Delft, July 3-7, 2023

8th IEEE European Symposium on Security and Privacy


Please refer to the workshop websites for the programs. Directions to the venue can be found here.

Opening

08:30 - 09:00

Keynote: Bart Preneel (KU Leuven)

09:00 - 9:45

Session: Phishing/fraud/scams

9:45 - 10:55

Android, notify me when it is time to go phishing
Antonio Ruggia (University of Genoa), Andrea Possemato (EURECOM), Alessio Merlo (University of Genoa), Dario Nisi (EURECOM), Simone Aonzo (EURECOM)
Understanding, Measuring, and Detecting Modern Technical Support Scams
Jienan Liu (University of Georgia), Pooja Pun (University of New Orleans), Phani Vadrevu (University of New Orleans), Roberto Perdisci (University of Georgia and Georgia Tech)
Understanding the Security Risks of Decentralized Exchanges in the Wild
Jiaqi Chen (Syracuse University), Yibo Wang (Syracuse University), Yuxuan Zhou (Syracuse University), Wanning Ding (Syracuse University), Yuzhe Tang (Syracuse University), XiaoFeng Wang (Indiana University Bloomington), Kai Li (San Diego State University)
Active Countermeasures for Email Fraud
Wentao Chen (University of Bristol), Fuzhou Wang (City University of Hong Kong), Matthew Edwards (University of Bristol)

Coffee Break

10:55 - 11:15

Session: Crypto + formal methods I

11:15 - 12:40

Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance
Vivek Nair (UC Berkeley), Dawn Song (UC Berkeley)
HEX-ML: A Hybrid Cryptographic-Hardware Solution for Oblivious Inference in the Cloud
Deepika Natarajan (University of Michigan-Ann Arbor), Andrew Loveless (University of Michigan-Ann Arbor), Wei Dai (Microsoft Research), Ron Dreslinski (University of Michigan-Ann Arbor)
A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs
Owen Millwood (University of Sheffield), Meltem Kurt Pehlivanoğlu (Kocaeli University), Jack Miskelly (Queen's University Belfast), Aryan Mohammadi Pasikhani (University of Sheffield), Prosanta Gope (University of Sheffield), Elif Bilge Kavun (University of Passau)
Automatic verification of transparency protocols
Vincent Cheval (INRIA Paris, France), José Moreira (Valory AG, Switzerland), Mark Ryan (University of Birmingham)
SoK: Data Sovereignty
Jens Ernstberger (Technical University of Munich), Jan Lauinger (Technical University of Munich), Fatima Elsheimy (Yale University), Liyi Zhou (Imperial College London), Sebastian Steinhorst (Technical University of Munich), Arthur Gervais (University College London), Dawn Song (UC Berkeley)

Lunch Break

13:45 - 13:45

Session: Security and AI

13:45 - 15:10

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph
Nafis Tanveer Islam (University of Texas at San Antonio), Gonzalo De La Torre Parra (University of the Incarnate Word), Dylan Manuel (University of Texas at San Antonio), Elias Bou-Harb (University of Texas at San Antonio), Peyman Najafirad (University of Texas at San Antonio)
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands
Sergio Esposito (Royal Holloway University of London), Daniele Sgandurra (Royal Holloway University of London), Giampaolo Bella (Università degli Studi di Catania)
When the Curious Abandon Honesty: Federated Learning Is Not Private
Franziska Boenisch (Vector Institute), Adam Dziedzic (University of Toronto and Vector Institute), Roei Schuster (Vector Institute), Ali Shahin Shamsabadi (Vector Institute and The Alan Turing Institute), Ilia Shumailov (Vector Institute), Nicolas Papernot (University of Toronto and Vector Institute)
A Certified Radius-Guided Attack Framework to Image Segmentation Modelse
Wenjie Qu (Huazhong University of Science and Technology), Youqi Li (Beijing Institute of Technology), Binghui Wang (Illinois Institute of Technology)
SoK: Explainable Machine Learning for Computer Security Applications
Azqa Nadeem (Delft University of Technology), Daniël Vos (Delft University of Technology), Clinton Cao (Delft University of Technology), Luca Pajola (University of Padua), Simon Dieck (Delft University of Technology), Robert Baumgartner (Delft University of Technology), Sicco Verwer (Delft University of Technology)

Coffee Break

15:10 - 15:30

Session: Privacy

15:30 - 17:00

Is Federated Learning a Practical PET Yet?
Franziska Boenisch (Vector Institute), Adam Dziedzic (University of Toronto and Vector Institute), Roei Schuster (Vector Institute), Ali Shahin Shamsabadi (Vector Institute and The Alan Turing Institute), Ilia Shumailov (Vector Institute), Nicolas Papernot (University of Toronto and Vector Institute)
Towards Fine-Grained Localization of Privacy Behaviors
Vijayanta Jain (University of Maine), Sepideh Ghanavati (University of Maine), Sai Teja Peddinti (Google Inc.), Collin McMillan (University of Notre Dame)
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors
Tim Van hamme (imec - DistriNet, KU Leuven), Giuseppe Garofalo (imec - DistriNet, KU Leuven), Davy Preuveneers (imec - DistriNet, KU Leuven), Wouter Joosen (imec - DistriNet, KU Leuven)
"Act natural!": Exchanging Private Messages on Public Blockchains
Thore Tiemann (University of Lübeck), Sebastian Berndt (University of Lübeck), Thomas Eisenbarth (University of Lübeck), Maciej Liskiewicz (University of Lübeck)
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
Ravital Solomon (Sunscreen), Rick Weber (Sunscreen), Ghada Almashaqbeh (University of Connecticut)

Session: Fuzzing & Vulnerability finding

09:00 - 10:25

EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation
Michael Rodler (Amazon Web Services), David Paaßen (University of Duisburg-Essen), Wenting Li (NEC Laboratories Europe), Lukas Bernhard (Ruhr University Bochum), Thorsten Holz (CISPA Helmholtz Center for Information Security), Ghassan Karame (Ruhr University Bochum), Lucas Davi (University of Duisburg-Essen)
Fuzzing SGX Enclaves via Host Program Mutations
Arslan Khan (Purdue University), Muqi Zou (Purdue University), Kyungtae Kim (Purdue University), Dongyan Xu (Purdue University), Antonio Bianchi (Purdue University), Dave Jing Tian (Purdue University)
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
Trevor Dunlap (North Carolina State University), Seaver Thorn (North Carolina State University), William Enck (North Carolina State University), Bradley Reaves (North Carolina State University)
Code Vulnerability Detection via Signal-Aware AI
Sahil Suneja (IBM Research), Yufan Zhuang (UCSD), Yunhui Zheng (IBM Research), Jim Laredo (IBM Research), Alessandro Morari (IBM Research), Udayan Khurana (IBM Research)
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery
Tom Ganz (SAP Security Research), Philipp Rall (SAP Security Research), Martin Härterich (SAP Security Research), Konrad Rieck (Technische Universität Braunschweig)

Coffee Break

10:25 - 10:45

Session: Networks

10:45 - 12:10

Systematic Improvement of Access-Stratum Security in Mobile Networks Discovery
Rhys Miller (University of Surrey), Ioana Boureanu (University of Surrey), Steve Wesemeyer (University of Surrey), Hemant Zope (Fraunhofer Society), Zhili Sun (University of Surrey)
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives
Jonas Bushart (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for Information Security)
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
Marcin Nawrocki (Freie Universität Berlin), John Kristoff (NETSCOUT, University of Illinois at Chicago), Chris Kanich (University of Illinois at Chicago), Raphael Hiesgen (HAW Hamburg), Thomas C. Schmidt (HAW Hamburg), Matthias Wählisch (Freie Universität Berlin)
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese (University of Liechtenstein), Pavel Laskov (University of Liechtenstein), Johannes Schneider (University of Liechtenstein)
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks
Andrea Agiollo (University of Bologna), Enkeleda Bardhi (Sapienza University of Rome), Mauro Conti (University of Padua / Delft University of Technology), Riccardo Lazzeretti (Sapienza University of Rome), Eleonora Losiouk (University of Padua), Andrea Omicini (University of Bologna)

Lunch Break

12:10 - 13:15

Session: Side Channels and Transient Execution

13:15 - 14:40

SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
Nadja Ramhöj Holtryd (Chalmers University of Technology), Madhavan Manivannan (Chalmers University of Technology), Per Stenström (Chalmers University of Technology)
Principled Side-Channel Mitigation through Microarchitectural Profiling
Marton Bognar (KU Leuven), Hans Winderix (KU Leuven), Jo Van Bulck (KU Leuven), Frank Piessens (KU Leuven)
You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks
Alyssa Milburn (Intel Corporation), Ke Sun (Intel Corporation), Henrique Kawakami (Intel Corporation)
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code
Ferhat Erata (Yale University), Ruzica Piskac (Yale University), Victor Mateu (Technology Innovation Institute), Jakub Szefer (Yale University)
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake
Daniel De Almeida Braga (Université de Rennes 1, CNRS, IRISA), Mohamed Sabt (Université de Rennes 1, CNRS, IRISA), Pierre-Alain Fouque (Université de Rennes 1, CNRS, IRISA), Natalia Kulatova (Mozilla), Karthikeyan Bhargavan (INRIA)

Coffee Break

14:40 - 15:00

Session: Crypto + formal methods II

15:00 - 16:25

Recurring Contingent Service Payment
Aydin Abadi (University College London), Steven J. Murdoch (University College London), Thomas Zacharias (University of Edinburgh)
SIM: Secure Interval Membership Testing and Applications to Secure Comparison
Albert Yu (Purdue University), Donghang Lu (Purdue University), Aniket Kate (Purdue University), Hemanta K. Maji (Purdue University)
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol
Felix Günther (ETH Zurich), Marc Ilunga Tshibumbu Mukendi (Trail of Bits)
Proof-of-Learning is Currently More Broken Than You Think
Congyu Fang (University of Toronto and Vector Institute), Hengrui Jia (University of Toronto and Vector Institute), Anvith Thudi (University of Toronto and Vector Institute), Mohammad Yaghini (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (Google), Natalie Dullerud (University of Toronto and Vector Institute), Varun Chandrasekaran (Microsoft Research & University of Illinois Urbana-Champaign), Nicolas Papernot (University of Toronto and Vector Institute)
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance
Stijn Pletinckx (University of California, Santa Barbara), Thanh-Dat Nguyen (Delft University of Technology), Tobias Fiebig (Max Planck Institute for Informatics), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)

Posters

16:25 - 17:30

Gala Dinner

19:00 - 22:00

Session: Web and social media

9:00 - 10:25

Chrowned by an Extension: Exploiting the Chrome DevTools Protocol
José Miguel Moreno (Universidad Carlos III de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks/AppCensus), Juan Tapiador (Universidad Carlos III de Madrid)
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs
Daniel Kirkman (University of Edinburgh), Kami Vaniea (University of Edinburgh), Daniel W Woods (University of Edinburgh)
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice
Mohit Singhal (The University of Texas at Arlington), Chen Ling (Boston University), Pujan Paudel (Boston University), Poojitha Thota (The University of Texas at Arlington), Nihal Kumarswamy (The University of Texas at Arlington), Gianluca Stringhini (Boston University), Shirin Nilizadeh (The University of Texas at Arlington)
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting)
Jack P. K. Ma (The Chinese University of Hong Kong), Sherman S. M. Chow (The Chinese University of Hong Kong)
Been here already? Detecting Synchronized Browsers in the Wild
Pantelina Ioannou (University of Cyprus), Elias Athanasopoulos (University of Cyprus)

Coffee Break

10:25 - 10:45

Session: Crypto + formal methods III

10:45 - 12:10

Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
Nick Frymann (University of Surrey), Daniel Gardham (University of Surrey), Mark Manulis (Universität der Bundeswehr München)
Revelio: A Network-Level Attack Against the Privacy in the Lightning Network
Theo von Arx (ETH Zurich), Muoi Tran (ETH Zurich), Laurent Vanbever (ETH Zurich)
Conjunctive Searchable Symmetric Encryption from Hard Lattices
Debadrita Talapatra (IIT Kharagpur, India), Sikhar Patranabis (IBM Research, India), Debdeep Mukhopadhyay (IIT Kharagpur, India)
A Formal Model to Study CPS Safety in an Adversarial Setting
John H. Castellanos (CISPA Helmholtz Center for Information Security), Mohamed Maghenem (CNRS France), Alvaro Cardenas (UC Santa Cruz), Ricardo G. Sanfelice (UC Santa Cruz), Jianying Zhou (Singapore University of Technology and Design)
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation
Anrin Chakraborti (Duke University), Michael K. Reiter (Duke University)

Lunch Break

12:10 - 13:15

Session: Analyzing attacks on things

13:15 - 14:40

Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States
Tu Le (University of Virginia), Alan Wang (University of Virginia), Yaxing Yao (University of Maryland, Baltimore County), Yuanyuan Feng (University of Vermont), Arsalan Heydarian (University of Virginia), Norman Sadeh (Carnegie Mellon University), Yuan Tian (University of California, Los Angeles)
AoT - Attack on Things: A security analysis of IoT firmware updates
Muhammad Ibrahim (Purdue University), Andrea Continella (University of Twente), Antonio Bianchi (Purdue University)
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids
Lennart Bader (Fraunhofer FKIE & RWTH Aachen University), Martin Serror (Fraunhofer FKIE), Olav Lamberts (Fraunhofer FKIE & RWTH Aachen University), Ömer Sen (RWTH Aachen University & Fraunhofer FIT), Dennis van der Velde (Fraunhofer FIT), Immanuel Hacker (RWTH Aachen University & Fraunhofer FIT), Julian Filter (RWTH Aachen University), Elmar Padilla (Fraunhofer FKIE), Martin Henze (RWTH Aachen University & Fraunhofer FKIE)
SoK: SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Yuan Xu (Nanyang Technological University), Xingshuo Han (Nanyang Technological University), Gelei Deng (Nanyang Technological University), Jiwei Li (Zhejiang University), Yang Liu (Nanyang Technological University), Tianwei Zhang (Nanyang Technological University)
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs
Darion Cassel (Carnegie Mellon University), Limin Jia (Carnegie Mellon University), Wai Tuck Wong (Singapore Management University)

Coffee Break

14:40 - 15:00

Session: Trusted computing and defenses

15:00 - 16:25

faulTPM: Exposing AMD fTPMs’ Deepest Secrets
Hans Niklas Jacob (Technische Universität Berlin), Christian Werling (Technische Universität Berlin), Robert Buhren (Technische Universität Berlin), Jean-Pierre Seifert (Technische Universität Berlin)
CHERI-TrEE: Flexible enclaves on capability machines
Thomas Van Strydonck (KU Leuven), Job Noorman (KU Leuven), Jennifer Jackson (University of Birmingham), Leonardo Alves Dias (University of Birmingham), Robin Vanderstraeten (Vrije Universiteit Brussel), David Oswald (University of Birmingham), Frank Piessens (KU Leuven), Dominique Devriese (KU Leuven)
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities
Muhammad Ahsan (Virginia Commonwealth University), Muhammad Haris Rais (Virginia Commonwealth University), Irfan Ahmed (Virginia Commonwealth University)
Watermarking Graph Neural Networks based on Backdoor Attacks
Jing Xu (Delft University of Technology), Stefanos Koffas (Delft University of Technology), Oguzhan Ersoy (Radboud University), Stjepan Picek (Radboud University)

Closing

16:30

Please refer to the workshop websites for the programs. Directions to the venue can be found here.

Physical presenters will be recorded during the conference and recordings will be available on the conference website. Please note that it is not possible to grant a slot during the session to remote presenters. Therefore, we ask remote presenters to send us a video of their presentation one week before the conference. These videos will be available on the conference website from the beginning of the conference. Further information on video recording for remote presenters will be announced shortly.