11th International Conference on Information Security Practice and Experience (ISPEC2015) May 5-8, 2015 1st floor, New Main Building, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing,100191 北航新主楼1层,北京市海淀区学院路37号, 邮编:100191 May 4 14:00-18:00 May 5 08:30-18:00 08:30-17:30 May 6 18:00-20:30 May 7 08:30-18:00 May 8 08:30-12:30 Registration 会议注册报到 Opening, Photo Shooting, Keynote (1), Paper Presentation (9) 开幕式、合影、大会学术报告 (1)、会议论文报告(9) Keynote (1), Paper Presentation (11) 大会学术报告 (1)、会议论文报告(11) Banquet (Beijing Vision Hotel) 晚宴(北京唯实国际文化交流中心) Keynote (1), Paper Presentation (13) 大会学术报告 (1)、会议论文报告(13) Industrial Talk (1), Paper Presentation (5), Closing 工业界技术报告(1),会议论文报告 (5),会议结束 Sponsored by: 大会赞助商 Organized by: Institute of Computing, Beihang University 承办单位: 北京航空航天大学计算机学院 Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) Direction to Conference Venue Route 1 (By taxi): Beijing airport to conference site, it takes less than 150RMB (US$25) or so. Route 2 (By Metro): Airport line, transfer to line 10 at SanYuan Bridge station, alight at West Tucheng, then walk 15 minutes or so. (机场线在三元桥站换 10 号线,西土城站下车,步行 15 分钟 即可) Hotel option 2 & Lunch/Dinner Entry Conference Venue &Registration site Hotel option 1 & Banquet Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) Conference Program 1st floor, New Main Building, Beihang University, Beijing (北航新主楼 1 层) 14:00-18:00 May 04, 2015 Registration and Conference Kit Collection Conference time 2015-05-05 (Day 1) : Meeting Room 2(第 2 报告厅) 8:30-9:00 Opening Keynote 1: (Chair: Feng Bao ) 9:00-10:00 Keynote: Techniques for Securing Scalable Multimedia Content in Server-ProxyUser Distribution Networks Prof. Robert H. Deng 10:00-11:00 Photo Shooting + Coffee Break Session 1: Attribute-Based Encryption (Chair: Yongdong Wu) 11:00-11:30 11:30-12:00 12:00-12:30 Outsourcing the Re-encryption Key Generation: Flexible Ciphertext- Policy Attribute-Based Proxy Re-encryption (page 301) Yutaka Kawai Revocable Threshold Attribute-Based Signature against Signing Key Exposure Jianghong Wei, Xinyi Huang, Xuexian Hu, and Wenfen Liu Fully Secure Online/Offline Predicate and Attribute-Based Encryption Pratish Datta, Ratna Dutta, and Sourav Mukhopadhyay 12:30-14:00: Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐 Session 2: Stream cipher I (Chair: Robert Deng ) 14:00-14:30 14:30-15:00 15:00-15:30 Differential Fault Analysis of Streebog (page 35) Riham AlTawy and Amr M. Youssef Fault Attacks on Stream Cipher Scream Shaoyu Du, Bin Zhang, Zhenqi Li, and Dongdai Lin New Related Key Attacks on the RAKAPOSHI Stream Cipher Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, and Wei Zhao 15:30-16:00: Coffee Break Session 3: Security Analysis (Chair: Xinyi Huang) 16:00-16:30 16:30-17:00 17:00-17:30 17:30-18:00 Cramer-Shoup Like Chosen Ciphertext Security from LPN Xiaochao Sun, Bao Li, and Xianhui Lu Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant Liqiang Peng, Lei Hu, Zhangjie Huang, and Jun Xu Analysis of Fractional ωmbNAF for Scalar Multiplication Weixuan Li, Wei Yu, and Kunpeng Wang On the Effectiveness of Different Botnet Detection Approaches Fariba Haddadi, Duc Le Cong, Laura Porter, and A. Nur Zincir-Heywood 18:00: Dinner (Canteen, Training Center of Beihang University) 北航培训中心餐厅晚餐 Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) 2015-05-06 (Day 2):Meeting Room 8 (第 8 报告厅) Keynote 2: (Chair: Javier Lopez) 8:30-9:30 The NIST Randomness Beacon and Applications Dr. Rene Peralta Session 4: Key Exchange Protocol (Chair: Javier Lopez) 9:30-10:00 10:00-10:30 Strongly Secure Key Exchange Protocol with Minimal KEM Baoping Tian, Fushan Wei, and Chuangui Ma sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices Shijun Zhao and Qianying Zhang 10:30-11:00: Coffee Break Session 5: Elliptic Curve Cryptography (Chair: Feng Bao) 11:00-11:30 11:30-12:00 12:00-12:30 Models of Curves from GHS Attack in Odd Characteristic Song Tian, Wei Yu, Bao Li, and Kunpeng Wang Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves Song Tian, Wei Yu, Bao Li, and Kunpeng Wang Batch Blind Signatures on Elliptic Curves Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, and Jianwei Liu 12:30-14:00: Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐 Session 6: Stream Cipher II (Chair: Rene Peralta) Improved Differential Analysis of Block Cipher PRIDE 14:00-14:30 14:30-15:00 15:00-15:30 Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, and Xiaoshuang Ma Estimating Differential-Linear Distinguishers and Applications to CTC2 Chun Guo, Hailong Zhang, and Dongdai Lin Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI Shaoyu Du, Zhenqi Li, Bin Zhang, and Dongdai Lin 15:30-16:00: Coffee Break Session 7: Authentication (Chair: Guilin Wang) 16:00-16:30 16:30-17:00 17:00-17:30 18:00-20:30 Half a Century of Practice: Who Is Still Storing Plaintext Passwords? Erick Bauman, Yafeng Lu, and Zhiqiang Lin User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method Shantian Cheng and Juanyang Zhang Banquet Beijing Vision Hotel (北京唯实国际文化交流中心) Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) 2015-05-07 (Day 3):Meeting Room 8 (第 8 报告厅) Keynote 3: (Chair: Yongdng Wu) 8:30-9:30 Breaking Mobile Social Networks for Automated User Location Prof. Kui Ren Session 8: System Security (Chair: Qinghua Cao) 9:30-10:00 10:00-10:30 Operating System Security Policy Hardening via Capability Dependency Graphs Zhihui Han, Liang Cheng, Yang Zhang, and Dengguo Feng (page 1) Expanding an Operating System’s Working Space with a New Mode to Support Trust Measurement Chenglong Wei, Wenchang Shi, Bo Qin, and Bin Liang 10:30-11:00 Coffee Break Session 9: Mobile Security (Chair: Tieyan Li) 11:00-11:30 11:30-12:00 12:00-12:30 A Rapid and Scalable Method for Android Application Repackaging Detection Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng (page 349) Comprehensive Analysis of the Android Google Play’s Auto-update Policy Craig Sanders, Ayush Shah, and Shengzhi Zhang IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, and Zhiqiang Wang 12:30-14:00 Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐 Session 10: Theory (Chair: Cheng-Kang Chu) 14:00-14:30 14:30-15:00 15:00-15:30 New Constructions of T-function Dibyendu Roy, Ankita Chaturvedi, and Sourav Mukhopadhyay A New Lattice-Based Threshold Attribute-Based Signature Scheme Qingbin Wang, Shaozhen Chen, and Aijun Ge Hard Invalidation of Electronic Signatures Lucjan Hanzlik, Miroslaw Kutylowski, and Moti Yung 15:30-16:00 Coffee Break Session 11: Implementation I (Chair: Kui Ren) 16:00-16:30 16:30-17:00 17:00-17:30 17:30-18:00 Lightweight Function Pointer Analysis Wei Zhang and Yu Zhang Accelerating RSA with Fine-Grained Parallelism Using GPU Yang Yang, Zhi Guan, Huiping Sun, and Zhong Chen On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes Guangjun Fan, Yongbin Zhou, Fran¸cois-Xavier Standaert, and Dengguo Feng Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, and Lei Zhang 18:00 Dinner(Canteen, Training Center of Beihang University) 北航培训中心餐厅 Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) 2015-05-08 (Day 4):Meeting Room 8 (第 8 报告厅) Industrial Talk: (Chair: Zhoujun Li) 8:30-9:30 Mobile Platform Security: Industrial Approaches on Building the Chain of Trust Dr Tieyan Li Session 12: Implementation II (Chair: Zhoujun Li) 9:30-10:00 10:00-10:30 Efficient File Sharing in Electronic Health Records Clementine Gritti, Willy Susilo, and Thomas Plantard A Framework for Analyzing Verifiability in Traditional and Electronic Exams Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, and Gabriele Lenzini 10:30-11:00 Coffee Break Session 13: Privacy and Indistinguishability (Chair: Hua Guo) 11:00-11:30 ADKAM: A-Diversity K-Anonymity Model via Micro-aggregation Liang Cheng, Shaoyin Cheng, and Fan Jiang Visualizing Privacy Risks of Mobile Applications through a Privacy Meter 11:30-12:00 Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, and Jun Ho Huh One-Round Witness Indistinguishability from Indistinguishability Obfuscation 12:00-12:30 Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, and Fei Tang 12:30-14:00 Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐 Closing 会议结束 Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
© Copyright 2024