
Monday
Take a look at the programme details for Monday 14 September.
Programme details
Track A
09:00-09:10: Welcome Plenary, chaired by Liqun Chen and Ninghui Li
09:10–10:10: Keynote I from Aggelos Kiayias, chaired by Steve Schneider
Full presentation
10:20–11:35: Database and web security, chaired by Nishanth Sastry
- Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
- Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jason Loh, Jian Weng and Robert H. Deng
- Abstract presentation
- Full presentation
- Bulwark: Holistic and Verified Security Monitoring of Web Protocols
- Lorenzo Veronese, Stefano Calzavara and Luca Compagna
- Abstract presentation
- Full presentation
- A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
- Rachit Garg, Nishant Kumar, Shweta Agrawal and Manoj Prabhakaran
- Abstract presentation
- Full presentation
11:35–12:50: System security I, chaired by Sotiris Moschoyiannis
- Deduplication-friendly Watermarking for Multimedia Data in Public Clouds
- Weijing You, Bo Chen, Limin Liu and Jiwu Jing
- Abstract presentation
- Full presentation
- DANTE: A Framework for Mining and Monitoring Darknet Traffic
- Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin and Asaf Shabtai
- Abstract presentation
- Full presentation
- Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation
- Anisa Halimi and Erman Ayday
- Abstract presentation
- Full presentation
13:20–13:40: IBM lunch break talk
- Title: Discovery, analysis and exploitation of speculative execution attacks
- Presenter: Alessandro Sorniotti – Research Staff Member at IBM Research
13:50–15:30: Network security I, chaired by Santanu Dash
- Anonymity Preserving Byzantine Vector Consensus
- Christian Cachin, Daniel Collins, Tyler Crain and Vincent Gramoli
- Abstract presentation
- Full presentation
- CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks
- Abdulmalik Humayed, Fengjun Li, Jingqiang Lin and Bo Luo
- Abstract presentation
- Full presentation
- Distributed Detection of APTs: Consensus vs. Clustering
- Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman and Javier Lopez
- Abstract presentation
- Full presentation
- Designing Reverse Firewall for the Real World
- Angele Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete and Thyla van der Merwe
- Abstract presentation
- Full presentation
15:50–17:30: Software security I, chaired by Brijesh Dongol
- Follow the blue bird: A study on threat data published on Twitter
- Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira and Alysson Bessani
- Dynamic and Secure Memory Transformation in Userspace
- Robert Lyerly, Xiaoguang Wang and Binoy Ravindran
- Abstract presentation
- Full presentation
- Understanding the Security Risks of Docker Hub
- Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen and Raheem Beyah
- Abstract presentation
- Full presentation
- DE-auth of the blue! Transparent De-authentication using Bluetooth Low Energy Beacon
- Pier Paolo Tricomi, Mauro Conti and Gene Tsudik
- Abstract presentation
- Full presentation
Track B
10:20–11:35: Formal modelling, chaired by Cristina Alcaraz
- Automatic generation of source lemmas in Tamarin: towards automatic proofs of security protocols
- Veronique Cortier, Stephanie Delaune and Jannik Dreier
- Abstract presentation
- Full presentation
- When is a test not a proof?
- Eleanor McMurtry, Olivier Pereira and Vanessa Teague
- Abstract presentation
- Full presentation
- Hardware Fingerprinting for the ARINC 429 Avionic Bus
- Nimrod Gilboa Markevich and Avishai Wool
- Abstract presentation
- Full presentation
11:35–12:50: Applied cryptography I, chaired by Guomin Yang
- Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-based Definition
- Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai and Shota Yamada
- Abstract presentation
- Full presentation
- SHECS-PIR: Somewhat Homomorphic Encryption-based Compact and Scalable Private Information Retrieval
- Jeongeun Park and Mehdi Tibouchi
- Abstract presentation
- Full presentation
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Willy Susilo, Dung Hoang Duong, Huy Quoc Le and Josef Pieprzyk
- Abstract presentation
- Full presentation
13:50–15:30: Analysing attacks, chaired by Kehuan Zhang
- Linear Attack on Round-Reduced DES Using Deep Learning
- Botao Hou, Yongqiang Li, Haoyue Zhao and Bin Wu
- Abstract presentation
- Full presentation
- Detection by Attack: Detecting Adversarial Samples by Undercover Attack
- Qifei Zhou, Rong Zhang, Bo Wu, Weiping Li and Tong Mo
- Abstract presentation
- Full presentation
- Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
- Mirko Polato, Fabio Aiolli, Mauro Conti and Stjepan Picek
- Abstract presentation
- Full presentation
- Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
- Xihui Chen, Ema Kepuska, Sjouke Mauw and Yunior Ramirez-Cruz
- Abstract presentation
- Full presentation
15:50–17:30: System security II, chaired by Linzhi Jiang
- Fooling primality tests on smartcards
- Vladimir Sedlacek, Jan Jancar and Petr Svenda
- Abstract presentation
- Full presentation
- An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA
- Damian Aparicio, Santiago Escobar, Raúl Gutiérrez and Julia Sapiña
- Abstract presentation
- Full presentation
- On the Privacy Risks of Compromised Trigger-Action Platforms
- Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu and Tiffany Hyun-Jin Kim
- Abstract presentation
- Full presentation
- Plenty of Phish in the Sea: Analyzing Potential Pre-Attack Surfaces
- Tobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz and Norbert Pohlmann
- Abstract presentation
- Full presentation