Papers
A List of Papers Accepted to the Academic Research Track
Full Papers
1. Randomness for Randomness Testing
Daniel Berend, Shlomi Dolev, and Manish Kumar
2. Non-Stopping Junctions via Traffic Scheduling
Shlomi Dolev, Ehud Gudes, Hannah Yair
3. Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates
Panos Kampanakis and Michael Kallitsis
4. Monitoring Time Series with Missing Values: A Deep Bayesian Approach
Oshri Barazani and David Tolpin
5. Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews, Michele Ciampi, and Vassilis Zikas
6. Simulating a Coupon Collector
Dina Barak-Pelleg and Daniel Berend
7. Timing Leakage Analysis of Non-Constant-Time NTT Implementations with Harvey Butterflies
Nir Drucker and Tomer Pelleg
8. Machine-Learning Based Objective Function Selection for Community Detection
Asa Bornstein, Amir Rubin, and Danny Hendler
9. A Linear-Time 2-Party Secure Merge Protocol
Rohit Nema, Brett Falk and Rafail Ostrovsky
10. Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
Hen Hayoon and Yossi Oren
11. Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
Sergey Frenkel
12. Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Models from Enormous Crowds
Vasyl Pihur, Moti Yung and Aleksandra Korolova
13. Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
Sneha Chauhan and Sugata Gangopadhyay
14. Blind Rotation in Fully Homomorphic Encryption with Extended Keys
Marc Joye and Pascal Paillier
15. Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
Novak Boskov, Noar Radami, Trishita Tiwari and Ari Trachtenberg
16. A Heuristic Framework to search for Approximate Mutually Unbiased Bases
Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy and Sourav Sen Gupta
17. Transfer Learning for Time Series Classification Using Synthetic Data Generation
Yarden Rotem, Nathaniel Shimoni, Lior Rokach and Bracha Shapira
18. FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky and Vassilis Zikas
19. Reinforcement Based User Scheduling for Cellular Communications
Nimrod Gradus, Asaf Cohen, Erez Biton, and Omer Gurwitz
20. Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis and Arantxa Zapico
21. In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms
Karim Eldefrawy, Tancrède Lepoint and Laura Tam
22. Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C, Kao,
Vladimir Kolsesnikov, Abrahim Ladha and Nicholas Pattengale
23. Botnet Attack Identification Based on SDN
Dimiter Avresky and Dobrin Dobrev
24. Counter Mode for Long Messages and a Long Nonce
Shay Gueron