beandeau>

Program > Conference Schedule

   IMG_9973.png

 

 

The proceedings of the conference will be shortly available at :

 

 

MAP 

 

 

Auditorium J.Herbrand HERE

Amphitheatre Schwartz HERE 

Auditorium Marthe Condat HERE 

 

The program at a glance :

       
September 22      
From 08:00 Registration  Auditorium Marthe Condat  
8:45 - 9:00 Welcome statement   Auditorium Marthe Condat  
9:00 - 10:00 Keynote :"Out of sight, out of mind: the plumbing problem in Cybersecurity", Carlos Aguilar (SandBoxAQ) Auditorium Marthe Condat
10:00 - 10:20 Coffee Break    
10:20 - 12:00

Track 1 (Privacy 1)

Auditorium Marthe Condat

Session Chair: Ken Barker

The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. Zexi Yao, Natasa Krco, Georgi Ganev and Yves-Alexandre de Montjoye.
RIPOST: Two-Phase Private Decomposition for Multidimensional Data. Ala Eddine Laouir and Abdessamad Imine.
PriSM: A Privacy-friendly Support vector Machine. Michele Barbato, Alberto Ceselli, Sabrina De Capitani di Vimercati, Sara Foresti and Pierangela Samarati.
Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr and Rainer Malaka

Track 2 (Attack Analysis 1)

Amphithéâtre Schwarz

Session Chair: Edgar Weippi

Zero-Click SnailLoad: From Minimal to No User Interaction. Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss and Johanna Ullrich.
AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR. Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo and Jiadi Yu.
DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. Fuqi Qi, Haichang Gao, Boling Li, Guangyu He, Jiacheng Luo and Yuhong Zhang.
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. Fugeng Huang, Jiahong Yang, Haibo Cheng, Wenting Li and Ping Wang.

Track 3 (Crypto 1)

Amphithéâtre Jacques Herbrand

Session Chair: Ximing Fu

Extending Groth16 for Disjunctive Statements. Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei and Liuyu Yang
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig and Mehdi Tibouchi.
Code Encryption with Intel TME-MK for Control-Flow Enforcement. Martin Unterguggenberger, Lukas Lamster, Mathias Oberhuber, Simon Scherer and Stefan Mangard.
Efficient Homomorphic Evaluation for Non-Polynomial Functions. Changhong Xu and Honggang Hu.

       
12:00 - 13:30 Lunch    
13:30 - 15:10

Track 4 (Privacy 2 )

Auditorium Marthe Condat

Session Chair:  Emiliia Geloczi

 

Membership Privacy Evaluation in Deep Spiking Neural Networks. Jiaxin Li, Gorka Abad, Stjepan Picek and Mauro Conti.
Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. Xiaoyang Wei, Shuai Han and Shengli Liu.
Functional Credentials: a Practical Construction for the European Digital Identity. Giovanni Bartolomeo.
Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. Yansen Xin, Rui Zhang, Zhenglin Fan and Ze Jia

Track 5 (Detection 1)

Amphithéâtre Schwarz

Session Chair: Hyungon Moon

Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. Hyunsik Na, Hajun Kim, Dooshik Yoon and Daeseon Choi.
WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. Lukas Lamster, Fabian Rauscher, Martin Unterguggenberger and Stefan Mangard.
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano De Cristofaro and Christophe Kiennert.
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. Mahmoud Ghorbel, Selina Cheggour, Valeria Loscri, Youcef Imine, Hamza Ouarnoughi and Smail Niar.

Track 6 (Crypto 2)

Amphithéâtre Jacques Herbrand

Session Chair: Hyeonbum Lee

Formalisation of KZG commitment schemes in EasyCrypt. Palak Palak and Thomas Haines.
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. Remma Kumazaki and Yuichi Kaji.
SafePath: Encryption-less On-demand Input Path Protection For Mobile Devices. Xin Zhang and Yifan Zhang.
Polylogarithmic Polynomial Commitment Scheme over Galois Rings. Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang.

       
15:10 - 15:40 Coffee Break    
15:40 - 17:20

Track 7 (Attack Analysis 2)

Auditorium Marthe Condat

Session Chair: Cédrick Austa

LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. Luis Ibanez-Lissen, Lorena González-Manzano, Jose Maria de Fuentes, Nicolas Anciaux and Joaquin Garcia-Alfaro.
Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. Taehun Kim, Hyerean Jang and Youngjoo Shin.
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. Martin Heckel, Hannes Weissteiner, Florian Adamsky and Daniel Gruss.
T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur and Youngjoo Shin

Track 8 (Privacy 3)

Amphithéâtre Schwarz

Session Chair: Octavio Perez Kempner

Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. Terumi Yaguchi and Hiroaki Kikuchi.
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo and Erman Ayday.
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. Berkay Kemal Balioglu, Alireza Khodaie and M. Emre Gursoy.
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. Youcef Korichi, Nadia Tawbi, Josee Desharnais and Sebastien Gambs.

Track 9 (Crypto 3)

Amphithéâtre Jacques Herbrand

Session Chair: Yohei Watanabe

UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo and Doowon Kim.
Efficient Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. Bingxue Bian, Jianfeng Wang and Qiaoer Xu.
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. Yifan Yang, Kexin Zhang, Peng Xu, Zhaojun Lu, Wei Wang, Weiqi Wang and Kaitai Liang.
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. Qinyi Li and Xavier Boyen.

 
17:20 - 17:30 Conference Information   Conference Information  Conference Information 

 

18:30

 

Welcome Reception at the City-Hall of Toulouse Please note that a security check will be carried out at the entrance to the town hall. Unauthorized items will be thrown away (sharp objects, flammable products, water bottles, etc.).

 
September 23      
8:30 - 9:00 Registration  Auditorium Marthe Condat   
9:00 - 10:00 Keynote : "Covert Social Influence Operations: Past, Present, and Future", V.S. Subrahmanian (Northwestern University Auditorium Marthe Condat
10:00 - 10:30 Coffee Break    
10:30 - 12:10

Track 10 (Blockchain Secured Systems)

Auditorium Marthe Condat

Session Chair: Hai Dong

Efficient and Secure Sleepy Model for BFT Consensus. Pengkun Ren, Hai Dong, Zahir Tari and Pengcheng Zhang.
Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. Wanying Zeng, Lijia Xie and Xiao Zhang.
The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy and Shamik Sural.
Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski and Gabriel Wechta.

Track 11 (Vulnerability Assessment)

Amphithéâtre Schwarz

Session Chair: Hugo Kermabon

Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. Cédrick Austa, Jan Tobias Mühlberg and Jean-Michel Dricot.
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. Arturo Hernández Sánchez and Santiago Escobar.
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. Sajal Halder, Muhammad Ejaz Ahmed and Seyit Camtepe.
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang and Nenghai Yu.

Track 12 (Crypto 4)

Amphithéâtre Jacques Herbrand

Session Chair: Kaitai Liang

Tetris! Traceable Extendable Threshold Ring Signatures and More. Gennaro Avitabile, Vincenzo Botta and Dario Fiore.
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh and Debdeep Mukhopadhyay.
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. Chongyu Long, Yuewu Wang, Lingguang Lei, Haoyang Xing and Jiwu Jing.
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. Yan Shao, Yuejun Liu, Yongbin Zhou and Mingyao Shao.

       
12:10 - 14:00 Lunch    
14:00 - 15:40

Track 13 (AI Security 1)

Auditorium Marthe Condat

Session Chair: Gorka Abad

Towards Preventing Free-riders in AI as a Service. Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob Schuldt and Satoshi Yasuda.
Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. Matthew Reaney, Kieran Mclaughlin and Sandra Scott-Hayward
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou and Wenjing Lou.
StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models. Shehel Yoosuf, Temoor Ali, Ahmed Lekssays, Mashael Al-Sabah and Issa Khalil.

Track 14 (Detection 2)

Amphithéâtre Schwarz

Session Chair: Nanda Rani

Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. Hugo Breniaux and Djedjiga Mouheb.
TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. Omar Anser, Jérôme François, Isabelle Chrisment and Daishi Kondo.
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation.
Jiali Xu, Shuo Wang, Valéria Loscrì, Alessandro Brighente, Mauro Conti and Romain Rouvoy.
GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Zonghu Zhang, Wenting Li, Chenbin Zhang, Meng Ma and Ping Wang.

Track 15 (Mitigation)

Amphithéâtre Jacques Herbrand

Session chair:  Jan Tobias Mühlberg 

CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya and Suryadipta Majumdar.
Verifying DRAM Addressing in Software. Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher and Daniel Gruss.
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. Emiliia Geloczi, Stefan Katzenbeisser and Nico Mexis.
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. Eddie Billoir, Romain Laborde, Daniele Canavese, Yves Rutschle, Ahmad Samer Wazan and Abdelmalek Benzekri.

       
15:40 - 16:10 Coffee Break    
16:10 - 17:50

Track 16 (AI security 2)

Auditorium Marthe Condat

Session Chair:  Luis Lissen

SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni and Rongxing Lu.
On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. Kerui Wu, Ka-Ho Chow, Wenqi Wei and Lei Yu.
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Francesco Marchiori, Marco Alecci, Luca Pajola and Mauro Conti.
Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. Dyna Soumhane Ouchebara and Stéphane Dupont.

Track 17 (Protection)

Amphithéâtre Schwarz

Session Chair: Junbeom Hur 

Formally-verified Security against Forgery of Remote Attestation using SSProve. Sara Zain, Jannik Mähn, Stefan Köpsell and Sebastian Ertel.
Trigger-Based Fragile Model Watermarking for Image Transformation Networks. Preston Robinette, Thuy Dung Nguyen, Samuel Sasaki and Taylor T Johnson.
Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. Sarat Chandra Prasad Gingupalli.
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. Ankit Gangwal, Mauro Conti and Tommaso Pauselli.

Track 18 (Attack Analysis 3)

Amphithéâtre Jacques Herbrand

Session Chair: Florian Adamsky 

Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixun Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang and Qingfeng Pan.
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. Takumi Namiki, Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe.
NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. Amit Pravin Choudhari, Shorya Kumar and Christian Rossow.
Analysis of input-output mappings in coinjoin transactions with arbitrary values. Jiri Gavenda, Petr Svenda, Stanislav Bobon and Vladimir Sedlacek.

 
17:50 - 18:00 Conference Information  Conference Information  Conference Information
19:30 Gala Dinner at Hotel Dieu    
September 24      
08:30 - 9:00 Registration   Auditorium Marthe Condat  
9:00 - 10:00 Keynote : "Data Privacy and Security in Distributed Collaborative Scenarios", Pierangela Samarati (Universita degli Studi di Milano)  Auditorium Marthe Condat
10:00 - 10:30 Coffee Break    
10:30 - 12:10

Track 19 (Security Protocols 1)

Auditorium Marthe Condat

Session Chair:  Sara Zain

Formal Security Analysis of DNSSEC+. Ali Sadeghi Jahromi, Abdelrahman Abdou and Paul van Oorschot.
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. Aditya Damodaran, Simon Rastikian, Peter Roenne and P. Y. A. Ryan.
Breaking verifiability and vote privacy in CHVote. Veronique Cortier, Alexandre Debant and Pierrick Gaudry.
Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang and Chuanyi Liu.

Track 20 (Access and Information Flow Control)

Amphithéâtre Schwarz

Session Chair : Emiliia Geloczi

BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. Howard Halim, Eyasu Getahun Chekole, Daniel Reijsbergen and Jianying Zhou.
An Efficient Security-enhanced Accountable Access Control for Named Data Networking. Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang and Robert Deng
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. Silei Ren, Coşku Acay and Andrew C. Myers.
Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. Minu Chung and Hyungon Moon



Track 21 (Security Protocols 2)

Amphithéâtre Jacques Herbrand

Session Chair:  Fabio De Gaspari

Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. Baiyang Li, Zhu Yujia, Yuedong Zhang, Qingyun Liu and Li Guo.
Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. Koki Hamada.
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee.
VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. Utku Tefek, Ertem Esiner, Felix Kottmann and Deming Chen.

       
12:10 - 14:00 Lunch    
14:00 - 15:15

Track 22 (Software Testing 2)

Auditorium Marthe Condat

Session Chair: Joaquin Garcia-Alfaro

QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. Kian Kai Ang and Damith C. Ranasinghe.
LibAFL*: Fast and State-aware Protocol Fuzzing.
Cristian Daniele, Timme Bethe, Marcello Maugeri, Andrea Continella and Erik Poll.
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. Weihua Jiao, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang and Fei Cao.

Track 23 (Software Testing 1)

Amphithéâtre Schwarz

Session Chair: Xiao Xi

NLSaber : Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. Lin Ma, Xingwei Lin, Ziming Zhang and Yajin Zhou.
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, Platon Kotzias, Juan Caballero and Davide Balzarotti.
High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Chuan Chen and Qing Li.

Track 24 (Attack Analysis 4)

Amphithéâtre Jacques Herbrand

Session Chair: Gregory Blanc

Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. Javier Parada, Cristina Alcaraz, Javier Lopez, Juan Caubet and Rodrigo Roman.
Efficient End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu and Cheng Hong.
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti and Roberto Di Pietro.

       
15:15 - 15:45 Coffee Break    
15:45 - 17:00

Track 25 (Post-Quantum)

Auditorium Marthe Condat

Session Chair:  Eyasu Getahun Chekole

A post-quantum Distributed OPRF from the Legendre PRF. Novak Kaluderovic, Nan Cheng and Katerina Mitrokotsa.
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. Théophile Brézot, Chloé Hébant, Paola de Perthuis and David Pointcheval.
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. Qijia Fan, Chenhao Bao, Xuanyu Shi, Shuai Han and Shengli Liu.

Track 26 (AI Security 3)

Amphithéâtre Schwarz

Session Chair: Philippe Owzarski

Time-Distributed Backdoor Attacks on Federated Spiking Learning. Gorka Abad, Stjepan Picek and Aitor Urbieta.
How Dataset Diversity Affects Generalization in ML-based NIDS.
Benoit Nougnanke, Gregory Blanc and Thomas Robert.

Track 27 (Privacy 4)

Amphithéâtre Jacques Herbrand

Session Chair: Hiroaki Kikuchi

Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, Zhechen Li, Min Zhang and Dengguo Feng.
Fine-grained, privacy-augmenting LI-compliance in the LAKE standard. Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon and Mališa Vučinić.

 
17:00-17:20 Conference Closing Remarks (awards, announcements and workshops information) - Auditorium Marthe Condat

 

 

Loading... Loading...