Program
last update: 30 April, 2022
Room B
8:30 - 9:30 (JST)
Session Chair: Kouichi Sakurai (Kyushu University)
8:30 - 9:30 (JST)
Differentially Private Data Synthesis:
State of the Art and Challenges
Prof. Ninghui Li.
Purdue University
,
United States of America
Room A
Session 7A:
Cryptography #3
10:00 - 11:20 (JST)
Session Chair: TBA
10:00 - 10:20 (JST)
Adversarial Level Agreements for Two-Party Protocols
M. George; S. Kamara
10:20 - 10:40 (JST)
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security
A. Bowers; J. Du; D. Lin; W. Jiang
10:40 - 11:00 (JST)
Scalable Private Decision Tree Evaluation with Sublinear Communication
J. Bai; X. Song; S. Cui; E. Chang; G. Russello
11:00 - 11:20 (JST)
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization
N. Attrapadung; H. Morita; K. Ohara; J. Schuldt; K. Tozawa
Room B
Session 7B:
Software Security #2
10:00 - 11:20 (JST)
Session Chair: TBA
10:00 - 10:20 (JST)
Understanding and Detecting Remote Infection on Linux-based IoT Devices
H. Li; Q. Huang; F. Ding; H. Hu; L. Cheng; G. Gu; Z. Zhao
10:20 - 10:40 (JST)
Driving execution of target paths in Android applications with (a) CAR
M. Wong; D. Lie
10:40 - 11:00 (JST)
PacJam: Securing Dependencies Continuously via Package-Oriented Debloating
P. Pashakhanloo; A. Machiry; H. Choi; A. Canino; K. Heo (KAIST); I. Lee; M. Naik
11:00 - 11:20 (JST)
On Measuring Vulnerable JavaScript Functions in the Wild
M. Kluban; M. Mannan; A. Youssef
Lunch Break
11:20-12:50 (JST)
Room A
Session 8A:
Machine Learning #2
12:50 - 14:30 (JST)
Session Chair: TBA
12:50 - 13:10 (JST)
Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning
Y. Cai; Q. Zhang; R. Ning; C. Xin; H. Wu
13:10 - 13:30 (JST)
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations
N. Wang; Y. Xiao; Y. Chen; Y. Hu; W. Lou; Y. Hou
13:30 - 13:50 (JST)
Understanding Disparate Effects of Membership Inference Attacks and Their Countermeasures
D. Zhong; H. SUN; J. Xu; N. Gong; H. Wang
13:50 - 14:10 (JST)
Generating Content-Preserving and Semantics-Flipping Adversarial Text
W. Pei; C. Yue
14:10 - 14:30 (JST)
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W. Song; X. Li; S. Afroz; D. Garg; D. Kuznetsov; H. Yin
Room B
Session 8B:
Biometrics and Security
12:50 - 14:30 (JST)
Session Chair: TBA
12:50 - 13:10 (JST)
Proximity Searchable Encryption for the Iris Biometric
S. Ahmad; C. Cachet; L. Demarest; B. Fuller; A. Hamlin
13:10 - 13:30 (JST)
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech
H. Guo; Q. Yan; N. Ivanov; Y. Zhu; L. Xiao; E. Hunter
13:30 - 13:50 (JST)
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning
S. Fu; D. Qin; G. Amariucai; D. Qiao; Y. Guan; A. Smiley
13:50 - 14:10 (JST)
Common Evaluation Pitfalls in Touch-Based Authentication Systems
M. Georgiev; S. Eberz; H. Turner; G. Lovisotto; I. Martinovic
14:10 - 14:30 (JST)
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
S. Esposito; D. Sgandurra; G. Bella
Room A
15:00 - 16:40 (JST)
Session Chair: TBA
15:00 - 15:20 (JST)
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding
L. Zhang; H. Wang
15:20 - 15:40 (JST)
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation
J. Ma; S. Chow
15:40 - 16:00 (JST)
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection
A. Efraim; O. Nissenbaum; E. Omri; A. Paskin-Cherniavsky
16:00 - 16:20 (JST)
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities
L. Harrison; S. Bag; H. Luo; F. Hao
16:20 - 16:40 (JST)
EPID with Efficient Proof of Non-Revocation
O. Sanders
Room B
15:00 - 16:40 (JST)
Session Chair: TBA
15:00 - 15:20 (JST)
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch
E. Wyss; A. Wittman; D. Davidson; L. De Carli
15:20 - 15:40 (JST)
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention
G. Figueira; D. Barradas; N. Santos
15:40 - 16:00 (JST)
Server-Side Browsers: Exploring the Web's Hidden Attack Surface
M. Musch; R. Kirchner; M. Boll; M. Johns
16:00 - 16:20 (JST)
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
T. Rokicki; C. Maurice; M. Botvinnik; Y. Oren
16:20 - 16:40 (JST)
Lures for Money: A First Look into Youtube Videos Promoting Money-Making Apps
N. Nasir; F. Iqbal; Mahnoor; M. Shahjahan; M. Javed
Room B
16:40 - 17:10 (JST)
Session Chair: TBA
Onsite Registration desk opening time period (JST): 8:00 - 16:00