Conference Program Plan
Last updated on
September 26, 2023
Digital proceedings will be available from March 2024. You can find them here: https://link.springer.com/book/9783031505935
08:00-08:30
Registration
08:30-08:45
Welcome Statement by General and PC Co-Chairs (Hall 1.1)
08:45-10:00
Keynote (Hall 1.1)
Beyond “Zero Trust:” Selective High Assurance for Commodity Software Systems
Prof. Virgil D. Gligor
Prof. Virgil D. Gligor
10:00-10:20
Coffee Break
10:20-12:20
Crypto I (Track 1, Hall 1.1): P. de Perthuis
-
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
Jakub Klemsa (EURECOM), Yavuz Akın (EURECOM) and Melek Önen (EURECOM) -
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
Zhiyuan An (School of Computer Science and Engineering, Sun Yat-sen University), Haibo Tian (School of Computer Science and Engineering, Sun Yat-sen University), Chao Chen (School of Computer Science and Engineering, Sun Yat-sen University) and Fangguo Zhang (School of Computer Science and Engineering, Sun Yat-sen University) -
Threshold Fully Homomorphic Encryption over the Torus
Yukimasa Sugizaki (NEC Corporation), Hikaru Tsuchida (NEC Corporation), Takuya Hayashi (NEC Corporation), Koji Nuida (Kyushu University), Akira Nakashima (Kyushu University), Toshiyuki Isshiki (NEC Corporation) and Kengo Mori (NEC Corporation) -
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation
Qi Wang (Heilongjiang University), Haodong Huang (Heilongjiang University), Juyan Li (Heilongjiang University) and Qi Yuan (Qiqihar university) -
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Aysajan Abidin (imec-COSIC KU Leuven), Erik Pohle (imec-COSIC, KU Leuven) and Bart Preneel (imec-COSIC, KU Leuven) -
Code-Based Secret Handshake Scheme, Revisited
Minkyu Kim (National Security Research Institute) and Hyung Tae Lee (Chung-Ang University)
-
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy
Tianyu Li (Delft University of Technology), Li Xu (Delft University of Technology), Zekeriya Erkin (Delft University of Technology) and Reginald Lagendijk (Delft University of Technology) -
A User-centric Approach to API Delegations: Enforcing Privacy Policies on OAuth Delegation
Shirin Kalantari (KU Leuven), Pieter Philippaerts (KU Leuven), Yana Dimova (KU Leuven), Danny Hughes (KU Leuven), Wouter Joosen (KU Leuven) and Bart De Decker (KU Leuven) -
Mixnet Traffic Analysis by Adversaries with Partial Visibility
Iness Ben Guirat (KU Leuven), Claudia Diaz (KU Leuven), Karim Eldefrawy (SRI) and Hadas Zeilberger (Yale) -
Learning Markov Chain Models from Sequential Data under Local Differential Privacy
Efehan Guner (Koc University) and M. Emre Gursoy (Koc University) -
Achilles' Heels: vulnerable record identification in synthetic data publishing
Matthieu Meeus (Imperial College London), Florent Guepin (Imperial College London), Ana-Maria Cretu (Imperial College London) and Yves-Alexandre de Montjoye (Imperial College London) -
Enforcing the GDPR
François Hublet (ETH Zürich), David Basin (ETH Zürich) and Srdjan Krstic (ETH Zürich)
12:20-14:00
Lunch
14:00-15:40
Network, Web & Internet I (Track 1, Hall 1.1): F. Hublet
-
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers
Vik Vanderlinden (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven) and Mathy Vanhoef (imec-DistriNet, KU Leuven) -
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks
Radu Anghel (Delft University of Technology), Swaathi Vetrivel (Delft University of Technology), Elsa Turcios Rodriguez (Delft University of Technology), Kaichi Sameshima (Yokohama National University), Daisuke Makita (Yokohama National University/National Institute of Information and Communications Technology), Katsunari Yoshioka (Yokohama National University), Carlos Gañán (Delft University of Technology) and Yury Zhauniarovich (Delft University of Technology) -
Protocol Dialects as Formal Patterns
Daniel Galán (ETH Zurich), Víctor García (Universitat Politècnica de València), Santiago Escobar (Universitat Politècnica de València), Catherine Meadows (NRL) and Jose Meseguer (University of Illinois at Urbana-Champaign) -
ResolFuzz: Differential Fuzzing of DNS Resolvers
Jonas Bushart (CISPA Helmholtz Center for Information Security) and Christian Rossow (CISPA Helmholtz Center for Information Security) -
Fingerprinting of Cellular Infrastructure based on Broadcast Information
Anup Kiran Bhattacharjee (TU Delft), Stefano Cecconello (TU Delft), Fernando Kuipers (TU Delft) and Georgios Smaragdakis (TU Delft)
-
Layered Symbolic Security Analysis in DY*
Karthikeyan Bhargavan (INRIA Paris), Abhishek Bichhawat (IIT Gandhinagar), Pedram Hosseyni (University of Stuttgart), Ralf Küsters (University of Stuttgart), Klaas Pruiksma (University of Stuttgart), Guido Schmitz (Royal Holloway, University of London), Clara Waldmann (University of Stuttgart) and Tim Würtele (University of Stuttgart) -
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks
Daniel Weber (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Ruiyi Zhang (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security) -
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
Amit Cohen (Tel Aviv University) and Mahmood Sharif (Tel Aviv University) -
A Large-Scale Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Lukas Gerlach (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Robert Pietsch (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security) -
Reviving Meltdown 3a
Daniel Weber (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Ruiyi Zhang (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security)
15:40-16:00
Coffee Break
16:00-17:40
Network, Web & Internet II (Track 1, Hall 1.1): M. Asplund
-
One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
Konrad Wolsing (Fraunhofer FKIE / RWTH Aachen University), Dominik Kus (RWTH Aachen University), Eric Wagner (Fraunhofer FKIE / RWTH Aachen University), Jan Pennekamp (RWTH Aachen University), Klaus Wehrle (RWTH Aachen University) and Martin Henze (RWTH Aachen University / Fraunhofer FKIE) -
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
Md Nazmul Hoq (Concordia University), Jia Wei Yao (Concordia University), Suryadipta Majumdar (Concordia University), Luis Suárez (Ericsson Security Research), Lingyu Wang (Concordia University), Makan Pourzandi (Ericsson Security Research), Amine Boukhtouta (Ericsson Security Research) and Mourad Debbabi (Concordia University) -
PrivMail: A Privacy-Preserving Framework for Secure Emails
Gowri R Chandran (Technical University of Darmstadt), Raine Nieminen (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt) and Ajith Suresh (Technology Innovation Institute, Abu Dhabi) -
Towards Efficient Privacy-Preserving Deep Packet Inspection
Weicheng Wang (Purdue University), Hyunwoo Lee (Korea Institute of Energy Technology), Yan Huang (Indiana University Bloomington), Elisa Bertino (Purdue University) and Ninghui Li (Purdue University) -
Panini: Anonymous Anycast and an Instantiation
Christoph Coijanovic (KIT), Christiane Weis (NEC Laboratories Europe) and Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and CeTI, TU Dresden)
-
Tamarin-based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
Tristan Claverie (ANSSI, IRISA, CNRS, Univ. Rennes, INSA de Rennes,), Gildas Avoine (INSA de Rennes, Univ. Rennes, IRISA, CNRS), Stéphanie Delaune (Univ. Rennes, CNRS, IRISA) and José Lopes Esteves (ANSSI) -
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
Sowoong Kim (UNIST), Myeonggyun Han (UNIST) and Woongki Baek (UNIST) -
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
Tingting Rao (Huazhong University of Science and Technology), Yixin Su (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Yubo Zheng (Huazhong University of Science and Technology), Wei Wang (Huazhong University of Science and Technology) and Hai Jin (Huazhong University of Science and Technology) -
Attacking logo-based phishing website detectors with adversarial perturbations
Jehyun Lee (Trustwave), Zhe Xin (National University of Singapore), Melanie Pei See Ng (National University of Singapore), Kanav Sabharwal (National University of Singapore), Giovanni Apruzzese (University of Liechtenstein) and Dinil Mon Divakaran (Acronis Research) -
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication
Lin Li (Swinburne University of Technology), Chao Chen (RMIT University), Lei Pan (Deakin University), Yonghang Tai (Yunnan Normal University), Jun Zhang (Swinburne University of Technology) and Yang Xiang (Swinburne University of Technology)
17:45-19:45
Welcome Reception (The Hague Conference Centre)
-
Poster Session
During the welcome reception, there will be also a poster session in the THCC Foyer
08:00-08:45
Registration
08:45-10:00
Keynote (Hall 1.1)
Engineering Privacy Beyond the Paper
Dr. Carmela Troncoso
Dr. Carmela Troncoso
10:00-10:20
Coffee Break
10:20-12:20
Crypto II (Track 1, Hall 1.1): Z. Erkin
-
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
Feng Li (Xidian University), Jianfeng Ma (Xidian University), Yinbin Miao (Xidian University), Pengfei Wu (National University of Singapore) and Xiangfu Song (National University of Singapore) -
Password-Based Credentials with Security against Server Compromise
Dennis Dayanikli (Hasso-Plattner-Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam) -
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements
Marcel Tiepelt (Karlsruher Institut für Technologie), Edward Eaton (National Research Council Canada) and Douglas Stebila (University of Waterloo) -
Commitments and Efficient Zero-Knowledge Proofs from the Subset Sum Problems
Jules Maire (Sorbonne Université) and Damien Vergnaud (Sorbonne Université) -
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations
Carmen Wabartha (University of Stuttgart), Julian Liedtke (University of Stuttgart), Nicolas Huber (University of Stuttgart), Daniel Rausch (University of Stuttgart) and Ralf Küsters (University of Stuttgart) -
An Ultra-High Throughput AES-based Authenticated Encryption Scheme for 6G: Design and Implementation
Ravi Anand (University of Hyogo, Kobe, Japan), Subhadeep Banik (Universita della Svizzera Italiana, Lugano, Switzerland), Andrea Caforio (Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland), Kazuhide Fukushima (KDDI Research, Inc., Saitama, Japan), Takanori Isobe (University of Hyogo, Kobe, Japan), Shisaku Kiyomoto (KDDI Research, Inc., Saitama, Japan), Fukang Liu (University of Hyogo, Kobe, Japan), Yuto Nakano (KDDI Research, Inc., Saitama, Japan), Kosei Sakamoto (University of Hyogo, Kobe, Japan) and Nobuyuki Takeuchi (University of Hyogo, Kobe, Japan)
-
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models
Bipin Paudel (Kansas State University) and George Amariucai (Kansas State University) -
Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
Yunlong Mao (Nanjing University), Zexi Xin (Nanjing University), Zhenyu Li (University of California San Diego), Jue Hong (Baidu), Qingyou Yang (Baidu) and Sheng Zhong (Nanjing University) -
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning
Maria Rigaki (Czech Tecnical University in Prague) and Sebastián García (Stratosphere Lab, AIC Group, Department of Computer Science, Czech Technical University) -
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models
Younghan Lee (Seoul National University), Yungi Cho (Seoul National University), Woorim Han (Seoul National University), Ho Bae (Ewha Woman's University) and Yunheung Paek (Seoul National University) -
Machine Learning for SAST: A Lightweight and Adaptable Approach
Lorenz Hüther (University of Bremen), Karsten Sohr (University of Bremen), Bernhard J. Berger (Hamburg University of Technology), Hendrik Rothe (Team Neusta GmbH) and Stefan Edelkamp (Czech Technical University in Prague) -
Two Models are Better than One: Federated Learning Is Not Private For Google GBoard Next Word Prediction
Mohamed Suliman (Trinity College Dublin, The University of Dublin) and Douglas Leith (Trinity College Dublin, The University of Dublin)
12:20-14:00
Lunch
14:00-15:40
Blockchain (Track 1, Hall 1.1): V. Gramoli
-
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu (Cryptape Co. Ltd) and Ren Zhang (Cryptape Co. Ltd. and Nervos) -
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Shaoyu Li (Virginia Polytechnic Institute and State University), Shanghao Shi (Virginia Polytechnic Institute and State University), Yang Xiao (University of Kentucky), Chaoyu Zhang (Virginia Polytechnic Institute and State University), Y. Thomas Hou (Virginia Polytechnic Institute and State University) and Wenjing Lou (Virginia Polytechnic Institute and State University) -
Syntax-Aware Mutation for Testing the Solidity Compiler
Charalambos Mitropoulos (Technical University of Crete), Thodoris Sotiropoulos (ETH Zurich), Sotiris Ioannidis (Technical University of Crete) and Dimitris Mitropoulos (National and Kapodistrian University of Athens) -
Efficient Transparent Polynomial Commitments for zk-SNARKs
Sungwook Kim (Department of Information Security, Seoul Women's University), Seongju Kim (Zkrypto Inc.), Yurim Shin (Hanyang University), Sunmi Kim (Hanyang University), Jihye Kim (KOOKMIN UNIVERSITY) and Hyunok Oh (Hanyang University) -
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi
Jianhuan Wang (The Hong Kong Polytechnic University), Jichen Li (Peking University), Zecheng Li (The Hong Kong Polytechnic University), Xiaotie Deng (Peking University) and Bin Xiao (The Hong Kong Polytechnic University)
-
Privacy-Preserving Split Learning via Pareto Optimal Search
Xi Yu (Shanghai Jiao Tong University), Liyao Xiang (Shanghai Jiao Tong University), Shiming Wang (Shanghai Jiao Tong University) and Chengnian Long (Shanghai Jiao Tong University) -
Security of NVMe Offloaded Data in Large-Scale Machine Learning
Torsten Krauß (University of Würzburg), Raphael Götz (University of Würzburg) and Alexandra Dmitrienko (University of Würzburg) -
PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Javier Rando (ETH Zurich and New York University), Briland Hitaj (SRI International) and Fernando Perez-Cruz (ETH Zurich and Swiss Data Science Center) -
Learning Type Inference for Enhanced Dataflow Analysis
Lukas Seidel (QwietAI), Sedick David Baker Effendi (Stellenbosch University), Xavier Pinho (QwietAI), Konrad Rieck (TU Berlin), Brink van der Merwe (Stellenbosch University) and Fabian Yamaguchi (QwietAI) -
Efficient Pruning for Machine Learning under Homomorphic Encryption
Ehud Aharoni (Machine-Learning group HRL IBM), Moran Baruch (IBM Research), Pradip Bose (IBM), Alper Buyuktosunoglu (IBM), Nir Drucker (IBM Research - Israel), Subhankar Pal (IBM Research), Tomer Pelleg (IBM Research), Kanthi Sarpatwar (IBM), Hayim Shaul (IBM Research - Israel), Omri Soceanu (IBM) and Roman Vaculín (IBM)
15:40-16:00
Coffee Break
16:00-17:40
Network, Web & Internet III (Track 1, Hall 1.1): G. Smaragdakis
-
Curveball+: Exploring Curveball-like Vulnerabilities of Implicit Certificates Validation
Yajun Teng (Institute of Information Engineering), Wei Wang (Institute of Information Engineering), Jun Shao (Zhejiang Gongshang University), Huiqing Wan (Institute of Information Engineering), Heqing Huang (Institute of Information Engineering), Yong Liu (Qi An Xin Technology Group Inc.) and Jingqiang Lin (University of Science and Technology of China) -
Malware classification using Open Set Recognition and HTTP protocol requests
Piotr Białczak (CERT Polska-NASK - National Research Institute/Warsaw University of Technology) and Wojciech Mazurczyk (Institute of Computer Science, Warsaw University of Technology) -
Static Semantics Reconstruction for JavaScript-WebAssembly Multilingual Malware Detection
Yifan Xia (Zhejiang University), Ping He (Zhejiang University), Xuhong Zhang (Zhejiang University), Peiyu Liu (Zhejiang University), Shouling Ji (Zhejiang University) and Wenhai Wang (Zhejiang University) -
A New Model for Testing IPv6 Fragment Handling
Edoardo Di Paolo (Sapienza University of Rome), Enrico Bassetti (Sapienza University of Rome) and Angelo Spognardi (Dipartimento di Informatica, Sapienza Università di Roma)
-
Exploring genomic sequence alignment for improving side-channel analysis
Heitor Uchoa (University of Twente), Vipul Arora (Riscure B.V.), Dennis Vermoen (Riscure B.V.), Marco Ottavi (University of Twente) and Nikolaos Alachiotis (University of Twente) -
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt (University of Stuttgart), Pedram Hosseyni (University of Stuttgart), Ralf Küsters (University of Stuttgart), Klaas Pruiksma (University of Stuttgart), Clara Waldmann (University of Stuttgart) and Tim Würtele (University of Stuttgart) -
Everlasting ROBOT: the Marvin Attack
Hubert Kario (Red Hat Inc.) -
The Achilles Heel of JWT: Key Management Vulnerability Detection in JWT Applications
Bowen Xu (Institute of Information Engineering, Chinese Academy of Sciences), Shijie Jia (Institute of Information Engineering,Chinese Academy of Sciences), Jingqiang Lin (School of Cyber Security, University of Science and Technology of China), Fangyu Zheng (Institute of Information Engineering, Chinese Academy of Sciences), Yuan Ma (Institute of Information Engineering, Chinese Academy of Sciences), Limin Liu (Institute of Information Engineering, Chinese Academy of Sciences), Xiaozhuo Gu (Institute of Information Engineering, Chinese Academy of Sciences) and Li Song (Institute of Information Engineering, Chinese Academy of Sciences)
17:45-21:30
Social Event
- 17:40: Gathering for transfer
- 17:45-18:15: Transfer from the venue to Madurodam The Hague
- 18:15-19:15: Visit Madurodam The Hague
- 19:15-21:30: Social dinner at the restaraunt at Madurodam The Hague
- 21:30-22:00: Transfer back to the THCC
08:00-08:45
Registration
08:45-10:00
Keynote (Hall 1.1)
What's up with All the Fuzz?
Dr. Mathias Payer
Dr. Mathias Payer
10:00-10:20
Coffee Break
10:20-12:20
Crypto III (Track 1, Hall 1.1): J. Klemsa
-
Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
Lin Zhu (Huazhong University of Science and Technology), Qiang-Sheng Hua (Huazhong University of Science and Technology), Yi Chen (Huazhong University of Science and Technology) and Hai Jin (Huazhong University of Science and Technology) -
Sequential Half-Aggregation of Lattice-Based Signatures
Katharina Boudgoust (Aarhus University) and Akira Takahashi (University of Edinburgh) -
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems
Ivan De Oliveira Nunes (Rochester Institute of Technology), Peter Rindal (Visa Research) and Maliheh Shirvanian (Netflix) -
Optimally-Fair Multi-Party Exchange without Trusted Parties
Ivo Maffei (University of Oxford) and Bill Roscoe (University of Oxford) -
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain
Tae Min Ahn (Korea University, School of Cybersecurity), Kang Hoon Lee (Korea University, School of Cybersecurity), Joon Soo Yoo (Korea University, School of Cybersecurity) and Ji Won Yoon (Korea University, School of Cybersecurity) -
Practical Randomized Lattice Gadget Decomposition With Application to FHE
Sohyun Jeon (Ewha Womans University), Hyang-Sook Lee (Ewha Womans University) and Jeongeun Park (KU Leuven)
-
A Tale of Reduction, Security and Correctness: Evaluating Program Debloating Paradigms and Their Compositions
Muaz Ali (University of Arizona), Muhammad Muzammil (Stony Brook University), Faraz Karim (Georgia Institute of Technology), Ayesha Naeem (Boston University), Rukhshan Haroon (Tufts University), Muhammad Haris (LUMS), Huzaifa Nadeem (University of Pittsburgh), Waseem Sabir (LUMS), Fahad Shaon (Data Security Technologies), Fareed Zaffar (LUMS), Vinod Yegneswaran (SRI International), Ashish Gehani (SRI International) and Sazzadur Rahaman (University of Arizona) -
On the (In)Feasibility of Manufacturer-provided Remote Attestation Frameworks in Android
Ziyi Zhou (Shanghai Jiao Tong University), Xuangan Xiao (Shanghai Jiao Tong University), Tianxiao Hou (Shanghai Jiao Tong University), Yikun Hu (Shanghai Jiao Tong University) and Dawu Gu (Shanghai Jiao Tong University) -
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised IoT Devices
Zhe Chen (Singapore Management University), Haiqing Qiu (Singapore Management University) and Xuhua Ding (SMU) -
SPLITS: Split Input-to-State Mapping for Effective Firmware Fuzzing
Guy Farrelly (University of Adelaide), Paul Quirk (DSTG), Salil S Kanhere (UNSW), Seyit Camtepe (CSIRO Data61) and Damith C. Ranasinghe (University of Adelaide) -
µIPS: Software-Based Intrusion Prevention for Bare-metal Embedded Systems
Luca Degani (University of Trento), Majid Salehi (imec-Distrinet, Nokia Bell Labs), Fabio Martinelli (Istituto di Informatica e Telematica - Consiglio Nazionale delle Ricerche) and Bruno Crispo (University of Trento) -
Aion: Secure Transaction Ordering using TEEs
Pouriya Zarbafian (University of Sydney) and Vincent Gramoli (University of Sydney).
12:20-14:00
Lunch
14:00-15:40
Crypto IV (Track 1, Hall 1.1): K. Liang
-
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
Théophile Brézot (Cosmian), Paola de Perthuis (DIENS, École Normale Supérieure, CNRS, Inria, PSL University, Paris, France, and Cosmian, Paris, France.) and David Pointcheval (CNRS/ENS/INRIA) -
Committed Private Information Retrieval
Quang Cao (RMIT University), Hong Yen Tran (RMIT University), Son Hoang Dau (RMIT University), Xun Yi (RMIT University), Emanuele Viterbo (Monash University), Chen Feng (The University of British Columbia, Okanagan Campus), Yu-Chih Huang (National Yang Ming Chiao Tung University), Jingge Zhu (The University of Melbourne), Stanislav Kruglik (Nanyang Technological University) and Han Mao Kiah (Nanyang Technological University) -
Two-Message Authenticated Key Exchange from Public-Key Encryption
You Lyu (Shanghai Jiao Tong University) and Shengli Liu (Shanghai Jiao Tong University) -
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
Jules Maire (Sorbonne Université) and Damien Vergnaud (Sorbonne Université) -
Scaling Mobile Private Contact Discovery to Billions of Users
Laura Hetz (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt) and Christian Weinert (Royal Holloway, University of London)
-
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations
Xavier Boyen (QUT) and Qinyi Li (Griffith University) -
Item-Oriented Personalized LDP for Discrete Distribution Estimation
Xin Li (School of Computer Science and Technology, Huazhong University of Science and Technology), Hong Zhu (School of Computer Science and Technology, Huazhong University of Science and Technology), Zhiqiang Zhang (School of Computer Science and Technology, Huazhong University of Science and Technology) and Meiyi Xie (School of Computer Science and Technology, Huazhong University of Science and Technology) -
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference
Mengfei Ren (University of Texas at Arlington), Haotian Zhang (University of Texas at Arlington), Xiaolei Ren (University of Texas at Arlington), Jiang Ming (Tulane University) and Yu Lei (University of Texas at Arlington) -
FSmell: Recognizing Inline Function in Binary Code
Wei Lin (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of Information Engineering, Chinese Academy of Sciences), Jiawei Yin (Institute of Information Engineering, Chinese Academy of Sciences), Xiangyu Zuo (Institute of Information Engineering, Chinese Academy of Sciences), Rongqing Wang (Institute of Information Engineering, Chinese Academy of Sciences) and Xiaorui Gong (Institute of Information Engineering, Chinese Academy of Sciences) -
LFuzz: Exploiting Locality-enabled Techniques for File-system Fuzzing
Wenqing Liu (Florida State University) and An-I Andy Wang (Florida State University)
15:40-16:00
Coffee Break
16:00-17:40
Miscellaneous (Track 1, Hall 1.1): Y. Zhauniarovich
-
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabbaninejad (Tampere university), Behzad Abdolmaleki (Max Planck Institute for Security and Privacy), Giulio Malavolta (Max Planck Institute for Security and Privacy), Antonis Michalas (Tampere University) and Amir Nabizadeh (Independent Researcher) -
Secure Approximate Nearest Neighbor Search with Locality-sensitive Hashing
Shang Song (National University of Defense Technology), Lin Liu (National University of Defense Technology), Rongmao Chen (National University of Defense Technology), Wei Peng (National University of Defense Technology) and Yi Wang (National University of Defense Technology) -
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Ofir Cohen (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel), Ron Bitton (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel), Asaf Shabtai (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel) and Rami Puzis (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel) -
Tactics for Account Access Graphs
Luca Arnaboldi (University of Birmingham), David Aspinall (University of Edinburgh), Christina Kolb (University of Edinburgh) and Sasa Radomirovic (University of Surrey) -
Machine-Checked Proofs of Accountability: How to sElect who is to Blame
Constantin Catalin Dragan (University of Surrey), François Dupressoir (University of Bristol), Kristian Gjøsteen (Norwegian University of Science and Technology), Thomas Haines (Australian National University), Peter B. Rønne (CNRS, LORIA, Université de Lorraine) and Morten Rotvold Solberg (Norwegian University of Science and Technology)
-
Towards a Privacy-preserving Attestation for Virtualized Networks
Ghada Arfaoui (Orange), Thibaut Jacques (Orange / XLIM, University of Limoges), Marc-Antoine Lacoste (Orange), Cristina Onete (XLIM, University of Limoges) and Leo Robert (XLIM, University of Limoges) -
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection
Yuejun Guo (Luxembourg Institute of Science and Technology), Qiang Hu (University of Luxembourg), Qiang Tang (Luxembourg Institute of Science and Technology) and Yves Le Traon (University of Luxembourg) -
AttnCall: Refining Indirect Call Targets in Binaries with Attention
Rui Sun (State Key Laboratory for Novel Software Technology, Nanjing University), Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University), Zicheng Wang (State Key Laboratory for Novel Software Technology, Nanjing University) and Qingkai Zeng (State Key Laboratory for Novel Software Technology, Nanjing University) -
Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements
Selasi Kwashie (CSIRO Data61), Wei Kang (CSIRO Data61), Sandeep Santhosh Kumar (CSIRO Data61), Geoff Jarrad (CSIRO Data61), Seyit Camtepe (CSIRO Data61) and Surya Nepal (CSIRO Data61)
17:40-18:00
Conference Closing Remarks (Hall 1.1)
08:00-08:45
Registration
09:00-12:30
12:30-13:30
Lunch
13:30-17:00
17:00-19:00
Networking Drinks
08:00-08:45
Registration
09:00-12:30
12:30-13:30
Lunch
13:30-17:00
Workshops
- Industrial track (Hall 1.1)
- SECAI (Hall 1.4)
- WASP (Hall 1.6)
- SecAssure (Hall 1.9)