Day 1 - October, 10
|
8:00 - 18:00 Registration 8:30 - 9:00 Opening session (Group Photo Shooting) 9:00 - 10:00 Keynote speech (Venue: Function Room 2)
Ephemeral Identifiers: Privacy in IoT --- the BLE beacons ecosystem 10:00 - 10:20 Coffee-break 10:20 - 11:40 Session 1 Mobile Security I (Venue: Function Room 2) Session Chair: Kui Ren
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management
H-Binder: A Hardened Binder Framework On Android Systems
Exploiting Android System Services Through Bypassing Service Helpers
Secure Keyboards against Motion Based Keystroke Inference Attack 11:40 - 13:40 Lunch Main Conference (13:40 - 16:40) 13:40 - 15:00 Session 2 Network Security (Venue: Function Room 2) Session Chair: Sherman Chow
Cloud-Based Privacy-Preserving Parking Navigation through Vehicular Communications
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
Key Updates at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications
Faulty Node Repair and Dynamically Spawned Black Hole Search 15:00 - 15:20 Coffee-break 15:20 - 16:40 Session 3 Applied Cryptography (Venue: Function Room 2) Session Chair: Jian Weng
Attribute-Based Encryption with Granular Revocation
Tokenisation Blacklisting using Linkable Group Signatures
Privacy-Preserving Multi-Pattern Matching
Parallel and Dynamic Structured Encryption ATCS Workshop (13:40 - 17:00) 13:40 - 15:20 ATCS Workshop - Session 1 (Venue: Function Room 3)
Secure IoT Using Weighted Signed Graphs
A Multi-Protocol Security Framework to Support Internet of Things
Tinder me softly – How safe are you really on Tinder?
Biometric Authentication using Facial Recognition
Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating strategy 15:20 - 15:40 Coffee-break 15:40 - 17:00 ATCS Workshop - Session 2 (Venue: Function Room 3)
Securing Websites against Homograph Attacks
Architecture Support for Controllable VMI on Untrusted Cloud
IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage
A Multi-Layer Model to Detect Spam Email at Client Side
17:00 - 18:30 Poster Session (each poster presentation for 5 minutes) 18:30 - 20:30 Reception |
Day 2 - October, 11
|
8:00 - 18:00 Registration 8:30 - 9:30 Keynote speech (Venue: Function Room 2)
Detecting Malicious Cyber Infrastructures for Fun and Profit 9:30 - 10:50 Panel session (Venue: Function Room 2) Security and Privacy in the IoT Era: New Challenges and Opportunities 10:50 - 11:00 Coffee-break 11:00 - 12:20 Session 4 Cloud Security (Venue: Function Room 2) Session Chair: Cong Wang
Access Control Management for Secure Cloud Storage
Attribution of Economic Denial of Sustainability Attacks in Public Clouds
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments 12:20 - 14:00 Lunch 14:00 - 15:20 Session 5 Web Security and Privacy (Venue: Function Room 2) Session Chair: Danfeng Yao
Website Forensic Investigation to Identify Evidence and Impact of Compromise
SecWeb: Privacy-preserving Web Browsing Monitoring with w-Event Differential Privacy
A Behavioral Biometrics Based Approach to Online Gender Classication
Unique on the Road: Re-identification of Vehicular Location-Based Metadata 15:20 - 15:40 Coffee-break 15:40 - 17:00 Session 6 System Security (Venue: Function Room 2) Session Chair: Guofei Gu
BinDNN: Resilient Function Matching Using Deep Learning
TZ-SSAP: Security-Sensitive Application Protection on Hardware-assisted Isolated Environment
SQLite Forensic Analysis Based on WAL
Environment Impact on Branch Transfer of Software 18:30 - 21:00 Banquet |
Day 3 -October, 12
|
8:00 - 18:00 Registration 9:00 - 10:20 Session 7 Mobile Security II (Venue: Function Room 2) Session Chair: Qian Wang
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware
GreatEatlon: Fast Static Detection of Modern Mobile Ransomware
Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem 10:20 - 10:40 Coffee-break 10:40 - 12:00 Session 8 Hardware Security (Venue: Function Room 2) Session Chair: Qi Li
FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Extracting More Entropy for TRNGs based on the Coherent Sampling
A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field
Security Analysis of Vendor Customized Code in Firmware of Embedded Device 12:00 - 13:30 Lunch |