Keynote Speakers


Keynote Speaker I

Prof. Kouichi Sakurai, Kyushu University, Japan

Title of the talk: A Security Management with Cyber Insurance - Event Study Approach with Social Network Sentimental Analysis for Cyber Risk Evaluation

Summary of the talk: Since the recent security breach requires the intensification of security management, the documents, describing the best practice of security management, are published by experts. However, the implementations of all best practices are tough because of the cost and the difficulty of cost-effective security investment. In this talk, I will discusses the security management theory with cyber risk insurance, especially the effectiveness of cyber risk insurance by Monte Carlo simulation approach. Once organizations have the security incident and breaches, they have to pay tremendous costs. Although visible cost, such as the incident response cost, customer follow-up care, and legal cost are predictable and calculable, it is tough to evaluate and estimate the invisible damage, such as losing customer loyalty, reputation impact, and the damage of branding. In this talk, I also will present a new method, called Event Study Methodology with Twitter Sentimental Analysis to evaluate the invisible cost. This method helps to assess the impact of the security breach and the impact on corporate valuation.

Note: This is the joint work with Tomohisa Ishikawa, an external PhD-student supervised by Prof. Kouichi Sakurai.

Biography: Kouichi Sakurai received the B.S. degree in mathematics from the Faculty of Science, Kyushu University in 1986. He received the M.S. degree in applied science in 1988, and the Doctorate in engineering in 1993 from the Faculty of Engineering, Kyushu University. He was engaged in research and development on cryptography and information security at the Computer and Information Systems Laboratory at Mitsubishi Electric Corporation from 1988 to 1994. From 1994, he worked for the Dept. of Computer Science of Kyushu University in the capacity of associate professor, and became a full professor there in 2002. He is concurrently working also with the Institute of Systems & Information Technologies and Nanotechnologies, as the chief of Information Security laboratory, for promoting research co-oporations among the industry, university and government under the theme "Enhancing IT-security in social systems". He has been successful in generating such co-operation between Japan, China and Korea for security technologies as the leader of a Cooperative International Research Project supported by the National Institute of Information and Communications Technology (NICT) during 2005-2006. Moreover, in March 2006, he established research co-oporations under a Memorandum of Understanding in the field of information security with Professor Bimal Kumar Roy, the first time Japan has partnered with The Cryptology Research Society of India (CRSI). Hi is now working with Cyber Security Center of Kyushu Univ. Department of Advanced Technologies for Cyber security. Professor Sakurai has published more than 3000 academic papers around cryptography and information security (See: http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/s/Sakurai:Kouichi.html)


Keynote Speaker II

Prof. Jian Weng, Jinan University, China

Title of the talk: Look back! Earlier versions will reveal weaknesses in Android Apps

Summary of the talk: Nowadays, Android platform gains explosively growing popularity. A considerable number of mobile consumers are attracted to varieties of Android Apps, which leads developers to invest resources to maintain the upward trajectory. In the early stage, the developers usually pay more attention to the functionality of Android Apps than the security matters. Unfortunately, it makes Android Apps a hot target for attackers. For the sake of resolving the attacks, developers attach great importance to improve the security of Apps and upgrade them to new versions, whereas leave their earlier versions diffuse through the network. In this paper, we indicate how to attack newly versions of popular Apps, including Facebook, Sina Weibo and Qihoo360 Cloud Driven, by using the weaknesses existing in their earlier versions. We design and implement an App weaknesses analysis tool named “DroidSkynet” to analyze the security weakness on widespread applications. Among 900 mainstream Apps collected from real world, our DroidSkynet indicates that 36.3% Apps are suffer from such weaknesses.

Biography: Jian Weng received the M.S. and B.S. degrees in computer science and engineering from South China University of Technology, in 2004 and 2000,respectively,and the Ph.D. degree in computer science and engineering from Shanghai Jiao Tong University,in 2008.From April 2008 to March 2010, he was a postdoc in the School of Information Systems, Singapore Management University. Currently, he is a dean, professor and phd-supervisor with the School of Information Technology, Jinan University. He has published more than 60 papers in cryptography conferences and journals,such as top conferences like CRYPTO,EUROCRYPT,ASIACRYPT,TCC,PKC, CT-RSA, and top journals like IEEE TDSC,IEEE TIFS etc. He served as PC co-chairs or PC member for more than 20 international conferences. He has won the 2014 cryptographic innovation award from Chinese Association for Cryptographic Research, the best paper award from the 28th Symposiumon Cryptography and Information Security (SCIS2011),and the best student award from the 8th International Conference on Provable Security(ProvSec2014). He has also investigated many Key Projects in National Science Foundation of China and Guangdong Province.


Keynote Speaker III

Prof. Lein Harn, University of Missouri-Kansas City (UMKC), USA

Title of the talk: Secret Sharing and Its Applications

Summary of the talk: Secret sharing is one of the most popular cryptographic tools in network applications used to protect data. For example, secret sharing has been used in cloud to strengthen data security. Shamir’s threshold secret sharing scheme which was proposed originally in 1979 is the most popular scheme in the literature. In this talk, I will briefly introduce Shamir’s scheme and point out some interesting properties. Then, I will introduce some related research problems to the secret sharing, including secure and fair secret reconstruction, verifiable secret sharing, multi-secret sharing, cheater detection and identification in the secret reconstruction. Applications using the secret sharing will also be discussed, such as group key establishment in group communications and group authentication. Finally, I will briefly introduce my recent research paper on the design and implementation of a general secret sharing.

Biography: Lein Harn received the B.S. degree in electrical engineering from the National Taiwan University in 1977, the M.S. degree in electrical engineering from the State University of New York-Stony Brook in 1980, and the Ph.D. degree in electrical engineering from the University of Minnesota in 1984. In 1984, he joined the Department of Electrical and Computer Engineering, University of Missouri- Columbia as an Assistant Professor, and in 1995, he has been promoted as a Full Professor, University of Missouri, Kansas City (UMKC). While at UMKC, he went on development leave to work in Racal Data Group, Florida for a year. His research interests include cryptography, network security, and wireless communication security. He has published over hundred research journal papers on digital signature design and applications, and wireless and network security. He has written two books on security. He is currently investigating new ways of using secret sharing in various applications. (HP: http://h.web.umkc.edu/harnl/)


Keynote Speaker IV

Prof. Qian Wang, Wuhan University, China

Title of the talk: New Short-range Communication Technologies over Smartphones: Designs and Implementations

Summary of the talk: With the ever-increasing popularity of smartphones in our daily lives, people more and more heavily rely on them to share and spread a wide variety of information. Because of the limitations of traditional short-range communication technologies (e.g., complex network configuration and troublesome authentication process), some new short-range communication technologies over smartphones have been proposed recently. In this talk, I will discuss barcode-based and acoustics-based short-range communication systems over off-the-shelf smartphones. First, we introduce Dolphin, a novel form of real-time acoustics-based dual-channel short-range communication, which uses a speaker and the microphones on smartphones to achieve concurrent audible and hidden communication. By leveraging masking effects of the human auditory system, Dolphin ensures real-time unobtrusive speaker-microphone communication without affecting the primary audio-hearing experience for human users, while, at the same time, it overcomes the main limitations of existing unobtrusive screen-camera links. Then, we introduce RainBar, a new and improved color barcode-based NFC system for achieving lightweight real-time streaming for smartphones, which features a carefully-designed high-capacity barcode layout design to allow flexible frame synchronization and accurate code extraction.

Biography: Short Bio: Qian Wang is a Professor with the School of Computer Science, Wuhan University. He received the B.S. degree from Wuhan University, China, in 2003, the M.S. degree from Shanghai Institute of Microsystem and Information Technology (SIMIT), Chinese Academy of Sciences, China, in 2006, and the Ph.D. degree from Illinois Institute of Technology, USA, in 2012, all in Electrical Engineering. His research interests include wireless network security and privacy, cloud computing security, big data security and privacy, and applied cryptography. Qian is an expert under National “1000 Young Talents Program” of China. He is a recipient of IEEE Asia-Pacific Outstanding Young Researcher Award 2016. He is also a co-recipient of several Best Paper Awards from IEEE ICNP 2011, WAIM 2014, and IEEE TrustCom 2016. He is a Member of the IEEE and a Member of the ACM.