ACM Symposium on Information, Computer & Communication Security (ASIACCS '08)
Akihabara Convention Hall, Tokyo, 18-20 March 2008
ASIACCS '08 Top > Program


25 minutes for each regular paper and 15 minutes for each short paper.

Day 1, Tuesday, March 18

08:20 Registration Open

08:50-09:00 Opening Speech: Virgil Gligor (PC Co-Chair)

09:00-10:15 Session 1 - Hash and MAC (3 papers, 75 min, Chair: Shiho Moriai)

  • Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
    • Lei Wang, Kazuo Ohta and Noboru Kunihiro
  • A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
    • Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro and Kazuo Ohta
  • HMAC is a Randomness Extractor and Applications to TLS
    • Pierre-Alain Fouque, David Pointcheval and Sebastien Zimmer

10:15-10:45 Coffee Break

10:45-11:35 Session 2 - Side Channel Attacks (2 papers, 50 min, Chair: Miyako Ohkubo)

  • An Overview of Side Channel Analysis Attacks
    • Thanh-Ha Le, Cecile Canovas and Jessy Clediere
  • Avoiding Timing Channels in Fixed-Priority Schedulers
    • Marcus Volp, Claude-Joachim Hamann and Hermann Hartig

11:35-12:00 Session 3 - PRNG (1 paper, 25 min, Chair: Miyako Ohkubo)

  • A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key
    • C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin and M. Yung

12:00-13:45 Lunch

13:45-15:25 Session 4 - Formal Verification (4 papers, 100 min, Chair: Joern Mueller-Quade)

  • On the Protocol Composition Logic PCL
    • Cas Cremers
  • An Integrated Framework for Security Protocol Analysis
    • Marcin Olszewski and Lukasz Cyra
  • Computationally Sound Mechanized Proof for Basic and Public-Key Kerberos
    • Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov and Joe-Kai Tsay
  • CMV: Automatic Verification of Complete Mediation for Java Virtual Machines
    • Michelle Zhou, V.N. Venkatakrishnan, A. Prasad Sistla and Hilary Branske

15:25-15:55 Coffee Break

15:55-16:45 Session 5 - Secure Implementation (2 papers, 50 min, Chair: Kanta Matsuura)

  • Secure Slices of Insecure Programs
    • Salvador V. Cavadini
  • Verified Implementations of the Information Card Federated Identity-Management Protocol
    • Karthik Bhargavan, Cedric Fournet, Andrew Gordon and Nikhil Swamy

16:45-17:45 Invited Talk (I) (60 min, Chair: Virgil Gligor)

  • Gene Tsudik
    • Confronting a Mobile Adversary in Unattended Sensor Networks

18:30-21:00 Welcome Reception (@Akihabara Convention Hall)

Day 2, Wednesday, March 19

08:30 Registration Open

09:00-10:15 Session 6 - Network Security (I) (3 papers, 75 min, Chair: Serge Vaudenay)

  • Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems
    • Guofei Gu, Alvaro A. Cardenas and Wenke Lee
  • Detecting VoIP based DoS attacks at the Public Safety Answering Point
    • Christoph Fuchs, Nils Aschenbruck, Felix Leder and Peter Martini
  • A Practical Mimicry Attack Against Powerful System-Call Monitors
    • C. Parampalli, R. Sekar and Rob Johnson

10:15-10:45 Coffee Break

10:45-12:15 Session 7 - Network Security (II) (4 papers, 90 min, Chair: Shiuhpyng Shieh)

  • SNAPP: Stateless Network-Authenticated Path Pinning
    • Bryan Parno, Adrian Perrig and David Andersen
  • Analysis of a General Probabilistic Packet Marking Model for IP Traceback
    • Liming Lu, Mun Choon Chan and Ee-Chien Chang
  • Secure Neighbor Discovery in Wireless Networks: Is It Possible?
    • Marcin Poturalski, Panos Papadimitratos and Jean-Pierre Hubaux
  • SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks (short paper)
    • Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig and Wade Trappe

12:15-14:00 Lunch

14:00-15:45 Session 8 - Access Control (5 papers, 105 min, Chair: Takeshi Okamoto)

  • On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control
    • Liang Chen and Jason Crampton
  • Online Subscriptions with Anonymous Access
    • Marina Blanton
  • Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems
    • Adam J. Lee and Marianne Winslett
  • Mechanisms for Usage Control (short paper)
    • Alexander Pretschner, Manuel Hilty, Christian Schaefer, Thomas Walter and David Basin
  • Usage Control Platformization via Trustworthy SELinux (short paper)
    • Masoom Alam, Qi Li, Jean-Pierre Seifert and Xinwen Zhang

15:45-16:15 Coffee Break

16:15-17:30 Session 9 - Key Exchange (3 papers, 75 min, Chair: Virgil Gligor)

  • Securing Group Key Exchange against Strong Corruptions
    • Emmanuel Bresson and Mark Manulis
  • Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
    • Alfred Menezes and Berkant Ustaoglu
  • Non-Interactive Conference Key Distribution and Its Applications
    • Rei Safavi-Naini and Shaoquan Jiang

17:30-18:20 Session 10 - RFID Security (2 papers, 50 min, Chair: Masayuki Abe)

  • Robust, Anonymous RFID Authentication with Constant Key-Lookup
    • Mike Burmester, Breno de Medeiros and Rossana Motta
  • Mutual Authentication in RFID: Security and Privacy
    • Radu-Ioan Paise and Serge Vaudenay

19:00-21:00 Conference Dinner (@Tokyo Garden Palace Hotel)

Day 3, Thursday, March 20

08:30 Registration Open

09:00-10:05 Session 11 - Protocols (3 papers, 65 min, Chair: Rui Zhang)

  • Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
    • Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi and Jorg Schwenk
  • Private Combinatorial Group Testing
    • Mikhail Atallah, Keith Frikken, Marina Blanton and Younsun Cho
  • Controlled Privacy Preserving Keyword Search (short paper)
    • Stephen S. Yau and Yin Yin

10:05-10:35 Coffee Break

10:35-11:15 Session 12 - Digital Signatures (I) (2 papers, 40 min, Chair: Masayuki Abe)

  • Exploiting Social Networks for Threshold Signing: Attack-resilience vs. Availability
    • Shouhuai Xu, Xiaohu Li and Paul Parker
  • A Short Anonymously Revocable Group Signature Scheme from Decision Linear Assumption (short paper)
    • Toru Nakanishi and Nobuo Funabiki

11:15-12:15 Invited Talk (II) (60 min, Chair: Masayuki Abe)

  • Prototyping Security Test Objects for Use with Advanced Biometric Authentication Systems
    • Tsutomu Matsumoto

12:15-14:00 Lunch

14:00-15:30 Session 13 - Digital Signatures (II) (4 papers, 90 min, Chair: Rei Safavi-Naini)

  • Practical Forward Secure Aggregate Signatures
    • Di Ma
  • Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
    • Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezuka and Danfeng Yao
  • Efficient Designated Confirmer Signature from Bilinear Pairings
    • Fangguo Zhang, Xiaofeng Chen and Baodian Wei
  • Certificateless Signcryption (short paper)
    • M. Barbosa and P. Farshim

15:30-16:00 Coffee Break

16:00-16:50 Session 14 - Identity Based Encryption (2 papers, 50 min, Chair: Goichiro Hanaoka)

  • Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
    • Jong Hwan Park, Ki Tak Kim and Dong Hoon Lee
  • Stateful Identity-Based Encryption Scheme: Faster Encryption and Decryption
    • Le Trieu Phong, Hiroto Matsuoka and Wakaha Ogata

Conference Close