The 2021 IEEE Conference on Dependable and Secure Computing

Aizuwakamatsu, Fukushima, Japan | 30 Jan - 2 Feb, 2021

Conference Program Proceedings

Jan 30, 2021 (Tokyo, Japan Time)
10:00–10:20Welcome plenary: For General Chairs and PC Chairs
10:20–11:10Keynote Speech 1 Session Chair: Prof. Kouichi Sakurai
Securing Critical Infrastructure against Cyber Attacks
Prof. Jianying Zhou
11:10–11:30Coffee break, poster presentation
11:30-12:30 Session 1 Main track (AI Security) Session Chair: Prof. Chunhua Su
Vulnerability of Privacy Visor Used to Disrupt Unauthorized Face Recognition
Hiroaki Kikuchi, Kazuki Eto, Kazushi Waki and Takafumi Mori
A Black-Box Adversarial Attack via Deep Reinforcement Learning on the Feature Space
PLyue Li, Amir Rezapour and Wen-Guey Tzeng
DualNet: Locate Then Detect Effective Payload with Deep Attention Network
Shiyi Yang, Peilun Wu and Hui Gu
12:30-14:00Lunch break
14:00-15:20Session 2 Main Track (Blockchain) Session Chair: Prof. Akihito Nakamura
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspectiv
Hao Wang, Chunpeng Ge and Zhe Liu
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain
Haoyang An and Jiageng Chen
Toward Blockchain-Enabled IoV with Edge Computing: Efficient and Privacy-Preserving Vehicular Communication and Dynamic Updating
Qian Mei, Hu Xiong, Yanan Zhao and Kuo-Hui Yeh
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification
Tieming Geng, Laurent Njilla and Chin-Tser Huang
15:20-15:40Coffee break, poster presentation
15:40-16:40Session 3 Main Track (Crypto application in Privacy) Session Chair: Prof. Jian Shen
Privacy-Preserving Range Query for High-dimensional Uncertain Data in A Two-party Scenario
Shenghao Su, Cheng Guo, Pengxu Tian and Xinyu Tang
A Novel Dynamic Group Signature with Membership Privacy
Junqing Lu, Rongxin Qi and Jian Shen
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy
Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gen and SK Hafizul Islam
Jan 31, 2021 (Tokyo, Japan Time)
09:45-11:00Session 4 Experience and Practice Track (AI and IoT Security) Session Chair: Prof. Chen-Mou Cheng
Generate Realistic Traffic Sign Image Using Deep Convolutional Generative Adversarial Networks
Yan-Ting Liu, Rung-Ching Chen and Christine Dewi
Mining Web Usage Profiles from Proxy Logs: User Identification
Jing Xu and Fei Xu
Efficient Subset Predicate Encryption for Internet of Things
Yi-Fan Tseng and Shih-Jie Gao
Privacy-Preserving Smart Road Pricing System in Smart Cities
Qingfeng Zhu, Sai Ji and Kui Zhu
Cryfind:Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables
Wei Chieh Chao, Chung-Kuan Chen and Chen-Mou Cheng
11:00-11:20Coffee break, poster presentation
11:20-12:20Session 5 Main Track (IoT Security) Session Chair: Prof. Kuo-Hui Yeh
Highly Efficient Anonymous IoT Authentication Using Composite Hashing
Hung-Yu Chien
SGD2: Secure Group-based Device-to-Device Communications with Fine-grained AccessControl for IoT in 5G
Ruei-Hau Hsu, Hsiang-Shian Fan and Lu-Chin Wang
IoT ETEI: End-to-end IoT device identification method
Feihong Yin, Li Yang, Yuchen Wang and Jiahao Dai
12:20-14:00Lunch break
14:00-14:50 Keynote Speech 2 Session Chair: Prof. Kuo-Hui Yeh
Threat Hunting Using Cybersecurity Telemetry
Prof. Shiuhpyng Winston Shieh
14:50-16:30Session 6 (Invited paper presentations) Session Chair: Prof. Kazumasa Omote
On the Construction of a Post-Quantum Blockchain
Jiahui Chen, Wensheng Gan, Muchuang Hu and Chien-Ming Chen
Efficient blockchain-based IoT firmware update considering distribution incentives
Tatsuhiro Fukuda and Kazumasa Omote
Secure Outsourced Private Set Intersection with Linear Complexity
Sumit Kumar Debnath, Kouchi Sakurai
Systematic Research on Technology and Challenges of Lightning Network
Zhixin Zhao, Lu Zhou and Chunhua Su
A Certificateless and Privacy-Preserving Authentication with Fault-Tolerance for Vehicular Sensor Networks
Yang Zhao, Guohang Dan, Ankang Ruan, Jicheng Huang and Hu Xiong
16:30-16:50Coffee break, poster presentation
16:50-18:20Session 7 Experience and Practice Track (Practical Crypto Application) Session Chair: Prof. Kouichi Sakurai
Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection
Yi-Ming Chen, Jiun-Shian Yang and Guo-Chung Chen
Decentralized Data Aggregation: A New Secure Framework Based on Lightweight Cryptographic Algorithms
Xin Xie and Yu-Chi Chen
An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid
Xueya Xia and Sai Ji
Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability
Jian-Feng Lin, Jun-Rui Wang, Che-Chia Chang and Yu-Chi Chen
Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang and Yi Ding
A Novel Verification scheme for Resisting Password Guessing Attacks
Albert Guan and Chia-Mei Chen
Feb 1, 2021 (Tokyo, Japan Time)
9:30-10:50Session 8 Main Track (Network Security) Session Chair: Dr. Haowen Tan
FastMove: Fast IP switching Moving Target Defense to mitigate DDOS Attacks
TNahid Bandi, Hesam Tajbakhsh and Morteza Analoui
BDF-SDN: A Big Data Framework for DDoS Attack Detection in Large-Scale SDN-Based Cloud
Dinh Phuc Trinh and Park Minho
Header-Translation Based Flow Aggregation for Scattered Address Allocating SDNs
Ruisi Wu, Wen-Kang Jia and Xufang Wang
Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation
Wenjuan Li, Weizhi Meng, Javier Parra Arnau and Kim-Kwang Raymond Choo
10:50-11:10Coffee break, poster presentations
11:10-12:30 Session 9 Main Track (System and Web Security) Session Chair: Dr. Weizhi Meng
Retrieving Input from Touch Interfaces via Acoustic Emanations
Kai Ren Teo, Balamurali B T, Jer Ming Chen and Jianying Zhou
Phishing Site Detection Using Similarity of Website Structure
Shoma Tanaka, Takashi Matsunaka, Akira Yamada and Ayumu Kubota
EC-Model: An Evolvable Malware Classification Model
Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen and Shiuhpyng Shieh
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay
Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, Sanoop Mallissery and Yu-Sung Wu
12:30-14:00Lunch break
14:00-15:40 Session 10 Main Track (Crypto Application I) Session Chair: Prof. Hu Xiong
Verifiable M+1st-Price Auction without Manager
Po-Chu Hsu and Atsuko Miyaji
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
Yuan Li, Haiyan Wang, Shulan Wang, and Yong Ding
Perpetual secret sharing from dynamic data structures
Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai
Arithmetic Coding for Floating-Point Numbers
Marc Fischer, Oliver Riedel, Armin Lechler and Alexander Verl
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems
Takato Hirano, Yutaka Kawai and Yoshihiro Koseki
15:40-16:00Coffee break, poster presentations
16:00-16:50Keynote Speech 3 Session Chair: Dr. Weizhi Meng
Dependable and Resilient Cloud Computing
Prof. Vincenzo Piuri
16:50-17:50Online poster presentation
Trends in Attack Cases and Vulnerability Candidates From Large Vulnerability Database Using Topic Model Analysis (Abstract)
Hiroki Koyanagi, Kazuo Takaragi, Sven Wohlgemuth and Katsuyuki Umezawa
A Patient-centric Key Management Protocol for Healthcare Information System based on Blockchain ( Abstract)
Ting-Le Zhu and Tzung-Her Chen
Zero Trust for Supply Chain Security
Haibo Zhang and Kouichi Sakurai
End-to-End Secure Multi-Party Data Sharing
Yusuke Namiki and Akihito Nakamura
Exponential Distribution of Hash-Mining Time and its Serial/Parallel Variations for Smaller Variance
Hiroaki Anada and Kouichi Sakurai
Feb 2, 2021 (Tokyo, Japan Time)
09:10-10:00Keynote Speech 4 Session Chair: Dr. Chunhua Su
Revisiting computationally independent pair of one-way functions from the point of view of non-malleability
Prof. Kouichi Sakurai
10:00-11:20 Session 11 Main Track (Crypto Application II) Session Chair: Dr. Yuntao Wang
A Public-key Encryption with Multi-keyword Search Scheme for Cloud-based Smart Grids
Dong Zhang, Qing Fan, Hongyi Qiao and Min Luo
A distributed ledger management mechanism for storing and selling private data
Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C Pandu Rangan and Kouichi Sakura
ChainPKI-Towards Ethash-based Decentralized PKI with Privacy Enhancement
Wei-Yang Chiu, Weizhi Meng and Christian Damsgaard Jensen
A Profile Matching Scheme based on Private Set Intersection for Cyber-Physical-Social Systems
Yalian Qian, Xueya Xia and Jian Shen
11:20-11:40Lunch break
11:40-12:40Session 12 (Crypto Application III) Session Chair: Dr. Chunpeng Ge
Partially Blind ECDSA Scheme and Its Application to Bitcoin
Hongxun Huang, Zi Yuan Liu and Raylin Tso
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance
Kui Zhu, Yongjun Ren and Qingfeng Zhu
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model
Chun-I Fan, Yi-Fan Tseng and Cheng-Chun Feng
12:40-12:50Closing speech

© 2021 IEEE Conference on Dependable and Secure Computing