August 3,2016

18:00-20:00 Registration
18:00-20:00 Welcome Reception@Nishijin Plaza

August 4, 2016

8:30 Registration
9:15-9:30 Opening remark
9:30-10:20 Invited talk
Katsunari Yoshioka
Learning the drive-by download attack from modern exploit kits Mr. Joseph C Chen, TrendMicro
10:30-11:45 IoT Security
Akira Kanaoka
Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers Bilhanan Silverajan, Markku Vajaranta and Antti Kolehmainen, Tampere University of Technology, Finland
Implementation Experiences and Design Challenges for Resilient SDN Based Secure WAN Overlay Markku Vajaranta and Joona Kannisto, Tampere University of Technology, Finland
11:45-13:30 Lunch
13:30-15:10 Privacy and anonymity
Chih-Hung Wang
NFC-based Mobile Payment Protocol with User Anonymity Shang-Wen Chen and Raylin Tso, National Chengchi University, Taiwan
Partial Server Side Parameter Selection in Private Information Retrieval Thomas Vannet and Noboru Kunihiro, University of Tokyo, Japan
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing Rohit Ahuja, IIITDM jabalpur, India, Sraban Kumar Mohanty, IIITDM jabalpur, India and Kouichi Sakurai, Kyushu University, Japan
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares Hiroaki Kikuchi, Meiji University, Japan, Hideo Yasunaga, Hiroki Matsui, University of Tokyo, Japan and Chun-I Fan, National Sun Yat-sen University, Taiwan
15:20-16:35 Honeypot
Yutaka Miyake
Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet Juha Nurmi, Joona Kannisto and Markku Vajaranta, Tampere University of Technology, Finland
Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots Satomi Saito, Yokohama National University, Japan, Satoru Torii, FUJITSU LABORATORIES, Japan, Katsunari Yoshioka and Tsutomu Matsumoto, Yokohama National University, Japan
How to Design Practical Client Honeypots Based on Virtual Environment Jinhak Park, Jangwon Choi and Jungsuk Song, Korea Institute of Science and Technology Information, Korea
16:35-17:30 Poster Session
18:30-21:00 Banquet (Restaurant Sanshirou:please use the hired taxi from the conference venue to the restaurant) (Google Maps)

August 5, 2016

8:30 Registration
9:00-9:50 Keynote
Koji Nakao
Cybersecurity: Can we be more secure? Dr. Meng-Chow Kang, Cisco
9:55-12:00 Network-based attack detection
Daisuke Inoue
Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection Chia-Mei Chen, National Sun Yat-sen University, Taiwan,Gu-Hsin Lai, Chinese Culture University, Taiwan and Pong-Yu Young, National Sun Yat-sen University, Taiwan
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation Yuxuan Gao, Yaokai Feng, Junpei Kawamoto and Kouichi Sakurai, Kyushu University, Japan
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network Bayu Adhi Tama and Kyung-Hyune Rhee, Pukyong National University, Korea
Migrant Attack: A Multi-Resource DoS Attack on Cloud Virtual Machine Migration Schemes Jia-Rung Yeh, Hsu-Chun Hsiao and Ai-Chun Pang, National Taiwan University, Taiwan
SDNort: A Software Defined Network Testing Framework Using Openflow Po-Wen Chi, Ming-Hung Wang, National Taiwan University, Taiwan, Che-Wei Lin, National Tsing Hua University, Taiwan, Jing-Wei Guo, Institute for Information Industry, Taiwan, Chin-Laung Lei, National Taiwan University, Taiwan and Nen-Fu Huang, National Tsing Hua University, Taiwan
12:00-13:30 Lunch
13:30-15:35 Cryptography and data security
Hiroaki Kikuchi
({1,3},n) hierarchical secret sharing scheme based on XOR operations for a small number of indispensable participants Koji Shima and Hiroshi Doi, Institute of Information Security, Japan
New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1 Yuhei Watanabe, Kobe University, Japan, Yosuke Todo, Kobe University/NTT Secure Platform Laboratories, Japan and Masakatu Morii, Kobe University, Japan
Securing Smart Meters Data for AMI Using RBAC Ezedin Barka, Nedaa Al Hussien and Khaled Squab, UAE University, UAE
Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment Chih Hung Wang and Chien-Ming Wang, National Chiayi University, Taiwan
An Data Hiding Scheme Based on Formula Fully EMD and Pixel Value Differencing Method Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, National Yunlin University of Science & Technology, Taiwan and Yu-Chih Huang, Tainan University of Technology, Taiwan
15:45-17:00 Fighting malware
Koichi Sakurai
Integration of Multimodal Features for Android Malware Detection Based on Linear SVM Tao Ban, Takeshi Takahashi, NICT, Japan, Shanqing Guo, Shandong University, China, Daisuke Inoue and Koji Nakao, NICT, Japan
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File Mamoru Mimura, Yuhei Otsubo and Hidehiko Tanaka, Institute of Information Security, Japan
Comparing Malware Samples for Unpacking: A Feasibility Study Ryoichi Isawa, NICT, Japan, Masakatu Morii, Kobe University, Japan, and Daisuke Inoue, NICT, Japan
17:00-17:15 Closing remark