Conference Program

Free Online Access to Conference Proceedings:

Vol. 1:
Vol. 2:

Monday September 3rd
8:45 Opening & Welcome
(Auditorium Vertex)
09:00-10:00 INVITED TALK: Prof. Kenny Paterson (Royal Holloway, UK)
(Auditorium Vertex)
Chair: Javier Lopez
10:00-10:30 COFFEE-BREAK
(Auditorium Vertex Gardens)
10:30-12:30 Session 1: Software Security
(Chair: Sushil Jajodia)
(Room 1: Sala Agora)
Session 2: Blockchain & Machine Learning
(Chair: Jose L. Munoz)
(Room2: Auditori Camins)
Paul Muntean, Sebastian Wuerl, Jens Grossklags and Claudia Eckert.
"CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions"
Erik-Oliver Blass and Florian Kerschbaum.
"Strain: A Secure Auction for Blockchains"
Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin and Kang Li.
"MobileFindr: Function Similarity Identification for Reversing Mobile Apps"
Eleftherios Kokoris-Kogias, Elli Androulaki, Angelo De Caro and Christian Cachin.
"Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains"
Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi and Aiman Hanna.
"On Leveraging Coding Habits for Effective Binary Authorship Attribution"
Mika Juuti, Bo Sun, Tatsuya Mori and N. Asokan.
"Stay On-Topic: Generating Context-specific Fake Restaurant Reviews"
Narges Khakpour and Charilaos Skandylas.
"Synthesis of a Permissive Security Monitor"
Julien Keuffer, Refik Molva and Herve Chabanne.
"Efficient Proof Composition for Verifiable Computation"
12:30-14:00 LUNCH
UNITY Restaurant (Plaza Telecos)
14:00-15:30 Session 3: Hardware Security
(Chair: Jorge Cuellar)
(Room 1: Sala Agora)
Session 4: Attacks
(Chair: Einar Snekkenes)
(Room 2: Auditori Camins)
Ben Lapid and Avishai Wool.
"Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet"
Qian Cui, Guy-Vincent Jourdan, Gregor Bochmann, Iosif Viorel Onut and Jason Flood.
"Phishing Attacks Modifications and Evolutions"
Jingquan Ge, Neng Gao, Chenyang Tu, Zeyi Liu and Jun Yuan.
"Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-channel Attacks on All Programmable SoC"
Kiran Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik and Lynn Wu.
"SILK-TV: Secret Information Leakage from Keystroke Timing Videos"
Heiko Mantel, Johannes Schickel, Alexandra Weber and Friedrich Weber.
"How Secure is Green IT? The Case of Software-Based Energy Side Channels"
Erisa Karafili, Matteo Cristani and Luca Vigano.
"A Formal Approach to Analyzing Cyber-Forensics Evidence"
15:30-16:00 COFFEE-BREAK
Plaza Telecos
16:00-17:30 Session 5: Malware & Vulnerabilities
(Chair: Cristina Alcaraz)
(Room 1: Sala Agora)
Session 6: Protocol Security
(Chair: Angelos Stavrou)
(Room 2: Auditori Camins)
George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis.
"Automatic detection of various malicious traffic using side channel features on TCP packets"
David Baelde, Stephanie Delaune and Lucca Hirschi.
"POR for Security Protocol Equivalences: Beyond Action-Determinism"
Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer and Thomas Kittel.
"PwIN - Pwning Intel piN - Why DBI is unsuitable for security applications"
Zach Smith, Sjouke Mauw, Jorge Toro-Pozo and Rolando Trujillo.
"Automated Identification of Desynchronisation Attacks on Shared Secrets"
Jan Van den Herrewegen and Flavio D. Garcia.
"Beneath the Bonnet: a Breakdown of Diagnostic Security"
Andreas V. Hess, Sebastian A. Modersheim and Achim D. Brucker.
"Stateful Protocol Composition"
Christopher McMahon Stone, Tom Chothia and Joeri de Ruiter.
"Extending Automated Protocol State Learning for the 802.11 4-Way Handshake"
Tuesday September 4th
09:00-10:00 INVITED TALK: Prof. Robert Deng (SMU, Singapore)
(Auditorium Vertex)
Jianying Zhou
10:00-10:30 COFFEE-BREAK
(Auditorium Vertex Gardens)
10:30-12:30 Session 7: Privacy (I)
(Chair: Pierangela Samarati)
(Room 1: Sala Agora)
Session 8: CPS & IoT Security
(Chair: Sokratis Katsikas)
(Room 2: Auditori Camins)
Tobias Urban, Dennis Tatang, Thorsten Holz and Norbert Pohlmann.
"Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs"
Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici and Asaf Shabtai.
"Deriving a Cost-Effective Digital-Twin of an ICS to Facilitate Security Evaluation"
Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne and Stephan Wesemeyer.
"Anonymous Single-Sign-On for n designated services with traceability"
Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz and Yan Zhang.
"Tracking Advanced Persistent Threats in Critical Infrastructures through Opinion Dynamics"
Veronique Cortier, Antoine Dallon and Stephanie Delaune.
"Efficiently deciding equivalence for standard primitives and phases"
Lei Yang, Chris Seasholtz, Bo Luo and Fengjun Li.
"Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways"
Katharina Kohls and Christina Popper.
"DigesTor: Comparing Passive Traffic Analysis Attacks on Tor"
Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi and Matthias Schunter.
"SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices"
12:30-14:00 LUNCH
UNITY Restaurant (Plaza Telecos)
14:00-16:00 Session 9: Mobile Security
(Chair: Joaquin Garcia-Alfaro)
(Room 1: Sala Agora)
Session 10: Database & Web Security
(Chair: Joaquin Biskup)
(Room 2: Auditori Camins)
Prabhakaran Kasinathan and Jorge Cuellar.
"Workflow-Aware Security of Integrated Mobility Services"
Xingchen Wang and Yunlei Zhao.
"Order-Revealing Encryption: File-Injection Attack and Forward Security"
Kaiming Fang and Guanhua Yan.
"Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning"
Jianfeng Wang, Xiaofeng Chen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au and Zhi-Hui Zhan.
"Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database"
Sascha Gross, Abhishek Tiwari and Christian Hammer.
"PIAnalyzer: A precise approach for PendingIntent vulnerability analysis"
Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin Hamlen and Shuang Hao.
"SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks"
Christof Torres and Hugo Jonker.
"Investigating Fingerprinters and Fingerprinting-alike Behaviour of Android Applications"
Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang and Angelos Stavrou.
"Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace"
16:00-16:30 COFFEE-BREAK
Plaza Telecos
21:00-23:00 GALA DINNER
Wednesday September 5th
09:00-10:00 INVITED TALK: Prof. Gene Tsudik (Univ. California - Irvine, US)
(Auditorium Vertex)
Chair: Miguel Soriano
10:00-10:30 COFFEE-BREAK
(Auditorium Vertex Gardens)
10:30-12:30 Session 11: Cloud Security
(Chair: Nora Cuppens)
(Room 1: Sala Agora)
Session 12: Applied Crypto (I)
(Chair: Marina Blanton)
(Room 2: Auditori Camins)
Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang and Xinyi Huang.
"Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases"
Jihye Kim, Seunghwa Lee, Jiwon Lee and Hyunok Oh.
"Scalable Wildcarded Identity-Based Encryption"
Jin Li, Heng Ye, Jiqiang Liu, Wei Wang, Rongxing Lu and Wenjing Lou.
"Efficient and Secure Outsourcing of Differentially Private Data Publication"
Takanori Isobe and Kazuhiko Minematsu.
"Breaking the Message Integrity of End-to-End Encryption Schemes of LINE"
Sarvar Patel, Giuseppe Persiano and Kevin Yeo.
"Symmetric Searchable Encryption with Sharing and Unsharing"
Benoit Libert, Thomas Peters and Chen Qian.
"Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption"
Cong Zuo, Shifeng Sun, Joseph Liu, Jun Shao and Josef Pieprzyk.
"Secure Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries"
Filip Zagorski, Pawel Lorek and Karol Gotfryd Riffle.
"RiffleScrambler a memory-hard password storing function"
12:30-14:00 LUNCH
UNITY Restaurant (Plaza Telecos)
14:00-15:30 Session 13: Privacy (II)
(Chair: Roberto di Pietro)
(Room 1: Sala Agora)
Session 14: Multi-party Computation
(Chair: Florian Kerschbaum)
(Room 2: Auditori Camins)
Sebastien Canard, David Pointcheval, Quentin Santos and Jacques Traore.
"Practical Strategy-Resistant Privacy-Preserving Elections"
Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida and Goichiro Hanaoka.
"Constant-Round Client-Aided Secure Comparison Protocol"
Gergei Bana, Rohit Chadha and Ajay Kumar Eeralla.
"Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker"
Niklas Buescher, Alina Weber and Stefan Katzenbeisser.
"Towards Pratical RAM based Secure Computation"
Xueou Wang, Xiaolu Hou, Ruben Rios, Per Hallgren, Nils Tippenhauer and Martin Ochoa.
"Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies"
Marina Blanton and Myoungin Jeong.
"Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs"
15:30-16:00 COFFEE-BREAK
Plaza Telecos
16:00-17:30 Session 15: SDN Security
(Chair: Frederic Cuppens)
(Room 1: Sala Agora)
Session 16: Applied Crypto (II)
(Chair: Goichiro Hanaoka)
(Room 2: Auditori Camins)
Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi.
"Stealthy Probing-based Verification (SPV): An Active Approach to Defending Software Defined Networks against Topology Poisoning Attacks"
Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun and Yuting Xiao.
"Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls-Secure and Efficient Fine-Grained Access Control on Corrupted Machines"
Nicolae Paladi, Linus Karlsson and Khalid Elbashir.
"Trust Anchors in Software Defined Networks"
Junzuo Lai and Qiang Tang.
"Making Any Attribute-Based Encryption Accountable, Efficiently"
Yan Michalevsky and Marc Joye.
"Decentralized Policy-Hiding ABE with Receiver Privacy"
Closing & Farewell



To contact the general chair, e-mail to:
To contact the program chairs, e-mail to: