Full Program

EAI SecureComm 2023
19 – 21 October 2023

  

Thursday,
October 19, 2023:     
08:30 – 09:00  Registration  

09:00 – 09:30  Opening  

09:30 – 10:30  Keynote I – Prof. Wenyuan Xu
 
10:30 – 11:00  Coffee Break  

11:00 – 12:15  Privacy I (Session Chair: Haibo Hu)
* Street Rep: A Privacy-Preserving Reputation Aggregation System
* Split Without a Leak: Reducing Privacy Leakage in Split Learning
* Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks
* PPEC: Privacy-Preserving and Cost-Effective Incremental Density Peak Clustering Scheme for Profit-Driven Clouds

12:15 – 13:45  Lunch  

13:45 – 14:40  Authentication (Session Chair: Yiming Zhang)
* Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home
* Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller
* An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density

14:40 – 15:35  Blockchain and Distributed System Security (Session Chair: Shan Jiang)
* Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving
* Byzantine Protocols with Asymptotically Optimal Communication Complexity
* VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detection  

15:35 – 16:05  Coffee Break  

16:05 – 17:00  Software Security (Session Chair: Xin Liu)
* CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing
* Learning AI coding style for software plagiarism detection
* Understanding and Measuring Inter-Process Code Injection in Windows Malware  

17:00 – 17:55  AI for Security I (Session Chair: Kai Zhou)
* Unsupervised Multi-Criteria Adversarial Detection in Deep Image Retrieval
* VRC-GraphNet: A Graph Neural Network-based Reasoning Framework for Attacking Visual Reasoning Captchas
* CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph  

18:15       Gathering time for Welcome Reception  

19:00        Welcome Reception  
Friday,
October 20, 2023:
09:00 – 10:00  Keynote II – Prof. Robert Deng  

10:00 – 10:30  Coffee Break    

10:30 – 11:25  Cryptography I (Session Chair: Jinqiang Lin)
* HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference
* Efficient Zero Knowledge for Regular Language
* Certificateless Aggregate Signature Without Trapdoor for Cloud Storage  

11:25 – 12:20  IoT Security (Session Chair: Jianwei Zhuge)
* Enhancing Cross-Device Security with Fine-Grained Permission Control
* The Security Analysis of ROS2 Communication
* VET: Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors  

12:20 – 13:50  Lunch  

13:50 – 15:05  Intrusion and Anomaly Detection (Session Chair: (Shuyuan Jin)
* A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive
* MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification
* DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions
* POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control  

15:05 – 16:00  Privacy II (Session Chair: Xingye Lu)
* Efficient and Scalable Multi-Party Privacy-Preserving k-NN Classification
* Do Backdoors Assist Membership Inference Attacks?
* Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter  

16:00 – 16:30  Coffee Break   

16:30 – 17:25  AI for Security II (Session Chair: Chuhan Wang)
* Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS
* CUFT: Cuflow-based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification
* Meta Perturbation Generation Network for Text-based CAPTCHA

18:00        Gathering time for Dinner Banquet  

19:00        Dinner Banquet      
Saturday,
October 21, 2023:
09:00 – 10:15  Data Security (Session Chair: Chaoyi Lu)
* An Efficient Private Information Retrieval Protocol Based on TFHE
* mShield: Protect In-process Sensitive Data Against Vulnerable Third-Party Libraries
* An Authentication Algorithm for Sets of Spatial Data Objects
* Password Cracking by Exploiting User Group Information

10:15 – 10:45  Coffee Break  

10:45 – 12:00  Network Security (Session Chair: Chaoyi Lu)
* Visibility of Scan Traffic Trends in Sparsely Populated Darknets
* A Stable Fine-grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network
* Unsupervised and Adaptive Tor Website Fingerprinting
* Securing Web Inputs using Parallel Session Attachments  

12:00 – 13:30  Lunch  

13:30 – 14:45  Program Analysis (Session Chair: Hao Zhou)
* Ransomware as a Service: Demystifying Android Ransomware Generators
* Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features
* Analyzing Implementation based SSL/TLS Vulnerabilities with Binary Semantics Analysis
* PDFIET: PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution  

14:45 – 16:00  Cryptography II (Sesion Chair: Shang Gao)
* Enabling Fast Settlement in Atomic Cross-Chain Swaps
* Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS
* Optimization of Functional Bootstrap with Large LUT and Packing Key Switching
* Anonymous Key Issuing Protocol with Certified Identities in Identity-based Encryption  

16:00 – 16:30  Coffee Break  

16:30 – 17:25  AI for Security III (Session Chair: Mengyuan Zhang)
* DNN Architecture Attacks via Network and Power Side Channels
* Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks
* Invisibility Spell: Adversarial Patch Attack Against Object Detectors  

17:25 – 17:45  Workshop: Lightweight Intrusion Detection for IoT Systems using Artificial Neural Networks (Session Chair: Mengyuan Zhang)

17:45         Closure