Program | Full Papers (30 Minutes), Short Papers (15 Minutes) | |||
Date | Session | Time | Paper Title | Authors |
19-July-2023 | Registration | 09:00-09:30 | ||
Opening Remarks | 09:30-09:45 | |||
Keynote 1 (Session Chair: Michele Bezzi) |
09:45-10:45 | Software Supply Chain Security link | Volkmar Lotz, SAP Security Research | |
Coffee Break | 10:45-11:15 | |||
Differential Privacy (Session Chair: Rudrapatna Shyamasundar) |
11:15-12:30 | (Local) Differential Privacy has NO Disparate Impact on Fairness | Héber H. Arcolezi, Karima Makhlouf and Catuscia Palamidessi | |
---|---|---|---|---|
Building Quadtrees for Spatial Data under Local Differential Privacy | Ece Alptekin and M. Emre Gursoy | |||
Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy (Short Paper) | Akito Yamamoto and Tetsuo Shibuya | |||
Lunch Break | 12:30-14:00 | |||
Secure Data Sharing (Session Chair: Anna Lisa Ferrara) |
14:00-15:30 | New Results on Distributed Secret Sharing Protocols | Alfredo De Santis and Barbara Masucci | |
Probabilistic Fingerprinting Scheme for Correlated Data | Emre Yilmaz and Erman Ayday | |||
Optimized stream-cipher-based transciphering by means of functional-bootstrapping | Adda Akram Bendoukha, Pierre-Emmanuel Clet, Aymen Boudguiga and Renaud Sirdey | |||
Coffee Break | 15:30-16:00 | |||
Applications (Session Chair: Ehud Gudes) |
16:00-17:00 | Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends | Zahra Ebadi Ansaroudi, Roberto Carbone, Giada Sciarretta and Silvio Ranise | |
Impact of using a privacy model on smart buildings data for CO2 prediction (Short Paper) | Charles Neu, Henry Cabral Nunes, Lana T. Thomas, Marlon P. da Silva,Charles Morisset and Avelino Francisco Zorzo | |||
Digital Twins for IoT Security Management (Short Paper) | Philip Empl, Henric Hager and Günther Pernul | |||
IFIP WG11.3 Meeting | 17:00-17:30 | |||
20-July-2023 | Registration | 09:00-09:30 | ||
Keynote 2 (Session Chair: Vijayalakshmi Atluri) |
09:30-10:30 | Controlled data sharing in distributed collaborative scenarios link |
Pierangela Samarati, University of Milan, Italy | |
Coffee Break | 10:30-11:00 | |||
Privacy (Session Chair: Sara Foresti) |
11:00-12:30 | Data distribution impact on preserving privacy in centralized and decentralized learning | Bakary Dolo, Faiza Loukil and Khouloud Boukadi | |
On the utility gain of iterative bayesian update for locally differentially private protocols | Héber H. Arcolezi, Selene Cerna and Catuscia Palamidessi | |||
Differentially Private Streaming Data Release under Temporal Correlations via Post-processing | Xuyang Cao, Yang Cao, Primal Pappachan, Atsuyoshi Nakamura and Masatoshi Yoshikawa | |||
Lunch Break | 12:30-14:00 | |||
Access Control and Vulnerability Assessment (Session Chair: Barbara Masucci) | 14:00-15:30 | Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments | Gianluca Sassetti, Amir Sharif, Giada Sciarretta, Roberto Carbone and Silvio Ranise | |
Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach | Sascha Kern, Thomas Baumer, Ludwig Fuchs and Günther Pernul | |||
SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity | Basel Abdeen, Latifur Khan, Ehab Al-Shaer, Anoop Singhal and Kevin Hamlen | |||
Coffee Break | 15:30-16:00 | |||
Machine Learning and Deep Learning (Session Chair: Marco Rosa) | 16:00-17:30 | Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks | Fereshteh Razmi and Li Xiong | |
CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery | Tom Ganz, Erik Imgrund, Martin Härterich and Konrad Rieck | |||
An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning | David Rodriguez and Ram Krishnan | |||
Social Event | TBA | The social dinner will take place at LE RUBAN BLEU in Juan-les Pins, Antibes (link) |
||
21-July-2023 | Registration | 08:45-09:15 | ||
Mobile Application (Session Chair: Latifur Khan) |
9:15-10:30 | Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications | Aishwarya Surani, Sanchari Das, Amani Bawaked, Braden Kelsey, Nikki Roberts, David Vincent and Matthew Wheeler | |
Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin | Janaka Senanayake, Harsha Kumara Kalutarage, Mhd Omar Al Kadri, Andrei Petrovski and Luca Piras | |||
A Dynamic Approach to Defuse Logic Bombs in Android Applications (Short Paper) | Fausto Fasano, Michele Guerra, Roberto Milanese and Rocco Oliveto | |||
Coffee Break | 10:30-11:00 | |||
Defence Mechanisms (Session Chair: Günther Pernul) |
11:00-12:15 | AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit | Franz Deimling and Michela Fazzolari | |
VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation | Siqi Zhang, Mengyuan Zhang and Lianying Zhao | |||
An analysis of Hybrid Consensus in Blockchain Protocols for correctness and Progress (Short Paper) | Sangita Roy and Rudrapatna K. Shyamasundar | |||
Concluding Remarks | 12:15-12:30 | |||
Lunch Break |