About EISA 2021

With recent evolution of adversarial techniques, intrusions have become more complex that may threaten the security of various assets regarding information and applications. In addition, coordinated intrusions like worm outbreak can continue to be a major threat to information, system and network security in the near future. The popularity of Internet may generate a large volume of different types of sensitive information. Therefore, there is a need for emerging techniques, theories and applications to protect information and practical security.

The Second International Symposium on Emerging Information Security and Applications (EISA) aims to provide a platform for researchers and practitioners across the world to exchange their ideas. It seeks original submissions that discuss practical or theoretical solutions to enhance the information and application security in practice.

A best paper award will be granted to the qualified papers.

Good quality papers will be invited to journal special issues: Wireless Communications and Mobile Computing, Connection Science, Sensors, Electronic, International Journal of Network Management, and International Journal of Information Security


-------------------------------------

Topics of interest include, but are not limited to the ones listed below.

- Cyber intelligence techniques
- Multimedia security
- Malware and unwanted software
- Vulnerability analysis and reverse engineering
- Usable security and privacy
- Intrusion detection and prevention
- Authentication and access control
- Anonymity and privacy
- Cryptographic protection
- Digital forensics
- Cyber physical systems security
- Adversarial learning
- Security measurement
- Security management and policies
- Hardware and physical security

-------------------------------------
Important Dates:
Submission Deadline: 1 May 15 May, 2021 (23:59 AoE)
Acceptance Notification: 15 June, 2021
Camera Ready: 30 June, 2021

Conference dates: 25-26 August, 2021
-------------------------------------

For questions, please contact us at:
eisa2021@easychair.org.


Organized by:

Technical University of Denmark, Denmark

Norwegian Center for Cybersecurity in Critical Sectors, Norway

Central China Normal University, China

News & Updates

30 April, 2021   The deadline of EISA 2021 has been extended to 15 May.

18 April, 2021   EISA 2021 will be published in Springer CCIS. A best paper award will be granted.

10 March, 2021   EISA 2021 website is online.

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Assistant Professor Sherman S. M. Chow
Affiliation: The Chinese University of Hong Kong
Title: Password-Hardening Services

Learn More

Abstract

Password remains the most widespread means of authentication, especially on the Internet. As such, it is the Achilles heel of many modern systems. We witnessed the trend of recurring breaches where (salted) password databases get stolen. This is disastrous as low-entropy passwords can be guessed by brute-force attacks easily. Facebook pioneered using a cryptographic server to harden password-based authentication. We call it password-hardening (PH) service. The crypto server serves as a helper in the validation process and as a rate-limiter to thwart online dictionary attack. We first show that the PH scheme of Schneider et al. (ACM CCS '16) is vulnerable to offline attacks just after a single validation query. We then suggest stronger security definitions, and an even more efficient construction, Phoenix, to achieve them. It can handle up to three times more than Pythia (USENIX Security '15), the first and the only solution remains secure before our work. PH only provides user-authentication but cannot provide confidentiality of sensitive user data (e.g., credit card number for an e-commerce site). Although encryption somewhat alleviates the problem, decryption is often needed for utility, and keeping the decryption key within reach is obviously dangerous. To address this seemingly unavoidable problem, we propose the notion of password-hardened encryption (PHE). PHE inherits the security features of PH, in particular, the crypto rate-limiter learns neither the password nor the sensitive data, while validating the password and helping in decryption. More importantly, both the crypto rate-limiter and the crypto-service client can rotate their secret keys, providing a proactive security mechanism mandated by the Payment Card Industry Data Security Standard. We build an extremely simple PHE which can handle more than 525 encryption and (successful) decryption requests per second per core on a 10-core Intel Xeon E5-2640 CPU. This talk is based on two papers appeared in USENIX Security 2017 and 2018.


Professor Robert Deng
Affiliation: Singapore Management University
Title: A User Centric and Layered Approach to Mobile Security

Learn More

Abstract

Mobile computing has become a fundamental feature in the lives of billions of people, who have developed an unprecedented reliance on smart phones and tablets compared to any previous computing technology. With the trend of bring your own device, mobile devices are increasingly used to access and store sensitive corporate information as well. However, not only mobile devices and applications present a unique set of risks to personal privacy, they also pose new security challenges to enterprise information systems. This talk will provide an overview of the research activities conducted in the Secure Mobile Center at the Singapore Management University, from techniques to fortifying mobile platforms with a user centric trust anchor, mobile malware analysis, detection and containment, secure and usable schemes for local and remote authentication, to scalable and efficient access control of encrypted data in the cloud for mobile users whose devices are constrained in both power and computation capabilities.


Professor Shin’ichiro Matsuo
Affiliation: Georgetown University
Title: Era of Elusiveness in Security and Privacy

Learn More

Abstract

When we think about security and privacy, we try and tend to establish a consistent model to design and evaluate technologies. Such a model helps understandings of problems, development of theory and technologies over the same common ground. Thus, we believe that creating a concrete model and goal for a kind of technologies are required to achieve enough security and privacy. Recent progress of application protocol raises a question to such a style of security research. Bitcoin, a protocol proposed in an anonymous paper without a consistent model and peer review, realizes unexpected economic impacts than other cryptographic protocols. The protocol is a beautiful combination of many different kinds of theoretical backgrounds; hence, the reverse-engineering to produce a consistent model is hard, and there are no successful attempts to obtain it. Beyond Bitcoin, blockchain is expected to be used for broad applications than payment in Bitcoin. For those wide ranges of applications, we need to deal with additional many uncertain factors to evaluate security and privacy of blockchain based systems, over the bitcoin which still lacks a consistent model. System model, trust model and decentralization, security assumptions, and performance requirements are in a trade-off relationship. Designers of each blockchain based system deal with elusive and non-static security and privacy model. In this keynote, I will show how bitcoin and blockchain give a new perspective to analyze the nature of these protocols, and what is needed for security researchers to deal with practical but elusive technologies.


Professor Kui Ren
Affiliation: Zhejiang University

Title: Attributing Pictures to Smartphones via Camera Fingerprinting

Learn More

Abstract

Today society faces numerous data leakage incidents, which affect users?privacy more severe than ever. Existing user authentication practices based on traditional cryptography and biometric techniques have become largely insufficient, if not ineffective, as we move into the AI and IoT era. In order to address this challenge, smartphones have been widely explored by both academia and industry as a readily available possession device of the users. In this talk, we explore the technique of camera fingerprinting to develop a brand-new hardware-rooted smartphone authentication mechanism. Various security issues underlying the proposed authentication mechanism are discussed in-depth. The usability of the proposed solution is also demonstrated through real-world experiments.


Professor Mark Ryan
Affiliation: University of Birmingham
Title: Security of machine learning

Learn More

Abstract

Machine learning has achieved impressive results in a wide variety of computing problems, including computer vision, speech recognition, content filtering, anomaly detection, and competitive game playing. However, the models in machine learning are often insecure, both from a confidentiality and an integrity point of view. In a confidentiality compromise, say involving a machine learning model mapping symptoms to disease diagnosis, an attacker could extract from the model data about specific individuals used in its training. Integrity compromises include the possibility that an attacker subtly alters query data, for example by modifying the pixel values of an image in ways that can't be detected by a human viewer, in order to achieve a particular result. The talk will introduce machine learning, and review existing attacks and defences concerning its security. Plenty of examples and intuitions will be given.

Call For Papers       CFP Download

The International Symposium on Emerging Information Security and Applications (EISA) aims to provide a platform for researchers and practitioners across the world to exchange their ideas. It seeks original submissions that discuss practical or theoretical solutions to enhance the information and application security in practice.

-------------------------------------

Topics of interest include, but are not limited to the ones listed below.

- Cyber intelligence techniques
- Multimedia security
- Malware and unwanted software
- Vulnerability analysis and reverse engineering
- Usable security and privacy
- Intrusion detection and prevention
- Authentication and access control
- Anonymity and privacy
- Cryptographic protection
- Digital forensics
- Cyber physical systems security
- Adversarial learning
- Security measurement
- Security management and policies
- Hardware and physical security

Important Dates

Submission Deadline 1 May 15 May, 2021 (23:59 AoE)
Acceptance Notification 15 June, 2021
Camera-ready Copy Due 30 June, 2021
Conference 25-26 August, 2021

Author Instructions

Authors are invited to submit original papers. All papers need to be submitted electronically through the website (https://easychair.org/conferences/?conf=eisa2021) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 18 pages (or up to 20 pages with the pages over length charge) in Springer LNCS/CCIS format (https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines), including tables, figures, references and appendices. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Submissions do not need to be anonymous. A best paper award will be granted.

EISA 2021 Submission Link

We are pleased to announce that the proceeding will be published by Springer (CCIS Proceedings). Auther instructions and LaTeX/Word templates for LNCS/CCIS publications can be found via the following link.

Springer LNCS/CCIS Author Information

Journal Special Issues

Selected papers from EISA 2021 will be invited to consider submission (after significant extension) for special issues:


Wireless Communications and Mobile Computing
Special Issue on Blockchain in Wireless Communications and Computing: Security Threats and Applications
Learn more
Connection Science
Special Issue on Advanced Security on Software and Systems
Learn more
Sensors
Security, Trust and Privacy in New Computing Environments
Learn more
Electronic
Design of Intelligent Intrusion Detection Systems
Learn more
International Journal of Network Management
Security and Trust on Networked Systems
Learn more
International Journal of Information Security
CPS Security
Learn more

Organising Committee

Steering Committee

Jiageng Chen, Central China Normal University, China
Liqun Chen, University of Surrey, UK
Steven Furnell, University of Plymouth, UK
Anthony TS Ho, University of Surrey, UK
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway
Javier Lopez, University of Malaga, Spain
Weizhi Meng, Technical University of Denmark, Denmark

General Chairs

Liqun Chen, University of Surrey, UK
Jiageng Chen, Central China Normal University, China

Program Chairs

Weizhi Meng, Technical University of Denmark, Denmark
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway

Publicity Chairs

Stefanos Gritzalis, University of Piraeus, Greece

Publication Chair

Wenjuan Li, Hong Kong Polytechnic University, China

Program Committee

Hiroaki Anada, University of Nagasaki, Japan
Raja Naeem Akram, University of Aberdeen, UK
Javier Parra Arnau, Karlsruhe Institute of Technology, Germany
Muhammad Rizwan Asghar, The University of Auckland, New Zealand
Maria Bada, University of Cambridge, UK
Joonsang Baek, University of Wollongong, Australia
Gergely Biczok, Budapest University of Technology and Economics, Hungary
Francesco Buccafurri, University of Reggio Calabria, Italy
Xiaofeng Chen, Xidian University, China
Jiageng Chen, Central China Normal University, China
Chen-Mou Cheng, Kanazawa University, Japan
Bernardo David, IT University of Copenhagen, Denmark
Changyu Dong, Newcastle University, UK
Csilla Farkas, University of Southern California, USA
Yunhe Feng, University of Washington, USA
Stefanos Gritzalis, University of Piraeus, Greece
Debasis Giri, Maulana Abul Kalam Azad University of Technology, India
Debiao He, Wuhan University, China
Shoichi Hirose, University of Fukui, Japan
Julian Jang-Jaccard, Massey University, New Zealand
Qi Jiang, Xidian University, China
Romain Laborde, University Paul Sabatier, France
Costas Lambrinoudakis, University of Piraeus, Greece
Albert Levi, Sabanci University, USA
Wenjuan Li, Hong Kong Polytechnic University, China
Qi Lin, The University of New South Wales, Australia
Giovanni Livraga, University of Milan, Italy
Leonardo Maccari, University of Venice, Italy
Mohammad Mamun, National Research Council, Canada
Sjouke Mauw, University of Luxembourg, Luxembourg
Weizhi Meng, Technical University of Denmark, Denmark
Mehrdad Nojoumian, Florida Atlantic University, USA
Chandrasekaran Pandurangan, Indian Institute of Technology, India
Davy Preuveneers, Katholieke Universiteit Leuven, Belgium
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Jun Shao, Zhejiang Gongshang University, China
Spiros Skiadopoulos, University of Peloponnese, Greece
Ketil Stoelen, SINTEF, Norway
Chunhua Su, University of Aizu, Japan
Gang Tan, The Pennsylvania State University, USA
Je Sen Teh, Universiti Sains Malaysia, Malaysia
Andreas Veneris, University of Toronto, Canada
Hao Wang, Shandong Normal University, China
Haoyu Wang, Beijing University of Posts and Telecommunications, China
Licheng Wang, Beijing University of Posts and Telecommunications, China
Qionghong Wu, Beihang University, China
Zhe Xia, Wuhan University of Technology, China
Kuo-Hui Yeh, National Dong Hwa University, Taiwan
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia

Accepted Papers

 Conference Schedule


TBA

Registration Information

Registration payment is required by 25 July 2021 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee will result in the exclusion of the papers from the Conference Proceedings. (The registration link will be available soon)

Registration Fee

Registration Type Registration Fee (in DKK)
Author Registration1500 DKK (195 EUR)
Participant Registration100 DKK (13 EUR)

Venue

EISA 2020 will be held associate with SpaCCS 2020 at Nanjing Golden Eagle Shangmei Hotel (No. 1688 Shuanglong Avenue, Jiangning District, Nanjing).

Location

Address: No. 1688 Shuanglong Avenue, Jiangning District, Nanjing, China.

Information on Visa Applications

All participants of ISPEC2018 should be very careful about visa requirements and should make travel plan in advance enough. Visitors are fully responsible for acquiring all documents needed for entering Japan.

Japan provides waiver of visa requirements with more than 60 countries and regions. Please refer to the recent status on the visa waiver program from the Ministry of Foreign Affairs of Japan (MOFA).

If you need a visa for attendance, you should prepare all required documents according to the visa information page by MOFA. If you have any questions, please contact diplomatic establishments of Japan in your residential area.

We will issue an invitation letter ONLY for those who have presentation(s) at ISPEC2018 upon request. If you need an invitation letter for visa application, please send the following documents to
(ispec2018-visa *at* ml.cc.tsukuba.ac.jp)
(please replace *at* with @.)
after paying the registration fee via ISPEC2018 website and fixing your accommodation during the conference. (You can download a copy of participation information sheet and schedules of stay sheet from here.)

  • Filled participation information sheet for invitation letter (MS-word and PDF format).
  • Photo-copy of your passport (PDF format). (The page which your photo and passport number are included.)
  • Photo-copy of student identification card (PDF format), if you are student. (The page(s) which your photo, name, and ID number are included.)
  • Photo-copy of employee identification card (PDF format), if you are an employee. (The page(s) which your photo, name, and ID number are included.)
  • Filled schedules of your stay sheet (MS-word or PDF format) with a proof of your stay (e.g., a confirmation e-mail, a receipt or an invoice from your accommodation).


We will respond with a detailed procedure for invitation letter request. Please make sure to make a registration for ISPEC2018 before the request.

Notices:

  • Visa application to MOFA may take a long time. Please do it well before the deadline!
  • We will normally respond to the first request in a few days.
  • After receiving all required information, we will normally handle your requests in 1 or 2 weeks and the letter will be sent by a postal mail.
  • We do not issue any form of "a letter of guarantee"
  • We will issue invitation letters only for those who have presentation(s) at ISPEC2018.
  • We hold rights to request any additional information and/or to decline your application for invitation letters.
  • In case you need a document to be submitted to your organization prior to applying Visa, just let us know immediately.
  • Registration cannot be cancelled once the Visa application related documents have been sent out to you.

About privacy:

According to the Act on the Protection of Personal Information Held by Independent Administrative Agencies and others of Japan, the information submitted to ISPEC2018 in this page will be kept secret and used only for processing the invitation letter requests. In some cases, ISPEC2018 will share those information with a part of organizing committee members concerned for resolving issues (e.g. checking registration status and paper acceptance etc.). We will not use any information received for other purposes, except those required by laws and rules of Japan.


If you have any question, please contact: ispec2018-info@ml.cc.tsukuba.ac.jp

LNCS Technical Univesity of Denmark NTNU CCNU CCNU