Menu:

WeChat Official Account
       

ACM TURC 2017 (SIGSAC China)


The ACM TURC 2017 (SIGSAC China) conference is a new leading international forum for academia, government, and industry to present novel research results in all practical and theoretical aspects of computer and communications security. Papers should be related to the construction, evaluation, application, or operation of secure systems. All topic areas related to computer and communications security are of interest and in scope. The ACM TURC 2017 (SIGSAC China) is technically supported by ACM SIGSAC in China.

Previous SIGSAC China Call for Papers.

 


Program



2017-05-13 (Day 1):  SIGSAC

Keynote Speech 1

14:00-14:50

Trent Jaeger, Professor of CSE at PSU, Chair of ACM SIGSAC
Fixing Security Problems for and with Programmers

Industry Forum 1 and 2 (Baidu, Ant Financial)

14:50-15:15

Wu Ye, Principal Architect, Baidu
Data Security with Killer Applications in Large Scale Enterprise Infrastructure

15:15-15:40

Luo Hongwei, Ant Financial
The Application of Security Technologies in Inclusive Financial System

15:40-16:05

Du Yuejin, Alibaba Group
Problems and Solutions: Research on Network Security from the Perspective of Industry

Research Track Session 1:  Network Security and Forensics

16:05-16:25

Nathan Scrivens and Xiaodong Lin (University of Ontario Institute of Technology)

Android Digital Forensics: Data, Extraction and Analysis

16:25-16:45

Jieqiong Hou and Haifeng Qian (East China Normal University)

Collaboratively Filtering Malware Infections: A Tensor Decomposition Approach

16:45-17:05

Bo Fu (CISCO), Yang Xiao (The University of Alabama) and Hui Chen (Virginia State University)

FNF: Flow-Net Based Fingerprinting

17:05-17:25

Liang He, Zhixiang Li (National Key Laboratory of Science and Technology on Blind Signal Processing) and Chao Shen (XJTU)

Performance Evaluation of Anomaly-Detection Algorithm for Keystroke-Typing based Insider Detection

17:25-17:45

Shuang Liang, Yue Zhang, Xiaojie Guo, Zheli Liu and Chunfu Jia (Nankai University)
ShadowPWD: practical browser-based password manager with a security token

 


2017-05-14 (Day 2):  SIGSAC

Keynote Speech 2

14:00-14:50

Elisa Bertino, Purdue University, EIC of TDSC

Security and Privacy in the Internet of Things

Keynote Speech 3

14:50-15:40

Ninghui Li, Purdue University, Vice Chair of ACM SIGSAC

Differential Privacy: Meaning and Caveats

Industry Forum 3 and 4 (360, Antiy’s Mobile Security Company)

15:40-16:05

Xiaosheng Tan, CSO, 360

Cyber Security Situation Awareness

16:05-16:30

Tom Pan, CEO, Antiy’s Mobile Security Company

Mobile Threat Escalation and Migration-Race between Man and Machine

Research Track Session 2: Privacy and Authentication

16:30-16:50

Yunxia Feng, Xu Li and Bo Song (Qingdao University of Science and Technology)

(k,R,r)-anonymity: A Light-weight and Personalized Location Protection Model for LBS Query

16:50-17:10

Huaxin Li (SJTU and University of Michigan–Dearborn), Qingrong Chen, Haojin Zhu (SJTU) and Di Ma(University of Michigan–Dearborn)

Hybrid De-anonymization across Real-world Heterogeneous Social Networks.

17:10-17:30

Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao and Yintang Yang (Xidian University)

USMAP: U2F based Secure Mutual Authentication Protocol for Mobile Payment

 

 


Keynote Speech


Keynote 1Trent Jaeger (Pennsylvania State University)
Fixing Security Problems for and with Programmers

Abstract: Programmers face a variety of challenges in trying to secure their programs.  Two major challenges are to reduce the attack vectors available to adversaries and to add defenses after program deployment. First, programmers have found it difficult to prevent attacks comprehensively, so they employ a variety of methods to reduce the options available to adversaries, such as by testing and analysis. However, programmer discipline enables defenses to enforce security more accurately, thus reducing possible attack vectors.  Second, programmers often have to add security code to their programs after deployment, but adding security code to complex programs often fails to ensure security.  In this talk, I will discuss various experiences in both motivating programmers to write programs that are more effectively secured and generating security code for defenses automatically to prevent errors.  In particular, I argue that building programs that enforce security goals correctly will involve a new approach to programming that treats security as a first-class property.

   

Keynote 2Ninghui Li (Purdue University)
Differential Privacy: Meaning and Caveats


   

Keynote 3Elisa Bertino (Purdue University)
Security and Privacy in the Internet of Things

 

 

 

 

Organizers


General Chair
Hui Li (Xidian University, China)

ACM SIGSAC China Steering Committee
Jianfeng Ma (Xidian University, China)
Zhenfu Cao (East China Normal University, China)
Renyi Xiao (National Natural Science Foundation of China)
Sheng Zhong (Nanjing University, China)
Xiaosheng Tan (360)
Hui Li (Xidian University)
Dawu Gu (Shanghai Jiao Tong University)
Xiaofeng Liao (Chongqing University)

ACM SIGSAC China TPC
Hui Li (Xidian University)  
Dawu Gu (Shanghai Jiao Tong University)
Xiaofeng Chen (Xidian University)              
Haojin Zhu (Shanghai Jiao Tong University)        
Min Yang (Fudan University)              
Zhiguang Qin (University of Electronic Science and Technology of China)               
Alex Liu (Nanjing University)                 
Wu Yang (Harbin Engineering University)  
Kefei Chen (Hangzhou Normal University)               
Zhen Ling (Southeast University)                 
Sheng Zhong (Nanjing University)              
Nenghai Yu (University of Science and Technology of China)        
Jian Weng (Jinan University)                   
Qingqi Pei (Xidian University)     
Fenghua Li (Institute of Information Engineering, Chinese Academy of Sciences)           
Xinyi Huang (Fujian Normal University)               
Jin Li (Guangzhou University)
Yulong Shen (Xidian University)     
Haixin Duan (Tsinghua University)                      
Yunlei Zhao (Fudan University)                        
Qian Wang (Wuhan University)                  
Jiajia Liu (Xidian University)       
Zhenfu Cao (East China Normal University)             
Limin Sun (Institute of Information Engineering, Chinese Academy of Sciences)                  
Weili Han (Fudan University)                       
Xiaosheng Tan (360)
Ye Wu (Baidu)                    
Qianhong Wu (Beihang University) 
Jing Chen (Wuhan University)                                  
Qi Li (Graduate School at Shenzhen, Tsinghua University)
Licheng Wang (BUPT)
Zhe Liu (Nanjing University of Aeronautics and Astronautics)
Chao Shen (Xi'an Jiao Tong University)
Zheli Liu (Nankai University)
Haibin Kan (Fudan University)
Jun Shao (Zhejiang Gongshang University)
Yu Yu (Shanghai Jiao Tong University)
Yuanyuan Zhang (Shanghai Jiao Tong University)
Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences)
Zhen Yang (Beijing University of Technology)
Xiaochun Cao (Chinese Academy of Sciences)
Tao Li (Sichuan University)
Mi Wen (Shanghai University of Electric Power)

 

TURC-SIGSAC’17 TPC Chair
Feifei Li (University of Utah, USA)
Haojin Zhu (Shanghai Jiao Tong University, China)

TURC-SIGSAC’17 Panel Chair
Weili Han (Fudan University, China)

TURC-SIGSAC’17 Industry Forum Chair
Min Yang (Fudan University, China)
Zhen Ling (Southeast University, China)

TURC-SIGSAC’17 Publicity Chair
Na Ruan (Shanghai Jiao Tong University, China)
Qi Li (Tsinghua University, China)
Yulong Fu (Xidian University, China)

TURC-SIGSAC’17 TPC Member
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Jie Yang (Florida State University)
Haixin Duan (Tsinghua University, China)
Weili Han (Fudan University, China)
Jin Li (Guangzhou University, China)
Xiaodong Lin (University of Ontario Institute of Technology, Canada)
Rongxing Lu (University of New Brunswick, Canada)
Di Ma (University of Michigan-Dearborn, USA)
Qian Wang (Wuhan University, China)
Jian Weng (Jinan University, China)
Qianhong Wu (Beijing University of Aeronautics & Astronautics, China)
Min Yang (Fudan University, China)
Yinqian Zhang (The Ohio State University, USA)
Xinyi Huang (Fujian Normal University, China)
Zhen Ling (Southeast University, China)
Yao Liu (South Florida University, USA)
Xinwen Fu (UMass Lowell, USA)
Ming Li (University of Arizona, USA)
Xiaofeng Chen (Xidian University, USA)
Licheng Wang (BUPT, China)
Xiaohui Liang (UMASS Boston, USA)
Rui Zhang (University of Delaware, USA)
Qi Li (Tsinghua University, China)
Xiaokui Xiao (NTU, Singapore)
Zonghua Zhang (Institut Mines-Télécom/TELECOM Lille, France)
Tao Xiang (Chongqing University, China)
Fei Chen (Shenzhen University, China)
Zhe Liu (University of Waterloo, Canada)
Chao Shen (Xi'an Jiao Tong University, China)
Yuanyuan Zhang (Shanghai Jiao Tong University, China)
Ye Wu (Baidu, China)