This year’s AsiaCCS will run for five days, with the following schedule:

  • 10/07/2023: Workshops and Welcome Reception
  • 11/07/2023 – 14/07/2023: Main conference sessions, Tutorials, and Social Events
  • Notes: Conference paper presentation (20 minutes presentation + 5 minutes Q&A). 

The conference agenda overview is given below. Please note that all times mentioned in this page are in GMT+10 (AEST)

Main Conference Session Agenda

Day 1 (Tue) - 11/07

Ballroom Monash Room
08:30 AM Registration Open
09:00 AM - 09:30 AM Opening
09:30 AM - 10:30 AM Keynote 1: Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities
by Prof. Wenyuan Xu (at Ballroom)
Session Chair: Joseph Liu (Monash University)
10:30 AM - 10:55 AM Morning Tea + Poster
10:55 AM - 12:10 PM Session 1: Applied Cryptography I
Session Chair: Muhammed Esgin
(Monash University)
Session 2: Privacy Application
Session Chair: Hyungjoon (Kevin) Koo
10:55 AM - 11:20 AM Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee (Korea Institute For Advanced Study, South Korea), Seonhong Min (Seoul National University, South Korea), Jinyeong Seo (Seoul National University, South Korea), Yongsoo Song (Seoul National University, South Korea)
Invasion of location privacy using online map services and smartphone sensors
Hyunsoo Kim (NCSOFT, Republic of Korea), Youngbae Jeon (Samsung Research, Republic of Korea), Ji Won Yoon (Korea University, Republic of Korea)
11:20 AM - 11:45 AM Flag: A Framework for Lightweight Robust Secure Aggregation
Laasya Bangalore (Georgetown University, USA), Mohammad Hossein Faghihi Sereshgi (University of Rochester, USA), Carmit Hazay (Bar-Ilan University, Israel), Muthuramakrishnan Venkitasubramaniam (Georgetown University, USA)
Privacy-Preserving Record Linkage for Cardinality Counting
Nan Wu (Macquarie University and CSIRO’s Data61, Australia), Dinusha Vatsalan (Macquarie University, Australia), Mohamed Ali Kaafar (Macquarie University, Australia), Sanath Kumar Ramesh (Open Treatments Foundations, USA)
11:45 AM - 12:10 PM Implementing and Optimizing Matrix Triples with Homomorphic Encryption
Johannes Mono (Ruhr University Bochum, Germany), Tim Güneysu (Ruhr University Bochum, Germany)
Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications
Baiqi Chen (The University of Queensland and CSIRO’s Data61, Australia), Tingmin Wu (CSIRO’s Data61, Australia), Yanjun Zhang (Deakin University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)
12:10 PM - 01:30 PM Lunch
01:30 PM - 03:35 PM Session 3: Privacy and Machine Learning
Session Chair: Yansong Gao
(CSIRO’s Data61)
Session 4: Architecture Security I
Session Chair: Kasper Rasmussen
(University of Oxford)
01:30 PM - 01:55 PM RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense
Yue Cui (University of Tennessee, USA), Syed Irfan Ali Meerza (University of Tennessee, USA), Zhuohang Li (University of Tennessee, USA), Luyang Liu (Google Research, USA), Jiaxin Zhang (Intuit AI Research, USA), Jian Liu (University of Tennessee, USA)
Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses
Marco Abbadini (Università degli Studi di Bergamo, Italy), Dario Facchinetti (Università degli Studi di Bergamo, Italy), Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)
01:55 PM - 02:20 PM LDL: A Defense for Label-Based Membership Inference Attacks
Arezoo Rajabi (University of Washington, USA), Dinuka Sahabandu (University of Washington, USA), Luyao Niu (University of Washington, USA), Bhaskar Ramasubramanian (Western Washington University, USA), Radha Poovendran (University of Washington, USA)
CacheFX: A Framework for Evaluating Cache Security
Daniel Genkin (Georgia Institute of Technology, USA), William Kosasih (University of Adelaide, Australia), Fangfei Liu (Intel Labs, USA), Anna Trikalinou (Microsoft, USA), Thomas Unterluggauer (Intel Labs, Austria), Yuval Yarom (Ruhr University Bochum, Germany)
02:20 PM - 02:45 PM Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck
Chenhan Zhang (University of Technology Sydney, Australia), Weiqi Wang (University of Technology Sydney, Australia), James J.Q. Yu (Southern University of Science and Technology, China), Shui Yu (University of Technology Sydney, Australia)
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Martin Unterguggenberger (Graz University of Technology, Austria), David Schrammel (Graz University of Technology, Austria), Pascal Nasahl (Graz University of Technology, Austria), Robert Schilling (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
02:45 PM - 03:10 PM LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks
Mengyao Ma (The University of Queensland and CSIRO’s Data61, Australia), Yanjun Zhang (University of Technology Sydney, Australia), Pathum Chamikara Mahawaga Arachchige (CSIRO’s Data61, Australia), Leo Yu Zhang (Griffith University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A
Jingquan Ge (Southern University of Science and Technology, China), Fengwei Zhang (Southern University of Science and Technology, China)
03:10 PM - 03:35 PM Data Privacy Examination against Semi-Supervised Learning
Jiadong Lou (University of Louisiana at Lafayette, USA), Xu Yuan (University of Louisiana at Lafayette, USA), Miao Pan (University of Louisiana at Lafayette, USA), Hao Wang (Louisiana State University, USA), Nianfeng Tzeng (University of Louisiana at Lafayette, USA)
ShowTime: Amplifying Arbitrary CPU Timing Side Channels
Antoon Purnal (imec-COSIC, KU Leuven, Belgium), Marton Bognar (imec-DistriNet, KU Leuven, Belgium), Frank Piessens (imec-DistriNet, KU Leuven, Belgium), Ingrid Verbauwhede (imec-COSIC, KU Leuven, Belgium)
03:35 PM - 04:00 PM Afternoon Tea + Poster
04:00 PM - 05:40 PM Session 5: Software Security I
Session Chair: Siqi Ma
Session 6: Hardware Security
Session Chair: Antoon Purnal
(KU Leuven)
04:00 PM - 04:25 PM Symbolic Modeling of Remote Attestation Protocols for Device and App Integrity on Android
JAbdulla Aldoseri (University of Birmingham UK, University of Bahrain), Tom Chothia (University of Birmingham, UK), Jose Moreira (Valory AG, Switzerland), David Oswald (University of Birmingham, UK)
Secure and Efficient Mobile DNN Using Trusted Execution Environments
Bin Hu (Rutgers University, USA), Yan Wang (Temple University, USA), Jerry Cheng (New York Institute of Technology, USA), Tianming Zhao (Dayton University, USA), Yucheng Xie (Indiana University-Purdue University Indianapolis, USA), Xiaonan Guo (George Mason University, USA), Yingying Chen (Rutgers University, USA)
04:25 PM - 04:50 PM Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis
Sirus Shahini (University of Utah, USA), Robert Ricci (University of Utah, USA), Mu Zhang (University of Utah, USA), Mathias Payer (EPFL, Switzerland)
Stairway To Rainbow
Gildas Avoine (INSA, CNRS, IRISA, France), Xavier Carpent (University of Nottingham, UK), Diane Leblanc-Albarel (INSA, CNRS, IRISA, France)
04:50 PM - 05:15 PM AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation
Alexander Küchler (Fraunhofer AISEC, Germany), Leon Wenning (TU Munich, Germany), Florian Wendland (Fraunhofer AISEC, Germany)
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Ruyi Ding (Northeastern University, USA), Cheng Gongye (Northeastern University, USA), Siyue Wang (Northeastern University, USA), A. Adam Ding (Northeastern University, USA), Yunsi Fei (Northeastern University, USA)
05:15 PM - 05:40 PM Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs
Mohamad Mansouri (EURECOM, France), Jun Xu (University of Utah, USA), Georgios Portokalidis (Stevens Institute of Technology, USA)
Electromagnetic Signal Injection Attacks on Differential Signaling
Youqian Zhang (University of Oxford, UK), Kasper Rasmussen (University of Oxford, UK)

Day 2 (Wed) - 12/07

Ballroom Monash Room
08:30 AM Registration Open
09:00 AM - 10:00 AM Keynote 2: Formal Methods for Payment Protocols
by Prof. David Basin (at Ballroom)
Session Chair: Yang Xiang (Swinburne University of Technology)
10:00 AM - 11:00 AM Keynote 3: Model Stealing Attacks and Defenses: Where are we now?
by Prof. N. Asokan (at Ballroom)
Session Chair: Surya Nepal (CSIRO's Data61)
11:00 AM - 11:25 AM Morning Tea
11:25 AM - 12:40 PM Tutorial 1: Custom Memory Functions Demystified: A tutorial of memory corruptions detection using Goshawk
by Xiang Chen, Siqi Ma
Tutorial 2: Securing Communications in the Post-quantum Era
by Raymond K. Zhao, Sara Jafarbeiki
12:40 PM - 02:00 PM Lunch
02:00 PM - 03:40 PM Session 7: Applied Cryptography II
Session Chair: Shangqi Lai
(Monash University)
Session 8: Software Security II
Session Chair: Robert Ricci
(University of Utah)
02:00 PM - 02:25 PM On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx (ETH Zurich, Switzerland), Kenneth G. Paterson (ETH Zurich, Switzerland)
Benchmarking the Benchmarks
Marc Miltenberger (Fraunhofer SIT, Germany), Steven Arzt (Fraunhofer SIT, Germany), Philipp Holzinger (Fraunhofer SIT, Germany), Julius Näumann (Fraunhofer SIT, Germany)
02:25 PM - 02:50 PM PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption
Yongha Son (Samsung SDS, South Korea), Jinhyuck Jeong (Samsung SDS, South Korea)
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO
Guy Farrelly (The University of Adelaide, Australia), Michael Chesser (The University of Adelaide, Australia), Damith C. Ranasinghe (University of Adelaide, Australia)
02:50 PM - 03:15 PM ZEKRA: Zero-Knowledge Control-Flow Attestation
Heini Bergsson Debes (Technical University of Denmark, Denmark), Edlira Dushku (Aalborg University, Denmark), Thanassis Giannetsos (Ubitech Ltd), Ali Marandi (Technical University of Denmark, Denmark)
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark
Jiashuo Liang (Peking University, China), Ming Yuan (Tsinghua University, China), Zhanzhao Ding (Peking University, China), Siqi Ma (The University of New South Wales, Australia), Xinhui Han (Peking University, China), Chao Zhang (Tsinghua University, China)
03:15 PM - 03:40 PM Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice
Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia), Ralf Kuesters (University of Stuttgart, Germany)
BinWrap: Hybrid Protection against Native Node.js Add-ons
George Christou (FORTH-ICS, Greece), Grigoris Ntousakis (Brown University, USA), Eric Lahtinen (Aarno Labs, USA), Sotiris Ioannidis (TU Crete, Greece), Vasileios P. Kemerlis (Brown University, USA), Nikos Vasilakis (Brown University, USA)
03:40 PM - 04:05 PM Afternoon Tea
04:05 PM - 05:45 PM Session 9: Architecture Security II
Session Chair: William Blair
(Boston University)
Session 10: User-Centric Security I
Session Chair: Tina Wu
(CSIRO’s Data61)
04:05 PM - 04:30 PM Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures
Abdullah Qasem (Concordia University, Canada), Mourad Debbabi (Concordia University, Canada), Bernard Lebel (Thales Research Technologies, , Canada), Marthe Kassouf (Hydro-Québec Research Institute, Canada)
#DM-Me: Susceptibility to Direct Messaging-Based Scams
Raj Vardhan (Texas A&M University, USA), Alok Chandrawal (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Yangyong Zhang (Texas A&M University, USA), Guofei Gu (Texas A&M University, USA)
04:30 PM - 04:55 PM SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
David Schrammel (Graz University of Technology, Austria), Moritz Waser (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Martin Unterguggenberger (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
An End-to-End Analysis of Covid-Themed Scams in the Wild
Behzad Ousat (Florida International University, USA), Mohammad Ali Tofighi (Florida International University, USA), Amin Kharraz (Florida International University, USA)
04:55 PM - 05:20 PM SFITAG: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions
Jiwon Seo (Seoul National University, South Korea), Junseung You (Seoul National University, South Korea), Yungi Cho (Seoul National University, South Korea), Yeongpil Cho (Hanyang University, South Korea), Donghyun Kwon (Pusan National University, South Korea), Yunheung Paek (Seoul National University, South Korea)
MASCARA: Systematically Generating Memorable And Secure Passphrases
Avirup Mukherjee (Indian Institute of Technology, Kharagpur, India), Kousshik Murali (Indian Institute of Technology, Kharagpur, India), Shivam Kumar Jha (Indian Institute of Technology, Kharagpur, India), Niloy Ganguly (Indian Institute of Technology, Kharagpur, India), Rahul Chatterjee (University of Wisconsin–Madison, USA), Mainack Mondal (Indian Institute of Technology, Kharagpur, India)
05:20 PM - 05:45 PM An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks
Matthew Rogers (MITRE, University of Oxford, USA), Kasper Rasmussen (University of Oxford, UK)
How Secure Are The Main Real-World Mix Networks — Case Studies To Explore Vulnerabilities and Usability
Kun Peng (Huawei Technology Ltd, Australia)
06:00 PM Women in Cybersecurity Reception
(Venue: Monash Room)

Day 3 (Thu) - 13/07

Ballroom Monash Room
09:00 AM - 10:00 AM Keynote 4: Democratizing Election Verification: New Methods for Addressing An Ancient Attacker Model
by Prof.Vanessa Teague (at Ballroom)
Session Chair: Jianying Zhou (Singapore University of Technology and Design)
10:00 AM - 10:25 AM Morning Tea
10:25 AM - 12:30 PM Session 11: Machine Learning and Security
Session Chair: Sanjay Jha
Session 12: Applied Cryptography III
Session Chair: TBC
10:25 AM - 10:50 AM FLAIR: Defense against Model Poisoning Attack in Federated Learning
Atul Sharma (Purdue University, USA), Wei Chen (Purdue University, USA), Joshua Zhao (Purdue University, USA), Qiang Qiu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Somali Chaterji (Purdue University, USA)
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Muhammed F. Esgin (Monash University and CSIRO’s Data61, Australia), Oguzhan Ersoy (Radboud University and Delft University of Technology, Netherlands), Veronika Kuchta (Florida Atlantic University, USA), Julian Loss (CISPA Helmholtz Center for Information Security, German), Amin Sakzad (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Xiangwen Yang (Monash University, Australia), Raymond K. Zhao (CSIRO’s Data61, Australia)
10:50 AM - 11:15 AM BFU: Bayesian Federated Unlearning with Parameter Self-Sharing
Weiqi Wang (University of Technology Sydney, Australia), Chenhan Zhang (University of Technology Sydney, Australia), An Liu (Soochow University, China), Shui Yu (University of Technology Sydney, Australia)
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
Lili Yan (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Jingyi Cui (School of New Media and Communication, Tianjin University, China), Jian Liu (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Guangquan Xu (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Lidong Han (The Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, China), Alireza Jolfaei (Flinders University, Australia), Xi Zheng (Macquarie University, Australia)
11:15 AM - 11:40 AM SoK: Systematizing Attack Studies in Federated Learning – From Sparseness to Completeness
Geetanjli Sharma (La Trobe University and CSIRO’s Data61, Australia), M.A.P. Chamikara (CSIRO’s Data61, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Yi-Ping Phoebe Chen (La Trobe University, Australia)
FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation
Lennart Braun (Aarhus University, Denmark), Moritz Huppert (TU Darmstadt, German), Nora Khayata (TU Darmstadt, German), Thomas Schneider (TU Darmstadt, German), Oleksandr Tkachenko (DFINITY Foundation, Switzerland)
11:40 AM - 12:05 PM Going Haywire: False Friends in Federated Learning and How to Find Them
William Aiken (University of Ottawa, Canada), Paula Branco (University of Ottawa, Canada), Guy-Vincent Jourdan (University of Ottawa, Canada)
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator
Leizhang Wang (Xidian University, China), Yuntao Wang (Osaka University, Japan), Baocang Wang (Xidian University, China)
12:05 PM - 12:30 PM Deepfake CAPTCHA: A Method for Preventing Fake Calls
Lior Yasur (Ben-Gurion University, Israel), Guy Frankovits (Ben-Gurion University, Israel), Freddie Grabovski (Ben-Gurion University, Israel), Yisroel Mirsky (Ben-Gurion University, Israel)
Communication-Efficient Inner Product Private Join and Compute with Cardinality
Koji Chida (Gunma University, Japan), Koki Hamada (NTT Social Informatics Laboratories, Japan), Atsunori Ichikawa (NTT Social Informatics Laboratories, Japan), Masanobu Kii (NTT Social Informatics Laboratories, Japan), Junichi Tomida (NTT Social Informatics Laboratories, Japan)
12:30 PM - 10:00 PM Lunch (Lunch Box) + Social Event + Banquet

Day 4 (Fri) - 14/07

Ballroom Monash Room
09:00 AM - 10:15 AM Tutorial 3: Recent Advances and Challenges in Membership Inference Attacks on Machine Learning
by Hongsheng Hu, Ruoxi Sun, Shuo Wang, Xuyun Zhang
Tutorial 4: Symmetric Searchable Encryption: Recent Development and Future Work
by Jianfeng Wang
10:15 AM - 10:40 AM Morning Tea
10:40 AM - 12:20 PM Session 13: Adversarial Machine Learning
Session Chair: Saurabh Bagchi
(Purdue University)
Session 14: Network Security
Session Chair: Debin Gao
(Singapore Management University)
10:40 AM - 11:05 AM Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks
Zitao Chen (University of British Columbia, , Canada), Pritam Dash (University of British Columbia, Canada), Karthik Pattabiraman (University of British Columbia, Canada)
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
Timothy Trippel (University of Michigan, USA), Kang G. Shin (University of Michigan, USA), Kevin B. Bush (MIT Lincoln Laboratory, USA), Matthew Hicks (Virginia Tech, USA)
11:05 AM - 11:30 AM Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
Jiyi Zhang (NUS, Singapore), Han Fang (NUS, Singapore), Wesley Joon-Wie Tann (NUS, Singapore), Ke Xu (Huawei International, Singapore), Chengfang Fang (Huawei Internationa, Singaporel), Ee-Chien Chang (NUS, Singapore)
SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks
Oleg Schell (Robert Bosch GmbH, Germany), Marcel Kneib (Robert Bosch GmbH, Germany)
11:30 AM - 11:55 AM Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
Mengdie Huang (Xidian University, China), Yi Xie (Xidian University, China), Xiaofeng Chen (Xidian University, China), Jin Li (Guangzhou University, China), Changyu Dong (Newcastle University, United Kingdom), Zheli Liu (Nankai University, China), Willy Susilo (University of Wollongong, Australia)
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay
Ali Zohaib (UMass Amherst, USA), Jade Sheffey (UMass Amherst, USA), Amir Houmansadr (UMass Amherst, USA)
11:55 AM - 12:20 PM DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation
Zhicong Yan (Shanghai Jiao Tong University, China), Shenghong Li (Shanghai Jiao Tong University, China), Ruijie Zhao (Shanghai Jiao Tong University, China), Yuan Tian (Shanghai Jiao Tong University, China), Yuanyuan Zhao (Hangzhou Normal University, China)
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in ServiceWorkers Via postMessage
Yeomin Jeong (Korea University, South Korea), Woonghee Lee (Korea University, South Korea), Junbeom Hur (Korea University, South Korea)
12:20 PM - 1:40 PM Lunch
01:40 PM - 03:20 PM Session 15: Cloud Security
Session Chair: Aydin Abadi
(University College London)
Session 16: User-Centric Security II
Session Chair: Michael V Le
01:40 PM - 02:05 PM Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns (RWTH Aachen University, German), Constantin Sander (RWTH Aachen University, German), Robin Decker (RWTH Aachen University, German), Klaus Wehrle (RWTH Aachen University, German)
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims
Aydin Abadi (University College London, United Kingdom), Steven J. Murdoch (University College London, United Kingdom)
02:05 PM - 02:30 PM Securing Container-based Clouds with Syscall-aware Scheduling
Michael V. Le (IBM Research, USA), Salman Ahmed (IBM Research, USA), Dan Williams (Virginia Tech, USA), Hani Jamjoom (IBM Research, USA)
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators
Yangyong Zhang (Texas A&M University, USA), Raj Vardhan (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Guofei Gu (Texas A&M University, USA)
02:30 PM - 02:55 PM IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
Thore Tiemann (University of Lübeck, Germany), Zane Weissman (Worcester Polytechnic Institute, USA), Thomas Eisenbarth (University of Lübeck, Germany), Berk Sunar (Worcester Polytechnic Institute, USA)
Formalising Application-Driven Authentication and Access-Control based on Users’ Companion Devices
Chris Culnane (United Kingdom), Ioana Boureanu (University of Surrey, United Kingdom), Jean Snyman (University of Surrey, United Kingdom), Steve Wesemeyer (University of Surrey, United Kingdom), Helen Treharne (University of Surrey, United Kingdom)
02:55 PM - 03:20 PM Security Properties of Virtual Remotes and SPOOKing their Violations
Joshua Majors (Purdue University, USA), Edgardo Barsallo Yi (Purdue University, USA), Amiya Maji (Purdue University, USA), Darren Wu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Aravind Machiry (Purdue University, USA)
CryptoShield – Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Florian Draschbacher (Graz University of Technology, Austria), Johannes Feichtner (Dynatrace Austria GmbH, Austria)
03:20 PM - 03:45 PM Afternoon Tea
03:45 PM - 05:25 PM Session 17: Model Security
Session Chair: Hung Nguyen
(The University of Adelaide)
Session 18: Application Security
Session Chair: Selcuk Uluagac
(Florida International University)
03:45 PM - 04:10 PM A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
HyunJin Kim (Sungkyunkwan University, South Korea), JinYeong Bak (Sungkyunkwan University, South Korea), Kyunghyun Cho (New York University, USA), Hyungjoon Koo (Sungkyunkwan University, South Korea)
ThreadLock: Native Principal Isolation Through Memory Protection Keys
William Blair (Boston University, USA), William Robertson (Northeastern University, USA), Manuel Egele (Boston University, USA)
04:10 PM - 04:35 PM Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang (Southwest University, China), Zhaoxi Zhang (Deakin University, Australia), Qi Zhong (Deakin University, Australia), Xufei Zheng (Southwest University, China), Yanjun Zhang (University of Technology Sydney, Australia), Shengshan Hu (Huazhong University of Science and Technology, China), Leo Yu Zhang (Griffith University, Austraia)
Secure Context Switching of Masked Software Implementations
Barbara Gigerl (Graz University of Technology, Austria), Robert Primas (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
04:35 PM - 05:00 PM CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
Shang Wang (Nanjing University of Science and Technology, China), Yansong Gao (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science and Technology, China), Zhi Zhang (University of Western Australia), Yuqing Zhang (University of Chinese Academy of Sciences, China), Willy Susilo ( University of Wollongong, Australia), Dongxi Liu (CSIRO’s Data61, Australia)
A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems
Yumeng Zhang (The University of Adelaide, Australia), Max Ward (The University of Western Australia, Australia), Mingyu Guo (The University of Adelaide, Australia), Hung Nguyen (The University of Adelaide, Australia
05:00 PM - 05:25 PM QUDA: Query-Limited Data-Free Model Extraction
Zijun Lin (Nanyang Technological University, Singapore), Ke Xu (Huawei International), Chengfang Fang (Huawei International), Huadi Zheng (Huawei Technology), Jaheezuddin Aneez Ahmed (Nanyang Technological University, Singapore), Jie Shi (Huawei International)
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide
Pallavi Sivakumaran (Royal Holloway, University of London, United Kingdom), Chaoshun Zuo (Ohio State University, USA), Zhiqiang Lin (Ohio State University, USA), Jorge Blasco (Universidad Politécnica de Madrid, Spain)
05:25 PM - 05:30 PM Closing