[Overview] [Day 1] [Day 2] [Day 3]

December 14, 2020

All times are UTC. To convert to your time zone, click [here].
All presentations can be found [here].

11:00 – 11:15 Conference Opening

11:15 – 12:00 Session 1: Best Papers

An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes
Daniel Kales and Greg Zaverucha
[presentation] [slides]

Energy Analysis of Lightweight AEAD Circuits
Andrea Caforio, Fatih Balli and Subhadeep Banik
[presentation]

Cross-Site Search Attacks: Unauthorized Queries over Private Data
Bar Meyuhas, Nethanel Gelernter and Amir Herzberg
[presentation]

12:00 – 12:15 Break

12:15 – 13:15 Session 2: Cybersecurity

Stronger Targeted Poisoning Attacks Against Malware Detection
Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji and Shinsaku Kiyomoto
[presentation]

STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
Saurabh Kumar, Debadatta Mishra, Biswabandan Panda and Sandeep K. Shukla
[presentation] [slides]

HMAC and “Secure Preferences”: Revisiting Chromium-based Browsers Security
Pablo Picazo-Sanchez, Gerardo Schneider and Andrei Sabelfeld
[presentation]

Detecting Word Based DGA Domains Using Ensemble Models
P.V. Sai Charan, Sandeep K. Shukla and P. Mohan Anand
[presentation] [slides]

13:15 – 14:00 Lunch break

14:00 – 15:00 Session 3: Credentials

Distance-Bounding, Privacy-Preserving Attribute-based Credentials
Daniel Bosk, Simon Bouget and Sonja Buchegger
[presentation]

Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
Ruthu Hulikal Rooparaghunath, T.S. Harikrishnan and Debayan Gupta
[presentation]

Provably Secure Scalable Distributed Authentication for Clouds
Andrea Huszti and Norbert Oláh
[presentation]

Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann and Rudi Wolf
[presentation]

15:00 – 15:15 Break

15:15 – 16:15 Keynote 1

Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning
Zhiyun Qian
[abstract]

16:15 – 16:30 Break

16:30 – 17:30 Tutorial Part 1

Toward Secure Public Key Infrastructure (PKI): Fixing the Foundations of Applied Cryptography
Amir Herzberg
[abstract]

[Overview] [Day 1] [Day 2] [Day 3]