Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973) 11th International Conference on Information Security Practice and Experience (ISPEC2015) May 5-8, 2015 1 st floor, New Main Building, Beihang University, No. 37, Xueyuan Road, Haidian District, Beijing,100191 北航新主楼1层,北京市海淀区学院路37号, 邮编:100191 May 4 14:00-18:00 Registration 会议注册报到 May 5 08:30-18:00 Opening, Photo Shooting, Keynote (1), Paper Presentation (9) 开幕式、合影、大会学术报告 (1)、会议论文报告(9) May 6 08:30-17:30 Keynote (1), Paper Presentation (11) 大会学术报告 (1)、会议论文报告(11) 18:00-20:30 Banquet (Beijing Vision Hotel) 晚宴(北京唯实国际文化交流中心) May 7 08:30-18:00 Keynote (1), Paper Presentation (13) 大会学术报告 (1)、会议论文报告(13) May 8 08:30-12:30 Industrial Talk (1), Paper Presentation (5), Closing 工业界技术报告(1),会议论文报告 (5),会议结束 Sponsored by: 大会赞助商 Organized by: Institute of Computing, Beihang University 承办单位: 北京航空航天大学计算机学院
7
Embed
11th International Conference on Information Security ...trust.csu.edu.cn/conference/ispec2015/Program.pdf · 11th International Conference on Information Security Practice and Experience
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
11th International Conference on Information Security Practice and Experience
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
2015-05-07 (Day 3):Meeting Room 8 (第 8 报告厅)
Keynote 3: (Chair: Yongdng Wu)
8:30-9:30 Breaking Mobile Social Networks for Automated User Location
Prof. Kui Ren
Session 8: System Security (Chair: Qinghua Cao)
9:30-10:00 Operating System Security Policy Hardening via Capability Dependency Graphs Zhihui Han, Liang Cheng, Yang Zhang, and Dengguo Feng (page 1)
10:00-10:30 Expanding an Operating System’s Working Space with a New Mode to Support Trust Measurement Chenglong Wei, Wenchang Shi, Bo Qin, and Bin Liang
10:30-11:00 Coffee Break
Session 9: Mobile Security (Chair: Tieyan Li)
11:00-11:30 A Rapid and Scalable Method for Android Application Repackaging Detection
Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, and Dengguo Feng (page 349)
11:30-12:00 Comprehensive Analysis of the Android Google Play’s Auto-update Policy
Craig Sanders, Ayush Shah, and Shengzhi Zhang
12:00-12:30
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component
Communication
Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, and Zhiqiang Wang
12:30-14:00 Lunch(Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Session 10: Theory (Chair: Cheng-Kang Chu)
14:00-14:30 New Constructions of T-function
Dibyendu Roy, Ankita Chaturvedi, and Sourav Mukhopadhyay
14:30-15:00 A New Lattice-Based Threshold Attribute-Based Signature Scheme
Qingbin Wang, Shaozhen Chen, and Aijun Ge
15:00-15:30 Hard Invalidation of Electronic Signatures
Lucjan Hanzlik, Miroslaw Kutylowski, and Moti Yung
15:30-16:00 Coffee Break
Session 11: Implementation I (Chair: Kui Ren)
16:00-16:30 Lightweight Function Pointer Analysis
Wei Zhang and Yu Zhang
16:30-17:00 Accelerating RSA with Fine-Grained Parallelism Using GPU
Yang Yang, Zhi Guan, Huiping Sun, and Zhong Chen
17:00-17:30
On the Impacts of Mathematical Realization over Practical Security of Leakage
Resilient Cryptographic Schemes
Guangjun Fan, Yongbin Zhou, Fran cois-Xavier Standaert, and Dengguo Feng
17:30-18:00
Non-interactive Revocable Identity-Based Access Control over e-Healthcare
Records
Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, and Lei Zhang
18:00 Dinner(Canteen, Training Center of Beihang University) 北航培训中心餐厅
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)
2015-05-08 (Day 4):Meeting Room 8 (第 8 报告厅)
Industrial Talk: (Chair: Zhoujun Li)
8:30-9:30 Mobile Platform Security: Industrial Approaches on Building the Chain of Trust
Dr Tieyan Li
Session 12: Implementation II (Chair: Zhoujun Li)
9:30-10:00 Efficient File Sharing in Electronic Health Records
Clementine Gritti, Willy Susilo, and Thomas Plantard
10:00-10:30
A Framework for Analyzing Verifiability in Traditional and Electronic Exams
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade,
and Gabriele Lenzini
10:30-11:00 Coffee Break
Session 13: Privacy and Indistinguishability (Chair: Hua Guo)
11:00-11:30 ADKAM: A-Diversity K-Anonymity Model via Micro-aggregation
Liang Cheng, Shaoyin Cheng, and Fan Jiang
11:30-12:00 Visualizing Privacy Risks of Mobile Applications through a Privacy Meter
Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, and Jun Ho Huh
12:00-12:30 One-Round Witness Indistinguishability from Indistinguishability Obfuscation
Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, and Fei Tang
12:30-14:00 Lunch (Canteen, Training Center of Beihang University) 北航培训中心餐厅午餐
Closing 会议结束
Contact: Zhoujun Li (Mobile: 13910520973) 联系人:李舟军 (手机:13910520973)