Program
August 3,2016
18:00-20:00 | Registration | ||
18:00-20:00 | Welcome Reception@Nishijin Plaza |
August 4, 2016
8:30 | Registration | ||
9:15-9:30 | Opening remark | ||
9:30-10:20 | Invited talk chair: Katsunari Yoshioka |
||
Learning the drive-by download attack from modern exploit kits | Mr. Joseph C Chen, TrendMicro | ||
10:30-11:45 | IoT Security chair: Akira Kanaoka |
||
Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers | Bilhanan Silverajan, Markku Vajaranta and Antti Kolehmainen, Tampere University of Technology, Finland | ||
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlay | Markku Vajaranta and Joona Kannisto, Tampere University of Technology, Finland | ||
11:45-13:30 | Lunch | ||
13:30-15:10 | Privacy and anonymity chair: Chih-Hung Wang |
||
NFC-based Mobile Payment Protocol with User Anonymity | Shang-Wen Chen and Raylin Tso, National Chengchi University, Taiwan | ||
Partial Server Side Parameter Selection in Private Information Retrieval | Thomas Vannet and Noboru Kunihiro, University of Tokyo, Japan | ||
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing | Rohit Ahuja, IIITDM jabalpur, India, Sraban Kumar Mohanty, IIITDM jabalpur, India and Kouichi Sakurai, Kyushu University, Japan | ||
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares | Hiroaki Kikuchi, Meiji University, Japan, Hideo Yasunaga, Hiroki Matsui, University of Tokyo, Japan and Chun-I Fan, National Sun Yat-sen University, Taiwan | ||
15:20-16:35 | Honeypot chair: Yutaka Miyake |
||
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet | Juha Nurmi, Joona Kannisto and Markku Vajaranta, Tampere University of Technology, Finland | ||
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots | Satomi Saito, Yokohama National University, Japan, Satoru Torii, FUJITSU LABORATORIES, Japan, Katsunari Yoshioka and Tsutomu Matsumoto, Yokohama National University, Japan | ||
How to Design Practical Client Honeypots Based on Virtual Environment | Jinhak Park, Jangwon Choi and Jungsuk Song, Korea Institute of Science and Technology Information, Korea | ||
16:35-17:30 | Poster Session | ||
18:30-21:00 | Banquet (Restaurant Sanshirou:please use the hired taxi from the conference venue to the restaurant) (Google Maps) |
August 5, 2016
8:30 | Registration | ||
9:00-9:50 | Keynote chair: Koji Nakao |
||
Cybersecurity: Can we be more secure? | Dr. Meng-Chow Kang, Cisco | ||
9:55-12:00 | Network-based attack detection chair: Daisuke Inoue |
||
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection | Chia-Mei Chen, National Sun Yat-sen University, Taiwan,Gu-Hsin Lai, Chinese Culture University, Taiwan and Pong-Yu Young, National Sun Yat-sen University, Taiwan | ||
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation | Yuxuan Gao, Yaokai Feng, Junpei Kawamoto and Kouichi Sakurai, Kyushu University, Japan | ||
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network | Bayu Adhi Tama and Kyung-Hyune Rhee, Pukyong National University, Korea | ||
Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes | Jia-Rung Yeh, Hsu-Chun Hsiao and Ai-Chun Pang, National Taiwan University, Taiwan | ||
SDNort: A Software Defined Network Testing Framework Using Openflow | Po-Wen Chi, Ming-Hung Wang, National Taiwan University, Taiwan, Che-Wei Lin, National Tsing Hua University, Taiwan, Jing-Wei Guo, Institute for Information Industry, Taiwan, Chin-Laung Lei, National Taiwan University, Taiwan and Nen-Fu Huang, National Tsing Hua University, Taiwan | ||
12:00-13:30 | Lunch | ||
13:30-15:35 | Cryptography and data security chair: Hiroaki Kikuchi |
||
({1,3},n) hierarchical secret sharing scheme based on XOR operations for a small number of indispensable participants | Koji Shima and Hiroshi Doi, Institute of Information Security, Japan | ||
New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1 | Yuhei Watanabe, Kobe University, Japan, Yosuke Todo, Kobe University/NTT Secure Platform Laboratories, Japan and Masakatu Morii, Kobe University, Japan | ||
Securing Smart Meters Data for AMI Using RBAC | Ezedin Barka, Nedaa Al Hussien and Khaled Squab, UAE University, UAE | ||
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment | Chih Hung Wang and Chien-Ming Wang, National Chiayi University, Taiwan | ||
An Data Hiding Scheme Based on Formula Fully EMD and Pixel Value Differencing Method | Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, National Yunlin University of Science & Technology, Taiwan and Yu-Chih Huang, Tainan University of Technology, Taiwan | ||
15:45-17:00 | Fighting malware chair: Koichi Sakurai |
||
Integration of Multimodal Features for Android Malware Detection Based on Linear SVM | Tao Ban, Takeshi Takahashi, NICT, Japan, Shanqing Guo, Shandong University, China, Daisuke Inoue and Koji Nakao, NICT, Japan | ||
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File | Mamoru Mimura, Yuhei Otsubo and Hidehiko Tanaka, Institute of Information Security, Japan | ||
Comparing Malware Samples for Unpacking: A Feasibility Study | Ryoichi Isawa, NICT, Japan, Masakatu Morii, Kobe University, Japan, and Daisuke Inoue, NICT, Japan | ||
17:00-17:15 | Closing remark |