To authors: Both regular and dataset/tool paper presentations would be 20 mins in total (including 5 mins Q&A).

June 4 - June 5 - June 6


June 4


Room: Grand Station I - II

Breakfast

07:30AM - 08:30AM Grand Station III-V

Registration

08:00AM - 09:00AM

Welcome Session

08:45AM - 09:00AM

Keynote I

09:00AM - 10:00AM

Preneel

Privacy - From the Ivory Tower to the Trenches in the Parliament

Orr Dunkelman, University of Haifa

Abstract

Privacy is a fundamental human right, but is one of the more complicated ones. Not only is privacy very context-oriented and society-oriented, it is hard to define privacy without involving adversaries trying to break it. In this talk, using several examples, such as biometric data, contact tracing, and vaccination passport, to study how research can impact real life. Furthermore, we will discuss the problems in disseminating state-of-the-art scientific knowledge to the public, and most especially, to the policy makers, in the context of complicated technologies aimed at offering privacy.


Short Bio

Orr Dunkelman is a full professor of computer science at the Computer Science Department at the University of Haifa in Israel, currently on Sabbatical at TU Berlin with the Security in Telecommunications (SecT) chair. He received his Ph.D. from the Technion in 2006, and his research interests include cryptography (with emphasis on cryptanalysis), privacy, computer security, and biometrics. Orr has published more than 100 publications in leading conferences and journals. He served as the program chair of EUROCRYPT 2022 (as well as other venues), and the general chair of EUROCRYPT 2018. Orr has been a member of the International Association for Cryptologic Research (IACR) board (2017-2018) and as was a co-director of the Center for Cyber, Law and Policy (CCLP) at the University of Haifa, and the head of the Center for research of biometrics and its applications that operates as part of the CCLP. He is also a co-founder of the "Privacy Israel" NGO.

Coffee Break (20 Minutes)

10:00AM - 10:20AM

Session 1: Web & Browser Security

10:20AM - 12:00PM

CodeX: Contextual Flow Tracking for Browser Extensions
Mohammad M. Ahmadpanah, Matías F. Gobbi, Daniel Hedin, Johannes Kinder and Andrei Sabelfeld.
Coding Malware in Fancy Programming Languages for Fun and Profit
Theodoros Apostolopoulos, Vasilios Koutsokostas, Nikolaos Totosis, Constantinos Patsakis and Georgios Smaragdakis.
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications
Neil Thimmaiah, Rigel Gjomemo and Venkat Venkatakrishnan.
Evaluating Website Data Leaks through Spam Collection on Honeypots
Oghenerukevwe Oyinloye and Carol Fung.
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations (Dataset/Tool Paper)
Pieter Philippaerts, Stef Verreydt and Wouter Joosen.

Lunch (60 Minutes)

12:00PM - 01:00PM Grand Station III-V

Session 2: Differential Privacy

01:00PM - 02:00PM

Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence
Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang and Yuan Hong.
Differentially Private Iterative Screening Rules for Linear Regression
Amol Khanna, Fred Lu and Edward Raff.
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting
Stephen Meisenbacher, Chaeeun Lee and Florian Matthes.

Session 3: Access Control Management & Policy Compliance

02:00PM - 03:00PM

Enhancing Relationship-Based Access Control Policies with Negative Rule Mining
Ferhat Demirkiran and Amir Masoumzadeh.
To the Best of Knowledge and Belief: On Eventually Consistent Access Control
Florian Jacob and Hannes Hartenstein.
Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare
Md Al Amin, Hemanth Tummala, Rushabh Shah and Indrajit Ray.

Coffee Break (20 Minutes)

03:00PM - 03:20PM

Session 4: Systems and Hardware Security

03:20PM - 05:00PM

Exploiting HDMI and USB Ports for GPU Side-Channel Insights
Sayed Erfan Arefin and Abdul Serwadda.
VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts
Matteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi and Andrea Lanzi.
Defining Security Limits in Biometrics
Axel Durbet, Kevin Thiry-Atighehchi, Pascal Lafourcade and Paul-Marie Grollemund.
Probabilistic Data Structures in the Wild: A Security Analysis of Redis
Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson and Anupama Unnikrishnan.
Padding Matters – Exploring Function Detection in PE Files (Dataset/Tool Paper)
Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban and Christian Dietrich.

June 5


Room: Grand Station I - II

Breakfast

07:30AM - 08:30AM Grand Station III-V

Keynote II

09:00AM - 10:00AM

Balzarotti

Covert Social Influence Operations: Past, Present, and Future

V.S. Subrahmanian, Northwestern University

Abstract

Covert Social Influence Operations (CSIOs) have been studied for almost a dozen years. Since a first study of CSIOs in the 2014 Indian election and the DARPA Twitter Influence Bot Detection Challenge of 2015 under the SMISC Program, the field has come a long way. After a quick review of CSIOs of the past, this talk will quickly move on to how recent advances in AI will influence the direction of CSIOs. We can think of CSIOs as involving a threat actor (CSIO operator) targeting a defender (e.g. social platform). Though the extraordinary ability of modern AI to generate realistic text, image, video, audio, and multimodal content poses a potential threat, I will argue that the even more extraordinary ability of AI to dynamically adapt to changing circumstances and defender tactics will likely pose an even bigger threat. (The second part of this talk reflects joint work with Valerio LaGatta and Youzhi Zhang.)


Short Bio

V.S. Subrahmanian is the Walter P. Murphy Professor of Computer Science at the McCormick School of Engineering, Northwestern University and Buffett Faculty Fellow at the Northwestern Roberta Buffett Institute for Global Affairs. He is also the head of the Northwestern Security and AI Laboratory (NSAIL). Prior to this, Subrahmanian was The Dartmouth College Distinguished Professor in Cybersecurity, Technology, and Society at Dartmouth College with tenure in the Computer Science Department and Director of the Institute for Security, Technology and Society (ISTS). Prior to joining Dartmouth, he was a tenured Professor in the University of Maryland's Computer Science Department. He served a 6.5 year stint as Director of the University of Maryland's Institute for Advanced Computer Studies where he co-founded the Lab for Computational Cultural Dynamics and founded the Center for Digital International Government. His work stands squarely at the intersection of data-driven AI for increased security, policy, and business needs. Prof. Subrahmanian has been an invited speaker at the United Nations, Capitol Hill, the Mumbai Stock Exchange, and numerous other prestigious forums.

Coffee Break (20 Minutes)

10:00AM - 10:20AM

Session 5: Privacy Inference and Data Aggregation

10:20AM - 12:00PM

Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks
Bingyu Liu, Ali Arastehfard, Rujia Wang, Weiran Liu, Zhongjie Ba, Shanglin Zhou and Yuan Hong.
Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning
Riccardo Taiello, Clémentine Gritti, Melek Önen and Marco Lorenzi.
Multi-Device Context-Sensitive Attacks Against Privacy
Edgardo Barsallo Yi, Joshua Majors, Aditya Vardhan Padala, Darren Wu, Aravind Machiry and Saurabh Bagchi.
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services
Scott Seidenberger, Oluwasijibomi Ajisegiri, Noah Pursell, Fazil Raja and Anindya Maiti.
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-Strategy Against Link Stealing Attacks?
Mir Imtiaz Mostafiz, Imtiaz Karim and Elisa Bertino.

Lunch (60 Minutes)

12:00PM - 01:00PM Grand Station III-V

Session 6: Threat Detection & Intelligence

01:00PM - 02:00PM

Citar: Cyberthreat Intelligence-driven Attack Reconstruction
Sutanu Kumar Ghosh, Rigel Gjomemo and V.N. Venkatakrishnan.
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats
Seyed Mohammad Sanjari, Ashfak Md Shibli, Maraz Mia, Maanak Gupta and Mir Mehedi Ahsan Pritom.
TerrARA: Automated Security Threat Modeling for Infrastructure as Code
Anh-Duy Tran, Laurens Sion, Koen Yskout and Wouter Joosen.

Session 7: Blockchain & Decentralized Finance

02:00PM - 03:00PM

Protecting DeFi Platforms against Non-Price Flash Loan Attacks
Abdulrahman Alhaidari, Balaji Palanisamy and Prashant Krishnamurthy.
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance (Data/Toolset Paper)
Abdulrahman Alhaidari, Bhavani Kalal, Balaji Palanisamy and Shamik Sural.
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy (Dataset/Tool Paper)
Lukas Ingmarsson, Karl Duckert Karlsson and Niklas Carlsson.

Coffee Break (20 Minutes)

03:00PM - 03:20PM

Session 8: AI & Security

03:20PM - 05:00PM

Espresso: Robust Concept Filtering in Text-to-Image Models
Anudeep Das, Vasisht Duddu, Rui Zhang and N. Asokan.
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations
Vasisht Duddu, Oskari Järvinen, Lachlan J. Gunn and N. Asokan.
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems Powered by Deep Learning
Advije Rizvani, Giovanni Apruzzese and Pavel Laskov.
PromptShield: Deployable Detection for Prompt Injection Attacks
Dennis Jacob, Hend Alzahrani, Zhanhao Hu, Basel Alomair and David Wagner.
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications (Dataset/Tool Paper)
Elisa Braconaro and Eleonora Losiouk.

Conference Banquet / Social Event

06:00PM Grand Station III-V

June 6


Room: Grand Station I - II

Breakfast

07:30AM - 08:30AM Grand Station I - II

Session 9: Cryptography & Secure Communication

09:00AM - 10:20AM

CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels
Md Rabbi Alam, Jinpeng Wei and Qingyang Wang.
Blind Brother: Attribute-Based Selective Video Encryption
Eugene Frimpong, Bin Liu, Camille Nuoskala and Antonis Michalas.
Private Eyes: Zero-Leakage Iris Searchable Encryption
Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad and Benjamin Fuller.
Trilobyte: Plausibly Deniable Communications Through Single Player Games (Dataset/Tool Paper)
Yuzhou Feng, Sandeep Kiran Pinjala, Radu Sion and Bogdan Carbunar.

Coffee Break (20 Minutes)

10:20AM - 10:40AM

Session 10: Vulnerability and Intrusion Detection

10:40AM - 11:40AM

VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning
Asmaa Hailane, Paria Shirani and Guy-Vincent Jourdan.
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems (Dataset/Tool Paper)
Hyunwoo Lee, Charalampos Katsis, Alireza Lotfi, Taejun Choi, Soeun Kim, Ashish Kundu and Elisa Bertino.
Sherlock: A Dataset for Process-Aware Intrusion Detection Research on Power Grid Networks (Dataset/Tool Paper)
Eric Wagner, Lennart Bader, Konrad Wolsing and Martin Serror.

Closing Remarks & Box Lunch

11:40PM - 11:50PM Grand Station I - II