TECHNICAL PROGRAM

March 22, Tuesday (Day 1)


08:15 – 09:20      Registration

 

09:20 – 09:30      Welcoming Remarks

 

09:30 – 10:30      Invited Talk 1 (Xiaoyun Wang)

                                Session Chair: Lucas C. K. Hui

        Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem

Xiaoyun Wang, Mingjie Liu, Chengliang Tian and Jingguo Bi

 

10:30 – 10:45      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

10:45 – 12:25      Session 1: Network Security

                                Session Chair: Robert Deng

        Enhancing the Trust of Internet Routing with Lightweight Route Attestation

Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee and Ke Xu

        Network Scan Detection with LQS: A Lightweight, Quick and Stateful Algorithm

Mansour Alsaleh and P.C. Van Oorschot

        An Integrated Approach to Cryptographic Mitigation of Denial-of-Service Attacks

Jothi Rangasamy, Douglas Stebila, Colin Boyd and Juan González Nieto

        Boosting the Scalability of Botnet Detection Using Adaptive Traffic Sampling

Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee and Nick Feamster

 

12:25 – 13:45      Lunch

Metropol Restaurant 名都酒樓 (Chinese style)
4th Floor, United Centre, 95 Queensway Road, Admiralty, HK
- Meeting Point: Please remain in conference room and wait for our staff to escort

 

13:45 – 15:25      Session 2: Malware

                                Session Chair: Ninghui Li

        WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios

Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario and Xinhui Han

       Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications

Guanhua Yan, Guanling Chen, Stephan Eidenbenz and Nan Li

        Characterizing Kernel Malware Behavior with Kernel Data Access Patterns

Junghwan Rhee, Zhiqiang Lin and Dongyan Xu

        Detecting Stealthy Malware with Inter-Structure and Imported Signatures

Bin Liang, Wei You, Wenchang Shi and Zhaohui Liang

 

15:25 – 15:40      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

15:40 – 16:55      Session 3: Software Security

                                Session Chair: Dongyan Xu

        Automatic Construction of Jump-Oriented Programming Shellcode (on the x86) 

Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen and Xinchun Yin

        Jump-Oriented Programming: A New Class of Code-Reuse Attack

Tyler Bletsch, Xuxian Jiang, Vince W. Freeh and Zhenkai Liang

        ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks  

Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy

 

16:55 – 17:55      Session 4: Short Papers – I

                                Session Chair: Qiong Huang

        On the Security of the Identity-based Encryption based on DHIES from ASIACCS 2010

Willy Susilo and Joonsang Baek

        How to Design Space Efficient Revocable IBE from Non-monotonic ABE

Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou and Haojin Zhu

        Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability

Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong and Dongqing Xie

        1-out-of-2 Signature

Miroslaw Kutylowski and Jun Shao

        Self-Certified Ring Signatures

Nan Li, Yi Mu, Willy Susilo and Fuchun Guo

        Server-Aided Signatures Verification Secure against Collusion Attack

Sherman S. M. Chow, Man Ho Au and Willy Susilo

 

18:15 21:30      Banquet

Harbour Cruise-Bauhinia (Buffet)

Aboard at North Point Ferry Pier

http://www.cruise.com.hk/Flash_opening.html

- From conference venue to banquet venue (North Point Ferry Pier)
  - Coach Pick-up 18:15 sharp
     Meeting point : G/F Admiralty Centre, Lobby area near McDonald staircase
  - or, By yourself
     Please arrive the Pier at 19:15 sharp.
     (Map) http://www.cruise.com.hk/Northpoint_Ferry.html
  *** We strongly recommend the guests to join us and take the coach to the Banquet

  venue, as we will not wait if you are not on time. ***
- Return trip (From the Pier to MTR station / HK side conference hotels)
  - Coach will be arranged to Admiralty MTR Station, The Wharney Guang Dong Hotel Hong Kong,

    and Courtyard by Marriott Hong Kong. If you would like to take the coach, please follow

    Ms Catherine Chan when you depart the cruise.

 

 

 

March 23, Wednesday (Day 2)


08:30 – 09:30      Invited Talk 2 (Elisa Bertino)

                                Session Chair: Ravi Sandhu

        Towards Mechanisms for Detection and Prevention of Data Exfiltration by Insiders

Elisa Bertino and Gabriel Ghinita

 

09:30 – 09:45      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

09:45 – 11:55      Session 5: Access Control

                                Session Chair: Heung Youl Youm

       Tracer: Enforcing Mandatory Access Control in Commodity OS with the Support of Light-Weight Intrusion Detection and Tracing

Zhiyong Shan, Xin Wang and Tzi-cker Chiueh

        Confidentiality-preserving Proof Theories for Distributed Proof Systems

Kazuhiro Minami, Nikita Borisov, Marianne Winslett and Adam J. Lee

        PUF ROKs : A Hardware Approach to Read-Once Keys

Michael S. Kirkpatrick, Sam Kerr and Elisa Bertino

        Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies

Francesco Alberti, Alessandro Armando and Silvio Ranise

        An Efficient Mobile PACE Implementation

Alex Wiesmaier, Johannes Braun, Detlef Hühnlein, Falko Strenzke and Johannes Buchmann

 

11:55 – 13:15      Lunch

Metropol Restaurant 名都酒樓 (Chinese style)
4th Floor, United Centre, 95 Queensway Road, Admiralty, HK
- Meeting Point: Please remain in conference room and wait for our staff to escort

 

13:15 – 14:55      Session 6: Applied Cryptography – I

                                Session Chair: Mark Manulis

        Identity-Based Online/Offline Key Encapsulation and Encryption        

Sherman S. M. Chow, Joseph K. Liu and Jianying Zhou

        Compact Identity-Based Encryption without Strong Symmetric Cipher

Joonsang Baek and Jianying Zhou

        Strongly Secure Certificateless Key Exchange without Pairing

Guomin Yang and Chik-How Tan

       Examining Indistinguishability-Based Security Models for Key Exchange Protocols: The case of CK, CK-HMQV, and eCK

Cas Cremers

 

14:55 15:10      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

15:10 – 16:50      Session 7: Cryptanalysis and Attacks

                                Session Chair: Roland Yap

        Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations

Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo and Jennifer Seberry

        Attack on the GridCode One-Time Password

Ian Molloy and Ninghui Li

        Rethinking about Guessing Attacks

Zhiwei Li and Weichao Wang

        Formal Modelling and Automatic Detection of Resource Exhaustion Attacks

Bogdan Groza and Marius Minea

 

16:50 – 17:40      Session 8: Short Papers – II

                                Session Chair: Joseph K. Liu

      Quantified Risk-Adaptive Access Control for Patient Privacy Protection in Health Information Systems

Qihua Wang and Hongxia Jin

        EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Sonia Jahid, Prateek Mittal and Nikita Borisov

        Diesel: Applying Privilege Separation to Database Access

Adrienne Porter Felt, Matthew Finifter, Joel Weinberger and David Wagner

        Separation of Duties as a Service

David Basin, Samuel J. Burri and Güenter Karjoth

        Receipt-Mode Trust Negotiation: Efficient Authorization Through Outsourced Interactions

Andrew K. Adams, Adam J. Lee and Daniel Mossé

 

 

 

March 24, Thursday (Day 3)


08:30 – 09:45      Session 9: Security Protocols

                                Session Chair: Adam J. Lee

        Secure Mobile Subscription of Sensor-Encrypted Data

Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou and Robert H. Deng

        Efficient Audit-based Compliance for Relational Data Retention

Ragib Hasan and Marianne Winslett

       Mind How You Answer Me! (Transparently Authenticating the User of a Smartphone when Answering or Placing a Call)

Mauro Conti, Irina Zachia-Zlatea and Bruno Crispo

 

09:45 10:00      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

10:00 – 11:40      Session 10: Applied Cryptography – II

                                Session Chair: Sherman S. M. Chow

        Threshold Ring Signature without Random Oracles

Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou

        On the Invisibility of Designated Confirmer Signatures

Fubiao Xia, Guilin Wang and Rui Xue

        Bounded Vector Signatures and their Applications

Lei Wei, Scott E. Coull and Michael K. Reiter

        Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation

Mark Manulis and Bertram Poettering

 

11:40 – 13:15      Lunch

Metropol Restaurant 名都酒樓 (Chinese style)
4th Floor, United Centre, 95 Queensway Road, Admiralty, HK
- Meeting Point: Please remain in conference room and wait for our staff to escort

 

13:15 – 14:55      Session 11: System Security

                                Session Chair: Nikita Borisov

        A Software-Based Root-of-Trust Primitive on Multicore Platforms

Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng and Tieyan Li

        An Ontology- and Bayesian-based Approach for Determining Threat Probabilities

Stefan Fenz

        Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

Alvaro Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang and Shankar Sastry

        Non-Uniform Distributions in Quantitative Information-Flow

Michael Backes, Matthias Berg and Boris Köpf

 

14:55 – 15:10      Coffee Break

The coffee break will be served 5 mins before the official time and will continue 10 mins afterwards.

 

15:10 – 16:10      Session 12: Short Papers – III

                                Session Chair: Willy Susilo

        Stronger Security Model of Group Key Agreement

Jianjie Zhao, Dawu Gu and M. Choudary Gorantla

        Leakage Resilient eCK-Secure Key Exchange Protocol Without Random Oracles

Daisuke Moriyama and Tatsuaki Okamoto

        Efficient Computational Oblivious Transfer Using Interactive Hashing

Kirill Morozov and George Savvides

        Optimal Message Transmission Protocols with Flexible Parameters

Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin and Hongsong Shi

        How to Search Linear Approximations for Large Non-Surjective S-box          

Yue Sun, Meiqin Wang and Qiumei Sun

        A New and Extended Fault Analysis on RSA

Caisen Chen and Tao Wang

 

16:10 – 17:20      Session 13: Short Papers – IV

                                Session Chair: Adonis Fung

        MLAS: Multiple Level Authentication Scheme for VANETs

T.W. Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K. Li

        On Mouse Dynamics as a Behavioral Biometric for Authentication

Zach Jorgensen and Ting Yu

        On the Effectiveness of Using Anonymizing Networks for Web Search Privacy

Sai Teja Peddinti and Nitesh Saxena

        Self Destructive Tamper Response for Software Protection

Kazuomi Oishi and Tsutomu Matsumoto

        Deriving Common Malware Behavior through Graph Clustering

Younghee Park and Douglas Reeves

        Towards a Binary Integrity System for Windows

Yongzheng Wu and Roland H.C. Yap

        A Statistical Approach to Botnet Virulence Estimation

Julian Rrushi, Ehsan Mokhtari and Ali A. Ghorbani

 

17:20 – 17:30      Closing Ceremony




* Regular Paper: 25 mins (20 mins for presentation + 5 mins for Q&A)

* Short Paper: 10 mins (10 mins for presentation and Q&A)