Session Details - Day01 (Tue)

Session 1: Applied Cryptography I

This year’s AsiaCCS will run for five days, with the following schedule:

  • 10/07/2023: Workshops and Welcome Reception
  • 11/07/2023 – 14/07/2023: Main conference sessions, Tutorials, and Social Events

The conference agenda overview is given below. Please note that all times mentioned in this page are in GMT+10 (AEST)

Session Details - Day01 (Tue)

Ballroom

Session Chair: Muhammed Esgin
(Monash University)

---
10:55 AM - 11:20 AM

Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee (Korea Institute For Advanced Study, South Korea), Seonhong Min (Seoul National University, South Korea), Jinyeong Seo (Seoul National University, South Korea), Yongsoo Song (Seoul National University, South Korea)

---

11:20 AM - 11:45 AM

Flag: A Framework for Lightweight Robust Secure Aggregation
Laasya Bangalore (Georgetown University, USA), Mohammad Hossein Faghihi Sereshgi (University of Rochester, USA), Carmit Hazay (Bar-Ilan University, Israel), Muthuramakrishnan Venkitasubramaniam (Georgetown University, USA)

---

11:45 AM - 12:10 PM

Implementing and Optimizing Matrix Triples with Homomorphic Encryption
Johannes Mono (Ruhr University Bochum, Germany), Tim Güneysu (Ruhr University Bochum, Germany)

Monash Room

Session Chair: Hyungjoon (Kevin) Koo (SKKU)

---
10:55 AM - 11:20 AM

Invasion of location privacy using online map services and smartphone sensors
Hyunsoo Kim (NCSOFT, Republic of Korea), Youngbae Jeon (Samsung Research, Republic of Korea), Ji Won Yoon (Korea University, Republic of Korea)

---

11:20 AM - 11:45 AM

Privacy-Preserving Record Linkage for Cardinality Counting
Nan Wu (Macquarie University and CSIRO’s Data61, Australia), Dinusha Vatsalan (Macquarie University, Australia), Mohamed Ali Kaafar (Macquarie University, Australia), Sanath Kumar Ramesh (Open Treatments Foundations, USA)

---

11:45 AM - 12:10 PM

Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications
Baiqi Chen (The University of Queensland and CSIRO’s Data61, Australia), Tingmin Wu (CSIRO’s Data61, Australia), Yanjun Zhang (Deakin University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)

Ballroom

Session Chair: Yansong Gao
(CSIRO’s Data61)

---
01:30 PM - 01:55 PM

RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense
Yue Cui (University of Tennessee, USA), Syed Irfan Ali Meerza (University of Tennessee, USA), Zhuohang Li (University of Tennessee, USA), Luyang Liu (Google Research, USA), Jiaxin Zhang (Intuit AI Research, USA), Jian Liu (University of Tennessee, USA)

---

01:55 PM - 02:20 PM

LDL: A Defense for Label-Based Membership Inference Attacks
Arezoo Rajabi (University of Washington, USA), Dinuka Sahabandu (University of Washington, USA), Luyao Niu (University of Washington, USA), Bhaskar Ramasubramanian (Western Washington University, USA), Radha Poovendran (University of Washington, USA)

---

02:20 PM - 02:45 PM

Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck
Chenhan Zhang (University of Technology Sydney, Australia), Weiqi Wang (University of Technology Sydney, Australia), James J.Q. Yu (Southern University of Science and Technology, China), Shui Yu (University of Technology Sydney, Australia)

---

02:45 PM - 03:10 PM

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks
Mengyao Ma (The University of Queensland and CSIRO’s Data61, Australia), Yanjun Zhang (University of Technology Sydney, Australia), Pathum Chamikara Mahawaga Arachchige (CSIRO’s Data61, Australia), Leo Yu Zhang (Griffith University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)

---

03:10 PM - 03:35 PM

Data Privacy Examination against Semi-Supervised Learning
Jiadong Lou (University of Louisiana at Lafayette, USA), Xu Yuan (University of Louisiana at Lafayette, USA), Miao Pan (University of Louisiana at Lafayette, USA), Hao Wang (Louisiana State University, USA), Nianfeng Tzeng (University of Louisiana at Lafayette, USA)

Monash Room

Session Chair: Kasper Rasmussen
(University of Oxford)

---
01:30 PM - 01:55 PM

Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses
Marco Abbadini (Università degli Studi di Bergamo, Italy), Dario Facchinetti (Università degli Studi di Bergamo, Italy), Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)

---

01:55 PM - 02:20 PM

CacheFX: A Framework for Evaluating Cache Security
Daniel Genkin (Georgia Institute of Technology, USA), William Kosasih (University of Adelaide, Australia), Fangfei Liu (Intel Labs, USA), Anna Trikalinou (Microsoft, USA), Thomas Unterluggauer (Intel Labs, Austria), Yuval Yarom (Ruhr University Bochum, Germany)

---

02:20 PM - 02:45 PM

Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Martin Unterguggenberger (Graz University of Technology, Austria), David Schrammel (Graz University of Technology, Austria), Pascal Nasahl (Graz University of Technology, Austria), Robert Schilling (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

---

02:45 PM - 03:10 PM

FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A
Jingquan Ge (Southern University of Science and Technology, China), Fengwei Zhang (Southern University of Science and Technology, China)

---

03:10 PM - 03:35 PM

ShowTime: Amplifying Arbitrary CPU Timing Side Channels
Antoon Purnal (imec-COSIC, KU Leuven, Belgium), Marton Bognar (imec-DistriNet, KU Leuven, Belgium), Frank Piessens (imec-DistriNet, KU Leuven, Belgium), Ingrid Verbauwhede (imec-COSIC, KU Leuven, Belgium)

Ballroom

Session Chair: Siqi Ma
(UNSW)

---
04:00 PM - 04:25 PM

Symbolic Modeling of Remote Attestation Protocols for Device and App Integrity on Android
JAbdulla Aldoseri (University of Birmingham UK, University of Bahrain), Tom Chothia (University of Birmingham, UK), Jose Moreira (Valory AG, Switzerland), David Oswald (University of Birmingham, UK)

---

04:25 PM - 04:50 PM

Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis
Sirus Shahini (University of Utah, USA), Robert Ricci (University of Utah, USA), Mu Zhang (University of Utah, USA), Mathias Payer (EPFL, Switzerland)

---

04:50 PM - 05:15 PM

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation
Alexander Küchler (Fraunhofer AISEC, Germany), Leon Wenning (TU Munich, Germany), Florian Wendland (Fraunhofer AISEC, Germany)

---

05:15 PM - 05:40 PM

Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs
Mohamad Mansouri (EURECOM, France), Jun Xu (University of Utah, USA), Georgios Portokalidis (Stevens Institute of Technology, USA)

Monash Room

Session Chair: Antoon Purnal
(KU Leuven)

---
04:00 PM - 04:25 PM

Secure and Efficient Mobile DNN Using Trusted Execution Environments
Bin Hu (Rutgers University, USA), Yan Wang (Temple University, USA), Jerry Cheng (New York Institute of Technology, USA), Tianming Zhao (Dayton University, USA), Yucheng Xie (Indiana University-Purdue University Indianapolis, USA), Xiaonan Guo (George Mason University, USA), Yingying Chen (Rutgers University, USA)

---

04:25 PM - 04:50 PM

Stairway To Rainbow
Gildas Avoine (INSA, CNRS, IRISA, France), Xavier Carpent (University of Nottingham, UK), Diane Leblanc-Albarel (INSA, CNRS, IRISA, France)

---

04:50 PM - 05:15 PM

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Ruyi Ding (Northeastern University, USA), Cheng Gongye (Northeastern University, USA), Siyue Wang (Northeastern University, USA), A. Adam Ding (Northeastern University, USA), Yunsi Fei (Northeastern University, USA)

---

05:15 PM - 05:40 PM

Electromagnetic Signal Injection Attacks on Differential Signaling
Youqian Zhang (University of Oxford, UK), Kasper Rasmussen (University of Oxford, UK)

Session Details - Day02 (Wed)

Ballroom

Session Chair: Shangqi Lai
(Monash University)

---
02:00 PM - 02:25 PM

On the Cryptographic Fragility of the Telegram Ecosystem
Theo von Arx (ETH Zurich, Switzerland), Kenneth G. Paterson (ETH Zurich, Switzerland)

---

02:25 PM - 02:50 PM

PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption
Yongha Son (Samsung SDS, South Korea), Jinhyuck Jeong (Samsung SDS, South Korea)

---

02:50 PM - 03:15 PM

ZEKRA: Zero-Knowledge Control-Flow Attestation
Heini Bergsson Debes (Technical University of Denmark, Denmark), Edlira Dushku (Aalborg University, Denmark), Thanassis Giannetsos (Ubitech Ltd), Ali Marandi (Technical University of Denmark, Denmark)

---

03:15 PM - 03:40 PM

Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice
Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia), Ralf Kuesters (University of Stuttgart, Germany)

Monash Room

Session Chair: Robert Ricci
(University of Utah)

---
02:00 PM - 02:25 PM

Benchmarking the Benchmarks
Marc Miltenberger (Fraunhofer SIT, Germany), Steven Arzt (Fraunhofer SIT, Germany), Philipp Holzinger (Fraunhofer SIT, Germany), Julius Näumann (Fraunhofer SIT, Germany)

---

02:25 PM - 02:50 PM

Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO
Guy Farrelly (The University of Adelaide, Australia), Michael Chesser (The University of Adelaide, Australia), Damith C. Ranasinghe (University of Adelaide, Australia)

---

02:50 PM - 03:15 PM

RaceBench: A Triggerable and Observable Concurrency Bug Benchmark
Jiashuo Liang (Peking University, China), Ming Yuan (Tsinghua University, China), Zhanzhao Ding (Peking University, China), Siqi Ma (The University of New South Wales, Australia), Xinhui Han (Peking University, China), Chao Zhang (Tsinghua University, China)

---

03:15 PM - 03:40 PM

BinWrap: Hybrid Protection against Native Node.js Add-ons
George Christou (FORTH-ICS, Greece), Grigoris Ntousakis (Brown University, USA), Eric Lahtinen (Aarno Labs, USA), Sotiris Ioannidis (TU Crete, Greece), Vasileios P. Kemerlis (Brown University, USA), Nikos Vasilakis (Brown University, USA)

Ballroom

Session Chair: William Blair
(Boston University)

---
04:05 PM - 04:30 PM

Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures
Abdullah Qasem (Concordia University, Canada), Mourad Debbabi (Concordia University, Canada), Bernard Lebel (Thales Research Technologies, , Canada), Marthe Kassouf (Hydro-Québec Research Institute, Canada)

---

04:30 PM - 04:55 PM

SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
David Schrammel (Graz University of Technology, Austria), Moritz Waser (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Martin Unterguggenberger (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

---

04:55 PM - 05:20 PM

SFITAG: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions
Jiwon Seo (Seoul National University, South Korea), Junseung You (Seoul National University, South Korea), Yungi Cho (Seoul National University, South Korea), Yeongpil Cho (Hanyang University, South Korea), Donghyun Kwon (Pusan National University, South Korea), Yunheung Paek (Seoul National University, South Korea)

---

05:20 PM - 05:45 PM

An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks
Matthew Rogers (MITRE, University of Oxford, USA), Kasper Rasmussen (University of Oxford, UK)

Monash Room

Session Chair: Tina Wu
(CSIRO’s Data61)

---
04:05 PM - 04:30 PM

#DM-Me: Susceptibility to Direct Messaging-Based Scams
Raj Vardhan (Texas A&M University, USA), Alok Chandrawal (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Yangyong Zhang (Texas A&M University, USA), Guofei Gu (Texas A&M University, USA)

---

04:30 PM - 04:55 PM

An End-to-End Analysis of Covid-Themed Scams in the Wild
Behzad Ousat (Florida International University, USA), Mohammad Ali Tofighi (Florida International University, USA), Amin Kharraz (Florida International University, USA)

---

04:55 PM - 05:20 PM

MASCARA: Systematically Generating Memorable And Secure Passphrases
Avirup Mukherjee (Indian Institute of Technology, Kharagpur, India), Kousshik Murali (Indian Institute of Technology, Kharagpur, India), Shivam Kumar Jha (Indian Institute of Technology, Kharagpur, India), Niloy Ganguly (Indian Institute of Technology, Kharagpur, India), Rahul Chatterjee (University of Wisconsin–Madison, USA), Mainack Mondal (Indian Institute of Technology, Kharagpur, India)

---

05:20 PM - 05:45 PM

How Secure Are The Main Real-World Mix Networks — Case Studies To Explore Vulnerabilities and Usability
Kun Peng (Huawei Technology Ltd, Australia)

Session Details - Day03 (Thu)

Ballroom

Session Chair: Sanjay Jha (UNSW)

Session Manager: Chamikara Mahawaga Arachchige (CSIRO's Data61)

---
10:25 AM - 10:50 AM

FLAIR: Defense against Model Poisoning Attack in Federated Learning
Atul Sharma (Purdue University, USA), Wei Chen (Purdue University, USA), Joshua Zhao (Purdue University, USA), Qiang Qiu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Somali Chaterji (Purdue University, USA)

---

10:50 AM - 11:15 AM

BFU: Bayesian Federated Unlearning with Parameter Self-Sharing
Weiqi Wang (University of Technology Sydney, Australia), Chenhan Zhang (University of Technology Sydney, Australia), An Liu (Soochow University, China), Shui Yu (University of Technology Sydney, Australia)

---

11:15 AM - 11:40 AM

SoK: Systematizing Attack Studies in Federated Learning – From Sparseness to Completeness
Geetanjli Sharma (La Trobe University and CSIRO’s Data61, Australia), M.A.P. Chamikara (CSIRO’s Data61, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Yi-Ping Phoebe Chen (La Trobe University, Australia)

---

11:40 AM - 12:05 PM

Going Haywire: False Friends in Federated Learning and How to Find Them
William Aiken (University of Ottawa, Canada), Paula Branco (University of Ottawa, Canada), Guy-Vincent Jourdan (University of Ottawa, Canada)

---

12:05 PM - 12:30 PM

Deepfake CAPTCHA: A Method for Preventing Fake Calls
Lior Yasur (Ben-Gurion University, Israel), Guy Frankovits (Ben-Gurion University, Israel), Freddie Grabovski (Ben-Gurion University, Israel), Yisroel Mirsky (Ben-Gurion University, Israel)

Monash Room

Session Chair: Shabnam Kasra (UNSW)

Session Manager: Nan Wu (CSIRO's Data61)

---
10:25 AM - 10:50 AM

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Muhammed F. Esgin (Monash University and CSIRO’s Data61, Australia), Oguzhan Ersoy (Radboud University and Delft University of Technology, Netherlands), Veronika Kuchta (Florida Atlantic University, USA), Julian Loss (CISPA Helmholtz Center for Information Security, German), Amin Sakzad (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Xiangwen Yang (Monash University, Australia), Raymond K. Zhao (CSIRO’s Data61, Australia)

---

10:50 AM - 11:15 AM

IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
Lili Yan (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Jingyi Cui (School of New Media and Communication, Tianjin University, China), Jian Liu (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Guangquan Xu (Tianjin Key Laboratory of Advanced Networking (TANK), Tianjin University, China), Lidong Han (The Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, China), Alireza Jolfaei (Flinders University, Australia), Xi Zheng (Macquarie University, Australia)

---

11:15 AM - 11:40 AM

FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation
Lennart Braun (Aarhus University, Denmark), Moritz Huppert (TU Darmstadt, German), Nora Khayata (TU Darmstadt, German), Thomas Schneider (TU Darmstadt, German), Oleksandr Tkachenko (DFINITY Foundation, Switzerland)

---

11:40 AM - 12:05 PM

A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator
Leizhang Wang (Xidian University, China), Yuntao Wang (Osaka University, Japan), Baocang Wang (Xidian University, China)

---

12:05 PM - 12:30 PM

Communication-Efficient Inner Product Private Join and Compute with Cardinality
Koji Chida (Gunma University, Japan), Koki Hamada (NTT Social Informatics Laboratories, Japan), Atsunori Ichikawa (NTT Social Informatics Laboratories, Japan), Masanobu Kii (NTT Social Informatics Laboratories, Japan), Junichi Tomida (NTT Social Informatics Laboratories, Japan)

Session Details - Day04 (Fri)

Ballroom

Session Chair: Saurabh Bagchi
(Purdue University)

---
10:40 AM - 11:05 AM

Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks
Zitao Chen (University of British Columbia, , Canada), Pritam Dash (University of British Columbia, Canada), Karthik Pattabiraman (University of British Columbia, Canada)

---

11:05 AM - 11:30 AM

Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
Jiyi Zhang (NUS, Singapore), Han Fang (NUS, Singapore), Wesley Joon-Wie Tann (NUS, Singapore), Ke Xu (Huawei International, Singapore), Chengfang Fang (Huawei Internationa, Singaporel), Ee-Chien Chang (NUS, Singapore)

---

11:30 AM - 11:55 AM

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
Mengdie Huang (Xidian University, China), Yi Xie (Xidian University, China), Xiaofeng Chen (Xidian University, China), Jin Li (Guangzhou University, China), Changyu Dong (Newcastle University, United Kingdom), Zheli Liu (Nankai University, China), Willy Susilo (University of Wollongong, Australia)

---

11:55 AM - 12:20 PM

DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation
Zhicong Yan (Shanghai Jiao Tong University, China), Shenghong Li (Shanghai Jiao Tong University, China), Ruijie Zhao (Shanghai Jiao Tong University, China), Yuan Tian (Shanghai Jiao Tong University, China), Yuanyuan Zhao (Hangzhou Normal University, China)

Monash Room

Session Chair: Debin Gao
(Singapore Management University)

---
10:40 AM - 11:05 AM

T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing
Timothy Trippel (University of Michigan, USA), Kang G. Shin (University of Michigan, USA), Kevin B. Bush (MIT Lincoln Laboratory, USA), Matthew Hicks (Virginia Tech, USA)

---

11:05 AM - 11:30 AM

SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks
Oleg Schell (Robert Bosch GmbH, Germany), Marcel Kneib (Robert Bosch GmbH, Germany)

---

11:30 AM - 11:55 AM

Investigating Traffic Analysis Attacks on Apple iCloud Private Relay
Ali Zohaib (UMass Amherst, USA), Jade Sheffey (UMass Amherst, USA), Amir Houmansadr (UMass Amherst, USA)

---

11:55 AM - 12:20 PM

A Honey postMessage, but a Heart of Gall: Exploiting Push Service in ServiceWorkers Via postMessage
Yeomin Jeong (Korea University, South Korea), Woonghee Lee (Korea University, South Korea), Junbeom Hur (Korea University, South Korea)

Ballroom

Session Chair: Aydin Abadi
(University College London)

---
01:40 PM - 02:05 PM

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns (RWTH Aachen University, German), Constantin Sander (RWTH Aachen University, German), Robin Decker (RWTH Aachen University, German), Klaus Wehrle (RWTH Aachen University, German)

---

02:05 PM - 02:30 PM

Securing Container-based Clouds with Syscall-aware Scheduling
Michael V. Le (IBM Research, USA), Salman Ahmed (IBM Research, USA), Dan Williams (Virginia Tech, USA), Hani Jamjoom (IBM Research, USA)

---

02:30 PM - 02:55 PM

IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
Thore Tiemann (University of Lübeck, Germany), Zane Weissman (Worcester Polytechnic Institute, USA), Thomas Eisenbarth (University of Lübeck, Germany), Berk Sunar (Worcester Polytechnic Institute, USA)

---

02:55 PM - 03:20 PM

Security Properties of Virtual Remotes and SPOOKing their Violations
Joshua Majors (Purdue University, USA), Edgardo Barsallo Yi (Purdue University, USA), Amiya Maji (Purdue University, USA), Darren Wu (Purdue University, USA), Saurabh Bagchi (Purdue University, USA), Aravind Machiry (Purdue University, USA)

Monash Room

Session Chair: Michael V Le
(IBM)

---
01:40 PM - 02:05 PM

Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims
Aydin Abadi (University College London, United Kingdom), Steven J. Murdoch (University College London, United Kingdom)

---

02:05 PM - 02:30 PM

Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators
Yangyong Zhang (Texas A&M University, USA), Raj Vardhan (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Guofei Gu (Texas A&M University, USA)

---

02:30 PM - 02:55 PM

Formalising Application-Driven Authentication and Access-Control based on Users’ Companion Devices
Chris Culnane (United Kingdom), Ioana Boureanu (University of Surrey, United Kingdom), Jean Snyman (University of Surrey, United Kingdom), Steve Wesemeyer (University of Surrey, United Kingdom), Helen Treharne (University of Surrey, United Kingdom)

---

02:55 PM - 03:20 PM

CryptoShield – Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
Florian Draschbacher (Graz University of Technology, Austria), Johannes Feichtner (Dynatrace Austria GmbH, Austria)

Ballroom

Session Chair: Hung Nguyen
(The University of Adelaide)

---
03:45 PM - 04:10 PM

A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing
HyunJin Kim (Sungkyunkwan University, South Korea), JinYeong Bak (Sungkyunkwan University, South Korea), Kyunghyun Cho (New York University, USA), Hyungjoon Koo (Sungkyunkwan University, South Korea)

---

04:10 PM - 04:35 PM

Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang (Southwest University, China), Zhaoxi Zhang (Deakin University, Australia), Qi Zhong (Deakin University, Australia), Xufei Zheng (Southwest University, China), Yanjun Zhang (University of Technology Sydney, Australia), Shengshan Hu (Huazhong University of Science and Technology, China), Leo Yu Zhang (Griffith University, Austraia)

---

04:35 PM - 05:00 PM

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses
Shang Wang (Nanjing University of Science and Technology, China), Yansong Gao (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science and Technology, China), Zhi Zhang (University of Western Australia), Yuqing Zhang (University of Chinese Academy of Sciences, China), Willy Susilo ( University of Wollongong, Australia), Dongxi Liu (CSIRO’s Data61, Australia)

---

05:00 PM - 05:25 PM

QUDA: Query-Limited Data-Free Model Extraction
Zijun Lin (Nanyang Technological University, Singapore), Ke Xu (Huawei International), Chengfang Fang (Huawei International), Huadi Zheng (Huawei Technology), Jaheezuddin Aneez Ahmed (Nanyang Technological University, Singapore), Jie Shi (Huawei International)

Monash Room

Session Chair: Selcuk Uluagac
(Florida International University)

---
03:45 PM - 04:10 PM

ThreadLock: Native Principal Isolation Through Memory Protection Keys
William Blair (Boston University, USA), William Robertson (Northeastern University, USA), Manuel Egele (Boston University, USA)

---

04:10 PM - 04:35 PM

Secure Context Switching of Masked Software Implementations
Barbara Gigerl (Graz University of Technology, Austria), Robert Primas (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

---

04:35 PM - 05:00 PM

A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems
Yumeng Zhang (The University of Adelaide, Australia), Max Ward (The University of Western Australia, Australia), Mingyu Guo (The University of Adelaide, Australia), Hung Nguyen (The University of Adelaide, Australia)

---

05:00 PM - 05:25 PM

Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide
Pallavi Sivakumaran (Royal Holloway, University of London, United Kingdom), Chaoshun Zuo (Ohio State University, USA), Zhiqiang Lin (Ohio State University, USA), Jorge Blasco (Universidad Politécnica de Madrid, Spain)