Program

last update: 13 May, 2022
Room B
Poster Session #1:
Short Presentation
17:30 - 18:30 (JST)
Session Chairs: Naoto Yanai (Osaka University), Jason Paul Cruz (Osaka University)
17:30 - 17:33 (JST)
POSTER: Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models
Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad and Tamer Abuhmed
17:33 - 17:36 (JST)
POSTER: Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE
Salman Ahmed, Ya Xiao, Taejoong Chung, Carol Fung, Moti Yung and Danfeng Yao
17:36 - 17:39 (JST)
POSTER: A Systematic Study of Bulletin Board and Its Application
Misni Suwito, Bayu Tama, Bagus Santoso, Sabyasach Dutta, Haowen Tan, Ueshige Yoshifumi and Kouichi Sakurai
17:39 - 17:42 (JST)
POSTER: Black-box and Target-specific Attack Against Interpretable Deep Learning Systems
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad and Tamer Abuhmed
17:42 - 17:45 (JST)
POSTER: Base64 Malleability in Practice
Konstantinos Chalkias and Panagiotis Chatzigiannis
17:45 - 17:48 (JST)
POSTER: IoT System Trustworthiness Assurance
Razvan Beuran, Sian En Ooi, Abbie Barbir and Yasuo Tan
17:48 - 17:51 (JST)
POSTER: Vulnerability Detection via Multimodal Learning: Datasets and Analysis
Xin Zhou and Rakesh Verma
17:51 - 17:54 (JST)
POSTER: RBMon: Real Time System Behavior Monitoring Tool
Nitesh Kumar, Anand Handa and Sandeep K. Shukla
17:54 - 17:57 (JST)
POSTER: The Personalities of Social Media Posts and Photos
Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison and Eric Chan-Tin
17:57 - 18:00 (JST)
POSTER: Email Summarization to Assist Users in Phishing Identification
Amir Kashapov, Tingmin Wu, Sharif Abuadbba and Carsten Rudolph
18:00 - 18:03 (JST)
POSTER: Enabling Attribute-Based Access Control in Linux Kernel
H.O Sai Varshith, Shamik Sural, Jaideep Vaidya and Vijay Atluri
18:03 - 18:06 (JST)
POSTER: Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware
Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed and Mohammed Abuhamad
18:06 - 18:09 (JST)
POSTER: TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura
18:09 - 18:12 (JST)
POSTER: Towards Polyvalent Adversarial Attacks on URL classification engines
Fabien Charmet, Tomohiro Morikawa, Harry Chandra Tanuwidjaja and Takeshi Takahashi
18:12 - 18:15 (JST)
POSTER: Decentralized Federated Learning for Internet of Things Anomaly Detection
Zhuotao Lian and Chunhua Su
18:15 - 18:18 (JST)
POSTER: Autonomous Network Defence using Reinforcement Learning
Myles Foley, Chris Hicks, Kate Highnam and Vasilios Mavroudis
18:18 - 18:21 (JST)
POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras
18:21 - 18:24 (JST)
POSTER: Decentralized and Collaborative Tracing for Group Signatures
Maharage Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
In-Person: Room B
Poster Session #2:
Parallel Session
18:30 - 19:30 (JST)
Session Chair: Naoto Yanai (Osaka University)
Virtual: Zoom Breakout Room
Poster Session #2:
Parallel Session
18:30 - 19:30 (JST)
Session Chair: Jason Paul Cruz (Osaka University)
Go to the top of this page
Onsite Registration desk opening time period (JST): 8:00 - 16:00