Conference Schedule

Conference Date : 16 – 18 December 2020 (dates may differ in your timezone)

If the times seem inconvenient, keep in mind that this is an international conference with a Surabaya, INDONESIA-centric schedule.

Summary of Program

Wed. 16 Dec 2020 (Day 1) 

Time (UTC+7)

Detail

Time (Your Timezone )

09:00 - 09:15

Opening

09:15 - 10:15

Keynote Speech I: Prof Reihaneh Safavi-Naini
Smart Contracts in Refereed Secure Computation
Session Chair: Prof. Robert H. Deng

10:15 - 10:30

Coffee break

10:30 - 11:20

Public-key Cryptography I 
Session Chair: Prof. Hiroki Okada

11:20 - 12:10

Blockchain I
Session Chair: Dr. Yannan Li

12:10 - 12:50

Best paper award,
Vote of thanks from Steering Committee Chair,
Announcement of ISC 2021

12:50 - 14:00

Lunch

14:00 - 15:15

Public-key Cryptography II
Session Chair: Dr. Joonsang Baek

15:15 - 15:30

Coffee break

15:30 - 16:30

Keynote Speech II: Prof. Dr.-Ing. Tibor Jager
Real-World Cryptography from an Academic Perspective: TLS 1.3 and its Security
Session Chair: Prof. Willy Susilo

16:30 - 17:40

Network & System Security
Session Chair: Prof. Julio Hernandez-Castro

Thu. 17 Dec 2020 (Day 2) 

9:00 - 10:00

Keynote Speech III: Dr Melissa Chase
Identity in E2E encrypted messaging: “My messages are encrypted, but who am I talking to?”
Session Chair: Prof. Masahiro Mambo

10:00 - 11:00

Keynote Speech IV: Prof Yingjiu Li
Robust Android Malware Detection
Session Chair: Dr. Joonsang Baek

11:00 - 11:15

Coffee break

11:15 - 12:05

Blockchain II
Session Chair: Dr. Yannan Li

12:05 - 14:00

Lunch

14:00 - 14:25

Symmetric-key Crypto 
Session Chair: Dr. Jongkil Kim

14:25 - 14:50

Attacks & Cryptanalysis I
Session Chair: Dr. Jongkil Kim

15:15 - 15:30

Coffee break

15:30 - 16:20

Security Applications
Session Chair: Dr. Intae Kim

16:20 - 16:45

Malware Analysis I
Session Chair: Dr. Alberto Blanco-Justicia

Fri. 18 Dec 2020 (Day 3) 

09:00 - 10:00

Keynote Speech V: Dr Tieyan Li
Digital Identity: A Long Journey from Centralization to Decentralization
Session Chair: Prof. Rolly Intan

10:00 - 10:25

Malware Analysis II
Session Chair: Dr. Dung Duong

10:25 - 10:50

Lattice
Session Chair: Dr. Dung Duong

10:50 - 11:05

Coffee break

11:05 - 11:55

Attacks & Cryptanalysis II
Session Chair: Dr. Ryoma Ito

11:55 - 12:00

Closing Ceremony and Remarks


Detailed Program

Wed. 16 Dec 2020 (Day 1) 

Time (UTC+7)

Detail

Time (Your Timezone )

09:00 - 09:15

Opening

09:15 - 10:15

Keynote Speech I: Prof Reihaneh Safavi-Naini
Smart Contracts in Refereed Secure Computation
Session Chair: Prof. Robert H. Deng

10:15 - 10:30

Coffee break

 

Public-key Cryptography I 
Session Chair: Prof. Hiroki Okada

 

10:30 - 10:55

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

Rouzbeh Behnia, Attila A Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen

10:55 - 11:20

Time-Specific Signatures

Masahito Ishizaka, Shinsaku Kiyomoto

 

Blockchain I
Session Chair: Dr. Yannan Li

 

11:20 - 11:45

BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of Trust

Abba Garba, Arne Bochem, Benjamin Leiding

11:45 - 12:10

Formalizing Bitcoin Crashes with Universally Composable Security

Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu

12:10 - 12:50

Best paper award,
Vote of thanks from Steering Committee Chair,
Announcement of ISC 2021

12:50 - 14:00

Lunch

 

Public-key Cryptography II
Session Chair: Dr. Joonsang Baek

 

14:00 - 14:25

Public-PEZ Cryptography

Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone

14:25 - 14:50

Anonymous IBE From Quadratic Residuosity With Fast Encryption

Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng

14:50 - 15:15

Two-Server Verifiable Homomorphic Secret Sharing for High-Degree Polynomials

Xin Chen, Liang Feng Zhang

15:15 - 15:30

Coffee break

15:30 - 16:30

Keynote Speech II: Prof. Dr.-Ing. Tibor Jager
Real-World Cryptography from an Academic Perspective: TLS 1.3 and its Security
Session Chair: Prof. Willy Susilo

 

Network & System Security
Session Chair: Prof. Julio Hernandez-Castro

 

16:30 - 16:55

Towards Transparent Control-Flow Integrity in Safety-Critical System

Don Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, Gerhard

Fohler

16:55 - 17:15

ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT Networks

Zuchao Ma, Liang Liu, Weizhi Meng

17:15 - 17:40

Minimal rare-pattern-based outlier detection method for data streams by considering anti-monotonic constraints

Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu

Thu. 17 Dec 2020 (Day 2) 

9:00 - 10:00

Keynote Speech III: Dr Melissa Chase
Identity in E2E encrypted messaging: “My messages are encrypted, but who am I talking to?”
Session Chair: Prof. Masahiro Mambo

10:00 - 11:00

Keynote Speech IV: Prof Yingjiu Li
Robust Android Malware Detection
Session Chair: Dr. Joonsang Baek

11:00 - 11:15

Coffee break

 

Blockchain II
Session Chair: Dr. Yannan Li

 

11:15 - 11:40

Characterizing Erasable  Accounts in Ethereum

Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu

11:40 - 12:05

An Accountable Decryption System Based on Privacy-Preserving Smart Contracts

Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo

12:05 - 14:00

Lunch

 

Symmetric-key Crypto 
Session Chair: Dr. Jongkil Kim

 

14:00 - 14:25

Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-Resistance

Youle Xu, Qichun Wang

 

Attacks & Cryptanalysis I
Session Chair: Dr. Jongkil Kim

 

14:25 - 14:50

Rotational Cryptanalysis of Salsa Core Function

Ryoma Ito

14:50 - 15:15

Analyzing the Chain of Trust Model Based on Entity Dependence

Ge Cheng, Hui Xie, Dongliang Zhang

15:15 - 15:30

Coffee break

 

Security Applications
Session Chair: Dr. Intae Kim

 

15:30 - 15:55

PvP: Profiling versus Player! Exploiting Gaming Data for Player Recognition

Pier Paolo Tricomi, Mauro Conti

15:55 - 16:20

Privacy-Preserving Computation of the Earth Mover’s Distance

Alberto Blanco-Justicia, Josep Domingo-Ferrer

 

Malware Analysis I
Session Chair: Dr. Alberto Blanco-Justicia

 

16:20 - 16:45

Why Current Statistical Approaches to Ransomware Detection Fail

Jamie Pont, Budi Arief, Julio Hernandez-Castro

16:45 - 17:10

On the Struggle Bus: A Detailed Security Analysis of the m-tickets App

Jorge Sanz Maroto, Haoyu Liu, Paul Patras

Fri. 18 Dec 2020 (Day 3) 

09:00 - 10:00

Keynote Speech V: Dr Tieyan Li
Digital Identity: A Long Journey from Centralization to Decentralization
Session Chair: Prof. Rolly Intan

 

Malware Analysis II
Session Chair: Dr. Dung Duong

 

10:00 - 10:25

A Framework for Estimating Privacy Risk Scores of Mobile Apps

Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber

 

Lattice
Session Chair: Dr. Dung Duong

 

10:25 - 10:50

Integerwise Functional Bootstrapping on TFHE

Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid

10:50 - 11:05

Coffee break

 

Attacks & Cryptanalysis II
Session Chair: Dr. Ryoma Ito

 

11:05 - 11:30

Evaluation on the Security of Commercial Cloud Container Services

Yifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun, Jingzi Meng

11:30 - 11:55

Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel

Haoyu Ma, Tian Jianwen, Debin Gao, Chunfu Jia

11:55 - 12:00

Closing Ceremony and Remarks