Programme

PDF Version of the programme: here

ISPEC 2019 Schedule
  26 November (Tuesday) 27 November (Wednesday) 28 November (Thursday)
09:00-09:30 Registration &       Welcoming Remark Registration Registration
09:30-10:30 Keynote (1) Keynote (2) Keynote (3)
10:30:11:00 Coffee Break Coffee Break Coffee Break
11:00-13:00 Session 1 Session 3 Session 5
13:00-14:30 Lunch (Tao Chinese Cuisine) Lunch (Tatsu Japanese Cuisine) Lunch (Serena Brasserie)
14:30-16:00 Session 2 Session 4 Session 6
16:00-16:30 Coffee Break Coffee Break Farewell + Coffee Break
16:30-17:50 Short Paper I Short Paper II  
19:00-21:00  

Conference Banquet (Tao Chinese Cuisine)

 
Keynote (1)
09:30-10:30 (26 Nov)
Session Chair: Guilin Wang
Quantum Computing – What will be the Real Impact on Security?
Prof. Chris Mitchell, Information Security Group, Royal Holloway, University of London  
Keynote (2)
09:30-10:30 (27 Nov)
Session Chair: Swee-Huay Heng
On Building Full-Stack AI Security Capabilities
Dr. Tieyan Li,  Head of AI Security, Shield Lab, Huawei
Keynote (3)
09:30-10:30 (28 Nov)
Session Chair: Wun-She Yap
 NIST Lightweight Cryptographic Competition
Assoc. Prof. Hongjun Wu,  Nanyang Technological University
Session 1: Cryptography I
11:00-13:00 (26 Nov)
Session Chair: Chris Mitchell
Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model
Sha Ma and Qiong Huang
A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme
Joon Soo Yoo, Jeong Hwan Hwang, Baek Kyung Song and Ji Won Yoon
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
Wai Kong Lee, Sedat Akleylek, Wun-She Yap and Bok-Min Goi
Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE
Chao Liu, Zhongxiang Zheng, Keting Jia and Qidi You

Session 2: System and Network Security
14:30:16:00 (26 Nov)
Session Chair: Robert Deng
KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism
Hiroki Kuzuno and Toshihiro Yamauchi
Peel the Onion: Recognition of Android apps behind the Tor Network
Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli and Leonardo Querzoni
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware
Sherif Saad, Farhan Mahmood, William Briguglio and Haytham Elmiligi
Session 3:Security Protocol and Tool
11:00-13:00 (27 Nov)
Session Chair: Tieyan Li
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation
Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki and Hideaki Sone
Secure Best Arm Identification in Multi-Armed Bandits
Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet and Marta Soare
CATCHA: When Cats Track Your Movements Online
Prakash Shrestha, Nitesh Saxena, Ajaya Neupane and Kiavash Satvat
Designing a Code Vulnerability Meta-Scanner
Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire and Isabelle Borne
Session 4: Access Control and Authentication
14:30:16:00 (27 Nov)
Session Chair: Matt Henricksen
Using IFTTT to Express and Enforce UCON Obligations
Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos and Andrea Saracino
Evaluation of Software PUF Based on Gyroscope
Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto and Norikazu Yamasaki
White-Box Implementation of the KMAC Message Authentication Code
Jiqiang Lu, Zhigang Zhao and Huaqun Guo
Session 5: Cryptography II
11:00-13:00 (28 Nov)
Session Chair: Jiqiang Lu
Improving Signature Schemes with Tight Security Reductions
Tiong-Sik Ng, Syh-Yuan Tan and Ji-Jian Chin
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings
Xiu Xu, Chris Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu and Reza Azarderakhsh
Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
Łukasz Krzywiecki, Marta Słowik and Michał Szala
Recovering Internal States of Grain-v1
Deepak Kumar Dalai and Santu Pal
Session 6: Data and User Privacy
14:30:16:00 (28 Nov)
Session Chair: Ji-Jian Chin
GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures
Miroslaw Kutylowski, Jakub Lemiesz, Marta Słowik, Marcin Słowik, Kamil Kluczniak and Maciej Gębala
Defining a New Composite Cybersecurity Rating Scheme for SMEs
Andrew Rae and Asma Patel
Privacy Preserving Approach in Dynamic Social Network Data Publishing
Kamal Macwan and Sankita Patel
Short Paper I
16:30:17:50 (26 Nov)
Session Chair: Miroslaw Kutylowski
Using Freivalds’ Algorithm to Accelerate Lattice-Based Signature Verifications
Arnaud Sipasseuth, Thomas Plantard and Willy Susilo
Group-based Key Exchange Protocol based on Complete Decomposition Search Problem
Chang Seng Sin and Huey Voon Chen
Development Activities, Tools and Techniques of Secure Microservices Compositions
Peter Nkomo and Marijke Coetzee
Generating Phishing Emails Using Graph Database
Nasim Maleki and Ali A. Ghorbani
Short Paper II
16:30:17:30 (27 Nov)
Session Chair: Cheng-Kang Chu
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection
Wenjuan Li, Weizhi Meng and Lam-For Kwok
The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm
Chris Pelchen, David Jaeger, Christoph Meinel and Feng Cheng
A Novel and Comprehensive Evaluation Methodology for SIEM
Mahdieh Safarzadeh Vahed, Hossein Gharaee and Amir Hossein Panahi