Papers


List of Papers Accepted to the Academic Research Track:
Full Papers

1. Game of Drones - Detecting Spying Drones Using Time Domain Analysis
Ben Nassi, Raz Ben Netanel, Adi Shamir and Yuval Elovici

2. Effective enumeration of infinitely many programs that evade Formal Malware Analysis
Vasiliki Liagkou, Panagiotis Nastou, Paul Spirakis and Yannis Stamatiou

3. Warped Input Gaussian Processes for Time Series Forecasting
Igor Vinokur and David Tolpin

4. Adversaries Strike Hard: Adversarial Attacks against Malware Classifiers using Dynamic API Calls as Features
Hari Om, Anand Handa, Nitesh Kumar and Sandeep K Shukla

5. Efficient Secure Ridge Regression from Randomized Gaussian Elimination
Frank Blom, Niek J. Bouman, Berry Schoenmakers and Niels de Vreede

6. Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform
Jakub Klemsa

7. Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks
Ilaria Chillotti, Marc Joye and Pascal Paillier

8. History Binding Signature
Shlomi Dolev and Matan Liber

9. Efficient Generic Arithmetic for KKW: Practical Linear MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup
David Heath, Vladimir Kolesnikov and Jiahui Lu

10. Hierarchical Ring Signatures Immune to Randomness Injection Attacks
Łukasz Krzywiecki, Mirosław Kutyłowski, Rafał Rothenberger and Bartosz Drzazga

11. Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent
Thijs Veugen, Bart Kamphorst, Natasja van de L'Isle and Marie Van Egmond

12. Fully Dynamic Password Protected Secret Sharing: simplifying PPSS operation and maintenance
Akif Patel and Moti Yung

13. Compact Ad Hoc Threshold Encryption
Leonid Reyzin, Adam Smith and Sophia Yakoubov

14. META-X: A Technique for Reducing Communication in Geographically Distributed Computations
Foto Afrati, Shlomi Dolev, Shantanu Sharma and Jeffrey Ullman

15. Privacy Vulnerability of NeNDS Collaborative Filtering
Eyal Nussbaum and Michael Segal

16. Lawful Interception in WebRTC Peer-To-Peer Communication
Assaf Wagner and Rami Puzis

17. Principal Component Analysis using CKKS Homomorphic Encryption Scheme
Samanvaya Panda

18. Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies
Iddo Bentov, Pavel Hubacek, Tal Moran and Asaf Nadler

19. Multi-Parameter Statistical Inference with Adversarial Robustness
Benjamin Sela, Furong Huang and Jonathan Katz

20. DNS-Morph: UDP-Based Bootstrapping Protocol For Tor
Rami Ailabouni, Orr Dunkelman and Sara Bitan

21. DepthStAr: Deep Strange Arguments Detection
Michael Berlin, Oded Margalit and Gera Weiss

22. Using a Neural Network to Detect Anomalies given an N-gram Profile
Junwhan Kim and Byunggu Yu


Short papers

1. Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems
Aneet Kumar Dutta, Rohit Negi and Sandeep Kumar Shukla

2. Privacy Preserving Password Strength Meters with FHE
Imtiyazuddin Shaik, Harshal Tupsamudre, Nitesh Emmadi, Harika Narumanchi, Dr. Rajan M A and Sachin Lodha

3. Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning
Mor Soffer, Ofer Hadar and Naftali Lazarovitch

4. Theoretical aspects of a priori on-line assessment of data predictability in applied tasks
Sergey Frenkel

5. Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement
Dor Bitan and Shlomi Dolev

6. Polynomial Time k-Shortest Multi-Criteria Prioritized and All-Criteria-Disjoint Paths
Yefim Dinitz, Shlomi Dolev and Manish Kumar

7. Binding BIKE errors to a key pair
Nir Drucker, Shay Gueron and Dusan Kostic

8. PolyDNN Polynomial Representation of NN for Communication-less SMPC Inference
Philip Derbeko and Shlomi Dolev

9. Use of Blockchain for ensuring Data Integrity in Cloud Databases
Yakov Vainshtein and Ehud Gudes

10. Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features
Dorel Yaffe and Danny Hendler

11. Software Integrity and Validation using Cryptographic Composability and Computer Vision
Donald Beaver

12. Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM
Shlomi Dolev and Stav Doolman

13. Implementing GDPR in Social Networks using Trust and Context
Nadav Voloch, Ehud Gudes and Nurit Gal-Oz