| 09:00 - 09:10 | Opening Remark |
|
Session 12: Intrusion and Malware Detection (Chair: Michele Boreale)
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments
|
| 09:10 - 09:20 |
Session 1: Web Security (Chair: Jakub Szefer)
Soundsquatting: Uncovering the use of homophones in domain squatting
|
Session 7: Firewall and Forensics (Chair: Lucas C.K. Hui)
Investigating the Hooking Behavior: A page-level memory monitoring method for Live Forensics
|
| 09:20 - 09:30 |
transAD: An Anomaly Detection Network Intrusion Sensor for the Web
|
| 09:30 - 09:40 |
| 09:40 - 09:50 |
Reducing User Tracking through Automatic Web Site State Isolations
|
SystemWall:
An Isolated Firewall using Hardware-based Memory Introspection |
Using Machine Language Model for Mimimorphic Malware Detection
|
| 09:50 - 10:00 |
| 10:00 - 10:10 |
CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump
|
| 10:10 - 10:20 |
SIACHEN: A Fine-grained Policy Language for the Mitigation of Cross-Site Scripting Attacks
|
Winnowing Double Structure for Wildcard Query in Payload Attribution |
| 10:20 - 10:30 |
Session 13: Public-Key Encryption (II) (Chair: Siu Ming Yiu)
Expressive and Secure Searchable Encryption in the Public Key Setting
|
| 10:30 - 10:40 |
Security issues in OAuth 2.0 SSO implementations |
30 mins tea-break |
| 10:40 - 10:50 |
Graded Encryption, or how to play "Who wants to be a millionaire?" distributively
|
| 10:50 - 11:00 |
20 mins tea-break |
| 11:00 - 11:10 |
Session 8: Mobile Security (Chair: Xiapu Luo)
Comprehensive Behavior Profiling for Proactive Android Malware Detection
|
20 mins tea-break |
| 11:10 - 11:20 |
Session 2: Implementation (Chair: Lucas C.K. Hui)
Exploiting the Floating-Point Computing Power of GPUs for RSA
|
| 11:20 - 11:30 |
Session 14: Authentication (Chair: Masahiro Mambo)
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
|
| 11:30 - 11:40 |
Analyzing Android Browser Apps for file:// Vulnerabilities
|
| 11:40 - 11:50 |
Session 3 (Chair: Sherman S.M. Chow)
Invited Talk (I)
Gone with the Gadgets: The Continuing Arms Race of Return-oriented Programming Attacks and Defenses
Ahmad-Reza Sadeghi
Technische Universität Darmstadt
|
| 11:50 - 12:00 |
Attribute-Based Signatures for Circuits from Multilinear Maps
|
| 12:00 - 12:10 |
A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
|
| 12:10 - 12:20 |
| 12:20 - 12:30 |
MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices
|
Adding Controllable Linkability to Pairing-Based Group Signatures For Free
|
| 12:30 - 12:40 |
| 12:40 - 14:00 | Lunch |
| 14:00 - 14:10 |
Session 4: Public-Key Encryption (I) (Chair: Shoichi Hirose)
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups |
Session 9 (Chair: Sherman S.M. Chow)
Invited Talk (II)
Public-Key Encryption with Provable Security: Challenges and Approaches
Shengli Liu
Shanghai Jiao Tong University
|
Session 15: Attacks (Chair: Kehuan Zhang)
Structure based Data De-anonymization of Social Networks and Mobility Traces
|
| 14:10 - 14:20 |
| 14:20 - 14:30 |
| 14:30 - 14:40 |
Related-Key Security for Hybrid Encryption
|
eavesROP: Listening for ROP payloads in data streams
|
| 14:40 - 14:50 |
| 14:50 - 15:00 |
Defining Injection Attacks
|
| 15:00 - 15:10 |
Session 5: Information Leakage (Chair: Shoichi Hirose)
On formally bounding information leakage by statistical estimation
|
Session 10: Zero-Knowledge Proofs and Arguments (Chair: Tanaka Keisuke)
Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge
|
| 15:10 - 15:20 |
Efficient Attack Forest Construction for Automotive On-board Networks
|
| 15:20 - 15:30 |
| 15:30 - 15:40 |
20 mins tea-break |
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
| Closing Remarks |
| 15:40 - 15:50 |
Moving to Pick-up Location |
| 15:50 - 16:00 |
Session 6: Symmetric Key Cryptography (Chair: Shengli Liu)
PAEQ: Parallelizable Permutation-based Authenticated Encryption
|
| 16:00 - 16:10 |
20 mins tea-break |
Pick-up for Gathering |
| 16:10 - 16:20 |
|
| 16:20 - 16:30 |
(Pseudo-)Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
|
Session 11: Outsourcing and Multi-party Computations (Chair: Ahmad-Reza Sadeghi)
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
|
| 16:30 - 16:40 |
| 16:40 - 16:50 |
| 16:50 - 17:00 |
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
|
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
|
| 17:00 - 17:10 |
| 17:10 - 17:20 |
| 17:20 - 17:30 |
|
“To Share or Not to Share” in Client-Side Encrypted Clouds
|
| 17:30 - 17:40 |
| 17:40 - 18:15 |
Moving to Pick-up Location |
| 18:15 |
Pick-up for Banquet |