IWSEC 2016

September 12 (Mon)-14 (Wed), 2016
Akihabara-Ochanomizu District, Tokyo, Japan

Time Table (Last Update: September 7th, 2016)

September 12, 2016

Time Session
12:00-12:05 Opening
12:05-13:05 Keynote 1
13:05-13:30 Break
13:30-15:05 System Security
15:05-15:30 Break
15:30-16:45 Searchable Encryption
16:45-19:00 Welcome Drink / Poster Session

September 13, 2016

Time Session
09:30-10:30 Keynote 2
10:30-10:55 Break
10:55-12:30 Cryptanalysis
12:30-12:55 Permutation & Symmetric Encryption
12:55-19:00 Free Afternoon
19:00-21:00 Banquet

September 14, 2016

Time Session
9:30-10:30 Keynote 3
10:30-10:55 Break
10:55-12:05 Privacy Preserving
12:05-12:30 Hardware Security
12:30-14:00 Lunch
14:00-14:45 Post-quantum Cryptography
14:45-15:10 Pairing Computation
15:10-15:35 Break
15:35-17:20 CSS/SCIS Award
17:20-17:25 Closing

Program of IWSEC2016

Keynote 1

12:05-13:05 September 12, 2016
Session Chair: Katsunari Yoshioka

  • angr - Finding vulnerabilities in embedded software
    Christopher Kruegel

System Security

13:30-15:05 September 12, 2016
Session Chair: William Robertson

  • Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors
    Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, and Chuankun Wu
  • Hybrid Risk Assessment Model based on Bayesian Networks
    Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar
  • Hooking Graceful Moments: A Security Analysis of Sudo Session Handling
    Ji Hoon Jeong, Hyung Chan Kim, Il Hwan Park, and Bong Nam Noh
  • Security of Web of Things: a Survey(short paper)
    Wei Xie, Yong Tang, Shuhui Chen, Yi Zhang, and Yuanming Gao

Seachable Encryption

15:30-16:45 September 12, 2016
Session Chair: Keisuke Tanaka

  • UC-Secure Dynamic Searchable Symmetric Encryption Scheme
    Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama
  • Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
    Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, and Tatsuji Munaka
  • Secure Automata-based Substring Search Scheme on Encrypted Data
    Hiroaki Yamamoto

Keynote 2

09:30-10:30 September 13, 2016
Session Chair: Kazuto Ogawa

  • Division Property: Efficient Method to Estimate the Algebraic Degree
    Yosuke Todo

Cryptanalysis

10:55-12:30 September 13, 2016
Session Chair: Yu Sasaki

  • Related-key Impossible Differential Analysis of Full Khudra
    Qianqian Yang, Lei Hu, Siwei Sun, and Ling Song
  • On the Division Property of SIMON48 and SIMON64
    Zejun Xiang, Wentao Zhang, and Dongdai Lin
  • Practical Analysis of Key Recovery Attack against Search-LWE Problem
    Momonari Kudo, Junpei Yamaguchi, Yang Guo, and Masaya Yasuda
  • A Note on Fault Attacks against Deterministic Signature Schemes (short paper)
    Alessandro Barenghi and Gerardo Pelosi

Permutation & Symmetric Encryption

12:30-12:55 September 13, 2016
Session Chair: Takeshi Koshiba

  • Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes
    Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka

Keynote 3

09:30-10:30 September 14, 2016
Session Chair: Katsunari Yoshioka

  • UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
    Engin Kirda

Privacy Preserving

10:55-12:05 September 14, 2016
Session Chair: Tsutomu Matsumoto

  • Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization
    Tao Zhang, Sherman S.M. Chow, Zhe Zhou, and Ming Li
  • Formal Policy-based Provenance Audit
    Denis Butin, Denise Demirel, and Johannes Buchmann
  • Recipient Privacy in Online Social Networks (short paper)
    Filipe Beato, Kimmo Halunen, and Bart Mennink

Hardware Security

12:05-12:30 September 14, 2016
Session Chair: Tsutomu Matsumoto

  • Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
    Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama

Post-quantum Cryptography

14:00-14:45 September 14, 2016
Session Chair: Goichiro Hanaoka

  • On the Security and Key Generation of the ZHFE Encryption Scheme
    Wenbin Zhang and Chik How Tan
  • Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)
    Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, and Chengdong Tao

Pairing Computation

14:45-15:10 September 14, 2016
Session Chair: Kazuo Sakiyama

  • Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation
    Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama

CSS/SCIS Award

15:35-17:20 September 14, 2016
Session Chair: Koji Chida / Satoshi Obana

  • APAT: An Application of Aggregate Signatures to BGPSEC
    Naoto Yanai (Main Contributor: Kazuma Tanaka)
  • Parameter Selections for Approximate GCD Problems
    Atsushi Takayasu
  • A Construction of Fully Homomorphic Encryption with a Strong Security Notion
    Satoshi Yasuda
  • Lattice IBE without Reduction Loss in the Random Oracle Model
    Shuichi Katsumata
  • Symmetric Ciphers Software-implementable in Energy Harvesting Wireless Sensor Modules
    Junichi Sakamoto
  • Investigating Malware Sandbox Analysis Environments by a Dedicated Fingerprinting Tool "SandPrint"
    Akira Yokoyama
  • A Note on the Implementation of Non-Uniform Distributed Shuffle
    Akihiro Nishimura

Accepted Papers

Practical Analysis of Key Recovery Attack against Search-LWE Problem

Momonari Kudo, Junpei Yamaguchi, Yang Guo, and Masaya Yasuda

Security of Web of Things: a Survey

Wei Xie, Yong Tang, Shuhui Chen, Yi Zhang, and Yuanming Gao (short paper)

Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction

Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, and Chengdong Tao (short paper)

Secure Automata-based Substring Search Scheme on Encrypted Data

Hiroaki Yamamoto

UC-Secure Dynamic Searchable Symmetric Encryption Scheme

Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes

Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, and Tatsuji Munaka

Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes

Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka

Recipient Privacy in Online Social Networks

Filipe Beato, Kimmo Halunen, and Bart Mennink (short paper)

Formal Policy-based Provenance Audit

Denis Butin, Denise Demirel, and Johannes Buchmann

Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors

Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, and Chuankun Wu

Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation

Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama

On the Division Property of SIMON48 and SIMON64

Zejun Xiang, Wentao Zhang, and Dongdai Lin

Hooking Graceful Moments: A Security Analysis of Sudo Session Handling

Ji Hoon Jeong, Hyung Chan Kim, Il Hwan Park, and Bong Nam Noh

Related-key Impossible Differential Analysis of Full Khudra

Qianqian Yang, Lei Hu, Siwei Sun, and Ling Song

On the Security and Key Generation of the ZHFE Encryption Scheme

Wenbin Zhang and Chik How Tan

Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants

Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama

A Note on Fault Attacks against Deterministic Signature Schemes

Alessandro Barenghi and Gerardo Pelosi (short paper)

Hybrid Risk Assessment Model based on Bayesian Networks

Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar

Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization

Tao Zhang, Sherman S.M. Chow, Zhe Zhou, and Ming Li