Jan 30, 2021 (Tokyo, Japan Time) |
10:00–10:20 | Welcome plenary: For General Chairs and PC Chairs |
10:20–11:10 | Keynote Speech 1 Session Chair: Prof. Kouichi Sakurai Securing Critical Infrastructure against Cyber Attacks Prof. Jianying Zhou |
11:10–11:30 | Coffee break, poster presentation |
11:30-12:30 | Session 1 Main track (AI Security) Session Chair: Prof. Chunhua Su
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki and Takafumi Mori
A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space PLyue Li, Amir Rezapour and Wen-Guey Tzeng
DualNet: Locate Then Detect Effective Payload with Deep Attention Network Shiyi Yang, Peilun Wu and Hui Gu
|
12:30-14:00 | Lunch break |
14:00-15:20 | Session 2 Main Track (Blockchain) Session Chair: Prof. Akihito Nakamura
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspectiv Hao Wang, Chunpeng Ge and Zhe Liu
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain Haoyang An and Jiageng Chen
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating Qian Mei, Hu Xiong, Yanan Zhao and Kuo-Hui Yeh
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification Tieming Geng, Laurent Njilla and Chin-Tser Huang
|
15:20-15:40 | Coffee break, poster presentation |
15:40-16:40 | Session 3 Main Track (Crypto application in Privacy) Session Chair: Prof. Jian Shen
Privacy-Preserving Range Query for High-dimensional Uncertain Data in A Two-party Scenario Shenghao Su, Cheng Guo, Pengxu Tian and Xinyu Tang
A Novel Dynamic Group Signature with Membership Privacy Junqing Lu, Rongxin Qi and Jian Shen
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gen and SK Hafizul Islam
|
Jan 31, 2021 (Tokyo, Japan Time) |
09:45-11:00 | Session 4 Experience and Practice Track (AI and IoT Security) Session Chair: Prof. Chen-Mou Cheng
Generate Realistic Traffic Sign Image Using Deep Convolutional Generative Adversarial Networks Yan-Ting Liu, Rung-Ching Chen and Christine Dewi
Mining Web Usage Profiles from Proxy Logs: User Identification Jing Xu and Fei Xu
Efficient Subset Predicate Encryption for Internet of Things Yi-Fan Tseng and Shih-Jie Gao
Privacy-Preserving Smart Road Pricing System in Smart Cities Qingfeng Zhu, Sai Ji and Kui Zhu
Cryfind:Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables Wei Chieh Chao, Chung-Kuan Chen and Chen-Mou Cheng
|
11:00-11:20 | Coffee break, poster presentation |
11:20-12:20 | Session 5 Main Track (IoT Security) Session Chair: Prof. Kuo-Hui Yeh
Highly Efficient Anonymous IoT Authentication Using Composite Hashing Hung-Yu Chien
SGD2: Secure Group-based Device-to-Device Communications with Fine-grained AccessControl for IoT in 5G Ruei-Hau Hsu, Hsiang-Shian Fan and Lu-Chin Wang
IoT ETEI: End-to-end IoT device identification method Feihong Yin, Li Yang, Yuchen Wang and Jiahao Dai
|
12:20-14:00 | Lunch break |
14:00-14:50 |
Keynote Speech 2
Session Chair: Prof. Kuo-Hui Yeh
Threat Hunting Using Cybersecurity Telemetry
Prof. Shiuhpyng Winston Shieh |
14:50-16:30 | Session 6 (Invited paper presentations) Session Chair: Prof. Kazumasa Omote
On the Construction of a Post-Quantum Blockchain Jiahui Chen, Wensheng Gan, Muchuang Hu and Chien-Ming Chen
Efficient blockchain-based IoT firmware update considering distribution incentives Tatsuhiro Fukuda and Kazumasa Omote
Secure Outsourced Private Set Intersection with Linear Complexity Sumit Kumar Debnath, Kouchi Sakurai
Systematic Research on Technology and Challenges of Lightning Network Zhixin Zhao, Lu Zhou and Chunhua Su
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks Yang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang and Hu Xiong
|
16:30-16:50 | Coffee break, poster presentation |
16:50-18:20 | Session 7 Experience and Practice Track (Practical Crypto Application) Session Chair: Prof. Kouichi Sakurai
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection
Yi-Ming Chen, Jiun-Shian Yang and Guo-Chung Chen
Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms Xin Xie and Yu-Chi Chen
An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid Xueya Xia and Sai Ji
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang and Yu-Chi Chen
Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang and Yi Ding
A Novel Verification scheme for Resisting Password Guessing Attacks Albert Guan and Chia-Mei Chen
|
Feb 1, 2021 (Tokyo, Japan Time) |
9:30-10:50 | Session 8 Main Track (Network Security)
Session Chair: Dr. Haowen Tan
FastMove: Fast IP switching Moving Target Defense to mitigate DDOS Attacks
TNahid Bandi, Hesam Tajbakhsh and Morteza Analoui
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud Dinh Phuc Trinh and Park Minho
Header-Translation Based Flow Aggregation for Scattered Address Allocating SDNs Ruisi Wu, Wen-Kang Jia and Xufang Wang
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation
Wenjuan Li, Weizhi Meng, Javier Parra Arnau and Kim-Kwang Raymond Choo
|
10:50-11:10 | Coffee break, poster presentations |
11:10-12:30 |
Session 9 Main Track (System and Web Security)
Session Chair: Dr. Weizhi Meng
Retrieving Input from Touch Interfaces via Acoustic Emanations Kai Ren Teo, Balamurali B T, Jer Ming Chen and Jianying Zhou
Phishing Site Detection Using Similarity of Website Structure Shoma Tanaka, Takashi Matsunaka, Akira Yamada and Ayumu Kubota
EC-Model: An Evolvable Malware Classification Model Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen and Shiuhpyng Shieh
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, Sanoop Mallissery and Yu-Sung Wu
|
12:30-14:00 | Lunch break |
14:00-15:40 |
Session 10 Main Track (Crypto Application I)
Session Chair: Prof. Hu Xiong
Verifiable M+1st-Price Auction without Manager Po-Chu Hsu and Atsuko Miyaji
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing Yuan Li, Haiyan Wang, Shulan Wang, and Yong Ding
Perpetual secret sharing from dynamic data structures Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai
Arithmetic Coding for Floating-Point Numbers Marc Fischer, Oliver Riedel, Armin Lechler and Alexander Verl
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems Takato Hirano, Yutaka Kawai and Yoshihiro Koseki
|
15:40-16:00 | Coffee break, poster presentations |
16:00-16:50 | Keynote Speech 3
Session Chair: Dr. Weizhi Meng
Dependable and Resilient Cloud Computing
Prof. Vincenzo Piuri |
16:50-17:50 | Online poster presentation
Trends in Attack Cases and Vulnerability Candidates From Large Vulnerability Database Using Topic Model Analysis
(Abstract)
Hiroki Koyanagi, Kazuo Takaragi, Sven Wohlgemuth and Katsuyuki Umezawa
A Patient-centric Key Management Protocol for Healthcare Information System based on Blockchain
( Abstract)
Ting-Le Zhu and Tzung-Her Chen
Zero Trust for Supply Chain Security Haibo Zhang and Kouichi Sakurai
End-to-End Secure Multi-Party Data Sharing Yusuke Namiki and Akihito Nakamura
Exponential Distribution of Hash-Mining Time and its Serial/Parallel Variations for Smaller Variance Hiroaki Anada and Kouichi Sakurai
|
© 2021 IEEE Conference on Dependable and Secure Computing