ACM CCS 2020 - October 16-23, 2020

This year CCS is experimenting a new way for authors to pre-record their talk videos during pre-recording sessions. Authors who opted this method will present their paper live through a Zoom webinar, in sessions scheduled over a week’s time before the main conference. The purpose is to allow authors to present their work to a live audience, moderated by a session chair, as a means to creating a presentation experience closer to presenting in person. The talks will be recorded during the pre-recording sessions, and played during the main conference.

The pre-recording sessions are open to the public and there is no need to register to attend. Immediately after a session, all speakers and attendees are invited to join a coffee break on to meet and chat. This also helps you get familiarized with the virtual platform of the main conference.

For the general public, click one of the buttons to join the pre-recording sessions:

When you click to join, Zoom will prompt you to “register”. Please use your FIRST and LAST name as this will facilitate Q&A.
It is recommended to write a hello message in the chat when you join so others in the audience can see who else is in the audience.
After each presentation, there will be an opportunity for live Q&A. To ask a question, click on the “Raise Hand” button at the bottom of the screen. The session chair will call on you, allowing you to unmute yourself. When you are called on, please unmute yourself and ask your question.


All the times listed below are in U.S. Eastern Daylight Saving Time (UTC -4:00)

Names of the presenters are bolded.

Session 1: Friday, October 16, 2020

Session Chair: Ryan M. Gerdes (Virginia Tech)

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Ren Pang (Penn State University); Hua Shen (Penn State University); Xinyang Zhang (Penn State University); Shouling Ji (Zhejiang University); Yevgeniy Vorobeychik (Washington University in St. Louis); Xiapu Luo (The Hong Kong Polytechnic University); Alex X. Liu (Ant Financial Services Group); Ting Wang (Penn State)

Pointproofs: Aggregating Proofs for Multiple Vector Commitments

Sergey Gorbunov (University of Waterloo); Leonid Reyzin (Algorand and Boston University); Hoeteck Wee (CNRS, ENS, PSL, and NTT Research); Zhenfei Zhang (Algorand)

InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis

Roberto Guanciale (KTH Royal Institute of Technology); Musard Balliu (KTH Royal Institute of Technology); Mads Dam (KTH Royal Institute of Technology)

Everything is a Race and Nakamoto Always Wins

Amir Dembo (Stanford University); Sreeram Kannan (University of Washington); Ertem Nusret Tas (Stanford University); David Tse (Stanford University); Pramod Viswanath (University of Illinois at Urbana-Champaign); Xuechao Wang (University of Illinois at Urbana-Champaign); Ofer Zeitouni (Weizmann Institute of Science)

Session 2: Monday, October 19, 2020

Session Chair: Paul Gazzillo (University of Central Florida)

On the Optimality of Optimistic Responsiveness

Ittai Abraham (VMware Research); Kartik Nayak (Duke University); Ling Ren (UIUC); Nibesh Shrestha (Rochester Institute of Technology)

Secure Single-Server Aggregation with (Poly)Logarithmic Overhead

James Bell (The Alan Turing Institute); Kallista Bonawitz (Google LLC); Adrià Gascón (Google LLC); Tancrède Lepoint (Google LLC); Mariana Raykova (Google LLC)

Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks

Ben Nassi (Ben-Gurion University of the Negev); Yisroel Mirsky (Georgia Institute of Technology); Dudi Nassi (Ben-Gurion University of the Negev); Raz Ben-Netanel (Ben-Gurion University of the Negev); Oleg Drokin (Independent Researcher); Yuval Elovici (Ben Gurion University of the Negev)

Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries

Rukayat Ayomide Erinfolami (Binghamton University); Aravind Prakash (Binghamton University)

Session 3: Tuesday, October 20, 2020

Session Chair: Attila Yavuz (University of South Florida)

A 2.1 KHz Zero-Knowledge Processor with BubbleRAM

David Heath (Georgia Institute of Technology); Vladimir Kolesnikov (Georgia Tech)

CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples

Yuxin Wang (Pennsylvania State University); Zeyu Ding (Pennsylvania State University); Daniel Kifer (Pennsylvania State University); Danfeng Zhang (Pennsylvania State University)

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

Michele Campobasso (Eindhoven University of Technology); Luca Allodi (Eindhoven University of Technology)

Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations

Vadim Lyubashevsky (IBM Research - Zurich); Ngoc Khanh Nguyen (IBM Research - Zurich and ETH Zurich); Gregor Seiler (IBM Research - Zurich and ETH Zurich)

Session 4: Wednesday, October 21, 2020

Session Chair: Gang Tan (Penn State University)

The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures

Jens Hiller (RWTH Aachen University); Johanna Amann (ICSI, Corelight, LBNL); Oliver Hohlfeld (Brandenburg University of Technology)

Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection

Aditya Pakki (University of Minnesota); Kangjie Lu (University of Minnesota)

Private Summation in the Multi-Message Shuffle Model

Borja Balle (DeepMind); James Bell (The Alan Turing Institute); Adrià Gascón (Google); Kobbi Nissim (Georgetown University)

FREEDOM: Engineering a State-of-the-Art DOM Fuzzer

Wen Xu (Georgia Institute of Technology); Soyeon Park (Georgia Institute of Technology); Taesoo Kim (Georgia Institute of Technology)

Session 5: Thursday, October 22, 2020

Session Chair: Xiaoyan Sun (California State University)

A Qualitative Study of Dependency Management and Its Security Implications

Ivan Pashchenko (University of Trento, Italy); Duc Ly Vu (University of Trento, Italy); Fabio Massacci (University of Trento, Italy)

Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral

Eihal Alowaisheq (Indiana University, King Saud University); Siyuan Tang (Indiana University); Zhihao Wang (Institute of Information Engineering, Chinese Academy of Sciences); Fatemah Alharbi (Taibah University); Xiaojing Liao (Indiana University); XiaoFeng Wang (Indiana University)

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System

Joey Allen (Georgia Institute of Technology); Zheng Yang (Georgia Institute of Technology); Matthew Landen (Georgia Institute of Technology); Raghav Bhat (Georgia Institute of Technology); Harsh Grover (Georgia Institute of Technology); Andrew Chang (Georgia Institute of Technology); Yang Ji (Palo Alto Networks); Roberto Perdisci (University of Georgia and Georgia Tech); Wenke Lee (Georgia Institute of Technology)

Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China

Yiming Zhang (Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University; Department of Computer Science and Technology, Tsinghua University); Baojun Liu (Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University; Department of Computer Science and Technology, Tsinghua University; 360 Netlab); Chaoyi Lu (Institute for Network Sciences and Cyberspace, Tsinghua University; Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University; 360 Netlab); Zhou Li (University of California, Irvine); Haixin Duan (Institute for Network Sciences and Cyberspace, Tsinghua University; Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University; Qi An Xin Technology Research Institute); Shuang Hao (University of Texas at Dallas); Mingxuan Liu (Institute for Network Sciences and Cyberspace, Tsinghua University; Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University); Ying Liu (Institute for Network Sciences and Cyberspace, Tsinghua University); Dong Wang (360 Mobile Safe); Qiang Li (360 Mobile Safe)

Session 6: Thursday, October 22, 2020

Session Chair: Saman Zonouz (Rutgers University)

Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks

Riccardo Paccagnella (University of Illinois at Urbana-Champaign); Kevin Liao (Max Planck Institute for Security and Privacy); Dave (Jing) Tian (Purdue University); Adam Bates (University of Illinois at Urbana-Champaign)

Slimium: Debloating the Chromium Browser with Feature Subsetting

Chenxiong Qian (Georgia Institute of Technology); HyungJoon Koo (Georgia Institute of Technology); ChangSeok Oh (Georgia Institute of Technology); Taesoo Kim (Georgia Institute of Technology); Wenke Lee (Georgia Institute of Technology)

R^2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions

Meisam Mohammady (Concordia University); Shangyu Xie (Illinois Institute of Technology); Yuan Hong (Illinois Institute of Technology); Mengyuan Zhang (Ericsson Security Research); Lingyu Wang (Concordia University); Makan Pourzandi (Ericsson Security Research); Mourad Debbabi (Concordia University)

Asynchronous Distributed Key Generation for Computationally Secure Randomness, Consensus, and Threshold Signatures

Eleftherios Kokoris Kogias (Novi and IST Austria); Dahlia Malkhi (Novi); Alexander Spiegelman (Novi)

Session 7: Friday, October 23, 2020

Session Chair: Qi Alfred Chen (University of California, Irvine)

HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems

Efren Lopez-Morales (Arizona State University); Carlos E. Rubio-Medrano (Arizona State University); Tiffany Bao (Arizona State University); Adam Doupe (Arizona State University); Yan Shoshitaishvili (Arizona State University); Ruoyu Wang (Arizona State University); Gail-Joon Ahn (Arizona State University)

Security of Streaming Encryption in Google's Tink Library

Viet Tung Hoang (Florida State University); Yaobin Shen (Shanghai Jiao Tong Univeristy)

Usage Patterns of Privacy-Enhancing Technologies

Kovila P.L. Coopamootoo (Newcastle University)