09:00 - 09:10 | Opening Remark |
|
Session 12: Intrusion and Malware Detection (Chair: Michele Boreale)
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments
|
09:10 - 09:20 |
Session 1: Web Security (Chair: Jakub Szefer)
Soundsquatting: Uncovering the use of homophones in domain squatting
|
Session 7: Firewall and Forensics (Chair: Lucas C.K. Hui)
Investigating the Hooking Behavior: A page-level memory monitoring method for Live Forensics
|
09:20 - 09:30 |
transAD: An Anomaly Detection Network Intrusion Sensor for the Web
|
09:30 - 09:40 |
09:40 - 09:50 |
Reducing User Tracking through Automatic Web Site State Isolations
|
SystemWall:
An Isolated Firewall using Hardware-based Memory Introspection |
Using Machine Language Model for Mimimorphic Malware Detection
|
09:50 - 10:00 |
10:00 - 10:10 |
CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump
|
10:10 - 10:20 |
SIACHEN: A Fine-grained Policy Language for the Mitigation of Cross-Site Scripting Attacks
|
Winnowing Double Structure for Wildcard Query in Payload Attribution |
10:20 - 10:30 |
Session 13: Public-Key Encryption (II) (Chair: Siu Ming Yiu)
Expressive and Secure Searchable Encryption in the Public Key Setting
|
10:30 - 10:40 |
Security issues in OAuth 2.0 SSO implementations |
30 mins tea-break |
10:40 - 10:50 |
Graded Encryption, or how to play "Who wants to be a millionaire?" distributively
|
10:50 - 11:00 |
20 mins tea-break |
11:00 - 11:10 |
Session 8: Mobile Security (Chair: Xiapu Luo)
Comprehensive Behavior Profiling for Proactive Android Malware Detection
|
20 mins tea-break |
11:10 - 11:20 |
Session 2: Implementation (Chair: Lucas C.K. Hui)
Exploiting the Floating-Point Computing Power of GPUs for RSA
|
11:20 - 11:30 |
Session 14: Authentication (Chair: Masahiro Mambo)
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
|
11:30 - 11:40 |
Analyzing Android Browser Apps for file:// Vulnerabilities
|
11:40 - 11:50 |
Session 3 (Chair: Sherman S.M. Chow)
Invited Talk (I)
Gone with the Gadgets: The Continuing Arms Race of Return-oriented Programming Attacks and Defenses
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
|
11:50 - 12:00 |
Attribute-Based Signatures for Circuits from Multilinear Maps
|
12:00 - 12:10 |
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
|
12:10 - 12:20 |
12:20 - 12:30 |
MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices
|
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
|
12:30 - 12:40 |
12:40 - 14:00 | Lunch |
14:00 - 14:10 |
Session 4: Public-Key Encryption (I) (Chair: Shoichi Hirose)
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups |
Session 9 (Chair: Sherman S.M. Chow)
Invited Talk (II)
Public-Key Encryption with Provable Security: Challenges and Approaches
Shengli Liu
Shanghai Jiao Tong University
|
Session 15: Attacks (Chair: Kehuan Zhang)
Structure based Data De-anonymization of Social Networks and Mobility Traces
|
14:10 - 14:20 |
14:20 - 14:30 |
14:30 - 14:40 |
Related-Key Security for Hybrid Encryption
|
eavesROP: Listening for ROP payloads in data streams
|
14:40 - 14:50 |
14:50 - 15:00 |
Defining Injection Attacks
|
15:00 - 15:10 |
Session 5: Information Leakage (Chair: Shoichi Hirose)
On formally bounding information leakage by statistical estimation
|
Session 10: Zero-Knowledge Proofs and Arguments (Chair: Tanaka Keisuke)
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge
|
15:10 - 15:20 |
Efficient Attack Forest Construction for Automotive On-board Networks
|
15:20 - 15:30 |
15:30 - 15:40 |
20 mins tea-break |
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
| Closing Remarks |
15:40 - 15:50 |
Moving to Pick-up Location |
15:50 - 16:00 |
Session 6: Symmetric Key Cryptography (Chair: Shengli Liu)
PAEQ: Parallelizable Permutation-based Authenticated Encryption
|
16:00 - 16:10 |
20 mins tea-break |
Pick-up for Gathering |
16:10 - 16:20 |
|
16:20 - 16:30 |
(Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
|
Session 11: Outsourcing and Multi-party Computations (Chair: Ahmad-Reza Sadeghi)
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
|
16:30 - 16:40 |
16:40 - 16:50 |
16:50 - 17:00 |
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
|
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
|
17:00 - 17:10 |
17:10 - 17:20 |
17:20 - 17:30 |
|
“To Share or Not to Share” in Client-Side Encrypted Clouds
|
17:30 - 17:40 |
17:40 - 18:15 |
Moving to Pick-up Location |
18:15 |
Pick-up for Banquet |