SocialSec 2017

Melbourne, Australia
13-15 December 2017

Welcome to Melbourne

Social Networks and Big Data have pervaded all aspects of our daily lives. With their unparalleled popularity, social networks have evolved from the platforms for social communication and news dissemination, to indispensable tools for professional networking, social recommendations, marketing, and online content distribution. Social Networks, together with other activities, produce Big Data that is beyond the ability of commonly used computer software and hardware tools to capture, manage, and process within a tolerable elapsed time. It has been widely recognised that security and privacy are the critical challenges for Social Networks and Big Data applications due to their scale, complexity and heterogeneity.

The 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) will be held in Melbourne, Australia on 13-15 December 2017. It follows the success of SocialSec 2015 in Hangzhou, China and SocialSec 2016 in Fiji. The aim of the symposium is to provide a leading edge forum to foster interactions between researchers and developers with the security and privacy communities in Social Networks and Big Data, and to give attendees an opportunity to interact with experts in academia, industry, and governments. In this year, SocialSec 2017 will be co-located with the 13th International Conference on Information Security Practice and Experience (ISPEC 2017).

Important Dates

Paper Submission Due25 September 2017 Final Extension
Author Notification03 October 2017 Extended
Camera-ready Paper Due07 October 2017
Registration Due13 October 2017
Symposium Date13-15 December 2017

Call For Papers in Plaintext Call For Papers on EasyChair

Conference Schedule

SocialSec 2017 Schedule
13 Dec14 Dec15 Dec
Room 1Room 2Room 1Room 2Room 1Room 2
Registration
OpeningISPECSocialSec 1ISPECISPEC
Keynote 1Keynote 4
Keynote 2Keynote 5Keynote 8
Coffee Break
ISPECMONAMIKeynote 6Keynote 9
ISPECSocialSec 2Panel - IoT Sec
Lunch
Keynote 3Keynote 7Keynote 10
ISPECMONAMIPanel - BlockchainISPECMONAMI
Coffee Break
ISPECMONAMIISPECMONAMIISPECMONAMI
SocialSec 3
Welcome ReceptionConference BanquetClosing

Note: For details of ISPEC and MONAMI sessions, please refer to ISPEC and MONAMI.

Technical Program

ISPEC/SocialSec Keynotes
[Room 1]
Keynote 3 (13 Dec) 13:50-14:30
Security Proof of Digital Signatures

Learn more


Willy Susilo, University of Wollongong, Australia
Session Chair: Kaitai Liang, University of Surrey, UK
Keynote 5 (14 Dec) 09:50-10:30
Secure Storage in the Cloud Using Bespoke Encryption Schemes

Learn more


Kenny Paterson, Royal Holloway University of London, UK
Session Chair: Willy Susilo, University of Wollongong, Australia
Keynote 6 (14 Dec) 11:00-11:40
Mind the Gap: Application-driven evaluation of Smart Contract languages

Learn more


Andrew Miller, University of Illinois, Urbana-Champaign, USA
Session Chair: Joseph Liu, Monash University, Australia
Keynote 7 (14 Dec) 14:00-14:40
Blockchain: How crypto meets the industry?

Learn more


Tsz Hon Yuen,Shield Lab at Huawei Singapore, Singapore
Session Chair: Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Keynote 9 (15 Dec) 11:00-11:40
How to Control Access to Thousands of Shared IoT Devices

Learn more


Yuliang Zheng, University of Alabama at Birmingham, USA
Session Chair: Ron Steinfeld, Monash University, Australia
MONAMI Keynotes
[Room 1]
Keynote 1 (13 Dec) 09:10-09:50
Privacy in Location Based Services Learn more
Wanlei Zhou, Deakin University, Australia
Keynote 2 (13 Dec) 09:50-10:30
Towards Reliable, Secure and Efficient Energy Supply with Large Renewable Energy at Affordable Price Learn more
Joe Dong, UNSW, Sydney
Keynote 4 (14 Dec) 09:10-09:50
Intermediate- and High-Level Structure Matching and Its Application in Biometrics Learn more
Yongsheng Gao, Griffith University, Australia
Keynote 8 (15 Dec) 09:50-10:30
Fuzzy Transfer Learning for Prediction Learn more
Jie Lu, University of Technology Sydney, Australia
Keynote 10 (15 Dec) 14:00-14:40
Networking for Big Data: Challenges and Opportunities Learn more
Shui Yu, Deakin University, Australia
Panel Discussion - Blockchain
14:40-16:00 (14 Dec) [Room 1]
Joseph Liu (Chair)
Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab
Monash University, Australia

Man Ho Au (Allen)
Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab
Hong Kong Polytechnic University, Hong Kong

Tsz Hon Yuen (John)
Senior Researcher
Shield Lab at Huawei Singapore, Singapore

Andrew Miller
Assistant Professor, Advisor Zcash
University of Illinois, Urbana-Champaign, USA

Khal Achkar
Chief Technology Officer
Hcash Foundation, Australia

Jacob Cheng
Chief Executive Officer
Hyperchain, Australia
Huawei Panel Discussion - IoT Sec
11:40-13:00 (15 Dec) [Room 1]
Robert Deng (Chair)
Professor, IEEE Fellow
Singapore Management University, Singapore

Tieyan Li
Head of Mobile IoT Security
Shield Lab at Huawei Singapore, Singapore

Kenny Paterson
Professor
Royal Holloway University of London, UK

Yuliang Zheng
Professor
University of Alabama at Birmingham, USA

Carsten Rudolph
Director, Oceania Cyber Security Centre
Monash University, Australia
Session 1
08:30-09:10 (14 Dec) [Room 2]
Toward Fuzz Test Based on Protocol Reverse Engineering
Jun Cai, Jian-Zhen Luo, Yan Liu and Fangyuan Lei
How Spam Features Change in Twitter and The Impact to Machine Learning based Detection
Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang and Wanlei Zhou
Session 2
11:40-13:00 (14 Dec) [Room 2]
An Effective Authentication for Client Application using ARM TrustZone
Jiang Hang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang and Shuiqiao Yang
Generic Framework for Attribute-Based Group Signature
Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu and Olivier Markowitch
An improved leveled fully homomorphic encryption scheme over the integers
Xiaoqiang Sun, Peng Zhang, Jianping Yu and Weixin Xie
The ECCA Security of Hybrid Encryptions
Honglong Dai, Jinyong Chang, Zhenduo Hou and Maozhi Xu
Session 3
17:20-18:20 (15 Dec) [Room 2]
A Secure Server-based Pseudorandom Number Generator Protocol for Mobile Devices
Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard and Hans W. Guesgen
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki and Masakatsu Nishigaki
Reasoning about Trust and Belief Change on a Social Network: A Formal Approach
Aaron Hunter
Conference Events
Registration
08:00-18:00 (13-15 Dec) [Registration Desk]
Conference Banquet
19:00-22:00 (14 Dec) [GoldLeaf Dockland]
Welcome Reception
18:30-20:00 (13 Dec) [Platform 28]
Conference Banquet
19:00-22:00 (14 Dec) [GoldLeaf Dockland]
Conference Closing
18:20-18:30 (15 Dec) [Room 1]

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Mind the Gap: Application-driven evaluation of Smart Contract languages

Andrew Miller
University of Illinois, Urbana-Champaign
USA

Learn More

Abstract

The past year has seen a proliferation of smart contracts systems --- program code on a cryptocurrency blockchain that moves around money. Ethereum is the most well known smart contract platform, though there are also many others. How can we evaluate the expressiveness of smart contract programming languages? In this talk, I'll present a line of research that takes several applications as case studies (a random coin flipping gadget, fair off-chain multiparty computations, and payment channel networks) and attempts to implement them in both Bitcoin script (UTXO-based) and in Ethereum (contract-based). In each setting, we find that the UTXO-based framework requires additional asymptotic overhead compared to Ethereum (either time, computing power, or locked-up collateral).

Biography: Andrew Miller is an Assistant Professor at the University of Illinois, Urbana-Champaign, in Electrical and Computer Engineering and affiliate in Computer Science. He is also an Associate Director of the Initiative for Cryptocurrencies and Contracts (IC3) and an advisor to the zcash project. He received his Ph.D. from the University of Maryland Cybersecurity Center. His research interests are broadly in computer security, and focused on the design of secure decentralized systems and cryptocurrencies. He combines techniques from programming languages, cryptography, and distributed computing.

Secure Storage in the Cloud Using Bespoke Encryption Schemes

Kenny Paterson
Royal Holloway University of London
UK

Learn More

Abstract

In this talk, we'll look at how bespoke encryption schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. Examples of such schemes include Deterministic Encryption and Order Preserving Encryption, as well as more advanced schemes such as Arx (Poddar et al.), the Lewi-Wu scheme, Kerschbaum's FH-OPE scheme, and CipherBase (Arasu et al.). We'll explain why currently proposed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.

Biography: Kenny Paterson is a Professor of Information Security at Royal Holloway University of London in the UK. His research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. He co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. He is now the editor-in-chief of the Journal of Cryptology. He was made a fellow of the IACR (International Association for Cryptologic Research) in 2017.

Security Proof of Digital Signatures

Willy Susilo
University of Wollongong
Australia

Learn More

Abstract

Digital signatures are the foundation of modern cryptography. We prove the security of a signature scheme by reducing an attack to solving an underlying hard problem. An ideal security reduction should be a tight reduction under a standard assumption in the standard security model without random oracles. Unfortunately, it is hard to program a security reduction capturing the above four features. In this talk, I will focus on tight reduction for digital signatures and introduce two different methods towards tight reduction.

Biography: Willy Susilo is a Professor and the Head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong in Australia. He was previously awarded the prestigious ARC Future Fellow by the Australian Research Council (ARC) and the Researcher of the Year award in 2016 by the University of Wollongong. His main research interests include cybersecurity, cryptography and information security. His work has been cited more than 9,000 times in Google Scholar. He is the Editor-in-Chief of the Information journal. He has served as a program committee member in dozens of international conferences. He is currently serving as an Associate Editors in several international journals, including Elsevier Computer Standards and Interface and International Journal of Information Security (IJIS, Springer). He has published more than 300 research papers in the area of cybersecurity and cryptology.

Blockchain: How crypto meets the industry?

Tsz Hon Yuen
Shield Lab at Huawei Singapore
Singapore

Learn More

Abstract

Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.

Biography: Dr Tsz Hon Yuen is a senior researcher of Shield Lab at Huawei Singapore. He is a member of Cryptography Expert Group in Huawei. He received his PhD degree from University of Wollongong in 2010 and worked in University of Hong Kong before joining Huawei. His current research interests include public key encryption, digital signatures, privacy and blockchain. He has published more than 50 technical papers, including top journals and conferences such as IEEE TC and Eurocrypt. He received the Best Paper Award in ESRORICS 2014. He is also active in industrial fields with more than 10 patents. He has served as the PC members and reviewers for many security and cryptography conferences, workshops and journals.

How to Control Access to Thousands of Shared IoT Devices

Yuliang Zheng
University of Alabama at Birmingham
USA

Learn More

Abstract

The emerging Internet of Things (IoT) promises a highly connected world where tangible things around us are seamlessly integrated into the ever expanding cyber space, which is expected to result in greatly improved quality of life and economic growth. To realize those benefits, it is important for the IoT to have strong security and privacy measures built into it. This presents a number of challenges both at technical and system levels. This talk focuses on our research into controlling access to thousands or more of shared, resource-constrained IoT devices that are orders of magnitude more numerous than the number of passwords a typical person has to manage now. Specific research goals include:

  • Simplicity: the methods are convenient to use by average users.
  • Scalability: the methods allow users to access thousands or even millions of devices with ease.
  • Shared access: the methods afford shared access and control of devices.
  • Adaptability to dynamic changes: the methods can be adapted to an increase or decrease in users as well as in devices.

Biography: Dr. Yuliang Zheng is widely known as the father of the signcryption technology which is now an ISO international standard for cyber security. His pioneering research in immunizing public key encryption against adaptive attacks has been embodied in a multiple number of industry standards including those from ISO, IEEE and IETF.

A prolific researcher with more than 200 refereed publications, Dr. Zheng has been at the forefront ofestablishing international standards for cryptographic engineering. His more recent research focus is on leveraging the Internet of Things, blockchains and Big Data to accelerate the progress of precision medicine.

He plays an active, leadership role in international research communities, co-founding the annual Public Key Cryptography (PKC) conference sponsored by the International Association for Cryptologic Research (IACR) and the annual International Conference on Information Theoretic Security (ICITS). In addition, he serves on the steering committees for a number of research and industrial forums including PKC (Chair of the PKC steering committee since 2007), International Conference on Information Theoretic Security, Information Security Conference, IEEE Security in Storage Workshop and IEEE Information Assurance Standards Committee.

Dr. Zheng was invited to serve as an associate editor of The Computer Journal published by the Oxford University Press and as a guest editor for the IEEE Transactions on Information Theory.

Dr. Yuliang Zheng earned his Bachelor's degree in computer science from Nanjing Institute of Technology (renamed Southeast University 1988), Nanjing, China in 1982. He completed his graduate studies at Yokohama National University in Japan, where he earned his master's and PhD degrees both in electrical and computer engineering, in 1988 and 1991 respectively. After completing his PhD, Dr. Zheng moved to Australia, working at first as a cyber security research scientist at the Australian Defense Force Academy, and then as a professor at the University of Wollongong and Monash University. In 2001, Dr. Zheng was recruited by a joint effort between Bank of America, Wachovia Bank (now part of Wells Fargo) and the University of North Carolina at Charlotte (UNCC) to establish and lead a research center for financial cyber security at UNCC. Since July 2015 he has been with the University of Alabama at Birmingham, serving as the Chair of UAB’s Department of Computer Science.

Information for Authors

The symposium seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy in Social Networks and Big Data. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to:

  • Attacks in/via social networks
  • Information control and detection
  • Malicious behavior modeling in social networks
  • Malicious information propagation via social networks
  • Phishing problems in social networks
  • Privacy protection in social networks
  • Big data analytics for threats and attacks prediction
  • Spam problems in social networks
  • Trust and reputations in social networks
  • Big data outsourcing
  • Big data forensics
  • Security and privacy in big database
  • Applied cryptography for big data
  • Big data system security
  • Mobile social networks security
  • Security and privacy in cloud
  • Forensics in social networks and big data

Paper Submission Portal

Please click the above button to submit your paper through SocialSec 2017 Easychair submission system. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. The page limit is 16 pages excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Detailed auther instructions and LaTeX/Word templates for LNCS publications can be found via the following link.

Springer LNCS Author Information

Paper Publication

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. All papers accepted by SocialSec 2017 will be included in a special track of the ISPEC 2017 conference proceedings, published by Springer as part of the Lecture Notes in Computer Science (LNCS) series, and indexed by EI Engineering, ISI Conference Proceedings Index, Scopus and other major indexing services. Selected high quality papers will be invited to consider submission after significant extension for the following special issue in SCI-Indexed Journal.

Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.133
Special Issue on Security, Privacy and Social Networks
Learn more

Registration

Full registration payment is required by 13 October 2017 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 13 October 2017 will result in the exclusion of the papers from the Conference Proceedings.

Registration Fee

Registration Fee (in Australian Dollar)By 13 October 2017After 13 October 2017
Full Registration/Author Registration$990$1090
Student Attendee Registration$790N/A
Additional Conference Banquet Ticket (per person)$130$130

Both types of registration include: full attendance of the conference, conference proceedings, welcome reception, conference banquet, morning teas, afternoon teas and lunches.

Student Registration

To be qualified for student registration, you must be currently enrolled as a full time student in a university or an institution. A scanned copy of your valid student ID card must be sent to the conference secretary (abby.xu@insightek.com.au). The student status will be verified.

Please note that if you are the only author registered for an accepted paper, you should choose Full Registration even though you are a student.

Conference Banquet Tickets

A conference banquet ticket is included in both full registration and student registration. Additional conference banquet tickets are available for purchase at the cost of $130 per person. Payment needs to be made together with the conference registration fee.

Invitation Letter

If you need an invitation letter, please contact the conference secretary (abby.xu@insightek.com.au) AFTER you complete the registration. The invitation letter can be issued once your registration payment is received.

Receipts

Hard copy registration receipts can be collected at the reception desk during the conference.

Cancellation Policy

Registration for the conference cannot be canceled. There is no refund of registration fees.

Registration Method

Please click the following link to complete your registration.

SocialSec 2017 Registration System

  • PAPER ID: For non-author registrations, please use "999" for Paper ID in corresponding parts.
  • PAPER Title: For non-author registrations, please use "No Paper" for Paper Title in corresponding parts.
  • NOTE: You may ignore the "IEEE Member ID" entry as this conference does not provide any discount for IEEE members.

Payment via Credit Card or Paypal

Payment via credit card or PayPal can be made directly in the registration system.

Payment via Bank Transfer

Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.

Account nameInsightek
Bank NameCommonwealth Bank of Australia
Address of Insightek2B Service Road, Blackburn, VIC 3130, Australia
SWIFT codeCTBAAU2S
BSB/Account No063182 10939649
  • TRANSFER NOTE: Please include a note on the bank transfer indicating your name and paper ID.
  • TRANSFER COST: Bank transfer and other related fees have to be paid by the registrant. Please verify carefully during the transfer that all costs are charged to the sender and the correct amount will be received at the above account. Alternatively, please add extra $20.00 to the total amount of registration fee to cover the transfer cost.

After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.

Organisation Committees

General Chair

Symeon Papadopoulos, CERTH-ITI, Greece
Yang Xiang, Swinburne University of Technology, Australia
Wanlei Zhou, Deakin University, Australia

Program Committee Chair

Yuhong Liu, Santa Clara University, USA
Yu Wang, Deakin University, Australia

Publication Chair

Joseph K. Liu, Monash University, Australia

Program Committee

Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Ero Balsa, University of Leuven, Belgium
Barbara Carminati, University of Insubria, Italy
David Chadwick, University of Kent, UK
Richard Chbeir, IUT de Bayonne, France
Xiaofeng Chen, Xidian University, China
Alfredo Cuzzocrea, University of Trieste, Italy
Pedro García-Teodoro, University of Granada, Spain
Thomas Gottron, University of Koblenz-Landau, Germany
Sokratis Katsikas, University of Piraeus, Greece
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Rongxing Lu, University of New Brunswick, Canada
Weizhi Meng, Technical University of Denmark, Denmark
Franco Maria Nardini, ISTI-CNR, Italy
Jia-Yu Pan, Google, USA
Gerardo Pelosi, Politecnico di Milano, Italy
Neeli Prasad, International Technological University, USA
Edoardo Serra, Boise State University, USA
Hung-Min Sun, National Tsing Hua University, Taiwan
Ingmar Weber, Qatar Computing Research Institute, Qatar
Guomin Yang, University of Wollongong, Australia
Yong Yu, Shaanxi Normal University, China
Zhenfeng Zhang, Chinese Academy of Sciences, China
Xiaofang Zhou, University of Queensland, Australia

Venue

SocialSec 2017 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from the Southern Cross Station.

Deakin Downtown

Nearby Hotels

5 Star

4 Star

3 Star

Backpackers

All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.

Melbourne - Most Liveable City in The World

Contact

For further information regarding to SocialSec 2017, please contact nsclab.events@gmail.com.

Swinburne University