TrustCom 2020 论文录用列表
2021-02-14 17:10:14 Author: mp.weixin.qq.com(查看原文) 阅读量:163 收藏

IEEE TrustCom 会议(全称 IEEE International Conference on Trust, Security and Privacy in Computing and Communications)IEEE国际计算和通信信任,安全和隐私学术会议,是中国计算机学会推荐国际学术会议的C类(CCF-C2020年共收到465篇论文, 共录取了130篇论文,录取率为27.9%,录用论文标题如下:

TT - Trust Track

  • Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency

Xuewei Feng (National Key Laboratory of Science and Technology on Information System Security, China), Dongxia Wang (National Key Laboratory of Science and Technology on Information System Security, China), Zhechao Lin (National Key Laboratory of Science and Technology on Information System Security, China), Xiaohui Kuang (National Key Laboratory of Science and Technology on Information System Security, China), and Gang Zhao (National Key Laboratory of Science and Technology on Information System Security, China)

  • Reversible Data Hiding Based on Improved Rhombus Predictor and Prediction Error Expansion

Xin Tang (University of International Relations, China), Linna Zhou (Beijing University of Posts and Telecommunications, China), Dan Liu (University of International Relations, China), Boyu Liu (University of International Relations, China), and Xinyi Lü (University of International Relations, China)

  • A Trust Routing Scheme Based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks

Dapeng Qu (Liaoning University, China), Jiankun Zhang (Liaoning University, China), Zhenhuan Hou (Liaoning University, China), Min Wang (Liaoning University, China), and Bo Dong (Liaoning University, China)

  • SeRoT: A Secure Runtime System on Trusted Execution Environments

Jingbin Liu (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Qin (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dengguo Feng (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

  • Robust Scheduling for Large-Scale Distributed Systems

Young Choon Lee (Macquarie University, Australia), Jayden King (Macquarie University, Australia), Young Ki Kim (The University of Sydney, Australia), and Seok-Hee Hong (The University of Sydney, Australia)

  • Adaptive Random Test Case Generation Based on Multi-objective Evolutionary Search

Chengying Mao (Jiangxi University of Finance and Economics, China), Linlin Wen (Jiangxi University of Finance and Economics, China), and Tsong Yueh Chen (Swinburne University of Technology, Australia)

  • Improving Efficiency of Key Enumeration Based on Side-Channel Analysis

Wei Yang (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science & Technology, China), Hailong Zhang (State Key Laboratory of Cryptology, China), and Chanying Huang (Nanjing University of Science & Technology, China)

  • Robust Spatial-Spread Deep Neural Image Watermarking

Marcin Plata (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland) and Piotr Syga (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland)

  • DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace

Xuan Son Ha (FPT University, Vietnam), Hai Trieu Le (Can Tho University of Technology, Vietnam), Nadia Metoui (University of Amsterdam, Netherlands), and Nghia Duong-Trung (FPT University, Vietnam)

  • Modeling and Analysis of RabbitMQ Using UPPAAL

Ran Li (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jiaqi Yin (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), and Huibiao Zhu (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)

User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain Xiaohu Zhou (Birmingham City University, UK), Vitor Jesus (Birmingham City University, UK), Yonghao Wang (Birmingham City University, UK), and Mark Josephs (Birmingham City University, UK)

  • A Unified Host-Based Intrusion Detection Framework using Spark in Cloud

Ming Liu (Shanghai Jiao Tong University, China), Zhi Xue (Shanghai Jiao Tong University, China), and Xiangjian (Sean) He (University of Technology Sydney, Australia)

  • TA-HRT: A Temperature-Aware Scheduler for Heterogeneous Real-Time Multicore Systems

Yanshul Sharma (IIIT Guwahati, India), Zinea Das (IIIT Guwahati, India), Alok Das (IIIT Guwahati, India), and Sanjay Moulik (IIIT Guwahati, India)

  • Reducing the Price of Protection: Identifying and Migrating Non-sensitive Code in TEE

Yin Liu (Software Innovations Lab, Virginia Tech) and Eli Tilevich (Software Innovations Lab, Virginia Tech)

  • Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning

Wentao Xie (University of Chinese Academy of Sciences, China) and Peng Wu (University of Chinese Academy of Sciences, China)

ST - Security Track

  • Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

Isaac Matthews (Newcastle University, U.K.), John Mace (Newcastle University, U.K.), Sadegh Soudjani (Newcastle University, U.K.), and Aad van Moorsel (Newcastle University, U.K.)

  • Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency

Qi Feng (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Debiao He (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Min Luo (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Zengxiang Li (Digital Research Institute, ENN Group, China), and Kim-Kwang Raymond Choo (University of Texas at San Antonio, China)

  • Password Policies vs. Usability: When Do Users Go "Bananas"?

Roberto Dillon (James Cook University Singapore), Shailey Chawla (James Cook University Singapore), Dayana Hristova (Cognitive Science Hub, University of Vienna, Austria), Barbara Göbl (Research Group Entertainment Computing, University of Vienna, Austria), and Suzana Jovicic (University of Vienna, Austria)

  • Malware Classification on Imbalanced Data through Self-Attention

Yu Ding (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), ShuPeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Jian Xing (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China Xinjiang Branch, China), XiaoYu Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), ZiSen Qi (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), Ge Fu (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), Qian Qiang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China, China), HaoLiang Sun (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), and JianYu Zhang (Changan Communication Technology Co., LTD., China)

  • Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection

Ning Zhang (Institute of Information Engineering, CAS, China; University of Chinese Academy of Sciences, China), Zhiqiang Lv (Institute of Information Engineering, Chinese Academy of Sciences, China), Yanlin Zhang (University of Chinese Academy of Sciences, China), Haiyang Li (University of Chinese Academy of Sciences, China), Yixin Zhang (University of Chinese Academy of Sciences, China), and Weiqing Huang (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • TRUVIN: Lightweight Detection of Data Oriented Attacks Through Trusted Value Integrity

Munir Geden (University of Oxford, United Kingdom) and Kasper Rasmussen (University of Oxford, United Kingdom)

  • LURK: Server-Controlled TLS Delegation

Ioana Boureanu (University of Surrey), Daniel Migault (Ericsson Security), Stere Preda (Ericsson Security), Hyame Assem Alamedine (Ericsson Security), Sanjay Mishra (Verizon), Frederic Fieau (Orange), and Mohammad Mannan (Concordia University)

  • Malware Detection Based on Term Frequency Analysis of GPRs Features

Fang Li (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Chao Yan (Institute of Information Engineering, Chinese Academy of Sciences, China), Bowen Chen (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • Secure Outsourcing of Multi-armed Bandits

Radu Ciucanu (INSA Centre Val de Loire, LIFO), Pascal Lafourcade (Univ. Clermont Auvergne, LIMOS), Marius Lombard-Platet (Univ. PSL, DIENS, Be-Studys), and Marta Soare (Univ. Orléans, LIFO)

  • NLabel: An Accurate Familial Clustering Framework for Large-Scale Weakly-Labeled Malware

Yannan Liu (Sangfor Technologies Inc.; Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China), Yabin Lai (Sangfor Technologies Inc.), Kaizhi Wei (Sangfor Technologies Inc.), Liang Gu (Sangfor Technologies Inc.), and Zhengzheng Yan (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China)

  • Active Link Obfuscation to Thwart Link-Flooding Attacks for Internet of Things

Xuyang Ding (University of Electronic Science and Technology of China, China), Feng Xiao (Wuhan University, China), Man Zhou (Wuhan University, China), and Zhibo Wang (Wuhan University, China)

  • VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network

Oleg Schell (Bosch Engineering GmbH, Germany) and Marcel Kneib (Robert Bosch GmbH, Germany)

  • Densely Connected Residual Network for Attack Recognition

Peilun Wu (University of New South Wales, Sydney; Sangfor Technologies Inc.), Nour Moustafa (Australian Center for Cyber, University of New South Wales, Canberra), Shiyi Yang (University of New South Wales, Sydney), and Hui Guo (University of New South Wales, Sydney)

  • Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields

Guoqiang Yang (Shandong University, China), Fanyu Kong (Shandong University, China), and Qiuliang Xu (Shandong University, China)

  • FTPB: A Three-Stage DNS Tunnel Detection Method Based on Character Feature Extraction

Kemeng Wu (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Yongzheng Zhang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), and Tao Yin (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China)

  • De-Randomizing the Code Segment with Timing Function Attack

Tianning Zhang (Nanjing University, China), Miao Cai (Nanjing University, China), Diming Zhang (Jiangsu University of Science and Technology, China), and Hao Huang (Nanjing University, China)

  • Unmasking Windows Advanced Persistent Threat Execution

Rory Coulter (Swinburne University of Technology, Australia), Jun Zhang (Swinburne University of Technology, Australia), Lei Pan (Deakin University, Australia), and Yang Xiang (Swinburne University of Technology, Australia)

  • Ciphertext-Policy Attribute-Based Encryption with Multi-keyword Search over Medical Cloud Data

Changchun Yin (Nanjing University of Aeronautics and Astronautics, China), Hao Wang (Nanjing University of Aeronautics and Astronautics, China), Lu Zhou (Nanjing University of Aeronautics and Astronautics, China), and Liming Fang (Nanjing University of Aeronautics and Astronautics, China)

  • VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage

Chan Fan (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Xiaolei Dong (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Zhenfu Cao (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China; Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen and Shanghai Institute of Intelligent Science and Technology, Tongji University, China), and Jiachen Shen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)

  • Program Slice Based Vulnerable Code Clone Detection

Xiaonan Song (Institute of Information Engineering, Chinese Academy of Sciences, China), Aimin Yu (Institute of Information Engineering, Chinese Academy of Sciences, China), Haibo Yu (Institute of Information Engineering, Chinese Academy of Sciences, China), Shirun Liu (Institute of Information Engineering, Chinese Academy of Sciences, China), Xin Bai (Institute of Information Engineering, Chinese Academy of Sciences, China), Lijun Cai (Institute of Information Engineering, Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • Doc2vec-Based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs

Liu Liu (Swinburne University of Technology, Australia), Chao Chen (James Cook University, Australia), Jun Zhang (Swinburne University of Technology, Australia), Olivier De Vel (Defence Science and Technology Group, Australia), and Yang Xiang (Swinburne University of Technology, Australia)

  • C2BID: Cluster Change-Based Intrusion Detection

Tiago Fernandes (CINAMIL, Academia Militar, Instituto Universitário Militar – Portugal; INESC-ID, Instituto Superior Técnico, Universidade de Lisboa – Portugal), Luis Dias (CINAMIL, Academia Militar, Instituto Universitário Militar – Portugal; INESC-ID, Instituto Superior Técnico, Universidade de Lisboa – Portugal), and Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa –Portugal)

  • TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks

Tianlin Huo (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences), Wenhao Wang (Institute of Information Engineering, Chinese Academy of Sciences), Pei Zhao (Institute of Software, Chinese Academy of Sciences), Yufeng Li (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences), Tingting Wang (University of Chinese Academy of Sciences; Institute of Information Engineering, Chinese Academy of Sciences), and Mingshu Li (Institute of Software, Chinese Academy of Sciences)

  • One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

Benjamin Semal (Information Security Group, Royal Holloway University of London, United Kingdom), Konstantinos Markantonakis (Information Security Group, Royal Holloway University of London, United Kingdom), Keith Mayes (Information Security Group, Royal Holloway University of London, United Kingdom), and Jan Kalbantner (Information Security Group, Royal Holloway University of London, United Kingdom)

  • ReDex: Unpacking Android Packed Apps by Executing Every Method

Jiajin Cai (Peking University, China), Tongxin Li (Peking University, China), Can Huang (Peking University, China), and Xinhui Han (Peking University, China)

  • Awareness of Secure Coding Guidelines in the Industry - A First Data Analysis

Tiago Espinha Gasiba (Siemens AG, Germany), Ulrike Lechner (Universität der Bundeswehr München, Germany), Maria Pinto-Albuquerque(Instituto Universitário de Lisboa (ISCTE-IUL), ISTAR-IUL, Lisboa, Portugal), and Daniel Mendez Fernandez (Blekinge Institute of Technology, Karlskrona, Sweden)

  • IoT Attacks: Features Identification and Clustering

Junaid Haseeb (Victoria University of Wellington, New Zealand), Masood Mansoori (Victoria University of Wellington, New Zealand), Harith Al-Sahaf (Victoria University of Wellington, New Zealand), and Ian Welch (Victoria University of Wellington, New Zealand)

  • Estimating Loss Due to Cyber-Attack in the Presence of Uncertainty

Hoang Hai Nguyen (Information Trust Institute, University of Illinois at Urbana-Champaign) and David M. Nicol (Information Trust Institute, University of Illinois at Urbana-Champaign)

  • STIDM: A Spatial and Temporal Aware Intrusion Detection Model

Xueying Han (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Rongchao Yin (China Academy of Industrial Internet, China), Zhigang Lu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Bo Jiang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Song Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Chonghua Wang (China Industrial Control Systems Cyber Emergency Response Team, China), and Ning Li (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

  • Partial-SMT: Core-Scheduling Protection Against SMT Contention-Based Attacks

Xiaohui Wu (Institute of Software Chinese Academy of Sciences, China), Yeping He (Institute of Software Chinese Academy of Sciences, China), Qiming Zhou (Institute of Software Chinese Academy of Sciences, China), Hengtai Ma (Institute of Software Chinese Academy of Sciences, China), Liang He (Institute of Software Chinese Academy of Sciences, China), Wenhao Wang (Institute of Information Engineering Chinese Academy of Sciences, China), and Liheng Chen (Institute of Software Chinese Academy of Sciences, China)

  • Family Identification of AGE-Generated Android Malware Using Tree-Based Feature

Guga Suri (Wuhan University, China), Jianming Fu (Wuhan University, China), Rui Zheng (Wuhan University, China), and Xinying Liu (China Merchants Financia, China)

  • Towards a Theory of Special-Purpose Program Obfuscation

Muhammad Rizwan Asghar (The University of Auckland, New Zealand), Steven Galbraith (The University of Auckland, New Zealand), Andrea Lanzi (Universita degli studi di Milano, Italy), Giovanni Russello (The University of Auckland, New Zealand), and Lukas Zobernig (The University of Auckland, New Zealand)

  • Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach

Meng Li (Wuhan University of Technology, Wuhan, China), Qi Zhong (Deakin University, Geelong, Australia), Leo Yu Zhang (Deakin University, Geelong, Australia), Yajuan Du (Wuhan University of Technology, Wuhan, China), Jun Zhang (Swinburne University of Technology, Melbourne, Australia), and Yong Xiang (Deakin University, Geelong, Australia)

  • Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild

Johannes Lauinger (Technische Universität Darmstadt, Germany), Lars Baumgärtner (Technische Universität Darmstadt, Germany), Anna-Katharina Wickert (Technische Universität Darmstadt, Germany), and Mira Mezini (Technische Universität Darmstadt, Germany)

  • Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet

Yuzong Hu (Shanghai Jiao Tong University, China), Futai Zou (Shanghai Jiao Tong University, China), Linsen Li (Shanghai Jiao Tong University, China), and Ping Yi (Shanghai Jiao Tong University, China)

  • MAUSPAD: Mouse-Based Authentication Using Segmentation-Based, Progress-Adjusted DTW

Dong Qin (Iowa State University, USA), Shen Fu (Iowa State University, USA), George Amariucai (Kansas State University, USA), Daji Qiao (Iowa State University, USA), and Yong Guan (Iowa State University, USA)

  • Improving the Effectiveness of Grey-box Fuzzing by Extracting Program Information

Yu Fu (University of Chinese Academy of Sciences; TCA Lab, Institute of Software Chinese Academy of Sciences), Siming Tong (University of Chinese Academy of Sciences; TCA Lab, Institute of Software Chinese Academy of Sciences), Xiangyu Guo (Beijing University of Posts and Telecommunications), Liang Cheng (TCA Lab, Institute of Software Chinese Academy of Sciences), Yang Zhang (TCA Lab, Institute of Software Chinese Academy of Sciences), and Dengguo Feng (TCA Lab, Institute of Software Chinese Academy of Sciences)

  • Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks

Joe Samuel (Systems and Computer Engineering, Carleton University, Canada), Khalil Aalab (Systems and Computer Engineering, Carleton University, Canada), and Jason Jaskolka (Systems and Computer Engineering, Carleton University, Canada)

  • SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge

Yi Li (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xi Xiao (Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xiaogang Zhu (Cyberspace Security Research Center, Peng Cheng Laboratory, China), Xiao Chen (Faculty of Information Technology, Monash University, Melbourne, Australia), Sheng Wen (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China), and Bin Zhang (Tsinghua university, China; Cyberspace Security Research Center, Peng Cheng Laboratory, China)

  • Mind the GAP: Security & Privacy Risks of Contact Tracing Apps

Lars Baumgärtner (Technische Universität Darmstadt, Germany), Alexandra Dmitrienko (Julius-Maximilians-Universität Würzburg, Germany), Bernd Freisleben (Philipps-Universität Marburg, Germany), Alexander Gruler (Technische Universität Darmstadt, Germany), Jonas Höchst (Technische Universität Darmstadt, Germany; Philipps-Universität Marburg, Germany), Joshua Kühlberg (Technische Universität Darmstadt, Germany), Mira Mezini (Technische Universität Darmstadt, Germany), Richard Mitev (Technische Universität Darmstadt, Germany), Markus Miettinen (Technische Universität Darmstadt, Germany), Anel Muhamedagic (Technische Universität Darmstadt, Germany), Thien Duc Nguyen (Technische Universität Darmstadt, Germany), Alvar Penning (Philipps-Universität Marburg, Germany), Dermot Pustelnik (Technische Universität Darmstadt, Germany), Filipp Roos (Julius-Maximilians-Universität Würzburg, Germany), Ahmad-Reza Sadeghi (Technische Universität Darmstadt, Germany), Michael Schwarz (Philipps-Universität Marburg, Germany), and Christian Uhl Philipps-Universität Marburg, Germany)

  • Far from Classification Algorithm: Dive into the Preprocessing Stage in DGA Detection

Mingkai Tong (NSFOCUS Technologies Group Co., Ltd., China), Guo Li Tsinghua University, China), Runzi Zhang (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Jianxin Xue (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Wenmao Liu (NSFOCUS Technologies Group Co., Ltd., China), and Jiahai Yang (Tsinghua University, China)

  • ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing

Minghui Li (Nanjing University of Aeronautics and Astronautics, China), Yang Li (Nanjing University of Aeronautics and Astronautics, China), and Liming Fang (Nanjing University of Aeronautics and Astronautics, China)

  • Phishing Web Page Detection Using Optimised Machine Learning

Jordan Stobbs (Northumbria University, UK), Biju Issac (Northumbria University, UK), and Seibu Mary Jacob (Teesside University, UK)

-Asset-Oriented Threat Modeling

Nan Messe (IRISA, France), Vanea Chiprianov (DiverSE, IRISA, France), Nicolas Belloir (DiverSE, IRISA, France), Jamal El-Hachem (DiverSE, IRISA, France), Régis Fleurquin (DiverSE, IRISA, France), and Salah Sadou (DiverSE, IRISA, France)

  • All Your PLCs Belong to Me: ICS Ransomware Is Realistic

Yipeng Zhang (Beihang University, China), Zhonghao Sun (CNCERT/CC, China), Liqun Yang (Beihang University, China), Zhoujun Li (Beihang University, China), Qiang Zeng (University of South Carolina, China), Yueying He (CNCERT/CC, China), and Xiaoming Zhang (CNCERT/CC, China)

  • Automated Enforcement of the Principle of Least Privilege over Data Source Access

Haoqi Wu (Laboratory for Data Analytics and Security, Fudan University, China), Zhengxuan Yu (Laboratory for Data Analytics and Security, Fudan University, China), Dapeng Huang (Laboratory for Data Analytics and Security, Fudan University, China), Haodong Zhang Laboratory for Data Analytics and Security, Fudan University, China), and Weili Han (Laboratory for Data Analytics and Security, Fudan University, China)

  • Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes

Chengqian Guo (Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), Quanwei Cai Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), Qiongxiao Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; Data Assurance and Communication Security Research Center, CAS; University of Chinese Academy of Sciences), and Jingqiang Lin (University of Science and Technology of China, China)

  • BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services

Zhiyu Xu (Swinburne University of Technology, Australia), Lin Yang Swinburne University of Technology, Australia), Ziyuan Wang Swinburne University of Technology, Australia), Sheng Wen (Pengcheng Lab, China), Rob Hanson (The Commonwealth Scientific and Industrial Research Organisation, Australia), Shiping Chen (The Commonwealth Scientific and Industrial Research Organisation, Australia), and Yang Xiang (Swinburne University of Technology, Australia)

  • FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection

Defu Cao (Peking University, China), Jing Huang (Peking University, China), Xuanyu Zhang (Beijing Normal University, China), and Xianhua Liu (Peking University, China)

  • Secure Coded Matrix Multiplication Against Cooperative Attack in Edge Computing

Luqi Zhu (Computer Science and Technology, Soochow University, China),Jin Wang (Computer Science and Technology, Soochow University, China),Lianmin Shi (Computer Science and Technology, Soochow University, China), Jingya Zhou (Computer Science and Technology, Soochow University, China), Kejie Lu (Computer Science and Engineering, University of Puerto Rico at Mayagüez, Puerto Rico), and Jianping Wang Computer Science, City University of Hong Kong, China)

  • A Measurement Study of IoT-Based Attacks Using IoT Kill Chain

Junaid Haseeb (Victoria University of Wellington, New Zealand), Masood Mansoori (Victoria University of Wellington, New Zealand), and Ian Welch (Victoria University of Wellington, New Zealand)

  • Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems

Tengfei Li (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Xiaohong Chen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Haiying Sun (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jing Liu (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jiajia Yang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Chenchen Yang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), and Junfeng Sun (Casco Signal Ctd., China)

  • Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing

Tianyi Zhang (Nanjing University of Aeronautics and Astronautics) and Jian Wang (Nanjing University of Aeronautics and Astronautics)

  • Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN

Xuren Wang (Capital Normal University, China), Mengbo Xiong (Capital Normal University, China), Yali Luo (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Ning Li (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Zhengwei Jiang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), and Zihan Xiong (Capital Normal University, China)

  • Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms

Francis Onodueze (Bowie State University, USA) and Darsana Josyula Bowie State University, USA)

PT - Privacy Track

  • Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks

Meng Li (Hefei University of Technology, China), Jianbo Gao (Hefei University of Technology, China), Yifei Chen (Hefei University of Technology, China), Jingcheng Zhao (Hefei University of Technology, China), and Mamoun Alazab (Charles Darwin University, Australia)

  • Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications

Eduardo Gomes (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), Igor Zavalyshyn (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal; UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium), Nuno Santos (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), João Silva (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa, Portugal), and Axel Legay (UCLouvain, ICTEAM, Louvain-la-Neuve, Belgium)

  • Prihook: Differentiated Context-Aware Hook Placement for Different Owners' Smartphones

Chen Tian (Institute of Information Engineering, Chinese Academy of Sciences), Yazhe Wang (Institute of Information Engineering, Chinese Academy of Sciences), Peng Liu (Pennsylvania State University), Yu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Ruirui Dai (Institute of Information Engineering, Chinese Academy of Sciences), Anyuan Zhou (Institute of Information Engineering, Chinese Academy of Sciences), and Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences)

  • Improving Laplace Mechanism of Differential Privacy by Personalized Sampling

Wen Huang (University of Electronic Science and Technology of China, China), Shijie Zhou (University of Electronic Science and Technology of China, China), Tianqing Zhu (University of Technology Sydney, China), Yongjian Liao (University of Electronic Science and Technology of China, China), Chunjiang Wu (University of Electronic Science and Technology of China, China), and Shilin Qiu (University of Electronic Science and Technology of China, China)

  • Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks

De Li (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Jinyan Wang (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Zhou Tan (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), Xianxian Li (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China), and Yuhang Hu (Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China)

  • Practical and Secure Circular Range Search on Private Spatial Data

Zhihao Zheng (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Zhenfu Cao (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China; Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen and Shanghai Institute of Intelligent Science and Technology, Tongji University, China), and Jiachen Shen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China)

  • Dataset Construction and Analysis of Screenshot Malware

Hugo Sbaï (University of Oxford, UK), Jassim Happa (Royal Holloway, University of London, UK), Michael Goldsmith (University of Oxford, UK), and Samy Meftali (Université de Lille 1, France)

  • zkrpChain: Privacy-Preserving Data Auditing for Consortium Blockchains Based on Zero-Knowledge Range Proofs

Shiwei Xu (Huazhong Agricultural University, China), Xiaowen Cai Huazhong Agricultural University, China), Yizhi Zhao (Huazhong Agricultural University, China), Zhengwei Ren (Wuhan University of Science and Technology, China), Lingjuan Wu (Huazhong Agricultural University, China), Huanguo Zhang (Wuhan University, China), Le Du Wuhan Donghu Big Data Trading Center Co. Ltd., China), and Yan Tong Huazhong Agricultural University, China)

  • On the Role of Data Anonymization in Machine Learning Privacy

Navoda Senavirathne (University of Skövde, Sweden) and Vicenç Torra University of Umeå, Sweden)

  • Heimdall: Illuminating the Hidden Depths of Third-Party Tracking in Android Applications

Thomas Cory (Technische Universität Berlin, Germany), Philip Raschke Technische Universität Berlin, Germany), and Axel Küpper (Technische Universität Berlin, Germany)

  • A Privacy-Preserving Data Collection and Processing Framework for Third-Party UAV Services

Tianyuan Liu (University of Illinois at Urbana-Champaign), Hongpeng Guo (University of Illinois at Urbana-Champaign), Claudiu Danilov Boeing Research & Technology), and Klara Nahrstedt (University of Illinois at Urbana-Champaign)

  • On the Comparison of Classifiers' Construction over Private Inputs

Mina Sheikhalishahi (Eindhoven University of Technology, Netherlands) and Nicola Zannone (Eindhoven University of Technology, Netherlands)

  • Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way

Muqian Chen (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Xuebin Wang Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Jinqiao Shi (Beijing University of Posts and Telecommunications; Institute of Information Engineering, Chinese Academy of Sciences), Can Zhao (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Meiqi Wang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences), and Binxing Fang (Institute of Information Engineering, Chinese Academy of Sciences; Electronic and Information Engineering of UESTC in Guangdong)

  • Multi-party Private Set Intersection in Vertical Federated Learning

Linpeng Lu (Shanghai JiaoTong University, China) and Ning Ding Shanghai Jiao Tong University, China)

F&AT - Forensics and Analytics Track

  • MLTracer: Malicious Logins Detection System via Graph Neural Network

Fucheng Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Wen (Institute of Information Engineering, Chinese Academy of Sciences, China), Yanna Wu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Shuangshuang Liang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xihe Jiang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Nour Moustafa (University of New South Wales, Canberra, Australia),Mohiuddin Ahmedy (Edith Cowan University, Perth, Australia), and Sherif Ahmed (University of Windsor, Windsor, Canada)

  • CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic

Runzi Zhang (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), MingKai Tong (NSFOCUS Technologies Group Co., Ltd., China), Lei Chen (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Jianxin Xue (NSFOCUS Technologies Group Co., Ltd., China; Tsinghua University, China), Wenmao Liu (NSFOCUS Technologies Group Co., Ltd., China), and Feng Xie (Harbin Engineering University, China)

  • A Novel Violation Tracing Model for Cloud Service Accountability

Xiaojian Li (Guangxi Normal University, China), Bo Li (Guangxi Normal University, China), Hailan Wang (Guangxi Normal University, China),Jiajia Zhang (Guangxi Normal University, China), Haopeng Yang (Guangxi Normal University, China), and Jingang Liu (Beihang University, China)

  • Detection of Hate Tweets using Machine Learning and Deep Learning

Lida Ketsbaia (Northumbria University, UK), Biju Issac (Northumbria University, UK), and Xiaomin Chen (Northumbria University, UK)

  • Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation

Jack Hance (North Dakota State University, USA) and Jeremy Straub Institute for Cyber Security Education and Research, North Dakota State University, USA)

  • Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-Based Smart Grid

Adnan Anwar (Deakin University, Australia) and S. M. Abu Adnan Abir IGW Operators Forum (IOF), Bangladesh)

  • Cross Platform IoT-Malware Family Classification Based on Printable Strings

Yen-Ting Lee (National Taiwan University of Science and Technology, Taiwan), Tao Ban (National Institute of Information and Communications Technology, Japan), Tzu-Ling Wan (National Taiwan University of Science and Technology, Taiwan), Shin-Ming Cheng (National Taiwan University of Science and Technology, Taiwan; Academia Sinica, Taiwan), Ryoichi Isawa (National Institute of Information and Communications Technology, Japan), Takeshi Takahashi (National Institute of Information and Communications Technology, Japan), and Daisuke Inoue (National Institute of Information and Communications Technology, Japan)

  • ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features

Yuqing Pan (University of International Business and Economics, China; Tsinghua University, China), Xi Xiao (Tsinghua University, China; Peng Cheng Laboratory, China), Guangwu Hu (Shenzhen Institute of Information Technology, China), Bin Zhang (Peng Cheng Laboratory, China), Qing Li (Peng Cheng Laboratory, China; Southern University of Science and Technology, China), and Haitao Zheng (Tsinghua University, China)

  • Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples

Behzad Asadi (The University of Newcastle, Australia) and Vijay Varadharajan (The University of Newcastle, Australia)

  • Avoiding Geographic Regions in Tor

Matthew J. Ryan (Deakin University, Australia), Morshed Chowdhury Deakin University, Australia), Frank Jiang (Deakin University, Australia), and Robin Ram Doss (Deakin University, Australia)

  • Identifying Cross-Version Function Similarity Using Contextual Features

Paul Black (Federation University, Australia), Iqbal Gondal Federation University, Australia), Peter Vamplew (Federation University, Australia), and Arun Lakhotia (University of Louisiana at Lafayette, USA)

  • Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace

Yunan Zhang (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China),Aidong Xu Xu (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China), and Yixin Jiang (Guangdong Provincial Key Laboratory of Power System Network Security, Electric Power Research Institute, CSG, China)

  • An Analytics Framework for Heuristic Inference Attacks Against Industrial Control Systems

Taejun Choi (The University of Queensland, Australia), Guangdong Bai The University of Queensland, Australia), Ryan K L Ko (The University of Queensland, Australia), Naipeng Dong (The University of Queensland, Australia), Wenlu Zhang (The University of Queensland, Australia), and Shunyao Wang (The University of Queensland, Australia)

  • Forensic Analysis of Dating Applications on Android and iOS Devices

Shinelle Hutchinson (Purdue University, West Lafayette, IN), Neesha Shantaram (Purdue University, West Lafayette, IN), and Umit Karabiyik Purdue University, West Lafayette, IN)

  • Federated TON_IoT Windows Datasets for Evaluating AI-Based Security Applications

Nour Moustafa (University of New South Wales Canberra, Australia),Marwa Keshky (University of New South Wales Canberra, Australia),Essam Debiez (University of New South Wales Canberra, Australia), and Helge Janicke (Cyber Security Cooperative Research Centre, Edith Cowan University, Australia)

  • Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media

Sara Salim (University of New South Wales, Australia), Nour Moustafa University of New South Wales, Australia), and Benjamin Turnbull University of New South Wales, Australia)

ETT - Emerging Technologies Track

  • Generation of Malicious Webpage Samples Based on GAN

Mengxiang wan (Wuhan University of Technology, China), Hanbing Yao Wuhan University of Technology, China; Hubei Key Laboratory of Transportation Internet of Things, China), and Xin Yan (Wuhan University of Technology, China; Hubei Key Laboratory of Transportation Internet of Things, China)

  • A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks

Dali Zhu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China), Yuchen Ma (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China), and Yinlong Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China)

  • FPGA Based Blockchain System for Industrial IoT

Lei Xu (University of Texas Rio Grande Valley, US), Lin Chen (Texas Tech University, US), Zhimin Gao (Auburn University at Montgomery, US), Hanyee Kim (Korea University, Korea), Taeweon Suh (Korea University, Korea), and Weidong Shi (University of Houston, US)

  • Address-Based Signature

Handong Cui (The University of Hong Kong, Hong Kong) and Tsz Hon Yuen The University of Hong Kong, Hong Kong)

  • Cryptanalysis of a Chaos-Based Block Cryptosystem Using Multiple Samples Correlation Power Analysis

Shunsheng Zhang (Guangxi Normal University, China), Yuling Luo Guangxi Normal University, China; Guangxi Key Lab of Multi-source Information Mining & Security, Guangxi Normal University, China),Lvchen Cao (Guangxi Normal University, China), and Junxiu Liu (Guangxi Normal University, China)

  • Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems

Giulio Zizzo (Institute for Security Science and Technology; Department of Computing), Chris Hankin (Institute for Security Science and Technology; Department of Computing), Sergio Maffeis (Department of Computing), and Kevin Jones (Airbus)

  • Netspot: A Simple Intrusion Detection System with Statistical Learning

Alban Siffer (Amossys, Univ. Rennes, CNRS, IRISA), Pierre-Alain Fouque Univ. Rennes, CNRS, IRISA), Alexandre Termier (Univ. Rennes, Inria, CNRS, IRISA), and Christine Largouet (AgroCampus Ouest, Inria, CNRS, IRISA)

  • Cache Side-Channel Attacks Detection Based on Machine Learning

Zhongkai Tong (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Zhanpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Limin Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Yusha Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),and Yuxin Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China)

  • Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model

Xiaohui Hu (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Rui Sun Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Kejia Xu (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), Yongzheng Zhang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China), and Peng Chang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Science, China)

  • Inference Attacks on Physical Layer Channel State Information

Paul Walther (Chair for Privacy and Security, TU Dresden, Germany) and Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and Centre for Tactile Internet, TU Dresden (CeTI))

  • A non-Discriminatory Approach to Ethical Deep Learning

Enzo Tartaglione (University of Torino, Italy) and Marco Grangetto University of Torino, Italy) Security and Privacy

  • Implementation in Smart Home: Attributes Based Access Control and Smart Contracts

Amjad Qashlan (University of Technology Sydney(UTS), Australia),Priyadarsi Nanda (University of Technology Sydney (UTS), Australia),and Xiangjian He (University of Technology Sydney(UTS), Australia)

  • Blockchain-Based Verifiable Credential Sharing with Selective Disclosure

Rahma Mukta (University of New South Wales (UNSW Sydney), Sydney),James Martens (University of New South Wales (UNSW Sydney), Sydney),Hye-young Paik (University of New South Wales (UNSW Sydney), Sydney),Qinghua Lu (Data61, CSIRO, Sydney), and Salil S. Kanhere (University of New South Wales (UNSW Sydney), Sydney)

  • Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks

Wenjun Fan (University of Colorado Colorado Springs, United States),Younghee Park (San Jose State University, United States), Shubham Kumar (San Jose State University, United States), Priyatham Ganta (San Jose State University, United States), Xiaobo Zhou (University of Colorado Colorado Springs, United States), and Sang-Yoon Chang University of Colorado Colorado Springs, United States)

  • Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique

Mingfu Xue (Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), Zhiyu Wu (Nanjing University of Aeronautics and Astronautics, China), Can He (Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), Jian Wang Collaborative Innovation Center of Novel Software Technology and Industrialization, China; Nanjing University of Aeronautics and Astronautics, China), and Weiqiang Liu (Nanjing University of Aeronautics and Astronautics, China)

  • SCPORAM: A Hardware Support Scheme for Protecting Memory Access Patterns

Zhanpeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Limin Wang (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),Zhongkai Tong (Institute of Information Engineering, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China),and Chao Yan (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-Role

Zhujun Zhang (Institute of Information Engineering, Chinese Academy of Sciences, University of Chinese Academy of Sciences, China), Dali Zhu Institute of Information Engineering, Chinese Academy of Sciences, China), and Wei Fan (Institute of Information Engineering, Chinese Academy of Sciences, China)

  • Privacy-Preserving Public Verification of Ethical Cobalt Sourcing

Kilian Becher (Chair of Privacy and Data Security, TU Dresden, Germany), J. A. Gregor Lagodzinski (Hasso Plattner Institute, University of Potsdam, Germany), and Thorsten Strufe (Chair of IT Security, Karlsruhe Institute of Technology, Germany)

  • A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory

Zhuo Li (Computer Network Information Center, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Xu Zhou (Computer Network Information Center, Chinese Academy of Sciences, China), Yang Liu (Beijing Normal University, China),Congshan Fan (Computer Network Information Center, Chinese Academy of Sciences, China), and Wei Wang (Knet Technologies Co. Ltd., China)

  • A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness

Yizhong Liu (Beihang University, China), Jianwei Liu (Beihang University, China), Yiming Hei (Beihang University, China), Wei Tan Xidian University, China), and Qianhong Wu (Beihang University, China)

  • Revocable and Offline-Verifiable Self-Sovereign Identities

Andreas Abraham (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),Stefan More (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),Christof Rabensteiner (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria),and Felix Hörandner (Institute of Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria)

  • Blockchain Based End-to-End Tracking System for Distributed IoT Intelligence Application Security Enhancement

Lei Xu (University of Texas Rio Grande Valley, USA), Zhimin Gao Auburn University at Montgomery, USA), Xinxin Fan (IoTeX, USA), Li Chen (Texas Tech University, USA), Hanyee Kim (Korea University, Korea), Taeweon Suh (Korea University, Korea), and Weidong Shi University of Houston, USA)

  • Time is Money: Countering Griefing Attack in Lightning Network

Subhra Mazumdar (Cryptology and Security Research Unit, Indian Statistical Institute, India), Prabal Banerjee (Cryptology and Security Research Unit, Indian Statistical Institute, India), and Sushmita Ruj (CSIRO, Data61, Australia; Cryptology and Security Research Unit, Indian Statistical Institute, India)

  • Preventing a Fork in a Blockchain - David Fighting Goliath

Przemysław Kubiak (Wrocław University of Science and Technology, Wrocław, Poland) and Mirosław Kutyłowski (Wrocław University of Science and Technology)

  • Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas

Ting Su (National University of Defense Technology, China), Jiahe Shi National University of Defense Technology, China), Yongkang Tang National University of Defense Technology, China), and Shaoqing Li National University of Defense Technology, China)

  • A Feedback-Driven Lightweight Reputation Scheme for IoV

Rohan Dahiya (Deakin University, Australia), Frank Jiang (Deakin University, Australia), and Robin Ram Doss (Deakin University, Australia)

  • Modelling Attacks in Blockchain Systems using Petri Nets

Md. Atik Shahriar (Shahjalal University of Science & Technology, Bangladesh), Faisal Haque Bappy (Shahjalal University of Science and Technology, Bangladesh), A. K. M. Fakhrul Hossain (Shahjalal University of Science and Technology, Bangladesh), Dayamoy Datta Saikat (Shahjalal University of Science and Technology, Bangladesh),Md Sadek Ferdous (Shahjalal University of Science and Technology, Bangladesh; Imperial College London, UK), Mohammad Jabed M. Chowdhury La Trobe University, Australia), and Md Zakirul Alam Bhuiyan (Fordham University, USA)

  • BONIK: A Blockchain Empowered Chatbot for Financial Transactions

Md. Saiful Islam Bhuiyan (Shahjalal University of Science and Technology, Bangladesh), Abdur Razzak (Shahjalal University of Science and Technology, Bangladesh), Md Sadek Ferdous (Shahjalal University of Science and Technology, Bangladesh; Imperial College London, United Kingdom), Mohammad Jabed M. Chowdhury (La Trobe University, Australia), Mohammad A. Hoque (University of Helsinki, Finland), and Sasu Tarkoma (University of Helsinki, Finland)

  • Towards Network Traffic Monitoring Using Deep Transfer Learning

Harsh Dhillon (Western University, Canada) and Anwar Haque (Western University, Canada)

会议地址:
http://ieee-trustcom.org/TrustCom2020/

安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247485561&idx=1&sn=d060ebbc86a6aa1ac0179ab3608dbc67&chksm=fe2ef7f2c9597ee445179b9fb4bc70f7b77c29a9aeda3826ac23d4c0fbfdd469a403a94ee574#rd
如有侵权请联系:admin#unsafe.sh