NSS 2019

13th International Conference on Network and System Security
Sapporo, Japan
15-18 December 2019

Conference Program

Day 0 (15 Dec 2019)
18:00-20:00Reception (Kirin Beer Garden Urban) Map
Day 1 (16 Dec 2019) @ 2F Room 204
09:00-09:20Opening
09:20-10:00Keynote (I) Session Chair: Joseph Liu
Order-Revealing Encryption: Constructions and Attacks
David Cash
10:00-10:20Best Paper Session Chair: Joseph Liu
Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture
Xinshu Ma, Chunpeng Ge, Zhe Liu
10:20-10:50Morning Tea and Poster
10:50-12:30Blockchain (I) Session Chair: Mingwu Zhang
Ethereum Analysis via Node Clustering
Hanyi Sun, Na Ruan, Hanqing Liu
LaT-Voting: Traceable Anonymous E-Voting on Blockchain
Peng Li, Junzuo Lai
Distributed Secure Storage System Based on Blockchain and TPA
Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique
Zhentian Xiong, Zoe L. Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang
A Practical Dynamic Enhanced BFT protocol
Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu
12:30-13:30Lunch
13:30-14:10Keynote (II) Session Chair: Chunhua Su
Android HIV: Repackaging Malware for Evading Machine-Learning Detection
Yang Xiang
14:10-15:30Network Security Session Chair: Xingliang Yuan
A Graph Database-based Approach to Analyze Network Log Files
Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien An Le Khac
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms
Luis Filipe Dias, Helder Reia, Rui Neves, Miguel Correia
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System view or update
Li Zhang, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, Wei Wang
A Comparative Study on Network Traffic Clustering
Yang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang, Jin Li
15:30-16:00Afternoon Tea and Poster
16:00-16:40Keynote (III) Session Chair: Jun Shao
Access Control Encryption – General Framework and Practical Constructions
Sherman Chow
16:40-18:00Cryptography (I) Session Chair: Tsz Hon Yuen
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey
Qingqing Gan, Cong Zuo, Jianfeng Wang, Shi-Feng Sun, Xiaoming Wang
Attribute Based Encryption with Publicly Verifiable Outsourced Decryption
Hui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao
Lattice based verifiably encrypted double authentication preventing signatures
Jinhui Liu, Yong Yu
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter
Kang Li, Wang Fat Lau, Man Ho Au
18:00-18:40Miscellaneous Session Chair: Cong Zuo
Tell Them From Me: an Encrypted Application Profiler
Mohammad Mamun, Rongxing Lu, Manon Gaudet
Threat Assessment of Enterprise Applications via Graphical Modelling
Rk Shyamasundar, Manjunath Bilur, Anugrah Gari
19:00-21:00Dinner (Hana no Mai East Sapporo | Seafood pub) Directions
Address: 2 Chome-4-15 Higashisapporo 2 Jo, Shiroishi Ward, Sapporo, Hokkaido 003-0002
Day 2 (17 Dec 2019) @ 2F Room 204
09:00-09:40Keynote (IV) Session Chair: Na Ruan
Security of Electronic Voting Schemes after Blockchain
Kouichi Sakurai
09:40-10:40Cryptography (II) Session Chair: Cong Zuo
Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks
Bagus Santoso, Yasutada Oohama, Chunhua Su
Sequential Aggregate MACs with Detecting Functionality Revisited
Shingo Sato, Shoichi Hirose, Junji Shikata
Cryptanalysis of Raindrop and FBC
Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang
10:40-11:10Morning Tea and Poster
11:10-12:25IoT/IoV Security Session Chair: Jiageng Chen
A Privacy-Enhancing Framework for Internet of Things Services
Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing
Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li
Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained IoT
Gabriel Jerome Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks
A Muti-attributes-based Trust Model of Internet of Vehicle Short
Wei Ou, Entao Luo, Zhiyuan Tan
12:25-13:25Lunch
13:25-14:05Keynote (V) Session Chair: Chunhua Su
Trusted IoT Framework
Kuo-Hui Yeh
14:05-15:40Blockchain (II) Session Chair: Sherman Chow
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts
Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies
Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu
Difficulty of decentralized structure due to rational user behavior on blockchain
Mitsuyoshi Imamura, Kazumasa Omote
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost
Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang
A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications Short
Xu Wang, Ping Yu, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo
15:40-16:10Afternoon Tea and Poster
16:10-16:50Machine Learning (I) Session Chair: Jianfeng Wang
Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation
Liu Liu, Chao Chen, Jun Zhang, Olivier De Vel (Australia Defence Science and Technology, Yang Xiang
Detecting Intruders by User File Access Patterns
Shou-Hsuan Huang, Zechun Cao, Calvin Raines, Mai Yang, Camille Simon
16:50-17:50Audio and Biometrics Security Session Chair: Jianfeng Wang
Using Audio Characteristics for Mobile Device Authentication
Matthew Dekker, Vimal Kumar
Pre-adjustment Based Anti-collusion Mechanism for Audio Signals
Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Gleb Beliakov
EEG-based Authentication with Variational Universal Background Model
Huyen Tran, Dat Tran, Wanli Ma, Phuoc Nguyen
19:00-22:00Banquet (Otaru Bettei) Website
Address: 〒064-0804 Hokkaido, Sapporo, Chuo Ward, Minami 4 Jonishi, 4 Chome-11 Susuran Building 8F
Day 3 (18 Dec 2019) @ 2F Room 204
09:00-09:40Keynote (VI) Session Chair: Weizhi Meng
Hardening Database Padding for Searchable Encryption
Xingliang Yuan
09:40-10:45Cryptography (III) Session Chair: Weizhi Meng
Strong Known Related-Key Attacks and the Security of ECDSA
Tsz Hon Yuen, Siu Ming Yiu
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol Short
Ou Ruan, Yang Yang, Mingwu Zhang
Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices Short
Maharage Nisansala Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama
Derandomized PACE with Mutual Authentication Short
Miroslaw Kutylowski, Adam Bobowski
10:45-11:15Morning Tea and Poster
11:15-12:15Machine Learning (II) Session Chair: Qianhong Wu
Privacy Preserving Machine Learning with Limited Information Leakage
Wenyi Tang, Bo Qin, Suyun Zhao, Boning Zhao, Yunzhi Xue, Hong Chen
A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration
Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma
Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks
Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache
12:15-13:15Lunch
13:15-14:30Privacy and Localization Session Chair: Cheng-Kang Chu
Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP
Juan Luo, Lei Yang, Chun Wang, Huan Zhao
Privacy-Preserving Sequential Data Publishing
Huili Wang, Wen Ping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu
SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform
Sibghat Bazai, Julian Jang-Jaccard
Privacy-preserving k-means clustering: an application to driving style recognition Short
Othmane El Omri, Aymen Boudguiga, Malika Izabachene, Witold Klaudel
14:30-15:25Enterprise and Web Security Session Chair: Hsiao-Ying Lin
Towards Secure Open Banking Architecture: An Evaluation with OWASP
Deina Kellezi, Christian Boegelund, Weizhi Meng
OVERSCAN: OAuth 2.0 Scanner for Missing Parameters
Karin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, Kasidit Siriporn
Using Sparse Composite Document Vectors to Classify VBA Macros Short
Mamoru Mimura
15:25-15:45Closing

Presentation Time: Full / Invited Paper: 20 min Short Paper: 15 min Keynote: 40 min

Deakin Univesity
Zhejiang Gongshang University
NSCLab
Springer