PDF Version of the programme: here
ISPEC 2019 Schedule | |||
---|---|---|---|
26 November (Tuesday) | 27 November (Wednesday) | 28 November (Thursday) | |
09:00-09:30 | Registration & Welcoming Remark | Registration | Registration |
09:30-10:30 | Keynote (1) | Keynote (2) | Keynote (3) |
10:30:11:00 | Coffee Break | Coffee Break | Coffee Break |
11:00-13:00 | Session 1 | Session 3 | Session 5 |
13:00-14:30 | Lunch (Tao Chinese Cuisine) | Lunch (Tatsu Japanese Cuisine) | Lunch (Serena Brasserie) |
14:30-16:00 | Session 2 | Session 4 | Session 6 |
16:00-16:30 | Coffee Break | Coffee Break | Farewell + Coffee Break |
16:30-17:50 | Short Paper I | Short Paper II | |
19:00-21:00 |
Conference Banquet (Tao Chinese Cuisine) |
Keynote
(1) 09:30-10:30 (26 Nov) Session Chair: Guilin Wang |
Quantum Computing – What will be
the Real Impact on Security? Prof. Chris Mitchell, Information Security Group, Royal Holloway, University of London |
Keynote
(2) 09:30-10:30 (27 Nov) Session Chair: Swee-Huay Heng |
On Building Full-Stack AI
Security Capabilities
Dr. Tieyan Li, Head of AI Security, Shield Lab, Huawei |
Keynote
(3) 09:30-10:30 (28 Nov) Session Chair: Wun-She Yap |
NIST Lightweight Cryptographic Competition
Assoc. Prof. Hongjun Wu, Nanyang Technological University |
Session
1: Cryptography I 11:00-13:00 (26 Nov) Session Chair: Chris Mitchell |
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model Sha Ma and Qiong Huang |
A
Bitwise Logistic Regression using Binary Approximation and Real Number
Division in Homomorphic Encryption Scheme Joon Soo Yoo, Jeong Hwan Hwang, Baek Kyung Song and Ji Won Yoon |
Accelerating
Number Theoretic Transform in GPU Platform for qTESLA Scheme Wai Kong Lee, Sedat Akleylek, Wun-She Yap and Bok-Min Goi |
Provably
Secure Three-party Password-based Authenticated Key Exchange from RLWE Chao Liu, Zhongxiang Zheng, Keting Jia and Qidi You |
Session 2: System and Network Security 14:30:16:00 (26 Nov) Session Chair: Robert Deng |
KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism Hiroki Kuzuno and Toshihiro Yamauchi |
Peel the Onion: Recognition of Android apps behind the Tor Network Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli and Leonardo Querzoni |
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware Sherif Saad, Farhan Mahmood, William Briguglio and Haytham Elmiligi |
Session 3:Security Protocol and Tool 11:00-13:00 (27 Nov) Session Chair: Tieyan Li |
A
Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving
Computation Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki and Hideaki Sone |
Secure
Best Arm Identification in Multi-Armed Bandits Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet and Marta Soare |
CATCHA:
When Cats Track Your Movements Online Prakash Shrestha, Nitesh Saxena, Ajaya Neupane and Kiavash Satvat |
Designing
a Code Vulnerability Meta-Scanner Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire and Isabelle Borne |
Session
4: Access Control and Authentication 14:30:16:00 (27 Nov) Session Chair: Matt Henricksen |
Using
IFTTT to Express and Enforce UCON Obligations Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos and Andrea Saracino |
Evaluation
of Software PUF Based on Gyroscope Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto and Norikazu Yamasaki |
White-Box
Implementation of the KMAC Message Authentication Code Jiqiang Lu, Zhigang Zhao and Huaqun Guo |
Session 5:
Cryptography II 11:00-13:00 (28 Nov) Session Chair: Jiqiang Lu |
Improving
Signature Schemes with Tight Security Reductions Tiong-Sik Ng, Syh-Yuan Tan and Ji-Jian Chin |
Improved
Digital Signatures Based on Elliptic Curve Endomorphism Rings Xiu Xu, Chris Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu and Reza Azarderakhsh |
Identity-based
Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios Łukasz Krzywiecki, Marta Słowik and Michał Szala |
Recovering
Internal States of Grain-v1 Deepak Kumar Dalai and Santu Pal |
Session 6: Data and User Privacy 14:30:16:00 (28 Nov) Session Chair: Ji-Jian Chin |
GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures Miroslaw Kutylowski, Jakub Lemiesz, Marta Słowik, Marcin Słowik, Kamil Kluczniak and Maciej Gębala |
Defining a New Composite Cybersecurity Rating Scheme for SMEs Andrew Rae and Asma Patel |
Privacy Preserving Approach in Dynamic Social Network Data Publishing Kamal Macwan and Sankita Patel |
Short Paper I 16:30:17:50 (26 Nov) Session Chair: Miroslaw Kutylowski |
Using Freivalds’ Algorithm to Accelerate Lattice-Based Signature Verifications Arnaud Sipasseuth, Thomas Plantard and Willy Susilo |
Group-based Key Exchange Protocol based on Complete Decomposition Search Problem Chang Seng Sin and Huey Voon Chen |
Development Activities, Tools and Techniques of Secure Microservices Compositions Peter Nkomo and Marijke Coetzee |
Generating Phishing Emails Using Graph Database Nasim Maleki and Ali A. Ghorbani |
Short
Paper II 16:30:17:30 (27 Nov) Session Chair: Cheng-Kang Chu |
Evaluating
Intrusion Sensitivity Allocation with Support Vector Machine for
Collaborative Intrusion Detection Wenjuan Li, Weizhi Meng and Lam-For Kwok |
The
(Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic
Password-Cracking Algorithm Chris Pelchen, David Jaeger, Christoph Meinel and Feng Cheng |
A
Novel and Comprehensive Evaluation Methodology for SIEM Mahdieh Safarzadeh Vahed, Hossein Gharaee and Amir Hossein Panahi |