Eighth International Conference on Information and Communications Security (ICICS '06)

Conference Program

December 4, 2006

 

Welcome Reception (6:00pm -- 9:30pm)

(Cameron Reynolds room)

 

December 5, 2006

(Tanglewood Pine room)

Continental Breakfast (7:45am – 8:30am, Pre-Function B)

Welcome Remarks (8:30am -- 9:00am)


Keynote Talk (9:00am -- 10:00am)
Session Chair: David Evans

Inexplicable Indicators and Puzzling Pop-ups: Security Software From an End User Perspective
(Slides)
Lorrie Cranor (Carnegie Mellon University, USA)

Break (10:00am -- 10:30am)

Session 1: Security Protocols (10:30am -- 12:00pm; 2 full papers + 2 short paper)
Session Chair: Douglas Reeves

STRONG AND ROBUST RFID AUTHENTICATION ENABLING PERFECT OWNERSHIP TRANSFER
Chae Hoon Lim and Taekyoung Kwon (Sejong University, Korea)

A ROBUST AND SECURE RFID-BASED TRACKING SYSTEM (SHORT PAPER)
Chiu Tan and Qun Li (College of William and Mary, USA)

A TOPOLOGICAL CONDITION FOR SOLVING FAIR EXCHANGE IN BYZANTINE ENVIRONMENTS
Benoît Garbinato and Ian Rickebusch (University of Lausanne, Switzerland)

A SECURITY ANALYSIS OF THE PRECISE TIME PROTOCOL (SHORT PAPER)
Jeanette Sin Mei Tsang and Konstantin Beznosov (University of British Columbia, Canada)

Lunch (12:pm -- 1:30pm)

 

Session 2: Applied Cryptography (1:30pm -- 3:15pm; 2 full papers + 3 short papers)
Session Chair: Yuliang Zheng

AN IDENTITY-BASED PROXY SIGNATURE SCHEME FROM PAIRINGS
Kyung-Ah Shim (Ewha Womans University, Korea)

CRYPTANALYSIS OF ID-BASED AUTHENTICATED KEY AGREEMENT PROTOCOLS FROM BILINEAR PAIRINGS (SHORT PAPER)
Kyung-Ah Shim (Ewha Womans University, Korea) and Seung-Hyun Seo (Korea university, Korea)

FORMAL ANALYSIS AND SYSTEMATIC CONSTRUCTION OF TWO-FACTOR AUTHENTICATION SCHEME (SHORT PAPER)
Guomin Yang, Duncan S. Wong (City University of Hong Kong, China), Huaxiong Wang (Macquarie University, Australia) and Xiaotie Deng (City University of Hong Kong, China)

HIERARCHICAL KEY ASSIGNMENT FOR BLACK-BOX TRACING WITH EFFICIENT CIPHERTEXT SIZE
Tatsuyuki Matsushita (Toshiba Corp., Japan) and Hideki Imai (Chuo University/AIST, Japan)

TRACE-DRIVEN CACHE ATTACKS ON AES (SHORT PAPER)
Onur Aciicmez and Cetin Kaya Koc (Oregon State University, USA)

Break (3:15pm -- 3:45pm)

Session 3: Access Control and Systems Security (3:45pm -- 5:30pm; 3 full papers + 1 short papers)

Session Chair: Yong Guan

A CONSTRUCTION FOR GENERAL AND EFFICIENT OBLIVIOUS COMMITMENT BASED ENVELOPE PROTOCOLS
Jiangtao Li and Ninghui Li (Purdue University, USA)

DEFINING AND MEASURING POLICY COVERAGE IN TESTING ACCESS CONTROL POLICIES
Evan Martin, Tao Xie and Ting Yu (North Carolina State University, USA)

DISTRIBUTED CREDENTIAL CHAIN DISCOVERY IN TRUST MANAGEMENT WITH PARAMETERIZED ROLES AND CONSTRAINTS (SHORT PAPER)
Ziqing Mao, Ninghui Li (Purdue University, USA) and William H. Winsborough (University of Texas at San Antonio, USA)

AN OPERATING SYSTEM DESIGN FOR THE SECURITY ARCHITECTURE FOR MICROPROCESSORS
Jörg Platte, Raúl Durán Díaz and Edwin Naroska (Universität Dortmund, Germany)

Conference Reception + Posters (6:30pm -- 9:30pm)

(List of posters)

 

December 6, 2006

(Tanglewood Pine room)

Continental Breakfast (7:45am – 8:30am, Pre-Function B)

Keynote Talk (8:30am -- 9:30am)
Session Chair: David Evans

Physical and Digital Convergence: Where the Internet is the Enemy
(Slides)
Patrick McDaniel (Penn State University, USA)

Break (9:30am -- 10:00am)

Session 4 Privacy and Malicious Code (10:00am -- 12:00pm; 3 full papers + 2 short paper)
Session Chair: Ninghui Li

POINT-BASED TRUST: DEFINE HOW MUCH PRIVACY IS WORTH
Danfeng Yao (Brown University), Keith Frikken, Mikhail Atallah and Roberto Tamassia (Purdue University, USA)

EFFICIENT PROTOCOLS FOR PRIVACY PRESERVING MATCHING AGAINST DISTRIBUTED DATASETS
Yingpeng Sang (School of Information Science, Japan Advanced Institute of Science and Technology, Japan), Hong Shen (School of Computer Science, The University of Adelaide, Australia), Yasuo Tan, Naixue Xiong (School of Information Science, Japan Advanced Institute of Science and Technology, Japan)

QUANTIFYING INFORMATION LEAKAGE IN TREE-BASED HASH PROTOCOLS (SHORT PAPER)
Karsten Nohl and David Evans (University of Virginia, USA)

AN ANONYMOUS AUTHENTICATION SCHEME FOR IDENTIFICATION CARD
He Ge (Microsoft, USA)

A WIRELESS COVERT CHANNEL ON SMART CARDS (SHORT PAPER)
Geir Olav Dyrkolbotn and Einar Snekkenes (Gjovik University College, Norway)

Lunch (12:pm -- 1:30pm)

 

Session 5: Network Security (1:30pm -- 3:15pm; 2 full papers + 3 short papers)
Session Chair: Guilin Wang

FROM PROXY ENCRYPTION PRIMITIVES TO A DEPLOYABLE SECURE-MAILING-LIST SOLUTION
Himanshu Khurana, Jin Heo and Meenal Pant (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign)

MATHEMATICAL FOUNDATIONS FOR THE DESIGN OF A LOW-RATE DOS ATTACK TO ITERATIVE SERVERS (SHORT PAPER)
Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-Teodoro (University of Granada, Spain)

AN INDEPENDENT FUNCTION-PARALLEL FIREWALL ARCHITECTURE FOR HIGH-SPEED NETWORKS (SHORT PAPER)
Errin Fulp (Wake Forrest University, USA)

ESTIMATING ACCURACY OF MOBILE-MASQUERADER DETECTION USING WORST-CASE AND BEST-CASE SCENARIO
Oleksiy Mazhelis, Seppo Puuronen (University of Jyväskylä, Finland) and Mika Raento (University of Helsinki and Helsinki Institute for Information Technology, Finland)

AN ENHANCED N-WAY EXCHANGE-BASED INCENTIVE SCHEME FOR P2P FILE SHARING (SHORT PAPER)
Lingli Deng, Yeping He, Ziyao Xu and Chunyang Yuan (Chinese Academy of Sciences, China)

Break (3:15pm -- 3:45pm)

Session 6: Systems Security (3:45pm -- 5:30pm; 3 full papers + 1 short papers)
Session Chair: Errin Fulp

PRECISE INFORMATION FLOW CONTROL THROUGH RUNTIME ENFORCEMENT
V.N. Venkatakrishnan (University of Illinois at Chicago, USA), Wei Xu, Daniel C. DuVarney and R Sekar (Stony Brook University, USA)

AN ATTACK ON SMC-BASED SOFTWARE PROTECTION
Yongdong Wu, Zhigang Zhao and Tian Wei Chui (Institute for Infocomm Research, Singapore)

MODULAR BEHAVIOR PROFILES IN SYSTEMS WITH SHARED LIBRARIES (SHORT PAPER)
Carla Marceau and Matt Stillerman (ATC-NY, USA)

EFFICIENT PROTECTION AGAINST HEAP-BASED BUFFER OVERFLOWS WITHOUT RESORTING TO MAGIC
Yves Younan, Wouter Joosen and Frank Piessens (Katholieke Universiteit Leuven, Belgium)

 

December 7, 2006

(Blowing Rock room)

Continental Breakfast (7:45am – 8:30am, Pre-Function B)

Session 7: Cryptanalysis (8:30am -- 10:15am; 3 full papers + 1 short paper)
Session Chair: Qun Li

CRYPTANALYSIS OF TIMESTAMP-BASED PASSWORD AUTHENTICATION SCHEMES USING SMART CARDS
Guilin Wang and Feng Bao (Institute for Infocomm Research (I2R), Singapore)

FINDING COMPACT RELIABLE BROADCAST COMMUNICATIONS IN UNKNOWN FIXED-IDENTITY NETWORKS (SHORT PAPER)
Huafei Zhu and Jianying Zhou (Institute for Infocomm Research, Singapore)

SEIFERT'S RSA FAULT ATTACK: SIMPLIFIED ANALYSIS AND GENERALIZATIONS
James Muir (Carleton University, Canada)

THE FAIRNESS OF PERFECT CONCURRENT SIGNATURES
Guilin Wang, Feng Bao and Jianying Zhou (Institute for Infocomm Research (I2R), Singapore)

Break (10:15am -- 10:30am)

Session 8: Applied Cryptography and Network Security (10:30am -- 12:00pm; 2 full papers + 2 short paper)

Session Chair: Ting Yu

SECURE SET MEMBERSHIP USING 3SAT
Michael de Mare and Rebecca Wright (Stevens Institute of Technology, USA)

LEFT-TO-RIGHT SIGNED-BIT $\TAU$-ADIC REPRESENTATION OF N INTEGERS (SHORT PAPER)
Billy Bob Brumley (Helsinki University of Technology, Finland)

UNIVERSAL DESIGNATED VERIFIER SIGNATURE WITHOUT DELEGATABILITY
Xinyi Huang, Willy Susilo and Yi Mu (University of Wollongong, Australia)

TRACING HTTP ACTIVITY THROUGH NON-COOPERATING HTTP PROXIES (SHORT PAPER)
Richard Edell and Pete Kruus (SPARTA Inc., USA)

Lunch (12:00pm -- 1:30pm)

(Box lunch in Atrium)

 

Session 9: Security Implementations (1:30pm -- 3:00pm; 2 full papers + 2 short papers)
Session Chair: Cliff Wang

A FAST RSA IMPLEMENTATION ON ITANIUM 2 PROCESSOR
Kazuyoshi Furukawa and Masahiko Takenaka (Fujitsu Laboratories, Japan)

EFFICIENT IMPLEMENTATION OF PUBLIC KEY CRYPTOSYSTEMS ON MICAZ SENSOR MOTES (SHORT PAPER)
Haodong Wang and Qun Li (College of William and Mary, USA)

THRESHOLD IMPLEMENTATIONS AGAINST SIDE-CHANNEL ATTACKS AND GLITCHES
Vincent Rijmen (Graz University of Technology, Austria), Svetla Nikova (Katholieke Universiteit Leuven, Belgium) and Christian Rechberger (Graz University of Technology, Austria)

HARDWARE-AND-SOFTWARE-BASED SECURITY ARCHITECTURE FOR BROADBAND ROUTER (SHORT PAPER)
Xiaozhuo Gu, Yufeng Li, Jianzu Yang and Julong Lan (National Digital Switching System Engineering & Technological R&D Center, China)

 

©2006 Peng Ning . All rights reserved.