PST2022: 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, AND TRUST
PROGRAM

Days: Tuesday, August 23rd Wednesday, August 24th

Tuesday, August 23rd

View this program: with abstractssession overviewtalk overview

09:00-09:50 Session 1: Keynote 1

Keynote "Extraction of Complex DNN Models: Real Threat or Boogeyman" by Dr. N. ASOKAN

09:50-10:00Coffee Break
10:00-11:20 Session 2
10:00
Efficient Homomorphic E-Voting Based On Batch Proof Techniques (abstract)
10:20
A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System (abstract)
10:40
A Vulnerability in Face Anonymization – Privacy Disclosure from Face-obfuscated video (abstract)
11:00
LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach (abstract)
11:20-11:30Coffee Break
11:30-12:50 Session 3
11:30
Balancing privacy and accountability in digital payment methods using zk-SNARKs (abstract)
PRESENTER: Tariq Bontekoe
11:50
Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets (abstract)
12:10
Security Analysis in Satellite Communication based on Geostationary Orbit (abstract)
12:30
Solving the Kidney Exchange Problem using Privacy-Preserving Integer Programming (abstract)
12:50-14:00Lunch Break
14:00-14:50 Session 4: Keynote 2

Keynote "Unified View of IoT and CPS and Trend of Research on Microcontroller Based IoT" by Dr. Xinwen Fu

14:50-15:00Coffee Break
15:00-16:20 Session 5
15:00
Mobile Mental Health Apps: Alternative Intervention or Intrusion? (abstract)
15:20
An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy (abstract)
15:40
A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces (abstract)
PRESENTER: Shaveta Dandyan
16:00
Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs (abstract)
16:20-16:30Coffee Break
16:30-17:50 Session 6
16:30
Towards the development of a realistic multidimensional IoT profiling dataset (abstract)
16:50
Privacy Policy Analysis with Sentence Classification (abstract)
17:10
Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories (abstract)
17:30
Privacy-Preserving Detection of Poisoning Attacks in Federated Learning (abstract)
Wednesday, August 24th

View this program: with abstractssession overviewtalk overview

09:00-09:50 Session 7: Keynote 3

Keynote "The Dumbo Protocol Family: Making Asynchronous Consensus Real" by Dr. Qiang Tang

09:50-10:00Coffee Break
10:00-11:20 Session 8
10:00
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree (abstract)
10:20
Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers (abstract)
10:40
Achieving Efficient and Secure Query in Blockchain-based Traceability Systems (abstract)
11:00
User Behavior Simulation in ICS Cyber Ranges (abstract)
11:20-11:30Coffee Break
11:30-12:50 Session 9
11:30
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables (abstract)
11:50
An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data (abstract)
12:10
Designing In-Air Hand Gesture-based User Authentication System via Convex Hull (abstract)
12:30
Content Analysis of Privacy Policies Before and After GDPR (abstract)
12:50-14:00Lunch Break
14:00-14:50 Session 10: Keynote 4

Keynote “You keep using that word. I do not think it means what you think it means.” (Inigo Montoya)  by Stephen Marsh

14:50-15:00Coffee Break
15:00-16:20 Session 11
15:00
An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain (abstract)
15:20
Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning (abstract)
15:40
Careful What You Wish For: on the Extraction of Adversarially Trained Models (abstract)
PRESENTER: Kacem Khaled
16:00
Human Brains Can’t Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility (abstract)
16:20-16:30Coffee Break
16:30-17:30 Session 12
16:30
Garage Door Openers: A Rolling Code Protocol Case Study (abstract)
16:50
Usability of Paper Audit Trails in Electronic Voting Machines (abstract)
17:10
A Semantic-based Approach to Reduce the Reading Time of Privacy Policies (abstract)