Conference Schedule

Conference Date : 10 – 12 November 2021 (dates may differ in your timezone)

If the times seem inconvenient, keep in mind that this is an international conference with a Denpasar, Bali INDONESIA-centric schedule.

Summary of Program

Wed. 10 Nov 2021 (Day 1) 

Time (UTC+8)

Detail

Time (Your Timezone )

09:00 - 09:15

Opening

09:15 - 10:15

Keynote Speech I: Moti Yung
On Deploying Secure Computation Protocols in Daily Business Applications
Session Chair: Sokratis Katsikas, Norwegian University of Science and Technology, Norway

10:15 - 10:20

Steering Committee Chair Welcome: Masahiro Mambo

10:20 - 10:50

Best Paper Award
Voxstructor: Voice Reconstruction from Voiceprint
Panpan Lu (Xidian University, China), Qi Li (University of Guelph, Canada), Hui Zhu (Xidian University, China), Giuliano Sovernigo (University of Guelph, Canada) and Xiaodong Lin (University of Guelph, Canada)
Session Chair: Sokratis Katsikas, Norwegian University of Science and Technology, Norway

10:50 - 11:00

Coffee Break

11:00 - 13:00

Session 1: Cryptology I
Session Chair: Khoa Nguyen, University of Wollongong, Australia

13:00 - 14:00

Lunch

14:00 - 16:00

Session 2: Cryptology II
Session Chair: Shifeng Sun, Shanghai Jiao Tong University, China

Thu. 11 Nov 2021 (Day 2) 

9:00 - 10:00

Keynote Speech II: Frédéric Cuppens and Nora Cuppens
IT/OT Cyber Resilience
Session Chair: Rolly Intan, Petra Christian University, Indonesia

10:00 - 11:30

Session 3: Web and OS Security
Session Chair: Li Li, Monash University, Australia

11:30 - 11:45

Coffee Break

11:45 - 13:15

Session 4: Network Security
Session Chair: Shangqi Lai, Monash University, Australia

13:15 - 14:00

Lunch

14:00 - 16:00

Session 5: Detection of Malware, Attacks and Vulnerabilities
Session Chair: Cristina Alcaraz, University of Malaga, Spain

16:00 - 17:00

Keynote Speech III: Pierangela Samarati
Data Security and Privacy in Emerging Scenarios
Session Chair: Willy Susilo, University of Wollongong, Australia

Fri. 12 Nov 2021 (Day 3) 

09:00 - 10:00

Keynote Speech IV: Daniel Xiapu Luo
Towards Defending Against Sophisticated Mobile Malware
Session Chair: Joseph Liu, Monash University, Australia

10:00 - 10:15

Coffee Break

10:15 - 11:45

Session 6: Machine Learning for Security
Session Chair: Jason Xue, University of Adelaide, Australia

11:45 - 12:00

Closing Ceremony and Remarks

Detailed Program

Wed. 10 Nov 2021 (Day 1) 

Time (UTC+8)

Detail

Time (Your Timezone )

09:00 - 09:15

Opening

09:15 - 10:15

Keynote Speech I: Moti Yung
On Deploying Secure Computation Protocols in Daily Business Applications
Session Chair: Sokratis Katsikas, Norwegian University of Science and Technology, Norway

10:15 - 10:20

Steering Committee Chair Welcome: Masahiro Mambo

10:20 - 10:50

Best Paper Award
Voxstructor: Voice Reconstruction from Voiceprint
Panpan Lu (Xidian University, China), Qi Li (University of Guelph, Canada), Hui Zhu (Xidian University, China), Giuliano Sovernigo (University of Guelph, Canada) and Xiaodong Lin (University of Guelph, Canada)
Session Chair: Sokratis Katsikas, Norwegian University of Science and Technology, Norway

10:50 - 11:00

Coffee Break

Session 1: Cryptology I
Session Chair: Khoa Nguyen, University of Wollongong, Australia

11:00 - 11:30

Integer LWE with Non-Subgaussian Error and Related Attacks

Tianyu Wang (Chinese Academy of Sciences, China), Yuejun Liu (Nanjing University of Science and Technology, China), Jun Xu (Chinese Academy of Sciences, China), Lei Hu (Chinese Academy of Sciences, China), Yang Tao (Chinese Academy of Sciences, China) and Yongbin Zhou (Nanjing University of Science and Technology, China)

11:30 - 12:00

Layering Quantum-Resistance into Classical Digital Signature Algorithms

Teik Guan Tan and Jianying Zhou (Singapore University of Technology and Design, Singapore)

12:00 - 12:30

Randomized Component Based Secure Secret Reconstruction in Insecure Networks

Xinyan Wang and Fuyou Miao (University of Science and Technology of China, China)

12:30 - 13:00

Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher

Jiqiang Lu and Jingyu Li (Beihang University, China)

13:00 - 14:00

Lunch

Session 2: Cryptology II
Session Chair: Shifeng Sun, Shanghai Jiao Tong University, China

14:00 - 14:30

A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data

Sara Jafarbeiki (Monash University, CSIRO Data 61, Australia), Amin Sakzad (Monash University, Australia), Shabnam Kasra Kermanshahi (RMIT, Australia), Ron Steinfeld (Monash University, Australia), Raj Gaire (CSIRO Data 61, Australia) and Shangqi Lai (Monash University, Australia)

14:30 - 15:00

Bigdata-facilitated Two-party Authenticated Key Exchange for IoT

Bowen Liu (Luxembourg Institute of Science and Technology, Luxembourg), Qiang Tang (Luxembourg Institute of Science and Technology, Luxembourg) and Jianying Zhou (Singapore University of Technology and Design, Singapore)

15:00 - 15:30

Transparency order of (n,m)-functions — its further characterization and applications

Yu Zhou (Science and Technology on Communication Security Laboratory, China), Yongzhuang Wei (Guilin University of Electronic Technology, China), Hailong Zhang (Chinese Academy of Sciences, China), Luyang Li (Xian University of Post and Telecommunications, China), Enes Pasalic (University of Primorska, Slovenia) and Wenling Wu (Chinese Academy of Sciences, China)

Thu. 11 Nov 2021 (Day 2) 

9:00 - 10:00

Keynote Speech II: Frédéric Cuppens and Nora Cuppens
IT/OT Cyber Resilience
Session Chair: Rolly Intan, Petra Christian University, Indonesia

Session 3: Web and OS Security
Session Chair: Li Li, Monash University, Australia

10:00 - 10:30

Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy

Seyed Ali Akhavani (Northeastern University, US), Jordan Jueckstock (North Carolina State University, US), Junhua Su (North Carolina State University, US), Alexandros Kapravelos (North Carolina State University, US), Engin Kirda (Northeastern University, US) and Long Lu (Northeastern University, US)

10:30 - 11:00

TridentShell: A Covert and Scalable Backdoor Injection

Xiaobo Yu (Guilin University of Electronic Technology, China), Weizhi Meng (Technical University of Denmark, Denmark), Lei Zhao (Wuhan University, China) and Yining Liu (Guilin University of Electronic Technology, China)

11:00 - 11:30

Andromeda: Enabling Secure Enclaves For The Android Ecosystem

Dimitris Deyannis (FORTH-ICS, Greece), Dimitris Karnikis (FORTH-ICS, Greece), Giorgos Vasiliadis (FORTH-ICS, Greece) and Sotiris Ioannidis (Technical University of Crete, Greece)

11:30 - 11:45

Coffee Break

Session 4: Network Security
Session Chair: Shangqi Lai, Monash University, Australia

11:45 - 12:15

FEX – A feature extractor for real-time IDS

Andreas Schaad and Dominik Binder (University of Applied Sciences Offenburg, Germany)

12:15 - 12:45

Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification

Rikima Mitsuhashi (The University of Tokyo, Japan), Akihiro Satoh (Kyushu Institute of Technology, Japan), Yong Jin (Tokyo Institute of Technology, Japan), Katsuyoshi Iida (Hokkaido University, Japan), Takahiro Shinagawa (The University of Tokyo, Japan) and Yoshiaki Takai (Hokkaido University, Japan)

12:45 - 13:15

Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits

Meryem Cherkaoui-Semmouni (Mohammed V University in Rabat, Morocco), Abderrahmane Nitaj (University of Caen Normandy, France), Willy Susilo (University of Wollongong, Australia) and Joseph Tonien (University of Wollongong, Australia)

13:15 - 14:00

Lunch

Session 5: Detection of Malware, Attacks and Vulnerabilities
Session Chair: Cristina Alcaraz, University of Malaga, Spain

14:00 - 14:30

Word-Map: Using Community Detection Algorithm to Detect AGDs

Futai Zou, Qianying Shen and Yuzong Hu (Shanghai JiaoTong University, China)

14:30 - 15:00

DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection

Hao Sun (Dalian University of Technology, China), Yanjun Tong (Dalian University of Technology, China), Jing Zhao (Dalian University of Technology, China) and Zhaoquan Gu (Guangzhou University, China)

15:00 - 15:30

Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

Mohammad Reza Norouzian (Technical University of Munich, Germany), Peng Xu (Technical University of Munich, Germany), Claudia Eckert (Technical University of Munich, Germany) and Apostolis Zarras (Delft University of Technology , Netherlands)

15:30 - 16:00

A Novel Behavioural Screenlogger Detection System

Hugo Sbaï (University of Oxford, UK), Jassim Happa (Royal Holloway, University of London, UK) and Michael Goldsmith (University of Oxford, UK)

16:00 - 17:00

Keynote Speech III: Pierangela Samarati
Data Security and Privacy in Emerging Scenarios
Session Chair: Willy Susilo, University of Wollongong, Australia

Fri. 12 Nov 2021 (Day 3) 

09:00 - 10:00

Keynote Speech IV: Daniel Xiapu Luo
Towards Defending Against Sophisticated Mobile Malware
Session Chair: Joseph Liu, Monash University, Australia

10:00 - 10:15

Coffee Break

Session 6: Machine Learning for Security
Session Chair: Jason Xue, University of Adelaide, Australia

10:15 - 10:45

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks

Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang and Weiqiang Liu (Nanjing University of Aeronautics and Astronautics, China)

10:45 - 11:15

Targeted Universal Adversarial Perturbations for Automatic Speech Recognition

Wei Zong (University of Wollongong, Australia), Yang-Wai Chow (University of Wollongong, Australia), Willy Susilo (University of Wollongong, Australia), Santu Rana (Deakin University, Australia) and Svetha Venkatesh (Deakin University, Australia)

11:15 - 11:45

DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning

Georgia Tsaloli (Chalmers University of Technology, Sweden), Bei Liang (Beijing Institute of Mathematical Sciences and Applications, China), Carlo Brunetta (Chalmers University of Technology, Sweden), Gustavo Banegas (Inria and École polytechnique, France) and Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden)

11:45 - 12:00

Closing Ceremony and Remarks