Melbourne, Australia
13-15 December 2017
Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity.
The 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) will be held in Melbourne, Australia on 13-15 December 2017. It follows the success of SocialSec 2015 in Hangzhou, China and SocialSec 2016 in Fiji. The aim of the symposium is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. In this year, SocialSec 2017 will be co-located with the 13th International Conference on Information Security Practice and Experience (ISPEC 2017).
Paper Submission Due | 25 September 2017 Final Extension |
Author Notification | 03 October 2017 Extended |
Camera-ready Paper Due | 07 October 2017 |
Registration Due | 13 October 2017 |
Symposium Date | 13-15 December 2017 |
SocialSec 2017 Schedule | |||||
---|---|---|---|---|---|
13 Dec | 14 Dec | 15 Dec | |||
Room 1 | Room 2 | Room 1 | Room 2 | Room 1 | Room 2 |
Registration | |||||
Opening | ISPEC | SocialSec 1 | ISPEC | ISPEC | |
Keynote 1 | Keynote 4 | ||||
Keynote 2 | Keynote 5 | Keynote 8 | |||
Coffee Break | |||||
ISPEC | MONAMI | Keynote 6 | Keynote 9 | ||
ISPEC | SocialSec 2 | Panel - IoT Sec | |||
Lunch | |||||
Keynote 3 | Keynote 7 | Keynote 10 | |||
ISPEC | MONAMI | Panel - Blockchain | ISPEC | MONAMI | |
Coffee Break | |||||
ISPEC | MONAMI | ISPEC | MONAMI | ISPEC | MONAMI |
SocialSec 3 | |||||
Welcome Reception | Conference Banquet | Closing |
Note: For details of ISPEC and MONAMI sessions, please refer to ISPEC and MONAMI.
ISPEC/SocialSec Keynotes [Room 1] |
---|
Keynote 3 (13 Dec) 13:50-14:30 Security Proof of Digital Signatures Learn more Willy Susilo, University of Wollongong, Australia Session Chair: Kaitai Liang, University of Surrey, UK |
Keynote 5 (14 Dec) 09:50-10:30 Secure Storage in the Cloud Using Bespoke Encryption Schemes Learn more Kenny Paterson, Royal Holloway University of London, UK Session Chair: Willy Susilo, University of Wollongong, Australia |
Keynote 6 (14 Dec) 11:00-11:40 Mind the Gap: Application-driven evaluation of Smart Contract languages Learn more Andrew Miller, University of Illinois, Urbana-Champaign, USA Session Chair: Joseph Liu, Monash University, Australia |
Keynote 7 (14 Dec) 14:00-14:40 Blockchain: How crypto meets the industry? Learn more Tsz Hon Yuen,Shield Lab at Huawei Singapore, Singapore Session Chair: Man Ho Au, Hong Kong Polytechnic University, Hong Kong |
Keynote 9 (15 Dec) 11:00-11:40 How to Control Access to Thousands of Shared IoT Devices Learn more Yuliang Zheng, University of Alabama at Birmingham, USA Session Chair: Ron Steinfeld, Monash University, Australia |
MONAMI Keynotes [Room 1] |
---|
Keynote 1 (13 Dec) 09:10-09:50 Privacy in Location Based Services Learn more Wanlei Zhou, Deakin University, Australia |
Keynote 2 (13 Dec) 09:50-10:30 Towards Reliable, Secure and Efficient Energy Supply with Large Renewable Energy at Affordable Price Learn more Joe Dong, UNSW, Sydney |
Keynote 4 (14 Dec) 09:10-09:50 Intermediate- and High-Level Structure Matching and Its Application in Biometrics Learn more Yongsheng Gao, Griffith University, Australia |
Keynote 8 (15 Dec) 09:50-10:30 Fuzzy Transfer Learning for Prediction Learn more Jie Lu, University of Technology Sydney, Australia |
Keynote 10 (15 Dec) 14:00-14:40 Networking for Big Data: Challenges and Opportunities Learn more Shui Yu, Deakin University, Australia |
Panel Discussion - Blockchain 14:40-16:00 (14 Dec) [Room 1] |
---|
Joseph Liu (Chair) Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab Monash University, Australia Man Ho Au (Allen) Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab Hong Kong Polytechnic University, Hong Kong Tsz Hon Yuen (John) Senior Researcher Shield Lab at Huawei Singapore, Singapore Andrew Miller Assistant Professor, Advisor Zcash University of Illinois, Urbana-Champaign, USA Khal Achkar Chief Technology Officer Hcash Foundation, Australia Jacob Cheng Chief Executive Officer Hyperchain, Australia |
Huawei Panel Discussion - IoT Sec 11:40-13:00 (15 Dec) [Room 1] |
---|
Robert Deng (Chair) Professor, IEEE Fellow Singapore Management University, Singapore Tieyan Li Head of Mobile IoT Security Shield Lab at Huawei Singapore, Singapore Kenny Paterson Professor Royal Holloway University of London, UK Yuliang Zheng Professor University of Alabama at Birmingham, USA Carsten Rudolph Director, Oceania Cyber Security Centre Monash University, Australia |
Session 1 08:30-09:10 (14 Dec) [Room 2] |
---|
Toward Fuzz Test Based on Protocol Reverse Engineering Jun Cai, Jian-Zhen Luo, Yan Liu and Fangyuan Lei |
How Spam Features Change in Twitter and The Impact to Machine Learning based Detection Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang and Wanlei Zhou |
Session 2 11:40-13:00 (14 Dec) [Room 2] |
---|
An Effective Authentication for Client Application using ARM TrustZone Jiang Hang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang and Shuiqiao Yang |
Generic Framework for Attribute-Based Group Signature Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu and Olivier Markowitch |
An improved leveled fully homomorphic encryption scheme over the integers Xiaoqiang Sun, Peng Zhang, Jianping Yu and Weixin Xie |
The ECCA Security of Hybrid Encryptions Honglong Dai, Jinyong Chang, Zhenduo Hou and Maozhi Xu |
Session 3 17:20-18:20 (15 Dec) [Room 2] |
---|
A Secure Server-based Pseudorandom Number Generator Protocol for Mobile Devices Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard and Hans W. Guesgen |
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki and Masakatsu Nishigaki |
Reasoning about Trust and Belief Change on a Social Network: A Formal Approach Aaron Hunter |
Conference Events |
---|
Registration 08:00-18:00 (13-15 Dec) [Registration Desk] |
Conference Banquet 19:00-22:00 (14 Dec) [GoldLeaf Dockland] |
Welcome Reception 18:30-20:00 (13 Dec) [Platform 28] |
Conference Banquet 19:00-22:00 (14 Dec) [GoldLeaf Dockland] |
Conference Closing 18:20-18:30 (15 Dec) [Room 1] |
Note: The order of speakers is sorted according to the alphabetical order of surname.
Andrew Miller
University of Illinois, Urbana-Champaign
USA
The past year has seen a proliferation of smart contracts systems --- program code on a cryptocurrency blockchain that moves around money. Ethereum is the most well known smart contract platform, though there are also many others. How can we evaluate the expressiveness of smart contract programming languages? In this talk, I'll present a line of research that takes several applications as case studies (a random coin flipping gadget, fair off-chain multiparty computations, and payment channel networks) and attempts to implement them in both Bitcoin script (UTXO-based) and in Ethereum (contract-based). In each setting, we find that the UTXO-based framework requires additional asymptotic overhead compared to Ethereum (either time, computing power, or locked-up collateral).
Biography: Andrew Miller is an Assistant Professor at the University of Illinois, Urbana-Champaign, in Electrical and Computer Engineering and affiliate in Computer Science. He is also an Associate Director of the Initiative for Cryptocurrencies and Contracts (IC3) and an advisor to the zcash project. He received his Ph.D. from the University of Maryland Cybersecurity Center. His research interests are broadly in computer security, and focused on the design of secure decentralized systems and cryptocurrencies. He combines techniques from programming languages, cryptography, and distributed computing.
Kenny Paterson
Royal Holloway University of London
UK
In this talk, we'll look at how bespoke encryption schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. Examples of such schemes include Deterministic Encryption and Order Preserving Encryption, as well as more advanced schemes such as Arx (Poddar et al.), the Lewi-Wu scheme, Kerschbaum's FH-OPE scheme, and CipherBase (Arasu et al.). We'll explain why currently proposed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.
Biography: Kenny Paterson is a Professor of Information Security at Royal Holloway University of London in the UK. His research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. He co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. He is now the editor-in-chief of the Journal of Cryptology. He was made a fellow of the IACR (International Association for Cryptologic Research) in 2017.
Digital signatures are the foundation of modern cryptography. We prove the security of a signature scheme by reducing an attack to solving an underlying hard problem. An ideal security reduction should be a tight reduction under a standard assumption in the standard security model without random oracles. Unfortunately, it is hard to program a security reduction capturing the above four features. In this talk, I will focus on tight reduction for digital signatures and introduce two different methods towards tight reduction.
Biography: Willy Susilo is a Professor and the Head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong in Australia. He was previously awarded the prestigious ARC Future Fellow by the Australian Research Council (ARC) and the Researcher of the Year award in 2016 by the University of Wollongong. His main research interests include cybersecurity, cryptography and information security. His work has been cited more than 9,000 times in Google Scholar. He is the Editor-in-Chief of the Information journal. He has served as a program committee member in dozens of international conferences. He is currently serving as an Associate Editors in several international journals, including Elsevier Computer Standards and Interface and International Journal of Information Security (IJIS, Springer). He has published more than 300 research papers in the area of cybersecurity and cryptology.
Tsz Hon Yuen
Shield Lab at Huawei Singapore
Singapore
Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.
Biography: Dr Tsz Hon Yuen is a senior researcher of Shield Lab at Huawei Singapore. He is a member of Cryptography Expert Group in Huawei. He received his PhD degree from University of Wollongong in 2010 and worked in University of Hong Kong before joining Huawei. His current research interests include public key encryption, digital signatures, privacy and blockchain. He has published more than 50 technical papers, including top journals and conferences such as IEEE TC and Eurocrypt. He received the Best Paper Award in ESRORICS 2014. He is also active in industrial fields with more than 10 patents. He has served as the PC members and reviewers for many security and cryptography conferences, workshops and journals.
Yuliang Zheng
University of Alabama at Birmingham
USA
The emerging Internet of Things (IoT) promises a highly connected world where tangible things around us are seamlessly integrated into the ever expanding cyber space, which is expected to result in greatly improved quality of life and economic growth. To realize those benefits, it is important for the IoT to have strong security and privacy measures built into it. This presents a number of challenges both at technical and system levels. This talk focuses on our research into controlling access to thousands or more of shared, resource-constrained IoT devices that are orders of magnitude more numerous than the number of passwords a typical person has to manage now. Specific research goals include:
Biography: Dr. Yuliang Zheng is widely known as the father of the signcryption technology which is now an ISO international standard for cyber security. His pioneering research in immunizing public key encryption against adaptive attacks has been embodied in a multiple number of industry standards including those from ISO, IEEE and IETF.
A prolific researcher with more than 200 refereed publications, Dr. Zheng has been at the forefront ofestablishing international standards for cryptographic engineering. His more recent research focus is on leveraging the Internet of Things, blockchains and Big Data to accelerate the progress of precision medicine.
He plays an active, leadership role in international research communities, co-founding the annual Public Key Cryptography (PKC) conference sponsored by the International Association for Cryptologic Research (IACR) and the annual International Conference on Information Theoretic Security (ICITS). In addition, he serves on the steering committees for a number of research and industrial forums including PKC (Chair of the PKC steering committee since 2007), International Conference on Information Theoretic Security, Information Security Conference, IEEE Security in Storage Workshop and IEEE Information Assurance Standards Committee.
Dr. Zheng was invited to serve as an associate editor of The Computer Journal published by the Oxford University Press and as a guest editor for the IEEE Transactions on Information Theory.
Dr. Yuliang Zheng earned his Bachelor's degree in computer science from Nanjing Institute of Technology (renamed Southeast University 1988), Nanjing, China in 1982. He completed his graduate studies at Yokohama National University in Japan, where he earned his master's and PhD degrees both in electrical and computer engineering, in 1988 and 1991 respectively. After completing his PhD, Dr. Zheng moved to Australia, working at first as a cyber security research scientist at the Australian Defense Force Academy, and then as a professor at the University of Wollongong and Monash University. In 2001, Dr. Zheng was recruited by a joint effort between Bank of America, Wachovia Bank (now part of Wells Fargo) and the University of North Carolina at Charlotte (UNCC) to establish and lead a research center for financial cyber security at UNCC. Since July 2015 he has been with the University of Alabama at Birmingham, serving as the Chair of UAB’s Department of Computer Science.
The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to:
Please click the above button to submit your paper through SocialSec 2017 Easychair submission system. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. The page limit is 16 pages excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Detailed author instructions and LaTeX/Word templates for LNCS publications can be found via the following link.
Springer LNCS Author Information
Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. All papers accepted by SocialSec 2017 will be included in a special track of the ISPEC 2017 conference proceedings, published by Springer as part of the Lecture Notes in Computer Science (LNCS) series, and indexed by EI Engineering, ISI Conference Proceedings Index, Scopus and other major indexing services. Selected high quality papers will be invited to consider submission after significant extension for the following special issue in SCI-Indexed Journal.
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.133 Special Issue on Security, Privacy and Social Networks Learn more | |
Full registration payment is required by 13 October 2017 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 13 October 2017 will result in the exclusion of the papers from the Conference Proceedings.
Registration Fee (in Australian Dollar) | By 13 October 2017 | After 13 October 2017 |
---|---|---|
Full Registration/Author Registration | $990 | $1090 |
Student Attendee Registration | $790 | N/A |
Additional Conference Banquet Ticket (per person) | $130 | $130 |
Both types of registration include: full attendance of the conference, conference proceedings, welcome reception, conference banquet, morning teas, afternoon teas and lunches.
To be qualified for student registration, you must be currently enrolled as a full time student in a university or an institution. A scanned copy of your valid student ID card must be sent to the conference secretary (abby.xu@insightek.com.au). The student status will be verified.
Please note that if you are the only author registered for an accepted paper, you should choose Full Registration even though you are a student.
A conference banquet ticket is included in both full registration and student registration. Additional conference banquet tickets are available for purchase at the cost of $130 per person. Payment needs to be made together with the conference registration fee.
If you need an invitation letter, please contact the conference secretary (abby.xu@insightek.com.au) AFTER you complete the registration. The invitation letter can be issued once your registration payment is received.
Hard copy registration receipts can be collected at the reception desk during the conference.
Registration for the conference cannot be canceled. There is no refund of registration fees.
Please click the following link to complete your registration.
SocialSec 2017 Registration System
Payment via credit card or PayPal can be made directly in the registration system.
Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.
Account name | Insightek |
Bank Name | Commonwealth Bank of Australia |
Address of Insightek | 2B Service Road, Blackburn, VIC 3130, Australia |
SWIFT code | CTBAAU2S |
BSB/Account No | 063182 10939649 |
After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.
Symeon Papadopoulos, CERTH-ITI, Greece
Yang Xiang, Swinburne University of Technology, Australia
Wanlei Zhou, Deakin University, Australia
Yuhong Liu, Santa Clara University, USA
Yu Wang, Deakin University, Australia
Joseph K. Liu, Monash University, Australia
Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Ero Balsa, University of Leuven, Belgium
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, UK
Richard Chbeir, IUT de Bayonne, France
Xiaofeng Chen, Xidian University, China
Alfredo Cuzzocrea, University of Trieste, Italy
Pedro García-Teodoro, University of Granada, Spain
Thomas Gottron, University of Koblenz-Landau, Germany
Sokratis Katsikas, University of Piraeus, Greece
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Rongxing Lu, University of New Brunswick, Canada
Weizhi Meng, Technical University of Denmark, Denmark
Franco Maria Nardini, ISTI-CNR, Italy
Jia-Yu Pan, Google, USA
Gerardo Pelosi, Politecnico di Milano, Italy
Neeli Prasad, International Technological University, USA
Edoardo Serra, Boise State University, USA
Hung-Min Sun, National Tsing Hua University, Taiwan
Ingmar Weber, Qatar Computing Research Institute, Qatar
Guomin Yang, University of Wollongong, Australia
Yong Yu, Shaanxi Normal University, China
Zhenfeng Zhang, Chinese Academy of Sciences, China
Xiaofang Zhou, University of Queensland, Australia
SocialSec 2017 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from the Southern Cross Station.
All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.
For further information regarding to SocialSec 2017, please contact nsclab.events@gmail.com.