Menu:

WeChat Official Account
       

ACM TURC 2017 (SIGSAC China)


The ACM TURC 2017 (SIGSAC China) conference is a new leading international forum for academia, government, and industry to present novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. All topic areas related to computer and communications security are of interest and in scope. The ACM TURC 2017 (SIGSAC China) is technically supported by ACM SIGSAC in China.

Previous SIGSAC China Call for Papers.

 


Program



2017-05-13 (Day 1):  SIGSAC

Keynote Speech 1

14:00-14:50

Trent Jaeger, Professor of CSE at PSU, Chair of ACM SIGSAC
Fixing Security Problems for and with Programmers

Industry Forum 1 and 2 (Baidu, Ant Financial)

14:50-15:15

Wu Ye, Principal Architect, Baidu
Data Security with Killer Applications in Large Scale Enterprise Infrastructure

15:15-15:40

Lu Hongwei, Ant Financial
The Application of Security Technologies in Inclusive Financial System

Research Track Session 1:  Network Security and Forensics

15:40-16:00

Nathan Scrivens and Xiaodong Lin (University of Ontario Institute of Technology)

Android Digital Forensics: Data, Extraction and Analysis

16:00-16:20

Jieqiong Hou and Haifeng Qian (East China Normal University)

Collaboratively Filtering Malware Infections: A Tensor Decomposition Approach

16:20-16:40

Bo Fu (CISCO), Yang Xiao (The University of Alabama) and Hui Chen (Virginia State University)

FNF: Flow-Net Based Fingerprinting

16:40-17:00

Liang He, Zhixiang Li (National Key Laboratory of Science and Technology on Blind Signal Processing) and Chao Shen (XJTU)

Performance Evaluation of Anomaly-Detection Algorithm for Keystroke-Typing based Insider Detection

17:00-17:20

Shuang Liang, Yue Zhang, Xiaojie Guo, Zheli Liu and Chunfu Jia (Nankai University)
ShadowPWD: practical browser-based password manager with a security token

 


2017-05-14 (Day 2):  SIGSAC

Keynote Speech 2

14:00-14:50

Ninghui Li, Purdue University, Vice Chair of ACM SIGSAC

Differential Privacy: Meaning and Caveats

Keynote Speech 3

14:50-15:40

Elisa Bertino, Purdue University, EIC of TDSC

Security and Privacy in the Internet of Things

Industry Forum 3 and 4 (360, TBD)

15:40-16:05

Xiaosheng Tan, CSO, 360

Cyber Security Situation Awareness

16:05-16:30

TBD

Research Track Session 2: Privacy and Authentication

16:30-16:50

Yunxia Feng, Xu Li and Bo Song (Qingdao University of Science and Technology)

(k,R,r)-anonymity: A Light-weight and Personalized Location Protection Model for LBS Query

16:50-17:10

Huaxin Li (SJTU and University of Michigan–Dearborn), Qingrong Chen, Haojin Zhu (SJTU) and Di Ma(University of Michigan–Dearborn)

Hybrid De-anonymization across Real-world Heterogeneous Social Networks.

17:10-17:30

Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao and Yintang Yang (Xidian University)

USMAP: U2F based Secure Mutual Authentication Protocol for Mobile Payment

 

 


Keynote Speech


Keynote 1Trent Jaeger (Pennsylvania State University)
Fixing Security Problems for and with Programmers

Abstract: Programmers face a variety of challenges in trying to secure their programs.  Two major challenges are to reduce the attack vectors available to adversaries and to add defenses after program deployment. First, programmers have found it difficult to prevent attacks comprehensively, so they employ a variety of methods to reduce the options available to adversaries, such as by testing and analysis. However, programmer discipline enables defenses to enforce security more accurately, thus reducing possible attack vectors.  Second, programmers often have to add security code to their programs after deployment, but adding security code to complex programs often fails to ensure security.  In this talk, I will discuss various experiences in both motivating programmers to write programs that are more effectively secured and generating security code for defenses automatically to prevent errors.  In particular, I argue that building programs that enforce security goals correctly will involve a new approach to programming that treats security as a first-class property.

   

Keynote 2Ninghui Li (Purdue University)
Differential Privacy: Meaning and Caveats


   

Keynote 3Elisa Bertino (Purdue University)
Security and Privacy in the Internet of Things

 

 

 

 

Organizers


General Chair:
Hui Li (Xidian University, China)

ACM SIGSAC in China Steering Committee:
Hui Li (Xidian University, China)
Jianfeng Ma (Xidian University, China)
Dawu Gu (Shanghai Jiao Tong University, China)
Sheng Zhong (Nanjing University, China)
Zhenfu Cao (East China Normal University, China)

TPC Chair:
Feifei Li (University of Utah, USA)
Haojin Zhu (Shanghai Jiao Tong University, China)

Panel Chair:
Weili Han (Fudan University, China)

Industry Forum Chair:
Min Yang (Fudan University, China)
Zhen Ling (Southeast University, China)

Publicity Chair:
Na Ruan (Shanghai Jiao Tong University, China)
Qi Li (Tsinghua University, China)
Yulong Fu (Xidian University, China)

TPC Member:
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Jie Yang (Florida State University)
Haixin Duan (Tsinghua University, China)
Weili Han (Fudan University, China)
Jin Li (Guangzhou University, China)
Xiaodong Lin (University of Ontario Institute of Technology, Canada)
Rongxing Lu (University of New Brunswick, Canada)
Di Ma (University of Michigan-Dearborn, USA)
Qian Wang (Wuhan University, China)
Jian Weng (Jinan University, China)
Qianhong Wu (Beijing University of Aeronautics & Astronautics, China)
Min Yang (Fudan University, China)
Yinqian Zhang (The Ohio State University, USA)
Xinyi Huang (Fujian Normal University, China)
Zhen Ling (Southeast University, China)
Yao Liu (South Florida University, USA)
Xinwen Fu (UMass Lowell, USA)
Ming Li (University of Arizona, USA)
Xiaofeng Chen (Xidian University, USA)
Licheng Wang (BUPT, China)
Xiaohui Liang (UMASS Boston, USA)
Rui Zhang (University of Delaware, USA)
Qi Li (Tsinghua University, China)
Xiaokui Xiao (NTU, Singapore)
Zonghua Zhang (Institut Mines-Télécom/TELECOM Lille, France)
Tao Xiang (Chongqing University, China)
Fei Chen (Shenzhen University, China)
Zhe Liu (University of Waterloo, Canada)
Chao Shen (XJTU, China)
Yuanyuan Zhang (SJTU, China)
Ye Wu (Baidu, China)