08:30 - 09:00 | Gathering and Registration
|
09:00 - 09:15 | Welcoming Address
|
09:15 - 10:00 | Keynote Invited Talk I
- Nine Cups of Coffee for Captain Hook,
Yanki Margalit
|
10:00 - 10:30 | Coffee Break
|
|
10:30 - 12:10 | Academic Research Track - Morning Session
|
10:30 - 10:45 | - Efficient, Reusable Fuzzy Extractors from LWE,
Daniel Apon, Chongwon Cho, Karim Eldefrawy and Jonathan Katz
|
10:45 - 11:00 | - GenFace: Improving Cyber Security using Realistic Synthetic Face Generation,
Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart Gibson, Julio Hernandez-Castro and Christopher Solomon
|
11:00 - 11:15 | - Supervised detection of infected machines using anti-virus induced labels,
Tomer Cohen, Danny Hendler and Dennis Potashnik
|
11:15 - 11:30 | - Building Regular Registers with Rational Malicious Servers and Anonymous Clients,
Antonella Del Pozzo, Silvia Bonomi, Riccardo Lazzeretti and Roberto Baldoni
|
11:30 - 11:45 | - On the Optimality of the Exponential Mechanism,
Francesco Aldà and Hans Simon
|
11:45 - 12:00 | - On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups,
Hyang-Sook Lee, Seongan Lim and Ikkwon Yie
|
12:00 - 12:10 | - Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage,
Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski
|
12:10 - 12:30 | Coffee Break
|
12:30 - 14:00 | Academic Research Track - Noon Session |
12:30 - 12:45 | - The Combinatorics of Product Scanning Multiplication and Squaring,
Adam Young and Moti Yung
|
12:45 - 13:00 | - Stylometric Authorship Attribution of Collaborative Documents,
Edwin Dauber, Rebekah Overdorf and Rachel Greenstadt
|
13:00 - 13:15 | - A Distributed Investment Encryption Scheme: Investcoin,
Filipp Valovich
|
13:15 - 13:30 | - Physical Layer Security over Wiretap Channels with Random Parameters,
Ziv Goldfeld, Paul Cuff and Haim Permuter
|
13:30 - 13:45 | - Assisting Malware Analysis with Symbolic Execution: a Case Study,
Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia and Camil Demetrescu
|
13:45 - 13:50 | - Brief Announcement: A Consent Management Solution for Enterprises,
Abigail Goldsteen, Shelly Garion, Sima Nadler, Natalia Razinkov, Yosef Moatti and Paula Ta-Shma
|
13:50 - 13:55 | - Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party,
Nir Maoz and Ehud Gudes
|
13:55 - 14:00 | - Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Faults and Attacks,
Sergey Frenkel and Victor Zakharov
|
14:00 - 14:45 | Lunch Break
|
14:45 - 16:15 | Academic Research Track - Afternoon Session |
14:45 - 15:00 | - Symmetric-Key Broadcast Encryption: The Multi-Sender Case,
Cody Freitag, Jonathan Katz and Nathan Klein
|
15:00 - 15:15 | - A Supervised Auto-Tuning Approach for a Banking Fraud Detection System,
Michele Carminati, Luca Valentini and Stefano Zanero
|
15:15 - 15:30 | - Scalable Attack Path Finding for Increased Security,
Tom Gonda, Rami Puzis and Bracha Shapira
|
15:30 - 15:45 | - Learning Representations for Log Data in Cybersecurity,
Ignacio Arnaldo, Kalyan Veeramachaneni, Ankit Arun, Mei Lam, Costas Bassias and Alfredo Cuesta
|
15:45 - 16:00 | - Attack Graph Obfuscation,
Hadar Polad, Rami Puzis and Bracha Shapira
|
16:00 - 16:15 | - Malware Triage based on Static Features and Public APT Reports,
Giuseppe Laurenza, Leonardo Aniello, Riccardo Lazzeretti and Roberto Baldoni
|
16:15 - 16:30 | Coffee Break
|
16:30 - 17:15 | Keynote Invited Talk II
- Data Science: Is it Real? Is it Just Machine Learning?,
Prof. Jeffrey D. Ullman
|
17:15 - 17:45 | Entrepreneurship Pitch Track
- Entrepreneurship Pitch Track summary and naming the three best pitches finalists,
Sachin Lodha
|
17:45 - 18:15 | Panel
- The Future of Cyber Security, Cryptography and Machine Learning,
Yoav Tzruya, Yaniv Harel, Uzy Zwebner, Ran Achituv, Ayal Itzkovitz, Arik Kleinstein, Guy Horowitz, Yaron Rosenbaum
|
18:15 - 18:45 | Business Meeting
|
18:45 - | Dinner
|