Program

Yoy may download each paper by pressing on its title in the program below

 

DAY1
8:30 – 9:00ICICS 2024 General Co-Chairs’ Welcome Address
ICICS 2024 PC Co-Chairs’s Report
9:00 – 10:00Keynote talk: Security by Design, Strategy or Oxymoron? Speaker: Prof. Dieter Gollmann, Hamburg University and Security in Distributed Application Institute, Germany
Session Chair: Prof. Jianying Zhou
10:00 – 10:30Coffee/Tea Break
10:30 – 12:00Session 1: Attacks I
Session Chair: Prof. Sokratis Katsikas
10:30 – 11:00Chensheng Zhang, Tingwei Fan and Jingwei Jiang. How to Design Honey Vault Schemes
11:00 – 11:30Zijian Song, Jun Xu, Binwu Xiang, Weijie Li and Dingfeng Ye. New Result for BreakingNTRU Encryption with Multiple Keys in Polynomial Time
11:30 – 12:00Tianrong Huang, Yingying Li, Qinggan Fu, Yincen Chen and Ling Song. ImprovingDifferential-Neural Cryptanalysis for Large-State SPECK
12:00 – 13:30Lunch Break
13:30 – 15:00Session 2: Attacks II
Session Chair: Prof. Christos Kalloniatis
13:30 – 14:00Kou Sugiura and Mamoru Mimura. Evasion attempt for the malicious PowerShell detectorconsidering feature weights
14:00 – 14:30 Jingtao Li, Bo Gao, Jianxiong Wan, Leixiao Li and Jiaxiang Zhang. A Fast Framework for Efficiently Constructing Valuable Cubes
14:30 – 15:00Alireza Taheritajar, Reza Rahaeimehr and Zahra Mahmoudpour Harris. A Survey on Acoustic Side Channel Attacks on Keyboards
15:00 – 15:30Coffee/Tea break
15:30 – 17:30Session 3: Trust
Session Chair: Assoc. Prof. Georgios Kavalieratos
15:30-16:00Davide Ferraris, Konstantinos Kotis and Christos Kalloniatis. Enhancing TrUStAPIS Methodology in the Web of Things with LLM-generated IoT Trust Semantics
16:00-16:30Peixi Li, Xiang Li and Liming Fang. DMA: Mutual Attestation Framework for Distributed Enclaves
16:30-17:00Benshan Mei, Saisai Xia, Wenhao Wang and Dongdai Lin. Cabin: Confining Untrusted Programs within Confidential VM
17:00 – 19:00Visit Teriade Museum and Conference Welcome Reception
DAY2
09:00 – 10:30Session 4: Anomaly detection
Session Chair: Prof. Christos Kalloniatis
09:00 – 09:30Yunyang Xie, Kai Chen, Shenghui Li, Bingqian Li and Ning Zhang. UARC: Unsupervised Anomalous Traffic Detection with Improved U-shaped Autoencoder and RetNet based Multi-Clustering
09:30 – 10:00Hamed Fard, Tobias Schalau and Gerhard Wunder. An Investigation into the Performanceof Non-Contrastive Self-Supervised Learning Methods for Network Intrusion Detection
10:00 – 10:30Ming-Chang Lee, Jia-Chun Lin and Sokratis Katsikas. Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-time Lightweight Time Series Anomaly Detection
10:30 – 11:00Coffee/Tea Break
11:00 – 13:00Session 5: Privacy
Session Chair: Prof. Sokratis Katsikas
11:00 – 11:30Amina El Garne, Yunan Wei, Yucheng Lin, Shengnan Zhao, Chuan Zhao and ZhenxiangChen. Secure and Robust Privacy-Preserving Federated Learning For HeterogeneousResource
11:30 – 12:00Weijie Miao and Wenyuan Wu. Privacy-preserving Logistic Regression Model TrainingScheme by Homomorphic Encryption
12:00 – 12:30Georgios Spathoulas, Angeliki Katsika and Georgios Kavallieratos. Privacy preserving andverifiable outsourcing of AI processing for cyber-physical systems
12:30 – 13:00Benjamin Ulsmåg, Jia-Chun Lin and Ming-Chang Lee. Investigating the Privacy Risk ofusing Robot Vacuum Cleaners in Smart Environments
13:00 – 14:00Lunch Break
14:00 – 15:00Keynote talk: Digital Twins – a security perspective on architectures and
standards Speaker: Prof. Javier Lopez, University of Malaga, Spain
Session Chair: Prof. Jianying Zhou
15:00 – 15:30Coffee/Tea break
15:30 – 17:30Session 6: Crypto & Applied crypto
Session Chair: Prof. Jia-Chun Lin
15:30-16:00Yuwei Xu, Zhengxin Xu, Jie Cao, Rongrong Wang, Yali Yuan and Guang Cheng. TorHunter:A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic throughUnsupervised Pre-training
16:00-16:30Shengzhe Meng, Chengrui Dang, Bei Liang and Jintai Ding. Two-round Post-quantumPrivate Equality Test and OT from RLWE-encryption
16:30-17:00Iaroslav Gridin and Antonis Michalas. Point intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing
17:00 – 17:30Yong Li, Yueyang Feng, Xi Chen, Jian Zhang, Ruxian Li, Kewei Lv and Dawei Zhang.FAMC: Fair and Public Auditable Multi-Party Computation with Cheater Detection
17:30-19:30Visit Vrana Museum
20:00 – 23:00Conference Dinner
DAY3
09:00 – 10:30Session 7: Homomorphic encryption
Session Chair: Dr. Ming-Chang Lee
09:00 – 09:30Adam Caulfield, Nabiha Raza and Peizhao Hu. X-Cipher: Achieving Data Resiliency inHomomorphic Ciphertexts
09:30 – 10:00Yan Xu, Li-Ping Wang and Huaxiong Wang. Amortized Functional Bootstrapping forHomomorphic Evaluation of Encrypted Functions
10:00 – 10:30Hao Huang, Xiaofen Wang, Ke Zhang, Man Ho Au, Sheng Cao, Qinglin Zhao and XiaosongZhang. Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DLAssumption in AGM
10:30 – 11:00Coffee/Tea Break
11:00 – 13:00Session 8: Key agreement protocols & digital signature schemes
Session Chair: Prof. Christos Kalloniatis
11:00 – 11:30Yijing Peng, Junhui Wang, Zhenyu Wang, Zhenbin Guo, Yaohua Wang, Ding Deng,Shaoqing Li and Yang Guo. CoDPoC IP: A Configurable Data Protection Circuit to SupportMultiple Key Agreement Scheme
11:30 – 12:00Navya Sivaraman, Simin Nadjm-Tehrani and Thomas Johansson. Formal analysis of JuliaKey Agreement protocol
12:00 – 12:30Yang Yang and Fangguo Zhang. New Construction of Code-Based Signature Schemes
12:30 – 13:00Pingbin Luo, Xinjian Chen, Willy Susilo and Qiong Huang. Identity-Based Signature from Lattices without Trapdoors
13:00 – 14:30Lunch Break
14:30 – 16:00Session 9: Defences I
Session Chair: Assoc. Prof. Georgios Kavalieratos
14:30-15:00Ali Cherry, Konstantinos Barmpis and Siamak Shahandashti. The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication through Password Managers
15:00 – 15:30Wenjun Fan, Zichen Yang, Yuanzhen Liu and Lang Qin. HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot
15:30-16:00Bo Cui and Liu Shuai. TSR-jack: An In-Browser Crypto-jacking Detection Method Based onTime Series Representation Learning
16:00-16:30Coffee/Tea Break
16:30-17:30Session 10: Defences II
Session Chair: Dr. Aikaterini-Georgia Mavroeidi
16:30 – 17:00Ke Yang, Shuguang Yuan, Jing Yu, Yuyang Wang, Tengfei Yang and Chi Chen. Don’t Abandon the Primary Key: A High Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases
17:00-17:30Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li and Limin Sun. FirmPorter: PortingRTOSes at the Binary Level for Firmware Re-hosting
17:30-18:00Closing Remarks, Award Announcements and ICICS 2025 Presentation ICICS 2024 PC Chairs & Summary with Announcements for Best Paper Award
and Best Student Paper Award  ICICS 2024 General Chairs & Closing Remarks  ICICS 2025 PC Co-Chair on behalf of the ICICS 2025 Organizing Committee

Social Events

Monday 26 th of August 2024

At the end of the first day we will visit Teriade Museum located in the area of Varia few minutes away from the University Hill. Teraide Museum is one of the most famous museums in Greece as it hosts the private collection of Stratis Eleftheriades Teriade including works by renowned artists such as Picasso, Matisse and Chagall. A bus will depart from the University Hill at 17:30 for visiting the museum. After the tour in Teriade museum we will return to the city center where the Welcome Gala will take place on a seaside venue.

Tuesday 27 th of August 2024

At the end of the second day, participants will have the chance to visit Vrana Museum. This historical olive mill provides insights into the island’s industrial heritage and olive production. After the visit in Vrana Museum, we will visit “Elia kai Thalassa” (Olive and Sea) venue located in the are of Loutra for the Conference main social event where participants will have the chance to taste some local food and drinks. A bus will depart from the University Hill at 17:30 for visiting the museum and then drive us to the social event.