Accepted papers

Main Track

iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical SystemsShahriar, Md Hasan (Florida International University); Rahman, Mohammad Ashiqur (Florida International University); Haque, Nur Imtiazul (Florida International Univeristy); Chowdhury, Badrul (University of North Carolina at Charlotte); Whisenant, Steven G (Duke Energy)
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users’ BehaviorsFukushi, Naoki  (NTT Secure Platform Laboratories); Koide, Takashi (NTT Secure Platform Laboratories); Chiba, Daiki (NTT Secure Platform Laboratories); Nakano, Hiroki (NTT Secure Platform Laboratories); Akiyama, Mitsuaki (NTT Secure Platform Laboratories)
Horus: A Security Assessment Framework for Android Crypto WalletsUddin, Md Shahab (Concordia); Mannan, Mohammad (Concordia University); Youssef, Amr   (Concordia Univeristy)
Compromised through CompressionVan Aubel, Pol (Radboud University); Poll, Erik (Radboud University Nijmegen)
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault RecoveryKarl, Ryan  (University of Notre Dame); Takeshita, Jonathan (University of Notre Dame); Jung, Taeho (University of Notre Dame)
Cryptonomial: A Framework for Private Time-Series Polynomial CalculationsKarl, Ryan (University of Notre Dame); Takeshita, Jonathan   (University of Notre Dame); Mohammed, Al-Amin  (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame)
ToFi: An Algorithm to Defend against Byzantine Attacks in Federated LearningXia, Qi (College of William and Mary); Tao, Zeyi (College of William and Mary); Li, Qun   (College of William and Mary)
Provably Secure Contact Tracing with Conditional Private Set IntersectionTakeshita, Jonathan (University of Notre Dame); Karl, Ryan (University of Notre Dame); Mohammed, Alamin (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame)
A Forensic Tool to Acquire Radio Signals using Software Defined Radio Azhar, Hannan (Canterbury Christ Church University); Abadia, German (Canterbury Christ Church University)
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event ManagementNajafi, Pejman (Hasso Plattner Institute, University of Potsdam); Cheng, Feng (Hasso Plattner Institute, University of Potsdam, Germany); Meinel, Christoph (Hasso Plattner Institute, University of Potsdam, Germany)
An Empirical Study on Mobile Payment Credential Leaks and Their ExploitsShi, Shangcheng (The Chinese University of Hong Kong); Wang, Xianbo (The Chinese University of Hong Kong); Zeng, Kyle   (Arizona State University & The Chinese University of Hong Kong); Yang, Ronghai (Sangfor Technology Inc & The Chinese University of Hong Kong); Lau, Wing Cheong   (The Chinese University of Hong Kong)
Local Model Privacy-preserving Study for Federated LearningPan, Kaiyun (East China Normal University); He, Daojing (East China Normal University); Xu, Chuan (Inria Sophia Antipolis)
CROCUS: An objective approach for SDN controllers security assessmentSilva, Carlos (University of Coimbra); Sousa, Bruno (University of Coimbra); Vilela, Joao   (University of Porto)
Anonymous Short Communications over Social NetworksBuccafurri, Francesco (DIIES Dept.- University of Reggio Calabria); De Angelis, Vincenzo   (DIIES Dept.- University of Reggio Calabria); Idone, Maria Francesca (DIIES Dept.- University of Reggio Calabria); Labrini, Cecilia (DIIES Dept.- University of Reggio Calabria)
Explanation-Guided Diagnosis of Machine Learning Evasion AttacksAmich, Abderrahmen (University of Michigan, Dearborn); Eshete, Birhanu (University of Michigan, Dearborn)
A $57 Million Dollar Security Analysis on the Ethereum Smart ContractAhr, Christ (TU Berlin)
MPD: Moving Target Defense through Communication Protocol DialectsMei, Yongsheng (The George Washington University); Gogineni, Kailash (The George Washington University); Lan, Tian (The George Washington University); Venkataramani, Guru   (The George Washington University)
A Distributed Ledger for Non-Attributable Cyber Threat Intelligence ExchangeHuff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas)
Towards Automated Assessment of Vulnerability Exposures in Security OperationsHuff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas)
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat HuntingWei, Renzheng (Institute of Information Engineering, Chinese Academy of Sciences); Cai, Lijun   (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences); Meng, Dan   (Institute of Information Engineering, Chinese Academy of Sciences)
Smartphone Location Spoofing Attack in Wireless NetworksHu, Chengbin (University of South Florida); Liu, Yao (University of South Florida); Lu, Zhuo   (University of South Florida); Zhao, Shangqing (University of South Florida); Han, Xiao   (University of South Flordia); Xiong, Junjie   (University of South Florida)
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy NetworksPanchenko, Andriy (Brandenburg University of Technology); Mitseva, Asya (Brandenburg University of Technology); Ziemann, Torsten (Brandenburg University of Technology); Hering, Till (RWTH Aachen University)
SemFlow: Accurate Semantic Identification from Low-Level System DataKavousi, Mohammad (Northwestern University); Yang, Runqing (Zhejiang University); Ma, Shiqing (Rutgers University); Chen, Yan (Northwestern University)
Origin Attribution of RSA Public KeysBranca, Enrico (Department of Computer Science, University of Saskatchewan); Abazari, Farzaneh (Department of Computer Science, University of Saskatchewan); Stakhanova, Natalia   (Department of Computer Science, University of Saskatchewan); Rivera Carranza, Ronald   (Department of Computer Science, University of Saskatchewan)
Understanding ε for Differential Privacy in Differencing Attack ScenariosAshena, Narges (University of Zurich); Dell’Aglio, Daniele (Aalborg University, University of Zurich); Bernstein, Abraham (University of Zurich)
Controlling network traffic microstructures for machine-learning model probingClausen, Henry (University of Edinburgh); Aspinall, David (University of Edinburgh); Flood, Robert (University of Edinburgh)
TESLAC: Accelerating Lattice-based Cryptography with AI AcceleratorWan, Lipeng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China / School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China / Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China); Zheng, Fangyu   (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China); Lin, Jingqiang   (University of Science and Technology of China)
Leakuidator: Leaky resource attacks and countermeasuresZaheri, Mojtaba (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology)
HTPD: Secure and Flexible Message-Based Communication for Mobile AppsLiu, Yin (Virginia Tech); Cruz, Breno (Virginia Tech); Tilevich, Eli (Virginia Tech)
Facilitating Parallel Fuzzing withMutually-exclusive Task DistributionWang, Yifan (Stevens Institute of Technology); Zhang, Yuchen (Stevens Institute of Technology); Pang, Chengbin   (Nanjing Uniserity); Li, Peng (ByteDance); Triandopoulos, Nikolaos (Stevens Institute of Technology); Xu, Jun (Stevens Institute of Technology)
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And GoogleLeith, Douglas (Trinity College Dublin)
Repeatable Experimentation for Cybersecurity Moving Target DefenseAcosta, Jaime Cesar (DEVCOM Army Research Laboratory); Clarke, Luisana (University of Texas at El Paso); Medina, Stephanie (University of Texas at El Paso); Akbar, Monika (University of Texas at El Paso); Hossain, Mahmud Shahriar  (University of Texas at El Paso); Free-Nelson, Frederica   (DEVCOM Army Research Laboratory)
Flowrider: Fast On-Demand Key Provisioning for CloudNetworksPaladi, Nicolae (Lund University); Tiloca, Marco (RISE Research Institutes of Sweden – RISE Cybersecurity); Nikbakht Bideh, Pegah (Lund University); Hell, Martin   (Lund University)
XHunter: Understanding XXE Vulnerability via Automatic AnalysisWang, Zhenhua (NUDT); Xie, Wei (NUDT); Tao, Jing (NUDT); Wang, Baosheng (NUDT); Tang, Yong (NUDT); Wang, Enze (NUDT)
Jabbic lookups: a backend telemetry-based system for malware triageBordeanu, Octavian Ciprian  (University College London); Shen, Yun (NortonLifelock); Davies, Toby (University College London); Stringhini, Gianluca (Boston University)
Research of CPA Attack Methods based on  Ant Colony Algorithmduan, xiaoyi  (Beijing Electronic Science and Technology Institute); Li, You (Beijing Electronic Science and Technology Institute); Tong, Jianmin   (Beijing Electronic Science and Technology Institute); Li, Xiuying  (Beijing Electronic Science and Technology Institute); He, Siman   (Hunan national secrecy science and technology evaluation centre); Zhang, Peishu (Beijing Electronic Science and Technology Institute)