ProvSec

 

 

PROGRAM CISC, HKU IE, CUHK

Registration desk will be available from 08:30 on the first day.
Time for Full Paper presentation: 30min.
Time for Short Paper presentation: 20min.

Click here for the program with authors and session chair information in PDF format.

TimeSunMonTue
09:00 - 09:10Opening Remark
Session 12: Intrusion and Malware Detection
(Chair: Michele Boreale)

An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments
09:10 - 09:20 Session 1: Web Security
(Chair: Jakub Szefer)

Soundsquatting: Uncovering the use of homophones in domain squatting
Session 7: Firewall and Forensics
(Chair: Lucas C.K. Hui)

Investigating the Hooking Behavior: A page-level memory monitoring method for Live Forensics
09:20 - 09:30 transAD: An Anomaly Detection Network Intrusion Sensor for the Web
09:30 - 09:40
09:40 - 09:50 Reducing User Tracking through Automatic Web Site State Isolations SystemWall:
An Isolated Firewall using Hardware-based Memory Introspection
Using Machine Language Model for Mimimorphic Malware Detection
09:50 - 10:00
10:00 - 10:10 CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump
10:10 - 10:20 SIACHEN: A Fine-grained Policy Language for the Mitigation of Cross-Site Scripting Attacks Winnowing Double Structure for Wildcard Query in Payload Attribution
10:20 - 10:30 Session 13: Public-Key Encryption (II)
(Chair: Siu Ming Yiu)

Expressive and Secure Searchable Encryption in the Public Key Setting
10:30 - 10:40 Security issues in OAuth 2.0 SSO implementations 30 mins tea-break
10:40 - 10:50 Graded Encryption, or how to play "Who wants to be a millionaire?" distributively
10:50 - 11:00 20 mins tea-break
11:00 - 11:10 Session 8: Mobile Security
(Chair: Xiapu Luo)

Comprehensive Behavior Profiling for Proactive Android Malware Detection
20 mins tea-break
11:10 - 11:20 Session 2: Implementation
(Chair: Lucas C.K. Hui)

Exploiting the Floating-Point Computing Power of GPUs for RSA
11:20 - 11:30 Session 14: Authentication
(Chair: Masahiro Mambo)

ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
11:30 - 11:40 Analyzing Android Browser Apps for file:// Vulnerabilities
11:40 - 11:50 Session 3
(Chair: Sherman S.M. Chow)

Invited Talk (I)

Gone with the Gadgets:
The Continuing Arms Race of Return-oriented Programming Attacks and Defenses

Ahmad-Reza Sadeghi
Technische Universität Darmstadt
11:50 - 12:00 Attribute-Based Signatures for Circuits from Multilinear Maps
12:00 - 12:10 A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
12:10 - 12:20
12:20 - 12:30 MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices Adding Controllable Linkability to Pairing-Based Group Signatures For Free
12:30 - 12:40
12:40 - 14:00Lunch
14:00 - 14:10 Session 4: Public-Key Encryption (I)
(Chair: Shoichi Hirose)

Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
Session 9
(Chair: Sherman S.M. Chow)

Invited Talk (II)

Public-Key Encryption
with Provable Security:
Challenges and Approaches

Shengli Liu

Shanghai Jiao Tong University
Session 15: Attacks
(Chair: Kehuan Zhang)

Structure based Data De-anonymization of Social Networks and Mobility Traces
14:10 - 14:20
14:20 - 14:30
14:30 - 14:40 Related-Key Security for Hybrid Encryption eavesROP: Listening for ROP payloads in data streams
14:40 - 14:50
14:50 - 15:00 Defining Injection Attacks
15:00 - 15:10 Session 5: Information Leakage
(Chair: Shoichi Hirose)

On formally bounding information leakage by statistical estimation
Session 10: Zero-Knowledge Proofs and Arguments
(Chair: Tanaka Keisuke)

Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge
15:10 - 15:20 Efficient Attack Forest Construction for Automotive On-board Networks
15:20 - 15:30
15:30 - 15:40 20 mins tea-break Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols Closing Remarks
15:40 - 15:50 Moving to Pick-up Location
15:50 - 16:00 Session 6: Symmetric Key Cryptography
(Chair: Shengli Liu)

PAEQ: Parallelizable Permutation-based Authenticated Encryption
16:00 - 16:10 20 mins tea-break Pick-up for Gathering
16:10 - 16:20
16:20 - 16:30 (Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160 Session 11: Outsourcing and Multi-party Computations
(Chair: Ahmad-Reza Sadeghi)

Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
16:30 - 16:40
16:40 - 16:50
16:50 - 17:00 Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
17:00 - 17:10
17:10 - 17:20
17:20 - 17:30
“To Share or Not to Share” in Client-Side Encrypted Clouds
17:30 - 17:40
17:40 - 18:15 Moving to Pick-up Location
18:15 Pick-up for Banquet