Wed. 23 Oct 2024 (Day 1) |
|||
Time (EDT) | Event | ||
09:00 - 09:30 | Registrations & Welcome | ||
09:30 - 10:00 | Welcome Statement by General and PC Co-chairs | ||
10:00 - 11:00 | Keynote by Dr. Kazuhiko Minematsu | ||
11:00 - 11:30 | Break 1 (30 min) | ||
11:30 - 12:10 | Session 1: Cryptography - Blockchain (2 talks) | ||
Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm | |||
The Formal Verification of Aptos Coin | |||
12:10 - 13:30 | Lunch | ||
13:30 - 14:30 | Session 2: Cryptography - Symmetric-Key Cryptography (3 talks) | ||
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128 | |||
Security Analysis of CMAC in the Multi-User Model | |||
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys | |||
14:30 - 14:50 | Break 2 (20 min) | ||
14:50 - 15:30 | Session 3: Systems - Protocol security (2 talks) | ||
Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing | |||
Property Guided Secure Configuration Space Search | |||
15:30 - 16:00 | Break 3 (30 min) | ||
16:00 - 17:00 | Session 4: Systems - Web Security (3 talks) | ||
JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript | |||
We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts | |||
Automated Generation of Behavioral Signatures for Malicious Web Campaigns | |||
18:30 - 20:30 | Reception |
Thu. 24 Oct 2024 (Day 2) |
|||
Time (EDT) | Event | ||
09:00 - 09:45 | Registration | ||
09:45 - 10:45 | Keynote by Dr. Angelos D. Keromytis | ||
10:45 - 11:10 | Break 1 (25 min) | ||
11:10 - 12:10 | Session 1: Software Security (3 talks) | ||
Adversarial analysis of software composition analysis tools | |||
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling | |||
Emulating Android Device Drivers via Borrowed Execution Context | |||
12:10 - 13:30 | Lunch | ||
13:30 - 14:30 | Session 2A: Cryptography - Post-Quantum Cryptography I (3 talks) | ||
Anonymous, Timed and Revocable Proxy Signatures | |||
Deep LLL on Module lattices | |||
Multi-way High-throughput Implementation of Kyber | |||
14:30 - 14:50 | Break 2 (20 min) | ||
14:50 - 15:30 | Session 3: Vehicle Security (2 talks) | ||
MVDetector: Malicious vehicles detection under Sybil attacks in VANETs | |||
TIDL-IDS: A Time-series Imaging and Deep Learning-based IDS for Connected Autonomous Vehicles | |||
15:30 - 16:00 | Break 3 (30 min) | ||
16:00 - 17:00 | Session 2B: Cryptography - Post-Quantum Cryptography II (3 talks) | ||
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys | |||
A faster variant of CGL hash function via efficient backtracking checks | |||
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation | |||
18:30 - 21:30 | Dinner |
Fri. 25 Oct 2024 (Day 3) |
|||
Time (EDT) | Event | ||
09:45 - 10:45 | Session 1A: Cryptography - Multi-Party Computation I (3 talks) | ||
ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination | |||
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding | |||
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations | |||
10:45 - 11:10 | Break 1 (25 min) | ||
11:10 - 12:10 | Session 2: Systems - Novel Attacks (3 talks) | ||
Optimizing label-only membership inference attacks by global relative decision boundary distances | |||
Risk of Text Backdoor Attacks under Dataset Distillation | |||
News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals | |||
12:10 - 13:30 | Lunch | ||
13:30 - 14:30 | Session 1B: Cryptography - Multi-Party Computation II (3 talks) | ||
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles | |||
Robust Multiparty Computation from Threshold Encryption Based on RLWE | |||
Efficient Blind Rotation in FHEW using Refined Decomposition and NTT | |||
14:30 - 14:50 | Break 2 (20 min) | ||
14:50 - 15:50 | Session 3: Intrusion Detection and Software Security (3 talks) | ||
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method | |||
A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability | |||
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model | |||
15:50 - 16:00 | Concluding Remarks |