Day 0, Sunday, 19.06.2016 | |
18:00 - 20:00 | Welcome Reception |
Rik Medlik Building [MS], University of Surrey | |
Day 1, Monday, 20.06.2016 | |
08:30 - 08:50 | Registration (with tea/coffee/biscuits) |
08:50 - 09:00 | Opening remarks |
09:00 - 11:05 | Session I: Authentication and Key Exchange Session Chair: Steve Schneider |
On the Security of the Algebraic Eraser Tag Authentication Protocol Simon R. Blackburn (Royal Holloway, University of London, UK) and M.J.B. Robshaw (Impinj, USA) A Cryptographic Analysis of UMTS/LTE AKA Stephanie Alt (DGA Bruz, France), Pierre-Alain Fouque (IRISA, University of Rennes1, France), Gilles Macario-rat (Orange Labs, France), Cristina Onete (INSA IRISA Rennes, France), and Benjamin Richard (Orange Labs, France) Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg (University of Waterloo, Canada), Graeme Jenkinson (University of Cambridge, UK), and Frank Stajano (University of Cambridge, UK) Two More Efficient Variants of the J-PAKE Protocol Jean Lancrenon, Marjan Skrobot, and Qiang Tang (all SnT, University of Luxembourg) Hash-based TPM Signatures for the Quantum World Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo (all MITRE, USA), and John Scire (Stevens Institute of Technology, USA) | |
11:05 - 11:35 | Coffee break |
11:35 - 12:35 | Invited Talk Session Chair: Ahmad-Reza Sadeghi |
Secure Positioning: From GPS to IoT Srdjan Capkun (ETH Zurich, Switzerland) Abstract: In this talk I will review security issues in today’s navigation and close-range positioning systems. I will discuss why GNS systems like GPS are hard to fully secure and will present novel solutions that can be used to improve the robustness of GNS systems to attacks. I will then show how a different design of a positioning system can enable secure positioning, but also that this requires solving a set of relevant physical- and logical- layer challenges. Finally I will present a design and implementation of a fully integrated IR UWB secure distance measurement (distance bounding) system that solves these challenges and enables secure distance measurement and secure positioning in IoT applications. | |
12:35 - 14:00 | Lunch |
14:00 - 16:05 | Session II: Signatures with Advanced Properties Session Chair: Nuttapong Attrapadung |
Fuzzy Signatures: Relaxing Requirements and a New Construction Takahiro Matsuda (AIST, Japan), Kenta Takahashi (Hitachi Ltd, Japan), Takao Murakami, and Goichiro Hanaoka (both AIST, Japan) Foundations of Fully Dynamic Group Signatures Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadaffi, and Jens Groth (all University College London, UK) A Lattice-Based Group Signature Scheme with Message-Dependent Opening Benoît Libert, Fabrice Mouhartem (both ENS Lyon, France), and Khoa Nguyen (Nanyang Technological University, Singapore) Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro (City University of New York, USA), Steven Goldfeder, and Arvind Narayanan (both Princeton University, USA) Legally Fair Contract Signing Without Keystones Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, and David Pointcheval (all ENS Paris, France) | |
16:05 - 16:30 | Coffee break |
16:30 - 17:20 | Session III: DoS Attacks and Network Anomaly Detection Session Chair: Jianying Zhou |
Why Software DoS is Hard to Fix: Denying Access in Embedded Android Platforms Ryan Johnson, Mohamed Elsabagh, and Angelos Stavrou (all George Mason University and Kryptowire, USA) Network Anomaly Detection using Unsupervised Feature Selection and Density Peak Clustering Xiejun Ni, Daojing He (both East China Normal University, China), Sammy Chan (City University of Hong Kong, China), and Farooq Ahmad (COMSATS Institute of Information Technology, Pakistan) | |
Day 2, Tuesday, 21.06.2016 | |
08:40 - 09:00 | Registration (with tea/coffee/biscuits) |
09:00 - 11:05 | Session IV: Deterministic and Functional Encryption Session Chair: Olivier Pereira |
More Efficient Constructions for Inner-Product Encryption Somindu C. Ramanna (ENS Lyon, France) Attribute Based Encryption with Direct Efficiency Tradeoff Nuttapong Attrapadung, Goichiro Hanaoka (both AIST, Japan), Tsutomu Matsumoto (Yokohama National University, Japan), Tadanori Teruya, and Shota Yamada (both AIST, Japan) Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions Xavier Boyen and Qinyi Li (both Queensland University of Technology, Australia) Offline Witness Encryption Hamza Abusalah (IST, Austria), Georg Fuchsbauer (Inria, ENS Paris, CNRS and PSL Research University, France), and Krzysztof Pietrzak (IST, Austria) Deterministic Public-Key Encryption under Continual Leakage Venkata Koppula (University of Texas at Austin, USA), Omkant Pandey (Drexel University, USA), Yannis Rouselakis (Microsoft Redmond, USA), and Brent Waters (University of Texas at Austin, USA) | |
11:05 - 11:35 | Coffee break |
11:35 - 12:35 | Invited Talk Session Chair: Mark Manulis |
Foundations of Hardware-based Attested Computation and Applications of SGX Bogdan Warinschi (Bristol University, UK) Abstract: Software Guard Extension (SGX) is a recently proposed technology that aims to provide trust in remote systems, even when these systems are under the control of a malicious entity. In this talk I will discuss ongoing work on understanding and formalizing "attested computation", the basic capability that SGX provides and will go over a couple of applications that employ it, notably secure outsourced computation and software licensing. | |
12:35 - 14:00 | Lunch |
14:00 - 16:05 | Session V: Computing on Encrypted Data Session Chair: Goichiro Hanaoka |
Better Preprocessing for Secure Multiparty Computation Carsten Baum, Ivan Damgard (both Aarhus University, Denmark), Tomas Toft (Danske Bank, Denmark), and Rasmus Zakarias (Aarhus University, Denmark) Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation Berry Schoenmakers (TU Eindhoven, Netherlands), Meilof Veeningen (Philips Research, Netherlands), and Niels de Vreede (TU Eindhoven, Netherlands) Verifiable Multi-Party Computation with Perfectly Private Audit Trail Edouard Cuvelier and Olivier Pereira (both Univeristé catholique de Louvain, Belgium) Practical Fault-Tolerant Data Aggregation Krzysztof Grining, Marek Klonowski, Piotr Syga (all Wrocław University of Technology, Poland) Accelerating Homomorphic Computations on Rational Numbers Angela Jäschke and Frederik Armknecht (both University of Mannheim, Germany) | |
16:05 - 16:30 | Coffee break |
16:30 - 17:20 | Session VI: Non-Interactive Proofs and PRFs Session Chair: Bogdan Warinschi |
New Techniques for Non-Interactive Shuffle and Range Arguments Alonso Gonzalez (Universidad de Chile, Chile) and Carla Rafols (Universitat Pompeu Fabra, Barcelona) Constrained PRFs for Unbounded Inputs with Short Keys Hamza Abusalah (IST Austria) and Georg Fuchsbauer (Inria, ENS Paris, CNRS and PSL Research University, France) | |
19:00 - 22:00 | Conference Dinner |
Guildford Harbour Hotel | |
Day 3, Wednesday, 22.06.2016 | |
08:40 - 09:00 | Registration (with tea/coffee/biscuits) |
09:00 - 11:05 | Session VII: Symmetric Ciphers Session Chair: Simon Blackburn |
Wide Trail Design Strategy for Binary MixColumns Yosuke Todo and Kazumaro Aoki (NTT Secure Platform Laboratories, Japan) Automatic Search of Linear Trails in ARX with applications to SPECK and Chaskey Yunwen Liu, Qingju Wang, and Vincent Rijmen (all KU Leuven, Belgium) Square Attack on 7-Round Kiasu-BC Christoph Dobraunig, Maria Eichlseder, and Florian Mendel (all Graz University of Technology, Austria) On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants Kota Kondo (Nagoya University, Japan), Yu Sasaki (NTT Secure Platform Laboratories, Japan), and Tetsu Iwata (Nagoya University, Japan) Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice Alex Biryukov, Daniel Dinu, and Johann Großschädl (SnT, University of Luxembourg) | |
11:05 - 11:35 | Coffee break |
11:35 - 12:50 | Session VIII: Cryptography in Software Session Chair: Athanasios Giannetsos |
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing Pierre Lestringant (AMOSSYS and Université de Rennes 1, France), Frédéric Guihéry (AMOSYS, France), and Pierre-Alain Fouque (Université de Rennes 1 and Institut Universitaire de France) Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, and Friedrich Wiemer (all Ruhr University Bochum, Germany) Memory carving in embedded devices: separate the wheat from the chaff Thomas Gougeon, Morgan Barbier, Patrick Lacharme (all Normandie Univ, ENSICAEN, UNICAEN, CNRS, France), Gildas Avoine (INSA Rennes and Institut Universitaire de France), and Christophe Rosenberger (Normandie Univ, ENSICAEN, UNICAEN, CNRS, France) | |
12:50 - 14:00 | Lunch |
14:00 - 15:15 | Session IX: Security for Human Use Session Chair: Cristina Onete |
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery Mauro Conti, Claudio Guarisco and Riccardo Spolaor (all University of Padua, Italy) TMGuard: A Touch Movement-based Security Mechanism for Screen Unlock Patterns on Smartphones Weizhi Meng (Institute for Infocomm Research, Singapore), Wenjuan Li (City University of Hong Kong), Duncan S. Wong (ASTRI, Hong Kong) and Jianying Zhou (Institute for Infocomm Research, Singapore) Gesture-based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case Jagmohan Chauhan (UNSW and Data61, Australia), Hassan Jameel Asghar, Anirban Mahanti, and Mohamed Ali Kaafar (all Data61, Australia) | |
15:15 - 16:40 | Coffee break |
16:40 | End |