Workshop Agenda
Overview
This year’s AsiaCCS workshops will run on 10/07/2023. Please refer to the map attached in this page to find the map of each workshop venue site.
The workshop agenda is given below. Please note that all times mentioned in this page are in GMT+10 (AEST).
Venue Map
- APKC
(02:00 PM - 04:45 PM)
Venue: Treasury - ASSS
(02:00 PM - 04:40 PM)
Venue: Monash 1 - BSCI
(09:00 AM - 05:00 PM)
Venue: Parliament - CPSS
(08:50 AM - 01:00 PM)
Venue: Monash 1 - SecTL
(08:50 AM - 01:25 PM)
Venue: Treasury - WDC
(12:50 PM - 05:00 PM)
Venue: Monash 2
02:00 PM - 02:05 PM Welcome 02:05 PM - 02:50 PM Keynote: Post-Quantum Zero-Knowledge Proofs and Applications
by Prof. Ron Steinfeld02:50 PM - 03:05 PM Coffee Break 03:05 PM - 03:45 PM Session 1: Post-Quantum Cryptography 03:05 PM - 03:25 PM SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems
Syed Wajid Ali Shah, Mohammad Nosouhi, Lei Pan and Robin Doss03:25 PM - 03:45 PM Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste
Elena Dubrova, Kalle Ngo, Joel Gärtner and Ruize Wang03:45 PM - 04:00 PM Coffee Break 04:00 PM - 04:40 PM Session 2: Cryptographic Protocols 04:00 PM - 04:20 PM Designated Verifier Signature with Claimability
Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai and Junji Shikata04:20 PM - 04:40 PM Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
Hayato Shikata, Daiki Miyahara and Takaaki Mizuki04:40 PM - 04:45 PM Closing Remarks 02:00 PM - 02:10 PM Welcome 02:10 PM - 03:00 PM Keynote: TBA
by Prof. Guangdong Bai03:00 PM - 03:15 PM Coffee Break 03:15 PM - 03:55 PM Paper Session I
Session Chair: TBA03:15 PM - 03:35 PM SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
A. S. M. Sanwar Hosen, Pradip Kumar Sharma, Deepak Puthal, In-Ho Ra and Gi Hwan Cho03:35 PM - 03:55 PM WinkFuzz: model-based script synthesis for fuzzing
Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang and Dongxi Liu04:00 PM - 04:40 PM Paper Session II
Session Chair: TBA04:00 PM - 04:20 PM A Blockchain-Based False Data Detection Architecture for the Autonomous Vehicular Systems
Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar and Shantanu Pal04:20 PM - 04:40 PM BDFL: A Blockchain-enabled FL Framework for Edge-based Smart UAV Delivery Systems
Chengzu Dong, Zhiyu Xu, Frank Jiang, Shantanu Pal, Chong Zhang, Shiping Chen and Xiao Liu09:00 AM - 09:10 AM Workshop Opening 09:10 AM - 09:50 AM Keynote: The Dumbo Protocol Family: Making Asynchronous Consensus Real
by Dr. Qiang Tang
Session Chair: Siqi Ma09:50 AM - 10:50 AM BSCI Session 1 09:50 AM - 10:10 AM ForTrac: A Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness
Fokke Heikamp (Deakin University, Australia), Lei Pan (Deakin University, Australia), Rolando Trujillo (Universitat Rovira i Virgili, Spain), Sushmita Ruj (UNSW, Australia) and Robin Doss (Deakin University, Australia)10:10 AM - 10:30 AM Trusted Sharing of Autonomous Vehicle Crash Data using Enterprise Blockchain and IPFS
Akarsh Singh (Indian Institute of Technology Kharagpur, India), Shounak Sural (Carnegie Mellon University, USA), Tirthankar Sengupta (Indian Institute of Technology Kharagpur, India) and Shamik Sural (Indian Institute of Technology Kharagpur, India)10:30 AM - 10:50 AM Liquid Democracy in DPoS Blockchains
Chao Li (Beijing Jiaotong University, China), Runhua Xu (Beihang University, China) and Li Duan (Beijing Jiaotong University, China)10:50 AM - 11:05 AM Coffee Break 11:05 AM - 12:05 PM BSCI Session 2 11:05 AM - 11:25 AM Blockchain-empowered Search over Encrypted Data with Forward and Backward Privacy
Shaolong Tang (Beijing Institute of Technology, China), Jie Liu (Beijing Institute of Technology, China), Xiaoyao Luo (Beijing Institute of Technology, China), Peng Jiang (Beijing Institute of Technology, China), Keke Gai (Beijing Institute of Technology, China), Lei Xu (Beijing Institute of Technology, China) and Liehuang Zhu (Beijing Institute of Technology, China)11:25 AM - 11:45 AM A Framework for User-Centric Visualisation of Blockchain Transactions in Critical Infrastructure
Samantha Tharani Jeyakumar (Griffith University, Australia), Ryan Ko (The University of Queensland, Australia) and Vallipuram Muthukkumarasamy (Griffith University, Australia)11:45 AM - 12:05 PM DCSS: A Smart Contract-based Data Continuous Storage Scheme
Kun Wang (Beihang University, China), Qianhong Wu (Beihang University, China), Tianxu Han (Beihang University, China), Yujue Wang (Beihang University, China), Yingmiao Zhang (Beijing Jiaotong University, China) and Bo Qin (Renmin University of China, China)12:05 PM - 01:00 PM Lunch 01:00 PM - 02:00 PM BSCI Session 3 01:00 PM - 01:20 PM Digital Twins and Blockchain for IoT Management
Mayra Samaniego (University of Saskatchewan, Canada) and Ralph Deters (University of Saskatchewan, Canada)01:20 PM - 01:40 PM Avoiding the 1 TB Storage Wall: Leveraging Ethereum's DHT to Reduce Peer Storage Needs
Jean-Philippe Eisenbarth (University of Luxembourg, France), Thibault Cholez (Universite de Lorraine, France) and Olivier Perrin (Universite de Lorraine, France)01:40 PM - 02:00 PM Decentralized Translator of Trust: Supporting Heterogeneous TEE for Critical Infrastructure Protection
Rabimba Karanjai (University of Houston, USA), Rowan Collier (Kent State University, USA), Zhimin Gao (University of Houston, USA), Lin Chen (Texas Tech University, USA), Xinxin Fan (IoTex, USA), Taeweon Suh (Korea University, South Korea), Weidong Shi (University of Houston, USA) and Lei Xu (Kent State University, USA)02:00 PM - 02:15 PM Coffee Break 02:15 PM - 03:35 PM BSCI Session 4 02:15 PM - 02:35 PM A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management
Ye Chen (Santa Clara University, USA), Peilin Wu (Shenzhen University, China), Yuanliang Li (Concordia University, USA), Yuhong Liu (Santa Clara University, USA), Peng Zhang (Shenzhen University, China), Jun Yan (Concordia University, USA) and Mohsen Ghafouri (Concordia University, USA)02:35 PM - 02:55 PM An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools
Cynthia Yi Min Chee (Deakin University, Australia), Shantanu Pal (Deakin University, Australia), Lei Pan (Deakin University, Australia) and Robin Doss (Deakin University, Australia)02:55 PM - 03:15 PM Efficient Balancing A* Search for Multi-robot Collaboration With Blockchain Consensus
Erteng Liu (Zhejiang University, China), Rui Shen (Zhejiang University, China), Tianchi Lu (Zhejiang University, China), Jianhai Chen (Zhejiang University, China) and Butian Huang (Hangzhou Yunphant Network Technology co. LTD, China)03:15 PM - 03:35 PM An Asynchronous Chain and A Variable Bulk Arrival and Asynchronous Bulk Service Model
Jongho Seol (Middle Geogia State University, USA) and Nohpill Park (Oklahoma State University, USA)03:35 PM - 04:15 PM BSCI Short Paper & Poster Session 03:35 PM - 03:55 PM Smart contract symbol execution vulnerability detection method based on CFG path pruning
Yichuan Wang (Xi'an University of Technology, China), Jingjing Zhao (Xi'an University of Technology, China), Yaling Zhang (Xi'an University of Technology, China), Xinhong Hei (Xi'an University of Technology, China) and Lei Zhu (Xi'an University of Technology, China)03:55 PM - 04:15 PM Fruits Detections Using Single Shot MultiBox Detector
Md Ali (Rider University, USA), Chris Keller (Rider University, USA) and Michael Huang (Rider University, USA)04:15 PM - 04:20 PM Closing Remark 08:50 AM - 09:00 AM Opening 09:00 AM - 10:00 AM Keynote I: Data security & privacy in IoT MGC Architectures
by Prof. Robert Deng
Session Chair: Jianying Zhou10:00 AM - 11:00 AM Keynote II: Digital twins: double insecurity for industrial scenarios
by Prof. Cristina Alcaraz
Session Chair: Jianying Zhou11:00 AM - 11:15 AM Coffee Break 11:15 AM - 12:00 AM Session I: Intrusion Detection in Cyber-Physical Systems
Session Chair: Rodrigo Roman11:15 AM - 11:30 AM PAID: Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems
K. Z. Teng, T. Limbasiya, F. Turrin, Y. L. Aung, S. Chattopadhyay, J. Zhou and M. Conti11:30 AM - 11:45 AM A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security
W. Yang, Z. Chu, J. Fan, Z. Liu and K. Y. Lam11:45 AM - 12:00 PM Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System
S. Nazat and M. Abdallah12:00 PM - 12:45 PM Session II: Cybersecurity in Industrial Control Systems
Session Chair: Jianying Zhou12:00 PM - 12:15 PM Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks
T. Walita, A. Erba, J. H. Castellanos and N. O. Tippenhauer12:15 PM - 12:30 PM Preventing Reverse Engineering of Control Programs in Industrial Control Systems
S. Banerjee, S. D. Galbraith, T. Khan, J. H. Castellanos and G. Russello12:30 PM - 12:45 PM ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code
C. Doumanidis, P. Rajput and M. Maniatakos12:45 PM - 01:00 PM Conclusion 08:50 AM - 09:00 AM Opening 09:00 AM - 10:00 AM Keynote I: Attacking Machine Learning Models
by Prof. Yang Zhang
Session Chair: Jason Xue10:00 AM - 11:00 AM Keynote II: Adversarial Attacks and Defenses in Deep Learning: from a Perspective of Cybersecurity
by Prof. Tianqing Zhu
Session Chair: Shangqi Lai11:00 AM - 11:15 AM Coffee Break 11:15 AM - 11:45 AM Session I: Privacy-Preserving Machine Learning
Session Chair: Xiaoning (Maggie) Liu11:15 AM - 11:30 AM Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles
Ziyao Liu (Nanyang Technological University), Jiale Guo (Nanyang Technological University), Mengmeng Yang (Data61, CSIRO), Wenzhuo Yang (Nanyang Technological University), Jiani Fan (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)11:30 AM - 11:45 AM Privacy-Preserving Distributed Machine Learning Made Faster
Zoe L. Jiang (Harbin Institute of Technology, Shenzhen & Peng Cheng Laboratory), Jiajing Gu (Harbin Institute of Technology, Shenzhen), Hongxiao Wang (University of Hong Kong); Yulin Wu (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Junbin Fang (Jinan University), Siu-Ming Yiu (The University of Hong Kong), Wenjian Luo (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies), Xuan Wang (Harbin Institute of Technology, Shenzhen & Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies)11:45 AM - 12:15 PM Session II: Security in On-device Machine Learning
Session Chair: Ruoxi Sun11:45 PM - 12:00 PM Beyond the Model: Data Pre-processing Attack to Deep Learning Models in Android Apps
Ye Sang (Monash University), Yujin Huang (Monash University), Shuo Huang (Monash University), Helei Cui (Northwestern Polytechnical University)12:00 PM - 12:15 PM Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning
Zijian Wang (Monash University), Shuo Hang (Monash University), Yujin Huang (Monash University), Helei Cui (Northwestern Polytechnical University)12:15 PM - 12:45 PM Session III: Attacks and Defences
Session Chair: Tingmin (Tina) Wu12:15 PM - 12:30 PM Multi-class Detection for Off The Shelf transfer-based Black Box Attacks
Niklas Bunzel (Fraunhofer SIT/ ATHENE), Dominic Böringer (TU-Darmstadt)12:30 PM - 12:45 PM Membership Inference Vulnerabilities in Peer to Peer Federated Learning
Alka Luqman (Nanyang Technological University), Anupam Chattopadhyay (Nanyang Technological University), Kwok-Yan Lam (Nanyang Technological University)12:45 PM - 01:15 PM Session III: Adversarial Attacks in Physical World
Session Chair: Huaming Chen12:45 PM - 01:00 PM Toward Evaluating the Robustness of Deep Learning Based Rain Removal Algorithm in Autonomous Driving
Yiming Qin (Monash University), Jincheng Hu (Loughborough University), Bang Wu (Monash University)01:00 PM -01:15 PM A First Look at the Security of EEG-based Systems and Intelligent Algorithms under Physical Signal Injections
Md Imran Hossen (University of Louisiana at Lafayette), Yazhou Tu (University of Louisiana at Lafayette), Xiali Hei (University of Louisiana at Lafayette)01:15 PM - 01:25 PM Conclusion 12:50 PM - 01:00 PM Welcome 01:00 PM - 01:45 PM Keynote: Temporal Evolution of Human Perceptions and Detection of Deepfakes: An Empirical Study
by Prof. Ganna Pogrebna
Session Chair: Sharif Abuadbba01:45 PM - 02:30 PM Full & Short Papers
Session Chair: Kristen Moore01:45 PM - 02:00 PM On the Application of Synthetic Media to Penetration Testing
Nathalia Soares, Steven Seiden, Ibrahim Baggili and Andrew Webb02:00 PM - 02:15 PM Exploiting Inconsistencies in Object Representations for DeepFake Video Detection
Kishor Kumar Bhaumik and Simon S. Woo02:15 PM - 02:30 PM Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and Offices
Shahroz Tariq, Alsharif Abuadbba and Kristen Moore02:30 PM - 02:45 PM Coffee Break 02:45 PM - 03:45 PM Panel Discussion: Security Implications of Deepfakes and Potential Threats
Panel Members: Kendra Vant (Xero), Asher Flynn (Monash University), Rob Cover (RMIT University), Shahroz Tariq (CSIRO's Data61)
Moderator: Sharif Abuadbba03:45 PM - 04:30 PM Poster and Discussion Papers
Session Chair: Shahroz Tariq03:45 PM - 04:00 PM The Threat of Real Time Deepfakes
Guy Frankovits and Yisroel Mirsky04:00 PM - 04:15 PM Why Do Facial Deepfake Detectors Fail?
Binh Le, Shahroz Tariq, Alsharif Abuadbba, Kristen Moore and Simon Woo04:15 PM - 04:30 PM GAN Discriminator based Audio Deepfake Detection
Thien Phuc Doan, Kihun Hong and Souhwan Jung04:30 PM - 05:00 PM Closing Remarks and Wrap-up