NSS 2022

16th International Conference on Network and System Security
Denarau Island, Fiji
Dec 9 - Dec 12, 2022

Conference Program

Long Paper 15 mins (12 mins presentation + 3 mins QA)
Short Paper 10 mins presentation (8 mins presentation + 2 mins QA)

Day 1 (9 Dec 2022) @ Room: Frangipani & Gardenia
8:30 - 8:35 Opening: General Chair Remark
Shawkat Ali, FIJI University
8:35 - 8:45 PC Chairs Remark
Xingliang Yuan, Monash University
8:45 - 9:30 Keynote (I) Session Chair: Guangdong Bai, University of Queensland
Blockchain for Sustainability Informatics
Joseph Liu, Monash University
9:30 - 10:15 Keynote (II) Session Chair: Xingliang Yuan, Monash University
Efficiently Deployable & Efficiently Searchable Encryption (EDESE) -- Applications, Attacks, and Countermeasures
Robert Deng, Singapore Management University
10:15 - 10:30 Morning break
10:30 - 11:15 AI for network security I Session Chair: Yuhong Liu, Santa Clara University
Vulnerability Detection Using Deep Learning Based Function Classification
Huihui Gong, Siqi Ma, Seyit Camtepe, Surya Nepal and Chang Xu
RAIDER: Reinforcement-aided Spear Phishing Detector
Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal and Mike Johnstone
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics
Stuart W. Hall, Amin Sakzad and Sepehr Minagar
11:15 - 12:00 (Industrial) Internet of Thing Security I Session Chair: Siqi Ma, UNSW Canberra
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato and Kwok-Yan Lam
Supporting cyber-attacks and system anomaly detection research with an Industry 4.0 dataset
Lei Shi, Shanti Krishnan, Sheng Wen and Yang Xiang
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection
Bhagyashri Tushir, Yuhong Liu and Behnam Dezfouli
12:00 - 13:30 Lunch break
13:30 - 14:15 Keynote (III) Session Chair: Amin Sakzad, Monash University
Effective Privacy Preservation in Blockchain
Jinjun Chen, Swinburne University of Technology
14:15 - 15:00 Keynote (IV) Session Chair: Tingmin (Tina) Wu, CSIRO’s Data61
Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation
Raymond Choo, The University of Texas at San Antonio
15:00 - 15:15 Break
15:15 - 16:15 Network security Session Chair: Lwin Khin Shar, SMU
Detecting Contradictions from CoAP RFC based on Knowledge Graph
Xinguo Feng, Yanjun Zhang and Mark Huasong Meng
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches
Kurt Friday, Elias Bou-Harb and Jorge Crichigno
Exploiting redundancy in network flow information for efficient security attack detection Short
Siqi Xia, Sutharshan Rajasegarar, Christopher Leckie, Sarah Monazam Erfani and Jeffrey Chan
Reducing Intrusion Alert Trees to Aid Visualization Short
Eric Ficke, Raymond Bateman and Shouhuai Xu
Attacker Attribution Through Characteristics Inference Using Honeypot Data Short
Pierre Crochelet, Christopher Neal, Nora Boulahia Cuppens and Frederic Cuppens
16:15 - 17:00 Blockchain security Session Chair: Amin Sakzad, Monash University
BSB: Bringing Safe Browsing to Blockchain Platform
Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu and Shengwu Xiong
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts Short
Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj and Robin Doss
Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach Short
Yining Xie, Xin Kang, Tieyan Li, Cheng-Kang Chu and Haiguang Wang
Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks Short
Mengling Liu and Man Ho Au
17:00 - 17:10 Break
17:10 - 17:40 Cryptographic algorithms and protocols Session Chair: Xingliang Yuan, Monash University
Strengthening the Security of AES Against Differential Fault Attack
Anit Kumar Ghosal and Dipanwita Roychowdhury
An efficient lattice-based encrypted search scheme with forward security
Xiaoling Yu, Lei Xu, Xin Huang and Chungen Xu
19:00 - 22:00 Gala Dinner, Venue: Frangipani & Gardenia
Day 2 (10 Dec 2022) @ Room: Frangipani & Gardenia
8:45 - 9:30 Keynote V Session Chair: Joseph Liu, Monash University
Cloud Security
Willy Susilo, The University of Wollongong
9:30 - 10:15 Keynote VI Session Chair: Xingliang Yuan, Monash University
Applications of NLP in Cybersecurity and Data Privacy
Surya Nepal, CSIRO Data61
10:15 - 10:30 Morning break
10:30 - 11:20 Mobile security Session Chair: Guangdong Bai, University of Queensland
A First Look at Android Apps' Third-party Resources Loading
Hina Qayyum, Muhammad Salman, I Wayan Budi Sentana, Duc Linh Giang Nguyen, Muhammad Ikram, Gareth Tyson and Mohamad Ali Kaafar
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset
Shuang Zhao, Jincheng Zhong, Shuhui Chen and Jianbing Liang
A Beyond-5G Authentication and Key Agreement protocol Short
Mohamed Taoufiq Damir, Tommi Meskanen, Sara Ramezanian and Valtteri Niemi
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Short
Bo Yang, Yanchao Zhang and Dong Tong
11:20 - 12:15 Privacy-preserving machine learning Session Chair: Xiaoning (Maggie) Liu, RMIT
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang and Robin Doss
An efficient clustering-based privacy-preserving recommender system
Junwei Luo, Xun Yi, Fengling Han, Xuechao Yang and Xu Yang
The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning
Han Xu, Priyadarsi Nanda, Jie Liang and Xiangjian He
A Privacy-Preserving Distributed Machine Learning Protocol based on Homomorphic Hash Authentication Short
Yang Hong, Lisong Wang, Weizhi Meng and Chunpeng Ge
12:15 - 13:30 Lunch break
13:30 - 14:15 Keynote VII Session Chair: Guangdong Bai, University of Queensland
Encrypted Database: Retrospective and Way Forward
Cong Wang, City University of Hong Kong
14:15-15:05 Blockchain-powered systems Session Chair: Yanjun Zhang, Deakin University
CVallet: a Blockchain-oriented Application Development for Education and Recruitment
Zoey Ziyi Li, Joseph K. Liu, Jiangshan Yu, Dragan Gasevic and Wayne Yang
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction
Ru Ray Raymond Chao, Joseph K. Liu and Kai Su
Blockchain-based Access Control for Smart Manufacturer Secure Management System Short
Aditya Kalapaaking, Ibrahim Khalil and Mohammad Rahman
Decentralized Access Control for Secure Microservices Cooperation with Blockchain Short
Ning Xi, Yajie Li and Jin Liu
15:05 - 15:15 Break
15:15-16:10 Attacks Session Chair: Shun Li, NTU
Rebound Attacks on SKINNY hashing with Automatic Tools
Jian Guo, Guozhen Liu, Shun Li and Phuong Pham
Driver Locations Harvesting Attack on pRide
Shyam Murthy and Srinivas Vivek
Combination Reduction Algorithms and its application to Subversion Attack
Wei Yang, Shaojun Yang Yang, Wei Wu and Yong Zhao
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Short
Zhenzhen Bao, Jian Guo, Shun Li and Phuong Pham
16:10-16:35 AI for network security II Session Chair: Xuhui Fan, University of Newcastle
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
Wei Hong, Jiao Yin, Mingshan You, Hua Wang and Jinli Cao
Network Intrusion Detection Adversarial attacks for LEO Constellation Networks based on deep learning Short
Li Yunhao, Mo Weichuan, Cong Li, Wang Haiyang, He Jianwei, Hao Shanshan and Yan Hongyang
16:35-16:45 Break
16:45-17:35 Privacy-preserving networked systems and protocols Session Chair: Yanjun Zhang, Deakin University
Enabling Secure Deduplication in Encrypted Decentralized Storage
Bo Zhang, Helei Cui, Yaxing Chen, Xiaoning Liu, Zhiwen Yu and Bin Guo
Geometric Range Searchable Encryption with Forward and Backward Security
Mengwei Yang, Chungen Xu and Pan Zhang
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server Short
Hongcheng Xie, Zizhuo Chen, Yu Guo, Qin Liu and Xiaohua Jia
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare Short
Jianghua Liu, Lei Xu, Bruce Gu, Lei Cui and Fei Zhu
17:35-17:55 (Industrial) Internet of Thing Security II Session Chair: Ruitao Feng, UNSW Sydney
A Survey on IoT Vulnerability Discovery Short
Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen and Jun Zhang
An efficient authenticated group key agreement protocol with dynamic batch verification for secure distributed networks Short
Tianqi Zhou, Wenying Zheng and Haowen Tan
17:55 - 18:00 Conclusion
19:00 - 22:00 Cocktail Rounds, Venue: Frangipani & Gardenia
Fiji National University
Monash University
University of QueensLand
NSCLab class
Springer
Malaga
Concordia