ICICS 2023

The 25th International Conference on Information and Communications Security
18-20 November, 2023, Nankai University, Tianjin, China

Program

This program conference comprises both industry and academic sections. The industry section provides ample opportunities to expand your cyber-security knowledge and network, connects with renowned experts and practitioners, and exhibits cutting-edge technological solutions. The industry section will be held one day before the academic section. The academic section is honored to invite two distinguished scholars to deliver keynote speeches on their understanding of information security research. Authors of accepted papers will also present their contributions in this section. Underlines authors indicate the presenters. Video recordings of presentations will be added to this page after the corresponding session ends. The electronic publication can be found at https://link.springer.com/book/10.1007/978-981-99-7356-9. The free access for the conference participants will be granted for four weeks. All times are based on Chinese Standard Time (UTC+8).

Day 1 (Saturday 18 November 2023)

Lobby of Expert Apartment
14:00-22:00 Registration
Academic Lecture Theater 122, Administration (West) Hall
14:00-17:30 Industry Exhibitions and Talks
Host: Ding Wang, Nankai University, China
Expert Apartment Restaurant (2nd Floor)
18:00-19:30 Dinner Buffet

Day 2 (Sunday 19 November 2023)

Meeting Room 114, Administration (East) Hall

08:20-08:40 ICICS 2023 General Co-Chairs' Welcome Address slides
ICICS 2023 PC Co-Chairs's Report

Session Chair: Ding Wang, Nankai University, China
08:40-09:40 Keynote I: TEE-assisted Crypto Systems: Towards Designing Practical Data Security Solutions,
Speaker: Robert Deng, Singapore Management University, Singapore
Session Chair: Ding Wang, Nankai University, China
09:40-09:55 Coffee Break
09:55-10:55 Keynote II: Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies
Speaker: Mauro Conti, University of Padua, Italy
Session Chair: Chunfu Jia, Nankai University, China
10:55-12:10 Session 1: Symmetric-Key Cryptography I
Session Chair: Jiqiang Lu, Beihang University, China
10:55-11:20 SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers
Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi
11:20-11:45 Improved Related-Key Rectangle Attack against the Full AES-192
Xuanyu Liang, Yincen Chen, Ling Song, Qianqian Yang, Zhuohui Feng, Tianrong Huang
11:45-12:10 Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM
Sijia Liu, Min Luo, Cong Peng, Debiao He
Expert Apartment Restaurant (2nd Floor)
12:10-13:30 Lunch Break
Meeting Room I of Expert Apartment
13:40-14:30 Session 2: Symmetric-Key Cryptography II
Session Chair: Tianren Liu, Peking University, China
13:40-14:05 Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher
Jiqiang Lu, Can Wang
14:05-14:30 PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
14:30-14:45 Coffee Break
14:45-17:40 Session 3: Blockchain and Cryptocurrencies
Session Chair: Meng Li, Hefei University of Technology, China
14:45-15:10 SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains
Yuwei Xu, Haoyu Wang, Junyu Zeng
15:10-15:35 Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy
Yifu Geng, Bo Qin, Qin Wang, Wenchang Shi, Qianhong Wu
15:35-16:00 Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions
Yuhan Song, Yuefei Zhu, Fushan Wei
16:00-16:25 Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection
Shan Jin, Yong Li, Xi Chen, Ruxian Li
16:25-16:50 Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation
Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu
16:50-17:15 BDTS: Blockchain-based Data Trading System
Erya Jiang, Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi & Wenyi Tang
17:15-17:40 Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks
Chang Xu, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang
Meeting Room II of Expert Apartment
13:40-15:20 Session 4: Authentication and Authorization
Session Chair: Jianfeng Wang, Xidian University, China
13:40-14:05 PiXi: Password Inspiration by Exploring Information
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
14:05-14:30 Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification
Ningjing Fan, Dongdong Zhao, Hucheng Liao
14:30-14:55 A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things
Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo
14:55-15:20 BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks
Yuting Zuo, Li Xu, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao
15:20-15:35 Coffee Break
15:35-17:40 Session 5: Security and Privacy of AI I
Session Chair: Ximeng Liu, Fuzhou University, China
15:35-16:00 Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors
Soohyeon Choi, Manar Mohaisen, Daehun Nyang, David Mohaisen
16:00-16:25 Multi-scale Features Destructive Universal Adversarial Perturbations
Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong
16:25-16:50 Pixel-Wise Reconstruction of Private Data in Split Federated Learning
Hong Huang, Xingyang Li, Wenjian He
16:50-17:15 Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments
Xubo Yang, Linsen Li, Yenan Chen
17:15-17:40 Black-Box Fairness Testing with Shadow Models
Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao
Expert Apartment Restaurant (2nd Floor)
18:20-20:30 Banquet and Award Announcements

Day 3 (Monday 20 November 2023)

Meeting Room I of Expert Apartment
08:30-10:10 Session 6: Public-Key Cryptography
Session Chair: Weiran Liu, Alibaba group, China
08:30-08:55 A Polynomial-time Attack on G2SIDH
Guoqing Zhou, Maozhi Xu
08:55-09:20 Improvements of Homomorphic Secure Evaluation of Inverse Square Root
Hongyuan Qu, Guangwu Xu
09:20-09:45 Oblivious Transfer from Rerandomizable PKE
Shuaishuai Li, Cong Zhang, Dongdai Lin
09:45-10:10 Forward Secure Lattice-based Ring Signature Scheme in the Standard Model
Xiaoling Yu, Yuntao Wang
10:10-10:25 Coffee Break
10:25-12:05 Session 7: Applied cryptography I
Session Chair: Zengpeng Li, Shandong University, China
10:25-10:50 Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction
Huan Zou, Yuting Xiao, Rui Zhang
10:50-11:15 On-demand Allocation of Cryptographic Computing Resource with Load Prediction
Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou
11:15-11:40 Private Message Franking with After Opening Privacy
Iraklis Leontiadis, Serge Vaudenay
11:40-12:05 Secure Multi-Party Computation with Legally-Enforceable Fairness
Takeshi Nakai, Kazumasa Shinagawa
Meeting Room II of Expert Apartment
08:30-10:10 Session 8: Security and Privacy of AI II
Session Chair: Yuwei Xu, Southeast University, China
08:30-08:55 Graph Unlearning using Knowledge Distillation
Wenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin
08:55-09:20 AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou
09:20-09:45 Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference
Lichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen
09:45-10:10 A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation
Hewei Yu, Pengfei Shi
10:10-10:25 Coffee Break
10:25-12:05 Session 9: Privacy and Anonymity
Session Chair: Yanjiang Yang, Huawei Technologies Company Ltd, Singapore
10:25-10:50 Link Prediction-Based Multi-Identity Recognition of Darknet Vendors
Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu
10:50-11:15 CryptoMask: Privacy-preserving Face Recognition
Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui & Giovanni Russello
11:15~11:40 Efficient Private Multiset ID Protocols
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
11:40-12:05 Zoomer: A Website Fingerprinting Attack against Tor Hidden Services
Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan
Expert Apartment Restaurant (2nd Floor)
12:05-13:30 Lunch Break
Meeting Room I of Expert Apartment
13:40-14:05 Session 10: Applied cryptography II
Session Chair: Zengpeng Li, Shandong University, China
13:40-14:05 Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography
Amirreza Hamidi, Hossein Ghodosi
14:05-16:45 Session 11: System and Network Security
Session Chair: Gao Liu, Chongqing University, China
14:05-14:30 An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV
Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou & Liming Fang
14:30-14:55 TimeClave: Oblivious In-enclave Time series Processing System
Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi
14:55-15:20 Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios
Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang
15:20-15:45 A Fake News Detection Method Based on A Multimodal Cooperative Attention Network
Hongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng
15:45-16:10 DRoT: A Decentralised Root of Trust for Trusted Networks
Loganathan Parthipan, Liqun Chen, Christopher J. P. Newton, Yunpeng Li, Fei Liu, Donghui Wang
16:10-16:35 Finding Missing Security Operation Bugs via Program Slicing and Differential Check
Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie & Weiping Wen
Expert Apartment Restaurant (2nd Floor)
17:30-19:00 Dinner Buffet

Instructions

For Paper Presenters

Each paper is allocated a 25-min slot. The presentation lasts for 20 minutes, and about 4-5 minutes are reserved for Q&A.

Please arrive at least 30 minutes before the start of your session and check with the session chair / local helpers on A/V. Please consider copying your presentation file to a USB stick so that you can present from the computer in the lecture theater to allow a smoother transition between presentations.

In case there are inevitable factors that prevent you authors from presenting the papers, you may pre-recording the presentation in video (in .mp4) after getting the approval of the PC chairs (make sure you send online presenation request through the email icics2023@163.com). One of the authors needs to answer questions online using Zoom after we play the video.

For Session Chairs

Please arrive at least 30 minutes earlier before the start of your session. Check with all presenters of your session to ensure all are present and have checked A/V setup before the session start. Please also control the time of any live presentations and remind the presenter at 15 minutes and stop the presentation at 20 minutes to allow the audience to ask questions. If possible, please read the papers in your session before presentation and prepare some questions in case there are no or just a few simple questions from the audience.

top