13th International Conference on Network and System Security
Sapporo, Japan
| 15-18 December 2019
Day 0 (15 Dec 2019) | |
---|---|
18:00-20:00 | Reception (Kirin Beer Garden Urban) Map |
Day 1 (16 Dec 2019) @ 2F Room 204 | |
09:00-09:20 | Opening |
09:20-10:00 | Keynote (I) Session Chair: Joseph Liu Order-Revealing Encryption: Constructions and Attacks David Cash |
10:00-10:20 | Best Paper Session Chair: Joseph Liu Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture Xinshu Ma, Chunpeng Ge, Zhe Liu |
10:20-10:50 | Morning Tea and Poster |
10:50-12:30 | Blockchain (I) Session Chair: Mingwu Zhang Ethereum Analysis via Node Clustering Hanyi Sun, Na Ruan, Hanqing Liu LaT-Voting: Traceable Anonymous E-Voting on Blockchain Peng Li, Junzuo Lai Distributed Secure Storage System Based on Blockchain and TPA Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique Zhentian Xiong, Zoe L. Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang A Practical Dynamic Enhanced BFT protocol Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu |
12:30-13:30 | Lunch |
13:30-14:10 | Keynote (II) Session Chair: Chunhua Su Android HIV: Repackaging Malware for Evading Machine-Learning Detection Yang Xiang |
14:10-15:30 | Network Security Session Chair: Xingliang Yuan A Graph Database-based Approach to Analyze Network Log Files Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien An Le Khac OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms Luis Filipe Dias, Helder Reia, Rui Neves, Miguel Correia A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System view or update Li Zhang, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, Wei Wang A Comparative Study on Network Traffic Clustering Yang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang, Jin Li |
15:30-16:00 | Afternoon Tea and Poster |
16:00-16:40 | Keynote (III) Session Chair: Jun Shao Access Control Encryption – General Framework and Practical Constructions Sherman Chow |
16:40-18:00 | Cryptography (I) Session Chair: Tsz Hon Yuen Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey Qingqing Gan, Cong Zuo, Jianfeng Wang, Shi-Feng Sun, Xiaoming Wang Attribute Based Encryption with Publicly Verifiable Outsourced Decryption Hui Zheng, Jun Shao, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao Lattice based verifiably encrypted double authentication preventing signatures Jinhui Liu, Yong Yu A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter Kang Li, Wang Fat Lau, Man Ho Au |
18:00-18:40 | Miscellaneous Session Chair: Cong Zuo Tell Them From Me: an Encrypted Application Profiler Mohammad Mamun, Rongxing Lu, Manon Gaudet Threat Assessment of Enterprise Applications via Graphical Modelling Rk Shyamasundar, Manjunath Bilur, Anugrah Gari |
19:00-21:00 | Dinner (Hana no Mai East Sapporo | Seafood pub) Directions Address: 2 Chome-4-15 Higashisapporo 2 Jo, Shiroishi Ward, Sapporo, Hokkaido 003-0002 |
Day 2 (17 Dec 2019) @ 2F Room 204 | |
09:00-09:40 | Keynote (IV) Session Chair: Na Ruan Security of Electronic Voting Schemes after Blockchain Kouichi Sakurai |
09:40-10:40 | Cryptography (II) Session Chair: Cong Zuo Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks Bagus Santoso, Yasutada Oohama, Chunhua Su Sequential Aggregate MACs with Detecting Functionality Revisited Shingo Sato, Shoichi Hirose, Junji Shikata Cryptanalysis of Raindrop and FBC Bingqing Ren, Jiageng Chen, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang |
10:40-11:10 | Morning Tea and Poster |
11:10-12:25 | IoT/IoV Security Session Chair: Jiageng Chen A Privacy-Enhancing Framework for Internet of Things Services Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained IoT Gabriel Jerome Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks A Muti-attributes-based Trust Model of Internet of Vehicle Short Wei Ou, Entao Luo, Zhiyuan Tan |
12:25-13:25 | Lunch |
13:25-14:05 | Keynote (V) Session Chair: Chunhua Su Trusted IoT Framework Kuo-Hui Yeh |
14:05-15:40 | Blockchain (II) Session Chair: Sherman Chow An Efficient Vulnerability Detection Model for Ethereum Smart Contracts Jingjing Song, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, Wei Wang Gnocchi: Multiplexed Payment Channels for Cryptocurrencies Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu Difficulty of decentralized structure due to rational user behavior on blockchain Mitsuyoshi Imamura, Kazumasa Omote New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications Short Xu Wang, Ping Yu, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo |
15:40-16:10 | Afternoon Tea and Poster |
16:10-16:50 | Machine Learning (I) Session Chair: Jianfeng Wang Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation Liu Liu, Chao Chen, Jun Zhang, Olivier De Vel (Australia Defence Science and Technology, Yang Xiang Detecting Intruders by User File Access Patterns Shou-Hsuan Huang, Zechun Cao, Calvin Raines, Mai Yang, Camille Simon |
16:50-17:50 | Audio and Biometrics Security Session Chair: Jianfeng Wang Using Audio Characteristics for Mobile Device Authentication Matthew Dekker, Vimal Kumar Pre-adjustment Based Anti-collusion Mechanism for Audio Signals Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Gleb Beliakov EEG-based Authentication with Variational Universal Background Model Huyen Tran, Dat Tran, Wanli Ma, Phuoc Nguyen |
19:00-22:00 | Banquet (Otaru Bettei) Website Address: 〒064-0804 Hokkaido, Sapporo, Chuo Ward, Minami 4 Jonishi, 4 Chome-11 Susuran Building 8F |
Day 3 (18 Dec 2019) @ 2F Room 204 | |
09:00-09:40 | Keynote (VI) Session Chair: Weizhi Meng Hardening Database Padding for Searchable Encryption Xingliang Yuan |
09:40-10:45 | Cryptography (III) Session Chair: Weizhi Meng Strong Known Related-Key Attacks and the Security of ECDSA Tsz Hon Yuen, Siu Ming Yiu An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol Short Ou Ruan, Yang Yang, Mingwu Zhang Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices Short Maharage Nisansala Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama Derandomized PACE with Mutual Authentication Short Miroslaw Kutylowski, Adam Bobowski |
10:45-11:15 | Morning Tea and Poster |
11:15-12:15 | Machine Learning (II) Session Chair: Qianhong Wu Privacy Preserving Machine Learning with Limited Information Leakage Wenyi Tang, Bo Qin, Suyun Zhao, Boning Zhao, Yunzhi Xue, Hong Chen A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache |
12:15-13:15 | Lunch |
13:15-14:30 | Privacy and Localization Session Chair: Cheng-Kang Chu Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP Juan Luo, Lei Yang, Chun Wang, Huan Zhao Privacy-Preserving Sequential Data Publishing Huili Wang, Wen Ping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform Sibghat Bazai, Julian Jang-Jaccard Privacy-preserving k-means clustering: an application to driving style recognition Short Othmane El Omri, Aymen Boudguiga, Malika Izabachene, Witold Klaudel |
14:30-15:25 | Enterprise and Web Security Session Chair: Hsiao-Ying Lin Towards Secure Open Banking Architecture: An Evaluation with OWASP Deina Kellezi, Christian Boegelund, Weizhi Meng OVERSCAN: OAuth 2.0 Scanner for Missing Parameters Karin Sumongkayothin, Pakpoom Rachtrachoo, Arnuphap Yupuech, Kasidit Siriporn Using Sparse Composite Document Vectors to Classify VBA Macros Short Mamoru Mimura |
15:25-15:45 | Closing |
Presentation Time: Full / Invited Paper: 20 min Short Paper: 15 min Keynote: 40 min