| 
                         Wed. 23 Oct 2024 (Day 1)  | 
                |||
| Time (ET) | Event | ||
| 09:00 - 09:30 | Registrations | ||
| 09:30 - 10:00 | Welcome Statement by General and PC Co-chairs | ||
| 10:00 - 11:00 | Keynote by Dr. Kazuhiko Minematsu - Session chair: Nicky Mouha | ||
| 11:00 - 11:30 | Break 1 (30 min) | ||
| 11:30 - 12:10 | Session 1: Cryptography - Blockchain (2 talks) - Session chair: Masahiro Mambo | ||
| Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm | |||
| The Formal Verification of Aptos Coin | |||
| 12:10 - 13:30 | Lunch | ||
| 13:30 - 14:30 | Session 2: Cryptography - Symmetric-Key Cryptography (3 talks) - Session chair: Kazuhiko Minematsu | ||
| MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128 | |||
| Security Analysis of CMAC in the Multi-User Model | |||
| Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys | |||
| 14:30 - 14:50 | Break 2 (20 min) | ||
| 14:50 - 15:30 | Session 3: Systems - Protocol security (2 talks) - Session Chair: Nick Nikiforakis | ||
| Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing | |||
| Property Guided Secure Configuration Space Search | |||
| 15:30 - 16:00 | Break 3 (30 min) | ||
| 16:00 - 17:00 | Session 4: Systems - Web Security (3 talks) - Session Chair: Billy Tsouvalas | ||
| JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript | |||
| (Best Paper Award) We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts | |||
| Automated Generation of Behavioral Signatures for Malicious Web Campaigns | |||
| 17:30 - 19:30 | Reception (at the Gallery) | ||
| 
                         Thu. 24 Oct 2024 (Day 2)  | 
                |||
| Time (ET) | Event | ||
| 09:00 - 09:45 | Registrations | ||
| 09:45 - 10:45 | Keynote by Dr. Angelos D. Keromytis - Session chair: Nick Nikiforakis | ||
| 10:45 - 11:10 | Break 1 (25 min) | ||
| 11:10 - 12:10 | Session 1: Software Security (3 talks) - Session chair: Ghada Almashaqbeh | ||
| Adversarial analysis of software composition analysis tools | |||
| SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling | |||
| Emulating Android Device Drivers via Borrowed Execution Context | |||
| 12:10 - 13:30 | Lunch | ||
| 13:30 - 14:30 | Session 2A: Cryptography - Post-Quantum Cryptography I (3 talks) - Session chair: Joachim Vandersmissen | ||
| (Best Paper Award) Anonymous, Timed and Revocable Proxy Signatures | |||
| Deep LLL on Module lattices | |||
| Multi-way High-throughput Implementation of Kyber | |||
| 14:30 - 14:50 | Break 2 (20 min) | ||
| 14:50 - 15:30 | Session 3: Vehicle Security (2 talks) - Session Chair: Natalia Stakhanova | ||
| MVDetector: Malicious vehicles detection under Sybil attacks in VANETs | |||
| TIDL-IDS: A Time-series Imaging and Deep Learning-based IDS for Connected Autonomous Vehicles | |||
| 15:30 - 16:00 | Break 3 (30 min) | ||
| 16:00 - 17:00 | Session 2B: Cryptography - Post-Quantum Cryptography II (3 talks) - Session Chair: Gorjan Alagic | ||
| The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys | |||
| A faster variant of CGL hash function via efficient backtracking checks | |||
| Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation | |||
| 18:30 - 21:30 | Dinner (at Multipurpose Room 126; Beverage starts at 18:00 at the Gallery) | ||
| 
                         Fri. 25 Oct 2024 (Day 3)  | 
                |||
| Time (ET) | Event | ||
| 09:00 - 09:45 | Registrations | ||
| 09:45 - 10:45 | Session 1A: Cryptography - Multi-Party Computation I (3 talks) - Session Chair: Noemi Glaeser | ||
| ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination | |||
| Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding | |||
| Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations | |||
| 10:45 - 11:10 | Break 1 (25 min) | ||
| 11:10 - 12:10 | Session 2: Systems - Novel Attacks (3 talks) - Session Chair: Alex Le Blanc | ||
| Optimizing label-only membership inference attacks by global relative decision boundary distances | |||
| Risk of Text Backdoor Attacks under Dataset Distillation | |||
| News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals | |||
| 12:10 - 13:30 | Lunch | ||
| 13:30 - 14:30 | Session 1B: Cryptography - Multi-Party Computation II (3 talks) - Session Chair: Shintaro Narisada | ||
| Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles | |||
| Robust Multiparty Computation from Threshold Encryption Based on RLWE | |||
| Efficient Blind Rotation in FHEW using Refined Decomposition and NTT | |||
| 14:30 - 14:50 | Break 2 (20 min) | ||
| 14:50 - 15:50 | Session 3: Intrusion Detection and Software Security (3 talks) - Session chair: Daniel Koehler | ||
| FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method | |||
| A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability | |||
| Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model | |||
| 15:50 - 16:00 | Concluding Remarks | ||