To authors: A regular paper presentation would be 25 mins in total (including 5 mins Q&A) and a tool/dataset paper presentation would be 15 mins in total (including 5 mins Q&A).

Parking:
Cone Deck 2 Visitor Parking
8921 University Rd, Charlotte, NC 28262

April 24 - April 25 - April 26


April 24


Lucas Room (Cone 341),
3rd Floor, Cone University Center
9025 University Rd, Charlotte, NC 28223

Keynote I

09:00AM - 10:00AM

Reiter

Tackling Credential Abuse Together

Michael Reiter, Duke University

Abstract

Despite long-ago predictions that other user-authentication technologies would replace passwords, passwords remain pervasive and are likely to continue to be so. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same accounts at another. A central theme of our research is that these factors are most effectively addressed by coordinating across sites, in contrast to today's practice of each site defending alone. We summarize algorithms to drive this coordination; the efficacy and security of our proposals; and the scalability of our designs through working implementations.


Short Bio

Michael Reiter is a James B. Duke Distinguished Professor in the Departments of Computer Science and Electrical & Computer Engineering at Duke University, which he joined in January 2021 following previous positions in industry (culminating as Director of Secure Systems Research at Bell Labs, Lucent) and academia (Professor of CS and ECE at Carnegie Mellon, and Distinguished Professor of CS at UNC-Chapel Hill). His technical contributions lie primarily in computer security and distributed computing. He is a Fellow of the ACM and IEEE, winner of the ACM SIGSAC Outstanding Contributions Award, and two-time winner of the Test-of-Time Award from the ACM Conference on Computer and Communications Security, for research papers that have had long-lasting influence.

Break (30 Minutes)

10:00AM - 10:30AM

Session 1: Privacy Analysis

10:30AM - 12:15PM

Comparative Privacy Analysis of Mobile Web Browsers
Ahsan Zafar and Anupam Das.
IdDecoder: A Face Embedding Inversion Tool and its Privacy and Security Implications on Facial Recognition Systems
Minh-Ha Le and Niklas Carlsson.
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2
Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese and Mauro Conti.
AutoSpill: Credential Leakage from Mobile Password Managers
Ankit Gangwal, Shubham Singh and Abhijeet Srivastava.

Lunch (75 Minutes)

12:15PM - 01:30PM

Session 2: Human Factors and Cloud

01:30PM - 03:30PM

Users Really Do Respond To Smishing
Md Lutfor Rahman, Daniel Timko, Hamid Wali and Ajaya Neupane.
A User Study of Keystroke Dynamics as Second Factor in Web MFA
Ahmed Wahab, Daqing Hou and Stephanie Schuckers.
(Dataset/Tool) Multi-Modality Mobile Datasets for Behavioral Biometrics Research
Aratrika Ray-Dowling, Ahmed Anu Wahab, Daqing Hou and Stephanie Schuckers.
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds
Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A S M Asadujjaman, Makan Pourzandi and Mourad Debbabi.
CloudShield: Real-time Anomaly Detection in the Cloud
Zecheng He, Guangyuan Hu and Ruby Lee.

Break (30 Minutes)

03:30PM - 04:00PM

Panel I: Identity Management Education and Workforce Development

04:00PM - 05:20PM

Panelists
Lance Peterman - Director, Identity & Access Management at Equitable and Adjunct Professor at College of Computing and Informatics at UNC Charlotte
Nader Nassar - Director, Identity Engineering Services at Adobe
Moderators
Hala Strohmier - University of South Carolina Aiken
Mohamed Shehab - University of North Carolina at Charlotte
Abstract

This panel will focus on the challenges and opportunities in educating and developing a skilled workforce in the field of identity management. The panel will bring together experts in identity management from academia and industry to discuss the current state of identity management education and workforce development, and explore potential solutions to address the existing gaps. The panelists will examine the evolving nature of identity management, and the skillsets and knowledge required for professionals to excel in this field. They will also discuss the various educational and training programs available to aspiring identity management professionals, and the effectiveness of these programs in meeting the needs of the industry. Additionally, the panel will explore the role of industry-academia partnerships in fostering workforce development in identity management.

Break (10 Minutes)

05:20PM - 05:30PM

Reception and Poster Session

05:30PM - 08:30PM

April 25


Lucas Room (Cone 341),
3rd Floor, Cone University Center
9025 University Rd, Charlotte, NC 28223

Keynote II

09:00AM - 10:00AM

Palamidessi

Local Methods for Privacy Protection and Impact on Fairness

Catuscia Palamidessi, Inria

Abstract

The increasingly pervasive use of big data and machine learning is raising various ethical issues, in particular privacy and fairness. In this talk, I will discuss some frameworks to understand and mitigate the issues, focusing on iterative methods coming from information theory and statistics. In the area of privacy protection, differential privacy (DP) and its variants are the most successful approaches to date. One of the fundamental issues of DP is how to reconcile the loss of information that it implies with the need to preserve the utility of the data. In this regard, a useful tool to recover utility is the Iterative Bayesian Update (IBU), an instance of the Expectation-Maximization method from Statistics. I will show that the IBU, combined with the metric version of DP, outperforms the state-of-the art, which is based on algebraic methods combined with the Randomized Response mechanism, widely adopted by the Big Tech industry (Google, Apple, Amazon, ...). Then, I will discuss the issue of biased predictions in machine learning, and how DP can affect the level of fairness and accuracy of the trained model. Finally, I will show that the IBU can be applied also in this domain to ensure a fairer treatment of disadvantaged groups and reconcile fairness and accuracy.


Short Bio

Catuscia Palamidessi is Director of Research at INRIA Saclay (since 2002), where she leads the team COMETE. She has been Full Professor at the University of Genova, Italy (1994-1997) and Penn State University, USA (1998-2002). Palamidessi's research interests include Privacy, Machine Learning, Fairness, Secure Information Flow, Formal Methods, and Concurrency. In 2019 she has obtained an ERC advanced grant to conduct research on Privacy and Machine Learning. She has been PC chair of various conferences including LICS and ICALP, and PC member of more than 120 international conferences. She is in the Editorial board of several journals, including the IEEE Transactions in Dependable and Secure Computing, Mathematical Structures in Computer Science, Theoretics, the Journal of Logical and Algebraic Methods in Programming and Acta Informatica. She is serving in the Executive Committee of ACM SIGLOG, CONCUR, and CSL.

Break (30 Minutes)

10:00AM - 10:30AM

Session 3: Privacy Enhancing Techniques

10:30AM - 12:15PM

Privacy Preserving Fully Online Matching with Deadlines
Andreas Klinger and Ulrike Meyer.
Grote: Group Testing for Privacy-Preserving Face Identification
Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel and Melek Önen.
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation
Andreas Klinger, Felix Battermann and Ulrike Meyer.
Velocity-Aware Geo-Indistinguishability
Ricardo Mendes, Mariana Cunha and Joao P. Vilela.

Lunch (75 Minutes)

12:15PM - 01:30PM

Session 4: Software and Systems Security

01:30PM - 03:15PM

Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone
Md Shihabul Islam, Mahmoud Zamani, Chung Hwan Kim, Latifur Khan and Kevin Hamlen.
Protecting Encrypted Virtual Machines from Nested Page Fault Controlled Channel
Haoxiang Qin, Zhenyu Song, Weijuan Zhang, Sicong Huang, Wentao Yao, Ge Liu, Xiaoqi Jia and Haichao Du.
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs
Claudius Pott, Berk Gulmezoglu and Thomas Eisenbarth.
Detecting Backdoors in Collaboration Graphs of Software Repositories
Tom Ganz, Inaam Ashraf, Martin Härterich and Konrad Rieck.

Break (30 Minutes)

03:15PM - 03:45PM

Panel II: ChatGPT and Future of CS and Security

03:45PM - 05:05PM

Panelists
Wlodek Zadrozny - Professor, Computer Science at UNC Charlotte
Xi (Sunshine) Niu - Associate Professor, Software and Information Systems at UNC Charlotte
Samira Shaikh - Director, Data Science, Conversational AI at Ally Bank
Moderators
Hala Strohmier - University of South Carolina Aiken
Mohamed Shehab - University of North Carolina at Charlotte
Abstract

This panel will explore the potential of ChatGPT in the field of computer science and security. The panel will discuss the current and future applications of ChatGPT in various areas of computer science and security, such as natural language processing, data analytics, and cyber security. The experts will also deliberate on the potential impact of ChatGPT on the future of computer science and security, and its implications for society. Through this panel, attendees will gain valuable insights into the exciting developments in the field of computer science and security, and the role that ChatGPT is expected to play in shaping its future.

Break (30 Minutes)

05:05PM - 05:30PM

Conference Dinner

05:30PM - 08:30PM

April 26


Lucas Room (Cone 341),
3rd Floor, Cone University Center
9025 University Rd, Charlotte, NC 28223

Session 5: IoT and Embedded Systesms Security

09:00AM - 10:50AM

Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux
Seonghoon Jeong, Minsoo Ryu, Hyunjae Kang and Huy Kang Kim.
HAT: Secure and Practical Key Establishment for Implantable Medical Devices
Sayon Duttagupta, Eduard Marin, Dave Singelee and Bart Preneel.
SCAtt-man: Side-Channel-Based Remote Attestation for Embedded Devices that Users Understand
Sebastian Surminski, Christian Niesler, Sebastian Linsner, Lucas Davi and Christian Reuter.
(Dataset/Tool) Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Vincent Unsel, Stephan Wiefling, Nils Gruschka and Luigi Lo Iacono.
(Dataset/Tool) All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms
Bhaskar Tejaswi, Mohammad Mannan and Amr Youssef.

Break (30 Minutes)

10:50AM - 11:20AM

Session 6: Access Control

11:20AM - 12:30PM

Role Models: Role-based Debloating for Web Applications
Babak Amin Azad and Nick Nikiforakis.
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies
Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh Verma, Seraphin Calo and Alessandra Russo.
(Dataset/Tool) Realistic ABAC Data Generation using Conditional Tabular GAN
Ritwik Rai and Shamik Sural.

End Conference

12:30PM