Day
1 August 10, 2022(Tokyo, Japan Time) |
Chair |
|
09:00-09:20 |
Welcome plenary: From General Chairs and
PC Chairs |
|
09:20-10:10 |
Keynote Speech 1 Prof. Moti Young "Science + Systems Imply a Better Security Practice" |
|
10:10-10:30 |
Coffee
break |
|
10:30-12:10 |
Session 1 Blockchain
and Applications |
|
10:30-10:50 |
"BlockRAT:
An Enhanced Remote Access Trojan Framework via Blockchain" |
|
10:50:11:10 |
"ChainSCAN:
A Blockchain-based Supply Chain Alerting Framework for Food Safety" Jorge Castillo, Kevin Barba
and Qian Chen. |
|
11:10:11:30 |
"Adapted PBFT Consensus Protocol for
Sharded Blockchain" Ling Yang and Huawei Huang. |
|
11:30:11:50 |
"A Practical Blockchain-based
Maintenance Record System for Better Aircraft Security" |
|
11:50:12:10 |
"Redactable Blockchain with
Fine-Grained Autonomy and Transaction Rollback" Chunying Peng and Haixia
Xu. |
|
12:10-13:30 |
Lunch Break |
|
13:30-14:50 |
Session
2 AI Crypto and Security Workshop (AI-CryptoSec) |
|
13:30:13:50 |
"Image
Data Recoverability against Data Collaboration and its Countermeasure" Takaya
Yamazoe, Hiromi Yamashiro, Kazumasa Omote, Akira Imakura and
Tetsuya Sakura. |
|
13:50:14:10 |
"Encrypted
5G Smallcell Backhaul Traffic Classification Using
Deep Learning" Zongning Gao
and Shunliang Zhang. |
|
14:10-14:30 |
"Human
Security Behavior Assistance in the Cyber-physical Space" Ruojin
Xiao, Leilei Qu and Wenchang Shi. |
|
14:30-14:50 |
"A Privacy-preserving Electricity Theft
Detection (PETD) Scheme for Smart Grid" Siliang
Dong and Yining Liu. |
|
14:50-15:20 |
Coffee break |
|
15:20-16:40 |
Session 3 Cryptography
and applications |
|
15:20-15:40 |
"Pitch in: A Secure Extension
Signature based on SM9" Chuyi
Yan, Haixia Xu, Yongheng
Mu and Jiong Ding. |
|
15:40-16:00 |
"Verifiable DOPE from
Semi-homomorphic Encryption, and the Extension to DOT" Amirreza
Hamidi and Hossein Ghodosi. |
|
16:00-16:20 |
"Scalable M+1st-Price Auction with
Infinite Bidding Price" Po-Chu Hsu and Atsuko Miyaji. |
|
16:20-16:40 |
"The Shared Memory based
Cryptographic Card Virtualization" Chen Li, Bibo
Tu and Yanchang Feng. |
|
16:40-18:20 |
Session 4 Network Security |
|
16:40-17:00 |
"Feature Transfer based Network
Anomaly Detection" Tao Chen and Kun
Wen. |
|
17:00-17:20 |
"Hybrid Routing for Efficient Fine-Grained
Management of Specific Services in SDN" Kun
Jia, Jiazhi Liu, Wen Wang and Feng Liu. |
|
17:20-17:40 |
Wenjie Qin, Chengwei
Peng, Tao Yin, Changbo Tian and Guangze
Zhao "AtNet: A
Novel Anti-tracking Network with Multi-party
Judgement Capability based on Cross-domain Small-world Topology" |
|
17:40-18:00 |
"A
Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection" Bingxu
Wang, Zhen Li, Gaopeng Gou, Peipei
Fu, Gang Xiong and Yingchao
Qin |
|
16:40-18:20 |
"Analysis and Detection
against Overlapping Phenomenon of Behavioral Attribute in Network Attacks" Jiang Xie, Shuhao Li and Peishuai Sun |
|
18:20-20:30 |
Reception and poster session |
|
|
||
Day
2 August 11, 2022(Tokyo, Japan Time) |
Chair |
|
09:00-09:50 |
Keynote
Speech 2 Prof. Yi Deng "Zero Knowledge Proofs: A Gentle Introduction" |
|
09:50-10:50 |
Session 5 Cyber-Physical System |
|
09:50-10:10 |
"ZoomPass:A Zoom-based Android Unlock Scheme on Smart Devices" Thomas Gleerup, Wenjuan Li, Jiao Tan
and Yu Wang. |
|
10:10-10:30 |
"Passive User Authentication Utilizing Consecutive
Touch Action Features for IIoT Systems" Guozhu Zhao, Pinchang Zhang, Yulong
Shen and Xiaohong Jiang. |
|
10:30-10:50 |
"Metasploit
for Cyber-Physical Security Testing with Real-Time Constraints" Sulav Lal Shrestha, Taylor Lee and Sebastian Fischmeister. |
|
10:50-11:10 |
Coffee break |
|
11:10-12:10 |
Session 6 Malware |
|
11:10-11:30 |
"Malware Classification Based on Semi-Supervised
Learning" Yu Ding, Xiaoyu Zhang, Binbin Li, Jian Xing, Qian Qiang,
Zisen Qi, Menghan Guo, Siyu Jia and Haiping Wang. |
|
11:30-11:50 |
"Malware detected and tell me why: An
verifiable malware detection model with graph metric learning" Xiao Chen, Zhengwei Jiang, Shuwei Wang, Chen Ling, Qiuyun
Wang and Rongqi Jing. |
|
11:50-12:10 |
"Malware Detection using Automated Generation of Yara
rules on Dynamic Features" Qin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui
and Zhiyu Hao. |
|
12:10-13:00 |
Lunch Break |
|
13:00-13:50 |
Keynote Speech 3 Prof. Akira Otsuka "Attested Observers to achieve Transparency for Anonymous Digital Currency" |
|
13:50- 15:10 |
Session 7 Mobile System Security |
|
13:50-14:10 |
"Question
Answering Models For Privacy Policies of Mobile
Apps: Are We There Yet? " Khalid Alkhattabi, Davita Bird, Kai
Miller and Chuan Yue. |
|
14:10-14:30 |
"DroidFP A Zero-Permission Detection Framework for Android
Device Based on Gated Recurrent Unit" Xinyu Liu, Wu Zhao, Langping Chen and Qixu Liu. |
|
14:30-14:50 |
Wei Fan, Yuqing Wang and Dali Zhu. "A
Static Bayesian Game Model Based Intrusion Response Strategy in Mobile Edge
Computing" |
|
14:50-15:10 |
Hung-Yu Chien. "Design
of End-to-End Security for MQTT 5.0" |
|
15:10-15:20 |
Coffee
Break |
|
15:20-17:00 |
Session 8 Theory and Application of
Blockchain and NFT Workshop (TA-BC-NFT) |
|
15:20-15:40 |
Khoi
Le Quoc, Khanh Vo Hong, Huong Hoang Luong, Anh
Nguyen The, Khoa Tran Dang, Hieu Le Van, Khiem Huynh Gia, Loc Van Cao Phu,
Duy Nguyen Truong Quoc, Nghia
Huynh Huu, Tran Nguyen Huyen,
Son Ha and Bang Le Khanh. "Medical
waste treatment process based on Blockchain technology - a case study of
Covid-19 waste handling in Vietnam" |
|
15:40-16:00 |
Khoi Le Quoc, Khanh Vo Hong, Huong Hoang Luongho,
Anh Nguyen The, Khoa Tran Dang, Nghia Huynh Huu, Hieu Le Van, Khiem Huynh Gia, Loc Van Cao Phu,
Duy Nguyen Truong Quoc, Tran Nguyen Huyen, Son Ha and Bang Le Khanh. "Blockchain
technology-based management of blood and its products - a case study in
Vietnam" |
|
16:00-16:20 |
Hassan Noun, Florian Rehm, Guillaume Zeller, Rajesh G,
Iryna Mozgova and Roland Lachmayer. "Integration of Cybersecurity related Development
Processes by using a Quantification Method" |
|
16:20-16:40 |
Jing Xu and Fei Xu. "Economic Perspective of Cybersecurity: Principles
and Strategies" |
|
16:40-17:00 |
Lin-Fa Lee and Kuo-Hui Yeh "Towards a Dynamic Reputation Management Scheme for
Cross-chain Transactions" |
|
18:00 |
Banquet |
|
|
||
Day
3 August 12, 2022(Tokyo, Japan Time) |
Chair |
|
9:00-10:40 |
Session 9 System and Web
Security |
|
9:00-9:20 |
Othmane Belarbi, Aftab Khan, Pietro Carnelli and Theodoros Spyridopoulos. "An
Intrusion Detection System based on Deep Belief Networks" |
|
9:20-9:40 |
Jiawei Sun, Guangjun Wu, Junnan Yin, Liujunjiao and Qian
Qiang. "HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining
of Weak Association Malicious Domains" |
|
9:40-10:00 |
Yi Liu, Yanni Han and
Wei An. "AttVAE:
A Novel Anomaly Detection Framework for Multivariate Time Series" |
|
10:00-10:20 |
Xiangyu Du, Zhengwei Jiang, Jun
Jiang, Kai Zhang, Zijing Fan, Fangming
Dong, Ning Li and Baoxu Liu. "BASNEA:
Threat Hunting for Ethereum Smart Contract based on Backtrackless
Aligned-Spatial Network Entity Alignment" |
|
10:20-10:40 |
Qian Zou, Ning Zhang,
Feng Guo, Qingshan Kong
and Zhiqiang Lv. "Multi-region
SRAM-Based TCAM for Longest Prefix" |
|
10:40-11:00 |
Coffee Break |
|
11:00-11:40 |
Session 10 Security
in Financial Industry |
|
11:00-11:20 |
Zhexuan Hong and Jiageng Chen. "A
solution for the offline double-spending issue of digital currencies" |
|
11:20-11:40 |
Daniel Kasper and Jens Grossklags "A
Hierarchical Macroeconomic Copula Model for Cyber Damages based on current
Cyber Insurance Prices" |
|
11:40-12:40 |
Session 11 Social Engineering and
personalized security |
|
11:40-12:00 |
Rosana Montanez
Rodriguez and Shouhuai Xu. "Cyber
Social Engineering Kill Chain" |
|
12:00-12:20 |
Leilei Qu, Ruojin
Xiao and Wenchang Shi. "Towards Practical Personalized Security Nudge
Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge
Effects" |
|
12:20-12:40 |
Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang
Gao and Peian Yang. "Spear
Phishing Email Detection with Multiple Reputation Features and Sample
Enhancement" |
|
12:40-13:30 |
Lunch Break |
|
13:30-15:30 |
Session 12 Mathematical
Science of Quantum Safety and its Application Workshop (MathSci-Qsafe) |
|
13:30-13:50 |
Bagus Santoso. "Revisiting
Security of Symmetric-Key Encryption with Imperfect Randomness and
Correlation between Source and Keys" |
|
13:50-14:10 |
Qian Dang, Bo Zhao, Biying Sun, Yu Qiu and Chunhui
Du. "A
Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-feature
Fusion in Smart Grid" |
|
14:10-14:30 |
Debolina Ghatak and Kouichi Sakurai. "A
Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a
Privacy-Utility Trade-off Problem" |
|
14:30-14:50 |
Bo Pang and Mingsheng Wang Collaborative Private Decision Tree Classification
using Multi-Key Fully Homomorphic Encryption |
|
14:50-15:10 |
Mariama Mbow, Hiroshi Koide and Kouichi
Sakurai "Advances
in adversarial attacks and defenses in Intrusion Detection System: A survey" |
|
15:10-15:30 |
Yanchang Feng, Li Chen and Bibo Tu. "A
Novel Discrete Bi-objective Optimization Method for Virtual Cryptographic
Machine Placement in Cryptography Cloud" |
|
15:30-15:50 |
Coffee break |
|
15:50-16:30 |
Session 13 Privacy and Anonymity |
|
15:50-16:10 |
Huajun Cui, Guozhu Meng, Yan Zhang,
Weiping Wang, Dali Zhu, Ting Su,
Xiaodong Zhang and Yuejun
Li. "TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in
Android Apps" |
|
16:10-16:30 |
Jing Yu, Shuguang Yuan, Yulin Yuan, Yafan Li and Chi Chen. "A
k-anonymity-based Robust Watermarking Scheme for Relational Database" |