Program

last update: 30 April, 2022
Room B
Keynote Talk II
8:30 - 9:30 (JST)
Session Chairs: Xuhua Ding (Singapore Management University), Yuji Suga (Internet Initiative Japan Inc.)
8:30 - 9:30 (JST)
Celluar Security:
Why is it Difficult?
Prof. Yongdae Kim,
Korea Advanced Institute of Science and Technology,
Korea
Break
9:30 - 10:00 (JST)
Room A
Session 4A:
Post-quantum Computing
10:00 - 11:00 (JST)
Session Chair: TBA
10:00 - 10:20 (JST)
Aggregating and thresholdizing hash-based signatures using STARKs
I. Khaburzaniya; K. Chalkias; K. Lewi; H. Malvai
10:20 - 10:40 (JST)
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
P. Dutta; M. Jiang; D. Duong; W. Susilo; K. Fukushima; S. Kiyomoto
10:40 - 11:00 (JST)
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Z. Liu; Y. Tseng; R. Tso; M. Mambo; Y. Chen
Room B
Session 4B:
Security Applications of Machine Learning
10:00 - 11:20 (JST)
Session Chair: TBA
10:00 - 10:20 (JST)
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity
T. Zheng; B. Li
10:20 - 10:40 (JST)
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants
M. Dib; S. Torabi; E. Bou-Harb; N. Bouguila; C. Assi
10:40 - 11:00 (JST)
Machine Learning-based Online Social Network Privacy Preservation
T. Gao; F. Li
11:00 - 11:20 (JST)
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms
P. Chuang; C. Hsu; Y. Chu; S. Huang; C. Huang
Go to the top of this page
Lunch Break
11:20-12:50 (JST)
Room A
Session 5A:
Cyber-physical and IOT Security #2
12:50 - 14:30 (JST)
Session Chair: TBA
12:50 - 13:10 (JST)
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet
S. Hu; Q. Zhang; A. Weimerskirch; Z. Mao
13:10 - 13:30 (JST)
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID
A. Li; J. Li; D. Han; Y. Zhang; T. Li; Y. Zhang
13:30 - 13:50 (JST)
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals
Q. Zhao; C. Zuo; J. Blasco; Z. Lin
13:50 - 14:10 (JST)
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs
S. Kim; G. Yeo; T. Kim; J. Rhee; Y. Jeon; A. Bianchi; D. Xu; D. Tian
14:10 - 14:30 (JST)
SoK: A Survey Of Indirect Network-level Covert Channels
T. Schmidbauer; S. Wendzel
Room B
Session 5B:
Software Security #1
12:50 - 14:30 (JST)
Session Chair: TBA
12:50 - 13:10 (JST)
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers
S. Canakci; N. Matyunin; K. Graffi; A. Joshi; M. Egele
13:10 - 13:30 (JST)
RecIPE: Revisiting the Evaluation of Memory Error Defenses
Y. Jiang; R. Chuan; Z. Liang; H. ROSIER
13:30 - 13:50 (JST)
ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
T. GroÁE; T. Schleier; T. Müller
13:50 - 14:10 (JST)
The Convergence of Source Code and Binary Vulnerability Discovery -- A Case Study
A. Mantovani; L. Compagna; Y. Shoshitaishvili; D. Balzarotti
14:10 - 14:30 (JST)
SoK: The Evolution of Trusted UI on Mobile
D. Bove
Go to the top of this page
Break
14:30-15:00 (JST)
Room A
Session 6A:
Cryptography #2
15:00 - 17:20 (JST)
Session Chair: TBA
15:00 - 15:20 (JST)
Speedster: An Efficient Multi-party State Channel via Enclaves
J. Liao; F. Zhang; W. Sun; W. Shi
15:20 - 15:40 (JST)
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions
M. Campanelli; M. Hall-Andersen
15:40 - 16:00 (JST)
Symbolic synthesis of indifferentiability attacks
I. Rakotonirina; M. Ambrona; A. Aguirre; G. Barthe
16:00 - 16:20 (JST)
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password
P. Das; J. Hesse; A. Lehmann
16:20 - 16:40 (JST)
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
F. Hao; P. van Oorschot
16:40 - 17:00 (JST)
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
S. Berndt; J. Wichelmann; C. Pott; T. Traving; T. Eisenbarth
17:00 - 17:20 (JST)
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
S. Paul; Y. Kuzovkova; N. Lahr; R. Niederhagen
Room B
Session 6B:
System and Network Security #2
15:00 - 16:40 (JST)
Session Chair: TBA
15:00 - 15:20 (JST)
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE
Q. Wang; S. Cui; L. Zhou; G. Russello; O. Wu; Y. Zhu
15:20 - 15:40 (JST)
SoK: Design Tools for Side-Channel-Aware Implementations
I. Buhan; L. Batina; Y. Yarom; P. Schaumont
15:40 - 16:00 (JST)
Efficient Oblivious Permutation via the Waksman Network
W. Holland; O. Ohrimenko; A. Wirth
16:00 - 16:20 (JST)
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model
T. Van Goethem; G. Franken; I. Sanchez-Rola; D. Dworken; W. Joosen
16:20 - 16:40 (JST)
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection
M. Vermeer; M. van Eeten; C. Gañán
Go to the top of this page
We will move by bus from Dejima Messe Nagasaki to Banquet venue. It takes five or ten minutes.
Go to the top of this page
Onsite Registration desk opening time period (JST): 8:00 - 16:00