Shadow-Catcher: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing
Zhongyuan Hau (Imperial College London - United Kingdom), Soteris Demetriou (Imperial College London - United Kingdom), Luis Muñoz-González (Imperial College London - United Kingdom), Emil Lupu (Imperial College London - United Kingdom)
An Explainable Online Password Strength Estimator
Liron David (Tel-Aviv University - Israel), Avishai Wool (Tel Aviv University - Israel)
How to (legally) keep secrets from mobile operators
Ghada Arfaoui (Orange - France), Olivier Blazy (XLIM - France), Xavier Bultel (INSA-CVL - France), Pierre-Alain Fouque (CNRS/Univ Rennes 1 - France), Thibaut Jacques (IRISA - France), Adina Nedelcu (Orange - France), Cristina Onete (XLIM - France)
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
Alessandro Brighente (University of Padova - Italy), Mauro Conti (University of Padova - Italy), Izza Sadaf (University of Padova - Italy)
MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments
Panagiotis Chatzigiannis (George Mason University - United States), Foteini Baldimtsi (George Mason University - United States)
POW-HOW: An Enduring Timing Side-Channel To Evade On-Line Malware Sandboxes
Antonio Nappa (UC Berkeley - UC3M Madrid - Spain), Panagiotis Papadopoulos (Telefonica Research - Spain), Matteo Varvello (Nokia Bell Labs - United States), Daniel Aceituno-Gomez (Indra - Spain), Juan Tapiador (UC3M Madrid - Spain), Andrea Lanzi (University of Milan - Italy)
MediSC: Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service
Xiaoning Liu (RMIT University - Australia), Yifeng Zheng (Harbin Institute of Technology - China), Xingliang Yuan (Monash University - Australia), Xun Yi (RMIT University - Australia)
Revocable Policy-Based Chameleon Hash
Shengmin Xu (Singapore Management University - Singapore), Jianting Ning (Fujian Normal University - China), Jinhua Ma (Singapore Management University - Singapore), Guowen Xu (Nanyang Technological University - Singapore), Yuan Jiaming (University of Oregon - United States), Robert Deng (School of Computing and Information System, Singapore Management University - Singapore)
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
Yunlong Mao (Nanjing University - China), Xinyu Yuan (Nanjing University - China), Xinyang Zhao (Nanjing University - China), Sheng Zhong (Nanjing University - China)
Probabilistic micropayments with transferability
Taisei Takahashi (Institute of Information Security - Japan), Akira Otsuka (Institute of Information Security - Japan)
Conclave: A Collective Stake Pool Protocol
Dimitris Karakostas (University of Edinburgh and IOHK - United Kingdom), Aggelos Kiayias (University of Edinburgh and IOHK - United Kingdom), Mario Larangeira (Tokyo Institute of Technology and IOHK - Japan)
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks
Xudong Pan (Fudan University - China), Mi Zhang (Fudan University - China), Yifan Lu (Fudan University - China), Min Yang (School of Cyber Science and Engineering, Wuhan University, Wuhan, China - China)
LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks
Lodovico Giaretta (KTH Royal Institute of Technology - Sweden), Ahmed Lekssays (University of Insubria - Italy), Barbara Carminati (University of Insubria - Italy), Elena Ferrari (University of Insubria - Italy), Sarunas Girdzijauskas (Royal Institute of Technology (KTH), Sweden - Sweden)
Caught in the Web: DoS Vulnerablities in Parsers for Structured Data
Shawn Rasheed (Massey University - New Zealand), Jens Dietrich (Victoria University of Wellington - New Zealand), Amjed Tahir (Massey University - New Zealand)
Iterative Selection of Categorical Variables for Log Data Anomaly Detection
Max Landauer (AIT Austrian Institute of Technology - Austria), Georg Höld (AIT Austrian Institute of Technology - Austria), Markus Wurzenberger (AIT Austrian Institute of Technology GmbH - Austria), Florian Skopik (AIT Austrian Institute of Technology - Austria), Andreas Rauber (Vienna University of Technology - Austria)
webFuzz: Grey-box Fuzzing for Web Applications
Orpheas van Rooij (University of Cyprus - Cyprus), Marcos Charalambous (University of Cyprus - Cyprus), Demetris Kaizer (University of Cyprus - Cyprus), Michalis Papaevripides (University of Cyprus - Cyprus), Elias Athanasopoulos (University of Cyprus - Cyprus)
Common Component in Black-Boxes is Prone to Attacks
Jiyi Zhang (National University of Singapore - Singapore), Wesley Joon-Wie Tann (National University of Singapore - Singapore), Ee-Chien Chang (Naional University of SIngapore - Singapore), Hwee Kuan Lee (BII - Singapore)
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers
David Paaßen (University of Duisburg-Essen - Germany), Sebastian Surminski (University of Duisburg-Essen - Germany), Michael Rodler (University of Duisburg-Essen - Germany), Lucas Davi (University of Duisburg-Essen - Germany)
Rope: Covert Multi-Process Malware Execution with Return-Oriented Programming
Daniele Cono D'Elia (Sapienza University of Rome - Italy), Lorenzo Invidia (Sapienza University of Rome - Italy), Leonardo Querzoni (Sapienza University of Rome - Italy)
DA3G: Detecting Adversarial Attacks by Analysing Gradients
Jan-Philipp Schulze (Fraunhofer AISEC - Germany), Philip Sperl (Fraunhofer AISEC - Germany), Konstantin Böttinger (Fraunhofer AISEC - Germany)
Fair Peer-to-Peer Content Delivery via Blockchain
Songlin He (New Jersey Institute of Technology - United States), Yuan Lu (Institute of Software Chinese Academy of Sciences - China), Qiang Tang (The University of Sydney - Australia), Guiling Wang (New Jersey Institute of Technology - United States), Chase Wu (New Jersey Institute of Technology - United States)
FLOD: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Ye Dong (Institute of Information Engineering,Chinese Academy of Sciences - China), Xiaojun Chen (Institute of Computing Technology, Institute of Information Engineering, Chinese Academy of Sciences - China), Kaiyun Li (University of Chinese Academy of Sciences - China), Dakui Wang (Institute of Information Engineering,Chinese Academy of Sciences - China), Shuai Zeng (Institute of Information Engineering,Chinese Academy of Sciences - China)
CAN-SQUARE - Decimeter Level Localization of Electronic Control Units on CAN Buses
Bogdan Groza (Politehnica University of Timisoara - Romania), Pal-Stefan Murvay (Politehnica University of Timisoara - Romania), Lucian Popa (Politehnica University Timisoara - Romania), Camil Jichici (Politehnica University Timisoara - Romania)
Succinct Scriptable NIZK via Trusted Hardware
Bingsheng Zhang (Zhejiang University - China), Yuan Chen (Zhejiang University - China), Jiaqi Li (Zhejiang University - China), Yajin Zhou (Zhejiang University - China), Phuc Thai (Virginia Commonwealth University - United States), Hong-Sheng Zhou (Virginia Commonwealth University - United States), Kui Ren (Zhejiang University - China)
Peeler: Profiling Kernel-Level Events to Detect Ransomware
Muhammad Ejaz Ahmed (Data61 CSIRO - Australia), Hyoungshick Kim (Sungkyunkwan University - South Korea), Seyit Camtepe (Data61 CSIRO - Australia), Surya Nepal (Data61 CSIRO - Australia)
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
Yael Daihes (Ben-Gurion University of the Negev, Akamai Technologies - Israel), Hen Tzaban (Akamai Technologies - Israel), Asaf Nadler (Ben-Gurion University of the Negev, Akamai Technologies - Israel), Asaf Shabtai (Ben-Gurion University of the Negev - Israel)
Detecting video-game injectors exchanged in game cheating communities
Panicos Karkallis (Royal Holloway, University of London - United Kingdom), Jorge Blasco (Royal Holloway, University of London - United Kingdom), Sergio Pastrana (Universidad Carlos III de Madrid - Spain), Guillermo Suarez-Tangil (IMDEA Networks - Spain)
Characterizing GPU Overclocking Faults
Eldad Zuberi (Tel Aviv University - Israel), Avishai Wool (Tel Aviv University - Israel)
CONTRA: Defending against Poisoning Attacks in Federated Learning
Sana Awan (The University of Kansas, Lawrence, KS, USA - United States), Bo Luo (The University of Kansas, Lawrence, KS, USA - United States), Fengjun Li (The University of Kansas, Lawrence, KS, USA - United States)
More efficient post-quantum KEMTLS with pre-distributed public keys
Peter Schwabe (Max Planck Institute for Security and Privacy and Radboud University - Germany), Douglas Stebila (University of Waterloo - Canada), Thom Wiggers (Radboud University - Netherlands)
ARIstoteles - Dissecting Apple's Baseband Interface
Tobias Kröll (TU Darmstadt, SEEMOO - Germany), Stephan Kleber (Ulm University - Germany), Frank Kargl (Ulm University - Germany), Matthias Hollick (TU Darmstadt, SEEMOO - Germany), Jiska Classen (TU Darmstadt, SEEMOO - Germany)
A Formal Security Analysis of Session Resumption Across Hostnames
Tobias Handirk (Bergische Universität Wuppertal - Germany), Kai Gellert (Bergische Universität Wuppertal - Germany)
AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks
Taous Madi (Ericsson Canada - Canada), Hyame Alameddine (Ericsson Canada - Canada), Makan Pourzandi (Ericsson Canada - Canada), Amine Boukhtouta (Ericsson Canada - Canada), Moataz Shoukry (Concordia University - Canada), Chadi Assi (Concordia University - Canada)
Adversarial Activity Detection Using Keystroke Acoustics
Amin Fallahi (Syracuse University - United States), Vir V. Phoha (Syracuse University - United States)
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
Moritz Schloegel (Ruhr-Universität Bochum - Germany), Tim Blazytko (Ruhr-Universität Bochum - Germany), Julius Basler (Ruhr-Universität Bochum - Germany), Fabian Hemmer (Ruhr-Universität Bochum - Germany), Thorsten Holz (Ruhr-Universität Bochum - Germany)
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO
Hao Yang (Tsinghua University - China), Kun Du (Tsinghua University - China), Yubao Zhang (University of Delaware - United States), Shuai Hao (Old Dominion University - United States), Haining Wang (Virginia Tech - United States), Jia Zhang (Tsinghua University - China), Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp. - China)
One-time Traceable Ring Signatures
Alessandra Scafuro (North Carolina State University - United States), Bihan Zhang (NCSU - United States)
MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK)
Hongrui Cui (Shanghai Jiao Tong University - China), Kaiyi Zhang (Shanghai Jiao Tong University - China), Yu Chen (School of Cyber Science and Technology, Shandong University - China), Zhen Liu (Shanghai Jiao Tong University - China), Yu Yu (Shanghai Jiao Tong University - China)
Multipath TLS 1.3
Marc Fischlin (TU Darmstadt - Germany), Sven-Andre Müller (TU Darmstadt - Germany), Jean-Pierre Münch (TU Darmstadt - Germany), Lars Porth (TU Darmstadt - Germany)
Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis
Yanjun Zhang (The University of Queensland - Australia), Guangdong Bai (The University of Queensland - Australia), Xue Li (The University of Queensland - Australia), Caitlin Curtis (The University of Queensland - Australia), Chen Chen (The University of Queensland - Australia), Ryan Ko (The University of Queensland - Australia)
Transparent Electricity Pricing with Privacy
Daniel Reijsbergen (Singapore University of Technology and Design - Singapore), Zheng Yang (Singapore University of Technology and Design - Singapore), Aung Maw (Singapore University of Technology and Design - Singapore), Anh Dinh (Singapore University of Technology and Design - Singapore), Jianying Zhou (Singapore University of Technology and Design - Singapore)
Bestie: Very Practical Searchable Encryption with Forward and Backward Security
Tianyang Chen (Huazhong University of Science and Technology - China), Peng Xu (Huazhong University of Science and Technology - China), Wei Wang (Huazhong University of Science and Technology - China), Yubo Zheng (Huazhong University of Science and Technology - China), Willy Susilo (University of Wollongong - Australia), Hai Jin (Huazhong University of Science and Technology - China)
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Alexandra Weber (TU Darmstadt - Germany), Oleg Nikiforov (TU Darmstadt - Germany), Alexander Sauer (TU Darmstadt - Germany), Johannes Schickel (TU Darmstadt - Germany), Gernot Alber (TU Darmstadt - Germany), Heiko Mantel (TU Darmstadt - Germany), Thomas Walther (TU Darmstadt - Germany)
Security Analysis of SFrame
Takanori Isobe (University of Hyogo - Japan), Ryoma Ito (National Institute of Information and Communications Technology - Japan), Kazuhiko Minematsu (NEC Corporation - Japan)
Precomputation for Rainbow Tables Has Never Been so Fast
Gildas Avoine (IRISA,INSA - France), Xavier Carpent (KU Leuven - Belgium), Diane Leblanc-Albarel (IRISA,CNRS - France)
Zero Knowledge Contingent Payments for Trained Neural Networks
Zhelei Zhou (Zhejiang University - China), Xinle Cao (Zhejiang University - China), Jian Liu (Zhejiang University - China), Bingsheng Zhang (Zhejiang University - China), Kui Ren (Zhejiang University - China)
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments
Tran Viet Xuan Phuong (University of Wollongong and CSIRO - Australia), Willy Susilo (University of Wollongong - Australia), Guomin Yang (University of Wollongong - Australia), Jongkil Kim (University of Wollongong - Australia), Yang-Wai Chow (University of Wollongong - Australia), Dongxi Liu (University of Wollongong and CSIRO - Australia)
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE
Jonathan Bootle (IBM Research - Zurich - Switzerland), Vadim Lyubashevsky (IBM Research - Zurich - Switzerland), Ngoc Khanh Nguyen (IBM Research - Zurich, ETH Zurich - Switzerland), Gregor Seiler (IBM Research - Zurich, ETH Zurich - Switzerland)
One-more Unforgeability of Blind ECDSA
Xianrui Qin (The University of Hong Kong - China), Cailing Cai (The University of Hong Kong - China), Tsz Hon Yuen (The University of Hong Kong - Hong Kong)
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger (Graz University of Technology - Austria), David Schrammel (Graz University of Technology - Austria), Samuel Weiser (Graz University of Technology - Austria), Pascal Nasahl (Graz University of Technology - Austria), Stefan Mangard (Graz University of Technology - Austria)
MLS group messaging: how Zero-Knowledge can secure Updates
Céline Duguey (DGA/Irisa - France), Julien Devigne (DGA - France), Pierre-Alain Fouque (CNRS/Univ Rennes 1 - France)
PACE with Mutual Authentication – towards an upgraded eID in Europe
Mirosław Kutyłowski (Wrocław University of Science and Technology - Poland), Patryk Kozieł (Wroclaw University Of Science and Technology - Poland), Przemysław Kubiak (Wroclaw University Of Science and Technology - Poland)
Optimal Verifiable Data Streaming Protocol with Data Auditing
Jianghong Wei (State Key Laboratory of Integrated Service Networks, Xidian University - China), Guohua Tian (State Key Laboratory of Integrated Service Networks, Xidian University - China), Jun Shen (State Key Laboratory of Integrated Service Networks, Xidian University - China), Xiaofeng Chen (Xidian University - China), Willy Susilo (University of Wollongong - Australia)
Complexity and Performance of Secure Floating-Point Polynomial Evaluation Protocols
Octavian Catrina (Universitatea Politehnica din Bucuresti - Romania)
CoinJoin in the Wild - An Empirical Analysis in Dash
Dominic Deuber (Friedrich-Alexander-Universität Erlangen-Nürnberg - Germany), Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg - Germany)
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy
Shabnam Kasra Kermanshahi (RMIT University - Australia), Rafael Dowsley (Monash University - Australia), Ron Steinfeld (Monash University - Australia), Amin Sakzad (Monash University - Australia), Joseph K. Liu (Monash University - Australia), Surya Nepal (Data61 CSIRO - Australia), Xun Yi (RMIT University - Australia)
Identity-based Identity-Concealed Authenticated Key Exchange
Huanhuan Lian (Fudan University - China), Tianyu Pan (Fudan University - China), Huige Wang (Fudan University, Anhui Science and Technology University - China), Yunlei Zhao (Fudan University, Xidian University - China)
Locality Sensitive Hashing with Extended Differential Privacy
Natasha Fernandes (Macquarie University - Australia), Yusuke Kawamoto (National Institute of Advanced Industrial Science and Technology (AIST) - Japan), Takao Murakami (National Institute of Advanced Industrial Science and Technology (AIST) - Japan)
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions
Sebastian Ramacher (AIT Austrian Institute of Technology - Austria), Daniel Slamanig (AIT Austrian Institute of Technology - Austria), Andreas Weninger (AIT Austrian Institute of Technology - Austria)
Lattice-based HRA-secure Attribute-based Proxy Re-Encryption in Standard Model
Willy Susilo (University of Wollongong - Australia), Priyanka Dutta (School of Computing and Information Technology; University of Wollongong - Australia), Dung Hoang Duong (University of Wollongong - Australia), Partha Sarathi Roy (School of Computing and Information Technology; University of Wollongong - Australia)
Correlated Randomness Teleportation via Semi-trusted Hardware – Enabling Silent Multi-party Computation
Yibiao Lu (Zhejiang University - China), Bingsheng Zhang (Zhejiang University - China), Hong-Sheng Zhou (Virginia Commonwealth University - United States), Weiran Liu (Alibaba Group - China), Lei Zhang (Alibaba Group - China), Kui Ren (Zhejiang University - China)
Efficient Multi-Client Order-Revealing Encryption and Its Applications
Chunyang Lv (Xidian University - China), Jianfeng Wang (Xidian University - China), Shi-Feng Sun (Monash University - Australia), Yunling Wang (Xi'an University of Posts and Telecommunications - China), Saiyu Qi (Xi'an Jiaotong University - China), Xiaofeng Chen (Xidian University - China)
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
Peter Chvojka (University of Wuppertal - Germany), Tibor Jager (University of Wuppertal - Germany), Daniel Slamanig (AIT Austrian Institute of Technology - Austria), Christoph Striecks (AIT Austrian Institute of Technology - Austria)
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure
Leixiao Cheng (Shandong University - China), Fei Meng (Shandong University - China)
Secure Random Sampling in Differential Privacy
Naoise Holohan (IBM Research Europe - Ireland), Stefano Braghin (IBM Research Europe - Ireland)
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis
Raúl Pardo (IT University of Copenhagen - Denmark), Willard Rafnsson (IT University of Copenhagen - Denmark), Christian Probst (Unitec Institute of Technology - Germany), Andrzej Wąsowski (IT University of Copenhagen - Denmark)
Genetic Algorithm Assisted State-recovery Attack on Round-Reduced Xoodyak
Zimin Zhang (School of Information Science and Engineering, Shandong Normal University - China), Wenying Zhang (School of Information Science and Engineering, Shandong Normal University - China), Hongfang Shi (School of Information Science and Engineering, Shandong Normal University - China)
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE
Xiaojian Liang (Jinan University - China), Jian Weng (Jinan University - China), Anjia Yang (Jinan University - China), Lisha Yao (Jinan University - China), Zike Jiang (Jinan University - China), Zhenghao Wu (Jinan University - China)
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
Aydin Abadi (University College London - United Kingdom), Steven J. Murdoch (University College London - United Kingdom), Thomas Zacharias (University of Edinburgh - United Kingdom)
Training Differentially Private Neural Networks With Lottery Tickets
Lovedeep Gondara (Simon Fraser University - Canada), Ricardo Carvalho (Simon Fraser University - Canada), Ke Wang (Simon Fraser University - Canada)
Moving the Bar on Computationally Sound Exclusive-Or
Catherine Meadows (US Naval Research Laboratory - United States)