EAI SecureComm 2022
17 October 2022 – Monday
Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)
09:00 – 09:30 Opening Remarks
09:30 – 10:30 Keynote I – Prof. XiaoFeng Wang
10:30 – 10:45 Coffee Break
10:45 – 12:00 AI for Security I
- Classification-Based Anomaly Prediction in XACML Policies
(Maryam Davari, Mohammad Zulkernine) - An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification
(Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun) - SecureBERT: A Domain-Specific Language Model for Cybersecurity
(Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-shaer)
12:00 – 12:30 Lunch Break
12:30 – 13:45 Blockchain I
- CTDRB: Controllable Timed Data Release using Blockchains
(Jingzhe Wang, Balaji Palanisamy) - FairBlock: Preventing Blockchain Front-running with Minimal Overheads
(Peyman Momeni, Sergey Gorbunov, Bohan Zhang) - Blockchain-based Ciphertext Policy-hiding Access Control Scheme
(Ruizhong Du, Tianhe Zhang)
13:45 – 14:50 Coffee Break
13:50 – 15:05 Data Security
- A Random Reversible Watermarking Schefme for Relational Data
(Qiang Liu, Hequn Xian, Jiancheng Zhang, Kunpeng Liu) - Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks
(Wen Xie, Niusen Chen, Bo Chen) - Bootstrapping Trust in Community Repository Projects
(Sangat Vaidya, Reza Curtmola, Justin Cappos, Santiago Torres-arias)
15:05 – 15:10 Coffee Break
15:10 – 16:25 Mobile Security
- What Data Do The Google Dialer and Messages Apps On Android Send to Google?
(Douglas Leith) - Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps
(Xiantong Hao, Dandan Ma, Hongliang Liang) - Secure CV2X using COTS Smartphones over LTE Infrastructure
(Spandan Mahadevegowda, Ryan Gerdes, Thidapat Chantem, Rose Qingyang Hu)
18 October 2022 – Tuesday
Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)
9:00 – 10:15 AI and Security II
- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network
(Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu) - Towards high transferability on neural network for black-box adversarial attacks
(Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu) - Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy
(Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang)
10:15 – 10:20 Coffee Break
10:20 – 12:00 Intrusion Detection
- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection
(Md ali reza Al amin, Sachin Shetty, Valerio Formicola, Martin Otto) - Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning
(Sanjeev Shukla, Manoj Misra, Gaurav Varshney) - AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
(Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng) - Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks
(Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Mohan Gurusamy)
12:00 – 12:30 Lunch Break
12:30 – 13:45 Binary Analysis
- Language and platform independent attribution of heterogeneous code
(Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova) - Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
(Qige Song, Yongzheng Zhang, Shuhao Li) - Cost-effective malware classification based on deep active learning
(Qian Qiang, Tianning Zang, Yang Hu, Yige Chen, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi)
13:45- 13:50 Coffee Break
13:50 – 15:05 Network Security
- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network
(Muhammad shadi Hajar, Harsha Kalutarage, M. omar Al-kadri) - Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
(Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li) - PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
(Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia)
15:05 – 15:10 Coffee Break
15:10- 16:25 Software Security
- No-Fuzz: Efficient Anti-Fuzzing Techniques
(Zhengxiang Zhou, Cong Wang, Qingchuan Zhao) - eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense
(Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang) - Breaking Embedded Software Homogeneity with Protocol Mutations
(Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Long Lu, Lorenzo De carli)
16:25 – 16:30 Coffee Break
16:30 – 17:20 Cryptography
- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
(Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung) - Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
(Alexandros Bakas, Eugene Frimpong, Antonis Michalas)
19 October 2022 – Wednesday
Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)
9:00 – 9:50 Cryptography II
- Replicated additive secret sharing with the optimized number of shares
(Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin) - Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation
(Hanyu Jia, Xiangxue Li)
9:50 – 11:10 Applied Cryptography
- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature
(Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Shuqin Fan, Fan Zhang, Bo Luo) - MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT
(Omar Ibrahim, Savio Sciancalepore, Roberto Di pietro) - A Cross-layer Plausibly Deniable Encryption System for Mobile Devices
(Niusen Chen, Bo Chen, Weisong Shi)
11:10 – 12:00 Blockchain II
- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers
(Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito) - Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification
(Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma)
12:00 – 13:00 Keynote II – Dr. Ahmad Reza Sadeghi
13:00 – 13:30 Lunch Break
13:30 – 14:30 Keynote III – Prof. Mauro Conti
14:30 – 14:45 Coffee Break
14:45 – 16:00 Privacy
- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly
(Pranay Kapoor, Rohan Pagey, Mannan Mohammad, Amr Youssef) - MetaPriv: Acting in Favor of Privacy on Social Media Platforms
(Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas) - Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks
(Xiaoting Li, Lingwei Chen, Dinghao Wu)
16:00 – 16:15 Closing Remark
19 October 2022 – Wednesday
Voov/ Tencent Meeting
Time zone: CST= GMT+8 (China)
20:00 – 21:15 Workshop: Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT)
- A Generalized Unknown Malware Classification
(Priyanka Bagade, Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla) - Research on the Grouping Method of Side-Channel Leakage Detection
(Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan) - PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX
(Cavidan Yakupoglu, Kurt Rohloff)