Program

August 1, 2019

Opening Remarks
Keynote (Session Chair: Akira Kanaoka) Dr. Mitsuaki Akiyama (NTT Secure Platform Laboratories)
Break
Malware
(Session Chair: Toshihiro Yamauchi)
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques Ryo Ito, Mamoru Mimura
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao
Malware Classification using Early Stage Behavioral Analysis Nitesh Kumar, Subhasis Mukhopadhyay, Mugdha Gupta, Anand Handa, Sandeep K. Shukla
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset Mamoru Mimura, Yuya Suga
Lunch
Invited Talk #1: (Session Chair: Raylin Tso) Prof. Yi-Fan Tseng (National Chengchi University)
Break
Data Security
(Session Chair: Fangguo Zhang)
String commitment schemes with low output locality Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji
Privacy and Integrity Protection of Metering Data in Smart Grid Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang
Analysis of Division Property using MILP method for Lightweight Blockcipher Piccolo Hiroki Sato, Mamoru Mimura, Hidema Tanaka
Secure Online-Efficient Interval Test based on Empty-Set Check Katsunari Shishido, Atsuko Miyaji
Break
Detection
(Session Chair: Mamoru Mimura)
Platform Design and Implementation for Flexible Data Processing and Building ML models of IDS Alerts Iksoo Shin, Yunsoo Choi, Taewoong Kwon, Hyeakro Lee, Jungsuk Song
Boosting Fuzzing Performance with Differential Seed Scheduling Chung-Yi Lin, Chia-Wei Tien, Chun-Ying Huang
Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process Shusuke Morimoto, Kilho Shin, Hajime Kawamukai
Poster Session
Banquet

August 2, 2019

Invited Talk #2: (Session Chair: Jungsuk Song) Prof. Heung Youl Youm (Soonchunhyang University)
Break
Application Security
(Session Chair: Ryoichi Isawa)
Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector Bilhanan Silverajan, Petteri Vistiaho
Counter Attack against the Bus-Off Attack on CAN Masaru Takada, Yuki Osada, Masakatu Morii
Prevention of Data Leakage due to Implicit Information Flows in Android Applications Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito
Designing Authentication and Authorization System with Blockchain Yuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii
Watermarking Technique Based on Harris–Laplace Feature Point Detector Capable of Resisting Geometric Attacks Kuo-Lung Hung, Chih-Yu Yen
Lunch
Invited Talk #3: (Session Chair: Akira Kanaoka) Prof. Makoto Nagata (Kobe University)
Break
Cryptography
(Session Chair: Po-Wen Chi)
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices Masanori Hirotomo, Haruka Ito, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi
Signcryption from NTRU Lattices Without Random Oracles Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo
A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes Toshiki Tsuchida, Masanori Hirotomo, Haruka Ito, Makoto Takita, Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Youji Fuukta, Masakatu Morii
Subliminal Channels in the Code-based Ring Signature Scheme Bingsen Wang, Zhuoran Zhang, Fangguo Zhang
Break
Invited Talk #4: (Session Chair: Fangguo Zhang) Prof. Weizhe Zhang (Peng Cheng Laboratory)
Break
Privacy Protection
(Session Chiar: Bilhanan Silverajan)
Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services Po-Wen Chi, Pin-Hsin Hsiao
Password Strength Measurement without Password Disclosure Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka
Privacy Risk Evaluation of Re-identification of Pseudonyms Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo