
Tuesday
Take a look at the programme details for Tuesday 15 September.
Programme details
Track A
09:00–11:05: Software security II, chaired by Fengwei Zhang
- Similarity of Binaries across Optimization Levels and Obfuscations
- Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv, Bin Lv and Weiqing Huang
- Abstract presentation
- Full presentation
- HART: Hardware-assisted Kernel Module Tracing on Arm
- Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing and Bing Mao
- Abstract presentation
- Full presentation
- Zipper Stack: Shadow Stacks Without Shadow
- Jinfeng Li, Liwei Chen, Qizhen Xu, Gang Shi, Kai Chen and Dan Meng
- Abstract presentation
- Full presentation
- Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening
- Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue and Zhengmin Yu
- Abstract presentation
- Full presentation
- LegIoT: Ledgered Trust Management Platform for IoT
- Jens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser and Ahmad-Reza Sadeghi
- Abstract presentation
- Full presentation
11:25–13:05: Machine learning security I, chaired by Leandros Maglaras
- PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
- Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen and Ryan Ko
- Abstract presentation
- Full presentation
- An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference
- Liyan Shen, Chen Xiaojun, Jinqiao Shi, Ye Dong and Binxing Fang
- Abstract presentation
- Full presentation
- Deep Learning Side-Channel Analysis on Large-Scale Traces–A Case Study on a Polymorphic AES
- Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas and Laurent Maingault
- Abstract presentation
- Full presentation
- Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems
- Yihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten and Nianfeng Tzeng
- Abstract presentation
- "Full presentation"
13:20–13:40: IBM lunch break talk
- Title: Diffprivlib – A general-purpose library for experimenting, investigating and developing applications in differential privacy.
- Presenter: Naoise Holohan - Research Staff Member, Privacy and Security at IBM Research
14:05–15:05: Keynote II from Rebecca Wright, chaired by Ninghui Li
Full presentation
15:25–17:05: Machine learning security II, chaired by Frédéric Cuppens
- Data Poisoning Attacks Against Federated Learning Systems
- Vale Tolpegin, Stacey Truex, M. Emre Gursoy and Ling Liu
- Abstract presentation
- Full presentation
- Interpretable Probabilistic Password Strength Meters via Deep Learning
- Dario Pasquini, Giuseppe Ateniese and Massimo Bernaschi
- Abstract presentation
- Full presentation
- Polisma–A Framework for Learning Attribute-based Access Control Policies
- Amani Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin Calo and Dinesh Verma
- Abstract presentation
- Full presentation
- A Framework for Evaluating Client Privacy Leakages in Federated Learning
- Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex and Yanzhao Wu
- Abstract presentation
- Full presentation
Track B
09:00–11:05: Post-quantum cryptography, chaired by Dung Duong
- Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
- Sebastian Paul and Patrik Scheible
- Abstract presentation
- Full presentation
- CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
- Zhuoran Zhang, Fangguo Zhang and Haibo Tian
- Abstract presentation
- Full presentation
- A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
- Xavier Boyen, Thomas Haines and Johannes Mueller
- Abstract presentation
- Full presentation
- A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
- Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang and Yu Yu
- Abstract presentation
- Full presentation
- Post-Quantum Adaptor Signatures and Payment Channel Networks
- Muhammed F. Esgin, Oguzhan Ersoy and Zekeriya Erkin
- Abstract presentation
- Full presentation
11:25–13:05: Security analysis, chaired by David Gerault
- Linear-Complexity Private Function Evaluation is Practical
- Marco Holz, Ágnes Kiss, Deevashwer Rathee and Thomas Schneider
- Abstract presentation
- Full presentation
- Certifying Decision Trees Against Evasion Attacks by Program Analysis
- Stefano Calzavara, Pietro Ferrara and Claudio Lucchese
- Abstract presentation
- Full presentation
- They Might NOT Be Giants: Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization
- Rayan Mosli, Yin Pan, Bo Yuan and Matthew Wright
- Abstract presentation
- Full presentation
- Understanding Object Detection Through An Adversarial Lens
- Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei and Yanzhao Wu
- Abstract presentation
- "Full presentation"
15:25–17:05: Applied cryptography II, chaired by Kaitai Liang
- Signatures with Tight Multi-User Security from Search Assumptions
- Jiaxin Pan and Magnus Ringerud
- Abstract presentation
- Full presentation
- Biased RSA private keys: Origin attribution of GCD-factorable keys
- Adam Janovsky, Matus Nemec, Petr Svenda, Peter Sekan and Vashek Matyas
- Abstract presentation
- Full presentation
- MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation
- Robert Künnemann and Hamed Nemati
- Abstract presentation
- Full presentation
- Evaluating the effectiveness of heuristic worst-case noise analysis in FHE
- Anamaria Costache, Kim Laine and Rachel Player
- Abstract presentation
- Full presentation