Days: Tuesday, October 31st Wednesday, November 1st Thursday, November 2nd
View this program: with abstractssession overviewtalk overview
09:00 | Forward Security under Leakage Resilience, Revisited (abstract) PRESENTER: Harish Karthikeyan |
09:30 | Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE (abstract) PRESENTER: Yoshinori Aono |
10:00 | Traceable Policy-Based Signatures with Delegation (abstract) PRESENTER: Ismail Afia |
11:00 | How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium (abstract) PRESENTER: Timo Glaser |
11:30 | Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks (abstract) PRESENTER: Yuqing Zhao |
12:00 | Hardness of Learning AES with Gradient-based Methods (abstract) PRESENTER: Zhenisbek Assylbekov |
14:00 | Privacy-Preserving Digital Vaccine Passport (abstract) PRESENTER: Jiahui Gao |
14:30 | Exploiting Android Browser (abstract) PRESENTER: Natalia Stakhanova |
15:00 | Are Current CCPA Compliant Banners Conveying User's Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners (abstract) PRESENTER: Daniel Timko |
16:00 | Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-Input AND Protocols (abstract) PRESENTER: Takuto Yoshida |
16:30 | Free-XOR in Card-based Garbled Circuits (abstract) PRESENTER: Yoshifumi Manabe |
View this program: with abstractssession overviewtalk overview
09:00 | Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal (abstract) |
09:30 | Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives (abstract) PRESENTER: Simone Pelizzola |
10:00 | Key Filtering in Cube Attacks from the Implementation Aspect (abstract) PRESENTER: Hao Fan |
10:30 | New Techniques for Modeling SBoxes: An MILP Approach (abstract) PRESENTER: Debranjan Pal |
Title: Building Covert Communication Systems That Resist Traffic Analysis
Covert, censorship-resistant communication in the presence of nation-state adversaries requires unobservable channels whose operation is difficult to detect via network-traffic analysis. One promising approach is traffic substitution: use an already-existing encrypted channel established by some application and replace that application's data with covert content.
In this talk, I will explain the challenges of traffic substitution and show how substitution channels can fail even against simple network adversaries. I will then discuss our experience designing and implementing Telepath, a new Minecraft-based covert communication system.
Finally, I will present general principles for building covert channels that resist traffic analysis.
Title: Cultivating a National Culture of Cybersecurity
Global cyber threats are outpacing the ability of Western democracies to mitigate or defeat those threats. The cyber capabilities of adversarial nation states have vastly improved in the last decade while cybercrime is set to become the third largest economy in the world by 2025. At the same time, the global cyber workforce gap continues to grow at an alarming pace. These trends, coupled with sluggish bureaucratic reaction speed, will nullify the U.S. and its allies' dominance in the information environment in the next few years – unless we do things differently. This presentation will highlight why the status quo has led to many national shortcomings in cybersecurity and discuss why it is an existential imperative to start cultivating a national culture of cybersecurity today.
15:30 | LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness (abstract) PRESENTER: Ranjit Kumaresan |
16:00 | Improving Privacy of Anonymous Proof-of-Stake Protocols (abstract) PRESENTER: Shichen Wu |
16:30 | Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys (abstract) PRESENTER: Surbhi Shaw |
17:00 | CTA: Confidential Transactions Protocol with State Accumulator (abstract) PRESENTER: Shumin Si |
View this program: with abstractssession overviewtalk overview
09:00 | A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets (abstract) PRESENTER: Ranjit Kumaresan |
09:30 | Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing (abstract) PRESENTER: Reihaneh Safavi-Naini |
10:00 | Lattice-based Key-Value Commitment scheme with key-binding and key-hiding (abstract) PRESENTER: Hideaki Miyaji |
10:30 | A Practical Forward-Secure DualRing (abstract) PRESENTER: Atsuko Miyaji |
11:30 | Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption (abstract) PRESENTER: Anaïs Barthoulot |
12:00 | A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators (abstract) |