PROGRAM
Days: Tuesday, August 23rd Wednesday, August 24th
Tuesday, August 23rd
View this program: with abstractssession overviewtalk overview
09:00-09:50 Session 1: Keynote 1
Keynote "Extraction of Complex DNN Models: Real Threat or Boogeyman" by Dr. N. ASOKAN
09:50-10:00Coffee Break
10:00-11:20 Session 2
10:00 | Efficient Homomorphic E-Voting Based On Batch Proof Techniques (abstract) |
10:20 | A Secure and Privacy-Preserving Dynamic Aggregation Mechanism for V2G System (abstract) |
10:40 | A Vulnerability in Face Anonymization – Privacy Disclosure from Face-obfuscated video (abstract) |
11:00 | LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach (abstract) |
11:20-11:30Coffee Break
11:30-12:50 Session 3
11:30 | Balancing privacy and accountability in digital payment methods using zk-SNARKs (abstract) PRESENTER: Tariq Bontekoe |
11:50 | Discovering Non-Metadata Contaminant Features in Intrusion Detection Datasets (abstract) |
12:10 | Security Analysis in Satellite Communication based on Geostationary Orbit (abstract) |
12:30 | Solving the Kidney Exchange Problem using Privacy-Preserving Integer Programming (abstract) |
12:50-14:00Lunch Break
14:00-14:50 Session 4: Keynote 2
Keynote "Unified View of IoT and CPS and Trend of Research on Microcontroller Based IoT" by Dr. Xinwen Fu
14:50-15:00Coffee Break
15:00-16:20 Session 5
15:00 | Mobile Mental Health Apps: Alternative Intervention or Intrusion? (abstract) |
15:20 | An Efficient, Verifiable, and Dynamic Searchable Symmetric Encryption with Forward Privacy (abstract) |
15:40 | A Feistel Network-based Prefix-Preserving Anonymization Approach, Applied To Network Traces (abstract) PRESENTER: Shaveta Dandyan |
16:00 | Visualizing and Reasoning about Presentable Digital Forensic Evidence with Knowledge Graphs (abstract) |
16:20-16:30Coffee Break
16:30-17:50 Session 6
16:30 | Towards the development of a realistic multidimensional IoT profiling dataset (abstract) |
16:50 | Privacy Policy Analysis with Sentence Classification (abstract) |
17:10 | Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories (abstract) |
17:30 | Privacy-Preserving Detection of Poisoning Attacks in Federated Learning (abstract) |
Wednesday, August 24th
View this program: with abstractssession overviewtalk overview
09:00-09:50 Session 7: Keynote 3
Keynote "The Dumbo Protocol Family: Making Asynchronous Consensus Real" by Dr. Qiang Tang
09:50-10:00Coffee Break
10:00-11:20 Session 8
10:00 | Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree (abstract) |
10:20 | Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers (abstract) |
10:40 | Achieving Efficient and Secure Query in Blockchain-based Traceability Systems (abstract) |
11:00 | User Behavior Simulation in ICS Cyber Ranges (abstract) |
11:20-11:30Coffee Break
11:30-12:50 Session 9
11:30 | SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables (abstract) |
11:50 | An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data (abstract) |
12:10 | Designing In-Air Hand Gesture-based User Authentication System via Convex Hull (abstract) |
12:30 | Content Analysis of Privacy Policies Before and After GDPR (abstract) |
12:50-14:00Lunch Break
14:00-14:50 Session 10: Keynote 4
Keynote “You keep using that word. I do not think it means what you think it means.” (Inigo Montoya) by Stephen Marsh
14:50-15:00Coffee Break
15:00-16:20 Session 11
15:00 | An Analytical Study of Selfish Mining Attacks on Chainweb Blockchain (abstract) |
15:20 | Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning (abstract) |
15:40 | Careful What You Wish For: on the Extraction of Adversarially Trained Models (abstract) PRESENTER: Kacem Khaled |
16:00 | Human Brains Can’t Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility (abstract) |
16:20-16:30Coffee Break
16:30-17:30 Session 12
16:30 | Garage Door Openers: A Rolling Code Protocol Case Study (abstract) |
16:50 | Usability of Paper Audit Trails in Electronic Voting Machines (abstract) |
17:10 | A Semantic-based Approach to Reduce the Reading Time of Privacy Policies (abstract) |