PROGRAM
Days: Monday, December 13th Tuesday, December 14th Wednesday, December 15th
Monday, December 13th
View this program: with abstractssession overviewtalk overview
10:15-10:30Short Break
13:50-14:00Short Break
14:00-15:20 Session 1
Chair:
14:00 | EPSim-GS: Efficient and Privacy-Preserving Similarity Range Query over Genomic Sequences (abstract) |
14:16 | Balancing Efficiency and Security for Network Access Control in Space-Air-Ground Integrated Networks (abstract) |
14:32 | PUPy: A Generalized, Optimistic Context Detection Framework for Implicit Authentication (abstract) |
14:48 | Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems (abstract) |
15:04 | Updatable Linear Map Commitments and Their Applications in Elementary Databases (abstract) |
15:20-15:30Short Break
15:30-16:50 Session 2
Chair:
15:30 | The Race-Timing Prototype (abstract) |
15:46 | Securing Critical Infrastructure Through Innovative Use Of Merged Hierarchical Deep Neural Networks (abstract) |
16:02 | Towards Change Detection in Privacy Policies with Natural Language Processing (abstract) |
16:18 | Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data (abstract) |
16:34 | TEE-based Selective Testing of Local Workers in Federated Learning Systems (abstract) |
16:50-17:00Short Break
17:00-18:20 Session 3
Chair:
17:00 | IoT Malware Detection Using Function Call Graph Embedding (abstract) |
17:16 | Intrusion Detection in Internet of Things using Convolutional Neural Networks (abstract) |
17:32 | Clustering based opcode graph generation for malware variant detection (abstract) |
17:48 | Gaining Location Privacy from Service Flexibility: A Bayesian Game Theoretic Approach (abstract) |
18:04 | Searching on Non-Systematic Erasure Codes (abstract) |
Tuesday, December 14th
View this program: with abstractssession overviewtalk overview
09:00-10:20 Session 4
Chair:
09:00 | A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI (abstract) |
09:16 | Epistemic Analysis of a Key-Management Vulnerability in LoRaWAN (abstract) |
09:32 | FORTRESS: FORtified Tamper-Resistant Envelope with Embedded Security Sensor (abstract) |
09:48 | Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks (abstract) |
10:04 | GAIROSCOPE: Leaking Data from Air-Gapped Computers to Nearby Smartphones using Speakers-to-Gyro Communication (abstract) |
10:20-10:30Short Break
10:30-11:50 Session 5
Chair:
10:30 | LibBlock - Towards Decentralized Library System based on Blockchain and IPFS (abstract) |
10:46 | EPF: An Evolutionary, Protocol-Aware, and Coverage-Guided Network Fuzzing Framework (abstract) |
11:02 | Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members (abstract) |
11:18 | PIdARCI: Using Assembly Instruction Patterns to Identify, Annotate, and Revert Compiler Idioms (abstract) |
11:34 | Dazed and Confused: What’s Wrong with Crypto Libraries? (abstract) |
11:50-13:00Lunch Break
13:50-14:00Short Break
14:50-15:00Short Break
15:00-16:20 Session 6
Chair:
15:00 | Fool Me Once: A Study of Password Selection Evolution over the Past Decade (abstract) |
15:16 | Long Passphrases: Potentials and Limits (abstract) |
15:32 | Towards Query-efficient Black-box Adversarial Attack on Text Classification Models (abstract) |
15:48 | Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems (abstract) |
16:04 | Trust Quantification for Autonomous Medical Advisory Systems (abstract) |
16:20-16:30Short Break
16:30-17:50 Session 7
Chair:
16:30 | Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing (abstract) |
16:46 | Designing Personalized OS Update Message based on Security Behavior Stage Model (abstract) |
17:02 | Evaluating the Current State of ApplicationProgramming Interfaces for Verifiable Credentials (abstract) |
17:18 | Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack (abstract) |
17:34 | A Hybrid Approach for Privacy-Preserving Graph Neural Network using SGX (abstract) |
17:50-18:00Short Break
18:00-19:20 Session 8
Chair:
18:00 | Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions (abstract) |
18:16 | Light-weight Active Security for Detecting DDoS Attacks in Containerised ICPS (abstract) |
18:32 | Detection of Induced False Negatives in Malware Samples (abstract) |
18:48 | A Novel Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism (abstract) |
19:04 | Data Storage in the Multi-Cloud: Data Splitting Leveraging on Existing Data (abstract) |
Wednesday, December 15th
View this program: with abstractssession overviewtalk overview
09:00-10:20 Session 9
Chair:
09:00 | Towards Privacy-Preserving Classification-as-a-Service for DGA Detection (abstract) |
09:16 | Preparing for National Cyber Crises Using Non-linear Cyber Exercises (abstract) |
09:32 | A new approach for cross-silo federated learning and its privacy risks (abstract) |
09:48 | FOX: Fooling with Explanations. Privacy Protection with Adversarial Reactions in Social Media (abstract) |
10:04 | DaRoute: Inferring trajectories from zero-permission smartphone sensors (abstract) |
10:20-10:30Short Break
10:30-11:50 Session 10
Chair:
10:30 | Introducing a Framework to Enable Anonymous Secure Mulit-Party Computation (abstract) |
10:46 | Towards Privacy-Friendly Smart Products (abstract) |
11:02 | Impact of environmental conditions on fingerprint system performance (abstract) |
11:18 | Secure Allocation for Graph-Based Virtual Machines in Cloud Environments (abstract) |
11:34 | Deletion-Compliance in the Absence of Privacy (abstract) |
11:50-13:00Lunch Break
13:50-14:00Short Break
14:00-15:20 Session 11
Chair:
14:00 | SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning (abstract) |
14:16 | A Novel Trust Model In Detecting Final-Phase Attacks in Substations (abstract) |
14:32 | SegmentPerturb: Effective Black-Box Hidden Voice Attack on Commercial ASR Systems via Selective Deletion (abstract) |
14:48 | User Identification in Online Social Networks using Graph Transformer Networks (abstract) |
15:04 | User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security (abstract) |
15:20-15:30Short Break
15:30-16:50 Session 12
Chair:
15:30 | Practical Protection of Binary Applications via Transparent Immunization (abstract) |
15:46 | Using wrist movements for cyber attacks on examination proctoring (abstract) |
16:02 | Detection of Demand Manipulation Attacks on a Power Grid (abstract) |
16:18 | API-based Ransomware Detection using Machine Learning-based Threat Detection Models (abstract) |
16:34 | A Practical Oblivious Cloud Storage System based on TEE and Client Gateway (abstract) |