[Overview] [Day 1] [Day 2] [Day 3]
December 14, 2020
All times are UTC. To convert to your time zone, click [here].
All presentations can be found [here].
11:00 – 11:15 Conference Opening
11:15 – 12:00 Session 1: Best Papers
Session Chair: Haya Shulman and Serge Vaudenay
An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales and Greg Zaverucha
[presentation] [slides]
Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio, Fatih Balli and Subhadeep Banik
[presentation]
Cross-Site Search Attacks: Unauthorized Queries over Private Data
Bar Meyuhas, Nethanel Gelernter and Amir Herzberg
[presentation]
12:00 – 12:15 Break
12:15 – 13:15 Session 2: Cybersecurity
Session Chair: Vizár Damian
Stronger Targeted Poisoning Attacks Against Malware Detection
Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji and Shinsaku Kiyomoto
[presentation]
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
Saurabh Kumar, Debadatta Mishra, Biswabandan Panda and Sandeep K. Shukla
[presentation] [slides]
HMAC and “Secure Preferences”: Revisiting Chromium-based Browsers Security
Pablo Picazo-Sanchez, Gerardo Schneider and Andrei Sabelfeld
[presentation]
Detecting Word Based DGA Domains Using Ensemble Models
P.V. Sai Charan, Sandeep K. Shukla and P. Mohan Anand
[presentation] [slides]
13:15 – 14:00 Lunch break
14:00 – 15:00 Session 3: Credentials
Session Chair: Sherman Chow
Distance-Bounding, Privacy-Preserving Attribute-based Credentials
Daniel Bosk, Simon Bouget and Sonja Buchegger
[presentation]
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
Ruthu Hulikal Rooparaghunath, T.S. Harikrishnan and Debayan Gupta
[presentation]
Provably Secure Scalable Distributed Authentication for Clouds
Andrea Huszti and Norbert Oláh
[presentation]
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann and Rudi Wolf
[presentation]
15:00 – 15:15 Break
15:15 – 16:15 Keynote 1
Session Chair: Haya Shulman
Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning
Zhiyun Qian
[abstract] [presentation]
16:15 – 16:30 Break
16:30 – 17:30 Tutorial Part 1
Toward Secure Public Key Infrastructure (PKI): Fixing the Foundations of Applied Cryptography
Introduction, X.509 and constraints
Amir Herzberg
[abstract] [slides] [presentation]