Monday (November 11th, 2019) — Pre-Conference Workshops
Tuesday (November 12th, 2019) — CCS Main Conference
Wednesday (November 13th, 2019) — CCS Main Conference
Thursday (November 14th, 2019) — CCS Main Conference
Friday (November 15th, 2019) — Post-Conference Workshops

Pre-Conference Workshops on Monday, November 11th, 2019 (07:30-17:30)

2019 Cloud Computing Security Workshop
Room: Blenheim

5th Workshop on Theory and Practice of Differential Privacy
Room: Buckingham & Kensington

Theory of Implementation Security Workshop
Room: Thames – Waterloo & Tower

6th ACM Workshop on Moving Target Defense
Room: Windsor – Lancaster

7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
Room: Westminster

18th Workshop on Privacy in the Electronic Society
Room: Windsor – York

ACM Workshop on Cyber-Physical Systems Security & Privacy
Room: Park

5th Security Standardisation Research Workshop
Room: Thames – Chelsea & Richmond
07:30-09:00 Breakfast (Room: Monarch) & Registration (Room: West Wing Foyer)
10:00-10:45 Coffee Break
12:00-14:00 Lunch Break (Room: Monarch)
15:00-15:45 Coffee Break
17:30-18:00 Break
18:00-20:00 CCS Women’s Networking Reception (Room: EDG Bar Library)

CCS Main Conference on Tuesday, November 12th, 2019

Kings Balmoral Kings Sandringham Windsor Blenheim Buckingham & Kensington
07:30-9:00 Breakfast (Room: Monarch) & Registration (Room: West Wing Foyer)
09:00-9:15 Chairs’ Welcome (Room: Kings)
09:15-10:30 Keynote: Ingrid Verbauwhede, The Need for Hardware Roots of Trust (Room: Kings)
Session chair: Jonathan Katz, George Mason University
10:30-11:00 Coffee Break
11:00-12:00 1A: Attack I 1B: Cryptographic Primitives 1C: Cloud Security I 1D: Forensics 1E: Privacy I
Session chair: Wenyuan Xu, Zhejiang University Session chair: Dario Fiore, IMDEA Software Institute Session chair: Zhiqiang Lin, Ohio State University Session chair: Omar Haider Chowdhury, The University of Iowa Session chair: Ben Stock, CISPA Helmholtz Center for Information Security
1 Trillion Dollar Refund – How To Spoof PDF Signatures
Vladislav Mladenov (Ruhr University Bochum, Chair for Network and Data Security);Christian Mainka (Ruhr University Bochum, Chair for Network and Data Security);Karsten Meyer zu Selhausen (Hackmanit GmbH);Martin Grothe (Ruhr University Bochum, Chair for Network and Data Security);Jörg Schwenk (Ruhr University Bochum, Chair for Network and Data Security)
Omniring: Scaling Up Private Payments Without Trusted Setup — Formal Foundations and a Construction of Ring Confidential Transactions with Log-size Proofs
Russell W. F. Lai (Friedrich Alexander University Erlangen-Nuremberg);Viktoria Ronge (Friedrich Alexander University Erlangen-Nuremberg);Tim Ruffing (Blockstream);Dominique Schröder (Friedrich Alexander University Erlangen-Nuremberg);Sri Aravinda Krishnan Thyagarajan (Friedrich Alexander University Erlangen-Nuremberg);Jiafan Wang (Chinese University of Hong Kong)
A Machine-Checked Proof of Security for AWS Key Management Service
José Bacelar Almeida (University of Minho and INESC TEC);Manuel Barbosa (University of Porto (FCUP) and INESC TEC);Gilles Barthe (MPI-SP and IMDEA Software Institute);Matthew Campagna (Amazon Web Services);Ernie Cohen (Amazon Web Services);Benjamin Gregoire (INRIA Sophia Antipolis);Vitor Pereira (University of Porto (FCUP) and INESC TEC);Bernardo Portela (University of Porto (FCUP) and INESC TEC);Pierre-Yves Strub (École Polytechnique);Serdar Tasiran (Amazon Web Services)
The Next 700 Policy Miners: A Universal Method for Building Policy Miners
Carlos Cotrini (ETH Zurich);Luca Corinzia (ETH Zurich);Thilo Weghorn (ETH Zurich);David Basin (ETH Zurich)
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
Hooman Mohajeri Moghaddam (Princeton University);Gunes Acar (Princeton University);Arunesh Mathur (Princeton University);Danny Y. Huang (Princeton University);Ben Burgess (Princeton University);Nick Feamster (Princeton University);Edward Felten (Princeton University);Prateek Mittal (Princeton University);Arvind Narayanan (Princeton University)
Practical Decryption exFiltration: Breaking PDF Encryption
Jens Müller (Ruhr University Bochum);Fabian Ising (Münster University of Applied Sciences);Vladislav Mladenov (Ruhr University Bochum);Christian Mainka (Ruhr University Bochum);Sebastian Schinzel (Münster University of Applied Sciences);Jörg Schwenk (Ruhr University Bochum)
WI is not Enough: Zero-Knowledge Contingent (Service) Payments Revisited
Georg Fuchsbauer (Inria and Ecole normale superieure)
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume Hiding for Multi-Maps via Hashing
Sarvar Patel (Google);Giuseppe Persiano (Universita’ di Salerno and Google);Kevin Yeo (Google);Moti Yung (Google)
Towards Continuous Access Control Validation and Forensics
Chengcheng Xiang (University of California San Diego);Yudong Wu (University of California San Diego);Bingyu Shen (University of California San Diego);Mingyao Shen (University of California San Diego);Tianyin Xu (University of Illinois Urbana-Champaign);Yuanyuan Zhou (University of California San Diego);Cindy Moore (University of California San Diego);Xinxin Jin (Whova, Inc.);Tianwei Sheng (Whova, Inc.)
Oh, the Places You’ve Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing
Ben Weinshel (University of Chicago);Miranda Wei (University of Chicago);Mainack Mondal (IIT Kharagpur / University of Chicago);Euirim Choi (University of Chicago);Shawn Shan (University of Chicago);Claire Dolin (University of Chicago);Michelle L. Mazurek (University of Maryland);Blase Ur (University of Chicago)
12:00-13:30 Lunch Break (Room: Monarch)
13:30-15:30 2A: Side Channels I 2B: ML Security I 2C: Secure Computing I 2D: Encryption (Searchable, Updatable, Homomorphic, etc.) 2E: Internet Security
Session chair: Michael Franz, University of California, Irvine Session chair: Yang Zhang, CISPA Helmholtz Center for Information Security Session chair: Yan Huang, Indiana University Bloomington Session chair: Joshua Schiffman, HP Labs, HP Inc. Session chair: Paul Pearce, Georgia Tech
Page Cache Attacks
Daniel Gruss (Graz University of Technology);Erik Kraft (Graz University of Technology);Trishita Tiwari (Boston University);Michael Schwarz (Graz University of Technology);Ari Trachtenberg (Boston University);Jason Hennessey (NetApp);Alex Ionescu (CrowdStrike);Anders Fogh (Intel Corporation)
Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment
Ziqi Yang (National University of Singapore);Jiyi Zhang (National University of Singapore);Ee-Chien Chang (National University of Singapore);Zhenkai Liang (National University of Singapore)
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
Elette Boyle (IDC Herzliya);Geoffroy Couteau (Karlsruhe Institute of Technology);Niv Gilboa (Ben-Gurion University of the Negev);Yuval Ishai (Technion);Lisa Kohl (Karlsruhe Institute of Technology);Peter Rindal (Visa Research);Peter Scholl (Aarhus University)
Encrypted Databases: New Volume Attacks against Range Queries
Zichen Gui (University of Bristol);Oliver Johnson (University of Bristol);Bogdan Warinschi (University of Bristol)
SICO: Surgical Interception Attacks by Manipulating BGP Communities
Henry Birge-Lee (Princeton University);Liang Wang (Princeton University);Jennifer Rexford (Princeton University);Prateek Mittal (Princeton University)
Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm’s TrustZone
Keegan Ryan (NCC Group);
Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song (Princeton University);Reza Shokri (National University of Singapore (NUS));Prateek Mittal (Princeton University)
Endemic Oblivious Transfer
Peter Rindal (Visa Research);Daniel Masny (Visa Research)
Updatable Oblivious Key Management for Storage Systems
Stanislaw Jarecki (University of California, Irvine);Hugo Krawczyk (Algorand Foundation);Jason Resch (Independent)
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking
H.L.J. Bijmans (Delft University of Technology);T.M. Booij (Delft University of Technology);C. Doerr (Delft University of Technology)
VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies
Pengfei Qiu (Research Institute of Information Technology & BNRist, Tsinghua University, Beijing, China);Yongqiang Lyu (Research Institute of Information Technology & BNRist, Tsinghua University, Beijing, China);Dongsheng Wang (Research Institute of Information Technology & BNRist, Tsinghua University, Beijing, China);Gang Qu (Department of Electrical and Computer Engineering, University of Maryland, College Park, Maryland, USA)
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
Jinyuan Jia (Duke University);Ahmed Salem (CISPA Helmholtz Center for Information Security);Michael Backes (CISPA Helmholtz Center for Information Security);Yang Zhang (CISPA Helmholtz Center for Information Security);Neil Zhenqiang Gong (Duke University)
LevioSA: Lightweight Secure Arithmetic Computation
Carmit Hazay (Bar-Ilan University);Yuval Ishai (Technion);Antonio Marcedone (Cornell-Tech);Muthu Venkitasubramaniam (University of Rochester)
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference
Hao Chen (MIcrosoft Research);Wei Dai (Microsoft Research);Miran Kim (University of Texas, Health Science Center at Houston);Yongsoo Song (Microsoft Research)
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
Matthew Luckie (University of Waikato);Robert Beverly (Naval Postgraduate School);Ryan Koga (CAIDA / UC San Diego);Ken Keys (CAIDA / UC San Diego);Joshua Kroll (UC Berkeley School of Information);kc claffy (CAIDA / UC San Diego)
Principled Unearthing of TCP Side Channel Vulnerabilities
Yue Cao (University of California, Riverside);Zhongjie Wang (University of California, Riverside);Zhiyun Qian (University of California, Riverside);Chengyu Song (University of California, Riverside);Srikanth Krishnamurthy (University of California, Riverside);Paul Yu (Army Research Laboratory)
Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks
Kenneth Co (Imperial College London); Luis Muñoz-González (Imperial College London); Sixte de Maupeou (Imperial College London); Emil C. Lupu (Imperial College London)
Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE
Hao Chen (Microsoft Research);Ilaria Chillotti (KU Leuven);Ling Ren (VMware Research)
Traceback for End-to-End Encrypted Messaging
Nirvan Tyagi (Cornell University);Ian Miers (Cornell Tech; University of Maryland);Thomas Ristenpart (Cornell Tech)
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
Sazzadur Rahaman (Virginia Tech), Gang Wang (University of Illinois at Urbana-Champaign), Daphne Yao (Virginia Tech)
15:30-16:00 Coffee Break
16:00-17:30 3A: Fuzzing: Methods and Applications 3B: Blockchain I 3C: Secure Computing II 3D: Formal Analysis I 3E: Privacy II
Session chair: Venkat Venkatakrishnan, University of Illinois at Chicago Session chair: Andrew Miller, University of Illinois at Urbana-Champaign Session chair: Nick Hopper, University of Minnesota Session chair: Carl Gunter, University of Illinois at Urbana-Champaign Session chair: Ilya Mironov, Facebook Research
Matryoshka: fuzzing deeply nested branches
Peng Chen (ByteDance AI lab);Jianzhong Liu (ShanghaiTech University);Hao Chen (University of California, Davis)
HyperService: Interoperability and Programmability across Heterogeneous Blockchains
Zhuotao Liu (UIUC & Google);Yangxi Xiang (Beijing University of Posts and Telecommunications);Jian Shi (Case Western Reserve University);Peng Gao (University of California, Berkeley);Haoyu Wang (Beijing University of Posts and Telecommunications);Xusheng Xiao (Case Western Reserve University);Bihan Wen (Nanyang Technological University);Yih-Chun Hu (UIUC)
Securely Sampling Biased Coins with Applications to Differential Privacy
Jeffrey Champion (Northeastern University);Abhi Shelat (Northeastern University);Jonathan Ullman (Northeastern University)
A Formal Treatment of Deterministic Wallets
Poulami Das (Technische Universität Darmstadt, Germany);Sebastian Faust (Technische Universität Darmstadt, Germany);Julian Loss (Ruhr-Universität Bochum, Germany)
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy
Haipei Sun (Qatar Computing Research Institute);Xiaokui Xiao (National University of Singapore);Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU);Yin Yang (College of Science and Engineering, Hamad Bin Khalifa University);Zhan Qin (ZheJiang University);Hui (Wendy) Wang (Stevens Institute of Technology);Ting Yu (Qatar Computing Research Institute)
Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing
Mingi Cho (Yonsei University);Seoyoung Kim (Yonsei University);Taekyoung Kwon (Yonsei University)
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol
Muhammed F. Esgin (Monash University and Data61, CSIRO);Raymond K. Zhao (Monash University);Ron Steinfeld (Monash University);Joseph K. Liu (Monash University);Dongxi Liu (Data61, CSIRO)
Stormy: Statistics in Tor by Measuring Securely
Ryan Wails (U.S. Naval Research Laboratory); Aaron Johnson (U.S. Naval Research Laboratory); Daniel Starin (Perspecta Labs); Arkady Yerukhimovich (George Washington University); S. Dov Gordon (George Mason University)
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol
Syed Rafiul Hussain (Purdue University);Mitziu Echeverria (The University of Iowa);Imtiaz Karim (Purdue University);Omar Chowdhury (The University of Iowa);Elisa Bertino (Purdue University)
How to accurately and privately identify anomalies
Hafiz Asif (Rutgers University);Periklis Papakonstantinou (Rutgers University);Jaideep Vaidya (Rutgers University)
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts
Jingxuan He (ETH Zurich);Mislav Balunovic (ETH Zurich);Nodar Ambroladze (ETH Zurich);Petar Tsankov (ETH Zurich);Martin Vechev (ETH Zurich)
Prism: Deconstructing the Blockchain to Approach Physical Limits
Vivek Bagaria (Stanford University);Sreeram Kannan (University of Washington Seattle);David Tse (Stanford University);Giulia Fanti (Carnegie Mellon University);Pramod Viswanath (University of Illinois Urbana-Champaign)
Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations
Ruiyu Zhu (Indiana University Bloomington);Changchang Ding (Indiana University Bloomington);Yan Huang (Indiana University Bloomington)
Verified Verifiers for Verifying Elections
Thomas Haines (Norwegian University of Science and Technology);Rajev Gore (The Australian National University);Mukesh Tiwari (The Australian National University)
Differentially Private Nonparametric Hypothesis Testing
Simon Couch (Reed College);Zeki Kazan (Reed College);Kaiyan Shi (Reed College);Andrew Bray (Reed College);Adam Groce (Reed College)
17:30-18:00 Break
18:00-19:30 Poster Session I (Room: Monarch)
19:30-20:30 Business Meeting (Room: Kings Balmoral)

CCS Main Conference on Wednesday, November 13th, 2019

Kings Balmoral Kings Sandringham Windsor Blenheim Buckingham & Kensington
07:30-09:00 Breakfast (Room: Monarch) & Registration (Room: West Wing Foyer)
09:00-10:30 4A: Side Channels II 4B: Blockchain II 4C: Secure Computing III 4D: Formal Analysis II 4E: Privacy III
Session chair: Yinqian Zhang, Ohio State University Session chair: Aggelos Kiayias, University of Edinburgh Session chair: Jonathan Katz, George Mason University Session chair: Ninghui Li, Purdue University Session chair:Yang Zhang, CISPA Helmholtz Center for Information Security
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz (Graz University of Technology);Moritz Lipp (Graz University of Technology);Ahmad Moghimi (Worcester Polytechnic Institute);Jo Van Bulck (imec-DistriNet, KU Leuven);Julian Stecklina (Cyberus Technology);Thomas Prescher (Cyberus Technology);Daniel Gruss (Graz University of Technology)
Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks
Christoph Egger (Friedrich-Alexander-Universität Erlangen-Nürnberg);Pedro Moreno-Sanchez (TU Wien);Matteo Maffei (TU Wien)
A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation
Vitor Pereira (INESC TEC & DCC FC Universidade do Porto);Karim Eldefrawy (SRI International)
Exploiting Symmetries when Proving Equivalence Properties for Security Protocols
Vincent Cheval (INRIA Nancy – Grand Est);Steve Kremer (INRIA Nancy – Grand Est);Itsaka Rakotonirina (INRIA Nancy – Grand Est)
Five Years of the Right to be Forgotten
Kurt Thomas (Google);Theo Bertram (Google);Elie Bursztein (Google);Stephanie Caro (Google);Hubert Chao (Google);Rutledge Chin Feman (Google);Peter Fleischer (Google);Albin Gustafsson (Google);Jess Hemerly (Google);Chris Hibbert (Google);Luca Invernizzi (Google);Lanah Kammourieh Donnelly (Google);Jason Ketover (Google);Jay Laefer (Google);Paul Nicholas (Google);Yuan Niu (Google);Harjinder Obhi (Google);David Price (Google);Andrew Strait (Google);Al Verney (Google)
Fallout: Leaking Data on Meltdown-resistant CPUs
Claudio Canella (Graz University of Technology);Daniel Genkin (University of Michigan);Lukas Giner (Graz University of Technology);Daniel Gruss (Graz University of Technology);Moritz Lipp (Graz University of Technology);Marina Minkin (University of Michigan);Daniel Moghimi (Worcester Polytechnic Institute);Frank Piessens (KU Leuven);Michael Schwarz (Graz University of Technology);Berk Sunar (Worcester Polytechnic Institute);Jo Van Bulck (KU Leuven);Yuval Yarom (University of Adelaide and Data61)
Erlay: Efficient Transaction Relay for Bitcoin
Gleb Naumenko (University of British Columbia);Gregory Maxwell (Independent);Pieter Wuille (Blockstream);Alexandra (Sasha) Fedorova (University of British Columbia);Ivan Beschastnikh (University of British Columbia)
Practical Fully Secure Three-Party Computation via Sublinear Distributed ZK Proofs
Ariel Nof (Bar-Ilan University);Yuval Ishai (Technion and UCLA);Elette Boyle (IDC Herzliya);Niv Gilboa (BGU)
Are These Pairing Elements Correct? Automated Verification and Applications
Susan Hohenberger (Johns Hopkins University);Satyanarayana Vusirikala (University of Texas at Austin)
(Un)informed Consent: Studying GDPR Consent Notices in the Field
Christine Utz (Ruhr-Universität Bochum);Martin Degeling (Ruhr-Universität Bochum);Sascha Fahl (Ruhr-Universität Bochum);Florian Schaub (University of Michigan);Thorsten Holz (Ruhr-Universität Bochum)
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya (EPFL);Alexandra Sandulescu (IBM Zurich);Matthias Neugschwandtner (IBM Zurich);Alessandro Sorniotti (IBM Zurich);Babak Falsafi (EPFL);Mathias Payer (EPFL);Anil Kurmus (IBM Zurich)
Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System
Shang Gao (The Hong Kong Polytechnic University);Zecheng Li (The Hong Kong Polytechnic University);Zhe Peng (The Hong Kong Polytechnic University);Bin Xiao (The Hong Kong Polytechnic University);
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication
Donghang Lu (Purdue University);Thomas Yurek (UIUC);Samarth Kulshreshtha (UIUC);Rahul Govind (UIUC);Aniket Kate (Purdue University);Andrew Miller (UIUC)
Post-Collusion Security and Distance Bounding
Sjouke Mauw (SnT/CSC, University of Luxembourg);Zach Smith (CSC, University of Luxembourg);Jorge Toro-Pozo (CSC, University of Luxembourg);Rolando Trujillo-Rasua (School of Information Technology, Deakin University)
Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media
Mainack Mondal (IIT Kharagpur / University of Chicago);Günce Su Yilmaz (University of Chicago);Noah Hirsch (University of Chicago);Mohammad Taha Khan (University of Illinois at Chicago);Michael Tang (University of Chicago);Christopher Tran (University of Illinois at Chicago);Chris Kanich (University of Illinois at Chicago);Blase Ur (University of Chicago);Elena Zheleva (University of Illinois at Chicago)
10:30-11:00 Coffee Break
11:00-12:00 5A: Software Security 5B: Protocols 5C: Cloud Security II 5D: SDN Security 5E: Fingerprinting
Session chair: Hao Chen, University of California, Davis Session chair: Carmit Hazay, Bar-Ilan University Session chair: Kun Sun, George Mason University Session chair: Seungwon Shin, KAIST Session chair: Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Binary Control-Flow Trimming
Masoud Ghaffarinia (University of Texas at Dallas);Kevin Hamlen (University of Texas at Dallas)
Flexible Byzantine Fault Tolerance
Dahlia Malkhi (Calibra);Kartik Nayak (VMware Research);Ling Ren (VMware Research)
Houdini’s Escape: Breaking the Resource Rein of Linux Control Groups
Xing Gao (University of Memphis);Zhongshu Gu (IBM Research);Zhengfa Li (Independent Researcher);Hani Jamjoom (IBM Research);Cong Wang (Old Dominion University)
An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures
Eduard Marin (University of Birmingham);Nicola Bucciol (University of Padua);Mauro Conti (University of Padua);
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning
Payap Sirinam (Navaminda Kasatriyadhiraj Royal Air Force Academy);Nate Matthews (Rochester Institute of Technology);Mohammad Saidur Rahman (Rochester Institute of Technology);Matthew Wright (Rochester Institute of Technology)
Program-mandering: Quantitative Privilege Separation
Shen Liu (The Pennsylvania State University, University Park);Dongrui Zeng (The Pennsylvania State University, University Park);Yongzhe Huang (The Pennsylvania State University, University Park);Frank Capobianco (The Pennsylvania State University, University Park);Stephen McCamant (University of Minnesota, Twin Cities);Trent Jaeger (The Pennsylvania State University, University Park);Gang Tan (The Pennsylvania State University, University Park)
Distributed Vector-OLE: Improved Constructions and Implementation
Adrià Gascón (The Alan Turing Institute / University of Warwick);Mariana Raykova (Google);Leonie Reichert (Humboldt-Universität zu Berlin);Phillipp Schoppmann (Humboldt-Universität zu Berlin)
Insecure Until Proven Updated: Analyzing AMD SEV’s Remote Attestation
Robert Buhren (Technische Universität Berlin);Christian Werling (Hasso Plattner Institute, Potsdam);Jean-Pierre Seifert(Technische Universität Berlin)
Proof-Carrying Network Code
Christian Skalka (University of Vermont);John Ring (University of Vermont);David Darais (University of Vermont);Minseok Kwon (Rochester Institute of Technology);Sahil Gupta (Rochester Institute of Technology);Kyle Diller (Rochester Institute of Technology);Steffen Smolka (Cornell University);Nate Foster (Cornell University)
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU
Yushi Cheng (Zhejiang University);Xiaoyu Ji (Zhejiang University);Juchuan Zhang (Zhejiang University);Wenyuan Xu (Zhejiang University);Yi-Chao Chen (University of Texas at Austin)
12:00-13:30 Lunch Break (Room: Monarch)
13:30-15:30 6A: Biometrics Security 6B: ML Security II 6C: Secure Computing VI 6D: Cyber Threat 6E: Passwords and Accounts
Session chair: Kehuan Zhang, The Chinese University of Hong Kong Session chair: Neil Gong, Duke University Session chair: Mike Rosulek, Oregon State University Session chair: Ting Yu, Qatar Computing Research Institute Session chair: Blase Ur, University of Chicago
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms
Rahul Chatterjee (Cornell University);M. Sadegh Riazi (UCSD);Tanmoy Chowdhury (GMU);Emanuela Marasco (GMU);Farinaz Koushanfar (UCSD);Ari Juels (Jacobs Institute, Cornell Tech)
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
Nitin Agrawal (University of Oxford); Ali Shahin Shamsabadi (Queen Mary University London); Matthew Kusner (University of Oxford, The Alan Turing Institute); Adria Gascon (The Alan Turing Institute);
Transparency Logs via Append-only Authenticated Dictionaries
Alin Tomescu (MIT);Vivek Bhupatiraju (Lexington High School);Dimitrios Papadopoulos (Hong Kong University of Science and Technology);Charalampos Papamanthou (University of Maryland);Nikos Triandopoulos (Stevens Institute of Technology);Srinivas Devadas (MIT)
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise
Fucheng Liu (Institute of Information Engineering, Chinese Academy of Science);Yu Wen (Institute of Information Engineering, Chinese Academy of Sciences);Dongxue Zhang (Institute of Information Engineering, Chinese Academy of Science);Xihe Jiang (Institute of Information Engineering, Chinese Academy of Science);Xinyu Xing (The Pennsylvania State University);Dan Meng (Institute of Information Engineering, Chinese Academy of Science)
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
Moni Naor (Weizmann Institue);Benny Pinkas (Bar Ilan University);Eyal Ronen (Tel Aviv University, KU Leuven)
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics
Simon Eberz (University of Oxford);Giulio Lovisotto (University of Oxford);Kasper Rasmussen (University of Oxford);Vincent Lenders (Armasuisse);Ivan Martinovic (University of Oxford)
Quantitative Verification of Neural Networks and Its Security Applications
Teodora Baluta (National University of Singapore);Shiqi Shen (National University of Singapore);Shweta Shinde (University of California, Berkeley);Kuldeep S. Meel (National University of Singapore);Prateek Saxena (National University of Singapore)
Probabilistic Data Structures in Adversarial Environments
David Clayton (University of Florida);Christopher Patton (University of Florida);Thomas Shrimpton (University of Florida)
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi (UIC);Birhanu Eshete (University of Michigan-Dearborn);Rigel Gjomemo (UIC);V.N. Venkatakrishnan (UIC)
Protocols for Checking Compromised Credentials
Lucy Li (Cornell University);Bijeeta Pal (Cornell University);Junade Ali (Cloudflare Inc.);Nick Sullivan (Cloudflare Inc.);Rahul Chatterjee (Cornell University);Thomas Ristenpart (Cornell Tech)
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication
Jingjie Li (University of Wisconsin-Madison);Younghyun Kim (University of Wisconsin-Madison);Kassem Fawaz (University of Wisconsin-Madison)
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation
Yingqi Liu (Purdue University);Wen-Chuan Lee (Purdue University);Guanhong Tao (Purdue University);Shiqing Ma (Purdue University);Yousra Aafer (Purdue University);Xiangyu Zhang (Purdue University)
Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning
Phillipp Schoppmann (Humboldt-Universität zu Berlin);Adrià Gascón (The Alan Turing Institute, University of Warwick);Mariana Raykova (Google);Benny Pinkas (Bar Ilan University)
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
Zhenyuan LI (Zhejiang University);Qi Alfred Chen (University of California, Irvine);Chunlin Xiong (Zhejiang University);Yan Chen (Northwestern University);Tiantian Zhu (Zhejiang University of Technology);Hai Yang (MagicShield Inc)
User Account Access Graphs
Sven Hammann (ETH Zurich);Sasa Radomirovic (University of Dundee);Ralf Sasse (ETH Zurich);David Basin (ETH Zurich)
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
Chen Yan (Zhejiang University);Yan Long (Zhejiang University);Xiaoyu Ji (Zhejiang University);Wenyuan Xu (Zhejiang University)
Lifelong Anomaly Detection Through Unlearning
Min Du (University of California Berkeley);Zhi Chen (University of California Berkeley);Chang Liu (Citadel Securities);Rajvardhan Oak (University of California Berkeley);Dawn Song (University of California Berkeley)
PIEs: Public Incompressible Encodings for Decentralized Storage
Ethan Cecchetti (Cornell University);Benjamin Fisch (Stanford University);Ian Miers (Cornell Tech);Ari Juels (Jacobs Institute, Cornell Tech)
MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis
Abbas Naderi-Afooshteh (University of Virginia);Yonghwi Kwon (University of Virginia);Jack Davidson (University of Virginia);Anh Nguyen-Tuong (University of Virginia);Ali Razmjoo-Qalaei (ZDResearch);Mohammad-Reza Zamiri-Gourabi (ZDResearch)
Detecting Fake Accounts in Online Social Networks at the Time of Registrations
Dong Yuan (Tsinghua University);Yuanli Miao (Tsinghua University);Neil Zhenqiang Gong (Duke University);Zheng Yang(Tsinghua University);Qi Li (Tsinghua University);Dawn Song (UC Berkeley);Qian Wang (Wuhan University);Xiao Liang (Tencent)
15:30-16:00 Coffee Break
16:00-17:30 7A: Internet of Things 7B: Blockchain III 7C: Secure Computing V 7D: Formal Analysis III 7E: Privacy-Preserving Techniques
Session chair: Kangjie Lu, University of Minnesota Session chair: Danfeng Yao, Virginia Tech Session chair: XiaoFeng Wang, Indiana University Session chair: Matteo Maffei, TU Wien Session chair: Jonathan Katz, George Mason University
Charting the Attack Surface of Trigger-Action IoT Platforms
Qi Wang (University of Illinois at Urbana-Champaign);Pubali Datta (University of Illinois at Urbana-Champaign);Wei Yang (The University of Texas at Dallas);Si Liu (University of Illinois at Urbana-Champaign);Carl Gunter (University of Illinois at Urbana-Champaign);Adam Bates (University of Illinois at Urbana-Champaign)
Balance: Dynamic Adjustment of Cryptocurrency Deposits
Dominik Harz (Imperial College London);Lewis Gudgeon (Imperial College London);Arthur Gervais (Imperial College London);William J. Knottenbelt (Imperial College London)
Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing
Muhammad Ishaq (University of Edinburgh);Ana Milanova (Rensselaer Polytechnic Institute);Vassilis Zikas (University of Edinburgh)
Signed Cryptographic Program Verification with Typed CryptoLine
Yu-Fu Fu (Academia Sinica);Jiaxiang Liu (Academia Sinica & Shenzhen University);Xiaomu Shi (Academia Sinica & Shenzhen University);Ming-Hsien Tsai (Academia Sinica);Bow-Yaw Wang (Academia Sinica);Bo-Yin Yang (Academia Sinica)
SEEMless: Secure End-to-End Encrypted Messaging with less Trust
Melissa Chase (Microsoft Research);Apoorvaa Deshpande (Brown University);Esha Ghosh (Microsoft Research);Harjasleen Malvai (Cornell University)
Peeves: Physical Event Verification in Smart Homes
Simon Birnbach (University of Oxford);Simon Eberz (University of Oxford);Ivan Martinovic (University of Oxford)
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum
Ting Chen (University of Electronic Science and Technology of China);Yufei Zhang (University of Electronic Science and Technology of China);Zihao Li (University of Electronic Science and Technology of China);Xiapu Luo (The Hong Kong Polytechnic University);Ting Wang (Lehigh University);Rong Cao (University of Electronic Science and Technology of China);Xiuzhuo Xiao (University of Electronic Science and Technology of China);Xiaosong Zhang (University of Electronic Science and Technology of China)
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest
Jun Furukawa (NEC Israel Research Center);Yehuda Lindell (Bar-Ilan University and Unbound Tech)
Machine-Checked Proofs for Cryptographic Standards
José Bacelar Almeida (Universidade do Minho & INESC-TEC);Cécile Baritel-Ruet (Université Côte d’Azur & Inria Sophia-Antipolis);Manuel Barbosa (Universidade do Porto & INESC-TEC);Gilles Barthe (MPI-SP & IMDEA Software Institute);François Dupressoir (University of Surrey & University of Bristol);Benjamin Grégoire (Inria Sophia-Antipolis);Vincent Laporte (Inria);Tiago Oliveira (Universidade do Porto & INESC-TEC & FCUP);Alley Stoughton (Boston University);Pierre-Yves Strub (École Polytechnique)
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules
Jianting Ning (Fujian Normal University & National University of Singapore);Geong Sen Poh (Trustwave & NUS-Singtel Cyber Security Lab);Jia-Ch’ng Loh (NUS-Singtel Cyber Security Lab);Jason Chia (NUS-Singtel Cyber Security Lab);Ee-Chien Chang (National University of Singapore)
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
Chaoshun Zuo (Ohio State University);Haohuang Wen (Ohio State University);Zhiqiang Lin (Ohio State University);Yinqian Zhang (Ohio State University)
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware
Iddo Bentov (Cornell Tech);Ari Juels (Cornell Tech);Fan Zhang (Cornell Tech);Yan Ji (Cornell Tech);Phil Daian (Cornell Tech);Lorenz Breindenbach (ETH Zurich)
Fast Actively Secure Five-Party Computation with Security Beyond Abort
Megha Byali (Indian Institute of Science, Bangalore);Carmit Hazay (Bar-Ilan University, Israel);Arpita Patra (Indian Institute of Science, Bangalore);Swati Singla (Indian Institute of Science, Bangalore)
VeriSketch: Synthesizing Secure Hardware Designs with Timing-Sensitive Information Flow Properties
Armaiti Ardeshiricham (UCSD);Yoshiki Takashima (UCSD);Sicun Gao (UCSD);Ryan Kastner (UCSD)
Updatable Anonymous Credentials and Applications to Incentive Systems
Johannes Blömer (Paderborn University);Jan Bobolz (Paderborn University);Denis Diemert (Paderborn University);Fabian Eidens (Paderborn University)
17:30-17:35 Break
17:35-18:35 Panel Discussion: Scaling the Academic Security Community (Room: Sandringham)
18:35-19:00 Break
19:00-22:00 Banquet & Awards (Room: Monarch)

CCS Main Conference on Thursday, November 14th, 2019

Kings Balmoral Kings Sandringham Windsor Blenheim Buckingham & Kensington
07:30-09:00 Breakfast (Room: Monarch) & Registration (Room: West Wing Foyer)
09:00-10:30 Keynote: N. Asokan, Hardware-assisted Trusted Execution Environments — Look Back, Look Ahead (Room: Kings)
Session chair: XiaoFeng Wang, Indiana University
10:30-11:00 Coffee Break
11:00-12:00 8A: Attack II 8B: TEE I 8C: Blockchain VI 8D: Language Security 8E: Web Security
Session chair: Chao Zhang, Tsinghua University Session chair: Yuval Yarom, University of Adelaide and Datat61 Session chair: XiaoFeng Wang, Indiana University Session chair: Johannes Kinder, Bundeswehr University Munich Session chair: Giovanni Vigna, UCSB
Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters
Sean Heelan (University of Oxford);Daniel Kroening (University of Oxford);Tom Melham (University of Oxford)
SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE
Shijun Zhao (Institute of Software Chinese Academy of Sciences);Qianying Zhang (Capital Normal University Information Engineering Colleg);Qin Yu (Institute of Software Chinese Academy of Sciences);Wei Feng (Institute of Software Chinese Academy of Sciences);Dengguo Feng (Institute of Software Chinese Academy of Sciences)
zkay: Specifying and Enforcing Data Privacy in Smart Contracts
Samuel Steffen (ETH Zürich);Benjamin Bichsel (ETH Zürich);Mario Gersbach (ETH Zürich);Noa Melchior (ETH Zürich);Petar Tsankov (ETH Zürich);Martin Vechev (ETH Zürich)
Where Does It Go? Refining Indirect-Call Targets with Multi-Layer Type Analysis
Kangjie Lu (University of Minnesota); Hong Hu (GeorgiaTech);
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs
Aurore Fass (CISPA Helmholtz Center for Information Security);Michael Backes (CISPA Helmholtz Center for Information Security);Ben Stock (CISPA Helmholtz Center for Information Security)
SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel
Yueqi Chen (Pennsylvania State University);Xinyu Xing (Pennsylvania State University)
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes
Jo Van Bulck (imec-DistriNet, KU Leuven, Belgium);David Oswald (School of Computer Science, University of Birmingham, UK);Eduard Marin (School of Computer Science, University of Birmingham, UK);Abdulla Aldoseri (School of Computer Science, University of Birmingham, UK);Flavio D. Garcia (School of Computer Science, University of Birmingham, UK);Frank Piessens (imec-DistriNet, KU Leuven, Belgium)
Privacy Aspects and Subliminal Channels in Zcash
Alex Biryukov (University of Luxembourg);Daniel Feher (University of Luxembourg);Giuseppe Vitto (University of Luxembourg)
Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay
Mengchen Cao (Orion Security Lab, Alibaba Group);Xiantong Hou (Orion Security Lab, Alibaba Group);Tao Wang (Orion Security Lab, Alibaba Group);Hunter Qu (Orion Security Lab, Alibaba Group);Yajin Zhou (Zhejiang University);Xiaolong Bai (Orion Security Lab, Alibaba Group);Fuwei Wang (Orion Security Lab, Alibaba Group)
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack
Hoai Viet Nguyen (Cologne University of Applied Sciences);Luigi Lo Iacono (Cologne University of Applied Sciences);Hannes Federrath (University of Hamburg)
12:00-13:30 Lunch Break (Room: Monarch)
13:30-15:30 9A: User Study 9B: ML Security III 9C: Zero-Knowledge Proofs 9D: Signatures 9E: Web Censorship and Auditing
Session chair: Kassem Fawaz, University of Wisconsin-Madison Session chair: Esfandiar Mohammadi, University of Luebeck Session chair: Daniel Genkin, University of Michigan Session chair: Dominique Schröder, Friedrich-Alexander-Universität Erlangen-Nürnberg Session chair: Rob Jansen, U.S. Naval Research Laboratory
“I don’t see why I would ever want to use it”: Analyzing the Usability of Popular Smartphone Password Managers
Sunyoung Seiler-Hwang (University of Mannheim);Patricia Arias-Cabarcos (University of Mannheim);Andrés Marín (University Carlos III of Madrid);Florina Almenares (University Carlos III of Madrid);Daniel Díaz-Sánchez (University Carlos III of Madrid);Christian Becker (University of Mannheim)
Seeing isn’t Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors
Yue Zhao (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China;School of Cyber Security, University of Chinese Academy of Sciences, China);Hong Zhu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China;School of Cyber Security, University of Chinese Academy of Sciences, China);Ruigang Liang (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China);Qintao Shen (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China;School of Cyber Security, University of Chinese Academy of Sciences, China);Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston University);Kai Chen (SKLOIS, Institute of Information Engineering,Chinese Academy of Sciences, China;School of Cyber Security, University of Chinese Academy of Sciences, China)
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
Russell W. F. Lai (Friedrich-Alexander University Erlangen-Nuremberg);Giulio Malavolta ( Carnegie Mellon University);Viktoria Ronge (Friedrich-Alexander University Erlangen-Nuremberg)
The SPHINCS+ signature framework
Andreas Hülsing (TU Eindhoven);Peter Schwabe (RU Nijmegen);Joost Rijneveld (RU Nijmegen);Stefan Kölbl (Cybercrypt);Daniel J Bernstein (University of Illinois at Chicago and Ruhr University Bochum);Ruben Niederhagen (SIT Fraunhofer)
Geneva: Evolving Censorship Evasion Strategies
Kevin Bock (University of Maryland);George Hughey (University of Maryland);Xiao Qiang (UC Berkeley);Dave Levin (University of Maryland)
Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues
Faris Bugra Kokulu (Arizona State University);Ananta Soneji (Arizona State University);Tiffany Bao (Arizona State University);Yan Shoshitaishvili (Arizona State University);Ziming Zhao (Rochester Institute of Technology);Adam Doupé (Arizona State University);Gail-Joon Ahn (Arizona State University and Samsung Research)
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
Florian Tramèr (Stanford University);Pascal Dupré (CISPA);Gili Rusak (Stanford);Giancarlo Pellegrino (Stanford University, CISPA);Dan Boneh (Stanford University)
LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
Matteo Campanelli (IMDEA Software Institute, Madrid, Spain);Dario Fiore (IMDEA Software Institute, Madrid, Spain);Anaïs Querol (IMDEA Software Institute, Madrid, and Universidad Politecnica de Madrid, Spain)
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Gilles Barthe (MPI-SP and IMDEA Software Institute);Sonia Belaïd (CryptoExperts);Thomas Espitau (Sorbonne Université);Pierre-Alain Fouque (Univ Rennes);Mélissa Rossi (ENS and Thalès);Mehdi Tibouchi (NTT Corporation)
Conjure: Summoning Proxies from Unused Address Space
Sergey Frolov (University of Colorado Boulder);Jack Wampler (University of Colorado Boulder);Sze Chuen Tan (UIUC);J. Alex Halderman (University of Michigan);Nikita Borisov (UIUC);Eric Wustrow (University of Colorado Boulder);
A Usability Evaluation of Let’s Encrypt and Certbot – Usable Security Done Right?
Christian Tiefenau (University of Bonn);Emanuel von Zezschwitz (University of Bonn, Fraunhofer FKIE);Maximilian Häring (Fraunhofer FKIE);Katharina Krombholz (CISPA Helmholtz Center for Information Security);Matthew Smith (University of Bonn, Fraunhofer FKIE)
Attacking Graph-based Classification via Manipulating the Graph Structure
Binghui Wang (Duke University);Neil Zhenqiang Gong (Duke University)
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
Michael Klooß (Karlsruhe Institute of Technology);Max Hoffmann (Ruhr University Bochum);Andy Rupp (Karlsruhe Institute of Technology)
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures
Dennis Jackson (University of Oxford);Katriel Cohn-Gordon (Facebook);Cas Cremers (CISPA Helmholtz Center for Information Security);Ralf Sasse (ETH Zürich)
You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques
Angelique Faye Loe (Royal Holloway, University of London);Elizabeth Quaglia (Royal Holloway, University of London)
Latent Backdoor Attacks on Deep Neural Networks
Yuanshun Yao (University of Chicago);Huiying Li (University of Chicago);Haitao Zheng (University of Chicago);Ben Y. Zhao (University of Chicago)
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings
Mary Maller (University College London);Sean Bowe (Zcash);Markulf Kohlweiss (University of Edinburgh, IOHK);Sarah Meiklejohn (University College London)
Membership Privacy for Fully Dynamic Group Signatures
Michael Backes (CISPA Helmholtz Center for Information Security);Lucjan Hanzlik (CISPA Helmholtz Center for Information Security, Stanford University);Jonas Schneider-Bensch (CISPA Helmholtz Center for Information Security)
SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers
Roopa Vishwanathan (New Mexico State University);Gaurav Panwar (New Mexico State University);Satyajayant Misra (New Mexico State University);Austin Bos (New Mexico State University)
15:30-16:00 Coffee Break
16:00-17:30 10A: Cyberphysical Security 10B: TEE II 10C: Secret Sharing 10D: Mobile Security 10E: Certificates
Session chair: Soteris Demetriou, Imperial College London Session chair: Sven Bugiel, CISPA Helmholtz Center for Information Security Session chair: Lorenzo Cavallaro, King’s College London Session chair: Adam Doupé, Arizona State University Session chair: Tudor Dumitras, University of Maryland, College Park
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao (University of Michigan);Chaowei Xiao (University of Michigan);Benjamin Cyr (University of Michigan);Yimeng Zhou (University of Michigan);Won Park (University of Michigan);Sara Rampazzi (University of Michigan);Qi Alfred Chen (University of California, Irvine);Kevin Fu (University of Michigan);Z. Morley Mao (University of Michigan)
OPERA: Open Remote Attestation for Intel’s Secure Enclaves
Guoxing Chen (The Ohio State University);Yinqian Zhang (The Ohio State University);Ten-Hwang Lai (The Ohio State University)
CHURP: Dynamic-Committee Proactive Secret Sharing
Sai Krishna Deepak Maram (Cornell Tech);Fan Zhang (Cornell Tech);Lun Wang (UC Berkeley);Andrew Low (UC Berkeley);Yupeng Zhang (UC Berkeley and Texas A&M);Ari Juels (Jacobs Institute, Cornell Tech);Dawn Song (UC Berkeley)
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps
Shengqu Xi (Nanjing University);Shao Yang (Case Western Reserve University);Xusheng Xiao (Case Western Reserve University);Yuan Yao (Nanjing University);Yayuan Xiong (Nanjing University);Fengyuan Xu (National Key Lab for Novel Software Technology, Nanjing University);Haoyu Wang (Beijing University of Posts and Telecommunications);Peng Gao (University of California, Berkeley);Zhuotao Liu (University of Illinois at Urbana-Champaign);Feng Xu (Nanjing University);Jian Lu (Nanjing University)
Let’s Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
Josh Aas (Let’s Encrypt);Richard Barnes (Cisco);Benton Case (Stanford University);Zakir Durumeric (Stanford University);Peter Eckersley (Electronic Frontier Foundation);Alan Flores-López (Stanford University);J. Alex Halderman (University of Michigan);Jacob Hoffman-Andrews (Electronic Frontier Foundation);James Kasten (University of Michigan);Eric Rescorla (Mozilla);Seth Schoen (Electronic Frontier Foundation);Brad Warren (Electronic Frontier Foundation)
LibreCAN: Automated CAN Message Translator
Mert D. Pesé (University of Michigan, Ann Arbor);Troy Stacer (University of Michigan, Ann Arbor);C. Andrés Campos (University of Michigan, Ann Arbor);Eric Newberry (University of Michigan, Ann Arbor);Dongyao Chen (University of Michigan, Ann Arbor);Kang G. Shin (University of Michigan, Ann Arbor)
Towards Memory Safe Enclave Programming with Rust-SGX
Huibo Wang (University of Texas at Dallas);Pei Wang (Baidu X-Lab);Yu Ding (Baidu X-Lab);Mingshen Sun (Baidu X-Lab);Yiming Jing (Baidu X-Lab);Ran Duan (Baidu X-Lab);Long Li (Baidu X-Lab);Yulong Zhang (Baidu X-Lab);Tao Wei (Baidu X-Lab);Zhiqiang Lin (Ohio State University)
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols
Soumya Basu (Cornell University, IC3, VMWare Research);Alin Tomescu (MIT, VMWare Research);Ittai Abraham (VMware Research);Dahlia Malkhi (VMWare);Mike Reiter (UNC, VMWare Research);Emin Gün Sirer (Cornell, IC3)
The Art and Craft of Fraudulent App Promotion in Google Play
Mizanur Rahman (Amazon);Nestor Hernandez (FIU);Ruben Recabarren (FIU);Syed Ishtiaque Ahmed (University of Toronto);Bogdan Carbunar (FIU)
You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates
Richard Roberts (University of Maryland);Yaelle Goldschlag (University of Maryland);Rachel Walter (University of Maryland);Taejoong Chung (Rochester Institute of Technology);Alan Mislove (Northeastern University);Dave Levin (University of Maryland)
Trick or Heat? Manipulating Critical Temperature-Based Control Systems using Rectification attacks
Yazhou Tu (University of Louisiana at Lafayette);Sara Rampazzi (University of Michigan);Bin Hao (University of Louisiana at Lafayette);Angel Rodriguez (University of Michigan);Kevin Fu (University of Michigan);Xiali Hei (University of Louisiana at Lafayette)
LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed
Huayi DUAN (City University of Hong Kong);Cong Wang (City University of Hong Kong);Xingliang Yuan (Monash University);Yajin Zhou (Zhejiang University);Qian Wang (Wuhan University);Kui Ren (Zhejiang University)
Two-party Private Set Intersection with an Untrusted Third Party.
Phi Hung Le (George Mason University);Samuel Ranellucci (University of Maryland, George Mason University);S. Dov Gordon (George Mason University)
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
Sazzadur Rahaman (Department of Computer Science, Virginia Tech);Ya Xiao (Department of Computer Science, Virginia Tech);Sharmin Afrose (Department of Computer Science, Virginia Tech);Fahad Shaon (Department of Computer Science, The University of Texas at Dallas);Ke Tian (Department of Computer Science, Virginia Tech);Miles Frantz (Department of Computer Science, Virginia Tech);Danfeng (Daphne) Yao (Department of Computer Science, Virginia Tech);Murat Kantarcioglu (Department of Computer Science, The University of Texas at Dallas)
Certificate Transparency in the Wild: Exploring the Reliability of Monitors
Bingyu Li (Institute of Information Engineering, CAS);Jingqiang Lin (Institute of Information Engineering, CAS);Fengjun Li (The University of Kansas, Lawrence, USA);Qiongxiao Wang (Institute of Information Engineering, CAS);Qi Li (Tsinghua University, China);Jiwu Jing (Institute of Information Engineering, CAS);Congli Wang (Institute of Information Engineering, CAS)

Post-Conference Workshops on Friday, November 15th, 2019 (07:30-17:30)

12th ACM Workshop on Artificial Intelligence and Security
Room: Blenheim

3rd Workshop on Forming an Ecosystem Around Software Transformation
Room: Windsor Lancester

Privacy Preserving Machine Learning
Room: Buckingham & Kensington

3rd Software Protection Workshop
Room: Park

2nd Workshop on the Internet of Things Security and Privacy
Room: Windsor York

3rd Attacks and Solutions in Hardware Security Workshop
Room: Thames Chelsea & Richmond

14th ACM SIGSAC Workshop on Programming Languages and Analysis for Security
Room: Westminster

1st Workshop on Cyber-Security Arms Race
Room: Thames Waterloo & Tower
07:30-09:00 Breakfast (Room: Monarch) & Registration (Room: West Wing Foyer)
10:00-10:45 Coffee Break
12:00-14:00 Lunch Break (Room: Monarch)
15:00-15:45 Coffee Break
15:45-17:30 AISec FEAST PPML SPRO
until 18:30