11th international conference on information security...

7
ContactZhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:1391052097311th International Conference on Information Security Practice and Experience (ISPEC2015) May 5-8, 2015 1 st floor, New Main Building, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing,100191 北航新主楼1层,北京市海淀区学院路37号, 邮编:100191 May 4 14:00-18:00 Registration 会议注册报到 May 5 08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (9) 开幕式、合影、大会学术报告 (1)、会议论文报告(9) May 6 08:30-17:30 Keynote (1), Paper Presentation (11) 大会学术报告 (1)、会议论文报告(11) 18:00-20:30 Banquet (Beijing Vision Hotel) 晚宴(北京唯实国际文化交流中心) May 7 08:30-18:00 Keynote (1), Paper Presentation (13) 大会学术报告 (1)、会议论文报告(13) May 8 08:30-12:30 Industrial Talk (1), Paper Presentation (5), Closing 工业界技术报告(1),会议论文报告 (5),会议结束 Sponsored by: 大会赞助商 Organized by: Institute of Computing, Beihang University 承办单位: 北京航空航天大学计算机学院

Upload: others

Post on 24-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

11th International Conference on Information Security Practice and Experience

(ISPEC2015)

May 5-8, 2015

1st floor, New Main Building, Beihang University,

No. 37, Xueyuan Road, Haidian District, Beijing,100191

北航新主楼1层,北京市海淀区学院路37号, 邮编:100191

May 4 14:00-18:00 Registration 会议注册报到

May 5 08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (9)

开幕式、合影、大会学术报告 (1)、会议论文报告(9)

May 6

08:30-17:30 Keynote (1), Paper Presentation (11)

大会学术报告 (1)、会议论文报告(11)

18:00-20:30 Banquet (Beijing Vision Hotel)

晚宴(北京唯实国际文化交流中心)

May 7 08:30-18:00 Keynote (1), Paper Presentation (13)

大会学术报告 (1)、会议论文报告(13)

May 8 08:30-12:30 Industrial Talk (1), Paper Presentation (5), Closing

工业界技术报告(1),会议论文报告 (5),会议结束

Sponsored by:

大会赞助商

Organized by: Institute of Computing, Beihang University 承办单位: 北京航空航天大学计算机学院

Page 2: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

Direction to Conference Venue

Route 1 (By taxi): Beijing airport to conference site, it takes less than 150RMB (US$25) or so.

Route 2 (By Metro): Airport line, transfer to line 10 at SanYuan Bridge station, alight at West

Tucheng, then walk 15 minutes or so. (机场线在三元桥站换 10 号线,西土城站下车,步行 15 分钟

即可)

Conference Venue &Registration site

Hotel option 1 & Banquet

Entry

Hotel option 2 & Lunch/Dinner

Page 3: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

Conference Program

1st floor, New Main Building, Beihang University, Beijing (北航新主楼 1 层)

14:00-18:00 May 04, 2015

Registration and Conference Kit Collection Conference time

2015-05-05 (Day 1) : Meeting Room 2(第 2 报告厅)

8:30-9:00 Opening

Keynote 1: (Chair: Feng Bao )

9:00-10:00 Keynote: Techniques for Securing Scalable Multimedia Content in Server-Proxy-User Distribution Networks Prof. Robert H. Deng

10:00-11:00 Photo Shooting + Coffee Break

Session 1: Attribute-Based Encryption (Chair: Yongdong Wu)

11:00-11:30

Outsourcing the Re-encryption Key Generation: Flexible Ciphertext- Policy

Attribute-Based Proxy Re-encryption (page 301)

Yutaka Kawai

11:30-12:00 Revocable Threshold Attribute-Based Signature against Signing Key Exposure

Jianghong Wei, Xinyi Huang, Xuexian Hu, and Wenfen Liu

12:00-12:30 Fully Secure Online/Offline Predicate and Attribute-Based Encryption

Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay

12:30-14:00: Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐

Session 2: Stream cipher I (Chair: Robert Deng )

14:00-14:30 Differential Fault Analysis of Streebog (page 35)

Riham AlTawy and Amr M. Youssef

14:30-15:00 Fault Attacks on Stream Cipher Scream Shaoyu Du, Bin Zhang, Zhenqi Li, and Dongdai Lin

15:00-15:30 New Related Key Attacks on the RAKAPOSHI Stream Cipher Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, and Wei Zhao

15:30-16:00: Coffee Break

Session 3: Security Analysis (Chair: Xinyi Huang)

16:00-16:30 Cramer-Shoup Like Chosen Ciphertext Security from LPN

Xiaochao Sun, Bao Li, and Xianhui Lu

16:30-17:00 Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant Liqiang Peng, Lei Hu, Zhangjie Huang, and Jun Xu

17:00-17:30 Analysis of Fractional ωmbNAF for Scalar Multiplication

Weixuan Li, Wei Yu, and Kunpeng Wang

17:30-18:00 On the Effectiveness of Different Botnet Detection Approaches Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood

18:00: Dinner (Canteen, Training Center of Beihang University) 北航培训中心餐厅晚餐

Page 4: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

2015-05-06 (Day 2):Meeting Room 8 (第 8 报告厅)

Keynote 2: (Chair: Javier Lopez)

8:30-9:30 The NIST Randomness Beacon and Applications

Dr. Rene Peralta

Session 4: Key Exchange Protocol (Chair: Javier Lopez)

9:30-10:00 Strongly Secure Key Exchange Protocol with Minimal KEM

Baoping Tian, Fushan Wei, and Chuangui Ma

10:00-10:30 sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices

Shijun Zhao and Qianying Zhang

10:30-11:00: Coffee Break

Session 5: Elliptic Curve Cryptography (Chair: Feng Bao)

11:00-11:30 Models of Curves from GHS Attack in Odd Characteristic

Song Tian, Wei Yu, Bao Li, and Kunpeng Wang

11:30-12:00 Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves

Song Tian, Wei Yu, Bao Li, and Kunpeng Wang

12:00-12:30 Batch Blind Signatures on Elliptic Curves

Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, and Jianwei Liu

12:30-14:00: Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐

Session 6: Stream Cipher II (Chair: Rene Peralta)

14:00-14:30

Improved Differential Analysis of Block Cipher PRIDE

Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, and

Xiaoshuang Ma

14:30-15:00 Estimating Differential-Linear Distinguishers and Applications to CTC2

Chun Guo, Hailong Zhang, and Dongdai Lin

15:00-15:30 Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI

Shaoyu Du, Zhenqi Li, Bin Zhang, and Dongdai Lin

15:30-16:00: Coffee Break

Session 7: Authentication (Chair: Guilin Wang)

16:00-16:30 Half a Century of Practice: Who Is Still Storing Plaintext Passwords?

Erick Bauman, Yafeng Lu, and Zhiqiang Lin

16:30-17:00 User Identity Verification Based on Touchscreen Interaction Analysis in Web

Contexts Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert

17:00-17:30

Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset

Difference Method

Shantian Cheng and Juanyang Zhang

18:00-20:30 Banquet Beijing Vision Hotel (北京唯实国际文化交流中心)

Page 5: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

2015-05-07 (Day 3):Meeting Room 8 (第 8 报告厅)

Keynote 3: (Chair: Yongdng Wu)

8:30-9:30 Breaking Mobile Social Networks for Automated User Location

Prof. Kui Ren

Session 8: System Security (Chair: Qinghua Cao)

9:30-10:00 Operating System Security Policy Hardening via Capability Dependency Graphs Zhihui Han, Liang Cheng, Yang Zhang, and Dengguo Feng (page 1)

10:00-10:30 Expanding an Operating System’s Working Space with a New Mode to Support Trust Measurement Chenglong Wei, Wenchang Shi, Bo Qin, and Bin Liang

10:30-11:00 Coffee Break

Session 9: Mobile Security (Chair: Tieyan Li)

11:00-11:30 A Rapid and Scalable Method for Android Application Repackaging Detection

Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng (page 349)

11:30-12:00 Comprehensive Analysis of the Android Google Play’s Auto-update Policy

Craig Sanders, Ayush Shah, and Shengzhi Zhang

12:00-12:30

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component

Communication

Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, and Zhiqiang Wang

12:30-14:00 Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐

Session 10: Theory (Chair: Cheng-Kang Chu)

14:00-14:30 New Constructions of T-function

Dibyendu Roy, Ankita Chaturvedi, and Sourav Mukhopadhyay

14:30-15:00 A New Lattice-Based Threshold Attribute-Based Signature Scheme

Qingbin Wang, Shaozhen Chen, and Aijun Ge

15:00-15:30 Hard Invalidation of Electronic Signatures

Lucjan Hanzlik, Miroslaw Kutylowski, and Moti Yung

15:30-16:00 Coffee Break

Session 11: Implementation I (Chair: Kui Ren)

16:00-16:30 Lightweight Function Pointer Analysis

Wei Zhang and Yu Zhang

16:30-17:00 Accelerating RSA with Fine-Grained Parallelism Using GPU

Yang Yang, Zhi Guan, Huiping Sun, and Zhong Chen

17:00-17:30

On the Impacts of Mathematical Realization over Practical Security of Leakage

Resilient Cryptographic Schemes

Guangjun Fan, Yongbin Zhou, Fran cois-Xavier Standaert, and Dengguo Feng

17:30-18:00

Non-interactive Revocable Identity-Based Access Control over e-Healthcare

Records

Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, and Lei Zhang

18:00 Dinner(Canteen, Training Center of Beihang University) 北航培训中心餐厅

Page 6: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)

2015-05-08 (Day 4):Meeting Room 8 (第 8 报告厅)

Industrial Talk: (Chair: Zhoujun Li)

8:30-9:30 Mobile Platform Security: Industrial Approaches on Building the Chain of Trust

Dr Tieyan Li

Session 12: Implementation II (Chair: Zhoujun Li)

9:30-10:00 Efficient File Sharing in Electronic Health Records

Clementine Gritti, Willy Susilo, and Thomas Plantard

10:00-10:30

A Framework for Analyzing Verifiability in Traditional and Electronic Exams

Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade,

and Gabriele Lenzini

10:30-11:00 Coffee Break

Session 13: Privacy and Indistinguishability (Chair: Hua Guo)

11:00-11:30 ADKAM: A-Diversity K-Anonymity Model via Micro-aggregation

Liang Cheng, Shaoyin Cheng, and Fan Jiang

11:30-12:00 Visualizing Privacy Risks of Mobile Applications through a Privacy Meter

Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, and Jun Ho Huh

12:00-12:30 One-Round Witness Indistinguishability from Indistinguishability Obfuscation

Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, and Fei Tang

12:30-14:00 Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐

Closing 会议结束

Page 7: 11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience

Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)