October 22 ATCS Workshop (full day) – ProgramRoom King George |
||||
October, 23 Main Conference Day 1 |
||||
8:00 – 18:00 Registration8:30 – 9:00 Opening session9:00 – 10:00 Keynote speech (Venue: Room Canadian A+B)Attacks, Defenses, and Impacts of Machine Learning in Adversarial Settings 10:00 – 10:30 Coffee-break 10:30 – 12:05 Session 1 Attacks and SDN Security (Venue: Room Canadian A+B)Session Chair: Kui Ren
12:05 – 13:35 Lunch 13:35 – 15:30 Session 2 User Security (Venue: Room Canadian A+B)Session Chair: Saurabh Bagchi All Your Accounts Are Belong to Us BluePass: A Secure Hand-free Password Manager Exploring the Network of Real-World Passwords: Visualization and Estimation VaultIME: Regaining User Control for Password Managers through Auto-correction (short) A Sudoku Matrix-based Method of Pitch Period Steganography in Low-rate Speech Coding (short) 15:30 – 16:00 Coffee-break 16:00 – 17:30 Session 3 Network Security I (Venue: Room Canadian A+B)Session Chair: Ninghui Li Guilt-by-Association: Detecting Malicious Entities via Graph Mining Understanding Adversarial Strategies from Bot Recruitment to Scheduling BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain (short) A-Tor: Accountable Anonymity in Tor (short) |
||||
October, 24 Main Conference Day 2 |
||||
8:00 – 18:00 Registration8:30 – 9:30 Keynote speech (Venue: Room Canadian A+B)Differential Privacy: Potential and Limitations 9:35 – 10:45 Panel session (Venue: Room Canadian A+B)Title: Mobile security Ninghui Li (Purdue University), 10:45 – 11:00 Coffee-break 11:00 – 12:35 Session 4 Mobile Security I (Venue: Room Canadian A+B)Session Chair: Jose Maria de Fuentes ThiefTrap – An Anti-Theft Framework for Android An efficient Trustzone-based In-application Isolation Schema for Mobile Authenticators Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols Cross-site Input Inference Attacks on Mobile Web Users (short) 11:00 – 12:35 Session 5 Web Security I (Venue: Room King George)Session Chair: Lorena Gonzalez H2DoS: An Application-Layer DoS Attack towards HTTP/2 Protocol HSTS Measurement and An Enhanced Stripping Attack Against HTTPS A Deep Learning based Online Malicious URL and DNS Detection Scheme A Framework for Formal Analysis of Privacy on SSO Protocols (short) 12:35 – 14:00 Lunch 14:00 – 15:35 Session 6 Cloud Security (Venue: Room Canadian A+B)Session Chair: Mahesh Tripunitara Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge Outsourced k-Means Clustering over Encrypted Data under Multiple Keys in Spark Framework Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-Keyword Searchable Encryption MPOPE: Multi-Provider Order-Preserving Encryption for Cloud Data Privacy (short) 14:00 – 15:40 Session 7 Systems and Software Security I (Venue: Room King George)Session Chair: Chuan Yue Gray-box Software Integrity Checking via Side-channels A Program Manipulation Middleware And Its Applications on System Security Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing Turing Obfuscation 15:40 – 16:05 Coffee-break 16:05 – 17:35 Session 8 Network Security II (Venue: Room Canadian A+B)Session Chair: Eugene Vasserman Very Short Intermittent DDoS Attacks in an Unsaturated System VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance(short) 16:05 – 17:50 Session 9 Systems and Software Security II (Venue: Room King George)Session Chair: Felix Wu Lambda Obfuscation HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware (short) DiffGuard: Obscuring sensitive information in Canary based Protections (short) ROPOB: Obfuscating Binary Code via Return Oriented Programming (short) FRProtector: Defeating Control Flow Hijacking Through Function-level Randomization and Transfer Protection (short) 18:30 – 21:00 Banquet |
||||
October, 25 Main Conference Day 3 |
||||
8:00 – 12:00 Registration8:30 – 10:10 Session 10 Mobile Security II (Venue: Room Canadian A+B)Session Chair: Dinghao Wu Visual Analysis of Android Malware Behavior Profile Based on PMCGdroid: A Pruned Lightweight APP Call Graph Defining and Detecting Environment Discrimination in Android Apps LinkFlow: Efficient Large-Scale Inter-App Privacy Leakage Detection Enhancing Android Security through App Splitting 10:10 – 10:40 Coffee-break 10:40 – 12:15 Session 11 Web Security II (Venue: Room Canadian A+B)Session Chair: Sencun Zhu Achieve Efficient and Privacy-preserving Proximity Detection scheme for Social Applications Twisting Lattice and Graph Techniques to Compress Transactional Ledgers Mending Wall: On the Implementation of Censorship in India JSForce: A Forced Execution Engine for Malicious JavaScript Detection (short) 12:15 – 13:45 Lunch 1st Workshop on Security and Privacy in the Internet Of Things (SePrIoT) – Program
|