35th Annual Computer Security Applications Conference (ACSAC 2019)

Monday, 9 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar ILaguna IBoardroom IBoardroom II

Two-Day Workshop

J. Todd McDonald, University of South Alabama, General Chair

Two-Day Workshop

Michael Clifford, Noblis; and Michael Collins, USC-ISI

One-Day Training Worshop

William Joseph Spring, University of Hertfordshire

Two-Day Training Worshop

Kevin Nauer and Nicholas Kantor, Sandia National Laboratories

12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar ILaguna IBoardroom IBoardroom II

(Workshop Continues)

(Workshop Continues)

(Training Workshop Continues)

(Training Workshop Continues)

Tuesday, 10 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-12:00
Miramar ILaguna ICondadoBoardroom IBoardroom II

(Workshop Continues)

(Workshop Continues)

One-Day Workshop

Harvey Rubinovitz, The MITRE Corporation; and Adam Hahn, Washington State University, General Co-Chairs

Irfan Ahmed, Virginia Commonwealth University, Program Chair

One-Day Worshop

Daniel Takabi and Robert Podschwadt, Georgia State University

(Training Workshop Continues)

12:00-13:30
(Brisas Del Mar)
13:30-17:00
Miramar ILaguna ICondadoBoardroom IBoardroom II

(Workshop Continues)

(Workshop Continues)

(Workshop Continues)

(Training Workshop Continues)

(Training Workshop Continues)

18:00-20:00
(Lagoon Pool)
Wednesday, 11 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-9:00
(Royal Ballroom)

ACSAC Conference Welcome: David Balenson, Conference Chair     SLIDES

PC Chair Opening Remarks and Distinguished Paper Awards: Guofei Gu, Program Chair     SLIDES

SWSIS Scholarship Awards: Mary Ellen Zurko and Jeremy Epstein, ACSA     SLIDES

9:00-10:00
(Royal Ballroom)Session Chair: David Balenson, SRI International

Can You Get That to Me Soon? Lessons Learned from Life in Industry Research
Carrie Gates, Senior Vice President, Global Information Security, Bank of America

10:00-10:30
(Foyer)
10:30-12:00
Laguna IRoyal BallroomMiramar I

Panel Moderator: Ulf Lindqvist, SRI International     SLIDES

Panelists:
Mary Ellen Zurko, MIT Lincoln Laboratory     SLIDES
Christopher Torres-Lugo, Indiana University Bloomington     SLIDES

Micah Sherr, Georgetown University
 

Session Chair: Gabriela Ciocarlie, SRI InternationalProof of AlivenessChenglu Jin, University of Connecticut; Zheng Yang, Singapore University of Technology and Design; Marten van Dijk, University of Connecticut; Jianying Zhou, Singapore University of Technology and DesignCo-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUsCharalampos Stylianopoulos, Chalmers University of Technology; Simon Kindstrom, Chalmers University of Technology; Magnus Almgren, Chalmers University of Technology; Olaf Landsiedel, University of Kiel; Marina Papatriantafilou, Chalmers University of TechnologyAegis: A Context-aware Security Framework for Smart Home SystemsAmit Kumar Sikder, Florida International University; Leonardo Babun, Florida International University; Hidayet Aksu, Florida International University; A. Selcuk Uluagac, Florida International UniversityDefeating Hidden Audio Channel Attacks on Voice Assistants via Audio-Induced Surface VibrationsChen Wang, WINLAB, Rutgers University; S Abhishek Anand, University of Alabama at Birmingham; Jian Liu, WINLAB, Rutgers University; Payton R. Walker, University of Alabama at Birmingham; Yingying (Jennifer) Chen, WINLAB, Rutgers University; Nitesh Saxena, University of Alabama at Birmingham Session Chair: Kevin Roundy, NortonLifeLockTF-BIV: Transparent and Fine-grained Binary Integrity Verification in the CloudFangjie Jiang, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences; Quanwei Cai, Institute of Information Engineering, Chinese Academy of Sciences; Jingqiang Lin, Institute of Information Engineering, Chinese Academy of Sciences; Bo Luo, The University of Kansas; Le Guan, University of Georgia; Ziqiang Ma, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of SciencesNibbler: Debloating Binary Shared LibrariesIoannis Agadakos, SRI International; Di Jin, Brown University; David Williams-King, Columbia University; Vasileios P. Kemerlis, Brown University; Georgios Portokalidis, Stevens Institute of TechnologyFunction Boundary Detection in Stripped BinariesJim Alves-Foss, University of Idaho; Jia Song, University of IdahoVPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic DispatchingAndre Pawlowski, Ruhr-Universitat Bochum; Victor van der Veen, Vrije Universiteit Amsterdam; Dennis Andriesse, Vrije Universiteit Amsterdam; Erik van der Kouwe, Leiden University; Thorsten Holz, Ruhr-Universitat Bochum; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Herbert Bos, Vrije Universiteit Amsterdam
12:00-13:30
(Brisas Del Mar)
13:30-15:00
Laguna IRoyal BallroomMiramar I

Moderator:
Tomas Vagoun, NITRD     SLIDES

Panelists:
Raymond Brown, NSA
Jeremy Epstein, NSF

Wei-Shinn Ku, NSF

Session Chair: Amir Houmansadr, UMass AmherstSTRIP: A Defence Against Trojan Attacks on Deep Neural NetworksGarrison Gao, NJUST, China and Data61, Australia; Chang Xu, Data61, CSIRO, Sydney, Australia; Derui Wang, Swinburne University of Technology, Australia; Shiping CHEN, Data61, CSIRO, Sydney, Australia; Damith C. Ranasinghe, Auto-ID Lab, The School of Computer Science, The University of Adelaide; Nepal Surya, Data61 CSIRO AustraliaHow to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNNZheng Li, Shandong University; Chengyu Hu, Shandong University; Yang Zhang, CISPA Helmholtz Center for Information Security; Shanqing Guo, Shandong UniversityD2NN: A Fine-Grained Dual Modular Redundancy Framework for Deep Neural NetworksYu Li, The Chinese University of Hong Kong; Yannan Liu, Sangfor Technologies Inc.; Min Li, The Chinese University of Hong Kong; Ye Tian, The Chinese University of Hong Kong; Bo Luo, The Chinese University of Hong Kong; Qiang Xu, The Chinese University of Hong KongModel Inversion Attacks Against Collaborative InferenceZecheng He, Princeton University; Tianwei Zhang, Nanyang Technological University; Ruby Lee, Princeton University Session Chair: Yonghwi Kwon, University of VirginiaSystematic Comparison of Symbolic Execution Systems: Intermediate Representation and its GenerationSebastian Poeplau, EURECOM, France; Aurelien Francillon, EURECOM, FranceHow to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections)Sebastien Bardin, CEA LIST; Richard Bonichon, CEA LIST; Jean-Yves Marion, LORIA, Universite de Lorraine, CNRS, Inria; Mathilde Ollivier, CEA LISTSleak: Automating Address Space Layout DerandomizationChristophe Hauser, Information Sciences Institute, University of Southern California; Jayakrishna Menon, Arizona State University; Yan Shoshitaishvili, Arizona State University; Ruoyu Wang, Arizona State University; Christopher Kruegel, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa BarbaraSIP Shaker: Software Integrity Protection CompositionMohsen Ahmadvand, Technical University of Munich; Dennis Fischer, Technical University of Munich; Sebastian Banescu, Technical University of Munich
15:00-15:30
(Foyer)
15:30-17:00
Laguna IRoyal BallroomMiramar I
Session Chair: Randy Smith, Boeing

Defeating the PCAP Problem: Making a Mountain into a Molehill, Leigh Metcalf, Carnegie Mellon University, cert     SLIDES

“Operation CWAL”: The Dying Art of Product Penetration Testing,  Daniel Nguyen, Daniel Ladron, and Adrian Pirvu, The Boeing Company

Session Chair: Giovanni Vigna, UC Santa BarbaraDetecting organized eCommerce fraud using scalable categorical clusteringSamuel Marchal, Aalto University; Sebastian Szyller, Aalto UniversitySIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle NetworksMahsa Foruhandeh, Virginia Tech; Yanmao Man, University of Arizona; Ryan Gerdes, Virginia Tech; Ming Li, University of Arizona; Thidapat Chantam, Virginia TechImproving Intrusion Detectors by Crook-sourcingFrederico Araujo, IBM Research; Gbadebo Ayoade, The University of Texas Dallas; Khaled Al-Naami, The University of Texas at Dallas; Yang Gao, The University of Texas at Dallas; Kevin W. Hamlen, The University of Texas at Dallas; Latifur Khan, The University of Texas at DallasJStap: A Static Pre-Filter for Malicious JavaScript DetectionAurore Fass, CISPA Helmholtz Center for Information Security; Michael Backes, CISPA Helmholtz Center for Information Security; Ben Stock, CISPA Helmholtz Center for Information Security Session Chair: Ulf Lindqvist, SRI InternationalKoinonia: Verifiable E-Voting with Long-term PrivacyHuangyi Ge, Purdue University; Sze Yiu Chau, Purdue University; Victor E Gonsalves, Purdue University; Huian Li, Indiana University Purdue University Indianapolis; Tianhao Wang, Purdue University; Xukai Zou, Indiana University Purdue University Indianapolis; Ninghui Li, Purdue UniversityWhisper: A Unilateral Defense Against VoIP Traffic Re-Identification AttacksTavish Vaidya, Georgetown University; Tim Walsh, Georgetown University; Micah Sherr, Georgetown UniversityPrivacy Preserving Substring Search Protocol with Polylogarithmic Communication CostNicholas Mainardi, Politecnico di Milano; Alessandro Barenghi, Politecnico di Milano; Gerardo Pelosi, Politecnico di MilanoRevisiting Utility Metrics for Location Privacy-Preserving MechanismsVirat Shejwalkar, University of Massachusetts Amherst; Amir Houmansadr, University of Massachusetts Amherst; Hossein Pishro-Nik, University of Massachusetts Amherst; Dennis Goeckel, University of Massachusetts Amherst
18:30-21:00
(Brisas Del Mar)

Dinner will be held in Brisas Del Mar, overlooking the ocean, and will include a trio playing Latin and tropical music. After dinner, there will be a live Carnival Parade, featuring pleneros, vejigantes, bomba dancers, stilt walkers, and cabezudos - a show not to be missed!

Thursday, 12 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-9:00
(Royal Ballroom)Session Chair: Kevin Butler, University of Florida
9:00-10:00
(Royal Ballroom)Session Chair: David Balenson, SRI International

Why Your Tech Transition Will Probably Fail (And Why You Should Do It Anyway)
Patrick Traynor, Professor, University of Florida    SLIDES

10:00-10:30
(Foyer)
10:30-12:00
Laguna IRoyal BallroomMiramar I

Moderator: Daniel Faigin, The Aerospace Corporation     SLIDES

Panelists:
Michael Ekstrom, NIST/NCCoE - MITRE     SLIDES
Peter Wong, The Soter Group
José L. Quiñones-Borrero, University of Puerto Rico

Session Chair: Michalis Polychronakis, Stony Brook UniversityDetecting (Absent) App-to-app Authentication on Cross-device Short-distance ChannelsStefano Cristalli, University of Milan; Long Lu, Northeastern University; Danilo Bruschi, University of Milan; Andrea Lanzi, University of MilanAn Empirical Study of the SMS One-Time Password Authentication in Android AppsSiqi Ma, CSIRO; Runhan Feng, Shanghai Jiao Tong University; Juanru Li, Shanghai Jiao Tong University; Surya Nepal, Data61, CSIRO; Diethelm Ostry, CSIRO; Yang Liu, Xidian University; Elisa Bertino, Purdue University; Robert H. Deng, School of Information Systems, Singapore Management University, Singapore; Sanjay Jha, UNSW Sydney; Zhuo Ma, Xidian UniversityChallenge-Response Behavioral Mobile Authentication: A Comparative Study of Graphical Patterns and Cognitive GamesManar Mohamed, University of Alabama at Birmingham; Prakash Shrestha, University of Alabama at Birmingham; Nitesh Saxena, University of Alabama at BirminghamAppVeto: Mobile Application Self-Defense through Resource Access VetoTousif Osman, Concordia University; Mohammad Mannan, Concordia University; Urs Hengartner, University of Waterloo; Amr Youssef, Concordia University Session Chair: Danfeng (Daphne) Yao, Virginia TechProgressive Processing of System Behavioral QueryJiaping Gui, NEC Laboratories America, Inc.; Xusheng Xiao, Case Western Reserve University; Ding Li, NEC Laboratories America, Inc.; Chung Hwan Kim, NEC Laboratories America, Inc.; Haifeng Chen, NEC Laboratories America, Inc.SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing EnvironmentsSaeid Mofrad, Wayne State University; Ishtiaq Ahmed, Wayne State University; Shiyong Lu, Wayne State University; Ping Yang, State University of New York at Binghamton; Heming Cui, University of Hong Kong; Fengwei Zhang, Wayne State UniversityMining Least Privilege Attribute Based Access Control PoliciesMatthew Sanders, Colorado School of Mines; Chuan Yue, Colorado School of MinesMalRank: A Measure of Maliciousness in SIEM-based Knowledge GraphsPejman Najafi, Hasso Plattner Institute; Alexander Muehle, Hasso Plattner Institute; Wenzel Puenter, Hasso Plattner Institute; Feng Cheng, Hasso Plattner Institute; Christoph Meinel, Hasso Plattner Institute
12:00-13:30
(Brisas Del Mar)
13:30-15:00
Laguna IRoyal BallroomMiramar I

Moderator:
Tomas Vagoun, NITRD

Panelists:
Yinzhi Cao, JHU.    SLIDES

Raymond Brown, NSA     SLIDES
Wei-Shinn Ku, NSF

Saurabh Shintre, NortonLifeLock

Session Chair: Fengwei Zhang, SUSTechCUBISMO: Decloaking Server-side Malware via Cubist Program AnalysisAbbas Naderi-Afooshteh, University of Virginia; Yonghwi Kwon, University of Virginia; Anh Nguyen-Tuong, University of Virginia; Mandana Bagheri-Marzijarani, University of Virginia; Jack W. Davidson, University of VirginiaNeurlux: Dynamic Malware Analysis Without Feature EngineeringChani Jindal, UC Santa Barbara; Christopher Salls, UC Santa Barbara; Hojjat Aghakhani, UC Santa Barbara; Keith Long, UC Santa Barbara; Christopher Kruegel, UC Santa Barbara; Giovanni Vigna, UC Santa BarbaraA Game of "Cut and Mouse": Bypassing Antivirus by Simulating User InputsZiya Alper Genç, University of Luxembourg; Gabriele Lenzini, University of Luxembourg; Daniele Sgandurra, Royal Holloway, University of LondonMy Script Engines Know What You Did In The Dark: Converting Engines into Script API TracersToshinori Usui, NTT Secure Platform Laboratories / Institute of Industrial Science, The University of Tokyo; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Jun Miyoshi, NTT Secure Platform Laboratories; Kanta Matsuura, Institute of Industrial Science, The University of Tokyo Session Chair: Roberto Perdisci, Univesity of GeorgiaBakingTimer: Privacy Analysis of Server-Side Request Processing TimeIskander Sanchez-Rola, University of Deusto, Symantec Research Labs; Davide Balzarotti, Eurecom; Igor Santos, University of DeustoPDoT: Private DNS-over-TLS with TEE SupportYoshimichi Nakatsuka, UC Irvine; Andrew Paverd, andrew.paverd@ieee.org; Gene Tsudik, UC IrvineCasino Royale: A Deep Exploration of Illegal Online GamblingHao Yang, Tsinghua University; Kun Du, Tsinghua University; Yubao Zhang, University of Delaware; Shuang Hao, University of Texas at Dallas; Zhou Li, University of California, Irvine; Mingxuan Liu, Tsinghua University; Haining Wang, Virginia Tech; Haixin Duan, Tsinghua University, Beijing National Research Center for Information Science and Technology; Yazhou Shi, Baidu Inc.; Xiaodong Su, Baidu Inc.; Guang Liu, Baidu Inc.; Zhifeng Geng, Baidu Inc.; Jianping Wu, Tsinghua UniversityLeveraging Locality of Reference for Certificate RevocationLuke Dickinson, Sandia National Laboratories; Trevor Smith, Brigham Young University; Kent Seamons, Brigham Young University
15:00-15:30
(Foyer)
15:30-17:00
Laguna IRoyal BallroomMiramar I
Session Chair: Larry Wagoner, NSA

Hype or hope? Machine learning based security analytics for web applications, Lei Ding, Xiaoyong Yuan, and Malek Ben Salem, Accenture     SLIDES

Applying the Guilt By Association Principle to Threat Detection with Sparsely Labeled Data, Kevin Roundy, NortonLifeLock     SLIDES   

JEX: A Straightforward, Portable and Scalable Framework for Automatic Exploit Generation for Java, Mohammadreza Ashouri, University of Potsdam, Germany     SLIDES

Session Chair: Amir Herzberg, University of ConnecticutOpening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android SmartphonesImtiaz Karim, Purdue University; Fabrizio Cicala, Purdue University; Syed Rafiul Hussain, Purdue University; Omar Chowdhury, The University of Iowa; Elisa Bertino, Purdue UniversitySRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type VulnerabilitiesYu Zhang, Institute of Information Engineering, Chinese Academy of Sciences; Wei Huo, Institute of Information Engineering, Chinese Academy of Sciences; Kunpeng Jian, Institute of Information Engineering, Chinese Academy of Sciences; Ji Shi, Institute of Information Engineering, Chinese Academy of Sciences; Haoliang Lu, Institute of Information Engineering, Chinese Academy of Sciences; Longquan Liu, Institute of Information Engineering, Chinese Academy of Sciences; Chen Wang, Institute of Information Engineering, Chinese Academy of Sciences; Dandan Sun, Institute of Information Engineering, Chinese Academy of Sciences; Chao Zhang, Institute for Network Sciences and Cyberspace of Tsinghua University; Baoxu Liu, Institute of Information Engineering, Chinese Academy of SciencesPremadoma: An Operational Solution for DNS Registries to Prevent Malicious Domain RegistrationsJan Spooren, imec - DistriNet, KU Leuven, Belgium; Thomas Vissers, imec - DistriNet, KU Leuven, Belgium; Peter Janssen, EURid VZW, Belgium; Wouter Joosen, imec - DistriNet, KU Leuven, Belgium; Lieven Desmet, imec - DistriNet, KU Leuven, BelgiumCoordinated Dataflow Protection for Ultra-High Bandwidth Science NetworksVasudevan Nagendra, Stony Brook University; Vinod Yegneswaran, SRI International; Phil Porras, SRI International; Samir Das, Stony Brook University Session Chair: Vasileios Kemerlis, Brown UniversityAnalyzing Control Flow Integrity with LLVM-CFIPaul Muntean, Technical University of Munich; Matthias Neumayer, Technical University of Munich; Zhiqiang Lin, Ohio State University; Gang Tan, Penn State University; Jens Grossklags, Technical University of Munich; Claudia Eckert, Technical University of MunichMitigating Data Leakage by Protecting Memory-resident Sensitive DataTapti Palit, Stony Brook University; Fabian Monrose, University of North Carolina-Chapel Hill; Michalis Polychronakis, Stony Brook UniversityFRAMER: A Tagged-Pointer Capability System with Memory Safety ApplicationsMyoung Jin Nam, Korea University; Periklis Akritidis, Niometrics; David J Greaves, University of CambridgeFuzzBuilder: Automated building greybox fuzzing environment for C/C++ libraryJoonun Jang, Samsung Research; Huy Kang Kim, Korea University
17:15-18:15
(Royal Ballroom)Session Chair: Kevin Roundy, NortonLifeLock
18:30-20:00
(Royal Ballroom Foyer)Session Chair: Kevin Roundy, NortonLifeLock
Friday, 13 December 2019
7:30-8:30
(Brisas Del Mar)
8:30-10:00
Royal BallroomMiramar I
Session Chair: Andrea Lanzi, Universita` degli studi di MilanoThe Chatty-Sensor: A Provably-covert Channel in Cyber Physical SystemsYehonatan Kfir, Bar Ilan University, Israel; Amir Herzberg, University of Connecticut, USAHDMI-WALK: Attacking HDMI Distribution Networks via Consumer Electronic Control ProtocolLuis C Puche Rondon, Florida International University; Leonardo Babun, Florida International University; Kemal Akkaya, Florida International University; Selcuk Uluagac, Florida International UniversityOut of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based TechniquesPritam Dash, University of British Columbia; Mehdi Karimibiuki, University of British Columbia; Karthik Pattabiraman, University of British ColumbiaWooKey: Designing a Trusted and Efficient USB DeviceRyad Benadjila, ANSSI; Arnauld Michelizza, ANSSI; Mathieu Renard, ANSSI; Philippe Thierry, ANSSI; Philippe Trebuchet, ANSSI Session Chair: Kent Seamons, Brigham Young University EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware DetectionYuma Kurogome, NTT Secure Platform Laboratories; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Syogo Hayashi, NTT Security (Japan) KK; Tatsuya Mori, Waseda University / NICT; Koushik Sen, University of California, BerkeleyYour Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online AdvertisingTobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Gortz Institute for IT Security; Thorsten Holz, Ruhr University Bochum; Horst Gortz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security, Westphalian University of Applied SciencesWill You Trust This TLS Certificate? Perceptions of People Working in ITMartin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of VeniceI Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to InsidersAyako Akiyama Hasegawa, NTT Secure Platform Laboratories; Takuya Watanabe, NTT Secure Platform Laboratories; Eitaro Shioji, NTT Secure Platform Laboratories; Mitsuaki Akiyama, NTT Secure Platform Laboratories
10:00-10:30
(Foyer)
10:30-11:15
Royal BallroomMiramar I
Session Chair: Long Lu, Northeastern UniversitySpeculator: A Tool to Analyze Speculative Execution Attacks and MitigationsAndrea Mambretti, Northeastern University; Matthias Neugschwandtner, IBM Research - Zurich; Alessandro Sorniotti, IBM Research - Zurich; Engin Kirda, Northeastern University; William Robertson, Northeastern University; Anil Kurmus, IBM Research - ZurichSurvivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating SystemsRonny Chevalier, HP Labs, CentraleSupelec / Inria / CNRS / IRISA; David Plaquin, HP Labs; Chris Dalton, HP Labs; Guillaume Hiet, CentraleSupelec / Inria / CNRS / IRISA Session Chair: Ming Li, University of ArizonaRobust Keystroke Transcription from the Acoustic Side-ChannelDavid Slater, Two Six Labs, LLC; Scott Novotney, Two Six Labs, LLC; Jessica Moore, Two Six Labs, LLC; Sean Morgan, Two Six Labs, LLC; Scott Tenaglia, Two Six Labs, LLCDR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location RandomizationFerdinand Brasser, Technische Universitat Darmstadt; Srdjan Capkun, ETH Zurich; Alexandra Dmitrienko, University of Wurzburg; Tommaso Frassetto, Technische Universitat Darmstadt; Kari Kostiainen, ETH Zurich; Ahmad-Reza Sadeghi, Technische Universitat Darmstadt
11:30-12:00
(Royal Ballroom)

Don't leave early -- attend our closing plenary to learn about next year's conference and participate in our prize giveaway!

12:30-18:00
(Lobby)

Excursion to the El Yunque National Forest, the only tropical rain forest in the U.S. national forest system.

 



Powered by OpenConf®
Copyright©2002-2020 Zakon Group LLC