MAY 24-27, 2021

42nd IEEE Symposium on
Security and Privacy

   Registration and Access

Agenda


Note: All times in the program are in PDT time zone.

May 24


Networking on Hopin

Rooms A, B & C

07:45AM - 08:00AM

Opening General Session

Rooms A, B & C

08:00AM - 09:00AM

Paper Previews

Rooms A, B & C

09:00AM - 09:10AM

Session #1A: Software Security 1

Room A

09:10AM - 10:10AM

Session chair: Limin Jia
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)
James Davis (Virginia Tech / Purdue University), Francisco Servant (Virginia Tech), Dongyoon Lee (Stony Brook University)
Co-Inflow: Coarse-Grained Information Flow Control for Java-like Languages
Jian Xiang (Harvard University), Stephen Chong (Harvard University)
When Function Signature Recovery Meets Compiler Optimization
Yan Lin (Singapore Management University), Debin Gao (Singapore Management University)

Session #1B: Mobile Security 1

Room B

09:10AM - 10:10AM

Session chair: Zhiyun Qian
How Did That Get In My Phone? Unwanted App Distribution on Android Devices
Platon Kotzias (NortonLifelock Research Group), Juan Caballero (IMDEA Software Institute), Leyla Bilge (NortonLifelock Research Group)
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings
Rui Li (Shandong University), Wenrui Diao (Shandong University), Zhou Li (University of California, Irvine), Jianqi Du (Shandong University), Shanqing Guo (Shandong University)
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization
Andrea Possemato (IDEMIA/Eurecom), Simone Aonzo (Eurecom), Davide Balzarotti (Eurecom), Yanick Fratantonio (Eurecom)

Session #1C: Adversarial Machine Learning and Unlearning

Room C

09:10AM - 10:10AM

Session chair: Yanfang (Fanny) Ye
Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu (University of Illinois at Urbana-Champaign), Qi Wang (University of Illinois at Urbana-Champaign), Huichen Li (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Carl A. Gunter (University of Illinois at Urbana-Champaign), Bo Li (University of Illinois at Urbana-Champaign)
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Sahar Abdelnabi (CISPA Helmholtz Center for Information Security), Mario Fritz (CISPA Helmholtz Center for Information Security)
Machine Unlearning
Lucas Bourtoule (University of Toronto; Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Christopher A. Choquette-Choo (University of Toronto; Vector Institute), Hengrui Jia (University of Toronto; Vector Institute), Adelin Travers (University of Toronto; Vector Institute), Baiwu Zhang (University of Toronto; Vector Institute), David Lie (University of Toronto), Nicolas Papernot (University of Toronto; Vector Institute)

Break / Hopin Networking

Rooms A, B & C

10:10AM - 10:25AM

Paper Previews

Rooms A, B & C

10:15AM - 10:25AM

Session #2A: Security of Autonomous Vehicles

Room A

10:25AM - 11:25AM

Session chair: Yuan Tian
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision
Xiaoyu Ji (Zhejiang University), Yushi Cheng (Zhejiang University), Yuepeng Zhang (Zhejiang University), Kai Wang (Zhejiang University), Chen Yan (Zhejiang University), Kevin Fu (University of Michigan), Wenyuan Xu (Zhejiang University)
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Yulong Cao* (University of Michigan), Ningfei Wang* (University of California, Irvine), Chaowei Xiao* (NVIDIA Research and Arizona State University), Dawei Yang* (University of Michigan), Jin Fang (Baidu Research and National Engineering Laboratory of Deep Learning Technology and Application, China), Ruigang Yang (Inceptio), Qi Alfred Chen (University of California, Irvine), Mingyan Liu (University of Michigan), Bo Li (University of Illinois at Urbana-Champaign), (*co-first authors)
CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers
Sekar Kulandaivel (Carnegie Mellon University), Shalabh Jain (Research and Technology Center, Robert Bosch LLC, USA), Jorge Guajardo (Research and Technology Center, Robert Bosch LLC, USA), Vyas Sekar (Carnegie Mellon University)

Session #2B: Cyber Risk and Abuse

Room B

10:25AM - 11:25AM

Session chair: Adam Aviv
SoK: Quantifying Cyber Risk
Daniel W Woods (University of Innsbruck), Rainer Böhme (University of Innsbruck)
Self-Supervised Euphemism Detection and Identification for Content Moderation
Wanzheng Zhu (University of Illinois, at Urbana-Champaign), Hongyu Gong (Facebook), Rohan Bansal (Carnegie Mellon University), Zachary Weinberg (University of Massachusetts, Amherst), Nicolas Christin (Carnegie Mellon University), Giulia Fanti (Carnegie Mellon University), Suma Bhat (University of Illinois, at Urbana-Champaign)
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Kurt Thomas (Google), Deepak Kumar (University of Illinois, Urbana-Champaign), Michael Bailey (University of Illinois, Urbana-Champaign), Sarah Meiklejohn (University College London), Thomas Ristenpart (Cornell Tech), Devdatta Akhawe (Independent Researcher), Dan Boneh (Stanford), Zakir Durumeric (Stanford), Damon McCoy (New York University), Gianluca Stringhini (Boston University), Sunny Consolvo (Google), Patrick Gage Kelley (Google), Elie Bursztein (Google), Nicki Dell (Cornell)

Session #2C: Crypto Protocols

Room C

10:25AM - 11:25AM

Session chair: Ioana Boureanu
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Joel Alwen (Wickr Inc.), Margarita Capretto (Universidad Nacional de Rosario), Miguel Cueto (ENS Lyon), Chethan Kamath (Northeastern University), Karen Klein (IST Austria), Ilia Markov (IST Austria), Guillermo Pascual-Perez (IST Austria), Krzysztof Pietrzak (IST Austria), Michael Walter (IST Austria), Michelle Yeo (IST Austria)
Merkle^2: A Low-Latency Transparency Log System
Yuncong Hu (UC Berkeley), Kian Hooshmand (UC Berkeley), Rajeswari Harika Kalidhindi (UC Berkeley), Seung Jin Yang (UC Berkeley), Raluca Popa (UC Berkeley)
Post-Quantum WireGuard
Andreas Hülsing (Eindhoven University of Technology, NL), Kai-Chun Ning (KPN B.V., NL), Peter Schwabe (Radboud University, NL), Florian Weber (Eindhoven University of Technology, NL), Philip R. Zimmermann (Delft University of Technology & KPN B.V., NL)

Lunch Break / Speed Mentoring / Exhibit Hall

Rooms A, B & C

11:25AM - 12:05PM

Paper Previews

Rooms A, B & C

11:55AM - 12:05PM

Session #3A: Hardware Attacks

Room A

12:05PM - 01:05PM

Session chair: Yossi Oren
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel
Mingtian Tan (Fudan University), Junpeng Wan (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine)
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
Stephan van Schaik (University of Michigan), Marina Minkin (University of Michigan), Andrew Kwong (University of Michigan), Daniel Genkin (University of Michigan), Yuval Yarom (University of Adelaide and Data61)
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Moritz Lipp (Graz University of Technology), Andreas Kogler (Graz University of Technology), David Oswald (The University of Birmingham, UK), Michael Schwarz (CISPA Helmholtz Center for Information Security), Catherine Easdon (Graz University of Technology), Claudio Canella (Graz University of Technology), Daniel Gruss (Graz University of Technology), Catherine Easdon (Graz University of Technology)

Session #3B: Privacy

Room B

12:05PM - 01:05PM

Session chair: Carmela Troncoso
Defensive Technology Use by Political Activists During the Sudanese Revolution
Alaa Daffalla (University of Kansas), Lucy Simko (University of Washington), Tadayoshi Kohno (University of Washington), Alexandru G. Bardas (University of Kansas)
DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers
Benjamin Bichsel (ETH Zurich), Samuel Steffen (ETH Zurich), Ilija Bogunovic (ETH Zurich), Martin Vechev (ETH Zurich)
Is Private Learning Possible with Instance Encoding?
Nicholas Carlini (Google), Samuel Deng (Columbia), Sanjam Garg (UC Berkeley), Somesh Jha (UW-Madison), Saeed Mahloujifar (Princeton), Mohammad Mahmoody (University of Virginia), Abhradeep Thakurta (Google), Florian Tramer (Stanford University)

Session #3C: Crypto Currencies 1

Room C

12:05PM - 01:05PM

Session chair: Arthur Gervais
High-Frequency Trading on Decentralized On-Chain Exchanges
Liyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Christof Ferreira Torres (University of Luxembourg), Duc V Le (Purdue University), Arthur Gervais (Imperial College London)
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu (Stanford University), Ertem Nusret Tas (Stanford University), David Tse (Stanford University)
Red Belly: A Secure, Fair and Scalable Open Blockchain
Tyler Crain (University of Sydney), Christopher Natoli (University of Sydney), Vincent Gramoli (University of Sydney and EPFL)

Break / Hopin Networking

Rooms A, B & C

01:05PM - 01:20PM

Paper Previews

Rooms A, B & C

01:10PM - 01:20PM

Session #4A: IoT Security and Privacy

Room A

01:20PM - 02:20PM

Session chair: Marcus Peinado
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
Nilo Redini (UC Santa Barbara), Andrea Continella (University of Twente), Dipanjan Das (UC Santa Barbara), Giulio De Pasquale (UC Santa Barbara), Noah Spahn (UC Santa Barbara), Aravind Machiry (UC Santa Barbara), Antonio Bianchi (Purdue University), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)
Data Privacy in Trigger-Action Systems
Yunang Chen (University of Wisconsin-Madison), Amrita Roy Chowdhury (University of Wisconsin-Madison), Ruizhe Wang (University of Wisconsin-Madison), Andrei Sabelfeld (Chalmers University of Technology), Rahul Chatterjee (University of Wisconsin-Madison), Earlence Fernandes (University of Wisconsin-Madison)
Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?
Pardis Emami-Naeini (University of Washington), Janarth Dheenadhayalan (Carnegie Mellon University), Yuvraj Agarwal (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)

Session #4B: Formal Verification of Protocols

Room B

01:20PM - 02:20PM

Session chair: Ioaan Boureanu
An Interactive Prover for Protocol Verification in the Computational Model
David Baelde (LSV, CNRS, ENS Paris-Saclay, Université Paris-Saclay), Stéphanie Delaune (Univ Rennes, CNRS, IRISA), Charlie Jacomme (CISPA Helmholtz Center for Information Security), Adrien Koutsos (INRIA Paris), Solene Moreau (Univ Rennes, CNRS, IRISA), Charlie Jacomme (LSV & CNRS & ENS Paris-Saclay & INRIA & Université Paris-Saclay, Paris, France)
SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
Jon Stephens (The University of Texas at Austin), Kostas Ferles (The University of Texas at Austin), Benjamin Mariano (The University of Texas at Austin), Shuvendu Lahiri (Microsoft Research), Isil Dillig (The University of Texas at Austin)
An I/O Separation Model for Formal Verification of Kernel Implementations
Miao Yu (Carnegie Mellon University), Virgil Gligor (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)

Session #4C: Distributed Cryptography

Room C

01:20PM - 02:20PM

Session chair: Vanessa Teague
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Carmit Hazay (Bar-Ilan University), Megan Chen (Northeastern U.), Yuval Ishai (Technion), Yuriy Kashnikov (Ligero Inc.), Daniele Micciancio (UC San Diego), Tarik Riviere (Ligero Inc.), abhi shelat (Northeastern U.), Ruihan Wang (Ligero Inc.), Muthu Venkitasubramaniam (U. of Rochester)
Proactive Threshold Wallets with Offline Devices
Yashvanth Kondi (Northeastern University), Bernardo Magri (Aarhus University), Claudio Orlandi (Aarhus University), Omer Shlomovits (ZenGo X)
Compact Certificates of Collective Knowledge
Silvio Micali (Algorand and MIT), Leonid Reyzin (Algorand and Boston University), Georgios Vlachos (), Riad S. Wahby (Algorand and Stanford), Nickolai Zeldovich (Algorand and MIT)

Break / Hopin Networking

Rooms A, B & C

02:20PM - 02:30PM

Intel Hardware Security Academic Award

Rooms A, B & C

02:30PM - 03:00PM

Poster Session / Networking (gather.town)

Rooms A, B & C

03:00PM - 05:00PM

CANnon: Stealthy Remote Shutdown Attacks via Automotive MCUs
Sekar Kulandaivel

Constant-Time Foundations for the New Spectre Era
Sunjay Cauligi and Craig Disselkoen

Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li

Differentially Private Imaging via Latent Space Manipulation
Tao Li and Chris Clifton

Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Nusret Tas, David Tse

Explainability-based Backdoor Attacks Against Graph Neural Networks
Jing Xu, Minhui Xue, Stjepan Picek

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig

Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Ningfei Wang, Yulong Cao, Chaowei Xiao, Daweil Yang, Jin Fang, Ruigang Yang, Qi Alfredo Chen, Mingyan Liu, Bo Li

Known Vulnerability Detection for WebAssembly Binaries
Luis Garcia,Pengfei Sun, Yi Han, Saman Zonouz and Yao Zhao

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar

Machine Unlearning
Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers

On the (Im)Practicality of Adversarial Perturbation for Image Privacy
Arezoo Rajabi, Rakesh Bobba, Mike Rosulek, Charles V. Wright and Wu-Chi Feng

Privacy Preserving Recurrent Neural Network (RNN) Prediction using Homomorphic Encryption
Robert Podschwadt, Daniel Takabi

Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim

Proof-of-Learning: Definitions and Practice
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi

Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi

Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention
Yibo Wang , Yuzhe Tang, Kai Li, and Sencer Burak Somuncuoglu

Security vs. Privacy in Cyber-Physical Systems
Luis Burbano, Gabriel Torres

Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution
Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, Christopher W. Fletcher

Symbolic Modeling of Micro Services for Intrusion Detection
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang

Uncover the Veil: The First Lesson We Learn from a Real-world Bulk Power System
Xi Qin, Neil Ortiz, Alvaro A. Cardenas

May 25


Poster Session / Networking (gather.town)

Rooms A, B & C

06:00AM - 08:00AM

Bitcoin-Compatible Virtual Channels
Oguzhan Ersoy

Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
Timothy Trippel

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan

FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis
Tianyi Li, Xiaofeng Zheng, Kaiwen Shen and Xinhui Han

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal

Fraud Detection with Confidence: A Benchmarking Case Study on Synthetic Data
Daniel Turner-Szymkiewicz, Prof. Ulf Norinder, Dr. Miroslawa Alunowska Figueroa, Dr. Edgar Lopez-Rojas

High-Frequency Trading on Decentralized On-Chain Exchanges
Liyi Zhou

Is it Possible to Detect Unknown DNS Covert Channel With No Support of Real Malware Samples?
Jiawen Diao, Zhongru Wang, Xiang Cui, Tian Wang and Hai Jiang

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Guillermo Pascual-Perez

MPCLeague: Robust and Efficient Mixed-protocol Framework for 4-party Computation
Nishat Koti, Arpita Patra and Ajith Suresh

Mobile Payment Applications: Risks and Possibilities
Trishla Shah, Raghav Sampangi and Angela Siegel

On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
Kaihua Qin

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision
Yushi Cheng, Chen Yan

Proof-of-Learning: Definitions and Practice
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi

Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi

Rosita++: Automatic Second-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton, Niels Samwel, Łukasz Chmielewski, Lejla Batina, Markus Wagner, Yuval Yarom

Specification-Based Process Control Attack Detection in Substation Automation
Muhammad Nouman Nafees, Neetesh Saxena and Pete Burnap

Squirrel: An Interactive Prover for Protocol Verification in the Computational Model
David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, and Solène Moreau.

Ethics in Security and Privacy Research Panel

Rooms A, B & C

08:00AM - 08:45AM

Moderator: Thorsten Holz ( Ruhr-Universität Bochum)
Panelists
Roger Dingledine The Tor Project
Joseph Bonneau New York University
Katie Shilton University of Maryland College Park
Erin Kenneally Guidewire and Elchemy

Break / Hopin Networking

Rooms A, B & C

08:45AM - 09:00AM

Paper Previews

Rooms A, B & C

08:50AM - 09:00AM

Session #5A: Fuzzing

Room A

09:00AM - 10:00AM

Session chair: Brendan Dolan-Gavitt
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation
Yongheng Chen (Georgia Institute of Technology), Rui Zhong (Pennsylvania State University), Hong Hu (Pennsylvania State University), Hangfan Zhang (Pennsylvania State University), Yupeng Yang (University of Electronic Science and Technology of China), Dinghao Wu (Pennsylvania State University), Wenke Lee (Georgia Institute of Technology)
STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
Zhuo Zhang (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Yousra Aafer (University of Waterloo), Xuwei Liu (Purdue University), Xiangyu Zhang (Purdue University)
NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis
Jaeseung Choi (KAIST), Kangsu Kim (KAIST), Daejin Lee (KAIST), Sang Kil Cha (KAIST)

Session #5B: Attacks on Speech Systems

Room B

09:00AM - 10:00AM

Session chair: Jason Xue
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen (ShanghaiTech University; Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Sen Chen (Tianjin University; Nanyang Technological University), Lingling Fan (Nanyang Technological University), Xiaoning Du (Nanyang Technological University), Zhe Zhao (ShanghaiTech University), Fu Song (ShanghaiTech University; Shanghai Engineering Research Center of Intelligent Vision and Imaging), Yang Liu (Nanyang Technological University)
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Hadi Abdullah (University of Florida), Muhammad Sajidur Rahman (University of Florida), Washington Garcia (University of Florida), Kevin Warren (University of Florida), Anurag Swarnim Yadav (University of Florida), Tom Shrimpton (University of Florida), Patrick Traynor (University of Florida)
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Hadi Abdullah (University of Florida), Kevin Warren (University of Florida), Vincent Bindschaedler (University of Florida), Nicolas Papernot (University of Toronto), Patrick Traynor (University of Florida)

Session #5C: Cryptography 1

Room C

09:00AM - 10:00AM

Session chair: Emily Shen
Cross-Domain Access Control Encryption -- Arbitrary-policy, Constant-size, Efficient
Xiuhua Wang (The Chinese University of Hong Kong), Sherman S. M. Chow (The Chinese University of Hong Kong)
Lightweight Techniques for Private Heavy Hitters
Dan Boneh (Stanford), Elette Boyle (IDC Herzliya), Henry Corrigan-Gibbs (MIT CSAIL), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion)
SoK: Computer-Aided Cryptography
Manuel Barbosa (University of Porto and INESC TEC), Gilles Barthe (Max Planck Institute for Security and Privacy; IMDEA Software Institute), Karthik Bhargavan (INRIA Paris), Bruno Blanchet (INRIA Paris), Cas Cremers (CISPA Helmholtz Center for Information Security), Kevin Liao (Max Planck Institute for Security and Privacy; Massachusetts Institute of Technology), Bryan Parno (Carnegie Mellon University)

Break / Hopin Networking

Rooms A, B & C

10:00AM - 10:15AM

Paper Previews

Rooms A, B & C

10:05AM - 10:15AM

Session #6A: Software Security 2

Room A

10:15AM - 11:15AM

Session chair: Michael Franz
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Xueling Zhang (University of Texas at San Antonio), Xiaoyin Wang (University of Texas at San Antonio), Rocky Slavin (University of Texas at San Antonio), Jianwei Niu (University of Texas at San Antonio)
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
Zhuo Zhang (Purdue University), Yapeng Ye (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Wen-chuan Lee (Purdue University), Yonghwi Kwon (University of Virginia), Yousra Aafer (University of Waterloo), Xiangyu Zhang (Purdue University)
SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask
Chengbin Pang (Stevens Institute of Technology; Nanjing University), Ruotong Yu (Stevens Institute of Technology), Yaohui Chen (Facebook Inc.), Eric Koskinen (Stevens Institute of Technology), Georgios Portokalidis (Stevens Institute of Technology), Bing Mao (Nanjing University), Jun Xu (Stevens Institute of Technology)

Session #6B: Differential Privacy

Room B

10:15AM - 11:15AM

Session chair: Ananth Raghunathan
Learning Differentially Private Mechanisms
Subhajit Roy (IIT Kanpur), Justin Hsu (University of Wisconsin--Madison), Aws Albarghouthi (University of Wisconsin--Madison)
Adversary Instantiation: Lower bounds for differentially private machine learning
Milad Nasr (University of Massachusetts Amherst), Shuang Song (Google), Abhradeep Guha Thakurta (Google), Nicolas Papernot (Google), Nicholas Carlini (Google)
Manipulation Attacks in Local Differential Privacy
Albert Cheu (Northeastern University), Adam Smith (Boston University), Jonathan Ullman (Northeastern University)

Session #6C: Crypto Currencies 2

Room C

10:15AM - 11:15AM

Session chair: Dominique Schröder
Bitcoin-Compatible Virtual Channels
Lukas Aumayr (Technische Universität Wien), Oguzhan Ersoy (Delft University of Technology), Andreas Erwig (Technische Universität Darmstadt), Sebastian Faust (Technische Universität Darmstadt), Kristina Hostáková (ETH Zürich), Matteo Maffei (Technische Universität Wien), Pedro Moreno-Sanchez (Technische Universität Wien), Siavash Riahi (Technische Universität Darmstadt)
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
Liyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Antoine Cully (Imperial College London), Benjamin Livshits (Imperial College London), Arthur Gervais (Imperial College London)
Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures
Sri AravindaKrishnan Thyagarajan (Friedrich Alexander Universität Erlangen-Nürnberg), Giulio Malavolta (Max Planck Institute for Security and Privacy)

Break / Hopin Networking

Rooms A, B & C

11:15AM - 11:30AM

Paper Previews

Rooms A, B & C

11:20AM - 11:30AM

Session #7A: HW Security

Room A

11:30AM - 12:30PM

Session chair: David Lie
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
Wei Song (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Boya Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zihan Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zhenzhen Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Wenhao Wang (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Peng Liu (The Pennsylvania State University)
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
Timothy Trippel (University of Michigan), Kang G. Shin (University of Michigan), Kevin B. Bush (MIT Lincoln Laboratory), Matthew Hicks (Virginia Tech)
Systematic Analysis of Randomization-Based Protected Cache Architectures
Antoon Purnal (imec-COSIC, KU Leuven), Lukas Giner (Graz University of Technology), Daniel Gruss (Graz University of Technology), Ingrid Verbauwhede (imec-COSIC, KU Leuven)

Session #7B: ML Security and Privacy

Room B

11:30AM - 12:30PM

Session chair: Olya Ohrimenko
SIRNN: A Math Library for Secure RNN Inference
Deevashwer Rathee (Microsoft), Mayank Rathee (Microsoft), Rahul Kranti Kiran Goli (Microsoft), Divya Gupta (Microsoft), Rahul Sharma (Microsoft), Nishanth Chandran (Microsoft), Aseem Rastogi (Microsoft)
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan (University of Virginia), Brian Knott (Facebook AI Research), Yuan Tian (University of Virginia), David J. Wu (University of Virginia)
Proof-of-Learning: Definitions and Practice
Hengrui Jia (University of Toronto and Vector Institute), Mohammad Yaghini (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (University of Toronto and Vector Institute), Natalie Dullerud (University of Toronto and Vector Institute), Anvith Thudi (University of Toronto and Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Nicolas Papernot (University of Toronto and Vector Institute)

Session #7C: Secure Multiparty Computation and Homomorphic Encryption

Room C

11:30AM - 12:30PM

Session chair: Adria Gascon
Pegasus: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
Wen-jie Lu (Alibaba Group), Zhicong Huang (Alibaba Group), Cheng Hong (Alibaba Group), Yiping Ma (University of Pennsylvania), Fuping Qu (Alibaba Group)
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)
SoK: Fully Homomorphic Encryption Compilers
Alexander Viand (ETH Zurich), Patrick Jattke (ETH Zurich), Anwar Hithnawi (ETH Zurich)

Lunch Break / Exhibit Hall

Rooms A, B & C

12:30PM - 01:10PM

Paper Previews

Rooms A, B & C

01:00PM - 01:10PM

Session #8A: Web Security 1

Room A

01:10PM - 02:10PM

Session chair: Wil Robertson
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
Penghui Zhang (Arizona State University), Adam Oest (Arizona State University), Haehyun Cho (Arizona State University), Zhibo Sun (Arizona State University), RC Johnson (PayPal), Brad Wardman (PayPal), Shaown Sarker (North Carolina State University), Alexandros Kapravelos (North Carolina State University), Tiffany Bao (Arizona State University), Ruoyu Wang (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupé (Arizona State University), Gail-Joon Ahn (Arizona State University and Samsung Research)
Black Widow: Blackbox Data-driven Web Scanning
Benjamin Eriksson (Chalmers University of Technology), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security), Andrei Sabelfeld (Chalmers University of Technology)
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal (The University of Iowa), Steven Englehardt (Mozilla Corporation ), Zubair Shafiq (University of California, Davis)

Session #8B: Network Security

Room B

01:10PM - 02:10PM

Session chair: Thorsten Holz
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
Antoine Delignat-Lavaud (Microsoft Research), Cedric Fournet (Microsoft Research), Bryan Parno (Carnegie Mellon University), Jonathan Protzenko (Microsoft Research), Tahina Ramananandro (Microsoft Research), Jay Bosamiya (Carnegie Mellon University), Joseph Lallemand (Loria, Inria Nancy Grand Est), Itsaka Rakotonirina (Loria, Inria Nancy Grand Est), Yi Zhou (Carnegie Mellon University), Joseph Lallemand (ETH Zürich)
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
Amit Klein (Bar Ilan University)
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
Yi Chen (Indiana University Bloomington), Yepeng Yao (Institute of Information Engineering, CAS), XiaoFeng Wang (Indiana University Bloomington), Dandan Xu (Institute of Information Engineering, CAS), Xiaozhong Liu (Indiana University Bloomington), Chang Yue (Institute of Information Engineering, CAS), Kai Chen (Institute of Information Engineering, CAS), Haixu Tang (Indiana University Bloomington), Baoxu Liu (Institute of Information Engineering, CAS)

Session #8C: Smart Contracts

Room C

01:10PM - 02:10PM

Session chair: Andrew Miller
SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
Tai D. Nguyen (Singapore Management University), Long H. Pham (Singapore Management University), Jun Sun (Singapore Management University)
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
Itay Tsabary (Technion), Matan Yechieli (Technion), Alex Manuskin (ZenGo), Ittay Eyal (Technion, VMware)
Compositional Security for Reentrant Applications
Ethan Cecchetti (Cornell University), Siqiu Yao (Cornell University), Haobin Ni (Cornell University), Andrew C. Myers (Cornell University)

Break / Hopin Networking

Rooms A, B & C

02:10PM - 02:25PM

Paper Previews

Rooms A, B & C

02:15PM - 02:25PM

Session #9A: Vulnerabilities

Room A

02:25PM - 03:25PM

Session chair: Adam Doupé
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
Daniel Votipka (Tufts University), Eric Zhang (University of Maryland), Michelle Mazurek (University of Maryland)
DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs
Jaewon Hur (Seoul National University), Suhwan Song (Seoul National University), Dongup Kwon (Seoul National University), Eunjin Baek (Seoul National University), Jangwoo Kim (Seoul National University), Byoungyoung Lee (Seoul National University)

Session #9B: Wireless and Electromagnetic Channels

Room B

02:25PM - 03:25PM

Session chair: Kasper Rasmussen
Electromagnetic Covert Channels Can Be Super Resilient
Cheng Shen (Peking University), Tian Liu (Peking University), Jun Huang (MIT), Rui Tan (Nanyang Technological University)
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
Norbert Ludant (Northeastern University), Tien D. Vo-Huu (Northeastern University), Sashank Narain (University of Massachusetts Lowell), Guevara Noubir (Northeastern University)
Method Confusion Attack on Bluetooth Pairing
Maximilian von Tschirschnitz (Technical University Munich), Ludwig Peuckert (Technical University Munich), Fabian Franzen (Technical University Munich), Jens Grossklags (Technical University Munich)

Session #9C: Authentication, Identity and Access Control

Room C

02:25PM - 03:25PM

Session chair: Rahul Chatterjee
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
Sai Krishna Deepak Maram (Cornell Tech), Fan Zhang (Cornell Tech), Harjasleen Malvai (Cornell), Ari Juels (Cornell Tech), Alexander Frolov (Cornell), Nerla Jean-Louis (University of Illinois at Urbana-Champaign), Andrew Miller (University of Illinois at Urbana-Champaign), Tyler Kell (Cornell Tech)
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites
Nicolas Huaman (Leibniz University Hannover), Sabrina Amft (Leibniz University Hannover), Marten Oltrogge (CISPA Helmholtz Center for Information Security), Yasemin Acar (Leibniz University Hannover and Max Planck Institute for Security and Privacy (MPI-SP)), Sascha Fahl (Leibniz University Hannover)
Improving Password Guessing via Representation Learning
Dario Pasquini (Sapienza University of Rome; Stevens Institute of Technology; Institute of Applied Computing CNR), Ankit Gangwal (University of Padua; Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Massimo Bernaschi (Institute of Applied Computing CNR), Mauro Conti (University of Padua)

Break / Hopin Networking

Rooms A, B & C

03:25PM - 03:30PM

Short Talks

Rooms A, B & C

03:30PM - 04:15PM

May 26


Short Talks

Rooms A, B & C

07:00AM - 07:45AM

Networking on Hopin

Rooms A, B & C

07:35AM - 08:00AM

Paper Previews

Rooms A, B & C

07:50AM - 08:00AM

Session #10A: Program Security and Cyber-Physical Systems

Room A

08:00AM - 09:00AM

Session chair: Gang Tan
ARBITRAR : User-Guided API Misuse Detection
Ziyang Li (University of Pennsylvania), Aravind Machiry (Purdue University), Binghong Chen (Georgia Institute of Technology), Ke Wang (Visa Research), Mayur Naik (University of Pennsylvania), Le Song (Georgia Institute of Technology)
Compositional Non-Interference for Fine-Grained Concurrent Programs
Dan Frumin (Radboud University), Robbert Krebbers (TU Delft), Lars Birkedal (Aarhus University)
SoK: Security and Privacy in the Age of Commercial Drones
Ben Nassi (Ben-Gurion University of the Negev), Ron Bitton (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories), Asaf Shabtai (Ben-Gurion University of the Negev), Yuval Elovici (Ben-Gurion University of the Negev)

Session #10B: Web Attacks

Room B

08:00AM - 09:00AM

Session chair: Christian Rossow
A First Look at Zoombombing
Chen Ling (Boston University), Utkucan Balcı (Binghamton University), Jeremy Blackburn (Binghamton University), Gianluca Stringhini (Boston University)
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities
Yinxi Liu (The Chinese University of Hong Kong), Mingxue Zhang (The Chinese University of Hong Kong), Wei Meng (The Chinese University of Hong Kong)
Breaking the Specification: PDF Certification
Simon Rohlmann (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Christian Mainka (Ruhr University Bochum), Jörg Schwenk (Ruhr University Bochum)

Session #10C: Crypto Applications and Attacks

Room C

08:00AM - 09:00AM

Session chair: David Cash
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
Evgenios Kornaropoulos (UC Berkeley), Charalampos Papamanthou (University of Maryland), Roberto Tamassia (Brown University)
A Decentralized and Encrypted National Gun Registry
Seny Kamara (Brown University), Tarik Moataz (Aroki Systems), Andrew Park (Brown University), Lucy Qin (Brown University)
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs
David Heath (Georgia Institute of Technology), Yibin Yang (Georgia Institute of Technology), David Devecsery (Georgia Institute of Technology), Vladimir Kolesnikov (Georgia Institute of Technology)

Break / Hopin Networking

Rooms A, B & C

09:00AM - 09:15AM

Paper Previews

Rooms A, B & C

09:05AM - 09:15AM

Session #11A: Malware and Attacks

Room A

09:15AM - 10:15AM

Session chair: Brendan Saltaformaggio
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land
Frederick Barr-Smith (Oxford University), Xabier Ugarte-Pedrero (Cisco Systems), Mariano Graziano (Cisco Systems), Riccardo Spolaor (Oxford University), Ivan Martinovic (Oxford University)
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks
Zhihao Bai (Johns Hopkins University), Ke Wang (Peking University), Hang Zhu (Johns Hopkins University), Yinzhi Cao (Johns Hopkins University), Xin Jin (Peking University)
Good Bot, Bad Bot: Characterizing Automated Browsing Activity
Xigao Li (Stony Brook University), Babak Amin Azad (Stony Brook University), Amir Rahmati (Stony Brook University), Nick Nikiforakis (Stony Brook University)

Session #11B: Mobile Security 2

Room B

09:15AM - 10:15AM

Session chair: Christina Pöpper
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem
Eduardo Blázquez (Universidad Carlos III de Madrid), Sergio Pastrana (Universidad Carlos III de Madrid), Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Platon Kotzias (NortonLifelock Research Group), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI / AppCensus Inc.), Juan Tapiador (Universidad Carlos III de Madrid)
Doing good by fighting fraud: Ethical anti-fraudsystems for mobile payments
Zainul Abi Din (UC Davis), Hari Venugopalan (UC Davis), Henry Lin (Bouncer Technologies), Adam Wushensky (Bouncer Technologies), Steven Liu (Bouncer Technologies), Samuel T. King (UC Davis and Bouncer Technologies)
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
Lei Xue (The Hong Kong Polytechnic University), Hao Zhou (The Hong Kong Polytechnic University), Xiapu Luo (The Hong Kong Polytechnic University), Yajin Zhou (Zhejiang University), Yang Shi (Tongji University), Guofei Gu (Texas A&M University), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Man Ho Au (The University of Hong Kong)

Session #11C: Signature Schemes

Room C

09:15AM - 10:15AM

Session chair: Xiao Wang
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel (CISPA), Cas Cremers (CISPA), Dennis Jackson (ETH Zurich), Mang Zhao (CISPA - Helmholtz Center for Information Security)
Epochal Signatures for Deniable Group Chats
Florian Weber (TU Eindhoven), Andreas Hülsing (TU Eindhoven)
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cas Cremers (CISPA Helmholtz Center for Information Security), Samed Düzlü (TU Darmstadt), Rune Fiedler (TU Darmstadt), Marc Fischlin (TU Darmstadt), Christian Janson (TU Darmstadt)

Break / Hopin Networking

Rooms A, B & C

10:15AM - 10:30AM

Paper Previews

Rooms A, B & C

10:20AM - 10:30AM

Session #12A: Web Security 2

Room A

10:30AM - 11:30AM

Session chair: Deian Stefan
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
Iskander Sanchez-Rola (NortonLifeLock Research Group), Matteo Dell'Amico (NortonLifeLock Research Group), Davide Balzarotti (EURECOM), Pierre-Antoine Vervier (NortonLifeLock Research Group), Leyla Bilge (NortonLifeLock Research Group), Iskander ()
Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures
Quan Chen (North Carolina State University), Peter Snyder (Brave Software), Ben Livshits (Brave Software), Alexandros Kapravelos (North Carolina State University)
Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems
Gertjan Franken (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven)

Session #12B: Formal Methods in the Real World

Room B

10:30AM - 11:30AM

Session chair: Cas Cremers
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
Thomas Haines (Norwegian University of Science and Technology), Rajeev Gore (Australian National University), Bhavesh Sharma (Australian National University), Thomas Haines (Norwegian University of Science and Technology)
The EMV Standard: Break, Fix, Verify
David Basin (Department of Computer Science, ETH Zurich), Ralf Sasse (Department of Computer Science, ETH Zurich), Jorge Toro-Pozo (Department of Computer Science, ETH Zurich)
A Secure and Formally Verified Linux KVM Hypervisor
Shih-Wei Li (Columbia University), Xupeng Li (Columbia University), John Hui (Columbia University), Jason Nieh (Columbia University), Ronghui Gu (Columbia University)

Session #12C: Anonymity in Crypto Currencies

Room C

10:30AM - 11:30AM

Session chair: Aniket Kate
Many-out-of-Many Proofs and Applications to Anonymous Zether
Benjamin E. Diamond (J.P. Morgan)
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
Varun Madathil (North Carolina State University), Alessandra Scafuro (North Carolina State University), Kartik Nayak (Duke University), Markulf Kohlweiss (University of Edinburgh)
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
Erkan Tairi (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Matteo Maffei (TU Wien)

Lunch Break / Exhibit Hall

Rooms A, B & C

11:30AM - 12:10PM

Paper Previews

Rooms A, B & C

12:00PM - 12:10PM

Session #13A: HW Side Channels and Defenses

Room A

12:10PM - 01:10PM

Session chair: Yuval Yarom
CrossTalk: Speculative Data Leaks Across Cores Are Real
Hany Ragab (Vrije Universiteit Amsterdam), Alyssa Milburn (Vrije Universiteit Amsterdam), Kaveh Razavi (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam), Kaveh Razavi (ETH Zurich)
Hardware-Software Contracts for Secure Speculation
Marco Guarnieri (IMDEA Software Institute), Boris Köpf (Microsoft Research), Jan Reineke (Saarland University), Pepe Vila (IMDEA Software Institute)
High-Assurance Cryptography in the Spectre Era
Gilles Barthe (Max Planck Institute for Security and Privacy and IMDEA Software Institute), Sunjay Cauligi (University of California San Diego), Benjamin Gregoire (INRIA Sophia Antipolis), Adrien Koutsos (Inria Paris, Max Planck Institute for Security and Privacy), Kevin Liao (Max Planck Institute for Security and Privacy and Massachusetts Institute of Technology), Tiago Oliveira (University of Porto (FCUP) and INESC TEC), Swarn Priya (Purdue University), Tamara Rezk (INRIA Sophia Antipolis), Peter Schwabe (Max Planck Institute for Security and Privacy)

Session #13B: Dynamic Analysis

Room B

12:10PM - 01:10PM

Session chair: Nathan Dautenhahn
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces
Jiaqi Hong (Singapore Management University), Xuhua Ding (Singapore Management University)
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection
Tapti Palit (Stony Brook University), Jarin Firose Moon (Stony Brook University), Fabian Monrose (University of North Carolina, Chapel Hill), Michalis Polychronakis (Stony Brook University)
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
Alejandro Mera (Northeastern University), Bo Feng (Northeastern University), Long Lu (Northeastern University), Engin Kirda (Northeastern University)

Session #13C: Cryptography 2

Room C

12:10PM - 01:10PM

Session chair: Henry Corrigan-Gibbs
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Thilo Krachenfels (Technische Universität Berlin), Amir Moradi (Ruhr-Uni­ver­si­tät Bo­chum), Jean-Pierre Seifert (Technische Universität Berlin), Fatemeh Ganji (Worcester Polytechnic Institute), Shahin Tajik (Worcester Polytechnic Institute)
CRYLOGGER: Detecting Crypto Misuses Dynamically
Luca Piccolboni (Columbia University), Giuseppe Di Guglielmo (Columbia University), Luca P. Carloni (Columbia University), Simha Sethumadhavan (Columbia University)

Break / Hopin Networking

Rooms A, B & C

01:10PM - 01:15PM

Technical Committee Meeting / Trojan Video Awards

Rooms A, B & C

01:15PM - 02:45PM

Poster Session / Networking (gather.town)

Rooms A, B & C

02:45PM - 04:45PM

ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig

Good Bot, Bad Bot: Characterizing Automated Browsing Activity
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis

Is Private Learning Possible with Instance Encoding?
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar

Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim

Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi

Symbolic Modeling of Micro Services for Intrusion Detection
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang

Twice the Fun: Adapting Unicast Privacy Notions for Group Communication
Christoph Coijanovic, Christiane Kuhn and Thorsten Strufe