Day 1 August 10, 2022(Tokyo, Japan Time)

Chair

09:00-09:20

Welcome plenary: From General Chairs and PC Chairs

 

09:20-10:10

Keynote Speech 1 Prof. Moti Young "Science + Systems Imply a Better Security Practice"

 

10:10-10:30

Coffee break

10:30-12:10

Session 1 Blockchain and Applications

 

10:30-10:50

"BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain"
Yanze Kang, Xiaobo Yu, Weizhi Meng and Yining Liu.

10:50:11:10

"ChainSCAN: A Blockchain-based Supply Chain Alerting Framework for Food Safety"

Jorge Castillo, Kevin Barba and Qian Chen.

11:10:11:30

"Adapted PBFT Consensus Protocol for Sharded Blockchain"

Ling Yang and Huawei Huang.

11:30:11:50

"A Practical Blockchain-based Maintenance Record System for Better Aircraft Security"
Wictor Lang Jensen, Sille Jessing, Wei-Yang Chiu and Weizhi Meng.

11:50:12:10

"Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback"

Chunying Peng and Haixia Xu.

12:10-13:30

Lunch Break

13:30-14:50

Session 2 AI Crypto and Security Workshop (AI-CryptoSec)

 

13:30:13:50

"Image Data Recoverability against Data Collaboration and its Countermeasure"

Takaya Yamazoe, Hiromi Yamashiro, Kazumasa Omote, Akira Imakura and Tetsuya Sakura.

13:50:14:10

"Encrypted 5G Smallcell Backhaul Traffic Classification Using Deep Learning"

Zongning Gao and Shunliang Zhang.

14:10-14:30

"Human Security Behavior Assistance in the Cyber-physical Space"

Ruojin Xiao, Leilei Qu and Wenchang Shi.

14:30-14:50

"A Privacy-preserving Electricity Theft Detection (PETD) Scheme for Smart Grid"

Siliang Dong and Yining Liu.

14:50-15:20

Coffee break

15:20-16:40

Session 3 Cryptography and applications

 

15:20-15:40

"Pitch in: A Secure Extension Signature based on SM9"

Chuyi Yan, Haixia Xu, Yongheng Mu and Jiong Ding.

15:40-16:00

"Verifiable DOPE from Semi-homomorphic Encryption, and the Extension to DOT"

Amirreza Hamidi and Hossein Ghodosi.

16:00-16:20

"Scalable M+1st-Price Auction with Infinite Bidding Price"

Po-Chu Hsu and Atsuko Miyaji.

16:20-16:40

"The Shared Memory based Cryptographic Card Virtualization"

Chen Li, Bibo Tu and Yanchang Feng.

16:40-18:20

Session 4 Network Security

16:40-17:00

"Feature Transfer based Network Anomaly Detection"

Tao Chen and Kun Wen.

17:00-17:20

"Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN"

Kun Jia, Jiazhi Liu, Wen Wang and Feng Liu.

17:20-17:40

Wenjie Qin, Chengwei Peng, Tao Yin, Changbo Tian and Guangze Zhao

"AtNet: A Novel Anti-tracking Network with Multi-party Judgement Capability based on Cross-domain Small-world Topology"

17:40-18:00

"A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection"

Bingxu Wang, Zhen Li, Gaopeng Gou, Peipei Fu, Gang Xiong and Yingchao Qin

16:40-18:20

"Analysis and Detection against Overlapping Phenomenon of Behavioral Attribute in Network Attacks"

Jiang Xie, Shuhao Li and Peishuai Sun

18:20-20:30

Reception and poster session

 

Day 2 August 11, 2022(Tokyo, Japan Time)

Chair

09:00-09:50

Keynote Speech 2 Prof. Yi Deng "Zero Knowledge Proofs: A Gentle Introduction"

 

09:50-10:50

Session 5 Cyber-Physical System

 

09:50-10:10

"ZoomPass:A Zoom-based Android Unlock Scheme on Smart Devices"

Thomas Gleerup, Wenjuan Li, Jiao Tan and Yu Wang.

10:10-10:30

"Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems"

Guozhu Zhao, Pinchang Zhang, Yulong Shen and Xiaohong Jiang.

10:30-10:50

"Metasploit for Cyber-Physical Security Testing with Real-Time Constraints"

Sulav Lal Shrestha, Taylor Lee and Sebastian Fischmeister.

10:50-11:10

Coffee break

11:10-12:10

Session 6 Malware

 

11:10-11:30

"Malware Classification Based on Semi-Supervised Learning"

Yu Ding, Xiaoyu Zhang, Binbin Li, Jian Xing, Qian Qiang, Zisen Qi, Menghan Guo, Siyu Jia and Haiping Wang.

11:30-11:50

"Malware detected and tell me why: An verifiable malware detection model with graph metric learning"

Xiao Chen, Zhengwei Jiang, Shuwei Wang, Chen Ling, Qiuyun Wang and Rongqi Jing.

11:50-12:10

"Malware Detection using Automated Generation of Yara rules on Dynamic Features"

Qin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui and Zhiyu Hao.

12:10-13:00

Lunch Break

13:00-13:50

Keynote Speech 3 Prof. Akira Otsuka "Attested Observers to achieve Transparency for Anonymous Digital Currency"

 

13:50- 15:10

Session 7 Mobile System Security

 

13:50-14:10

"Question Answering Models For Privacy Policies of Mobile Apps: Are We There Yet? "

Khalid Alkhattabi, Davita Bird, Kai Miller and Chuan Yue.

14:10-14:30

"DroidFP A Zero-Permission Detection Framework for Android Device Based on Gated Recurrent Unit"

Xinyu Liu, Wu Zhao, Langping Chen and Qixu Liu.

14:30-14:50

Wei Fan, Yuqing Wang and Dali Zhu.

"A Static Bayesian Game Model Based Intrusion Response Strategy in Mobile Edge Computing"

14:50-15:10

Hung-Yu Chien.

"Design of End-to-End Security for MQTT 5.0"

15:10-15:20

Coffee Break

15:20-17:00

Session 8 Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT)

 

15:20-15:40

Khoi Le Quoc, Khanh Vo Hong, Huong Hoang Luong, Anh Nguyen The, Khoa Tran Dang, Hieu Le Van, Khiem Huynh Gia, Loc Van Cao Phu, Duy Nguyen Truong Quoc, Nghia Huynh Huu, Tran Nguyen Huyen, Son Ha and Bang Le Khanh.

"Medical waste treatment process based on Blockchain technology - a case study of Covid-19 waste handling in Vietnam"

15:40-16:00

Khoi Le Quoc, Khanh Vo Hong, Huong Hoang Luongho, Anh Nguyen The, Khoa Tran Dang, Nghia Huynh Huu, Hieu Le Van, Khiem Huynh Gia, Loc Van Cao Phu, Duy Nguyen Truong Quoc, Tran Nguyen Huyen, Son Ha and Bang Le Khanh.

"Blockchain technology-based management of blood and its products - a case study in Vietnam"

16:00-16:20

Hassan Noun, Florian Rehm, Guillaume Zeller, Rajesh G, Iryna Mozgova and Roland Lachmayer.

"Integration of Cybersecurity related Development Processes by using a Quantification Method"

16:20-16:40

Jing Xu and Fei Xu.

"Economic Perspective of Cybersecurity: Principles and Strategies"

16:40-17:00

Lin-Fa Lee and Kuo-Hui Yeh

"Towards a Dynamic Reputation Management Scheme for Cross-chain Transactions"

18:00

 Banquet

 

Day 3 August 12, 2022(Tokyo, Japan Time)

Chair

9:00-10:40

Session 9 System and Web Security

 

9:00-9:20

Othmane Belarbi, Aftab Khan, Pietro Carnelli and Theodoros Spyridopoulos.

"An Intrusion Detection System based on Deep Belief Networks"

9:20-9:40

Jiawei Sun, Guangjun Wu, Junnan Yin, Liujunjiao and Qian Qiang.

"HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains"

9:40-10:00

Yi Liu, Yanni Han and Wei An.

"AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series"

10:00-10:20

Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li and Baoxu Liu.

"BASNEA: Threat Hunting for Ethereum Smart Contract based on Backtrackless Aligned-Spatial Network Entity Alignment"

10:20-10:40

Qian Zou, Ning Zhang, Feng Guo, Qingshan Kong and Zhiqiang Lv.

"Multi-region SRAM-Based TCAM for Longest Prefix"

10:40-11:00

Coffee Break

11:00-11:40

Session 10 Security in Financial Industry

 

11:00-11:20

Zhexuan Hong and Jiageng Chen.

"A solution for the offline double-spending issue of digital currencies"

11:20-11:40

Daniel Kasper and Jens Grossklags

"A Hierarchical Macroeconomic Copula Model for Cyber Damages based on current Cyber Insurance Prices"

11:40-12:40

Session 11 Social Engineering and personalized security

 

11:40-12:00

Rosana Montanez Rodriguez and Shouhuai Xu.

"Cyber Social Engineering Kill Chain"

12:00-12:20

Leilei Qu, Ruojin Xiao and Wenchang Shi.

"Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects"

12:20-12:40

Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao and Peian Yang.

"Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement"

12:40-13:30

Lunch Break

13:30-15:30

Session 12 Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe)

 

13:30-13:50

Bagus Santoso.

"Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation between Source and Keys"

13:50-14:10

Qian Dang, Bo Zhao, Biying Sun, Yu Qiu and Chunhui Du.

"A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-feature Fusion in Smart Grid"

14:10-14:30

Debolina Ghatak and Kouichi Sakurai.

"A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem"

14:30-14:50

Bo Pang and Mingsheng Wang Collaborative Private Decision Tree Classification using Multi-Key Fully Homomorphic Encryption

14:50-15:10

Mariama Mbow, Hiroshi Koide and Kouichi Sakurai

"Advances in adversarial attacks and defenses in Intrusion Detection System: A survey"

15:10-15:30

Yanchang Feng, Li Chen and Bibo Tu.

"A Novel Discrete Bi-objective Optimization Method for Virtual Cryptographic Machine Placement in Cryptography Cloud"

15:30-15:50

Coffee break

15:50-16:30

Session 13 Privacy and Anonymity

 

15:50-16:10

Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang and Yuejun Li.

"TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps"

16:10-16:30

Jing Yu, Shuguang Yuan, Yulin Yuan, Yafan Li and Chi Chen.

"A k-anonymity-based Robust Watermarking Scheme for Relational Database"