13th International Conference on Information Security Practice and Experience
Melbourne, Australia
| 13-15 Dec 2017
The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 13-15 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Singapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), Xi'an, China (2009), Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), Lanzhou, China (2013), Fuzhou, China (2014), Beijing, China (2015), and Zhangjiajie, China (2016). For all sessions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series.
ISPEC 2017 will be co-located with the 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) SocialSec 2017 Website.
Conference proceedings are online NEW Free access to the ISPEC 2017 proceedings is available at Springer Link from 11 Dec 2017 to 11 Jan 2018. Proceedings |
Submission due extended The paper submission deadline for ISPEC 2017 is extended to 20 Aug 2017. Learn more |
Submission system is online The submission system for ISPEC 2017 is online now. Learn more |
Springer publication confirmed The proceeding of ISPEC 2017 will be published by Springer as a volume of the LNCS series. Learn more |
Cluster Computing special issue announced ISPEC 2017 will have a special issue in Cluster Computing. Learn more |
Information Sciences special issue confirmed ISPEC 2017 will have a special issue in Information Sciences. Learn more |
CCPE special issue confirmed ISPEC 2017 will have a special issue in Concurrency and Computation: Practice and Experience (CCPE). Learn more |
FGCS special issue confirmed ISPEC 2017 will have a special issue in Future Generation Computer Systems (FGCS). Learn more |
Note: The order of speakers is sorted according to the alphabetical order of surname.
Andrew Miller
University of Illinois, Urbana-Champaign
USA
The past year has seen a proliferation of smart contracts systems --- program code on a cryptocurrency blockchain that moves around money. Ethereum is the most well known smart contract platform, though there are also many others. How can we evaluate the expressiveness of smart contract programming languages? In this talk, I'll present a line of research that takes several applications as case studies (a random coin flipping gadget, fair off-chain multiparty computations, and payment channel networks) and attempts to implement them in both Bitcoin script (UTXO-based) and in Ethereum (contract-based). In each setting, we find that the UTXO-based framework requires additional asymptotic overhead compared to Ethereum (either time, computing power, or locked-up collateral).
Biography: Andrew Miller is an Assistant Professor at the University of Illinois, Urbana-Champaign, in Electrical and Computer Engineering and affiliate in Computer Science. He is also an Associate Director of the Initiative for Cryptocurrencies and Contracts (IC3) and an advisor to the zcash project. He received his Ph.D. from the University of Maryland Cybersecurity Center. His research interests are broadly in computer security, and focused on the design of secure decentralized systems and cryptocurrencies. He combines techniques from programming languages, cryptography, and distributed computing.
Kenny Paterson
Royal Holloway University of London
UK
In this talk, we'll look at how bespoke encryption schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. Examples of such schemes include Deterministic Encryption and Order Preserving Encryption, as well as more advanced schemes such as Arx (Poddar et al.), the Lewi-Wu scheme, Kerschbaum's FH-OPE scheme, and CipherBase (Arasu et al.). We'll explain why currently proposed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.
Biography: Kenny Paterson is a Professor of Information Security at Royal Holloway University of London in the UK. His research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. He co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. He is now the editor-in-chief of the Journal of Cryptology. He was made a fellow of the IACR (International Association for Cryptologic Research) in 2017.
Digital signatures are the foundation of modern cryptography. We prove the security of a signature scheme by reducing an attack to solving an underlying hard problem. An ideal security reduction should be a tight reduction under a standard assumption in the standard security model without random oracles. Unfortunately, it is hard to program a security reduction capturing the above four features. In this talk, I will focus on tight reduction for digital signatures and introduce two different methods towards tight reduction.
Biography: Willy Susilo is a Professor and the Head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong in Australia. He was previously awarded the prestigious ARC Future Fellow by the Australian Research Council (ARC) and the Researcher of the Year award in 2016 by the University of Wollongong. His main research interests include cybersecurity, cryptography and information security. His work has been cited more than 9,000 times in Google Scholar. He is the Editor-in-Chief of the Information journal. He has served as a program committee member in dozens of international conferences. He is currently serving as an Associate Editors in several international journals, including Elsevier Computer Standards and Interface and International Journal of Information Security (IJIS, Springer). He has published more than 300 research papers in the area of cybersecurity and cryptology.
Tsz Hon Yuen
Shield Lab at Huawei Singapore
Singapore
Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.
Biography: Dr Tsz Hon Yuen is a senior researcher of Shield Lab at Huawei Singapore. He is a member of Cryptography Expert Group in Huawei. He received his PhD degree from University of Wollongong in 2010 and worked in University of Hong Kong before joining Huawei. His current research interests include public key encryption, digital signatures, privacy and blockchain. He has published more than 50 technical papers, including top journals and conferences such as IEEE TC and Eurocrypt. He received the Best Paper Award in ESRORICS 2014. He is also active in industrial fields with more than 10 patents. He has served as the PC members and reviewers for many security and cryptography conferences, workshops and journals.
Yuliang Zheng
University of Alabama at Birmingham
USA
The emerging Internet of Things (IoT) promises a highly connected world where tangible things around us are seamlessly integrated into the ever expanding cyber space, which is expected to result in greatly improved quality of life and economic growth. To realize those benefits, it is important for the IoT to have strong security and privacy measures built into it. This presents a number of challenges both at technical and system levels. This talk focuses on our research into controlling access to thousands or more of shared, resource-constrained IoT devices that are orders of magnitude more numerous than the number of passwords a typical person has to manage now. Specific research goals include:
Biography: Dr. Yuliang Zheng is widely known as the father of the signcryption technology which is now an ISO international standard for cyber security. His pioneering research in immunizing public key encryption against adaptive attacks has been embodied in a multiple number of industry standards including those from ISO, IEEE and IETF.
A prolific researcher with more than 200 refereed publications, Dr. Zheng has been at the forefront ofestablishing international standards for cryptographic engineering. His more recent research focus is on leveraging the Internet of Things, blockchains and Big Data to accelerate the progress of precision medicine.
He plays an active, leadership role in international research communities, co-founding the annual Public Key Cryptography (PKC) conference sponsored by the International Association for Cryptologic Research (IACR) and the annual International Conference on Information Theoretic Security (ICITS). In addition, he serves on the steering committees for a number of research and industrial forums including PKC (Chair of the PKC steering committee since 2007), International Conference on Information Theoretic Security, Information Security Conference, IEEE Security in Storage Workshop and IEEE Information Assurance Standards Committee.
Dr. Zheng was invited to serve as an associate editor of The Computer Journal published by the Oxford University Press and as a guest editor for the IEEE Transactions on Information Theory.
Dr. Yuliang Zheng earned his Bachelor's degree in computer science from Nanjing Institute of Technology (renamed Southeast University 1988), Nanjing, China in 1982. He completed his graduate studies at Yokohama National University in Japan, where he earned his master's and PhD degrees both in electrical and computer engineering, in 1988 and 1991 respectively. After completing his PhD, Dr. Zheng moved to Australia, working at first as a cyber security research scientist at the Australian Defense Force Academy, and then as a professor at the University of Wollongong and Monash University. In 2001, Dr. Zheng was recruited by a joint effort between Bank of America, Wachovia Bank (now part of Wells Fargo) and the University of North Carolina at Charlotte (UNCC) to establish and lead a research center for financial cyber security at UNCC. Since July 2015 he has been with the University of Alabama at Birmingham, serving as the Chair of UAB’s Department of Computer Science.
13 Dec | 14 Dec | 15 Dec | |||
---|---|---|---|---|---|
Room 1 | Room 2 | Room 1 | Room 2 | Room 1 | Room 2 |
All Day Registration | |||||
Opening | Sess. 6 | SocialSec | Sess. 10 | Sess. 11 | |
Keynote 1 | Keynote 4 | ||||
Keynote 2 | Keynote 5 | Keynote 8 | |||
Coffee Break | |||||
Sess. 1 | MONAMI | Keynote 6 | Keynote 9 | ||
Sess. 2 | Sess. 7 | SocialSec | Huawei Panel - IoT Sec | ||
Lunch | |||||
Keynote 3 | Keynote 7 | Keynote 10 | |||
Sess. 3 | MONAMI | Panel - Blockchain | Sess. 12 | MONAMI | |
Coffee Break | |||||
Sess. 4 | MONAMI | Sess. 8 | MONAMI | Sess. 13 | MONAMI |
Sess. 5 | Sess. 9 | Sess. 14 | SocialSec | ||
Welcome Reception | Conference Banquet | Closing |
Time | Room 1 | Room 2 |
---|---|---|
08:00-08:45 | Registration | |
08:45-09:10 | Opening | |
09:10-09:50 | Keynote 1 | |
09:50-10:30 | Keynote 2 | |
10:30-10:50 | Coffee Break | |
10:50-11:45 | Lattice Crypto | MONAMI |
11:45-12:40 | Searchable Enc | |
12:50-13:50 | Lunch | |
13:50-14:30 | Keynote 3 | |
14:30-15:55 | S/W Sec & Trusted | MONAMI |
15:55-16:15 | Coffee Break | |
16:15-17:20 | Network Security | MONAMI |
17:20-18:15 | Social & QR Sec | |
18:30-20:00 | Welcome Reception |
Time | Room 1 | Room 2 |
---|---|---|
08:30-09:10 | Asymmetric Enc (1) | SocialSec |
09:10-09:50 | Keynote 4 | |
09:50-10:30 | Keynote 5 | |
10:30-11:00 | Coffee Break | |
11:00-11:40 | Keynote 6 | |
11:40-13:00 | Blockchain | SocialSec |
13:00-14:00 | Lunch | |
14:00-14:40 | Keynote 7 | |
14:40-16:00 | Panel Discussion - Blockchain | |
16:00-16:30 | Coffee Break | |
16:30-17:10 | Asymmetric Enc (2) | MONAMI |
17:10-18:25 | Signature | |
19:00-22:00 | Conference Banquet |
Time | Room 1 | Room 2 |
---|---|---|
08:35-09:50 | Asymmetric Enc (3) | Cloud Security |
09:50-10:30 | Keynote 8 | |
10:30-11:00 | Coffee Break | |
11:00-11:40 | Keynote 9 | |
11:40-13:00 | Huawei Panel Discussion - IoT Sec | |
13:00-14:00 | Lunch | |
14:00-14:40 | Keynote 10 | |
14:40-15:50 | Cyber-Physical Sec | MONAMI |
15:50-16:20 | Coffee Break | |
16:20-17:20 | Authentication | MONAMI |
17:20-18:20 | Symmetric Enc | SocialSec |
18:20-18:30 | Closing |
Note: For details of MONAMI and SocialSec sessions, please refer to MONAMI and SocialSec.
ISPEC Keynotes [Room 1] |
---|
Keynote 3 (13 Dec) 13:50-14:30 Security Proof of Digital Signatures Learn more Willy Susilo, University of Wollongong, Australia Session Chair: Kaitai Liang, University of Surrey, UK |
Keynote 5 (14 Dec) 09:50-10:30 Secure Storage in the Cloud Using Bespoke Encryption Schemes Learn more Kenny Paterson, Royal Holloway University of London, UK Session Chair: Willy Susilo, University of Wollongong, Australia |
Keynote 6 (14 Dec) 11:00-11:40 Mind the Gap: Application-driven evaluation of Smart Contract languages Learn more Andrew Miller, University of Illinois, Urbana-Champaign, USA Session Chair: Joseph Liu, Monash University, Australia |
Keynote 7 (14 Dec) 14:00-14:40 Blockchain: How crypto meets the industry? Learn more Tsz Hon Yuen,Shield Lab at Huawei Singapore, Singapore Session Chair: Man Ho Au, Hong Kong Polytechnic University, Hong Kong |
Keynote 9 (15 Dec) 11:00-11:40 How to Control Access to Thousands of Shared IoT Devices Learn more Yuliang Zheng, University of Alabama at Birmingham, USA Session Chair: Ron Steinfeld, Monash University, Australia |
MONAMI Keynotes [Room 1] |
---|
Keynote 1 (13 Dec) 09:10-09:50 Privacy in Location Based Services Learn more Wanlei Zhou, Deakin University, Australia |
Keynote 2 (13 Dec) 09:50-10:30 Towards Reliable, Secure and Efficient Energy Supply with Large Renewable Energy at Affordable Price Learn more Joe Dong, UNSW, Sydney |
Keynote 4 (14 Dec) 09:10-09:50 Intermediate- and High-Level Structure Matching and Its Application in Biometrics Learn more Yongsheng Gao, Griffith University, Australia |
Keynote 8 (15 Dec) 09:50-10:30 Fuzzy Transfer Learning for Prediction Learn more Jie Lu, University of Technology Sydney, Australia |
Keynote 10 (15 Dec) 14:00-14:40 Networking for Big Data: Challenges and Opportunities Learn more Shui Yu, Deakin University, Australia |
Panel Discussion - Blockchain 14:40-16:00 (14 Dec) [Room 1] |
---|
Joseph Liu (Chair) Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab Monash University, Australia Man Ho Au (Allen) Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab Hong Kong Polytechnic University, Hong Kong Tsz Hon Yuen (John) Senior Researcher Shield Lab at Huawei Singapore, Singapore Andrew Miller Assistant Professor, Advisor Zcash University of Illinois, Urbana-Champaign, USA Khal Achkar Chief Technology Officer Hcash Foundation, Australia Jacob Cheng Chief Executive Officer Hyperchain, Australia |
Huawei Panel Discussion - IoT Sec 11:40-13:00 (15 Dec) [Room 1] |
---|
Robert Deng (Chair) Professor, IEEE Fellow Singapore Management University, Singapore Tieyan Li Head of Mobile IoT Security Shield Lab at Huawei Singapore, Singapore Kenny Paterson Professor Royal Holloway University of London, UK Yuliang Zheng Professor University of Alabama at Birmingham, USA Carsten Rudolph Director, Oceania Cyber Security Centre Monash University, Australia |
Session 1: Lattice-Based Cryptography 10:50-11:45 (13 Dec) [Room 1] Session Chair: Amin Sakzad |
---|
Compact Lossy and All-but-One Trapdoor Functions from Lattice Full Paper: 20 mins Leixiao Cheng, Quanshui Wu and Yunlei Zhao |
A lattice-based approach to Privacy-Preserving Biometric Authentication without relying on trusted third parties Full Paper: 20 mins Trung Dinh, Ron Steinfeld and Nandita Bhattacharjee |
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption Short Paper: 15 mins Pradeep Kumar Mishra, Dung Hoang Duong and Masaya Yasuda |
Session 2: Searchable Encryption 11:45-12:40 (13 Dec) [Room 1] Session Chair: Xingliang Yuan |
---|
Verifiable Range Query Processing for Cloud Computing Full Paper: 20 mins Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang and Jie Xiong |
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries Full Paper: 20 mins Yanjun Shen and Peng Zhang |
A New Functional Encryption for Multidimensional Range Query Short Paper: 15 mins Jia Xu, Ee-Chien Chang and Jianying Zhou |
Session 3: Software Security and Trusted Computing 14:30-15:55 (13 Dec) [Room 1] Session Chair: Daniel Luo |
---|
A Formal Model for an Ideal CFI Full Paper: 20 mins Sepehr Minagar, Balasubramaniam Srinivasan and Phu Dung Le |
Defending Application Cache Integrity of Android Runtime Full Paper: 20 mins Jia Wan, Mohammad Zulkernine, Phil Eisen and Cliord Liem |
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks Short Paper: 15 mins Zhi Wang and Jia Chunfu |
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation Short Paper: 15 mins Lu Ren, Rui Chang, Qing Yin and Wei Wang |
Matching function-call graph of binary codes and its applications Short Paper: 15 mins Yong Tang, Yi Wang, Shuning Wei, Xin Yu and Qiang Yang |
Session 4: Network Security 16:15-17:20 (13 Dec) [Room 1] Session Chair: Yu Wang |
---|
Fast discretized Gaussian sampling and post-quantum TLS ciphersuite Full Paper: 20 mins Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, Saraswathy Rv and Zhe Liu |
Automatic encryption schemes based on the neural networks: analysis and discussions on the various adversarial models Short Paper: 15 mins Yidan Zhang, James Marino, Jiageng Chen, Chunhua Su and Jinguang Han |
Relevance Filtering for Shared Cyber Threat Intelligence Short Paper: 15 mins Thomas Wagner, Esther Palomar, Khaled Mahbub and Ali Abdallah |
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment Short Paper: 15 mins Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang and Wen-Yu Kao |
Session 5: Social Network and QR Code Security 17:20-18:15 (13 Dec) [Room 1] Session Chair: Cheng-Kang Chu |
---|
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook Full Paper: 20 mins Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim and Sebastian Schrittwieser |
Covert QR Codes: How to Hide in the Crowd Full Paper: 20 mins Yang-Wai Chow, Willy Susilo and Joonsang Baek |
Home Location Protection in Mobile Social Networks: A Community based Method Short Paper: 15 mins Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang and Jin Li |
Session 6: Asymmetric Enc (1) 08:30-09:10 (14 Dec) [Room 1] Session Chair: Peng Zhang |
---|
The KDM-CCA Security of REACT Full Paper: 20 mins Jinyong Chang, Honglong Dai and Maozhi Xu |
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption Full Paper: 20 mins Yang Haomiao, Yunfan Huang, Yong Yu, Mingxuan Yao and Xiaosong Zhang |
Session 7: Blockchain 11:40-13:00 (14 Dec) [Room 1] Session Chair: Tsz Hon Yuen |
---|
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks Full Paper: 20 mins Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au and Xiaosong Zhang |
A User-Friendly Centrally Banked Cryptocurrency Full Paper: 20 mins Xuan Han, Yamin Liu and Haixia Xu |
Contract Coin: Toward Practical Contract Signing on Blockchain Full Paper: 20 mins Haibo Tian, Jie Jie He and Li Qing Fu |
TTP-free Fair Exchange of Digital Signatures with Bitcoin Full Paper: 20 mins Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen and Na Li |
Session 8: Asymmetric Enc (2) 16:30-17:10 (14 Dec) [Room 1] Session Chair: Yong Yu |
---|
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing Full Paper: 20 mins Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei and Kaitai Liang |
New Proof for BKP IBE Scheme and Improvement in the MIMC setting Full Paper: 20 mins Song Luo, Lu Yan, Jian Weng and Zheng Yang |
Session 9: Signature 17:10-18:25 (14 Dec) [Room 1] Session Chair: Shi-Feng Sun |
---|
Linearly Homomorphic Signatures with Designated Entities Full Paper: 20 mins Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu and Shao-Jun Yang |
Efficient Certicate-Based Signature and Its Aggregation Full Paper: 20 mins Xinxin Ma, Jun Shao, Cong Zuo and Ru Meng |
Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016 Full Paper: 20 mins Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada and Junpei Yamaguchi |
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Short Paper: 15 mins Bei Liang and Aikaterini Mitrokotsa |
Session 10: Asymmetric Enc (3) 08:35-09:50 (15 Dec) [Room 1] Session Chair: Chunhua Su |
---|
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key Full Paper: 20 mins Bo Lv, Zhiniang Peng and Shaohua Tang |
Key Bit-dependent Attack on Protected PKC using a Single-Trace Full Paper: 20 mins Bo-Yeon Sim and Dong-Guk Han |
Group-based Source-destination Verifiable Encryption with Blacklist Checking Full Paper: 20 mins Zhongyuan Yao, Yi Mu and Guomin Yang |
Compact Attribute-Based and Online-Offline Multi-Input Inner Product Encryptions from Static Assumptions Short Paper: 15 mins Pratish Datta |
Session 11: Cloud Security 08:35-09:50 (15 Dec) [Room 2] Session Chair: Jiageng Chen |
---|
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy Full Paper: 20 mins Clementine Gritti, Rongmao Chen, Willy Susilo and Thomas Plantard |
Outsourcing Encrypted Excel System Full Paper: 20 mins Ya-Nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang and Meixia Miao |
Outsourced Privacy Preserving Random Decision Tree Algorithm under Multi-Parties for Sensor-Cloud Integration Full Paper: 20 mins Li Ye, Zoe L. Jiang, Xuan Wang, Siu Ming Yiu and Junbin Fang |
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing Short Paper: 15 mins Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong and Julian Jang-Jaccard |
Session 12: Cyber-Physical Security 14:40-15:50 (15 Dec) [Room 1] Session Chair: Carsten Rudolph |
---|
Secure Communication in Unmanned Aerial Vehicle Network Full Paper: 20 mins Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin and Ya-Nan Li |
On the Security of In-Vehicle Hybrid Network: Status and Challenges Full Paper: 20 mins Tianxiang Huang, Jianying Zhou, Yi Wang and Anyu Cheng |
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving Short Paper: 15 mins Zhuo Wei, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng and Robert H. Deng |
Enforcing Security in Artificially Intelligent Robots using Monitors Short Paper: 15 mins Orhio Creado and Phu Dung Le |
Session 13: Authentication 16:20-17:20 (15 Dec) [Room 1] Session Chair: Sheng Wen |
---|
EyeSec: A practical shoulder-surfing resistant gaze-based authentication system Full Paper: 20 mins Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin and Wei Wu |
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing Full Paper: 20 mins Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang and Xingming Sun |
A Practical Authentication Protocol for Anonymous Web Browsing Full Paper: 20 mins Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang and Yali Zeng |
Session 14: Symmetric Enc 17:20-18:20 (15 Dec) [Room 1] Session Chair: Wun-She Yap |
---|
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications Full Paper: 20 mins Yu Sasaki and Kan Yasuda |
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-like Ciphers Full Paper: 20 mins Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li and Maodong Liao |
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption Full Paper: 20 mins Toshiya Shimizu and Takeshi Shimoyama |
Social Events |
---|
Welcome Reception 18:30-20:00 (13 Dec) [Platform 28] |
Conference Banquet 19:00-22:00 (14 Dec) [GoldLeaf Dockland] |
Note: our student helpers will take you from the conference venue to the restaurant immediately after the ending of all programs on that day. |
Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:
Paper Submission Due | |
Author Notification | 21 Sep 2017 |
Conference Date | 13-15 Dec 2017 |
Selected papers presented at the ISPEC 2017 will be invited to consider submission (after significant extension) for special issues in the following journals:
Future Generation Computer Systems (FGCS) Impact Factor: 3.997 Special Issue on Security and Privacy for Cyber-Physical Systems Learn more | |
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.133 Special Issue on Security and Privacy in Fog Computing Learn more | |
Information Sciences Impact Factor: 4.832 Special Issue on Innovative Smart Methods for Security: Emerging Trends and Research Challenges Learn more | |
Cluster Computing Impact Factor: 2.04 Special Issue on Security and Privacy Sensor-Cloud Integration Learn more |
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.
We are pleased to announce that the proceeding will be published by Springer as a volume of the Lecture Notes in Computer Science (LNCS) series. Author instructions and LaTeX/Word templates for LNCS publications can be found via the following link.
ISPEC 2017 Proceedings at Springer Link Free access to the ISPEC 2017 proceedings is available at Springer Link from 11 Dec 2017 to 11 Jan 2018. Proceedings |
Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016 Masaya Yasuda (Kyushu University, Japan) Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan) Masahiko Takenaka (Fujitsu Laboratories LTD, Japan) Narishige Abe (Fujitsu Laboratories LTD, Japan) Shigefumi Yamada (Fujitsu Laboratories LTD, Japan) Junpei Yamaguchi (Kyushu University, Japan) |
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-like Ciphers Xuan Shen (National University of Defense Technology, China) Ruilin Li (National University of Defense Technology, China) Bing Sun (National University of Defense Technology, China) Lei Cheng (National University of Defense Technology, China) Chao Li (National University of Defense Technology, China) Maodong Liao (Chinese Academy of Sciences, China) |
The KDM-CCA Security of REACT Jinyong Chang (Peking University, China) Honglong Dai (Peking University, China) Maozhi Xu (Peking University, China) |
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption Toshiya Shimizu (Fujitsu Laboratories LTD, Japan) Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan) |
Contract Coin: Toward Practical Contract Signing on Blockchain Haibo Tian, and (Sun yan-sen Univeristy, China) Jiejie He (Sun yan-sen Univeristy, China) Li Qing Fu (Sun yan-sen Univeristy, China) |
Linearly Homomorphic Signatures with Designated Entities Cheng-Jun Lin (Fujian Normal University, China) Xinyi Huang (Fujian Normal University, China) Shitang Li (Fujian Normal University, China) Wei Wu (Fujian Normal University, China) Shao-Jun Yang (Fujian Normal University, China) |
Fast discretized Gaussian sampling and post-quantum TLS ciphersuite Xinwei Gao (Beijing Jiaotong University, China) Lin Li( Beijing Jiaotong University, China) Jintai Ding (University of Cincinnati,USA) Jiqiang Liu( Beijing Jiaotong University, China) Saraswathy Rv(University of Cincinnati,USA) Zhe Liu(University of Luxembourg, Luxembourg ) |
TTP-free Fair Exchange of Digital Signatures with Bitcoin Wentao Zhang (Beihang university, China) Qianhong Wu (Beihang university, China) Bo Qin (Remin University of China, China) Tianxu Han (Beihang university, China) Yanting Zhang (Beihang university, China) Xiaofeng Chen (Xidian university, China) Na Li (Beihang university, China) |
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption Yang Haomiao (University of Electronic Science and Technology of China, China) Yunfan Huang (University of Electronic Science and Technology of China, China) Yong Yu ( Shaanxi Normal University) Mingxuan Yao(University of Electronic Science and Technology of China, China) Xiaosong Zhang(University of Electronic Science and Technology of China, China) |
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key Bo Lv (South China University of Technology, China) Zhiniang Peng (South China University of Technology, China) Shaohua Tang(South China University of Technology, China) |
A User-Friendly Centrally Banked Cryptocurrency Xuan Han (University of Chinese Academy of Sciences, China) Yamin Liu (University of Chinese Academy of Sciences, China) Haixia Xu (University of Chinese Academy of Sciences, China) |
Compact Lossy and All-but-One Trapdoor Functions from Lattice Leixiao Cheng, and (Fudan University, China) Quanshui Wu (Fudan University, China) Yunlei Zhao (Fudan University, China) |
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook Jinwoo Kim (Sungkyunkwan University, South Korea) Kuyju Kim (Sungkyunkwan University, South Korea) Junsung Cho (Sungkyunkwan University, South Korea) Hyoungshick Kim(Sungkyunkwan University, South Korea) Sebastian Schrittwieser(Saint Polten University, Australia) |
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing Kai He (Dongguan University of Technology, China) Xueqiao Liu (University of Wollongong, Australia) Huaqiang Yuan (Dongguan University of Technology, China) Wenhong Wei (Dongguan University of Technology, China) Kaitai Liang(Manchester Metropolitan University, United Kingdom) |
Efficient Certicate-Based Signature and Its Aggregation Xinxin Ma (Zhejiang Gongshang University, China) Jun Shao (Zhejiang Gongshang University, China) Cong Zuo (Monash University, Australia) Ru Meng (Shannxi Normal University, China) |
Group-based Source-destination Verifiable Encryption with Blacklist Checking Zhongyuan Yao (University of Wollongong, Australia) Yi Mu (University of Wollongong, Australia) Guomin Yang (University of Wollongong, Australia) |
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing Jian Shen (Nanjing University of Information Science and Technology, China) Meng Feng (Nanjing University of Information Science and Technology, China) Dengzhi Liu(Nanjing University of Information Science and Technology, China) Chen Wang(Nanjing University of Information Science and Technology, China) Jiachen Jiang(Nanjing University of Information Science and Technology, China) Xingming Sun(Nanjing University of Information Science and Technology, China) |
EyeSec: A practical shoulder-surfing resistant gaze-based authentication system Na Li (Beihang University, China) Qianhong Wu (Beihang University, China) Jingwen Liu (Potevio Information Technology Co., Ltd, China) Wei Hu (Potevio Information Technology Co., Ltd, China) Bo Qin (Renmin University of China, China) |
Outsourced Privacy Preserving Random Decision Tree Algorithm under Multi-Parties for Sensor-Cloud Integration Li Ye (Harbin Institute of Technology Shenzhen Graduate School, China) Zoe L. Jiang (Harbin Institute of Technology, China) Xuan Wang (Harbin Institute of Technology Shenzhen Graduate School, China) Siu Ming Yiu (The University of Hong Kong, Hong Kong) Junbin Fang (Jinan University, China) |
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications Yu Sasaki (NTT Corporation, Japan) Kan Yasuda (NTT Corporation, Japan) |
Secure Communication in Unmanned Aerial Vehicle Network Shuangyu He (Beihang university, China) Qianhong Wu (Beihang university, China) Jingwen Liu (Potevio Information Technology Co., Ltd, China) Wei Hu (Potevio Information Technology Co., Ltd, China) Bo Qin (Renmin University of China, China) Ya-Nan Li (Beihang university, China) |
Outsourcing Encrypted Excel System Ya-Nan Li (Beihang University, China) Qianhong Wu (Beihang University, China) Wenyi Tang (Renmin University of China, China) Bo Qin (Renmin University of China, China) Qin Wang (Beihang University, China) Meixia Miao (State Key Laboratory of Integrated Service Networks Xidian University, China) |
Defending Application Cache Integrity of Android Runtime Jia Wan (Queen's University, Canada) Mohammad Zulkernine (Queen's University, Canada) Phil Eisen (Irdeto Corporation, Canada) Clifford Liem (Irdeto Corporation, Canada) |
On the Security of In-Vehicle Hybrid Network: Status and Challenges Tianxiang Huang (Chongqing University of Posts and Telecommunications, China) Jianying Zhou (Singapore University of Technology and Design, Singapore) Yi Wang (Continental Automotive Singapore Pte Ltd , Singapore) Anyu Cheng (Chongqing University of Posts and Telecommunications, China) |
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy Clementine Gritti (EURECOM Sophia Antipolis, France) Rongmao Chen (National University of Defense Technology, China) Willy Susilo (University of Wollongong, Australia) Thomas Plantard (University of Wollongong, Australia) |
A lattice-based approach to Privacy-Preserving Biometric Authentication without relying on trusted third parties Trung Dinh (Monash University, Australia) Ron Steinfeld (Monash University, Australia) Nandita Bhattacharjee (Monash University, Australia) |
A Formal Model for an Ideal CFI Sepehr Minagar (Monash University, Australia) Balasubramaniam Srinivasan (Monash University, Australia) Phu Dung Le (Monash University, Australia) |
Covert QR Codes: How to Hide in the Crowd Yang-Wai Chow (University of Wollongong, Australia) Willy Susilo (University of Wollongong, Australia) Joonsang Baek (University of Wollongong, Australia) |
A Practical Authentication Protocol for Anonymous Web Browsing Xu Yang (RMIT University, Australia) Xun Yi (RMIT University, Australia) Hui Cui (RMIT University, Australia) Xuechao Yang (RMIT University, Australia) Surya Nepal (CSIRO, Australia) Xinyi Huang (Fujian Normal University, China) Yali Zeng (Fujian Normal University, China) |
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries Yanjun Shen (Monash University, Australia) Peng Zhang (Shenzheng University) |
Verifiable Range Query Processing for Cloud Computing Yanling Li (Jinan University, China) Junzuo Lai (Jinan University, China) Chuansheng Wang (Jinan University, China) Jianghe Zhang (Jinan University, China) Jie Xiong (Jinan University, China) |
Key Bit-dependent Attack on Protected PKC using a Single-Trace Bo-Yeon Sim (Kookmin University, South Korea) Dong-Guk Han (Kookmin University, South Korea) |
New Proof for BKP IBE Scheme and Improvement in the MIMC setting Song Luo (Chongqing University of Technology, China) Lu Yan (Chongqing University of Technology, China) Jian Weng (Jinan University, China) Zheng Yang (Chongqing University of Technology, China) |
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks Ting Chen (University of Electronic Science and Technology of China, China) Xiaoqi Li (The Hong Kong Polytechnic University, Hong Kong) Ying Wang (University of Electronic Science and Technology of China, China) Jiachi Chen (The Hong Kong Polytechnic University, Hong Kong) Zihao Li (University of Electronic Science and Technology of China, China) Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong) Man Ho Au (The Hong Kong Polytechnic University, Hong Kong) Xiaosong Zhang (University of Electronic Science and Technology of China, China) |
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation Lu Ren (Information Engineering University, China) Rui Chang (Information Engineering University, China) Qing Yin (Information Engineering University, China) Wei Wang(Information Engineering University, China) |
Home Location Protection in Mobile Social Networks: A Community based Method Bo Liu (La Trobe University, Australia) Wanlei Zhou (Deakin University, Australia) Shui Yu (Deakin University, Australia) Kun Wang(Nanjing University of Posts and Telecommunications, China) Yu Wang (Guangzhou University, China) Yong Xiang (Deakin University, Australia) |
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption Pradeep Kumar Mishra (Kyushu University, Japan) Dung Hoang Duong (Kyushu University, Japan) Masaya Yasuda (Kyushu University, Japan) |
Matching function-call graph of binary codes and its applications Yong Tang (National University of Defense Technology, China) Yi Wang (National University of Defense Technology, China) Shuning Wei (Hunan Normal University, China) Xin Yu (National University of Defense Technology, China) Qiang Yang (National University of Defense Technology, China) |
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing Hooman Alavizadeh (Massey University, New Zealand) Dong Seong Kim (University of Canterbury, New Zealand) Jin B. Hong (University of Canterbury, New Zealand) Julian Jang-Jaccard (Massey University, New Zealand) |
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks Zhi Wang (Nankai University, China) Jia Chunfu (Nankai University, China) |
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Bei Liang (Chalmers University of Technology, Sweden) Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden) |
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving Zhuo Wei (Shield Lab, Huawei, Singapore) Yanjiang Yang (Shield Lab, Huawei, Singapore) Yasmin Rehana (Shield Lab, Huawei, Singapore) Yongdong Wu (I2R, Astar, Singapore) Jian Weng (Jinan University, China) Robert H. Deng (Singapore Management University, Singapore ) |
A New Functional Encryption for Multidimensional Range Query Jia Xu (SingTel, Singapore) Ee-Chien Chang (National University of Singapore, Singapore) Jianying Zhou (SUTD, Singapore) |
Compact Attribute-Based and Online-Offline Multi-Input Inner Product Encryptions from Static Assumptions Pratish Datta (NTT Secure Platform Laboratories, Japan) |
Relevance Filtering for Shared Cyber Threat Intelligence Thomas Wagner (Birmingham City University, United Kingdom) Esther Palomar (Birmingham City University, United Kingdom) Khaled Mahbub (Birmingham City University, United Kingdom) Ali Abdallah (Birmingham City University, United Kingdom) |
Automatic encryption schemes based on the neural networks: analysis and discussions on the various adversarial models Yidan Zhang (CCNU, China) James Marino (CCNU, China) Jiageng Chen (CCNU, China) Chunhua Su (Aizu University, Japan) Jinguang Han (University of Surrey, United Kingdom) |
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment Mei-Ling Chiang (National Chi-Nan University, Taiwan) Jian-Kai Wang (Chang Gung University, Taiwan) Li-Chi Feng (Chang Gung University, Taiwan) Yang-Sen Chen (National Chi-Nan University, Taiwan) You-Chi Wang (Chang Gung University, Taiwan) Wen-Yu Kao (National Chi-Nan University, Taiwan) |
Enforcing Security in Artificially Intelligent Robots using Monitors Orhio Creado (Monash University, Australia) Phu Dung Le (Monash University, Australia) |
Full registration payment is required by 13 October 2017 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 13 October 2017 will result in the exclusion of the papers from the Conference Proceedings.
Registration Fee (in Australian Dollar) | By 13 October 2017 | After 13 October 2017 |
---|---|---|
Full Registration | $990 | $1090 |
Student Registration | $790 | N/A |
Extra Page (per page) | $100 | N/A |
Additional Conference Banquet Ticket (per person) | $130 | $130 |
Both types of registration include: full attendance of the conference, conference proceedings, welcome reception, conference banquet, morning teas, afternoon teas and lunches.
To be qualified for student registration, you must be currently enrolled as a full time student in a university or an institution. A scanned copy of your valid student ID card must be sent to the conference secretary (abby.xu@insightek.com.au). The student status will be verified.
Please note that if you are the only author registered for an accepted paper, you should choose Full Registration (instead of Student Registration) even though you are a student.
We strongly recommend all authors to format the papers within the page limits specified below. If extra pages are required, payment of $100 per extra page needs to be made together with the conference registration fee.
A conference banquet ticket is included in both full registration and student registration. Additional conference banquet tickets are available for purchase at the cost of $130 per person. Payment needs to be made together with the conference registration fee.
If you need an invitation letter, please contact the conference secretary (abby.xu@insightek.com.au) AFTER you complete the registration. The invitation letter can be issued once your registration payment is received.
Hard copy registration receipts can be collected at the reception desk during the conference.
Registration for the conference cannot be canceled. There is no refund of registration fees.
Please click the following link to complete your registration.
ISPEC 2017 Registration System
Payment via credit card or PayPal can be made directly in the registration system.
Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.
Account name | Insightek |
Bank Name | Commonwealth Bank of Australia |
Address of Insightek | 2B Service Road, Blackburn, VIC 3130, Australia |
SWIFT code | CTBAAU2S |
BSB/Account No | 063182 10939649 |
After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.
Robert Deng, Singapore Management University, Singapore
Yang Xiang, Swinburne University, Australia
Wanlei Zhou, Deakin University, Australia
Joseph K. Liu, Monash University, Australia
Pierangela Samarati, Università degli Studi di Milano, Italy
Xiao Chen, Deakin University, Australia
Yu Wang, Guangzhou University, China
Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, University of Wollongong, Australia
Zubair Baig, Edith Cowan University, Australia
Carlo Blundo, Università degli Studi di Salerno, Italy
Colin Boyd, Norwegian University of Science and Technology, Norway
Alvaro Cardenas, University of Texas at Dallas, US
Aniello Castiglione, University of Salerno, Italy
Jinjun Chen, Swinburne University, Australia
Liqun Chen, University of Surrey, UK
Xiaofeng Chen, Xidian University, China
Raymond Choo, University of Texas at San Antonio, US
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Sara Foresti, DI - Università degli Studi di Milano, Italy
Angelo Genovese, Università degli Studi di Milano, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Andreas Holzer, University of Toronto, Canada
Xinyi Huang, Fujian Normal University, China
Mitsugu Iwamoto, University of Electro-Comminications, Japan
Julian Jang-Jaccard, Massey University, New Zealand
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Ryan Ko, University of Waikato, New Zealand
Noboru Kunihiro, The University of Tokyo, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Junzuo Lai, Jinan University, China
Costas Lambrinoudakis, University of Piraeus, Greece
Albert Levi, Sabanci University, US
Li Li, University of Luxembourg, Luxembourg
Ming Li, University of Arizona, US
Kaitai Liang, Manchester Metropolitan University, UK
Joseph Liu, Monash University, Australia
Shengli Liu, Shanghai Jiao Tong University, China
Zhe Liu, University of Luxembourg, Luxembourg
Giovanni Livraga, Università degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Rongxing Lu, University of New Brunswick, Canada
Jiqiang Lu, Institute for Infocomm Research, Singapore
Chris Mitchell, Royal Holloway, University of London, UK
Yi Mu, University of Wollongong, Australia
Josef Pieprzyk, Queensland University of Technology, Australia
Sushmita Ruj, Indian Statistical Institute, India
Pierangela Samarati, Università degli Studi di Milano, Italy
Jun Shao, Zhejiang Gongshang University, China
Taeshik Shon, Ajou univ, Korea
Ron Steinfeld, Monash University, Australia
Chunhua Su, University of Aizu, Japan
Willy Susilo, University of Wollongong, Australia
Cong Wang, City University of Hong Kong, Hong Kong
Ding Wang, Peking University, China
Guilin Wang, Huawei, Singapore
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Qianhong Wu, Beihang University, China
Guomin Yang, University of Wollongong, Australia
Yanjiang Yang, Huawei, Singapore
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Masaya Yasuda, Kyushu University, Japan
Jiangshan Yu, University of Luxembourg, Luxembourg
Yong Yu, Shaanxi Normal University, China
Tsz Hon Yuen, Huawei, Singapore
ISPEC 2017 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from Southern Cross Station.
All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.