Download: Final Program(PDF)

 

 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

 

FINAL PROGRAM

 

 

1618 November 2016

Zhangjiajie, Hunan Province, China

 

Copyright © Trusted Computing Institute, Central South University, China

http://trust.csu.edu.cn

 


 

Introduction to Central South University

 

 

Central South University (CSU) is a comprehensive and national key university under the direct administration of the Ministry of Education in China. CSU is among the first group of top universities in China admitted into “Project 211”, which is a project of building national key universities and colleges for the 21st century, and “Project 985”, which is a joint constructive project of building world-class universities co-sponsored by the Chinese central government and the local governments, and “Project 2011”, which is targeted for promoting the capability and capacity of cooperative creativity in top universities in China. Mr. Zhang Yaoxue, a member of the Chinese Academy of Engineering, and the inventor of Transparent Computing (TC), is the President of CSU.

 

Approved by the State Council, CSU was established on April 29, 2000, by merging three separate universities, including Hunan Medical University (HMU), Changsha Railway University (CRU), and Central South University of Technology (CSUT). CSU covers an area of around 5,117 mu (341 hectares).

 

CSU boasts a high-quality group of faculty, comprising of many famous scholars and experts with great influence both at home and abroad. Among them, there are 2 members of the Chinese Academy of Sciences, 15 academicians who are members of Chinese Academy of Engineering, 9 are members of the Discipline Assessment Group of the Academic Degrees Committee of the State Council, 23 scientific and technological experts have been recognized at a national level for their outstanding achievements, 545 experts have been awarded special subsidies from the Government, more than 1000 are doctorate supervisors and 33 are Special-term Professors funded by the Changjiang Scholar Program. In addition, CSU has appointed a number of well-known Chinese and international scholars as honorary professors, visiting professors, or adjunct professors.

 

CSU covers 12 fields of study, including engineering, science, medicine, management, literature, law, economics, philosophy, education, history, agriculture, and art, and offers military science as well. It consists of 30 colleges offering 92 programs for bachelors’ degrees, and a graduate school comprising of a number of national key disciplines, including 6 at first-level (ranking 8th in China), 12 at second-level and one in development. 91 first-level disciplines are authorized to confer masters and doctoral degrees. 191 programs are offered for doctoral degrees, 307 programs for masters’ degrees and 19 programs for professional masters’ degrees. CSU also has 42 post-doctoral exchange centers, ranking 9th among Chinese universities and colleges.

 

At present, more than 55,000 full-time students are studying at CSU, including 20,000 graduate students and 800 foreign students, from 31 provinces and municipalities of the mainland China, as well as 80 countries and regions of the rest of the world. CSU is a leading and top ranking Chinese university in the following aspects: one of the universities first starting an eight-year medical program ( M.D.), the first university running a pilot class for training innovation-oriented senior engineering talents, the first civilian university offering master degree in military command and technique for officers, boasting five national talents training and teaching bases, six national centers for experimental teaching, 57 national exemplary courses, six bilingual national exemplary courses, six “excellent teachers” and eight teaching teams highly recognized by the state, 15 National Top 100 Doctoral Dissertations produced by its graduates since 2000. CSU also possesses three national first-class affiliated hospitals equipped with state-of-the-art medical facilities.

 

 

http://www.csu.edu.cn/


 

Introduction to Guangzhou University

 

 

Guangzhou University (GU) is a comprehensive and key public university dually affiliated to Guangzhou Municipal Government and Guangdong Provincial Government with a history of over 70 years. The university has two campuses covering a total area of 153.3 hectares. The major campus is located in the south western part of Guangzhou Higher Education Mega Center (Xiao Gu Wei Island) and the other one is located in downtown (Gui Hua Gang) of Guangzhou.

 

GU has a teaching and research staff of 2400 people, including three academicians and 7 double-hired academicians. It has approximately 1400 full-time faculty members, including 351 professors. The number of the current full-time undergraduates of GU is over 30000. The University has 27 colleges, offering 81undergraduate majors, doctoral degree programs in 3 Level-I disciplines, master degree programs in 26 Level-I and 95 Level-II disciplines as well as 9 professional Master’s degree programs, and is authorized to run 3 Post-Doctoral programs. All of its majors require students’ scores to be above the one for entering first-class universities in college entrance examination.

 

In the new age, the university is engaged in making a contribution to the community. The goal of the university is to mold itself as a comprehensive university with a characteristic and ranks in a leading position among the universities of similar type.

 

 

http://www.gzhu.edu.cn/

 

 


 

Introduction to Jishou University

 

 

Jishou University (JSU) is a public university in the western part of Hunan Province and the only comprehensive university in the border area of Hunan, Hubei, Chongqing and Guizhou provinces. Founded in September 1958, the University is composed of two campuses in Jishou and Zhangjiajie cities, with the main campus in Jishou City, the capital city of Xiangxi Autonomous Prefecture.

 

In 2003, the university was entitled the right to confer master’s degrees. In October 2006, the university successfully passed the undergraduate education evaluation on regular institutions of higher learning organized by the Ministry of Education with a comment of “Excellent”. The year of 2012 saw the university rank among “universities of capacity construction project in mid-west”. At the same year, the university was approved to carry out “Ph. D program catering for special demands of our country”.

 

The university covers an area of 1.29 million square meters with the total building area of 600,000 square meters. Presently, the university has been equipped with various teaching and scientific researching instruments and equipments with a total value of over RMB 170 million as well as a book and literature collection of over 2.3million volumes. The university currently has over 1000 full-time teachers, of which 86% are provided with doctor’s or master’s degree.

 

At present, there are 70 undergraduate majors offered by the university, among which 3 are national characteristic majors, 8 are provincial characteristic majors.8 are provincial key majors. The university is now operating 1 Ph.D program catering for special demands of our county,14 first-grade disciplines for master’ a degree, 1 professional master degree program and 1characteristic, advanced and key discipline, covering 11 main disciplines. In addition, there are 14 provincial and ministerial level key research bases,1 national experimental teaching demonstration center,5 provincial practice teaching demonstration centers.

 

The students of various types total over 30,000, of which over 18,000 are full-time undergraduate students, over 800 are graduate students. The number of undergraduates in the independent college is almost 8,000, and that of adult diploma education students is over 7,000.

 

Over half a century, the university adheres to the educational philosophy of “Populace University”, regards it as its own duty to serve for the regional economic and social development, fulfills irreplaceable educational function in the west of Hunan and in the border area of Hunan, Hubei, Chongqing and Guizhou provinces, forming distinguished schooling-running characteristics and being widely approved by all sectors of the society.

 

 

http://www.jsu.edu.cn/

 


 

TABLE OF CONTENTS

 

 

Introduction to Central South University (CSU)

Cover Page 02

Introduction to Guangzhou University (GU)

Cover Page 03

Introduction to Jishou University (JSU)

Cover Page 04

Final Program at a Glance

Page 01

Quick Guide to Rooms for Keynote / Technical Sessions

Page 02

Keynote Speeches

Page 03

Invited Talks

Page 05

Technical Sessions and Papers

Page 10

Conference Venue

Page 12

Sponsors, Organizers, and Publishers

Page 13


FINAL PROGRAM of ISPEC 2016 AT A GLANCE

The 12th International Conference on Information Security Practice and Experience

(ISPEC 2016)

Nov. 16-18, 2016

 

Zhangjiajie International Hotel

No. 145, Sanjiaoping, Yongding District, Zhangjiajie, Hunan Province, China

 

 

Nov. 15

14:00-18:00

Registration, Reception

Nov. 16

08:30-18:00

Opening, Keynote (1), Paper Presentation (11)

12:30-14:00

Lunch

18:30-20:30

Dinner

Nov. 17

08:30-17:30

Keynote (1), Paper Presentation (12)

12:30-14:00

Lunch

18:30-20:30

Banquet

Nov. 18

08:30-12:00

Huawei  IoT Security Forum

12:00-14:00

Lunch

 

 

 

 

Sponsored by:

 

 

 

 

 

Organized by: Central South University, Guangzhou University, Jishou University

 

 

 

 

         

Quick Guide to Rooms for Keynote/Technical Sessions

 

 

 

 

 

Room Number

Room Name

Floor

Room 1

Grand Hall

(多功能厅)

2

Room 2

Guoyan Hall

(国宴厅)

2

Room 3

Xiangjiang Hall

(湘江厅)

2

Room 4

Zijiang Hall

(资江厅)

2

Room 5

Lishui Hall

(澧水厅)

2


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Keynote 1: Security Protocols Fit for Humans

Speaker: Prof. David Basin, ETH Zurich, Switzerland

Chair: Robert Deng, Singapore Management University, Singapore

09:00-10:00, November 16, 2016 (Wednesday)

 

About the Keynote Speaker

 

Prof. David Basin is a full professor of Computer Science at ETH Zurich. He received his Ph.D. in Computer Science from Cornell University in 1989 and his Habilitation in Computer Science from the University of Saarbrucken in 1996. From 1997–2002 he held the chair of Software Engineering at the University of Freiburg in Germany. His research areas are Information Security and Software Engineering. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He is Editor-in-Chief of the ACM Transactions on Privacy and Security and of Springer-Verlag's book series on Information Security and Cryptography. He serves on various management and scientific advisory boards and has consulted extensively for IT companies and government organizations.

 

 

 

 

 

Summary:

Many security protocols involve humans, not machines, as endpoints. The differences are critical: humans are not only computationally weaker than machines, they are naive, careless, and gullible. We present foundations, methods, and tool support for formalizing and reasoning about security protocols used by fallible humans. We provide case studies of authentication protocols that show how different protocol constructions and features differ in their effectiveness with respect to different kinds of human errors. This provides a starting point for a fine-grained classification of security protocols from a usable-security perspective.(Joint work with Sasa Radomirovic and Lara Schmid)


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Keynote 2: Thrifty Zero-Knowledge: When linear programming Meets Cryptography

Speaker: Prof. David Naccache, ENS, France

Chair: Peter Mueller, IBM Zurich Research, Switzerland

08:30-09:30, November 17, 2016 (Thursday)

 

About the Keynote Speaker

 

Prof. David Naccache heads the ENS Information Security Group. His research areas are code security, forensics, the automated and the manual detection of vulnerabilities. Before joining ENS Paris (PSL) he was a professor during 10 years at UP2 (Sorbonne Universités). He previously worked for 15 years for Gemplus (now Gemalto), Philips (now Oberthur) and Thomson (now Technicolor). He studied at UP13 (BSc), UP6 (MSc), IMAC (Eng), TPT (PhD), UP7 (HDR), IHEDN and ICP (STB underway). He is a forensic expert by several courts, a member of OSCP and the incumbant of the Law and IT forensics chair at EOGN.

 

 

 

 

 

 

Summary:

We introduce “thrifty” zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge sent by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this approach on several well-known zero-knowledge protocols.

 


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Talk 1: Let's Get Physical: Protocols for the Internet of Things

Speaker: Prof. David Basin, ETH Zurich, Switzerland

Chair: Guilin Wang, Huawei International, Singapore

08:30-09:05, November 18, 2016 (Friday)

 

About the Invited Speaker

 

Prof. David Basin is a full professor of Computer Science at ETH Zurich. He received his Ph.D. in Computer Science from Cornell University in 1989 and his Habilitation in Computer Science from the University of Saarbrucken in 1996. From 1997–2002 he held the chair of Software Engineering at the University of Freiburg in Germany. His research areas are Information Security and Software Engineering. He is the founding director of the ZISC, the Zurich Information Security Center, which he led from 2003-2011. He is Editor-in-Chief of the ACM Transactions on Privacy and Security and of Springer-Verlag's book series on Information Security and Cryptography. He serves on various management and scientific advisory boards and has consulted extensively for IT companies and government organizations.

 

 

 

 

Summary:

The Internet of Things seeks to network physical objects with each other. These networked objects not only have an logical identity, but they are part of the physical world.  What kinds of protocols are appropriate for reasoning about objects' physical properties and how might we secure them based on these properties? In this talk, we introduce the challenges involved and we briefly highlight two of our results in this space.  Namely, we introduce a formalism for reasoning about physical security protocols and we describe an integrated circuit for securely establishing upper-bounds on the distance between objects.


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Talk 2: Key Establishment for IoT Applications

Speaker: Prof. Yang Xiang, Deakin University, Australia

Chair: Guilin Wang, Huawei International, Singapore

09:05-09:40, November 18, 2016 (Friday)

 

About the Invited Speaker

 

Prof. Yang Xiang received his PhD in Computer Science from Deakin University, Australia. He is currently the Director of Centre for Cyber Security Research at Deakin University. His research interests include network and system security, distributed systems, and data analytics. He has published more than 200 research papers in international journals and conferences, such as IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Security and Forensics, and IEEE Transactions on Dependable and Secure Computing. He serves as the Associate Editor of IEEE Transactions on Computers, Security and Communication Networks (Wiley), and the Editor of Journal of Network and Computer Applications (Elsevier). He is a Senior Member of the IEEE.

 

 

 

 

 

Summary:

By 2020, more than 30 billion devices will be wirelessly connected to the Internet of Things (IoT). As these devices become more integrated in our everyday lives, cryptographic keys need to be established to protect end users from malicious attacks. Most of the current key establishment protocols are designed based on certain secret sharing assumption, such as passwords (in the password authentication key exchange protocols), pre-shared secrets (in the key pre-distribution protocols), or certificates (in the public key infrastructure). In many applications, it is not practical to assume that the devices are pre-loaded with certain secrets as they are manufactured by different companies. Recently, there is an increasing interest in extracting secret bits from the wireless fading channel. However, some issues still remain unsatisfactory. For instance, the key generation rate needs to be improved and a dynamic environment is needed to provide sufficient entropy. Motivated by these observations, we present “Password Authenticated Key Exchange Protocols” (2PAKE and GPAKE) without the password sharing assumption. These protocols are cross-layer designs, and they are designed by employing the characteristics of the physical layer and higher layers corporately.  Specifically, in these protocols, devices extract short passwords at the physical layer. Then, they can establish secret keys (2PAKE) and group keys (GPAKE) at higher layers. Besides, we present “An Over-the-Air Key Establishment Protocol Using Keyless Cryptography” without the secret sharing assumption. Specifically, two devices can establish a secret key by directly sending random signals to each other.


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Talk 3: Privacy-Preserving Deep Learning in Cloud Computing and IoT

Speaker: Prof. Jin Li, Guangzhou University, China

Chair: Guilin Wang, Huawei International, Singapore

09:40-10:15, November 18, 2016 (Friday)

 

About the Invited Speaker

 

Prof. Jin Li is a professor at Guangzhou University. His research interests include design of secure protocols in cloud computing, cryptography, and machine learning. He served as a senior research associate at Korea Advanced Institute of Technology (Korea), Virginia Tech (USA), and Illinois Institute of Technology (USA). He has published more than 100 papers in international conferences and journals, including IEEE INFOCOM, IEEE Transaction on Parallel and Distributed Computation, IEEE Transactions on Computers, IEEE Transactions on Cloud Computing and ESORICS etc. His work has been cited more than 5000 times at Google Scholar and the H-Index is 28.

      He served as program chairs and committee for many international conferences such as CSE 2017, ISICA 2015, 3PGCIC20 14, ICCCN and CloudCom etc. He received two National Science Foundation of China (NSFC) Grants for his research on Security and Privacy in Cloud Computing. He is PI for more than 15 funding. He has been selected as one of science and technology new stars in Guangzhou and outstanding young scholar in Guangdong province.

 

 

Summary:

Deep learning has been applied widely for classifying and recognizing complex data. However, security and privacy issues arise when the computing and data storage services from IoT and individuals are outsourced in the cloud computing. When the data are sensitive and the data evaluators are not fully trusted, the data have to be encrypted and traditional methods cannot be utilized to process the data. In this talk, I will introduce some basic solutions and challenges in this topic. Finally, I will show our method to solve this problem.


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Talk 4: ARMv8 Shellcodes from ‘A’ to ‘Z’

Speaker: Prof. David Naccache, ENS, France

Chair: Robert Deng, Singapore Management University, Singapore

10:45-11:20, November 18, 2016 (Friday)

 

About the Invited Speaker

 

Prof. David Naccache heads the ENS Information Security Group. His research areas are code security, forensics, the automated and the manual detection of vulnerabilities. Before joining ENS Paris (PSL) he was a professor during 10 years at UP2 (Sorbonne Universités). He previously worked for 15 years for Gemplus (now Gemalto), Philips (now Oberthur) and Thomson (now Technicolor). He studied at UP13 (BSc), UP6 (MSc), IMAC (Eng), TPT (PhD), UP7 (HDR), IHEDN and ICP (STB underway). He is a forensic expert by several courts, a member of OSCP and the incumbant of the Law and IT forensics chair at EOGN.

 

 

 

 

 

 

Summary:

We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered devices such as smartphones.


 

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Talk 5: IoT Security Overview from Industry: Threats, Challenges, and Key Technologies

Speaker: Dr. Tieyan Li and Dr. Guilin Wang, Huawei International, Singapore

Chair: Robert Deng, Singapore Management University, Singapore

11:20-11:55, November 18, 2016 (Friday)

 

About the Invited Speakers

Dr. Tieyan Li is an expert on security and applied cryptography, and a technology generalist on applications, systems and networks. He is currently doing research on mobile/IoT security at Shield Lab., Central Research Institute, Huawei Technologies. Dr. Li received his Ph.D. Degree in Computer Science from National University of Singapore. From that on, he was a security scientist at Institute for Infocomm Research, I2R Singapore. Dr. Li is proficient in security design, architect, innovation and practical development. He was also active both in academic security fields with more than 80 journal/conference publications/book chapters, and industrial fields with more than 10 patents. His recent research interests include Mobile/Cloud/IoT Security and Applied Cryptography. Dr. Li has served as the PC members and reviewers for many security conferences, workshops and journals. He is a senior advisor for startups and an influential speaker in industrial security forums/summits.

 

 

 

 

 

Dr. Guilin Wang is a senior researcher with Huawei International Pte Ltd, Singapore and focuses his research on the IoT/M2M security and privacy in the background of telecommunication. Before joining Huawei in Sept of 2013, he was a senior lecturer in the University of Wollongong (UoW), Australia; a lecturer in the University of Birmingham, UK, and a research scientist in the Institute for Infocomm Research (I2R), Singapore. And before this, he was an assistant research professor at the Institute of Software, Chinese Academy of Sciences (CAS), China, where he received his PhD degree in computer science in March 2001. His research interest is mainly in the area of applied cryptography and its applications, in particular, public key algorithms, security protocols, communication security and privacy. Up to know he has published over 100 research papers. In addition, he has served a program chair for six international security conferences, a guest editor of a number of international journals, and a program member of over 60 international security conferences or workshops.

 

 

 

 

Summary:

This talk first provides an overview of IoT security threats, and the security challenges. It is anticipated that trillions of IoT devices will be deployed in the next decade. IoT devices are typically low-cost (resource-constrained), massively deployed, automatically connected, and possibly work without monitoring, while they suppose to collect, process, and control large amount of sensitive information. We review recent security incidents of Smart home and connected car scenarios for illustrating the importance of security threats faced by IoT devices in different scenarios. Next, we explore a number of security and privacy challenges with IoT devices, in particular with smart home and connected car use cases. These resource-constrained devices demand lightweight cryptography for facilitating secure computations and communications. And in the near future decentralized Things may require autonomous trust establishment infrastructure to negotiate smart contracts and maintain business transactions, where blockchain technologies can play an important role. We present the strategies and approaches deployed to tackle the security challenges, and hopefully shed light on building secure smart home and connected car solutions.

 

 

 

SESSIONS AND PAPERS IN ISPEC 2016

The 12th International Conference on Information Security Practice and Experience (ISPEC 2016)

Session 1: Privacy Preserving, 10:50-12:30, November 16 (Wednesday), Room 2

Chair: Frank Jiang, University of Technology Sydney, Australia

A Privacy Preserving Source Verifiable Encryption Scheme

Zhongyuan Yao, Yi Mu and Guomin Yang

Privacy-preserving Mining of Association Rules for Horizontally Distributed Databases based on FP-tree

Yaoan Jin

Privacy-preserving Cloud Auditing with Multiple Uploaders

Ge Wu, Yi Mu, Willy Susilo and Fuchun Guo

Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol in Cloud Computing

Jingguo Bi and Jiayang Liu

 

 

Session 2: Symmetric-key Cryptoanalysis, 14:00-15:40, November 16 (Wednesday), Room 2

Chair: Tan Saw Chin, Multimedia University, Malaysia

Structural Evaluation for Simon-like designs

Huiling Zhang and Wenling Wu

Cryptanalysis of Midori128 Using Impossible Differential Techniques

Zhan Chen and Xiaoyun Wang

Collision Attacks on CAESAR Second-Round Candidate: ELmD

Jian Zhang and Wenling Wu

Security of SM4 Against (Related-Key) Differential Analysis

Jian Zhang and Wenling Wu

 

 

Session 3: Tag and RFID security, 16:10-17:25, November 16 (Wednesday), Room 2

Chair: Qiang Zhang, Central South University, China

Efficient Tag Path Authentication Protocol with Less Tag Memory

Hongbing Wang, Yingjiu Li, Zongyang Zhang and Yunlei Zhao

RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits

Lukasz KrzywieckiPrzemysław Błaśkiewicz and Piotr Syga

Physical-layer Identification of HF RFID Cards Based on RF Fingerprinting

Guozhu Zhang, Luning Xia, Shijie Jia and Yafei Ji

 

 

Session 4: Finance security, 09:30-10:20, November 17 (Thursday), Room 2

Chair: Yinglong Dai, Central South University, China

Anonymizing Bitcoin Transaction

Dimaz Ankaa Wijaya, Ron Steinfeld, Joseph Liu, Shi-Feng Sun and Xinyi Huang

KopperCoin - A Distributed File Storage with Financial Incentives

Henning Kopp, Christoph Bösch and Frank Kargl

 

 

Session 5: Security design, 10:50-12:30, November 17 (Thursday), Room 2

Chair: Zhiniang Peng, South China University of Technology, China

Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network

Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi and Jorge Cobb

Authenticated CAN Communications Using Standardized Cryptographic Techniques

Zhuo Wei, Yanjiang Yang and Tieyan Li

The Distribution of 2n-Periodic Binary Sequences with Fixed k-Error Linear Complexity

Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu

Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU

Zhiniang Peng, Shaohua Tang, Ju Chen and Chen Wu

 

 

Session 6: Public key scheme, 14:00-15:15, November 17 (Thursday), Room 2

Chair: Shaobo Zhang, Central South University, China

Practical Signature Scheme From Gamma-Protocol

Zhoujun Ma and Yunlei Zhao

A Formal Concept of Domain Pseudonymous Signatures

Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski

Homomorphically Encrypted Arithmetic Operations over the Integer Ring

Chen Xu, Jingwei Chen, Wenyuan Wu and Yong Feng

 

 

Session 7: Detection & Monitoring, 15:40-16:55, November 17 (Thursday), Room 2

Chair: Lei Zhou, Central South University, China

An Spark-Based DDoS attack detection model in cloud services

Jian Zhang, Yawei Zhang, Pin Liu and Jianbiao He

A Host-Based Detection Method of Remote Access Trojan in the Early Stage

Daichi Adachi and Kazumasa Omote

Masking Algorithm for Multiple Crosstalk Attack Source Identification under Greedy Sparse Monitoring

H. W. Siew, S. C. Tan and C. K. Lee

 

 

Session 8: Security Primitives for IoT, 08:30-10:15, November 18 (Friday), Room 2

Chair: Guilin Wang, Huawei International, Singapore

Let's Get Physical: Protocols for the Internet of Things

Prof. David Basin, ETH Zurich, Switzerland

Key Establishment for IoT Applications

Prof. Yang Xiang, Deakin University, Australia

Privacy-Preserving Deep Learning in Cloud Computing and IoT

Prof. Jin Li, Guangzhou University, China

 

 

Session 9: IoT Security Chanllenges, 10:45-11:55, November 18 (Friday), Room 2

Chair: Robert Deng, Singapore Management University, Singapore

ARMv8 Shellcodes from ‘A’ to ‘Z’     

David Naccache, ENS, France

IoT Security Overview from Industry: Threats, Challenges, and Key Technologies

Dr. Tieyan Li and Dr. Guilin Wang, Huawei International, Singapore


 

Map of Conference Venue

 

Zhangjiajie International Hotel, Zhangjiajie, China - A Quasi Five-Star Hotel

(张家界国际大酒店)

Address: 145 Sanjiao Ping, Zhangjiajie, Hunan, China

http://www.zjjihotel.com/

 

 

Public Transportation

 

(1) From Zhangjiajie Hehua Airport (also called Dayong Airport, IATA code: DYG) to Zhangjiajie International Hotel: Take a taxi (around RMB40); or first take a bus #4 (get off at BIANMAO station), then take a bus #2 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

 

张家界荷花国际机场到张家界国际大酒店:大约8公里,乘坐4路公交车到边贸,再转乘2路公交车到三角坪,再步行600米到酒店,或乘坐的士(约40元);返程类似。

 

(2) From Zhangjiajie Railway Station to Zhangjiajie International Hotel: Take a taxi (around RMB35-40); or take a bus #6 (get off at SANJIAOPING station), then walk around 600m to the hotel; Similar for the return trip.

 

张家界火车站到张家界国际大酒店:大约10公里,乘坐6路公交车到三角坪,再步行600米到酒店,或乘坐的士(约35-40元);返程类似。


 

ISPEC 2016 Sponsors and Organizers