Time Table (Last Update: September 7th, 2016)
September 12, 2016
Time | Session |
---|---|
12:00-12:05 | Opening |
12:05-13:05 | Keynote 1 |
13:05-13:30 | Break |
13:30-15:05 | System Security |
15:05-15:30 | Break |
15:30-16:45 | Searchable Encryption |
16:45-19:00 | Welcome Drink / Poster Session |
September 13, 2016
Time | Session |
---|---|
09:30-10:30 | Keynote 2 |
10:30-10:55 | Break |
10:55-12:30 | Cryptanalysis |
12:30-12:55 | Permutation & Symmetric Encryption |
12:55-19:00 | Free Afternoon |
19:00-21:00 | Banquet |
September 14, 2016
Time | Session |
---|---|
9:30-10:30 | Keynote 3 |
10:30-10:55 | Break |
10:55-12:05 | Privacy Preserving |
12:05-12:30 | Hardware Security |
12:30-14:00 | Lunch |
14:00-14:45 | Post-quantum Cryptography |
14:45-15:10 | Pairing Computation |
15:10-15:35 | Break |
15:35-17:20 | CSS/SCIS Award |
17:20-17:25 | Closing |
Program of IWSEC2016
Keynote 1
12:05-13:05 September 12, 2016
Session Chair: Katsunari Yoshioka
-
angr - Finding vulnerabilities in embedded software
Christopher Kruegel
System Security
13:30-15:05 September 12, 2016
Session Chair: William Robertson
-
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors
Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, and Chuankun Wu -
Hybrid Risk Assessment Model based on Bayesian Networks
Francois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, and Herve Debar -
Hooking Graceful Moments: A Security Analysis of Sudo Session Handling
Ji Hoon Jeong, Hyung Chan Kim, Il Hwan Park, and Bong Nam Noh -
Security of Web of Things: a Survey(short paper)
Wei Xie, Yong Tang, Shuhui Chen, Yi Zhang, and Yuanming Gao
Seachable Encryption
15:30-16:45 September 12, 2016
Session Chair: Keisuke Tanaka
-
UC-Secure Dynamic Searchable Symmetric Encryption Scheme
Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, and Kazuki Yoneyama -
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, and Tatsuji Munaka -
Secure Automata-based Substring Search Scheme on Encrypted Data
Hiroaki Yamamoto
Keynote 2
09:30-10:30 September 13, 2016
Session Chair: Kazuto Ogawa
-
Division Property: Efficient Method to Estimate the Algebraic Degree
Yosuke Todo
Cryptanalysis
10:55-12:30 September 13, 2016
Session Chair: Yu Sasaki
-
Related-key Impossible Differential Analysis of Full Khudra
Qianqian Yang, Lei Hu, Siwei Sun, and Ling Song -
On the Division Property of SIMON48 and SIMON64
Zejun Xiang, Wentao Zhang, and Dongdai Lin -
Practical Analysis of Key Recovery Attack against Search-LWE Problem
Momonari Kudo, Junpei Yamaguchi, Yang Guo, and Masaya Yasuda -
A Note on Fault Attacks against Deterministic Signature Schemes (short paper)
Alessandro Barenghi and Gerardo Pelosi
Permutation & Symmetric Encryption
12:30-12:55 September 13, 2016
Session Chair: Takeshi Koshiba
-
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes
Akinori Kawachi, Hirotoshi Takebe, and Keisuke Tanaka
Keynote 3
09:30-10:30 September 14, 2016
Session Chair: Katsunari Yoshioka
-
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
Engin Kirda
Privacy Preserving
10:55-12:05 September 14, 2016
Session Chair: Tsutomu Matsumoto
-
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization
Tao Zhang, Sherman S.M. Chow, Zhe Zhou, and Ming Li -
Formal Policy-based Provenance Audit
Denis Butin, Denise Demirel, and Johannes Buchmann -
Recipient Privacy in Online Social Networks (short paper)
Filipe Beato, Kimmo Halunen, and Bart Mennink
Hardware Security
12:05-12:30 September 14, 2016
Session Chair: Tsutomu Matsumoto
-
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, and Kazuo Sakiyama
Post-quantum Cryptography
14:00-14:45 September 14, 2016
Session Chair: Goichiro Hanaoka
-
On the Security and Key Generation of the ZHFE Encryption Scheme
Wenbin Zhang and Chik How Tan -
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)
Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, and Chengdong Tao
Pairing Computation
14:45-15:10 September 14, 2016
Session Chair: Kazuo Sakiyama
-
Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation
Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, and Shigenori Uchiyama
CSS/SCIS Award
15:35-17:20 September 14, 2016
Session Chair: Koji Chida / Satoshi Obana
-
APAT: An Application of Aggregate Signatures to BGPSEC
Naoto Yanai (Main Contributor: Kazuma Tanaka) -
Parameter Selections for Approximate GCD Problems
Atsushi Takayasu -
A Construction of Fully Homomorphic Encryption with a Strong Security Notion
Satoshi Yasuda -
Lattice IBE without Reduction Loss in the Random Oracle Model
Shuichi Katsumata -
Symmetric Ciphers Software-implementable in Energy Harvesting Wireless Sensor Modules
Junichi Sakamoto -
Investigating Malware Sandbox Analysis Environments by a Dedicated Fingerprinting Tool "SandPrint"
Akira Yokoyama -
A Note on the Implementation of Non-Uniform Distributed Shuffle
Akihiro Nishimura