1st floor, New Main Building, Beihang University, No. 37, Xueyuan

11th International Conference on Information Security Practice and Experience
(ISPEC2015)
May 5-8, 2015
1st floor, New Main Building, Beihang University,
No. 37, Xueyuan Road, Haidian District, Beijing,100191
北航新主楼1层,北京市海淀区学院路37号, 邮编:100191
May 4
14:00-18:00
May 5
08:30-18:00
08:30-17:30
May 6
18:00-20:30
May 7
08:30-18:00
May 8
08:30-12:30
Registration 会议注册报到
Opening, Photo Shooting, Keynote (1), Paper Presentation (9)
开幕式、合影、大会学术报告 (1)、会议论文报告(9)
Keynote (1), Paper Presentation (11)
大会学术报告 (1)、会议论文报告(11)
Banquet (Beijing Vision Hotel)
晚宴(北京唯实国际文化交流中心)
Keynote (1), Paper Presentation (13)
大会学术报告 (1)、会议论文报告(13)
Industrial Talk (1), Paper Presentation (5), Closing
工业界技术报告(1),会议论文报告 (5),会议结束
Sponsored by:
大会赞助商
Organized by: Institute of Computing, Beihang University
承办单位:
北京航空航天大学计算机学院
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
Direction to Conference Venue
Route 1 (By taxi): Beijing airport to conference site, it takes less than 150RMB (US$25) or so.
Route 2 (By Metro): Airport line, transfer to line 10 at SanYuan Bridge station, alight at West
Tucheng, then walk 15 minutes or so. (机场线在三元桥站换 10 号线,西土城站下车,步行 15 分钟
即可)
Hotel option 2 &
Lunch/Dinner
Entry
Conference Venue
&Registration site
Hotel option 1 &
Banquet
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
Conference Program
1st floor, New Main Building, Beihang University, Beijing (北航新主楼 1 层)
14:00-18:00
May 04, 2015
Registration and Conference Kit Collection
Conference time
2015-05-05 (Day 1) : Meeting Room 2(第 2 报告厅)
8:30-9:00
Opening
Keynote 1: (Chair: Feng Bao )
9:00-10:00
Keynote: Techniques for Securing Scalable Multimedia Content in Server-ProxyUser Distribution Networks
Prof. Robert H. Deng
10:00-11:00
Photo Shooting + Coffee Break
Session 1: Attribute-Based Encryption (Chair: Yongdong Wu)
11:00-11:30
11:30-12:00
12:00-12:30
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext- Policy
Attribute-Based Proxy Re-encryption (page 301)
Yutaka Kawai
Revocable Threshold Attribute-Based Signature against Signing Key Exposure
Jianghong Wei, Xinyi Huang, Xuexian Hu, and Wenfen Liu
Fully Secure Online/Offline Predicate and Attribute-Based Encryption
Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay
12:30-14:00: Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 2: Stream cipher I (Chair: Robert Deng )
14:00-14:30
14:30-15:00
15:00-15:30
Differential Fault Analysis of Streebog (page 35)
Riham AlTawy and Amr M. Youssef
Fault Attacks on Stream Cipher Scream
Shaoyu Du, Bin Zhang, Zhenqi Li, and Dongdai Lin
New Related Key Attacks on the RAKAPOSHI Stream Cipher
Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, and Wei Zhao
15:30-16:00: Coffee Break
Session 3: Security Analysis (Chair: Xinyi Huang)
16:00-16:30
16:30-17:00
17:00-17:30
17:30-18:00
Cramer-Shoup Like Chosen Ciphertext Security from LPN
Xiaochao Sun, Bao Li, and Xianhui Lu
Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant
Liqiang Peng, Lei Hu, Zhangjie Huang, and Jun Xu
Analysis of Fractional ωmbNAF for Scalar Multiplication
Weixuan Li, Wei Yu, and Kunpeng Wang
On the Effectiveness of Different Botnet Detection Approaches
Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood
18:00: Dinner (Canteen, Training Center of Beihang University) 北航培训中心餐厅晚餐
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
2015-05-06 (Day 2):Meeting Room 8 (第 8 报告厅)
Keynote 2: (Chair: Javier Lopez)
8:30-9:30
The NIST Randomness Beacon and Applications
Dr. Rene Peralta
Session 4: Key Exchange Protocol (Chair: Javier Lopez)
9:30-10:00
10:00-10:30
Strongly Secure Key Exchange Protocol with Minimal KEM
Baoping Tian, Fushan Wei, and Chuangui Ma
sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices
Shijun Zhao and Qianying Zhang
10:30-11:00: Coffee Break
Session 5: Elliptic Curve Cryptography (Chair: Feng Bao)
11:00-11:30
11:30-12:00
12:00-12:30
Models of Curves from GHS Attack in Odd Characteristic
Song Tian, Wei Yu, Bao Li, and Kunpeng Wang
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves
Song Tian, Wei Yu, Bao Li, and Kunpeng Wang
Batch Blind Signatures on Elliptic Curves
Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, and Jianwei Liu
12:30-14:00: Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 6: Stream Cipher II (Chair: Rene Peralta)
Improved Differential Analysis of Block Cipher PRIDE
14:00-14:30
14:30-15:00
15:00-15:30
Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, and
Xiaoshuang Ma
Estimating Differential-Linear Distinguishers and Applications to CTC2
Chun Guo, Hailong Zhang, and Dongdai Lin
Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI
Shaoyu Du, Zhenqi Li, Bin Zhang, and Dongdai Lin
15:30-16:00: Coffee Break
Session 7: Authentication (Chair: Guilin Wang)
16:00-16:30
16:30-17:00
17:00-17:30
18:00-20:30
Half a Century of Practice: Who Is Still Storing Plaintext Passwords?
Erick Bauman, Yafeng Lu, and Zhiqiang Lin
User Identity Verification Based on Touchscreen Interaction Analysis in Web
Contexts Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert
Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset
Difference Method
Shantian Cheng and Juanyang Zhang
Banquet Beijing Vision Hotel (北京唯实国际文化交流中心)
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
2015-05-07 (Day 3):Meeting Room 8 (第 8 报告厅)
Keynote 3: (Chair: Yongdng Wu)
8:30-9:30
Breaking Mobile Social Networks for Automated User Location
Prof. Kui Ren
Session 8: System Security (Chair: Qinghua Cao)
9:30-10:00
10:00-10:30
Operating System Security Policy Hardening via Capability Dependency Graphs
Zhihui Han, Liang Cheng, Yang Zhang, and Dengguo Feng (page 1)
Expanding an Operating System’s Working Space with a New Mode to Support Trust
Measurement
Chenglong Wei, Wenchang Shi, Bo Qin, and Bin Liang
10:30-11:00 Coffee Break
Session 9: Mobile Security (Chair: Tieyan Li)
11:00-11:30
11:30-12:00
12:00-12:30
A Rapid and Scalable Method for Android Application Repackaging Detection
Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng (page 349)
Comprehensive Analysis of the Android Google Play’s Auto-update Policy
Craig Sanders, Ayush Shah, and Shengzhi Zhang
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component
Communication
Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, and Zhiqiang Wang
12:30-14:00 Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 10: Theory (Chair: Cheng-Kang Chu)
14:00-14:30
14:30-15:00
15:00-15:30
New Constructions of T-function
Dibyendu Roy, Ankita Chaturvedi, and Sourav Mukhopadhyay
A New Lattice-Based Threshold Attribute-Based Signature Scheme
Qingbin Wang, Shaozhen Chen, and Aijun Ge
Hard Invalidation of Electronic Signatures
Lucjan Hanzlik, Miroslaw Kutylowski, and Moti Yung
15:30-16:00 Coffee Break
Session 11: Implementation I (Chair: Kui Ren)
16:00-16:30
16:30-17:00
17:00-17:30
17:30-18:00
Lightweight Function Pointer Analysis
Wei Zhang and Yu Zhang
Accelerating RSA with Fine-Grained Parallelism Using GPU
Yang Yang, Zhi Guan, Huiping Sun, and Zhong Chen
On the Impacts of Mathematical Realization over Practical Security of Leakage
Resilient Cryptographic Schemes
Guangjun Fan, Yongbin Zhou, Fran¸cois-Xavier Standaert, and Dengguo Feng
Non-interactive Revocable Identity-Based Access Control over e-Healthcare
Records
Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, and Lei Zhang
18:00 Dinner(Canteen, Training Center of Beihang University) 北航培训中心餐厅
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
2015-05-08 (Day 4):Meeting Room 8 (第 8 报告厅)
Industrial Talk: (Chair: Zhoujun Li)
8:30-9:30
Mobile Platform Security: Industrial Approaches on Building the Chain of Trust
Dr Tieyan Li
Session 12: Implementation II (Chair: Zhoujun Li)
9:30-10:00
10:00-10:30
Efficient File Sharing in Electronic Health Records
Clementine Gritti, Willy Susilo, and Thomas Plantard
A Framework for Analyzing Verifiability in Traditional and Electronic Exams
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade,
and Gabriele Lenzini
10:30-11:00 Coffee Break
Session 13: Privacy and Indistinguishability (Chair: Hua Guo)
11:00-11:30
ADKAM: A-Diversity K-Anonymity Model via Micro-aggregation
Liang Cheng, Shaoyin Cheng, and Fan Jiang
Visualizing Privacy Risks of Mobile Applications through a Privacy Meter
11:30-12:00
Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, and Jun Ho Huh
One-Round Witness Indistinguishability from Indistinguishability Obfuscation
12:00-12:30
Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, and Fei Tang
12:30-14:00 Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Closing 会议结束
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)
Contact: Zhoujun Li (Mobile: 13910520973)
联系人:李舟军 (手机:13910520973)