This event is endorsed
and organized by

12th EAI International Conference on Security and Privacy in Communication Networks

October 10–12, 2016 | Guangzhou, People's Republic of China

 

Day 1 - October, 10

 

8:00 - 18:00        Registration 


8:30 - 9:00          Opening session (Group Photo Shooting)


9:00 - 10:00        Keynote speech (Venue: Function Room 2)

Ephemeral Identifiers: Privacy in IoT --- the BLE beacons ecosystem
Moti Yung (Snapchat)


10:00 - 10:20      Coffee-break


10:20 - 11:40      Session 1 Mobile Security I (Venue: Function Room 2)

Session Chair: Kui Ren

AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management
Zhengyang Qu (Northwestern University), Guanyu Guo (Zhejiang University), Zhengyue Shao (Zhejiang University), Vaibhav Rastogi (University of Wisconsin–Madison), Yan Chen (Northwestern University), Hao Chen (University of California, Davis) and Wangjun Hong (Northwestern University).

H-Binder: A Hardened Binder Framework On Android Systems
Dong Shen (Beihang University), Zhangkai Zhang (Beihang University), Xuhua Ding (Singapore Management University), Zhoujun Li (Beihang University) and Robert Deng (Singapore Management University).

Exploiting Android System Services Through Bypassing Service Helpers
Yacong Gu (Chinese Academy of Sciences), Yao Cheng (Singapore Management University), Lingyun Ying (Chinese Academy of Sciences), Yemian Lu (Chinese Academy of Sciences), Qi Li (Tsinghua University) and Purui Su (Chinese Academy of Sciences).

Secure Keyboards against Motion Based Keystroke Inference Attack
Shaoyong Du (Nanjing University), Yue Gao (Nanjing University), Jingyu Hua (Nanjing University) and Sheng Zhong (Nanjing University). 


11:40 - 13:40      Lunch


Main Conference (13:40 - 16:40)


13:40 - 15:00      Session 2 Network Security (Venue: Function Room 2)

Session Chair: Sherman Chow

Cloud-Based Privacy-Preserving Parking Navigation through Vehicular Communications
Jianbing Ni (University of Waterloo), Kuan Zhang (University of Waterloo), Xiaodong Lin (University of Ontario Institute of Technology), Yong Yu (University of Electronic Science and Technology of China) and Xuemin Shen (University of Waterloo).

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
Nicolae Paladi (SICS Swedish ICT) and Christian Gehrmann (SICS Swedish ICT).

Key Updates at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications
Sang-Yoon Chang (University of Colorado Colorado Springs), Shaoying Cai (Institute for Infocomm Research, A*STAR), Hwajung Seo (Institute for Infocomm Research, A*STAR) and Yih-Chun Hu (University of Illinois at Urbana-Champaign).

Faulty Node Repair and Dynamically Spawned Black Hole Search
Wei Shi (University of Ontario Institute of Technology), Jean-Pierre Corriveau (School of Computer Science, Carleton University) and Mengfei Peng (UOIT).


15:00 - 15:20      Coffee-break


15:20 - 16:40       Session 3 Applied Cryptography (Venue: Function Room 2)

Session Chair: Jian Weng

Attribute-Based Encryption with Granular Revocation
Hui Cui (Singapore Management University), Robert H. Deng (Singapore Management University), Xuhua Ding (Singapore Management University) and Yingjiu Li (Singapore Management University).

Tokenisation Blacklisting using Linkable Group Signatures
Assad Umar (Royal Holloway, University of London), Iakovos Gurulian (Royal Holloway, University of London), Keith Mayes (Royal Holloway, University of London) and Konstantinos Markantonakis (Royal Holloway, University of London).

Privacy-Preserving Multi-Pattern Matching
Tao Zhang (Chinese University of Hong Kong), Xiuhua Wang (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong).

Parallel and Dynamic Structured Encryption
Russell W. F. Lai (Chinese University of Hong Kong) and Sherman S. M. Chow (Chinese University of Hong Kong).


ATCS Workshop (13:40 - 17:00)


13:40 - 15:20      ATCS Workshop - Session 1 (Venue: Function Room 3)

Secure IoT Using Weighted Signed Graphs
Pinaki Sarkar and Morshed Chowdhury

A Multi-Protocol Security Framework to Support Internet of Things
Biplob Ray, Morshed Chowdhury and Dr. Jemal Abawajy.

Tinder me softly – How safe are you really on Tinder?
Mark Carman and Kim-Kwang Raymond Choo.

Biometric Authentication using Facial Recognition
Mozammel Chowdhury, Junbin Gao and Rafiqul Islam.

Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating strategy
Fidel Ikundi.


15:20 - 15:40      Coffee-break


15:40 - 17:00      ATCS Workshop - Session 2 (Venue: Function Room 3)

Securing Websites against Homograph Attacks
Jemal Abawajy and Zaher Al Aghbari.

Architecture Support for Controllable VMI on Untrusted Cloud
Jiangyong Shi and Yuexiang Yang.

IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-­App Data Leakage
Tianjun Wu and Yuexiang Yang

A Multi-Layer Model to Detect Spam Email at Client Side
Kamini Simi Bajaj.


 


17:00 - 18:30     Poster Session (each poster presentation for 5 minutes)


18:30 - 20:30     Reception 

 

Day 2 - October, 11

 

8:00 - 18:00        Registration


8:30 - 9:30        Keynote speech (Venue: Function Room 2)

Detecting Malicious Cyber Infrastructures for Fun and Profit
Guofei Gu (Texas A&M University)


9:30 - 10:50     Panel session (Venue: Function Room 2)

Security and Privacy in the IoT Era: New Challenges and Opportunities


10:50 - 11:00      Coffee-break


11:00 - 12:20      Session 4 Cloud Security (Venue: Function Room 2)

Session Chair: Cong Wang

Access Control Management for Secure Cloud Storage
Enrico Bacis (Università degli Studi di Bergamo), Sabrina De Capitani di Vimercati (Università degli Studi di Milano), Sara Foresti (Università degli Studi di Milano), Stefano Paraboschi (Università degli Studi di Bergamo), Marco Rosa (Università degli Studi di Bergamo) and Pierangela Samarati (Università degli Studi di Milano).

Attribution of Economic Denial of Sustainability Attacks in Public Clouds
Mohammad Karami (George Mason University) and Songqing Chen (George Mason University).

A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
Ling Yang (Chinese Academy of Sciences), Fuyang Fang (Chinese Academy of Sciences), Xianhui Lu (Chinese Academy of Sciences), Wen Tao Zhu (Chinese Academy of Sciences), Qiongxiao Wang (Chinese Academy of Sciences), Shen Yan (Chinese Academy of Sciences) and Shiran Pan (Chinese Academy of Sciences).

ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments
Lorena González Manzano (Universidad Carlos III de Madrid), José María De Fuentes (Universidad Carlos III de Madrid) and K. Raymond Choo (University of South Australia).


12:20 - 14:00      Lunch


14:00 - 15:20      Session 5 Web Security and Privacy (Venue: Function Room 2)

Session Chair: Danfeng Yao

Website Forensic Investigation to Identify Evidence and Impact of Compromise
Yuta Takata (NTT Secure Platform Laboratories and Waseda University), Mitsuaki Akiyama (NTT Secure Platform Laboratories), Takeshi Yagi (NTT Secure Platform Laboratories), Takeshi Yada (NTT Secure Platform Laboratories) and Shigeki Goto (Waseda University).

SecWeb: Privacy-preserving Web Browsing Monitoring with w-Event Differential Privacy
Qian Wang (Wuhan University), Xiao Lu (Wuhan University), Yan Zhang (Wuhan University), Zhibo Wang (Wuhan University), Zhan Qin (The State University of New York at Buffalo) and Kui Ren (The State University of New York at Buffalo).

A Behavioral Biometrics Based Approach to Online Gender Classication
Nicolas Van Balen (College of William and Mary), Christopher Ball (College of William and Mary) and Haining Wang (University of Delaware).

Unique on the Road: Re-identification of Vehicular Location-Based Metadata
Zheng Xiao (Tongji University), Cheng Wang (Tongji University), Weili Han (Fudan University) and Changjun Jiang (Tongji University). 


15:20 - 15:40      Coffee-break


15:40 - 17:00      Session 6 System Security (Venue: Function Room 2)

Session Chair: Guofei Gu

BinDNN: Resilient Function Matching Using Deep Learning
Nathaniel Lageman (The Pennsylvania State University), Eric Kilmer (The Pennsylvania State University), Robert Walls (The Pennsylvania State University) and Patrick McDaniel (The Pennsylvania State University).

TZ-SSAP: Security-Sensitive Application Protection on Hardware-assisted Isolated Environment
Yanhong He (Chinese Academy of Sciences), Xianyi Zheng (Chinese Academy of Sciences), Ziyuan Zhu (Chinese Academy of Sciences) and Gang Shi (Chinese Academy of Sciences).

SQLite Forensic Analysis Based on WAL
Yao Liu (HangZhou DianZi University), Ming Xu (HangZhou DianZi University), Jian Xu (HangZhou DianZi University), Ning Zheng (HangZhou DianZi University) and Xiaodong Lin (University of Ontario Institute of Technology).

Environment Impact on Branch Transfer of Software
Jianming Fu (Wuhan University), Yan Lin (Wuhan University) and Xu Zhang (Wuhan University). 


18:30 - 21:00      Banquet

 

Day 3 -October, 12

 

8:00 - 18:00        Registration


9:00 - 10:20        Session 7 Mobile Security II (Venue: Function Room 2)

Session Chair: Qian Wang

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware
Zhiqiang Li (University of Nebraska-Lincoln), Lichao Sun (University of Nebraska-Lincoln), Qiben Yan (University of Nebraska-Lincoln), Witawas Srisa-An (University of Nebraska-Lincoln) and Zhenxiang Chen (University of Jinan).

GreatEatlon: Fast Static Detection of Modern Mobile Ransomware
Chengyu Zheng (Politecnico Di Milano), Stefano Zanero (Politecnico Di Milano) and Federico Maggi (Politecnico Di Milano).

Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling
Yongfeng Li (Nanjing University), Shanqing Guo (Shandong University) and Bing Mao (Nanjing University).

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem
Xing Liu (Beijing Jiaotong University), Sencun Zhu (Pennsylvania State University), Wei Wang (Beijing Jiaotong University) and Jiqiang Liu (Beijing Jiaotong University).


10:20 - 10:40      Coffee-break


10:40 - 12:00      Session 8 Hardware Security (Venue: Function Room 2)

Session Chair: Qi Li

FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs
Qinglong Zhang (Chinese Academy of Sciences), Zongbin Liu (Chinese Academy of Sciences), Cunqing Ma (Chinese Academy of Sciences), Changting Li (Chinese Academy of Sciences), Lingchen Zhang (Chinese Academy of Sciences) and Jiwu Jing (Chinese Academy of Sciences).

Extracting More Entropy for TRNGs based on the Coherent Sampling
Jing Yang (Chinese Academy of Sciences), Yuan Ma (IChinese Academy of Sciences), Tianyu Chen (Chinese Academy of Sciences), Jingqiang Lin (Chinese Academy of Sciences) and Jiwu Jing (Chinese Academy of Sciences).

A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field
Hailiang Fu (Tsinghua University), Guoqiang Bai (Tsinghua University) and Xingjun Wu (Tsinghua University).

Security Analysis of Vendor Customized Code in Firmware of Embedded Device
Muqing Liu (Shanghai Jiao Tong University), Juanru Li (Shanghai Jiao Tong University), Juliang Shu (Shanghai Jiao Tong University), Yuanyuan Zhang (Shanghai Jiao Tong University) and Dawu Gu (Shanghai Jiao Tong University). 


12:00 - 13:30      Lunch