EAI SecureComm 2022

17 October 2022 – Monday

Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)

09:00 – 09:30      Opening Remarks

09:30 – 10:30      Keynote IProf. XiaoFeng Wang

10:30 – 10:45      Coffee Break

10:45 – 12:00      AI for Security I

  • Classification-Based Anomaly Prediction in XACML Policies
    (Maryam Davari, Mohammad Zulkernine)
  • An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification
    (Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun)
  • SecureBERT: A Domain-Specific Language Model for Cybersecurity
    (Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-shaer)

12:00 – 12:30      Lunch Break

12:30 – 13:45      Blockchain I

  • CTDRB: Controllable Timed Data Release using Blockchains
    (Jingzhe Wang, Balaji Palanisamy)
  • FairBlock: Preventing Blockchain Front-running with Minimal Overheads
    (Peyman Momeni, Sergey Gorbunov, Bohan Zhang)
  • Blockchain-based Ciphertext Policy-hiding Access Control Scheme
    (Ruizhong Du, Tianhe Zhang)

13:45 – 14:50      Coffee Break

13:50 – 15:05      Data Security

  • A Random Reversible Watermarking Schefme for Relational Data
    (Qiang Liu, Hequn Xian, Jiancheng Zhang, Kunpeng Liu)
  • Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks
    (Wen Xie, Niusen Chen, Bo Chen)
  • Bootstrapping Trust in Community Repository Projects
    (Sangat Vaidya, Reza Curtmola, Justin Cappos, Santiago Torres-arias)

15:05 – 15:10      Coffee Break

15:10 – 16:25      Mobile Security

  • What Data Do The Google Dialer and Messages Apps On Android Send to Google?
    (Douglas Leith)
  • Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps
    (Xiantong Hao, Dandan Ma, Hongliang Liang)
  • Secure CV2X using COTS Smartphones over LTE Infrastructure
    (Spandan Mahadevegowda, Ryan Gerdes, Thidapat Chantem, Rose Qingyang Hu)

18 October 2022 – Tuesday

Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)

9:00 – 10:15      AI and Security II

  • CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network
    (Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu)
  • Towards high transferability on neural network for black-box adversarial attacks
    (Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu)
  • Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy
    (Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang)

10:15 – 10:20      Coffee Break

10:20 – 12:00      Intrusion Detection

  • Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection
    (Md ali reza Al amin, Sachin Shetty, Valerio Formicola, Martin Otto)
  • Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning
    (Sanjeev Shukla, Manoj Misra, Gaurav Varshney)
  • AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
    (Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng)
  • Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks
    (Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Mohan Gurusamy)

12:00 – 12:30      Lunch Break

12:30 – 13:45      Binary Analysis

  • Language and platform independent attribution of heterogeneous code
    (Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova)
  • Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison
    (Qige Song, Yongzheng Zhang, Shuhao Li)
  • Cost-effective malware classification based on deep active learning
    (Qian Qiang, Tianning Zang, Yang Hu, Yige Chen, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi)

13:45- 13:50       Coffee Break

13:50 – 15:05      Network Security

  • DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network
    (Muhammad shadi Hajar, Harsha Kalutarage, M. omar Al-kadri)
  • Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
    (Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li)
  • PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
    (Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia)

15:05 – 15:10     Coffee Break

15:10- 16:25       Software Security

  • No-Fuzz: Efficient Anti-Fuzzing Techniques
    (Zhengxiang Zhou, Cong Wang, Qingchuan Zhao)
  • eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense
    (Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang)
  • Breaking Embedded Software Homogeneity with Protocol Mutations
    (Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Long Lu, Lorenzo De carli)

16:25 – 16:30     Coffee Break

16:30 – 17:20      Cryptography

  • TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
    (Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung)
  • Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
    (Alexandros Bakas, Eugene Frimpong, Antonis Michalas)

19 October 2022 – Wednesday

Zoom Meeting
Time zone: CDT= GMT-5 (Kansas City, US)

9:00 – 9:50      Cryptography II

  • Replicated additive secret sharing with the optimized number of shares
    (Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin)
  • Generic 2-Party PFE with Constant Rounds and Linear  Active Security, and Efficient Instantiation
    (Hanyu Jia, Xiangxue Li)

9:50  – 11:10     Applied Cryptography

  • Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature
    (Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Shuqin Fan, Fan Zhang, Bo Luo)
  • MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT
    (Omar Ibrahim, Savio Sciancalepore, Roberto Di pietro)
  • A Cross-layer Plausibly Deniable Encryption System for Mobile Devices
    (Niusen Chen, Bo Chen, Weisong Shi)

11:10 – 12:00      Blockchain II

  • Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers
    (Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito)
  • Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification
    (Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma)

12:00 – 13:00      Keynote IIDr. Ahmad Reza Sadeghi

13:00 – 13:30      Lunch Break

13:30 – 14:30      Keynote III – Prof. Mauro Conti

14:30 – 14:45     Coffee Break

14:45 – 16:00     Privacy

  • Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly
    (Pranay Kapoor, Rohan Pagey, Mannan Mohammad, Amr Youssef)
  • MetaPriv: Acting in Favor of Privacy on Social Media Platforms
    (Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas)
  • Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks
    (Xiaoting Li, Lingwei Chen, Dinghao Wu)

16:00 – 16:15      Closing Remark

19 October 2022 – Wednesday

Voov/ Tencent Meeting
Time zone: CST= GMT+8 (China)

20:00 – 21:15 Workshop: Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT)

  • A Generalized Unknown Malware Classification
    (Priyanka Bagade, Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla)
  • Research on the Grouping Method of Side-Channel Leakage Detection
    (Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan)
  • PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX
    (Cavidan Yakupoglu, Kurt Rohloff)

In case of any questions related to Main Program or Zoom lD, please write an
email to Luo Bo: [email protected]

In case of any questions related to the Workshop or VooV ID, please write an
email to Mehdi Gheisari: [email protected]