16th International Conference on Network and System Security
Denarau Island, Fiji
| Dec 9 - Dec 12, 2022
Day 1 (9 Dec 2022) @ Room: Frangipani & Gardenia | |
---|---|
8:30 - 8:35 | Opening: General Chair Remark Shawkat Ali, FIJI University |
8:35 - 8:45 | PC Chairs Remark Xingliang Yuan, Monash University |
8:45 - 9:30 | Keynote (I)
Session Chair: Guangdong Bai, University of Queensland Blockchain for Sustainability Informatics Joseph Liu, Monash University |
9:30 - 10:15 | Keynote (II)
Session Chair: Xingliang Yuan, Monash University Efficiently Deployable & Efficiently Searchable Encryption (EDESE) -- Applications, Attacks, and Countermeasures Robert Deng, Singapore Management University |
10:15 - 10:30 | Morning break |
10:30 - 11:15 | AI for network security I
Session Chair: Yuhong Liu, Santa Clara University
Vulnerability Detection Using Deep Learning Based Function Classification Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal and Chang Xu RAIDER: Reinforcement-aided Spear Phishing Detector Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal and Mike Johnstone A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics Stuart W. Hall, Amin Sakzad and Sepehr Minagar |
11:15 - 12:00 | (Industrial) Internet of Thing Security I
Session Chair: Siqi Ma, UNSW Canberra
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato and Kwok-Yan Lam Supporting cyber-attacks and system anomaly detection research with an Industry 4.0 dataset Lei Shi, Shanti Krishnan, Sheng Wen and Yang Xiang Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection Bhagyashri Tushir, Yuhong Liu and Behnam Dezfouli |
12:00 - 13:30 | Lunch break |
13:30 - 14:15 | Keynote (III)
Session Chair: Amin Sakzad, Monash University Effective Privacy Preservation in Blockchain Jinjun Chen, Swinburne University of Technology |
14:15 - 15:00 | Keynote (IV)
Session Chair: Tingmin (Tina) Wu, CSIRO’s Data61 Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation Raymond Choo, The University of Texas at San Antonio |
15:00 - 15:15 | Break |
15:15 - 16:15 | Network security
Session Chair: Lwin Khin Shar, SMU
Detecting Contradictions from CoAP RFC based on Knowledge Graph Xinguo Feng, Yanjun Zhang and Mark Huasong Meng A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches Kurt Friday, Elias Bou-Harb and Jorge Crichigno Exploiting redundancy in network flow information for efficient security attack detection Short Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah Monazam Erfani and Jeffrey Chan Reducing Intrusion Alert Trees to Aid Visualization Short Eric Ficke, Raymond Bateman and Shouhuai Xu Attacker Attribution Through Characteristics Inference Using Honeypot Data Short Pierre Crochelet, Christopher Neal, Nora Boulahia Cuppens and Frederic Cuppens |
16:15 - 17:00 | Blockchain security
Session Chair: Amin Sakzad, Monash University
BSB: Bringing Safe Browsing to Blockchain Platform Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu and Shengwu Xiong Forward Traceability for Product Authenticity Using Ethereum Smart Contracts Short Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj and Robin Doss Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach Short Yining Xie, Xin Kang, Tieyan Li, Cheng-Kang Chu and Haiguang Wang Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks Short Mengling Liu and Man Ho Au |
17:00 - 17:10 | Break |
17:10 - 17:40 | Cryptographic algorithms and protocols
Session Chair: Xingliang Yuan, Monash University
Strengthening the Security of AES Against Differential Fault Attack Anit Kumar Ghosal and Dipanwita Roychowdhury An efficient lattice-based encrypted search scheme with forward security Xiaoling Yu, Lei Xu, Xin Huang and Chungen Xu |
19:00 - 22:00 | Gala Dinner, Venue: Frangipani & Gardenia |
Day 2 (10 Dec 2022) @ Room: Frangipani & Gardenia | |
8:45 - 9:30 | Keynote V
Session Chair: Joseph Liu, Monash University Cloud Security Willy Susilo, The University of Wollongong |
9:30 - 10:15 | Keynote VI
Session Chair: Xingliang Yuan, Monash University Applications of NLP in Cybersecurity and Data Privacy Surya Nepal, CSIRO Data61 |
10:15 - 10:30 | Morning break |
10:30 - 11:20 | Mobile security
Session Chair: Guangdong Bai, University of Queensland
A First Look at Android Apps' Third-party Resources Loading Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Duc Linh Giang Nguyen, Muhammad Ikram, Gareth Tyson and Mohamad Ali Kaafar Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset Shuang Zhao, Jincheng Zhong, Shuhui Chen and Jianbing Liang A Beyond-5G Authentication and Key Agreement protocol Short Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian and Valtteri Niemi DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Short Bo Yang, Yanchao Zhang and Dong Tong |
11:20 - 12:15 | Privacy-preserving machine learning
Session Chair: Xiaoning (Maggie) Liu, RMIT
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang and Robin Doss An efficient clustering-based privacy-preserving recommender system Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang and Xu Yang The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning Han Xu, Priyadarsi Nanda, Jie Liang and Xiangjian He A Privacy-Preserving Distributed Machine Learning Protocol based on Homomorphic Hash Authentication Short Yang Hong, Lisong Wang, Weizhi Meng and Chunpeng Ge |
12:15 - 13:30 | Lunch break |
13:30 - 14:15 | Keynote VII
Session Chair: Guangdong Bai, University of Queensland Encrypted Database: Retrospective and Way Forward Cong Wang, City University of Hong Kong |
14:15-15:05 | Blockchain-powered systems
Session Chair: Yanjun Zhang, Deakin University
CVallet: a Blockchain-oriented Application Development for Education and Recruitment Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic and Wayne Yang Blockchain Based Regulatory Technology Deployment for Real Estate Transaction Ru Ray Raymond Chao, Joseph K. Liu and Kai Su Blockchain-based Access Control for Smart Manufacturer Secure Management System Short Aditya Kalapaaking, Ibrahim Khalil and Mohammad Rahman Decentralized Access Control for Secure Microservices Cooperation with Blockchain Short Ning Xi, Yajie Li and Jin Liu |
15:05 - 15:15 | Break |
15:15-16:10 | Attacks
Session Chair: Shun Li, NTU
Rebound Attacks on SKINNY hashing with Automatic Tools Jian Guo, Guozhen Liu, Shun Li and Phuong Pham Driver Locations Harvesting Attack on pRide Shyam Murthy and Srinivas Vivek Combination Reduction Algorithms and its application to Subversion Attack Wei Yang, Shaojun Yang Yang, Wei Wu and Yong Zhao Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Short Zhenzhen Bao, Jian Guo, Shun Li and Phuong Pham |
16:10-16:35 | AI for network security II
Session Chair: Xuhui Fan, University of Newcastle
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection Wei Hong, Jiao Yin, Mingshan You, Hua Wang and Jinli Cao Network Intrusion Detection Adversarial attacks for LEO Constellation Networks based on deep learning Short Li Yunhao, Mo Weichuan, Cong Li, Wang Haiyang, He Jianwei, Hao Shanshan and Yan Hongyang |
16:35-16:45 | Break |
16:45-17:35 | Privacy-preserving networked systems and protocols
Session Chair: Yanjun Zhang, Deakin University
Enabling Secure Deduplication in Encrypted Decentralized Storage Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu and Bin Guo Geometric Range Searchable Encryption with Forward and Backward Security Mengwei Yang, Chungen Xu and Pan Zhang Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server Short Hongcheng Xie, Zizhuo Chen, Yu Guo, Qin Liu and Xiaohua Jia Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare Short Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui and Fei Zhu |
17:35-17:55 | (Industrial) Internet of Thing Security II
Session Chair: Ruitao Feng, UNSW Sydney
A Survey on IoT Vulnerability Discovery Short Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen and Jun Zhang An efficient authenticated group key agreement protocol with dynamic batch verification for secure distributed networks Short Tianqi Zhou, Wenying Zheng and Haowen Tan |
17:55 - 18:00 | Conclusion |
19:00 - 22:00 | Cocktail Rounds, Venue: Frangipani & Gardenia |