ISC 2016 / Honolulu, HI, USA / Sept 5-7, 2016

 

Program 

 

 Wednesday, September 7, 2016 - Day 1
   07:30 - 08:40

Welcome and Registration
Location: Ballroom Foyer

   08:40 - 09:00 Opening Remark
Location: Prince Edward
   09:00 - 10:00 Invited Talk 1: Differential Privacy: Meanings and Caveats
Ninghui Li, Professor of Computer Science at Purdue University
Location: Prince Edward
   10:00 - 10:30 Coffee Break
Location: Ballroom Foyer
   10:30 - 12:00 Session #1: Cryptanalysis I
Session chair: Eiji Okamoto
  • Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128
    Mohamed Tollba, Ahmed Abdelkhalek and Amr Youssef (Concordia University)
  •   
  • Improved Linear Cryptanalysis of Round-reduced ARIA
    Ahmed Abdel Khalek, Mohamed Tolba and Amr Youssef (Concordia University)

  • Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits
    Atsushi Takayasu and Noboru Kunihiro (The University of Tokyo)
   12:00 - 13:30 Lunch
Location: Prince David
   13:30 - 15:00 Session #2: Cryptographic Protocols I
Session chair: Taptsuaki Okamoto
  • Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols
    Franziskus Kiefer (Mozilla) and Mark Manulis (University of Surrey)
  •   
  • Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2
    Lucjan Hanzlik and Miroslaw Kutylowski (Wroc law University of Technology)

  • AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash
    Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin and Dengguo Feng (Chinese Academy of Sciences)
   15:00 - 15:30 Coffee Break
Location: Ballroom Foyer
   15:30 - 17:00 Session #3: Encryption, Signatures and Fundamentals
Session chair: Mark Manulis
  • Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model
    Masayuki Fukumitsu (Hokkaido Information University) and Shingo Hasegawa (Tohoku University)
  •   
  • Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security
    Junichi Tomida (Kyoto University), Masayuki Abe and Tatsuaki Okamoto (NTT Secure Platform Laboratories)

  • MQSAS-A Multivariate Sequential Aggregate Signature Scheme
    Rachid El Bansarkhani, Mohamed Saied Emam Mohamed (Technische Universitat Darmstadt)and Albrecht Petzoldt (Kyushu University)

 Thursday, September 8, 2016 - Day 2
   07:30 - 08:30

Welcome and Registration
Location: Ballroom Foyer

   08:30 - 10:30 Session #4: Network and Systems Security and Access Control
Session chair: Depeng Li
Location: Prince Edward
  • Cyber Security Risk Assessment of a DDoS Attack
    Gaute Wangen, Andrii Shalaginov and Christoffer V. Hallstensen (Norwegian University of Science and Technology)
  •   
  • Moving Target Defense Against Network Reconnaissance with Software Defined Networking
    Li Wang and Dinghao Wu (The Pennsylvania State University)

  • Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control
    Prosunjit Biswas, Ravi Sandhu, and Ram Krishnan (University of Texas at San Antonio)

  • SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing
    George Webster, Zachary Hanif, Andre Ludwig, Tamas Lengyel, Apostolis Zarras and Claudia Eckert (Technical University of Munich)
   10:30 - 11:00 Coffee Break
Location: Ballroom Foyer
   11:00 - 12:00 Session #5: Cryptographic Protocols II
Session chair: Anderson Nascimento
  • Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools
    Samiran Bag (Newcastle University) and Kouichi Sakurai (Kyushu University)

  • Universally Composable Two-Server PAKE
    Franziskus Kiefer (Mozilla) and Mark Manulis (University of Surrey)
  •   
   12:00 - 13:30 Lunch
Location: Prince David
   13:30 - 15:30 Session #6: Cryptanalysis II
Session chair: Liam Kehiler
  • Damaging Simplifying, and Salvaging p-OMD
    Tomer Ashur and Bart Mennink (KU Leuven)

  • Enhanced Correlation Power Analysis by Biasing Power Traces
    Changhai Ou (Chinese Academy of Sciences, University of Chinese Academy of Sciences), Zhu Wang (Chinese Academy of Sciences), Degang Sun (Chinese Academy of Sciences), Xinping Zhou (Chinese Academy of Sciences, University of Chinese Academy of Sciences), Juan Ai (Chinese Academy of Sciences, University of Chinese Academy of Sciences), and Na Pang (Chinese Academy of Sciences, University of Chinese Academy of Sciences)

  • Cryptanalysis of Multi-Prime Phi-Hiding Assumption
    Jun Xu, Lei Hu (Chinese Academy of Sciences), Santanu Sarkar (Indian Institute of Technology), Xiaona Zhang, Zhangjie Huang and Liqiang Peng (Chinese Academy of Sciences)

  • Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication
    Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng and Zhangjie Huang (Chinese Academy of Sciences)
   15:30 - 16:00 Coffee Break
Location: Ballroom Foyer
   16:00 - 17:00 Rump Session
   18:00 - 20:30 Banquet Dinner
 Friday, September 9, 2016  - Day 3
   09:00 - 10:00 Invited Talk 2: Electronic Voting: Danger and Opportunities
Alex Halderman, Professor of Computer Science & Engineering, University of Michigan
Location: Prince Edward
   10:00 - 10:30 Coffee Break
Location: Ballroom Foyer
   10:30 - 12:00 Session #7: Privacy and Watermarking
Session chair: Alex Halderman
  • Leveraging Internet Services to Evade Censorship
    Apostolis Zarras (Technical University of Munich)
  •   
  • Analyzing Randomized Response Mechanisms under Differential Privacy
    Atsushi Waseda and Ryo Nojima (National Institute of Information and Communications Technology)

  • Models and Algorithms for Graph Watermarking
    David Eppstein, Michael Goodrich (University of California, Irvine), Jenny Lam (San Jose State University), Nil Mamano (University of California, Irvine), Michael Mitzenmacher (Harvard University) and Manuel Torres (University of California, Irvine)
   12:00 - 13:30 Lunch
Location: Prince David
   13:30 - 15:30 Session #8: Software Security
Session chair: Rui Zhang
  • Policy-based Implicit Attestation for Microkernel-based Virtualized Systems
    Steffen Wagner (Fraunhofer Institute AISEC) and Claudia Eckert (Technische Universitat Munchen)
  •   
  • Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method
    Dongpeng Xu, Jiang Ming and Dinghao Wu (The Pennsylvania State University)

  • A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing
    Guanhua Yan (Binghamton University, State University of New York), Yunus Kucuk (Binghamton University, State University of New York, Turkish Military Academy), Max Slocum (Binghamton University, State University of New York) and David Last (Air Force Research Laboratory)

  • Control Flow Integrity Enforcement with Dynamic Code Optimization
    Yan Lin, Xiaoxiao Tang, Debin Gao (Singapore Management University) and Jianming Fu (Wuhan University)
   15:30 - 16:00 Coffee Break
Location: Ballroom Foyer
   16:00 - 16:10 Closing Remark

   Download the ISC 2016 proceeding here.