Best Paper Awards
- ⚫️ Best Paper: Security Analysis of Improved EDHOC Pro by Baptiste Cottier and David Pointcheval
DIENS, École normale supérieure, CNRS, Inria, PSL University, Paris, France
- ⚫️ Best Paper Runner-Up: Towards Characterizing IoT Software Update Practices by Conner Bradley and David Barrera
School of Computer Science, Carleton University, Ottawa, Canada
Regular Papers
Title | Authors |
---|---|
A Decentralized Mnemonic Backup System | Thierry Sans, David Ziming Liu and Kevin Oh |
A New Class of Trapdoor Verifiable Delay Functions | Ahmed M. Zawia and M. Anwar Hasan |
A Privacy-aware Reconfigurable Secure-Software Updating Framework for IoT Devices | Prosanta Gope |
A Survey on Identity-based Blind Signature | Mirko Koscina, Pascal Lafourcade, Gael Marcadet, Charles Olivier-Anclin and Léo Robert |
A Taxonomy and Gap-analysis in Digital Privacy Education | Sumit Paul and David Knox |
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks | Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski and Hartmut Koenig |
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter | Muhammad Mohzary, Khalid Almalki, Baek-Young Choi and Sejun Song |
Data-driven Evaluation of Intrusion Detectors : a Methodological Framework | Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil and Thomas Silverston |
Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts | Sahar Salimpour, Farhad Kerama, Jorge Pe ̃na Queralta and Tomi Westerlund |
Defense Models for Data Recovery in Industrial Control Systems | Alvi Jawad and Jason Jaskolka |
Differentially Private Friends Recommendation | Kamalkumar Macwan, Abdessamad Imine, Michael Rusinowitch |
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES | Martin Brisfors, Michail Moraitis and Elena Dubrova |
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts | Puneet Gill, Indrani Ray, Alireza Lotfi Takami and Mahesh Tripunitara |
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes | Anthony Tam, Furkan Alaca and David Barrera |
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms | Olivier de Casanove and Florence Sedes |
Money Transfer on Transaction Signature-based Ledger | Momoko Shiraishi and Hitoshi Aida |
Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone | Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier and David Pointcheval |
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher | Amirhossein Ebrahimi Moghaddam, Francesco Regazzoni and Paolo Palmieri |
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords | Konrad-Felix Krentz and Thiemo Voigt |
SCADA Radio Blackbox Reverse Engineering | Jean-Benoit Larouche, Sébastien Roy, Marc Frappier, Pierre-Martin Tardif and Frédéric Mailhot |
Security Analysis of Improved EDHOC Protocol | Baptiste Cottier and David Pointcheval |
Toward Secure Homomorphic Evaluation of Block-Cipher-Based Hash Functions | Adda Akram Bendoukha, Oana Stan, Renaud Sirdey, Quero Nicolas and Luciano Freitas |
Towards a Maturity Model for Crypto-Agility Assessment | Julian Hohm, Andreas Heinemann and Alexander Wiesmaier |
Towards Characterizing IoT Software Update Practices | Conner Bradley and David Barrera |
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic | Omar Tahmi, Chamseddine Talhi and Yacine Challal |
Underwater Confidential Communications in JANUS | Yannick Beaupré, Michel Barbeau and Stéphane Blouin |
Where is The Python Interpreter? | Guillaume Bonfante and Anuyan Ithayakumar (University of Lorraine) |
Short Papers
Title | Authors |
---|---|
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection | Pavlo Burda, Luca Allodi and Nicola Zannone |
Deep-Learning-Based Vulnerability Detection in Binary Executables | Andreas Schaad and Dominik Binder |
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis | Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal and Atiya Hai |