Program
August 1, 2019
9:00-9:10 | Opening Remarks | ||
9:10 - 10:00 | Keynote (Session Chair: Akira Kanaoka) Dr. Mitsuaki Akiyama (NTT Secure Platform Laboratories) | ||
10:00-10:10 | Break | ||
10:10-11:30 | Malware (Session Chair: Toshihiro Yamauchi) |
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques | Ryo Ito, Mamoru Mimura |
Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices | Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng, Daisuke Inoue, Koji Nakao | ||
Malware Classification using Early Stage Behavioral Analysis | Nitesh Kumar, Subhasis Mukhopadhyay, Mugdha Gupta, Anand Handa, Sandeep K. Shukla | ||
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset | Mamoru Mimura, Yuya Suga | ||
11:30-13:00 | Lunch | ||
13:00-13:40 | Invited Talk #1: (Session Chair: Raylin Tso) Prof. Yi-Fan Tseng (National Chengchi University) | ||
13:40-13:50 | Break | ||
13:50-15:10 | Data Security (Session Chair: Fangguo Zhang) |
String commitment schemes with low output locality | Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji |
Privacy and Integrity Protection of Metering Data in Smart Grid | Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang | ||
Analysis of Division Property using MILP method for Lightweight Blockcipher Piccolo | Hiroki Sato, Mamoru Mimura, Hidema Tanaka | ||
Secure Online-Efficient Interval Test based on Empty-Set Check | Katsunari Shishido, Atsuko Miyaji | ||
15:10-15:25 | Break | ||
15:25-16:25 | Detection (Session Chair: Mamoru Mimura) |
Platform Design and Implementation for Flexible Data Processing and Building ML models of IDS Alerts | Iksoo Shin, Yunsoo Choi, Taewoong Kwon, Hyeakro Lee, Jungsuk Song |
Boosting Fuzzing Performance with Differential Seed Scheduling | Chung-Yi Lin, Chia-Wei Tien, Chun-Ying Huang | ||
Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process | Shusuke Morimoto, Kilho Shin, Hajime Kawamukai | ||
16:25-18:00 | Poster Session | ||
19:30-21:30 | Banquet |
August 2, 2019
9:00-9:40 | Invited Talk #2: (Session Chair: Jungsuk Song) Prof. Heung Youl Youm (Soonchunhyang University) | ||
9:40-9:50 | Break | ||
9:50-11:30 | Application Security (Session Chair: Ryoichi Isawa) |
Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector | Bilhanan Silverajan, Petteri Vistiaho |
Counter Attack against the Bus-Off Attack on CAN | Masaru Takada, Yuki Osada, Masakatu Morii | ||
Prevention of Data Leakage due to Implicit Information Flows in Android Applications | Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito | ||
Designing Authentication and Authorization System with Blockchain | Yuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei, Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii | ||
Watermarking Technique Based on Harris–Laplace Feature Point Detector Capable of Resisting Geometric Attacks | Kuo-Lung Hung, Chih-Yu Yen | ||
11:30-13:00 | Lunch | ||
13:00-13:40 | Invited Talk #3: (Session Chair: Akira Kanaoka) Prof. Makoto Nagata (Kobe University) | ||
13:40-13:50 | Break | ||
13:50-15:10 | Cryptography (Session Chair: Po-Wen Chi) |
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices | Masanori Hirotomo, Haruka Ito, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi |
Signcryption from NTRU Lattices Without Random Oracles | Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo | ||
A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes | Toshiki Tsuchida, Masanori Hirotomo, Haruka Ito, Makoto Takita, Yoshiaki Shiraishi, Kenta Nomura, Masami Mohri, Youji Fuukta, Masakatu Morii | ||
Subliminal Channels in the Code-based Ring Signature Scheme | Bingsen Wang, Zhuoran Zhang, Fangguo Zhang | ||
15:10-15:25 | Break | ||
15:25-16:05 | Invited Talk #4: (Session Chair: Fangguo Zhang) Prof. Weizhe Zhang (Peng Cheng Laboratory) | ||
16:05-16:15 | Break | ||
16:15-17:15 | Privacy Protection (Session Chiar: Bilhanan Silverajan) |
Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services | Po-Wen Chi, Pin-Hsin Hsiao |
Password Strength Measurement without Password Disclosure | Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka | ||
Privacy Risk Evaluation of Re-identification of Pseudonyms | Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo |