ICICS 2023

The 25th International Conference on Information and Communications Security
18-20 November, 2023, Nankai University, Tianjin, China

Keynote Speakers

The following two speakers will give a keynote talk at ICICS 2023. All times are based on Chinese Standard Time (UTC+8).


Keynote I by Robert Deng, Singapore Management University, Singapore

Date and Time: Sunday 19th November 2023 08:40-09:40am

Title: TEE-assisted Crypto Systems: Towards Designing Practical Data Security Solutions

Abstract :Traditional public key cryptography and symmetric key cryptography are at the heart of ubiquitously deployed security solutions for protecting data in transit and storage (such as TLS, IPSec, WPA2&WPA3, Signal Protocol, BitLocker). To protect data in use, many powerful crypto algorithms, such as functional encryption, fully homomorphic encryption, multi-party computation, and zero-knowledge proof, have been proposed. While significant progress has been made in the research of these advanced crypto techniques, they still suffer from high processing cost and are mostly limited to applications in certain niche areas. On the other hand, trusted execution environments (TEEs) offer hardware-assisted security guarantees with CPU speed performance but suffer from a larger attack surface. In this talk, we will first present an overview of TEEs’ security features, threat models, attacks and countermeasures. We will then present our efforts on designing TEE-assisted crypto systems, and show how crypto and TEE may complement each other and be combined to realize practical security solutions. Finally, we will point out some potential future research directions.


Keynote II by Mauro Conti, University of Padua, Italy

Date and Time: Sunday 19th November 2023 09:55-10:55am

Title: Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies

Abstract Alongside traditional Information and Communication Technologies, more recent ones like Smartphones and IoT devices also became pervasive. Furthermore, all technologies manage an increasing amount of confidential data. The concern of protecting these data is not only related to an adversary gaining physical or remote control of a victim device through traditional attacks, but also to what extent an adversary without the above capabilities can infer or steal information through side and covert channels! In this talk, we survey a corpus of representative research results published in the domain of side and covert channels, ranging from TIFS 2016 to more recent Usenix Security 2022, and including several demonstrations at Black Hat Hacking Conferences. We discuss threats coming from contextual information and to which extent it is feasible to infer very specific information. In particular, we discuss attacks like inferring actions that a user is doing on mobile apps, by eavesdropping their encrypted network traffic, identifying the presence of a specific user within a network through analysis of energy consumption, or inferring information (also key one like passwords and PINs) through timing, acoustic, or video information.

top