The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
About
Virtual Event
June 30 - July 1, 2022
Academic Track
Submission deadline: February 7th, February 11th, February 15, 2022
Final Deadline Extension to February 18, 2022
Acceptance notification: March 14, 2022
Camera-ready copy due: March 31, 2022
Entrepreneurship (Pitch) Track
Submission Deadline: June 12, 2022, Extension to June 19, 2022
Final Deadline Extension to June 26, 2022
PhD and Masters Track Papers
Submission Deadline: June 12, 2022, Extension to June 19, 2022
Final Deadline Extension to June 26, 2022
General Information
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Call for Submissions
The Symposium is an international forum for researchers, entrepreneurs and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and, in particular, of conceptually innovative topics in the scope.
The Symposium will have three tracks: Academic Research Track, Entrepreneurship Pitch Track, and PhD Masters Student Research Track.
Academic Track Submission Final Deadline Extension to 18 February, 2022 via Easychair
The Academic Research Track is for new and original research results.
Researchers may submit either a regular presentation or a short paper.
Proceedings will be published in Springer's LNCS, Lecture Notes in Computer Science.
See more information on the Academic Track Page
Entrepreneurship Pitch Track Submission Final Deadline Extension 26 June, 2022 via sending to nhsa 'at' post.bgu.ac.il.
Entrepreneurs are invited to submit a presentation of a short pitch which will be presented in front of VC's and industry representatives. An entrepreneurship pitch submission must not exceed a 6 page Powerpoint or PDF abstract. Authors of the entrepreneurship pitch submissions - please note that the submissions will not be NDA protected.
See more information on the Entrepreneur (Pitch) Track Page
Ph.D. and Masters Student Research Track Submission Final Deadline Extension 26 June, 2022 via Easychair or email to nhsa 'at' post.bgu.ac.il.
There is an opportunity for PhD and Masters students to submit their work in progress. This offers an opportunity to present their work in progress and to solicit comments from their peers, academicians, and industry experts. Accepted submissions will be gathered in a Technical Report of NHSA (just like previous year).
See more information on the PhD/Masters Track Page
Publication
Regular papers will be included in the Springer LNCS, Lecture Notes in Computer Science.
Extended and revised versions of selected papers will be considered for a special issue in the
Journal of Computer and System Sciences
.
Please make sure to fill out and send to nhsa 'at' post.bgu.ac.il the LNCS Consent to Publish form. The form has to be signed by the authors of each paper, at least by the corresponding author.
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
June 30-July 1, 2022
Congratulations to all of our 2022 winners!
Keynote Speakers
Sponsored By:
Registration
Registration is required in order to participate in the CSCML 2022 conference. At least one author of each paper must register for the conference.
IMPORTANT NOTES:
Due to the Coronavirus CSCML 2022 will be held virtually via Zoom, as such we have decided to offer FREE registration to all tracks.
Registration will close on June 30th at 7:00am (IDT).
Please follow the link below to register or email nhsa "at" post.bgu.ac.il for more information and to register.
Upcoming Events
- Thu, Jun 29ZoomJun 29, 2023, 8:00 AM GMT+3 – Jun 30, 2023, 5:00 PM GMT+3ZoomJun 29, 2023, 8:00 AM GMT+3 – Jun 30, 2023, 5:00 PM GMT+3ZoomThe Symposium is an international forum for researchers and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks; and, in particular, of conceptually innovative results.
- Thu, Jun 30ZoomJun 30, 2022, 8:00 AM GMT+3 – Jul 01, 2022, 6:00 PM GMT+3ZoomJun 30, 2022, 8:00 AM GMT+3 – Jul 01, 2022, 6:00 PM GMT+3ZoomThe Symposium is an international forum for researchers and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks; and, in particular, of conceptually innovative results.
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Proceedings and Recordings
Thank you so much for joining us and participating in CSCML 2022!
After the Completion of the Conference, you will find the links to the Conference Proceedings, the Technical Report and the recordings of the sessions below.
CSCML 2022 Proceedings
Academic Track
Please click here to access the 6th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2022) Proceedings.
PhD/Masters Track
Please click here to access the 6th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2022) Technical Report.
CSCML 2022 Session Recordings
Ceremonies and Speakers
Academic Track Sessions
Entrepreneurship (Pitch) Track Sessions
PhD/Masters Track Sessions
The Cultural Mosaic of Israel Virtual Tour
Capture the Flag Mini Hackathon
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Organization
Program Committee
General Chairs
-
Shlomi Dolev, Chair, Ben-Gurion University, Israel
Program Committee Co-Chairs
-
Jonathan Katz, PC Co-Chair, University of Maryland, USA
-
Amnon Meisels, PC Co-Chair, Ben-Gurion University, Israel
Academic Research Track Program Committee
-
Gilad Asharov, Bar-Ilan University, Israel
-
Manuel Barbosa, HASLAB-INESC TEC and FCUP, Portugal
-
Don Beaver, Meta, Novi Research, USA
-
Alex Biryukov, University of Luxembourg, Luxembourg
-
Dor Bitan, University of California, Berkeley, USA
-
Carlo Blundo, Università degli Studi di Salerno, Italy
-
Harry Buhrman, CWI, University of Amsterdam, and QuSoft, The Netherlands
-
Ashish Choudhury, The International Institute of Information Technology, India
-
Hadassa Daltrophe, Sami Shamoon College of Engineering, Israel
-
Stefan Dziembowski, University of Warsaw, Poland
-
Oren Freifeld, Ben-Gurion University of the Negev, Israel
-
Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Germany
-
Benjamin Fuller, University of Connecticut, USA
-
Juan A. Garay, Texas A&M University, USA
-
Craig Gentry, Algorand Foundation, USA
-
Niv Gilboa, Ben-Gurion University of the Negev, Israel
-
Ehud Gudes,Ben-Gurion University of the Negev, Israel
-
Shay Gueron, University of Haifa and Amazon, Israel
-
David Heath, Georgia Institute of Technology, USA
-
Gene Itkis, MIT Lincoln Lab and US Military Academy, West Point, USA
-
Bhavana Kanukurthi, Indian Institute of Science, India
-
Jonathan Katz, PC Co-Chair, University of Maryland, USA
-
Çetin Kaya Koç, University of California Santa Barbara, USA
-
Vladimir Kolesnikov, Georgia Institute of Technology, USA
-
Benjamin Kreuter, University of Virginia and Google, USA
-
Ranjit Kumaresan, University of Maryland, USA
-
Daniel Masny, Meta, USA
-
Amnon Meisels, PC Co-Chair, Ben-Gurion University of the Negev, Israel
-
Thomas Peyrin, Nanyang Technological University, Singapore
-
Rami Puzis, Ben Gurion University of the Negev, Israel
-
Eyal Ronen, Tel Aviv University, Israel
-
Alexander Russell, University of Connecticut, USA
-
Alessandra Scafuro, North Carolina State University, USA
-
Berry Schoenmakers, Eindhoven University of Technology, The Netherlands
-
Gil Segev, Hebrew University of Jerusalem, Israel
-
Qiang Tang, University of Sydney, Australia
-
Tamir Tassa, The Open University of Israel, Israel
-
Nikos Triandopoulos, Stevens Institute of Technology, USA
-
Ni Trieu, Arizona State University, USA
-
Eran Tromer, Tel Aviv University, Israel
-
Boaz Tsaban, Bar-Ilan University, Israel
-
Marten van Dijk, Centrum Wiskunde & Informatica, The Netherlands
-
Daniele Venturi, Sapienza University of Rome, Italy
-
Avishai Wool, Tel Aviv University and AlgoSec, Israel
-
Vassilis Zikas, Purdue University, USA
Entrepreneurship (Pitch) Track Program Committee
-
Tal Abuloff, Grove Ventures, Israel
-
Avi Arnon, Citi Ventures, Israel
-
Adi Azulay, Cactus Capital, Israel
-
Eyal Balicer, Citi Ventures, Israel
-
Aviad Ben-Laish, Accenture Ventures, Israel
-
Yonah Alexandre Bronstein, Co-Chair, ASTAV inc, Israel
-
Ariel Cohen, AnD Ventures, Israel
-
Netta Cohen, Incubit Ventures, Israel
-
Nimrod Cohen, TAU Ventures, Israel
-
Ekta Dang, U First Capital, CA, USA
-
Adi Dangot Zukovsky, Battery Ventures, Israel
-
Shlomi Dolev, Co-Chair, BGU-NHSA, Israel
-
Irad Dor, M12 - Microsoft's Venture Fund, Israel
-
Ofir Eliasi, Nimble, Israel
-
Haim Emil Dahan, ASYD Investments, Ltd., Israel
-
Avi Eyal, Entrée Capital, United Kingdom
-
Ben Gilad, Tata Consultancy Services, Israel
-
Nimrod Gindi, Nvidia, Israel
-
Roman Gold, Venture Israel, Israel
-
Hillel Gross, Founder and CEO, Hi-Gross Ltd., Israel
-
Yodfat Harel Buchris, Blumberg Capital, Israel
-
Barrel Kfir, Vintage Investment Partners, Israel
-
Arik Kleinstein, Glilot Capital Partners, Israel
-
Eitan Naor, IN Venture, Israel
-
Moran Nir, Amazon Web Services, Israel
-
Gilbert Ohana, FinTLV Ventures, Israel
-
Milly Perry, The Israeli Chamber of Information Technology, Israel
-
Gadi Porat, JVP Cyber Labs, Israel
-
Nicole Priel, Ibex Investors LLC, Israel
-
Moshe Sarfaty, Aristagora Venture Capital, Israel
-
Amir Schwartz, M365 Security, Israel
-
Eyal Shani, Benson Oak Ventures, USA
-
Elad Shemesh, TGT, Israel
-
Raul Shnier, FinSec Innovation Lab - Startup Accelerator by Mastercard & Enel, Israel
-
Yair Shoham, Intel Capital, Israel
-
Yaron Wolfsthal, IBM, Israel
-
Yoram Yaacovi, SCGC Capital, Inc., Israel
-
Guy Zbarsky, AltaIR Capital, Israel
-
Roy Zwebner, Gav-Yam Negev Advanced Technologies Park, Israel
PhD Student Research Track Committee
-
Oded Margalit, PhD Track Chair, Ben-Gurion University and Cyber Innovation Lab at Citi
Steering Committee
-
Orna Berry, CTO Google Cloud, Israel
-
Shlomi Dolev, Chair, Ben-Gurion University of the Negev, Israel
-
Yuval Elovici,Ben-Gurion University of the Negev, Israel
-
Bezalel Gavish, Southern Methodist University, USA
-
Ehud Gudes,Ben-Gurion University of the Negev, Israel
-
Jonathan Katz, University of Maryland, USA
-
Rafail Ostrovsky, UCLA, USA
-
Jeffrey D. Ullman, Stanford University, USA
-
Kalyan Veeramachaneni, MIT, USA
-
Yaron Wolfsthal, IBM, Israel
-
Moti Yung, Columbia University and Google, USA
Conference Committee
-
Rosemary Franklin, Organizing Chair, Ben-Gurion University of the Negev, Israel
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Papers
A List of Papers Accepted to the Academic Research Track
Full Papers
1. Randomness for Randomness Testing
Daniel Berend, Shlomi Dolev, and Manish Kumar
2. Non-Stopping Junctions via Traffic Scheduling
Shlomi Dolev, Ehud Gudes, Hannah Yair
3. Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates
Panos Kampanakis and Michael Kallitsis
4. Monitoring Time Series with Missing Values: A Deep Bayesian Approach
Oshri Barazani and David Tolpin
5. Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews, Michele Ciampi, and Vassilis Zikas
6. Simulating a Coupon Collector
Dina Barak-Pelleg and Daniel Berend
7. Timing Leakage Analysis of Non-Constant-Time NTT Implementations with Harvey Butterflies
Nir Drucker and Tomer Pelleg
8. Machine-Learning Based Objective Function Selection for Community Detection
Asa Bornstein, Amir Rubin, and Danny Hendler
9. A Linear-Time 2-Party Secure Merge Protocol
Rohit Nema, Brett Falk and Rafail Ostrovsky
10. Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
Hen Hayoon and Yossi Oren
11. Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
Sergey Frenkel
12. Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Models from Enormous Crowds
Vasyl Pihur, Moti Yung and Aleksandra Korolova
13. Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
Sneha Chauhan and Sugata Gangopadhyay
14. Blind Rotation in Fully Homomorphic Encryption with Extended Keys
Marc Joye and Pascal Paillier
15. Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
Novak Boskov, Noar Radami, Trishita Tiwari and Ari Trachtenberg
16. A Heuristic Framework to search for Approximate Mutually Unbiased Bases
Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy and Sourav Sen Gupta
17. Transfer Learning for Time Series Classification Using Synthetic Data Generation
Yarden Rotem, Nathaniel Shimoni, Lior Rokach and Bracha Shapira
18. FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky and Vassilis Zikas
19. Reinforcement Based User Scheduling for Cellular Communications
Nimrod Gradus, Asaf Cohen, Erez Biton, and Omer Gurwitz
20. Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis and Arantxa Zapico
21. In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms
Karim Eldefrawy, Tancrède Lepoint and Laura Tam
22. Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C, Kao,
Vladimir Kolsesnikov, Abrahim Ladha and Nicholas Pattengale
23. Botnet Attack Identification Based on SDN
Dimiter Avresky and Dobrin Dobrev
24. Counter Mode for Long Messages and a Long Nonce
Shay Gueron
Short Papers
1. On the Undecidability of the Panopticon Detection Problem
Yannis Stamatiou, Vasiliki Liagkou, Panagiotis Nastou, and Paul Spirakis
2. Privacy Preserving Solution of DCOPs by Mediation
Pablo Kogan, Tamir Tassa, and Tal Grinshpoun
3. Privacy-Preserving Contrastive Explanations with Local Foil Trees
Thijs Veugen, Bart Kamphorst, and Michiel Marcus
4. Predicting Subscriber Usage: Analyzing Multidimensional Time-Series Using Convolutional Neural
Networks
Benjamin Azaria and Lee-Ad Gottlieb
5. Setting Up an Anonymous Gesture Database as well as Enhancing it with a Verbal Script Simulator for
Rehabilitation Applications
Yoram Segal and Ofer Hadar
6. Smart Cybercrime Classification for Digital Forensics with Small Datasets
Isfaque Al Kaderi Tuhin, Peter Loh and Zhengkui Wang
7. Enhancing Cybersecurity of Satellites at Sub-THz Band
Rajnish Kumar and Shlomi Arnon
8. Detecting Clickbait in Online Social Media: You Won't Believe How We Did It
Aviad Elyashar, Jorge Bendahan and Rami Puzis
9. Fake News Detection in Social Networks using Machine Learning and Trust
Nadav Voloch, Ehud Gudes, Nurit Gal-Oz, Rotem Mitrany, Ofri Shani and Maayan Shoel
10. BFLUT Bloom Filter for Private Look Up Tables
Shlomi Dolev, Ehud Gudes, Erez Segev, Jeffery Ullman and Grisha Weintraub
11. Polynomial Approximation of Inverse sqrt Function for FHE
Samanvaya Panda
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
CSCML 2022 Sessions Schedule
Click the button to download the schedule
Click the button to download the Zoom link information
Capture the Flag:
Mini Hackathon
In order to get the Zombies please send an email to cscml@codeguru.co.il with your details
To Participate- Register in the following Discord channel: https://discord.gg/khwZgKxB
Capture the Flag is a mini hackathon which will take place on 30 June - 1 July, 2022 as part of CSCML 2022.
The mini hackathon is sponsored by and in cooperation with IBM Cyber Security Center of Excellence (CCoE)
Date: Wednesday, June 29 - Friday, July 1, 2022
Time: 18:00 on June 29th - 11:00am on July 1st
Location: This year Capture the Flag (CTF) will be a virtual event
IMPORTANT NOTES:
Due to the coronavirus CSCML 2022 will be held virtually via Zoom,
as such we have decided to offer FREE registration to all tracks.
In order to get the Zombies please send an email to cscml@codeguru.co.il with your details
To Participate- Register in the following Discord channel: https://discord.gg/khwZgKxB
Please follow this link to our Event Registration page or email nhsa "at" post.bgu.ac.il
for more information and to register
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Call for PhD and Masters Track Papers
PhD and Masters Student Research Track Submission Deadline 12 June, 19 June
Final Deadline Extension 26 June, 2022 23:59 anywhere
The Symposium is an international forum for researchers, entrepreneurs and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and, in particular, of conceptually innovative topics in the scope.
The PhD and Masters Track is for graduate students (PhD and Masters) to expose their research to peers by submitting their work in progress. This offers an opportunity for them to present their work in progress and to solicit comments from their peers, academicians, and industry experts. Accepted submissions will be gathered in a Technical Report of NHSA (just like previous year)
This will not block publications in other venues as it is only a technical report level.
Submissions for the PhD and Masters Track Papers
Submission Requirements: LNCS format papers for PhD track (see the last year papers here)
Submission Deadline: June 12, June 19, 2022- registration in Easychair and few paragraphs abstract
Final Deadline Extension to June 26, 2022
Submission to PhD Track is open here on Easychair
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Call for Pitches for the Entrepreneur (Pitch) Track
Entrepreneurship Pitch Track Submission Deadline 12 June, 19 June, 2022
Final Deadline Extension to 26 June, 2022 23:59 anywhere
All Entrepreneurship Pitches should be submitted by sending to nhsa 'at' post.bgu.ac.il.
The Symposium is an international forum for researchers, entrepreneurs and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and, in particular, of conceptually innovative topics in the scope, however, pitches do not have to remain within the scope of this conference. Pitches are open to any scope.
Entrepreneurs: (including those in startup companies and those who just have brilliant ideas) are invited to submit a presentation of a short pitch which will be presented in front of VC's and industry representatives. An entrepreneurship pitch submission must be either a powerpoint presentation (about 6 slides) or a one-pager (PDF abstract).
Authors of the entrepreneurship pitch submissions - please note that the submissions will not be NDA protected.
Submissions for the Entrepreneur (Pitch) Track
Entrepreneur (Pitch) Track: We have leading VC that are looking forward to exploring investment opportunities.
Accepted pitches will be presented during the "Entrepreneurship Pitch Track" in front of VCs and industry experts in the country. The best pitch will receive the Gavish prize of $500 In addition, the selected 3 best pitches will get a certificate of excellence of innovation.
Pitch Format: About 15 minutes (including a Q&A) accompanied by six page abstracts/pitch presentation.
Submission Requirements:
An entrepreneurship pitch submission is usually a one pager or pitch slide deck that must not exceed 6 single-column pages.
(The authors of the entrepreneurship pitch track please note that the submissions will not be NDA protected)
Submission Deadline: June 12, June 19, 2022
Final Deadline Extension to June 26, 2022
Submission to Pitch Track can be emailed to nhsa@post.bgu.ac.il
The 6th International Symposium of Cyber Security, Cryptology and Machine Learning (CSCML 2022)
Call for Papers for the Academic Track
Academic Track Submission Deadline 7 February, Extension to 11 February, Extension to 15, February
Final Deadline Extension to 18 February, 2022 23:59 anywhere
The Symposium is an international forum for researchers, entrepreneurs and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and, in particular, of conceptually innovative topics in the scope.
The Academic Research Track is for new and original research results. Researchers may submit either a regular presentation or a short paper. More information regarding submissions can be found on the submissions page.
Proceedings will be published in Springer's LNCS, Lecture Notes in Computer Science.
Please make sure to fill out and send to nhsa 'at' post.bgu.ac.il the LNCS Consent to Publish form. The form has to be signed by the authors of each paper, at least by the corresponding author.
Only authors employed by the EU (as an institution) should tick that particular box. If you work in a country in the European Union, you do NOT have to tick that box. Equally, the box for US Government employees should only be ticked by US Government employees.
To download the LNCS Consent to Publish form, click the button.
Submissions for the Academic Track
Conference presentations will have two formats
1. Regular presentations: of 20-25 minutes accompanied by papers of 12-15+ pages in the proceedings. This form is intended for contributions reporting on original research, submitted exclusively to this conference.
2. Short Papers: of 5-10 minutes accompanied by papers of 6-11 pages in the proceedings. Such submissions may describe work in progress or work presented elsewhere.
Submission Requirements:
Papers are to be submitted electronically in Easychair. Each submission must be in English, in PDF format, and begin with a cover page including: (1) the title, (2) the names and affiliations of all authors, (3) contact author’s email and address, (4) a couple of paragraphs abstract of the paper, (5) indication whether the paper is a regular submission, or a short paper submission.
A regular submission must be 12-15+ (LNCS formatted) single-column pages (excluding cover page and references). Additional necessary details may be included in a clearly marked appendix that will be read at the discretion of the program committee.
If requested by the authors on the cover page, a regular submission can also be considered for a short paper.