Program
This program conference comprises both industry and academic sections. The industry section provides ample opportunities to expand your cyber-security knowledge and network, connects with renowned experts and practitioners, and exhibits cutting-edge technological solutions. The industry section will be held one day before the academic section. The academic section is honored to invite two distinguished scholars to deliver keynote speeches on their understanding of information security research. Authors of accepted papers will also present their contributions in this section. Underlines authors indicate the presenters. Video recordings of presentations will be added to this page after the corresponding session ends. The electronic publication can be found at https://link.springer.com/book/10.1007/978-981-99-7356-9. The free access for the conference participants will be granted for four weeks. All times are based on Chinese Standard Time (UTC+8).
Day 1 (Saturday 18 November 2023)
Lobby of Expert Apartment |
14:00-22:00 |
Registration
|
Academic Lecture Theater 122, Administration (West) Hall |
14:00-17:30 |
Industry Exhibitions and Talks
Host: Ding Wang, Nankai University, China
|
Expert Apartment Restaurant (2nd Floor) |
18:00-19:30 |
Dinner Buffet
|
Day 2 (Sunday 19 November 2023)
Meeting Room 114, Administration (East) Hall
|
08:20-08:40 |
ICICS 2023 General Co-Chairs' Welcome Address slides
ICICS 2023 PC Co-Chairs's Report
Session Chair: Ding Wang, Nankai University, China
|
08:40-09:40 |
Keynote I: TEE-assisted Crypto Systems: Towards Designing Practical Data Security Solutions,
Speaker: Robert Deng, Singapore Management University, Singapore
Session Chair: Ding Wang, Nankai University, China
|
09:40-09:55 |
Coffee Break |
09:55-10:55 |
Keynote II: Covert & Side Stories: Threats Evolution in Traditional and Modern Technologies
Speaker: Mauro Conti, University of Padua, Italy
Session Chair: Chunfu Jia, Nankai University, China
|
10:55-12:10 |
Session 1: Symmetric-Key Cryptography I
Session Chair: Jiqiang Lu, Beihang University, China
|
10:55-11:20 |
SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers
Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi
|
11:20-11:45 |
Improved Related-Key Rectangle Attack against the Full AES-192
Xuanyu Liang, Yincen Chen, Ling Song, Qianqian Yang, Zhuohui Feng, Tianrong Huang
|
11:45-12:10 |
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM
Sijia Liu, Min Luo, Cong Peng, Debiao He
|
Expert Apartment Restaurant (2nd Floor) |
12:10-13:30 |
Lunch Break |
Meeting Room I of Expert Apartment |
13:40-14:30 |
Session 2: Symmetric-Key Cryptography II
Session Chair: Tianren Liu, Peking University, China
|
13:40-14:05 |
Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher
Jiqiang Lu, Can Wang
|
14:05-14:30 |
PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
|
14:30-14:45 |
Coffee Break |
14:45-17:40 |
Session 3: Blockchain and Cryptocurrencies
Session Chair: Meng Li, Hefei University of Technology, China
|
14:45-15:10 |
SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains
Yuwei Xu, Haoyu Wang, Junyu Zeng
|
15:10-15:35 |
Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy
Yifu Geng, Bo Qin, Qin Wang, Wenchang Shi, Qianhong Wu
|
15:35-16:00 |
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions
Yuhan Song, Yuefei Zhu, Fushan Wei
|
16:00-16:25 |
Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection
Shan Jin, Yong Li, Xi Chen, Ruxian Li
|
16:25-16:50 |
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation
Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu
|
16:50-17:15 |
BDTS: Blockchain-based Data Trading System
Erya Jiang, Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi & Wenyi Tang
|
17:15-17:40 |
Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks
Chang Xu, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang
|
Meeting Room II of Expert Apartment |
13:40-15:20 |
Session 4: Authentication and Authorization
Session Chair: Jianfeng Wang, Xidian University, China
|
13:40-14:05 |
PiXi: Password Inspiration by Exploring Information
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
|
14:05-14:30 |
Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification
Ningjing Fan, Dongdong Zhao, Hucheng Liao
|
14:30-14:55 |
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things
Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo
|
14:55-15:20 |
BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks
Yuting Zuo, Li Xu, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao
|
15:20-15:35 |
Coffee Break |
15:35-17:40 |
Session 5: Security and Privacy of AI I
Session Chair: Ximeng Liu, Fuzhou University, China
|
15:35-16:00 |
Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors
Soohyeon Choi, Manar Mohaisen, Daehun Nyang, David Mohaisen
|
16:00-16:25 |
Multi-scale Features Destructive Universal Adversarial Perturbations
Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong
|
16:25-16:50 |
Pixel-Wise Reconstruction of Private Data in Split Federated Learning
Hong Huang, Xingyang Li, Wenjian He
|
16:50-17:15 |
Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments
Xubo Yang, Linsen Li, Yenan Chen
|
17:15-17:40 |
Black-Box Fairness Testing with Shadow Models
Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao
|
Expert Apartment Restaurant (2nd Floor) |
18:20-20:30 |
Banquet and Award Announcements |
Day 3 (Monday 20 November 2023)
Meeting Room I of Expert Apartment |
08:30-10:10 |
Session 6: Public-Key Cryptography
Session Chair: Weiran Liu, Alibaba group, China
|
08:30-08:55 |
A Polynomial-time Attack on G2SIDH
Guoqing Zhou, Maozhi Xu
|
08:55-09:20 |
Improvements of Homomorphic Secure Evaluation of Inverse Square Root
Hongyuan Qu, Guangwu Xu
|
09:20-09:45 |
Oblivious Transfer from Rerandomizable PKE
Shuaishuai Li, Cong Zhang, Dongdai Lin
|
09:45-10:10 |
Forward Secure Lattice-based Ring Signature Scheme in the Standard Model
Xiaoling Yu, Yuntao Wang
|
10:10-10:25 |
Coffee Break |
10:25-12:05 |
Session 7: Applied cryptography I
Session Chair: Zengpeng Li, Shandong University, China
|
10:25-10:50 |
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction
Huan Zou, Yuting Xiao, Rui Zhang
|
10:50-11:15 |
On-demand Allocation of Cryptographic Computing Resource with Load Prediction
Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou
|
11:15-11:40 |
Private Message Franking with After Opening Privacy
Iraklis Leontiadis, Serge Vaudenay
|
11:40-12:05 |
Secure Multi-Party Computation with Legally-Enforceable Fairness
Takeshi Nakai, Kazumasa Shinagawa
|
Meeting Room II of Expert Apartment |
08:30-10:10 |
Session 8: Security and Privacy of AI II
Session Chair: Yuwei Xu, Southeast University, China
|
08:30-08:55 |
Graph Unlearning using Knowledge Distillation
Wenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin
|
08:55-09:20 |
AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou
|
09:20-09:45 |
Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference
Lichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen
|
09:45-10:10 |
A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation
Hewei Yu, Pengfei Shi
|
10:10-10:25 |
Coffee Break |
10:25-12:05 |
Session 9: Privacy and Anonymity
Session Chair: Yanjiang Yang, Huawei Technologies Company Ltd, Singapore
|
10:25-10:50 |
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors
Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu
|
10:50-11:15 |
CryptoMask: Privacy-preserving Face Recognition
Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui & Giovanni Russello
|
11:15~11:40 |
Efficient Private Multiset ID Protocols
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
|
11:40-12:05 |
Zoomer: A Website Fingerprinting Attack against Tor Hidden Services
Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan
|
Expert Apartment Restaurant (2nd Floor) |
12:05-13:30 |
Lunch Break |
Meeting Room I of Expert Apartment |
13:40-14:05 |
Session 10: Applied cryptography II
Session Chair: Zengpeng Li, Shandong University, China
|
13:40-14:05 |
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography
Amirreza Hamidi, Hossein Ghodosi
|
14:05-16:45 |
Session 11: System and Network Security
Session Chair: Gao Liu, Chongqing University, China
|
14:05-14:30 |
An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV
Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou & Liming Fang
|
14:30-14:55 |
TimeClave: Oblivious In-enclave Time series Processing System
Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi
|
14:55-15:20 |
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios
Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang
|
15:20-15:45 |
A Fake News Detection Method Based on A Multimodal Cooperative Attention Network
Hongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng
|
15:45-16:10 |
DRoT: A Decentralised Root of Trust for Trusted Networks
Loganathan Parthipan, Liqun Chen, Christopher J. P. Newton, Yunpeng Li, Fei Liu, Donghui Wang
|
16:10-16:35 |
Finding Missing Security Operation Bugs via Program Slicing and Differential Check
Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie & Weiping Wen
|
Expert Apartment Restaurant (2nd Floor) |
17:30-19:00 |
Dinner Buffet |
Instructions
For Paper Presenters
Each paper is allocated a 25-min slot. The presentation lasts for 20 minutes, and about 4-5 minutes are reserved for Q&A.
Please arrive at least 30 minutes before the start of your session and check with the session chair / local helpers on A/V. Please consider copying your presentation file to a USB stick so that you can present from the computer in the lecture theater to allow a smoother transition between presentations.
In case there are inevitable factors that prevent you authors from presenting the papers, you may pre-recording the presentation in video (in .mp4) after getting the approval of the PC chairs (make sure you send online presenation request through the email icics2023@163.com). One of the authors needs to answer questions online using Zoom after we play the video.
For Session Chairs
Please arrive at least 30 minutes earlier before the start of your session. Check with all presenters of your session to ensure all are present and have checked A/V setup before the session start. Please also control the time of any live presentations and remind the presenter at 15 minutes and stop the presentation at 20 minutes to allow the audience to ask questions. If possible, please read the papers in your session before presentation and prepare some questions in case there are no or just a few simple questions from the audience.