| Program | Full Papers (30 Minutes), Short Papers (15 Minutes) | |||
| Date | Session | Time | Paper Title | Authors | 
| 19-July-2023 | Registration | 09:00-09:30 | ||
| Opening Remarks | 09:30-09:45 | |||
| Keynote 1 (Session Chair: Michele Bezzi) | 09:45-10:45 | Software Supply Chain Security link | Volkmar Lotz, SAP Security Research | |
| Coffee Break | 10:45-11:15 | |||
| Differential Privacy (Session Chair: Rudrapatna Shyamasundar) | 11:15-12:30 | (Local) Differential Privacy has NO Disparate Impact on Fairness | Héber H. Arcolezi, Karima Makhlouf and Catuscia Palamidessi | |
|---|---|---|---|---|
| Building Quadtrees for Spatial Data under Local Differential Privacy | Ece Alptekin and M. Emre Gursoy | |||
| Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy (Short Paper) | Akito Yamamoto and Tetsuo Shibuya | |||
| Lunch Break | 12:30-14:00 | |||
| Secure Data Sharing (Session Chair: Anna Lisa Ferrara) | 14:00-15:30 | New Results on Distributed Secret Sharing Protocols | Alfredo De Santis and Barbara Masucci | |
| Probabilistic Fingerprinting Scheme for Correlated Data | Emre Yilmaz and Erman Ayday | |||
| Optimized stream-cipher-based transciphering by means of functional-bootstrapping | Adda Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga and Renaud Sirdey | |||
| Coffee Break | 15:30-16:00 | |||
| Applications (Session Chair: Ehud Gudes) | 16:00-17:00 | Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends | Zahra Ebadi Ansaroudi, Roberto Carbone, Giada Sciarretta and Silvio Ranise | |
| Impact of using a privacy model on smart buildings data for CO2 prediction (Short Paper) | Charles Neu, Henry Cabral Nunes, Lana T. Thomas, Marlon P. da Silva,Charles Morisset and Avelino Francisco Zorzo | |||
| Digital Twins for IoT Security Management (Short Paper) | Philip Empl, Henric Hager and Günther Pernul | |||
| IFIP WG11.3 Meeting | 17:00-17:30 | |||
| 20-July-2023 | Registration | 09:00-09:30 | ||
| Keynote 2 (Session Chair: Vijayalakshmi Atluri) | 09:30-10:30 | Controlled data sharing in distributed collaborative scenarios link | Pierangela Samarati, University of Milan, Italy | |
| Coffee Break | 10:30-11:00 | |||
| Privacy (Session Chair: Sara Foresti) | 11:00-12:30 | Data distribution impact on preserving privacy in centralized and decentralized learning | Bakary Dolo, Faiza Loukil and Khouloud Boukadi | |
| On the utility gain of iterative bayesian update for locally differentially private protocols | Héber H. Arcolezi, Selene Cerna and Catuscia Palamidessi | |||
| Differentially Private Streaming Data Release under Temporal Correlations via Post-processing | Xuyang Cao, Yang Cao, Primal Pappachan, Atsuyoshi Nakamura and Masatoshi Yoshikawa | |||
| Lunch Break | 12:30-14:00 | |||
| Access Control and Vulnerability Assessment (Session Chair: Barbara Masucci) | 14:00-15:30 | Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments | Gianluca Sassetti, Amir Sharif, Giada Sciarretta, Roberto Carbone and Silvio Ranise | |
| Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach | Sascha Kern, Thomas Baumer, Ludwig Fuchs and Günther Pernul | |||
| SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity | Basel Abdeen, Latifur Khan, Ehab Al-Shaer, Anoop Singhal and Kevin Hamlen | |||
| Coffee Break | 15:30-16:00 | |||
| Machine Learning and Deep Learning (Session Chair: Marco Rosa) | 16:00-17:30 | Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks | Fereshteh Razmi and Li Xiong | |
| CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery | Tom Ganz, Erik Imgrund, Martin Härterich and Konrad Rieck | |||
| An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning | David Rodriguez and Ram Krishnan | |||
| Social Event | TBA | The social dinner will take place  at  LE RUBAN BLEU in Juan-les Pins, Antibes (link) | ||
| 21-July-2023 | Registration | 08:45-09:15 | ||
| Mobile Application (Session Chair: Latifur Khan) | 9:15-10:30 | Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications | Aishwarya Surani, Sanchari Das, Amani Bawaked, Braden Kelsey, Nikki Roberts, David Vincent and Matthew Wheeler | |
| Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin | Janaka Senanayake, Harsha Kumara Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras | |||
| A Dynamic Approach to Defuse Logic Bombs in Android Applications (Short Paper) | Fausto Fasano, Michele Guerra, Roberto Milanese and Rocco Oliveto | |||
| Coffee Break | 10:30-11:00 | |||
| Defence Mechanisms (Session Chair: Günther Pernul) | 11:00-12:15 | AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit | Franz Deimling and Michela Fazzolari | |
| VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation | Siqi Zhang, Mengyuan Zhang and Lianying Zhao | |||
| An analysis of Hybrid Consensus in Blockchain Protocols for correctness and Progress (Short Paper) | Sangita Roy and Rudrapatna K. Shyamasundar | |||
| Concluding Remarks | 12:15-12:30 | |||
| Lunch Break |