Program
25 minutes for each regular paper and 15 minutes for each short paper.
Day 1, Tuesday, March 18
08:20 Registration Open
08:50-09:00 Opening Speech: Virgil Gligor (PC Co-Chair)
09:00-10:15 Session 1 - Hash and MAC (3 papers, 75 min, Chair: Shiho Moriai)
- Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
- Lei Wang, Kazuo Ohta and Noboru Kunihiro
- A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
- Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro and Kazuo Ohta
- HMAC is a Randomness Extractor and Applications to TLS
- Pierre-Alain Fouque, David Pointcheval and Sebastien Zimmer
10:15-10:45 Coffee Break
10:45-11:35 Session 2 - Side Channel Attacks (2 papers, 50 min, Chair: Miyako Ohkubo)
- An Overview of Side Channel Analysis Attacks
- Thanh-Ha Le, Cecile Canovas and Jessy Clediere
- Avoiding Timing Channels in Fixed-Priority Schedulers
- Marcus Volp, Claude-Joachim Hamann and Hermann Hartig
11:35-12:00 Session 3 - PRNG (1 paper, 25 min, Chair: Miyako Ohkubo)
- A Block Cipher based Pseudo Random Number Generator Secure Against Side-Channel Key
- C. Petit, F.-X. Standaert, O. Pereira, T.G. Malkin and M. Yung
12:00-13:45 Lunch
13:45-15:25 Session 4 - Formal Verification (4 papers, 100 min, Chair: Joern Mueller-Quade)
- On the Protocol Composition Logic PCL
- Cas Cremers
- An Integrated Framework for Security Protocol Analysis
- Marcin Olszewski and Lukasz Cyra
- Computationally Sound Mechanized Proof for Basic and Public-Key Kerberos
- Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov and Joe-Kai Tsay
- CMV: Automatic Verification of Complete Mediation for Java Virtual Machines
- Michelle Zhou, V.N. Venkatakrishnan, A. Prasad Sistla and Hilary Branske
15:25-15:55 Coffee Break
15:55-16:45 Session 5 - Secure Implementation (2 papers, 50 min, Chair: Kanta Matsuura)
- Secure Slices of Insecure Programs
- Salvador V. Cavadini
- Verified Implementations of the Information Card Federated Identity-Management Protocol
- Karthik Bhargavan, Cedric Fournet, Andrew Gordon and Nikhil Swamy
16:45-17:45 Invited Talk (I) (60 min, Chair: Virgil Gligor)
- Gene Tsudik
- Confronting a Mobile Adversary in Unattended Sensor Networks
18:30-21:00 Welcome Reception (@Akihabara Convention Hall)
Day 2, Wednesday, March 19
08:30 Registration Open
09:00-10:15 Session 6 - Network Security (I) (3 papers, 75 min, Chair: Serge Vaudenay)
- Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems
- Guofei Gu, Alvaro A. Cardenas and Wenke Lee
- Detecting VoIP based DoS attacks at the Public Safety Answering Point
- Christoph Fuchs, Nils Aschenbruck, Felix Leder and Peter Martini
- A Practical Mimicry Attack Against Powerful System-Call Monitors
- C. Parampalli, R. Sekar and Rob Johnson
10:15-10:45 Coffee Break
10:45-12:15 Session 7 - Network Security (II) (4 papers, 90 min, Chair: Shiuhpyng Shieh)
- SNAPP: Stateless Network-Authenticated Path Pinning
- Bryan Parno, Adrian Perrig and David Andersen
- Analysis of a General Probabilistic Packet Marking Model for IP Traceback
- Liming Lu, Mun Choon Chan and Ee-Chien Chang
- Secure Neighbor Discovery in Wireless Networks: Is It Possible?
- Marcin Poturalski, Panos Papadimitratos and Jean-Pierre Hubaux
- SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks (short paper)
- Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig and Wade Trappe
12:15-14:00 Lunch
14:00-15:45 Session 8 - Access Control (5 papers, 105 min, Chair: Takeshi Okamoto)
- On Spatio-Temporal Constraints and Inheritance in Role-Based Access Control
- Liang Chen and Jason Crampton
- Online Subscriptions with Anonymous Access
- Marina Blanton
- Towards an Efficient and Language-Agnostic Compliance Checker for Trust Negotiation Systems
- Adam J. Lee and Marianne Winslett
- Mechanisms for Usage Control (short paper)
- Alexander Pretschner, Manuel Hilty, Christian Schaefer, Thomas Walter and David Basin
- Usage Control Platformization via Trustworthy SELinux (short paper)
- Masoom Alam, Qi Li, Jean-Pierre Seifert and Xinwen Zhang
15:45-16:15 Coffee Break
16:15-17:30 Session 9 - Key Exchange (3 papers, 75 min, Chair: Virgil Gligor)
- Securing Group Key Exchange against Strong Corruptions
- Emmanuel Bresson and Mark Manulis
- Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
- Alfred Menezes and Berkant Ustaoglu
- Non-Interactive Conference Key Distribution and Its Applications
- Rei Safavi-Naini and Shaoquan Jiang
17:30-18:20 Session 10 - RFID Security (2 papers, 50 min, Chair: Masayuki Abe)
- Robust, Anonymous RFID Authentication with Constant Key-Lookup
- Mike Burmester, Breno de Medeiros and Rossana Motta
- Mutual Authentication in RFID: Security and Privacy
- Radu-Ioan Paise and Serge Vaudenay
19:00-21:00 Conference Dinner (@Tokyo Garden Palace Hotel)
Day 3, Thursday, March 20
08:30 Registration Open
09:00-10:05 Session 11 - Protocols (3 papers, 65 min, Chair: Rui Zhang)
- Provably Secure Browser-Based User-Aware Mutual Authentication over TLS
- Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi and Jorg Schwenk
- Private Combinatorial Group Testing
- Mikhail Atallah, Keith Frikken, Marina Blanton and Younsun Cho
- Controlled Privacy Preserving Keyword Search (short paper)
- Stephen S. Yau and Yin Yin
10:05-10:35 Coffee Break
10:35-11:15 Session 12 - Digital Signatures (I) (2 papers, 40 min, Chair: Masayuki Abe)
- Exploiting Social Networks for Threshold Signing: Attack-resilience vs. Availability
- Shouhuai Xu, Xiaohu Li and Paul Parker
- A Short Anonymously Revocable Group Signature Scheme from Decision Linear Assumption (short paper)
- Toru Nakanishi and Nobuo Funabiki
11:15-12:15 Invited Talk (II) (60 min, Chair: Masayuki Abe)
- Prototyping Security Test Objects for Use with Advanced Biometric Authentication Systems
- Tsutomu Matsumoto
12:15-14:00 Lunch
14:00-15:30 Session 13 - Digital Signatures (II) (4 papers, 90 min, Chair: Rei Safavi-Naini)
- Practical Forward Secure Aggregate Signatures
- Di Ma
- Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
- Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezuka and Danfeng Yao
- Efficient Designated Confirmer Signature from Bilinear Pairings
- Fangguo Zhang, Xiaofeng Chen and Baodian Wei
- Certificateless Signcryption (short paper)
- M. Barbosa and P. Farshim
15:30-16:00 Coffee Break
16:00-16:50 Session 14 - Identity Based Encryption (2 papers, 50 min, Chair: Goichiro Hanaoka)
- Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
- Jong Hwan Park, Ki Tak Kim and Dong Hoon Lee
- Stateful Identity-Based Encryption Scheme: Faster Encryption and Decryption
- Le Trieu Phong, Hiroto Matsuoka and Wakaha Ogata
Conference Close