IWSEC 2019

August 28 (Wed) - 30 (Fri), 2019
Tokyo Institute of Technology, Tokyo, Japan

Time Table

August 28th, 2019

Time Session
08:30- Registration
09:40-09:50 Opening
09:50-10:40 Public-key Primitives 1
10:40-10:50 Break
10:50-11:50 Keynote Talk 1
11:50-13:10 Lunch
13:10-14:00 Cryptanalysis on Public-key Primitives
14:00-14:10 Break
14:10-15:00 Cryptographic Protocols 1
15:00-15:25 Break
15:25-16:15 Symmetric-key Primitives
16:15-16:25 Break
16:25-17:15 Malware Detection and Classification
17:30-19:30 Poster Session / Welcome Reception

August 29th, 2019

Time Session
09:40-10:30 Intrusion Detection and Prevention
10:30-10:50 Break (with Poster Session)
10:50-11:50 Keynote Talk 2
11:50-13:10 Lunch
13:10-14:00 Web and Usable Security
14:00-14:10 Break
14:10-15:10 Invited talk from AIMaP 1
15:10-15:35 Break
15:35-16:25 Public-key Primitives 2
16:25-16:35 Break
16:35-17:25 Cryptanalysis on Symmetric-key Primitives
19:00-21:30 Banquet

August 30th, 2019

Time Session
09:30-10:45 Cryptographic Protocols
10:45-10:55 Break
10:55-11:55 Invited talk from AIMaP 2
11:55-13:15 Lunch
13:15-14:05 Forensics
14:05-14:15 Break
14:15-15:35 Invited session from SCIS
15:30-15:50 Break
15:50-17:05 Invited session from CSS
17:05-17:10 Closing

Program

Public-key Primitives 1

09:50-10:40 August 28th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)

  • CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions (Regular)
    Toi Tomita, Wakaha Ogata and Kaoru Kurosawa
  • A Faster Constant-time Algorithm of CSIDH keeping Two Points (Short)
    Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki and Tsuyoshi Takagi

Keynote 1

10:50-11:50 August 28th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)

Cryptanalysis on Public-key Primitives

13:10-14:00 August 28th, 2019
Session Chair: Atsushi Takayasu (University of Tokyo, Japan)

  • An Efficient F4-style Based Algorithm to Solve MQ Problems (Regular)
    Takuma Ito, Naoyuki Shinohara and Shigenori Uchiyama
  • How to Solve Multiple Short-Exponent Discrete Logarithm Problem (Regular)
    Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi and Yuusuke Sakagami

Cryptographic Protocols 1

14:10-15:00 August 28th, 2019
Session Chair: Kirill Morozov (University of North Texas, USA)

  • Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm (Regular)
    David Lucas, Jean-Guillaume Dumas, Pascal Lafourcade, Julio Lopez Fenner, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys
  • An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations (Regular)
    Ryo Okishima and Toru Nakanishi

Symmetric-key Primitives

15:25-16:15 August 28th, 2019
Session Chair: Shoichi Hirose (University of Fukui, Japan)

  • More results on Shortest Linear Programs (Regular)
    Subhadeep Banik, Takanori Isobe and Yuki Funabiki
  • Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (Regular)
    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe

Malware detection and classification

16:25-17:15 August 28th, 2019
Session Chair: Yuto Otsuki (NTT Security (Japan) KK, Japan)

  • Correlating High- and Low-Level Features: Increased Understanding of Malware Classification (Regular)
    Sergii Banin and Geir Olav Dyrkolbotn
  • Towards Efficient Detection of Malicious VBA Macros with LSI (Regular)
    Mamoru Mimura and Taro Ohminami

Poster session / Welcome reception

17:30-19:30 August 28th, 2019

The list of posters is available here.

Intrusion Detection and Prevention

09:40-10:30 August 29th, 2019
Session Chair: Daiki Chiba (Nippon Telegraph and Telephone Corporation, Japan)

  • IDS Alert Priority Determination based on Traffic Behavior (Regular)
    Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima and Hiroki Takakura
  • Effectiveness of Entropy-based Features in High- and Low-Intensity DDoS Attack Detection (Short)
    Abigail Koay, Ian Welch and Winston Seah

Keynote 2

10:50-11:50 August 29th, 2019
Session Chair: Takeshi Yagi (NTT Security (Japan) KK, Japan)

Web and Usable Security

13:10-14:00 August 29th, 2019
Session Chair: Akira Kanaoka (Toho University, Japan)

  • API Usability of Stateful Signature Schemes (Regular)
    Alexander Zeier, Alexander Wiesmaier and Andreas Heinemann
  • Method for Preventing Suspicious Web Access in Android WebView (Short)
    Masaya Sato, Yuta Imamura, Rintaro Orito and Toshihiro Yamauchi

Invited talk from AlMap 1

14:10-15:10 August 29th, 2019
Session Chair: Yoshihiro Mizoguchi (Institute of Mathematics for Industry, Kyusyu University, Japan)

Public-key Primitives 2

15:35-16:25 August 29th, 2019
Session Chair: Yohei Watanabe (NICT, Japan)

  • Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security Notions (Regular)
    Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka and Kanta Matsuura
  • Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short)
    Xin Wang, Shimin Li and Rui Xue

Cryptanalysis on Symmetric-key Primitives

16:35-17:25 August 29th, 2019
Session Chair: Kazuhiko Minematsu (NEC, Japan)

  • Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm (Regular)
    Fukang Liu, Zhenfu Cao and Gaoli Wang
  • Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods (Regular)
    Fukang Liu and Takanori Isobe

Cryptographic Protocols 2

09:30-10:45 August 30th, 2019
Session Chair: Keita Emura (NICT, Japan)

  • VSS Made Simpler (Regular)
    Yvo Desmedt and Kirill Morozov
  • Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity (Regular)
    F. Betül Durak and Serge Vaudenay
  • A New Approach to Constructing Digital Signature Schemes (Short)
    Risto Laanoja, Ahto Truu, Ahto Buldas, Denis Firsov and Henri Lakk

Invited talk from AlMap 2

10:55-11:55 August 30th, 2019
Session Chair: Yoshihiro Mizoguchi (Institute of Mathematics for Industry, Kyusyu University, Japan)

Forensics

13:15-14:05 August 30th, 2019
Session Chair: Hajime Shimada (Nagoya University, Japan)

  • GRYPHON: Drone Forensics in Dataflash and Telemetry Logs (Regular)
    Evangelos Mantas and Constantinos Patsakis
  • Toward the Analysis of Distributed Code Injection in Post-mortem Forensics (Regular)
    Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires and Terrence Lillard

Invited session from SCIS

14:15-15:35 August 30th, 2019
Session Chair: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)

  • Cryptanalysis of OCB2 (from SCIS 2019)
    Akiko Inoue and Kazuhiko Minematsu
  • Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem (from SCIS 2019)
    Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
  • On Augmented Black-Box Construction Based on an Oracle Without Witness Indistinguishability (from SCIS 2019)
    Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
  • Can the Logistic Regression in Secure Computation Really be Used? (from SCIS 2019)
    Ibuki Mishina, Koki Hamada, Ryo Kikuchi, Dai Ikarashi
  • Topology-Preserving Computation Using a Deck of Cards and Its Application (from SCIS 2019)
    Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone
  • Timing Attacks against Deep Learning for Adversarial Examples (from SCIS 2019)
    Tsunato Nakai
  • A Study on an Efficient Evaluation Method for EM Information Leakage by Changing Display Color (from SCIS 2019)
    Ryota Birukawa, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
  • Proposal of IoT malware disablement method using dummy C&C server (from SCIS 2019)
    Takeshi Misu and Tatsuaki Momoi

Invited session from CSS

15:50-17:05 August 30th, 2019
Session Chair: Shohei Hiruta (NEC Security Research Laboratories, Japan)

  • Efficient Threshold Public-Key Encryption from CBDH (from CSS 2018)
    Masahiro Ebina, Yohei Watanabe, Junji Shikata
  • Kernel Memory Inspection Capability for Malicious Kernel Module Detection (from CSS 2018)
    Hiroki Kuzuno and Toshihiro Yamauchi
  • Unknown Family Detection using Adversarial Training (from CSS 2018)
    Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Kunio Hato, Daniel Dalek, Masayuki Murata
  • Audio Adversarial Example in the Physical World (from CSS 2018)
    Hiromu Yakura and Jun Sakuma
  • Latest Trends in Voice Assistance Systems and Security Research: An Attack on Voice Assistance Systems Using Directional Sound Beams (from CSS 2018)
    Ryo Iijima, Syota Minami, Yunao Zhou, Tatsuya Takehisa, Takeshi Takahashi, Yasuhiro Oikawa, Tatsuya Mori

Accepted Papers

Regular Papers

Track A

  • An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations
    Ryo Okishima and Toru Nakanishi
  • An Efficient F4-style Based Algorithm to Solve MQ Problems
    Takuma Ito, Naoyuki Shinohara and Shigenori Uchiyama
  • Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
    F. Betül Durak and Serge Vaudenay
  • CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions
    Toi Tomita, Wakaha Ogata and Kaoru Kurosawa
  • Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security Notions
    Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka and Kanta Matsuura
  • Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm
    Fukang Liu, Zhenfu Cao and Gaoli Wang
  • How to Solve Multiple Short-Exponent Discrete Logarithm Problem
    Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi and Yuusuke Sakagami
  • More results on Shortest Linear Programs
    Subhadeep Banik, Takanori Isobe and Yuki Funabiki
  • Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods
    Fukang Liu and Takanori Isobe
  • Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm
    David Lucas, Jean-Guillaume Dumas, Pascal Lafourcade, Julio Lopez Fenner, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys
  • Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe
  • VSS Made Simpler
    Yvo Desmedt and Kirill Morozov

Track B

  • API Usability of Stateful Signature Schemes
    Alexander Zeier, Alexander Wiesmaier and Andreas Heinemann
  • Correlating High- and Low-Level Features: Increased Understanding of Malware Classification
    Sergii Banin and Geir Olav Dyrkolbotn
  • GRYPHON: Drone Forensics in Dataflash and Telemetry Logs
    Evangelos Mantas and Constantinos Patsakis
  • IDS Alert Priority Determination based on Traffic Behavior
    Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima and Hiroki Takakura
  • Towards Efficient Detection of Malicious VBA Macros with LSI
    Mamoru Mimura and Taro Ohminami
  • Toward the Analysis of Distributed Code Injection in Post-mortem Forensics
    Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires and Terrence Lillard

Short Papers

Track A

  • A Faster Constant-time Algorithm of CSIDH keeping Two Points
    Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki and Tsuyoshi Takagi
  • A New Approach to Constructing Digital Signature Schemes
    Risto Laanoja, Ahto Truu, Ahto Buldas, Denis Firsov and Henri Lakk
  • Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques
    Xin Wang, Shimin Li and Rui Xue

Track B

  • Effectiveness of Entropy-based Features in High- and Low-Intensity DDoS Attack Detection
    Abigail Koay, Ian Welch and Winston Seah
  • Method for Preventing Suspicious Web Access in Android WebView
    Masaya Sato, Yuta Imamura, Rintaro Orito and Toshihiro Yamauchi