Wed. 23 Oct 2024 (Day 1)

Time (EDT) Event
09:00 - 09:30 Registrations & Welcome
09:30 - 10:00 Welcome Statement by General and PC Co-chairs
10:00 - 11:00 Keynote by Dr. Kazuhiko Minematsu
11:00 - 11:30 Break 1 (30 min)
11:30 - 12:10 Session 1: Cryptography - Blockchain (2 talks)
Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm
The Formal Verification of Aptos Coin
12:10 - 13:30 Lunch
13:30 - 14:30 Session 2: Cryptography - Symmetric-Key Cryptography (3 talks)
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128
Security Analysis of CMAC in the Multi-User Model
Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys
14:30 - 14:50 Break 2 (20 min)
14:50 - 15:30 Session 3: Systems - Protocol security (2 talks)
Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing
Property Guided Secure Configuration Space Search
15:30 - 16:00 Break 3 (30 min)
16:00 - 17:00 Session 4: Systems - Web Security (3 talks)
JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript
We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts
Automated Generation of Behavioral Signatures for Malicious Web Campaigns
18:30 - 20:30 Reception

Thu. 24 Oct 2024 (Day 2)

Time (EDT) Event
09:00 - 09:45 Registration
09:45 - 10:45 Keynote by Dr. Angelos D. Keromytis
10:45 - 11:10 Break 1 (25 min)
11:10 - 12:10 Session 1: Software Security (3 talks)
Adversarial analysis of software composition analysis tools
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling
Emulating Android Device Drivers via Borrowed Execution Context
12:10 - 13:30 Lunch
13:30 - 14:30 Session 2A: Cryptography - Post-Quantum Cryptography I (3 talks)
Anonymous, Timed and Revocable Proxy Signatures
Deep LLL on Module lattices
Multi-way High-throughput Implementation of Kyber
14:30 - 14:50 Break 2 (20 min)
14:50 - 15:30 Session 3: Vehicle Security (2 talks)
MVDetector: Malicious vehicles detection under Sybil attacks in VANETs
TIDL-IDS: A Time-series Imaging and Deep Learning-based IDS for Connected Autonomous Vehicles
15:30 - 16:00 Break 3 (30 min)
16:00 - 17:00 Session 2B: Cryptography - Post-Quantum Cryptography II (3 talks)
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys
A faster variant of CGL hash function via efficient backtracking checks
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation
18:30 - 21:30 Dinner

Fri. 25 Oct 2024 (Day 3)

Time (EDT) Event
09:45 - 10:45 Session 1A: Cryptography - Multi-Party Computation I (3 talks)
ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
10:45 - 11:10 Break 1 (25 min)
11:10 - 12:10 Session 2: Systems - Novel Attacks (3 talks)
Optimizing label-only membership inference attacks by global relative decision boundary distances
Risk of Text Backdoor Attacks under Dataset Distillation
News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals
12:10 - 13:30 Lunch
13:30 - 14:30 Session 1B: Cryptography - Multi-Party Computation II (3 talks)
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles
Robust Multiparty Computation from Threshold Encryption Based on RLWE
Efficient Blind Rotation in FHEW using Refined Decomposition and NTT
14:30 - 14:50 Break 2 (20 min)
14:50 - 15:50 Session 3: Intrusion Detection and Software Security (3 talks)
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method
A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model
15:50 - 16:00 Concluding Remarks