Conference Schedule
Conference Details :
- Sunday (18 December 2022) : Registration and Welcome Reception
- Monday – Wednesday (19–21 December 2022) : Conference’s Sessions
- Thursday (22 December 2022) : Island Tour (optional)
Conference Date : 19 – 21 December 2022 (dates may differ in your timezone)
If the times seem inconvenient, keep in mind that this is an international conference with a Bali, INDONESIA-centric schedule.
Summary of Program
Mon. 19 Dec 2022 (Day 1) |
|||
Time (UTC+8) |
Detail |
Time (Your Timezone ) |
|
09:00 - 09:15 |
Opening |
|
|
09:15 - 10:15 |
Keynote Speech I: Prof. Robert H. Deng |
|
|
10:15 - 10:30 |
Coffee break |
|
|
10:30 - 11:20 |
Cryptography I |
|
|
11:20 - 12:10 |
Blockchain I |
|
|
12:10 - 14:00 |
Lunch |
|
|
14:00 - 15:00 |
Keynote Speech II: Prof. Yang Xiang |
|
|
15:00 - 15:50 |
Post-Quantum Cryptography I |
|
|
15:50 - 16:05 |
Coffee break |
|
|
16:05 - 17:20 |
Cryptanalysis |
|
|
Tue. 20 Dec 2022 (Day 2) |
|||
9:00 - 10:00 |
Keynote Speech III: Dr. Fuchun Guo |
|
|
10:00 - 10:15 |
Coffee break |
|
|
10:15 - 11:05 |
Cryptography II |
|
|
11:05 - 11:55 |
Malware I |
|
|
11:55 - 14:00 |
Lunch |
|
|
14:00 - 15:15 |
Blockchain II |
|
|
15:15 - 15:30 |
Coffee break |
|
|
15:30 - 16:45 |
AI Security I |
|
|
18:30 - 21:00 |
Gala Dinner |
|
|
Wed. 21 Dec 2022 (Day 3) |
|||
09:00 - 10:00 |
Keynote Speech IV: Dr Yannan Li |
|
|
10:00 - 10:15 |
Coffee break |
|
|
10:15 - 11:05 |
Post-Quantum Cryptography II |
|
|
11:05 - 11:30 |
AI Security II |
|
|
11:30 - 11:55 |
Email and Web Security I |
|
|
11:55 - 14:00 |
Lunch |
|
|
14:00 - 15:00 |
Keynote Speech V: Dr Peng Jiang |
|
|
15:00 - 15:50 |
AI Security III |
|
|
15:50 - 16:05 |
Coffee break |
|
|
16:05 - 17:20 |
Malware II |
|
|
17:20 - 17:45 |
Email and Web Security II |
|
|
17:45 - 17:50 |
Closing Ceremony and Remarks |
|
|
Thu. 22 Dec 2022 (Day 4) |
|||
09:00 - 17:00 |
Island Tour (Optional) |
|
Detailed of Program
Mon. 19 Dec 2022 (Day 1) |
|||
Time (UTC+8) |
Detail |
Time (Your Timezone ) |
|
09:00 - 09:15 |
Opening |
|
|
09:15 - 10:15 |
Keynote Speech I: Prof. Robert H. Deng |
|
|
10:15 - 10:30 |
Coffee break |
|
|
10:30 - 11:20 |
Cryptography I |
|
|
10:30 - 10:55 |
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs |
Yongge Wang and Qutaibah M. Malluhi |
|
10:55 - 11:20 |
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting |
Hanyu Li and Ying Gao |
|
11:20 - 12:10 |
Blockchain I |
|
|
11:20 - 11:45 |
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps |
Binbin Tu, Min Zhang, Chen Yu |
|
11:45 - 12:10 |
Daric: A Storage Efficient Payment Channel With Punishment Mechanism |
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld |
|
12:10 - 14:00 |
Lunch |
|
|
14:00 - 15:00 |
Keynote Speech II: Prof. Yang Xiang |
|
|
15:00 - 15:50 |
Post-Quantum Cryptography I |
|
|
15:00 - 15:25 |
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model |
Kyoichi Asano, Keita Emura, Atsushi Takayasu |
|
15:25- 15:50 |
Batched Fully Homomorphic Encryption from TFHE |
Yuting Jiang, Jianghong Wei |
|
15:50 - 16:05 |
Coffee break |
|
|
16:05 - 17:20 |
Cryptanalysis |
|
|
16:05 - 16:30 |
Further Cryptanalysis of a Type of RSA Variants |
Gongyu Shi, Geng Wang, Dawu Gu |
|
16:30 - 16:55 |
The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 |
Yingying Li, Qichun Wang |
|
16:55 - 17:20 |
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation |
Xiuxiu Li, Wei Yu, Kunpeng Wang |
|
Tue. 20 Dec 2022 (Day 2) |
|||
9:00 - 10:00 |
Keynote Speech III: Dr. Fuchun Guo |
|
|
10:00 - 10:15 |
Coffee break |
|
|
10:15 - 11:05 |
Cryptography II |
|
|
10:15 - 10:40 |
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files |
Mark Yampolskiy, Lynne Graves, Jacob Gatlin, J. Todd McDonald, Moti Yung |
|
10:40 - 11:05 |
Witness Encryption from Smooth Projective Hashing System |
Yuzhu Wang, Mingwu Zhang |
|
11:05 - 11:55 |
Malware I |
|
|
11:05 - 11:30 |
Dissecting Applications Uninstallers & Removers: Are they effective? |
Marcus Botacin and Andr´e Gr´egio |
|
11:30 - 11:55 |
Why we need a theory of maliciousness: Hardware Performance Counters in security |
Marcus Botacin and Andr´e Gr´egio |
|
11:55 - 14:00 |
Lunch |
|
|
14:00 - 15:15 |
Blockchain II |
|
|
14:00 - 14:25 |
Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization |
Jianzhang Chen, Haibo Tian, Fangguo Zhang |
|
14:25 - 14:50 |
GRUZ : Practical Resource Fair Exchange without Blockchain |
Yongqing Xu, Kaiyi Zhang, Yu Yu |
|
14:50 - 15:15 |
A Blockchain-based Mutual Authentication Protocol for Smart Home |
Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang, Tao Xiang |
|
15:15 - 15:30 |
Coffee break |
|
|
15:30 - 16:45 |
AI Security I |
|
|
15:30 - 15:55 |
AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition |
Shaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen |
|
15:55 - 16:20 |
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud |
Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui |
|
16:20 - 16:45 |
Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64 |
Lijun Lyu, Yi Tu, Yingjie Zhang |
|
18:30 - 21:00 |
Gala Dinner |
|
|
Wed. 21 Dec 2022 (Day 3) |
|||
09:00 - 10:00 |
Keynote Speech IV: Dr Yannan Li |
|
|
10:00 - 10:15 |
Coffee break |
|
|
10:15 - 11:05 |
Post-Quantum Cryptography II |
|
|
10:15 - 10:40 |
QUIC Protocol with Post-Quantum Authentication |
Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang |
|
10:40 - 11:05 |
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization |
Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li |
|
11:05 - 11:30 |
AI Security II |
|
|
11:05 - 11:30 |
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing |
Shijin Chen, Mingwu Zhang, Bo Yang |
|
11:30 - 11:55 |
Email and Web Security I |
|
|
11:30 - 11:55 |
OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control |
Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph Liu, Surya Nepal |
|
11:55 - 14:00 |
Lunch |
|
|
14:00 - 15:00 |
Keynote Speech V: Dr Peng Jiang |
|
|
15:00 - 15:50 |
AI Security III |
|
|
15:00 - 15:25 |
CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks |
Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin |
|
15:25 - 15:50 |
Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing |
Di Xiao, Xue Tan, Min Li |
|
15:50 - 16:05 |
Coffee break |
|
|
16:05 - 17:20 |
Malware II |
|
|
16:05 - 16:30 |
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence |
Yan Lin Aung, Martín Ochoa, Jianying Zhou |
|
16:30 - 16:55 |
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay |
Runhao Liu, Bo Yu, Baosheng Wang, and Jianbin Ye |
|
16:55 - 17:20 |
Representing LLVM-IR in a Code Property Graph |
Alexander Küchler, Christian Banse |
|
17:20 - 17:45 |
Email and Web Security II |
|
|
17:20 - 17:45 |
EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries |
Almuthanna Alageel, Sergio Maffeis |
|
17:45 - 17:50 |
Closing Ceremony and Remarks |
|
|
Thu. 22 Dec 2022 (Day 4) |
|||
09:00 - 17:00 |
Island Tour (Optional) |
|