 Anonymous Identification for Ad Hoc GroupXingye Lu and Man Ho Au

15:35-16:00: Coffee Break

Session 12: Security Protocols II (Chair: Man Ho Au )

16:00-16:25 Efficient Authenticated Multi-Pattern MatchingZhe Zhou, Tao Zhang, Sherman S.M. Chow, Yupeng Zhang, and Kehuan Zhang

16:25-16:50Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted DataNgoc Hieu Tran, Hwee Hwa Pang, and Robert H. Deng

16:50-17:15Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic EncryptionSungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, and Junbum Shin

17:15-17:40 Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and

CountermeasureChong Guan, Kun Sun, Zhan Wang, and Wen Tao Zhu

17:40-18:05 Fault Attacks on Efficient Pairing ImplementationChen Qian and Pierre-Alain Fouque

18:05 Dinner (Buffet @ 雨林咖啡厅, Level 1)

2016-06-02 (Day 4): Room 2, Level 3, 多三厅Keynote 3 (Chair: XiaoFeng Wang ) @ Room 1, Level 2

08:30-09:30 Binary Analysis for Autonomous HackingProfessor Giovanni Vigna, University of California in Santa Barbara, United States

09:30-10:00: Coffee Break

Session 13: Web and Network Security (Chair: Zonghua Zhang)

10:00-10:25 Model-based Security Testing: an Empirical Study on OAuth 2.0 ImplementationsRonghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, and Pili Hu

10:25-10:50 Discovering Malicious Domains through Passive DNS Data Graph AnalysisIssa M. Khalil, Ting Yu, and Bei Guan

10:50-11:15 Half-Baked Cookies Hardening Cookie-Based Authentication for the Modern WebYogesh Mundada, Nick Feamster, and Balachander Krishnamurthy

11:15-11:40 Attestation Transparency: Building secure Internet services for legacy clientsJethro Beekman, John Manferdelli, and David Wagner

11:40-12:05 Congesting the Internet with Coordinated And Decentralized Pulsating AttacksYu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, and Vyas Sekar

12:05-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

Session 14: Mobile Security II (Chair: Wei Wang)

13:30-13:55 CDRep: Automatic Repair of Cryptographic-Misuses in Android ApplicationsSiqi Ma, David Lo, Teng Li, and Robert H. Deng

13:55-14:20 MobiPot: Understanding Mobile Telephony Threats with HoneycardsMarco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, and Mustaque Ahamad

14:20-14:45 Checking Intent-based Communication in Android with Intent Space AnalysisYiming Jing, Gail-Joon Ahn, Adam Doupé, and Jeong Hyun Yi

14:45-15:10

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android AppsZheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, and Hao Chen

15:10-15:35 Attacks and Defence on Android Free Floating WindowsLingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, and Dengguo Feng

15:35-16:00: Coffee Break

Session 15: Malware and Attacks (Chair: Yu Wang)

16:00-16:25 MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis TestingPhani Vadrevu and Roberto Perdisci

16:25-16:50Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph MiningBabak Rahbarinia, Marco Balduzzi, and Roberto Perdisci

16:50-17:15Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection MechanismsAnindya Maiti, Oscar Armbruster, Murtuza Jadliwala, and Jibo He

17:15-17:40 Leakage Fingerprints — A Non-negligible Vulnerability in Side-Channel AnalysisZeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, and Yuan Zhao

17:40-18:05 Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher

Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, and Victor Debrunner18:05 Dinner (Buffet @ 雨林咖啡厅, Level 1)

------------------------------------------------------End of Day 4------------------------------------------------------------

2016-06-03 (Day 5): Room 1, Level 2, Main Conference Room

Session 16: Privacy (Chair: Haojin Zhu)

09:00-09:25 Privacy and Utility of Inference Control Mechanisms for Social Computing ApplicationsSeyed Hossein Ahmadinejad, Philip W. L. Fong, and Rei Safavi-Naini

09:25-09:50 Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)Qinghan Xue, Mooi Choo Chuah, and Yingying Chen

09:50-10:15 Data Exfiltration in the Face of CSPSteven Van Acker, Daniel Hausknecht, and Andrei Sabelfeld

10:15-10:40 StemJail: Dynamic Role CompartmentalizationMickaël Salaün, Marion Daubignard, and Hervé Debar

10:40-11:05 SkypeLine Robust Hidden Data Transmission for VoIPKatharina Kohls, Thorsten Holz, Dorothea Kolossa, and Christina Pöpper

11:10 Closing @ Level 2, Main Conference Room

12:00-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

2016-06-03 (Day 5): Room 2, Level 3, 多三厅 (8 short papers)

Session 17: 8 short papers (Chair: Kaitai Liang)

09:00-09:15Generic Construction of Publicly Veriable Predicate EncryptionChuting Tan, Zoe L Jiang, S.M Yiu, Junbin Fang, Xuan Wang, Ye Li, Zechao Liu, Xiaoyan Liu, Lei Cui, Yabin Jin, and Jin Li

09:15-09:30Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyJing Li, Licheng Wang, Zonghua Zhang, and Xinxin Niu

09:30-09:45 Efficient Construction of Completely Non-Malleable CCA Secure Public Key EncryptionShi-Feng Sun, Dawu Gu, Joseph Liu, Udaya Parampalli, and Tsz Hon Yuen

09:45-10:00(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small ModulusFuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, and Haiyang Xue

10:00-10:15Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic CloudsPeng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, and Deqing Zou

10:15-10:30RamCrypt: Kernel-based Address Space Encryption for User-mode ProcessesJohannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, and Michael Backes

10:30-10:45 Your Credentials Are Compromised, Do Not Panic: You Can Be Well ProtectedIssa Khalil, Zuochao Dou, and Abdallah Khreishah

10:45-11:00 Inside Attack Filtering for Robust Sensor LocalizationJongho Won and Elisa Bertino

11:10 Closing @ Level 2, Main Conference Room

12:00-13:30: Lunch (Buffet @ 雨林咖啡厅, Level 1)

百度安全公司介绍百度昊天镜威胁情报平台简介: 百度昊天镜威胁情报平台(Baidu CyMIRR)是支撑百度安全业务的下一代大数据智能情报分析平台。昊天镜威胁情报平台打通了移动、云、PC的完整生态安全数据,构建了全面的互联网安全事件地貌及知识图谱;同时充分发挥百度在大数据和人工智能领域多年积累的优势,构建了面向安全决策的复合机器学习引擎,支持高性能分布式图计算、超高维安全事件深度学习以及辅助安全专家人工决策的复合智能学习。从海量的安全事件中进行深度关联学习,识别出潜在的互联网威胁,告别被动防御局面,有效提升互联网业务应对黑产困扰和入侵攻击的对抗能力,并为用户提供更加安全的互联网体验。

华为公司介绍

强大漏洞库

全面:漏洞插件覆盖移动应用、物联网、web及应用、云服务、工控领域等。精准:每个上线漏洞插件都是经过严格测试和专业审计,漏洞精确扫描 100%准确率。高效:社区推动漏洞库快速更新。

分布式架构

快速:所有任务服务器端完成,不受本地资源影响,可达到单节点上千扫描任务几分钟内完成。负载均衡:增加系统的可用性,稳定性和灵活性,负载平均地均摊处理,每个节点都可以处理一部分负载,并且可以在节点之间动态分配负载,以实现平衡。分布式架构:不同业务部署在独立的服务器上提供服务,根据具体情况为高负载的服务实现负载均衡和集群,以更好地对外提供服务。报表系统

数据动态化:根据扫描状态数据实时更新到前端。格式多样化:不同的数据使用不同的图表达到最佳的呈现效果。

专业修复建议

完整方案:发现漏洞,只是其中一步,针对漏洞给出采取哪些措施,才是一个完整的方案。专业修复:系统会对扫描结果进行分析,并提供修复建议。分析准确:提供有效的修复建议,包含详细漏洞修复报告。

四叶草公司介绍西安四叶草信息技术有限公司,简称四叶草安全,成立于 2012年,由国内早期从事信息安全研

究的 cnfjhh创办,是一家专业安全服务提供商。旗下有安全服务、安全产品研发、CloverSec实验室等三个业务模块。公司依托西安丰富的人才资源,立足本土,服务全国。目前,公司在职人员 50+人,高校研究生常年实习人员 20+人/年。其中,核心技术人员均具备 10年以上的安全经验,大部门来自国内知名信息安全公司。产品优势: