| 
 Day 1 - October, 10 
 | 
| 8:00 - 18:00 Registration 8:30 - 9:00 Opening session (Group Photo Shooting) 9:00 - 10:00 Keynote speech (Venue: Function Room 2) 
					Ephemeral Identifiers: Privacy in IoT --- the BLE beacons ecosystem 10:00 - 10:20 Coffee-break 10:20 - 11:40 Session 1 Mobile Security I (Venue: Function Room 2) Session Chair: Kui Ren 
					AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management 
					H-Binder: A Hardened Binder Framework On Android Systems 
					Exploiting Android System Services Through Bypassing Service Helpers 
					Secure Keyboards against Motion Based Keystroke Inference Attack 11:40 - 13:40 Lunch Main Conference (13:40 - 16:40) 13:40 - 15:00 Session 2 Network Security (Venue: Function Room 2) Session Chair: Sherman Chow 
					Cloud-Based Privacy-Preserving Parking Navigation through Vehicular Communications 
					TruSDN: Bootstrapping Trust in Cloud Network Infrastructure 
					Key Updates at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications 
					Faulty Node Repair and Dynamically Spawned Black Hole Search 15:00 - 15:20 Coffee-break 15:20 - 16:40 Session 3 Applied Cryptography (Venue: Function Room 2) Session Chair: Jian Weng 
					Attribute-Based Encryption with Granular Revocation 
					Tokenisation Blacklisting using Linkable Group Signatures 
					Privacy-Preserving Multi-Pattern Matching 
					Parallel and Dynamic Structured Encryption ATCS Workshop (13:40 - 17:00) 13:40 - 15:20 ATCS Workshop - Session 1 (Venue: Function Room 3) 
					Secure IoT Using Weighted Signed Graphs 
					A Multi-Protocol Security Framework to Support Internet of Things 
					Tinder me softly – How safe are you really on Tinder? 
					Biometric Authentication using Facial Recognition 
					Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating strategy 15:20 - 15:40 Coffee-break 15:40 - 17:00 ATCS Workshop - Session 2 (Venue: Function Room 3) 
					Securing Websites against Homograph Attacks 
					Architecture Support for Controllable VMI on Untrusted Cloud 
					IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage 
					A Multi-Layer Model to Detect Spam Email at Client Side 
 17:00 - 18:30 Poster Session (each poster presentation for 5 minutes) 18:30 - 20:30 Reception | 
| 
 Day 2 - October, 11 
 | 
| 8:00 - 18:00 Registration 8:30 - 9:30 Keynote speech (Venue: Function Room 2) 
					Detecting Malicious Cyber Infrastructures for Fun and Profit 9:30 - 10:50 Panel session (Venue: Function Room 2) Security and Privacy in the IoT Era: New Challenges and Opportunities 10:50 - 11:00 Coffee-break 11:00 - 12:20 Session 4 Cloud Security (Venue: Function Room 2) Session Chair: Cong Wang 
					Access Control Management for Secure Cloud Storage 
					Attribution of Economic Denial of Sustainability Attacks in Public Clouds 
					A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem 
					ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments 12:20 - 14:00 Lunch 14:00 - 15:20 Session 5 Web Security and Privacy (Venue: Function Room 2) Session Chair: Danfeng Yao 
					Website Forensic Investigation to Identify Evidence and Impact of Compromise 
					SecWeb: Privacy-preserving Web Browsing Monitoring with w-Event Differential Privacy 
					A Behavioral Biometrics Based Approach to Online Gender Classication 
					Unique on the Road: Re-identification of Vehicular Location-Based Metadata 15:20 - 15:40 Coffee-break 15:40 - 17:00 Session 6 System Security (Venue: Function Room 2) Session Chair: Guofei Gu 
					BinDNN: Resilient Function Matching Using Deep Learning 
					TZ-SSAP: Security-Sensitive Application Protection on Hardware-assisted Isolated Environment 
					SQLite Forensic Analysis Based on WAL 
					Environment Impact on Branch Transfer of Software 18:30 - 21:00 Banquet | 
| 
 Day 3 -October, 12 
 | 
| 8:00 - 18:00 Registration 9:00 - 10:20 Session 7 Mobile Security II (Venue: Function Room 2) Session Chair: Qian Wang 
					DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware 
					GreatEatlon: Fast Static Detection of Modern Mobile Ransomware 
					Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling 
					Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem 10:20 - 10:40 Coffee-break 10:40 - 12:00 Session 8 Hardware Security (Venue: Function Room 2) Session Chair: Qi Li 
					FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs 
					Extracting More Entropy for TRNGs based on the Coherent Sampling 
					A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field 
					Security Analysis of Vendor Customized Code in Firmware of Embedded Device 12:00 - 13:30 Lunch | 
 
  
  
  
 

 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
 

