ESORICS 2021 in Darmstadt

Sessions


5. October 2021

Encryption 1

Leandros Maglaras

Fuzzing

Kehuan Zhang

ML 1

Nora Cuppens

User Behaviour / Underground Economy

Siamak F. Shahandashti

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

Tianyang Chen (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Wei Wang (Huazhong University of Science and Technology), Yubo Zheng (Huazhong University of Science and Technology), Willy Susilo (University of Wollongong), Hai Jin (Huazhong University of Science and Technology)

Full Paper

ARIstoteles - Dissecting Apple's Baseband Interface

Tobias Kröll (TU Darmstadt, SEEMOO), Stephan Kleber (Ulm University), Frank Kargl (Ulm University), Matthias Hollick (TU Darmstadt, SEEMOO), Jiska Classen (TU Darmstadt, SEEMOO)

Full Paper

CONTRA: Defending against Poisoning Attacks in Federated Learning

Sana Awan (The University of Kansas, Lawrence, KS, USA), Bo Luo (The University of Kansas, Lawrence, KS, USA), Fengjun Li (The University of Kansas, Lawrence, KS, USA)

Full Paper

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO

Hao Yang (Tsinghua University), Kun Du (Tsinghua University), Yubao Zhang (University of Delaware), Shuai Hao (Old Dominion University), Haining Wang (Virginia Tech), Jia Zhang (Tsinghua University), Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp.)

Full Paper

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy

Shabnam Kasra Kermanshahi (RMIT University), Rafael Dowsley (Monash University), Ron Steinfeld (Monash University), Amin Sakzad (Monash University), Joseph K. Liu (Monash University), Surya Nepal (Data61 CSIRO), Xun Yi (RMIT University)

Full Paper

webFuzz: Grey-box Fuzzing for Web Applications

Orpheas van Rooij (University of Cyprus), Marcos Charalambous (University of Cyprus), Demetris Kaizer (University of Cyprus), Michalis Papaevripides (University of Cyprus), Elias Athanasopoulos (University of Cyprus)

Full Paper

Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks

Yunlong Mao (Nanjing University), Xinyu Yuan (Nanjing University), Xinyang Zhao (Nanjing University), Sheng Zhong (Nanjing University)

Full Paper

An Explainable Online Password Strength Estimator

Liron David (Tel-Aviv University), Avishai Wool (Tel Aviv University)

Full Paper

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

Efficient Multi-Client Order-Revealing Encryption and Its Applications

Chunyang Lv (Xidian University), Jianfeng Wang (Xidian University), Shi-Feng Sun (Monash University), Yunling Wang (Xi'an University of Posts and Telecommunications), Saiyu Qi (Xi'an Jiaotong University), Xiaofeng Chen (Xidian University)

Full Paper

My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers

David Paaßen (University of Duisburg-Essen), Sebastian Surminski (University of Duisburg-Essen), Michael Rodler (University of Duisburg-Essen), Lucas Davi (University of Duisburg-Essen)

Full Paper

FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority

Ye Dong (Institute of Information Engineering,Chinese Academy of Sciences), Xiaojun Chen (Institute of Computing Technology, Institute of Information Engineering, Chinese Academy of Sciences), Kaiyun Li (University of Chinese Academy of Sciences), Dakui Wang (Institute of Information Engineering,Chinese Academy of Sciences), Shuai Zeng (Institute of Information Engineering,Chinese Academy of Sciences)

Full Paper

Detecting video-game injectors exchanged in game cheating communities

Panicos Karkallis (Royal Holloway, University of London), Jorge Blasco (Royal Holloway, University of London), Sergio Pastrana (Universidad Carlos III de Madrid), Guillermo Suarez-Tangil (IMDEA Networks)

Full Paper


Crypto 1

Shlomi Dolev

Malware

David Hay

Blockchain 1

Roberto Di Pietro

Automotive

John Rhee

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

Precomputation for Rainbow Tables Has Never Been so Fast

Gildas Avoine (IRISA,INSA), Xavier Carpent (KU Leuven), Diane Leblanc-Albarel (IRISA,CNRS)

Full Paper

Rope: Covert Multi-Process Malware Execution with Return-Oriented Programming

Daniele Cono D'Elia (Sapienza University of Rome), Lorenzo Invidia (Sapienza University of Rome), Leonardo Querzoni (Sapienza University of Rome)

Full Paper

Revocable Policy-Based Chameleon Hash

Shengmin Xu (Singapore Management University), Jianting Ning (Fujian Normal University), Jinhua Ma (Singapore Management University), Guowen Xu (Nanyang Technological University), Yuan Jiaming (University of Oregon), Robert Deng (School of Computing and Information System, Singapore Management University)

Full Paper

Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand

Alessandro Brighente (University of Padova), Mauro Conti (University of Padova), Izza Sadaf (University of Padova)

Full Paper

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

Alexandra Weber (TU Darmstadt), Oleg Nikiforov (TU Darmstadt), Alexander Sauer (TU Darmstadt), Johannes Schickel (TU Darmstadt), Gernot Alber (TU Darmstadt), Heiko Mantel (TU Darmstadt), Thomas Walther (TU Darmstadt)

Full Paper

Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains

Moritz Schloegel (Ruhr-Universität Bochum), Tim Blazytko (Ruhr-Universität Bochum), Julius Basler (Ruhr-Universität Bochum), Fabian Hemmer (Ruhr-Universität Bochum), Thorsten Holz (Ruhr-Universität Bochum)

Full Paper

Fair Peer-to-Peer Content Delivery via Blockchain

Songlin He (New Jersey Institute of Technology), Yuan Lu (Institute of Software Chinese Academy of Sciences), Qiang Tang (The University of Sydney), Guiling Wang (New Jersey Institute of Technology), Chase Wu (New Jersey Institute of Technology)

Full Paper

CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses

Bogdan Groza (Politehnica University of Timisoara), Pal-Stefan Murvay (Politehnica University of Timisoara), Lucian Popa (Politehnica University Timisoara), Camil Jichici (Politehnica University Timisoara)

Full Paper

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

Genetic Algorithm Assisted State-recovery Attack on Round-Reduced Xoodyak

Zimin Zhang (School of Information Science and Engineering, Shandong Normal University), Wenying Zhang (School of Information Science and Engineering, Shandong Normal University), Hongfang Shi (School of Information Science and Engineering, Shandong Normal University)

Full Paper

Peeler: Profiling Kernel-Level Events to Detect Ransomware

Muhammad Ejaz Ahmed (Data61 CSIRO), Hyoungshick Kim (Sungkyunkwan University), Seyit Camtepe (Data61 CSIRO), Surya Nepal (Data61 CSIRO)

Full Paper

Conclave: A Collective Stake Pool Protocol

Dimitris Karakostas (University of Edinburgh and IOHK), Aggelos Kiayias (University of Edinburgh and IOHK), Mario Larangeira (Tokyo Institute of Technology and IOHK)

Full Paper

Shadow-Catcher: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing

Zhongyuan Hau (Imperial College London), Soteris Demetriou (Imperial College London), Luis Muñoz-González (Imperial College London), Emil Lupu (Imperial College London)

Full Paper


6. October 2021

Encryption 2

Amin Sakzad

ML 2

Rui Zhu

Anomaly Detection

Aldar Chan

ZK

Jiaxin Pan

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles

Peter Chvojka (University of Wuppertal), Tibor Jager (University of Wuppertal), Daniel Slamanig (AIT Austrian Institute of Technology), Christoph Striecks (AIT Austrian Institute of Technology)

Full Paper

MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service

Xiaoning Liu (RMIT University), Yifeng Zheng (Harbin Institute of Technology), Xingliang Yuan (Monash University), Xun Yi (RMIT University)

Full Paper

AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks

Taous Madi (Ericsson Canada), Hyame Alameddine (Ericsson Canada), Makan Pourzandi (Ericsson Canada), Amine Boukhtouta (Ericsson Canada), Moataz Shoukry (Concordia University), Chadi Assi (Concordia University)

Full Paper

MLS group messaging: how Zero-Knowledge can secure Updates

Céline Duguey (DGA/Irisa), Julien Devigne (DGA), Pierre-Alain Fouque (CNRS/Univ Rennes 1)

Full Paper

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

Multipath TLS 1.3

Marc Fischlin (TU Darmstadt), Sven-Andre Müller (TU Darmstadt), Jean-Pierre Münch (TU Darmstadt), Lars Porth (TU Darmstadt)

Full Paper

TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks

Xudong Pan (Fudan University), Mi Zhang (Fudan University), Yifan Lu (Fudan University), Min Yang (School of Cyber Science and Engineering, Wuhan University, Wuhan, China)

Full Paper

MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic

Yael Daihes (Ben-Gurion University of the Negev, Akamai Technologies), Hen Tzaban (Akamai Technologies), Asaf Nadler (Ben-Gurion University of the Negev, Akamai Technologies), Asaf Shabtai (Ben-Gurion University of the Negev)

Full Paper

More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE

Jonathan Bootle (IBM Research - Zurich), Vadim Lyubashevsky (IBM Research - Zurich), Ngoc Khanh Nguyen (IBM Research - Zurich, ETH Zurich), Gregor Seiler (IBM Research - Zurich, ETH Zurich)

Full Paper

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments

Tran Viet Xuan Phuong (University of Wollongong and CSIRO), Willy Susilo (University of Wollongong), Guomin Yang (University of Wollongong), Jongkil Kim (University of Wollongong), Yang-Wai Chow (University of Wollongong), Dongxi Liu (University of Wollongong and CSIRO)

Full Paper

DA3G: Detecting Adversarial Attacks by Analysing Gradients

Jan-Philipp Schulze (Fraunhofer AISEC), Philip Sperl (Fraunhofer AISEC), Konstantin Böttinger (Fraunhofer AISEC)

Full Paper

Iterative Selection of Categorical Variables for Log Data Anomaly Detection

Max Landauer (AIT Austrian Institute of Technology), Georg Höld (AIT Austrian Institute of Technology), Markus Wurzenberger (AIT Austrian Institute of Technology GmbH), Florian Skopik (AIT Austrian Institute of Technology), Andreas Rauber (Vienna University of Technology)

Full Paper

Zero Knowledge Contingent Payments for Trained Neural Networks

Zhelei Zhou (Zhejiang University), Xinle Cao (Zhejiang University), Jian Liu (Zhejiang University), Bingsheng Zhang (Zhejiang University), Kui Ren (Zhejiang University)

Full Paper


Crypto 2

Michael Kreutzer

Privacy 1

Sanchari Das

Blockchain 2

Roberto Di Pietro

MPC

Jean-Pierre Seifert

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

Moving the Bar on Computationally Sound Exclusive-Or

Catherine Meadows (US Naval Research Laboratory)

Full Paper

Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis

Yanjun Zhang (The University of Queensland), Guangdong Bai (The University of Queensland), Xue Li (The University of Queensland), Caitlin Curtis (The University of Queensland), Chen Chen (The University of Queensland), Ryan Ko (The University of Queensland)

Full Paper

Probabilistic micropayments with transferability

Taisei Takahashi (Institute of Information Security), Akira Otsuka (Institute of Information Security)

Full Paper

Correlated Randomness Teleportation via Semi-trusted Hardware – Enabling Silent Multi-party Computation

Yibiao Lu (Zhejiang University), Bingsheng Zhang (Zhejiang University), Hong-Sheng Zhou (Virginia Commonwealth University), Weiran Liu (Alibaba Group), Lei Zhang (Alibaba Group), Kui Ren (Zhejiang University)

Full Paper

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

Optimal Verifiable Data Streaming Protocol with Data Auditing

Jianghong Wei (State Key Laboratory of Integrated Service Networks, Xidian University), Guohua Tian (State Key Laboratory of Integrated Service Networks, Xidian University), Jun Shen (State Key Laboratory of Integrated Service Networks, Xidian University), Xiaofeng Chen (Xidian University), Willy Susilo (University of Wollongong)

Full Paper

Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis

Raúl Pardo (IT University of Copenhagen), Willard Rafnsson (IT University of Copenhagen), Christian Probst (Unitec Institute of Technology), Andrzej Wąsowski (IT University of Copenhagen)

Full Paper

MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments

Panagiotis Chatzigiannis (George Mason University), Foteini Baldimtsi (George Mason University)

Full Paper

Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited

Aydin Abadi (University College London), Steven J. Murdoch (University College London), Thomas Zacharias (University of Edinburgh)

Full Paper

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

One-more Unforgeability of Blind ECDSA

Xianrui Qin (The University of Hong Kong), Cailing Cai (The University of Hong Kong), Tsz Hon Yuen (The University of Hong Kong)

Full Paper

Transparent Electricity Pricing with Privacy

Daniel Reijsbergen (Singapore University of Technology and Design), Zheng Yang (Singapore University of Technology and Design), Aung Maw (Singapore University of Technology and Design), Anh Dinh (Singapore University of Technology and Design), Jianying Zhou (Singapore University of Technology and Design)

Full Paper

Succinct Scriptable NIZK via Trusted Hardware

Bingsheng Zhang (Zhejiang University), Yuan Chen (Zhejiang University), Jiaqi Li (Zhejiang University), Yajin Zhou (Zhejiang University), Phuc Thai (Virginia Commonwealth University), Hong-Sheng Zhou (Virginia Commonwealth University), Kui Ren (Zhejiang University)

Full Paper


7. October 2021

Encryption 3

Aldar Chan

ML 3

Joaquin Garcia-Alfaro

Network Security

Cristin Alcaraz

Privacy 2

Sherman S. M. Chow

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

3.30 PM CEST

Security Analysis of SFrame

Takanori Isobe (University of Hyogo), Ryoma Ito (National Institute of Information and Communications Technology), Kazuhiko Minematsu (NEC Corporation)

Full Paper

Common Component in Black-Boxes is Prone to Attacks

Jiyi Zhang (National University of Singapore), Wesley Joon-Wie Tann (National University of Singapore), Ee-Chien Chang (Naional University of SIngapore), Hwee Kuan Lee (BII)

Full Paper

More efficient post-quantum KEMTLS with pre-distributed public keys

Peter Schwabe (Max Planck Institute for Security and Privacy and Radboud University), Douglas Stebila (University of Waterloo), Thom Wiggers (Radboud University)

Full Paper

CoinJoin in the Wild - An Empirical Analysis in Dash

Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg), Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)

Full Paper

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

3.50 PM CEST

Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE

Xiaojian Liang (Jinan University), Jian Weng (Jinan University), Anjia Yang (Jinan University), Lisha Yao (Jinan University), Zike Jiang (Jinan University), Zhenghao Wu (Jinan University)

Full Paper

LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks

Lodovico Giaretta (KTH Royal Institute of Technology), Ahmed Lekssays (University of Insubria), Barbara Carminati (University of Insubria), Elena Ferrari (University of Insubria), Sarunas Girdzijauskas (Royal Institute of Technology (KTH), Sweden)

Full Paper

How to (legally) keep secrets from mobile operators

Ghada Arfaoui (Orange), Olivier Blazy (XLIM), Xavier Bultel (INSA-CVL), Pierre-Alain Fouque (CNRS/Univ Rennes 1), Thibaut Jacques (IRISA), Adina Nedelcu (Orange), Cristina Onete (XLIM)

Full Paper

One-time Traceable Ring Signatures

Alessandra Scafuro (North Carolina State University), Bihan Zhang (NCSU)

Full Paper

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

4.10 PM CEST

Lattice-based HRA-secure Attribute-based Proxy Re-Encryption in Standard Model

Willy Susilo (University of Wollongong), Priyanka Dutta (School of Computing and Information Technology; University of Wollongong), Dung Hoang Duong (University of Wollongong), Partha Sarathi Roy (School of Computing and Information Technology; University of Wollongong)

Full Paper

Adversarial Activity Detection Using Keystroke Acoustics

Amin Fallahi (Syracuse University), Vir V. Phoha (Syracuse University)

Full Paper

A Formal Security Analysis of Session Resumption Across Hostnames

Tobias Handirk (Bergische Universität Wuppertal), Kai Gellert (Bergische Universität Wuppertal)

Full Paper

PACE with Mutual Authentication – towards an upgraded eID in Europe

Mirosław Kutyłowski (Wrocław University of Science and Technology), Patryk Kozieł (Wroclaw University Of Science and Technology), Przemysław Kubiak (Wroclaw University Of Science and Technology)

Full Paper


Differential Privacy

Changyu Dong

Crypto 3

Sherman S. M. Chow

Attacks

Martín Ochoa

Key Exchange & Encryption

Siaw-Lynn NG

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

6.15 PM CEST

Secure Random Sampling in Differential Privacy

Naoise Holohan (IBM Research Europe), Stefano Braghin (IBM Research Europe)

Full Paper

MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK)

Hongrui Cui (Shanghai Jiao Tong University), Kaiyi Zhang (Shanghai Jiao Tong University), Yu Chen (School of Cyber Science and Technology, Shandong University), Zhen Liu (Shanghai Jiao Tong University), Yu Yu (Shanghai Jiao Tong University)

Full Paper

Caught in the Web: DoS Vulnerablities in Parsers for Structured Data

Shawn Rasheed (Massey University), Jens Dietrich (Victoria University of Wellington), Amjed Tahir (Massey University)

Full Paper

Identity-based Identity-Concealed Authenticated Key Exchange

Huanhuan Lian (Fudan University), Tianyu Pan (Fudan University), Huige Wang (Fudan University, Anhui Science and Technology University), Yunlei Zhao (Fudan University, Xidian University)

Full Paper

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

6.35 PM CEST

Training Differentially Private Neural Networks With Lottery Tickets

Lovedeep Gondara (Simon Fraser University), Ricardo Carvalho (Simon Fraser University), Ke Wang (Simon Fraser University)

Full Paper

Complexity and Performance of Secure Floating-Point Polynomial Evaluation Protocols

Octavian Catrina (Universitatea Politehnica din Bucuresti)

Full Paper

POW-HOW: An Enduring Timing Side-Channel To Evade On-Line Malware Sandboxes

Antonio Nappa (UC Berkeley - UC3M Madrid), Panagiotis Papadopoulos (Telefonica Research), Matteo Varvello (Nokia Bell Labs), Daniel Aceituno-Gomez (Indra), Juan Tapiador (UC3M Madrid), Andrea Lanzi (University of Milan)

Full Paper

Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions

Sebastian Ramacher (AIT Austrian Institute of Technology), Daniel Slamanig (AIT Austrian Institute of Technology), Andreas Weninger (AIT Austrian Institute of Technology)

Full Paper

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

6.55 PM CEST

Locality Sensitive Hashing with Extended Differential Privacy

Natasha Fernandes (Macquarie University), Yusuke Kawamoto (National Institute of Advanced Industrial Science and Technology (AIST)), Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST))

Full Paper

SERVAS! Secure Enclaves via RISC-V Authenticryption Shield

Stefan Steinegger (Graz University of Technology), David Schrammel (Graz University of Technology), Samuel Weiser (Graz University of Technology), Pascal Nasahl (Graz University of Technology), Stefan Mangard (Graz University of Technology)

Full Paper

Characterizing GPU Overclocking Faults

Eldad Zuberi (Tel Aviv University), Avishai Wool (Tel Aviv University)

Full Paper

Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure

Leixiao Cheng (Shandong University), Fei Meng (Shandong University)

Full Paper