EAI SecureComm 2023
19 – 21 October 2023
Thursday, October 19, 2023: | 08:30 – 09:00 Registration 09:00 – 09:30 Opening 09:30 – 10:30 Keynote I – Prof. Wenyuan Xu 10:30 – 11:00 Coffee Break 11:00 – 12:15 Privacy I (Session Chair: Haibo Hu) * Street Rep: A Privacy-Preserving Reputation Aggregation System * Split Without a Leak: Reducing Privacy Leakage in Split Learning * Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks * PPEC: Privacy-Preserving and Cost-Effective Incremental Density Peak Clustering Scheme for Profit-Driven Clouds 12:15 – 13:45 Lunch 13:45 – 14:40 Authentication (Session Chair: Yiming Zhang) * Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home * Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller * An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density 14:40 – 15:35 Blockchain and Distributed System Security (Session Chair: Shan Jiang) * Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving * Byzantine Protocols with Asymptotically Optimal Communication Complexity * VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detection 15:35 – 16:05 Coffee Break 16:05 – 17:00 Software Security (Session Chair: Xin Liu) * CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing * Learning AI coding style for software plagiarism detection * Understanding and Measuring Inter-Process Code Injection in Windows Malware 17:00 – 17:55 AI for Security I (Session Chair: Kai Zhou) * Unsupervised Multi-Criteria Adversarial Detection in Deep Image Retrieval * VRC-GraphNet: A Graph Neural Network-based Reasoning Framework for Attacking Visual Reasoning Captchas * CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph 18:15 Gathering time for Welcome Reception 19:00 Welcome Reception |
Friday, October 20, 2023: | 09:00 – 10:00 Keynote II – Prof. Robert Deng 10:00 – 10:30 Coffee Break 10:30 – 11:25 Cryptography I (Session Chair: Jinqiang Lin) * HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference * Efficient Zero Knowledge for Regular Language * Certificateless Aggregate Signature Without Trapdoor for Cloud Storage 11:25 – 12:20 IoT Security (Session Chair: Jianwei Zhuge) * Enhancing Cross-Device Security with Fine-Grained Permission Control * The Security Analysis of ROS2 Communication * VET: Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors 12:20 – 13:50 Lunch 13:50 – 15:05 Intrusion and Anomaly Detection (Session Chair: (Shuyuan Jin) * A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive * MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification * DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions * POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control 15:05 – 16:00 Privacy II (Session Chair: Xingye Lu) * Efficient and Scalable Multi-Party Privacy-Preserving k-NN Classification * Do Backdoors Assist Membership Inference Attacks? * Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter 16:00 – 16:30 Coffee Break 16:30 – 17:25 AI for Security II (Session Chair: Chuhan Wang) * Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS * CUFT: Cuflow-based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification * Meta Perturbation Generation Network for Text-based CAPTCHA 18:00 Gathering time for Dinner Banquet 19:00 Dinner Banquet |
Saturday, October 21, 2023: | 09:00 – 10:15 Data Security (Session Chair: Chaoyi Lu) * An Efficient Private Information Retrieval Protocol Based on TFHE * mShield: Protect In-process Sensitive Data Against Vulnerable Third-Party Libraries * An Authentication Algorithm for Sets of Spatial Data Objects * Password Cracking by Exploiting User Group Information 10:15 – 10:45 Coffee Break 10:45 – 12:00 Network Security (Session Chair: Chaoyi Lu) * Visibility of Scan Traffic Trends in Sparsely Populated Darknets * A Stable Fine-grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network * Unsupervised and Adaptive Tor Website Fingerprinting * Securing Web Inputs using Parallel Session Attachments 12:00 – 13:30 Lunch 13:30 – 14:45 Program Analysis (Session Chair: Hao Zhou) * Ransomware as a Service: Demystifying Android Ransomware Generators * Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features * Analyzing Implementation based SSL/TLS Vulnerabilities with Binary Semantics Analysis * PDFIET: PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution 14:45 – 16:00 Cryptography II (Sesion Chair: Shang Gao) * Enabling Fast Settlement in Atomic Cross-Chain Swaps * Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS * Optimization of Functional Bootstrap with Large LUT and Packing Key Switching * Anonymous Key Issuing Protocol with Certified Identities in Identity-based Encryption 16:00 – 16:30 Coffee Break 16:30 – 17:25 AI for Security III (Session Chair: Mengyuan Zhang) * DNN Architecture Attacks via Network and Power Side Channels * Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks * Invisibility Spell: Adversarial Patch Attack Against Object Detectors 17:25 – 17:45 Workshop: Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks (Session Chair: Mengyuan Zhang) 17:45 Closure |