Program


November 23th, 2022

Time in UTC / GMT +8, Taiwan National Standard Time.


08:30 - 09:00
  Reception

09:00 - 09:20
  Welcome Plenary

09:20 - 10:10
  Robert H. Deng
  Singapore Management University
  Nai-Wei Lo

10:10 - 10:30
  Morning Tea Break

10:30 - 12:10
  Paper Session : Blockchain
  Chi-Yuan Chen

August Lykke Thomsen, Bastian Preisel
Victor Rodrigues Andersen, Wei-Yang Chiu,
and Weizhi Meng
Designing Enhanced 6G Connection Strategy with Blockchain

Yi Zhang, Zhonghui Ge,
Yu Long, and Dawu Gu
UCC: Universal and Committee-based Cross-chain Framework

Yi-Hsiu Lee, Zi-Yuan Liu
Raylin Tso, and Yi-Fan Tseng
Blockchain-based Self-sovereign Identity System with Attribute-based Issuance

Zheng Yao Ng, and Iftekhar Salam
Blockchain-based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data

12:10 - 13:20
  Luncheon

13:20 - 15:00
  Paper Session : Blockchain
  Wei-Yang (Wayne) Chiu

Yu-Chen Liao, Raylin Tso,
Zi-Yuan Liu, and Yi-Fan Tseng
Blockchain-based Confidential Payment System with Controllable Regulation

Bodi, Wei-Yang Chiu,
and Weizhi Meng
Towards Blockchain-enabled Intrusion Detection for Vehicular Navigation Map System

  Paper Session : Security for Critical Infrastructure
  Wei-Yang (Wayne) Chiu

Juan Christian da Silva Siqueira,
Luis Paulino, Alan Oliveira de Sa
A low-cost and cloud native solution for security orchestration, automation, and response

Md Rakibul Hasan Talukder,
Md Al Amin, and Indrajit Ray
Protecting Cyber-Physical System Testbeds from Red-Teaming / Blue-Teaming Experiments Gone Awry.

15:00 - 15:20
  Coffee Break

15:20 - 17:00
  Paper Session : IoT Security
  Rafail Psiakis

Yinqin Huang, Cheng Dai,
and Wei-Che Chien
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems

Subir Halder, and Thomas Newe
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT

Pegah Nikbakht Bideh
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks

Kyusuk Han, Eiman Al Nuaimi,
Shamma Al Blooshi, Rafail Psiakis,
and Chan Yeob Yeun
New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment

18:00 -
  Welcome Dinner
Diamond Tony’s 101 Panorama

85F., No.7, Sec. 5, Xinyi Rd.
Xinyi Dist., Taipei City 110615

Diamond Tony’s 101 Panorama

Their advertising slogan--"We have food and liquor, but you need to bring your own women"-- is justified by the spectacular dishes they have to offer, including 18 cold dish appetizers, famously delicious pastas, plus steak and lamb chops that come with a choice of eight different sauces. For overflowing Italian passion and enthusiasm, Diamond Tony's is the place.

--From Taiwan Fun Magazine


We would like to remind you that, the transportation toward the welcome dinner is not included in the registration package.
If you liked to reach there from Taiwan Tech / NTUST:

By Bus


Keelung Rd. Metro Bus / [基隆路幹線]
Direction: MRT Taipei City Hall Sta. / [捷運市政府站]
Get off: Taipei City Hall (SongShou) / [市政府(松壽)]

By Metro


Find: Dansui Xinyi (Red) [R 淡水信義線] Line
Get off: [R03] Taipei 101–World Trade Center / [台北101/世貿]

Please show the Taxi Driver the following address in Chinese:

台北101 / 台北市信義區信義路五段7號



November 24th, 2022

Time in UTC / GMT +8, Taiwan National Standard Time.


08:30 - 09:00
  Reception

09:00 - 09:50
  Shiuhpyng Winston Shieh
  National Yang Ming Chiao Tung University
  Jia-Ning Luo

09:50 - 10:10
  Morning Tea Break

10:10 - 12:15
  Paper Session : Software Security
  Wei-Yang (Wayne) Chiu

Yuki Mezawa, and Mamoru Mimura
Evaluating the possibility of evasion attacks to machine learning-based models for malicious PowerShell detection

Silviu-Constantin Vitel, Marilena Lupascu,
Dragos Teodor Gavriluț,
and Henri Luchian
Detection of MSOffice-Embedded Malware : Feature Mining and Short- vs. Long-Term Performance

Gheorghe Balan, Dragos Teodor Gavriluț,
and Henri Luchian
Using API Calls for sequence-pattern feature mining-based malware detection

Koyel Pramanick, and Prasad Kulkarni
Detect Compiler Inserted Run-time Security Checks in Binary Software

Ha Xuan Son, Barbara Carminati,
and Elena Ferrari
PriApp-Install: learning user privacy preferences on mobile apps' installation

12:15 - 13:20
  Luncheon

13:20 - 14:10
  Shi-Cho Cha
  National Taiwan University of Science and Technology
  Chia-Mu Yu

14:10 - 14:30
  Coffee Break

14:30 - 16:35
  Paper Session : Network & Web Security
  Jheng-Jia Huang

Nguyen Huu Quyen Phan The Duy,
Nguyen Chi Vy, Do Thi Thu Hien,
Hau-Pham Van
Federated Instrusion Detection on Non-IID Data for IIoT networks using Generative Adversarial Networks and Reinforcement Learning

Orhan Ermis, Christophe Feltus,
Qiang Tang, Hoang Trang,
Alexandre De Oliveira, Cu Nguyen,
and Alain Hirtzig
A CNN-based Semi-Supervised Learning Approach for the Detection of SS7 Attacks

Xuan Ha Nguyen, Nguyen Xuan Duong,
and Kim-Hung Le
Preventing Adversarial Attacks against Deep Learning-based Intrusion Detection System

Jiang-Yi Zeng, Chi-Yuan Chen,
Hsin-Hung Cho
Detection of Adversarial Examples based on the Neurons Distribution

Elisa Chiapponi, Marc Dacier,
Olivier Thonnard, Mohamed Fangar,
and Vincent Rigal
BADPASS: Bots taking ADvantage of Proxy AS a Service

18:00 -
  Banquet
Shangri-La’s Far Eastern Plaza

No.201, Sec. 2, Dunhua S. Rd.
Da'an Dist., Taipei City 106056

Shangri-La's Far Eastern Plaza

If there is such a thing as a modern Grande Dame, this would be it. The Asian stories don't stop there though: statement pieces of oriental art and antiques pepper the public spaces and the hotel's gastro offerings include two Chinese fine-dining restaurants, a Japanese eatery by two-Michelin-starred chef Takagi Kazuo and 'Café at Far Eastern' - a sprawling Asian-style buffet dining room.

--From Outthere Travel Magazine


We would like to remind you that, the transportation toward the Conference Banquet is not included in the registration package.
If you liked to reach there from Taiwan Tech / NTUST:

By Bus


275
Direction: Taipei Songshan Airport / [松山機場]
Get off: Chenggong Public Housing / [成功國宅]

By Metro


Find: Wenhu (Brown) [BR 文湖線] Line
Get off: [BR30] Technology Building / [科技大樓]

Please show the Taxi Driver the following address in Chinese:

台北遠東香格里拉 / 台北市大安區敦化南路二段201號



November 25th, 2022

Time in UTC / GMT +8, Taiwan National Standard Time.


08:30 - 09:00
  Reception

09:00 - 09:50
  Minoru Hanamura
  Microsoft
  Chunhua Su

09:50 - 10:10
  Morning Tea Break

10:10 - 12:15
  Paper Session : Authentication & Biometric Security
  Hsin-Hung Cho

Martin Georgiev, Simon Eberz,
and Ivan Martinovic
Techniques for Continuous Touch-Based Authentication

George Tasopoulos, Jinhui Li,
Apostolos Fournaris, Raymond Zhao,
Amin Sakzad, and Ron Steinfeld
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems

Sławomir Matelski
Universal Key to Authentication Authority with Human-Computable OTP Generator

Yuxiao Luo, Jianwei Tai,
Xiaoqi Jia, and Shengzhi Zhang
Practical Backdoor Attack against Speaker Recognition

Guiwen Fu, Yanan Chen,
Zhen Wu, and Qianlin Ye
Anonymous Authentication Protocols in Vehicular Ad-Hoc Network - A Survey

12:15 - 13:20
  Luncheon

13:20 - 15:00
  Paper Session : Applied Cryptography (I)
  Wei-Che Chien

George Teseleanu, and Paul Cotan
Continued Fractions Applied to a Family of RSA-like Cryptosystems

George Teseleanu
Sherlock Holmes Zero-Knowledge Protocol

Yuichi Komano, and Takaaki Mizuki
Physical Zero-knowledge Proof Protocol for Topswops

Nasratullah Ghafoori, and Atsuko Miyaji
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of Probabilistic Neutral Bits

15:00 - 15:20
  Coffee Break

15:20 - 17:00
  Paper Session : Cryptography (II)
  Fan-Hsun Tseng

Maharage Nisansala Sevwandi Perera,
Toru Nakamura, Takashi Matsunaka,
Hiroyuki Yokoyama, and Kouichi Sakurai
Attribute-based Tracing for Securing Group Signatures against Centralized Authorities

Yen-Kang Fu, Jonathan Chang,
and David Jao
Optimal generic attack against basic Boneh-Boyen signatures

Jiaming Yuan, Yinhjiu Li,
Jianting Ning, and Robert H. Deng
Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption

Yang Zhao, ZhaoZhong Liu,
Jingmin An, Guobin Zhu,
and Saru Kumari
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios

17:00 - 17:15
  Closing Ceremony


Sławomir Matelski
Universal Key to Authentication Authority with Human-Computable OTP Generator

George Teseleanu, and Paul Cotan
Continued Fractions Applied to a Family of RSA-like Cryptosystems

Yu-Chen Liao, Rayliln Tso,
Zi-Yuan Liu, and Yi-Fan Tseng
Blockchain-based Confidential Payment System with Controllable Regulation

Yuki Mezawa, and Mamoru Mimura
Evaluating the possibility of evasion attacks to machine learning-based models for malicious PowerShell detection

Yuichi Komano, and Takaaki Mizuki
Physical Zero-knowledge Proof Protocol for Topswops

George Teseleanu
Sherlock Holmes Zero-Knowledge Protocols

Martin Georgiev, Simon Eberz,
and Ivan Martinovic
Techniques for Continuous Touch-Based Authentication

Xuan Ha Nguyen, Nguyen Xuan Duong,
and Kim-Hung Le
Preventing Adversarial Attacks against Deep Learning-based Intrusion Detection System

August Lykke Thomsen, Bastian Preisel,
Victor Rodrigues Andersen, Wei-Yang Chiu,
and Weizhi Meng
Designing Enhanced 6G Connection Strategy with Blockchain

Pegah Nikbakht Bideh
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks

Nasratullah Ghafoori, and Atsuko Miyaji
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of Probabilistic Neutral Bits

Jiaming Yuan, Yingjiu Li,
Jianting Ning, and Robert H. Deng
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption

Quyen Nguyen Huu, Duy Phan The,
Vy Nguyen Chi, Hien Do Thi Thu,
and Hau Pham Van
Federated Intrusion Detection on Non-IID Data for IIoT networks using Generative Adversarial Networks and Reinforcement Learning

Md Rakibul Hasan Talukder,
Md Al Amin, and Indrajit Ray
Protecting Cyber-Physical System Testbeds from Red-Teaming / Blue-Teaming Experiments Gone Awry

Silviu-Constantin Vițel, Marilena Lupașcu,
Dragoș Teodor Gavriluț, and Henri Luchian
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance

Zheng Yao Ng, and Iftekhar Salam
Blockchain-based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data

Juan Christian da Silva Siqueira,
and Luis Paulino and Alan Oliveira de Sá
A low-cost and cloud native solution for security orchestration, automation, and response

Gheorghe Balan, Dragos Teodor Gavrilut,
and Henri Luchian
Using API Calls for sequence-pattern feature mining-based malware detection

Koyel Pramanick, and Prasad Kulkarni
Detect Compiler Inserted Run-time Security Checks in Binary Software

Subir Halder, and Thomas Newe
Robust Anomaly Detection via Radio Fingerprinting LoRa-Enabled IIoT

Yinqin Huang, Cheng Dai,
and Wei-Che Chien
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems

Orhan Ermis, Christophe Feltus,
Qiang Tang, Hoang Trang,
Alexandre De Oliveira, Cu Nguyen,
and Alain Hirtzig
A CNN-based Semi-Supervised Learning Approach for the Detection of SS7 Attacks

Bodi, Wei-Yang Chiu,
and Weizhi Meng
Towards Blockchain-enabled Intrusion Detection for Vehicular Navigation Map System

Kyusuk Han, Eiman Al Nuaimi,
Shamma Al Blooshi, Rafail Psiakis,
and Chan Yeob Yeun
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment

Yuxiao Luo, Jianwei Tai,
and Shengzhi Zhang
Practical Backdoor Attack against Speaker Recognition System

Yi-Hsiu Lee, Zi-Yuan Liu,
Raylin Tso, and Yi-Fan Tseng
Blockchain-based Self-sovereign Identity System with Attribute-based Issuance

Son Ha Xuan, Barbara Carminati,
and Elena Ferrari
PriApp-Install: learning user privacy preferences on mobile apps' installation

Yen-Kang Fu, Jonathan Chang,
and David Jao
Optimal generic attack against basic Boneh-Boyen signatures

Jiang-Yi Zeng, Chi-Yuan Chen,
and Hsin-Hung Cho
Detection of Adversarial Examples based on the Neurons Distribution

Maharage Nisansala Sevwandi Perera, Toru Nakamura,
Takashi Matsunaka, Hiroyuki Yokoyama,
and Kouichi Sakurai
Attribute based Tracing for Securing Group Signatures against Centralized Authorities

Yi Zhang, Zhonghui Ge,
Ze Long, and Dawu Gu
UCC: Universal and Commitee-based Cross-chain Framework

George Tasopoulos, Jinhui Li,
Apostolos Fournaris, Raymond Zhao,
Amin Sakzad, and Ron Steinfeld
Performance Evaluatiion of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems

Elisa Chiapponi, Marc Dacier,
Olivier Thonnard, Mohamed Fanger,
and Vincent Rigal
BADPASS: Bots taking ADvantage of Proxy AS a Service


Last Page Update : 22. Nov., 2022 08:12 +8:00