14th International Conference on Network and System Security
Melbourne, Australia
| 25-27 November 2020
Day 1 (25 Nov 2020) | |
---|---|
9:00-9:10 | Opening (Prof. Yong Xiang and Prof. Miroslaw Kutylowski) |
9:10-10:10 | Keynote (I) Session Chair: Prof. Yang Xiang Privacy-preserving Analytics in the Big Data environment Jaideep Vaidya |
10:10-11:10 | Keynote (II) Session Chair: Dr. Chao Chen Security of 4G and 5G cellular networks Elisa Bertino |
11:10-11:20 | Morning break |
11:20-12:35 | Blockchain Session Chair: Dr. Tingmin Wu A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking Wenjuan Li, Jiao Tan and Yu Wang Security Evaluation of Smart Contract-based On-chain Ethereum Wallets Purathani Praitheeshan, Lei Pan and Robin Doss Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network Vatsal Patel, Lei Pan and Sutharshan Rajasegarar |
12:35-13:35 | Lunch break |
13:35-15:15 | System security (I) Session Chair: Dr. Xiao Chen A Weighted Voting Framework for Android App’s Vetting based on Multiple Machine Learning Models Honglei Hui, Yongbo Zhi, Ning Xi and Yuanqing Liu Evaluation of Anomaly-based Intrusion Detection with Combined Imbalance Correction and Feature Selection Andreas Heidelbach Engly, Anton Ruby Larsen and Weizhi Meng Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe and Yang Xiang Sequential Anomaly Detection using Feedback and Prioritized Experience Replay Anish Reddy Ellore, Sanket Mishra and Chittaranjan Hota |
15:15-15:30 | Afternoon break |
15:30-17:05 | System security (II) Session Chair: Dr. Shigang Liu HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication Michael Kiperberg, Raz Ben Yehuda and Nezer Jacob Zaidenberg Fixing Vulnerabilities Automatically with Linters Willard Rafnsson, Rosario Giustolisi, Mark Kragerup and Mathias Høyrup ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection Short Paper Christopher Chew, Vimal Kumar, Panos Patros and Robi Malik Defending Against Package Typosquatting Matthew Taylor, Ruturaj Vaidya, Drew Davidson, Lorenzo De Carli and Vaibhav Rastogi |
Day 2 (26 Nov 2020) | |
9:00-10:00 | Keynote (III) Session Chair: Prof. Yong Xiang Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation Xun Yi |
10:00-11:00 | Keynote (IV) Session Chair: A/Prof. Jun Zhang Privacy-Preserving Deep Packet Inspection on TLS Traffic Robert Deng |
11:00-11:10 | Morning break |
11:10-12:25 | Cryptography (I) Session Chair: Dr. Jianfeng Wang EnCoD: Distinguishing Compressed and Encrypted File Fragments Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli and Luigi V. Mancini AC0 constructions of secret sharing schemes – Accommodating new parties Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai Compactly Committing Authenticated Encryption Using Tweakable Block Cipher Shoichi Hirose |
12:25-13:25 | Lunch break |
13:25-14:30 | Cryptography (II) Session Chair: Dr. Leo Zhang Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging Mriganka Mandal and Koji Nuida A Model Specification Implementation for Trust Negotiations Short Paper Martin Kolar, Carmen Fernández-Gago and Javier Lopez PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences Short Paper Fangfang Yang, Mohammad Atiqul Islam and Shaolei Ren |
14:30-15:30 | Privacy Session Chair: Dr. Lei Pan Privacy and Utility trade-off for textual Analysis via Calibrated Multivariate Perturbations Short Paper Jingye Tang, Tianqing Zhu, Yu Wang, Ping Xiong and Wei Ren The Impact of Differential Privacy on Model Fairness in Federated learning Short Paper Xiuting Gu, Tianqing Zhu and Jie Li A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System Short Paper Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang and Longxiang Gao |
15:30-15:40 | Afternoon break |
15:40-16:50 | Security Analysis Session Chair: Dr. Nan Sun Safety analysis of high-dimensional anonymized data from multiple perspectives Yamazoe Takaya and Omote Kazumasa Game Theoretic Analysis of Reputation Approach on Block Withholding Attack Lianyang Yu, Jiangshan Yu and Yevhen Zolotavkin Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality Short Paper Bernd Prünster, Dominik Ziegler and Gerald Palfinger |
Day 3 (27 Nov 2020) | |
9:00-10:00 | Keynote (V) Session Chair: Prof. Miroslaw Kutylowski Confidential Computing: Challenges Today and Opportunities Tomorrow Xiaofeng Wang |
10:00-11:05 | Machine learning Security Session Chair: Xingliang Yuan Model Poisoning Defense on Federated Learning: A Validation Based Approach Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen and Wei Ren On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks Short Paper Fangfang Yang and Shaolei Ren Evading stepping-stone detection by using enough chaff perturbations Short Paper Henry Clausen, David Aspinall and Michael Gibson |
11:05-11:25 | Awards and Closing |