TECHNICAL PROGRAM |
March 22, Tuesday (Day 1) 08:15 – 09:20
Registration 09:20 – 09:30
Welcoming Remarks 09:30 – 10:30
Invited Talk 1 (Xiaoyun Wang) Session Chair: Lucas C. K. Hui
•
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector
Problem
Xiaoyun Wang, Mingjie Liu, Chengliang Tian and
Jingguo Bi 10:30 – 10:45
Coffee Break
10:45 – 12:25 Session 1: Network Security Session Chair: Robert Deng
•
Enhancing the Trust of Internet Routing with Lightweight Route
Attestation
Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick
P. C. Lee and Ke Xu
•
Network Scan Detection with LQS: A Lightweight, Quick and Stateful
Algorithm
Mansour Alsaleh and P.C. Van Oorschot
•
An Integrated Approach to Cryptographic Mitigation of
Denial-of-Service Attacks
Jothi Rangasamy, Douglas Stebila, Colin Boyd and Juan
González Nieto
•
Boosting the Scalability of Botnet Detection Using Adaptive Traffic
Sampling
Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu,
Wenke Lee and Nick Feamster 12:25 – 13:45 Lunch
13:45 – 15:25
Session
2: Malware Session Chair: Ninghui Li
•
WebPatrol: Automated Collection and Replay of Web-based Malware
Scenarios
Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose
Nazario and Xinhui Han
•
Malware Propagation in Online Social Networks: Nature, Dynamics, and
Defense Implications
Guanhua Yan, Guanling Chen, Stephan Eidenbenz and Nan
Li
•
Characterizing Kernel Malware Behavior with Kernel Data Access
Patterns
Junghwan Rhee, Zhiqiang Lin and Dongyan Xu
•
Detecting Stealthy Malware with Inter-Structure and Imported
Signatures
Bin Liang, Wei You, Wenchang Shi and Zhaohui Liang
15:25 – 15:40
Coffee Break
15:40 – 16:55
Session 3: Software Security Session Chair: Dongyan Xu
•
Automatic Construction of Jump-Oriented Programming Shellcode (on the
x86)
Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen
and Xinchun Yin
•
Jump-Oriented Programming: A New Class of Code-Reuse Attack
Tyler Bletsch, Xuxian Jiang, Vince W. Freeh and
Zhenkai Liang
•
ROPdefender: A Detection Tool to Defend Against Return-Oriented
Programming Attacks
Lucas Davi, Ahmad-Reza Sadeghi and Marcel Winandy
16:55 – 17:55
Session 4: Short Papers – I Session Chair: Qiong Huang
•
On the Security of the Identity-based Encryption based on DHIES from
ASIACCS 2010
Willy Susilo and Joonsang Baek
•
How to Design Space Efficient Revocable IBE from Non-monotonic ABE
Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou and
Haojin Zhu
•
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with
Accountability
Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M.
Chow, Duncan S. Wong and Dongqing Xie
•
1-out-of-2 Signature
Miroslaw Kutylowski and Jun Shao
•
Self-Certified Ring Signatures
Nan Li, Yi Mu, Willy Susilo and Fuchun Guo
•
Server-Aided Signatures Verification Secure against Collusion Attack Sherman S. M. Chow, Man Ho Au and Willy Susilo
18:15 – 21:30 Banquet Harbour Cruise-Bauhinia
(Buffet)
Aboard at
North Point Ferry Pier
http://www.cruise.com.hk/Flash_opening.html -
From conference venue to banquet venue (North Point
Ferry Pier)
venue, as we will not wait if you are not on time. *** and Courtyard by Marriott Hong Kong. If you would like to take the coach, please follow Ms Catherine Chan when you depart the cruise.
March 23, Wednesday (Day 2) 08:30 – 09:30
Invited Talk 2 (Elisa Bertino) Session Chair: Ravi Sandhu
•
Towards Mechanisms for Detection and Prevention of Data Exfiltration
by Insiders
Elisa Bertino and Gabriel Ghinita 09:30 – 09:45
Coffee Break
09:45 – 11:55 Session 5: Access Control Session Chair: Heung Youl Youm
•
Tracer: Enforcing Mandatory Access Control in Commodity OS with the
Support of Light-Weight Intrusion Detection and Tracing
Zhiyong Shan, Xin Wang and Tzi-cker Chiueh
•
Confidentiality-preserving Proof Theories for Distributed Proof
Systems
Kazuhiro Minami, Nikita Borisov, Marianne Winslett
and Adam J. Lee
•
PUF ROKs : A Hardware Approach to Read-Once Keys
Michael S. Kirkpatrick, Sam Kerr and Elisa Bertino
•
Efficient Symbolic Automated Analysis of Administrative
Attribute-based RBAC-Policies
Francesco Alberti, Alessandro Armando and Silvio
Ranise
•
An Efficient Mobile PACE Implementation
Alex Wiesmaier, Johannes Braun, Detlef Hühnlein,
Falko Strenzke and Johannes Buchmann
11:55 – 13:15
Lunch
13:15 – 14:55
Session 6: Applied Cryptography – I Session Chair: Mark Manulis
•
Identity-Based Online/Offline Key Encapsulation and Encryption
Sherman S. M. Chow, Joseph K. Liu and Jianying Zhou
•
Compact Identity-Based Encryption without Strong Symmetric Cipher
Joonsang Baek and Jianying Zhou
•
Strongly Secure Certificateless Key Exchange without Pairing
Guomin Yang and Chik-How Tan
•
Examining Indistinguishability-Based Security Models for Key Exchange
Protocols: The case of CK, CK-HMQV, and eCK
Cas Cremers
14:55 –
15:10
Coffee Break
15:10 – 16:50
Session 7: Cryptanalysis and Attacks Session Chair: Roland Yap
•
Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree
Non-Linear Equations
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar,
Willy Susilo and Jennifer Seberry
•
Attack on the GridCode One-Time Password
Ian Molloy and Ninghui Li
•
Rethinking about Guessing Attacks
Zhiwei Li and Weichao Wang
•
Formal Modelling and Automatic Detection of Resource Exhaustion
Attacks
Bogdan Groza and Marius Minea 16:50 – 17:40 Session 8: Short Papers – II Session Chair: Joseph K. Liu
•
Quantified Risk-Adaptive Access Control for Patient Privacy
Protection in Health Information Systems
Qihua Wang and Hongxia Jin
•
EASiER: Encryption-based Access Control in Social Networks with
Efficient Revocation
Sonia Jahid, Prateek Mittal and Nikita Borisov
•
Diesel: Applying Privilege Separation to Database Access
Adrienne Porter Felt, Matthew Finifter, Joel
Weinberger and David Wagner
•
Separation of Duties as a Service
David Basin, Samuel J. Burri and Güenter Karjoth
•
Receipt-Mode Trust Negotiation: Efficient Authorization Through
Outsourced Interactions
Andrew K. Adams, Adam J. Lee and Daniel Mossé
March 24, Thursday (Day 3) 08:30 – 09:45
Session
9:
Security Protocols Session Chair: Adam J. Lee
•
Secure Mobile Subscription of Sensor-Encrypted Data
Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow,
Jianying Zhou and Robert H. Deng
•
Efficient Audit-based Compliance for Relational Data Retention
Ragib Hasan and Marianne Winslett
•
Mind How You Answer Me! (Transparently Authenticating the User of a
Smartphone when Answering or Placing a Call)
Mauro Conti, Irina Zachia-Zlatea and Bruno Crispo 09:45 –
10:00
Coffee Break
10:00 – 11:40
Session 10: Applied Cryptography – II Session Chair: Sherman S. M. Chow
•
Threshold Ring Signature without Random Oracles
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo
and Jianying Zhou
•
On the Invisibility of Designated Confirmer Signatures
Fubiao Xia, Guilin Wang and Rui Xue
•
Bounded Vector Signatures and their Applications
Lei Wei, Scott E. Coull and Michael K. Reiter
•
Practical Affiliation-Hiding Authentication from Improved Polynomial
Interpolation
Mark Manulis and Bertram Poettering
11:40 – 13:15
Lunch
13:15 – 14:55
Session 11: System Security Session Chair: Nikita Borisov
•
A Software-Based Root-of-Trust Primitive on Multicore Platforms
Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng and
Tieyan Li
•
An Ontology- and Bayesian-based Approach for Determining Threat
Probabilities
Stefan Fenz
•
Attacks Against Process Control Systems: Risk Assessment, Detection,
and Response
Alvaro Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun
Huang, Chi-Yen Huang and Shankar Sastry
•
Non-Uniform Distributions in Quantitative Information-Flow
Michael Backes, Matthias Berg and Boris Köpf 14:55 – 15:10 Coffee Break
15:10 – 16:10 Session 12: Short Papers – III Session Chair: Willy Susilo
•
Stronger Security Model of Group Key Agreement
Jianjie Zhao, Dawu Gu and M. Choudary Gorantla
•
Leakage Resilient eCK-Secure Key Exchange Protocol Without Random
Oracles
Daisuke Moriyama and Tatsuaki Okamoto
•
Efficient Computational Oblivious Transfer Using Interactive Hashing
Kirill Morozov and George Savvides
•
Optimal Message Transmission Protocols with Flexible Parameters
Reihaneh Safavi-Naini, Mohammed Ashraful Alam Tuhin
and Hongsong Shi
•
How to Search Linear Approximations for Large Non-Surjective S-box
Yue Sun, Meiqin Wang and Qiumei Sun
•
A New and Extended Fault Analysis on RSA
Caisen Chen and Tao Wang 16:10 – 17:20
Session 13: Short Papers – IV Session Chair: Adonis Fung
•
MLAS: Multiple Level Authentication Scheme for VANETs
T.W. Chim, S.M. Yiu, Lucas C.K. Hui and Victor O.K.
Li
•
On Mouse Dynamics as a Behavioral Biometric for Authentication
Zach Jorgensen and Ting Yu
•
On the Effectiveness of Using Anonymizing Networks for Web Search
Privacy
Sai Teja Peddinti and Nitesh Saxena
•
Self Destructive Tamper Response for Software Protection
Kazuomi Oishi and Tsutomu Matsumoto
•
Deriving Common Malware Behavior through Graph Clustering
Younghee Park and Douglas Reeves
•
Towards a Binary Integrity System for Windows
Yongzheng Wu and Roland H.C. Yap
•
A Statistical Approach to Botnet Virulence Estimation
Julian Rrushi, Ehsan Mokhtari and Ali A. Ghorbani 17:20 – 17:30
Closing Ceremony
*
Regular Paper: 25 mins (20 mins for presentation + 5 mins for Q&A) * Short Paper: 10 mins (10 mins for presentation and Q&A)
|