Conference Program

Monday September 3rd
8:45 Opening & Welcome
09:00-10:00 INVITED TALK: Prof. Kenny Paterson (Royal Holloway, UK)
10:00-10:30 COFFEE-BREAK
10:30-12:30 Session 1: Software Security Session 2: Blockchain & Machine Learning
57 Paul Muntean, Sebastian Wuerl, Jens Grossklags and Claudia Eckert."CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions" 31 Erik-Oliver Blass and Florian Kerschbaum."Strain: A Secure Auction for Blockchains"
225 Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin and Kang Li."MobileFindr: Function Similarity Identification for Reversing Mobile Apps" 138 Eleftherios Kokoris-Kogias, Elli Androulaki, Angelo De Caro and Christian Cachin."Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains"
250 Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi and Aiman Hanna."On Leveraging Coding Habits for Effective Binary Authorship Attribution" 91 Mika Juuti, Bo Sun, Tatsuya Mori and N. Asokan."Stay On-Topic: Generating Context-specific Fake Restaurant Reviews"
277 Narges Khakpour and Charilaos Skandylas."Synthesis of a Permissive Security Monitor" 130 Julien Keuffer, Refik Molva and Herve Chabanne."Efficient Proof Composition for Verifiable Computation"
12:30-14:00 LUNCH
14:00-15:30 Session 3: Hardware Security Session 4: Attacks
68 Ben Lapid and Avishai Wool."Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet" 67 Qian Cui, Guy-Vincent Jourdan, Gregor Bochmann, Iosif Viorel Onut and Jason Flood."Phishing Attacks Modifications and Evolutions"
75 Jingquan Ge, Neng Gao, Chenyang Tu, Zeyi Liu and Jun Yuan."Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-channel Attacks on All Programmable SoC" 214 Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik and Lynn Wu."SILK-TV: Secret Information Leakage from Keystroke Timing Videos"
269 Heiko Mantel, Johannes Schickel, Alexandra Weber and Friedrich Weber."How Secure is Green IT? The Case of Software-Based Energy Side Channels" 226 Erisa Karafili, Matteo Cristani and Luca Vigano."A Formal Approach to Analyzing Cyber-Forensics Evidence"
15:30-16:00 COFFEE-BREAK
16:00-17:30 Session 5: Malware & Vulnerabilities Session 6: Protocol Security
23 Dimitris Gritzalis, George Stergiopoulos, Alexander Talavari and Evangelos Bitsikas."Automatic detection of various malicious traffic using side channel features on TCP packets" 13 David Baelde, Stephanie Delaune and Lucca Hirschi."POR for Security Protocol Equivalences: Beyond Action-Determinism"
259 Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer and Thomas Kittel."PwIN - Pwning Intel piN - Why DBI is unsuitable for security applications" 261 Zach Smith, Sjouke Mauw, Jorge Toro-Pozo and Rolando Trujillo."Automated Identification of Desynchronisation Attacks on Shared Secrets"
181 Jan Van den Herrewegen and Flavio D. Garcia."Beneath the Bonnet: a Breakdown of Diagnostic Security" 265 Andreas V. Hess, Sebastian A. Modersheim and Achim D. Brucker."Stateful Protocol Composition"
220 Christopher McMahon Stone, Tom Chothia and Joeri de Ruiter."Extending Automated Protocol State Learning for the 802.11 4-Way Handshake"
Tuesday September 4th
09:00-10:00 INVITED TALK: Prof. Robert Deng (SMU, Singapore)
10:00-10:30 COFFEE-BREAK
10:30-12:30 Session 7: Privacy (I) Session 8: CPS & IoT Security
124 Tobias Urban, Dennis Tatang, Thorsten Holz and Norbert Pohlmann."Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs" 170 Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici and Asaf Shabtai."Deriving a Cost-Effective Digital-Twin of an ICS to Facilitate Security Evaluation"
56 Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne and Stephan Wesemeyer."Anonymous Single-Sign-On for n designated services with traceability" 215 Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz and Yan Zhang."Tracking Advanced Persistent Threats in Critical Infrastructures through Opinion Dynamics"
174 Veronique Cortier, Antoine Dallon and Stephanie Delaune."Efficiently deciding equivalence for standard primitives and phases" 254 Lei Yang, Chris Seasholtz, Bo Luo and Fengjun Li."Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways"
179 Katharina Kohls and Christina Popper."DigesTor: Comparing Passive Traffic Analysis Attacks on Tor" 63 Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi and Matthias Schunter."SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices"
12:30-14:00 LUNCH
14:00-15:30 Session 9: Mobile Security Session 10: Database & Web Security
28 Prabhakaran Kasinathan and Jorge Cuellar."Workflow-Aware Security of Integrated Mobility Services" 76 Xingchen Wang and Yunlei Zhao."Order-Revealing Encryption: File-Injection Attack and Forward Security"
200 Kaiming Fang and Guanhua Yan."Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning" 126 Jianfeng Wang, Xiaofeng Chen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au and Zhi-Hui Zhan."Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database"
168 Sascha Gross, Abhishek Tiwari and Christian Hammer."PIAnalyzer: A precise approach for PendingIntent vulnerability analysis" 249 Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin Hamlen and Shuang Hao."SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks"
217 Christof Torres and Hugo Jonker."Investigating Fingerprinters and Fingerprinting-alike Behaviour of Android Applications" 286 Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang and Angelos Stavrou."Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace"
15:30-16:00 COFFEE-BREAK
Wednesday September 5th
09:00-10:00 INVITED TALK: Prof. Gene Tsudik (Univ. California - Irvine, US)
10:00-10:30 COFFEE-BREAK
10:30-12:30 Session 11: Cloud Security Session 12: Applied Crypto (I)
33 Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang and Xinyi Huang."Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases" 157 Jihye Kim, Seunghwa Lee, Jiwon Lee and Hyunok Oh."Scalable Wildcarded Identity-Based Encryption"
119 Jin Li, Heng Ye, Jiqiang Liu, Wei Wang, Rongxing Lu and Wenjing Lou."Efficient and Secure Outsourcing of Differentially Private Data Publication" 26 Takanori Isobe and Kazuhiko Minematsu."Breaking the Message Integrity of End-to-End Encryption Schemes of LINE"
248 Sarvar Patel, Giuseppe Persiano and Kevin Yeo."Symmetric Searchable Encryption with Sharing and Unsharing" 109 Benoit Libert, Thomas Peters and Chen Qian."Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption"
267 Cong Zuo, Shifeng Sun, Joseph Liu, Jun Shao and Josef Pieprzyk."Secure Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries" 150 Filip Zagorski, Pawel Lorek and Karol Gotfryd Riffle."Scrambler a memory-hard password storing function"
12:30-14:00 LUNCH
14:00-15:30 Session 13: Privacy (II) Session 14: Multi-party Computation
257 Sebastien Canard, David Pointcheval, Quentin Santos and Jacques Traore."Practical Strategy-Resistant Privacy-Preserving Elections" 133 Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida and Goichiro Hanaoka."Constant-Round Client-Aided Secure Comparison Protocol"
242 Gergei Bana, Rohit Chadha and Ajay Kumar Eeralla."Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker" 172 Niklas Buescher, Alina Weber and Stefan Katzenbeisser."Towards Pratical RAM based Secure Computation"
251 Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Tippenhauer and Martin Ochoa."Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies" 243 Marina Blanton and Myoungin Jeong."Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs"
15:30-16:00 COFFEE-BREAK
16:00-17:30 Session 15: SDN Security Session 16: Applied Crypto (II)
235 Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi."Stealthy Probing-based Verification (SPV): An Active Approach to Defending Software Defined Networks against Topology Poisoning Attacks" 36 Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun and Yuting Xiao."Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls-Secure and Efficient Fine-Grained Access Control on Corrupted Machines"
139 Nicolae Paladi, Linus Karlsson and Khalid Elbashir."Trust Anchors in Software Defined Networks" 129 Junzuo Lai and Qiang Tang."Making Any Attribute-Based Encryption Accountable, Efficiently"
123 Yan Michalevsky and Marc Joye."Decentralized Policy-Hiding ABE with Receiver Privacy"
Closing & Farewell

To contact the general chair, e-mail to:
To contact the program chairs, e-mail to: