Program

last update: 13 June, 2022
Room B
Room B
Keynote Talk I
9:00 - 10:00 (JST)
Session Chair: Kazue Sako (Waseda University)
9:00 - 10:00 (JST)
New Multiparty Computational Model:
From Nakamoto to YOSO
Prof. Tal Rabin,
University of Pennsylvania
,
United States of America
Break
10:00 - 10:30 (JST)
Room A
Session 1A:
Cryptography #1
10:30 - 11:50 (JST)
Session Chair: Miyako Ohkubo (National Institute of Information and Communications Technology)
10:30 - 10:50 (JST)
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
C. Peeters; C. Patton; I. Sherman; D. Olszewski; T. Shrimpton; P. Traynor
10:50 - 11:10 (JST)
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits
S. Feng; S. Xu; L. Zhang
11:10 - 11:30 (JST)
Iterative Oblivious Pseudo-Random Functions and Applications
E. Blass; F. Kerschbaum; T. Mayberry
11:30 - 11:50 (JST)
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting
C. CAI; X. Qin; T. Yuen; S. Yiu
Room B
Session 1B:
Systems and Network Security #1
10:30 - 11:50 (JST)
Session Chair: Ning Zhang (Washington University in St. Louis )
10:30 - 10:50 (JST)
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates
N. Chen; B. Chen
10:50 - 11:10 (JST)
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations
P. Walker; N. Saxena; S Anand; T. Halevi; S. Saini
11:10 - 11:30 (JST)
GraphTrack: A Graph-based Cross-Device Tracking Framework
B. Wang; T. Zhou; S. Li; Y. Cao; N. Gong
11:30 - 11:50 (JST)
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network
B. Bhattarai; H. Huang
Go to the top of this page
Lunch Break
11:50-13:20 (JST)
Room A
Session 2A:
Blockchain #1
13:20 - 15:00 (JST)
Session Chair: Qiang Tang (The University of Sydney)
13:20 - 13:40 (JST)
Evaluating Blockchain Protocols with Abusive Modeling
V. SHARMA; P. SZALACHOWSKI; J. ZHOU
13:40 - 14:00 (JST)
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies
Q. WANG; R. Li; Q. Wang; S. CHEN; Y. Xiang
14:00 - 14:20 (JST)
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains
Z. Sui; J. Liu; J. Yu; M. Au; J. Liu
14:20 - 14:40 (JST)
Eliminating Sandwich Attacks with the Help of Game Theory
L. Heimbach; R. Wattenhofer
14:40 - 15:00 (JST)
TRAP: The Bait of Rational Players to Solve Byzantine Consensus
A. Ranchal-Pedrosa; V. Gramoli
Room B
Session 2B:
Wireless Communication #1
13:20 - 15:00 (JST)
Session Chair: Chunhua Su (University of Aizu)
13:20 - 13:40 (JST)
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol
H. Lee; I. Karim; N. Li; E. Bertino
13:40 - 14:00 (JST)
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
D. Antonioli; N. Tippenhauer; K. Rasmussen; M. Payer
14:00 - 14:20 (JST)
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces
P. Staat; H. Elders-Boll; M. Heinrichs; C. Zenger; C. Paar
14:20 - 14:40 (JST)
Wireless Manipulation of Serial Communication
G. Dayanikli; A. Mohammed; R. Gerdes; M. Mina
14:40 - 15:00 (JST)
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation
R. Miller; I. Boureanu; S. Wesemeyer; C. Newton
Go to the top of this page
Break
15:00-15:30 (JST)
Room A
Session 3A:
Cyber-physical and IOT Security #1
15:30 - 17:10 (JST)
Session Chair: Junghwan Rhee (University of Central Oklahoma)
15:30 - 15:50 (JST)
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
M. Dahlmanns; J. Lohmöller; J. Pennekamp; J. Bodenhausen; K. Wehrle; M. Henze
15:50 - 16:10 (JST)
On the Security of the FLARM Collision Warning System
B. Wang; G. Tresoldi; M. Strohmeier; V. Lenders
16:10 - 16:30 (JST)
Hopper: Per-Device Nano Segmentation for the Industrial IoT
P. De Vaere; A. Tulimiero; A. Perrig
16:30 - 16:50 (JST)
Signal Injection Attacks against CCD Image Sensors
S. Köhler; R. Baker; I. Martinovic
16:50 - 17:10 (JST)
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis
A. Alsadi; K. Sameshima; J. Bleier; K. Yoshioka; M. Lindorfer; M. van Eeten; C. Ganan
Room B
Session 3B:
Machine Learning #1
15:30 - 17:10 (JST)
Session Chair: Fengwei Zhang (Southern University of Science and Technology)
15:30 - 15:50 (JST)
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
J. Zhang; E. Chang; H. Lee
15:50 - 16:10 (JST)
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B. Wu; X. Yang; S. Pan; X. YUAN
16:10 - 16:30 (JST)
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten
Q. Nguyen; R. Oikawa; D. Divakaran; M. Chan; K. Low
16:30 - 16:50 (JST)
Membership Feature Disentanglement Network
H. Ha; J. Jang; Y. Jeong; S. Yoon
16:50 - 17:10 (JST)
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption
J. Jang; A. Kim; B. Na; Y. Lee; D. Yhee; B. Lee; J. Cheon; S. Yoon
Go to the top of this page
Break
17:10-17:30 (JST)
17:30-19:30 (JST)