PST2021: 18TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, AND TRUST 2021
PROGRAM

Days: Monday, December 13th Tuesday, December 14th Wednesday, December 15th

Monday, December 13th

View this program: with abstractssession overviewtalk overview

10:15-10:30Short Break
13:50-14:00Short Break
14:00-15:20 Session 1
14:00
EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences (abstract)
14:16
Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks (abstract)
14:32
PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication (abstract)
14:48
Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems (abstract)
15:04
Updatable Linear Map Commitments and Their Applications in Elementary Databases (abstract)
15:20-15:30Short Break
15:30-16:50 Session 2
15:30
The Race-Timing Prototype (abstract)
15:46
Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks (abstract)
16:02
Towards Change Detection in Privacy Policies with Natural Language Processing (abstract)
16:18
Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data (abstract)
16:34
TEE-based Selective Testing of Local Workers in Federated Learning Systems (abstract)
16:50-17:00Short Break
17:00-18:20 Session 3
17:00
IoT Malware Detection Using Function Call Graph Embedding (abstract)
17:16
Intrusion Detection in Internet of Things using Convolutional Neural Networks (abstract)
17:32
Clustering based opcode graph generation for malware variant detection (abstract)
17:48
Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach (abstract)
18:04
Searching on Non-Systematic Erasure Codes (abstract)
Tuesday, December 14th

View this program: with abstractssession overviewtalk overview

09:00-10:20 Session 4
09:00
A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI (abstract)
09:16
Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN (abstract)
09:32
FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor (abstract)
09:48
Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks (abstract)
10:04
GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication (abstract)
10:20-10:30Short Break
10:30-11:50 Session 5
10:30
LibBlock - Towards Decentralized Library System based on Blockchain and IPFS (abstract)
10:46
EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework (abstract)
11:02
Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members (abstract)
11:18
PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms (abstract)
11:34
Dazed and Confused: What’s Wrong with Crypto Libraries? (abstract)
11:50-13:00Lunch Break
13:50-14:00Short Break
14:50-15:00Short Break
15:00-16:20 Session 6
15:00
Fool Me Once: A Study of Password Selection Evolution over the Past Decade (abstract)
15:16
Long Passphrases: Potentials and Limits (abstract)
15:32
Towards Query-efficient Black-box Adversarial Attack on Text Classification Models (abstract)
15:48
Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems (abstract)
16:04
Trust Quantification for Autonomous Medical Advisory Systems (abstract)
16:20-16:30Short Break
16:30-17:50 Session 7
Chair:
16:30
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing (abstract)
16:46
Designing Personalized OS Update Message based on Security Behavior Stage Model (abstract)
17:02
Evaluating the Current State of ApplicationProgramming Interfaces for Verifiable Credentials (abstract)
17:18
Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack (abstract)
17:34
A Hybrid Approach for Privacy-Preserving Graph Neural Network using SGX (abstract)
17:50-18:00Short Break
18:00-19:20 Session 8
Chair:
18:00
Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions (abstract)
18:16
Light-weight Active Security for Detecting DDoS Attacks in Containerised ICPS (abstract)
18:32
Detection of Induced False Negatives in Malware Samples (abstract)
18:48
A Novel Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism (abstract)
19:04
Data Storage in the Multi-Cloud: Data Splitting Leveraging on Existing Data (abstract)
Wednesday, December 15th

View this program: with abstractssession overviewtalk overview

09:00-10:20 Session 9
09:00
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection (abstract)
09:16
Preparing for National Cyber Crises Using Non-linear Cyber Exercises (abstract)
09:32
A new approach for cross-silo federated learning and its privacy risks (abstract)
09:48
FOX: Fooling with Explanations. Privacy Protection with Adversarial Reactions in Social Media (abstract)
10:04
DaRoute: Inferring trajectories from zero-permission smartphone sensors (abstract)
10:20-10:30Short Break
10:30-11:50 Session 10
10:30
Introducing a Framework to Enable Anonymous Secure Mulit-Party Computation (abstract)
10:46
Towards Privacy-Friendly Smart Products (abstract)
11:02
Impact of environmental conditions on fingerprint system performance (abstract)
11:18
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments (abstract)
11:34
Deletion-Compliance in the Absence of Privacy (abstract)
11:50-13:00Lunch Break
13:50-14:00Short Break
14:00-15:20 Session 11
14:00
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning (abstract)
14:16
A Novel Trust Model In Detecting Final-Phase Attacks in Substations (abstract)
14:32
SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion (abstract)
14:48
User Identification in Online Social Networks using Graph Transformer Networks (abstract)
15:04
User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security (abstract)
15:20-15:30Short Break
15:30-16:50 Session 12
Chair:
15:30
Practical Protection of Binary Applications via Transparent Immunization (abstract)
15:46
Using wrist movements for cyber attacks on examination proctoring (abstract)
16:02
Detection of Demand Manipulation Attacks on a Power Grid (abstract)
16:18
API-based Ransomware Detection using Machine Learning-based Threat Detection Models (abstract)
16:34
A Practical Oblivious Cloud Storage System based on TEE and Client Gateway (abstract)