Papers

The symposium will take place over the course of two days. Meetings will involve lectures and discussions covering important topics in cyber security, cryptography and machine learning.

List of accepted papers:

    10:30 - 12:10
    Academic Research Track - Morning Session
    10:30 - 10:45
    • Efficient, Reusable Fuzzy Extractors from LWE,
      Daniel Apon, Chongwon Cho, Karim Eldefrawy and Jonathan Katz
    10:45 - 11:00
    • GenFace: Improving Cyber Security using Realistic Synthetic Face Generation,
      Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart Gibson, Julio Hernandez-Castro and Christopher Solomon
    11:00 - 11:15
    • Supervised detection of infected machines using anti-virus induced labels,
      Tomer Cohen, Danny Hendler and Dennis Potashnik
    11:15 - 11:30
    • Building Regular Registers with Rational Malicious Servers and Anonymous Clients,
      Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti and Roberto Baldoni
    11:30 - 11:45
    • On the Optimality of the Exponential Mechanism,
      Francesco Aldà and Hans Simon
    11:45 - 12:00
    • On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups,
      Hyang-Sook Lee, Seongan Lim and Ikkwon Yie
    12:00 - 12:10
    • Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage,
      Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski
    12:30 - 14:10 Academic Research Track - Noon Session
    12:30 - 12:45
    • The Combinatorics of Product Scanning Multiplication and Squaring,
      Adam Young and Moti Yung
    12:45 - 13:00
    • Stylometric Authorship Attribution of Collaborative Documents,
      Edwin Dauber, Rebekah Overdorf and Rachel Greenstadt
    13:00 - 13:15
    • A Distributed Investment Encryption Scheme: Investcoin,
      Filipp Valovich
    13:15 - 13:30
    • Physical Layer Security over Wiretap Channels with Random Parameters,
      Ziv Goldfeld, Paul Cuff and Haim Permuter
    13:30 - 13:45
    • Assisting Malware Analysis with Symbolic Execution: a Case Study,
      Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia and Camil Demetrescu
    13:45 - 13:50
    • Brief Announcement: A Consent Management Solution for Enterprises,
      Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti and Paula Ta-Shma
    13:50 - 13:55
    • Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party,
      Nir Maoz and Ehud Gudes
    13:55 - 14:00
    • Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and Attacks,
      Sergey Frenkel and Victor Zakharov
    14:45 - 16:15 Academic Research Track - Afternoon Session
    14:45 - 15:00
    • Symmetric-Key Broadcast Encryption: The Multi-Sender Case,
      Cody Freitag, Jonathan Katz and Nathan Klein
    15:00 - 15:15
    • A Supervised Auto-Tuning Approach for a Banking Fraud Detection System,
      Michele Carminati, Luca Valentini and Stefano Zanero
    15:15 - 15:30
    • Scalable Attack Path Finding for Increased Security,
      Tom Gonda, Rami Puzis and Bracha Shapira
    15:30 - 15:45
    • Learning Representations for Log Data in Cybersecurity,
      Ignacio Arnaldo, Kalyan Veeramachaneni, Ankit Arun, Mei Lam, Costas Bassias and Alfredo Cuesta
    15:45 - 16:00
    • Attack Graph Obfuscation,
      Hadar Polad, Rami Puzis and Bracha Shapira
    16:00 - 16:15
    • Malware Triage based on Static Features and Public APT Reports,
      Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti and Roberto Baldoni