Papers
A List of Papers Accepted to the Academic Research Track
Full Papers
1. Randomness for Randomness Testing
Daniel Berend, Shlomi Dolev, and Manish Kumar
​
2. Non-Stopping Junctions via Traffic Scheduling
Shlomi Dolev, Ehud Gudes, Hannah Yair
​
3. Faster Post-Quantum TLS Handshakes Without Intermediate CA Certificates
Panos Kampanakis and Michael Kallitsis
​
4. Monitoring Time Series with Missing Values: A Deep Bayesian Approach
Oshri Barazani and David Tolpin
​
5. Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum
John Andrews, Michele Ciampi, and Vassilis Zikas
​
6. Simulating a Coupon Collector
Dina Barak-Pelleg and Daniel Berend
​
7. Timing Leakage Analysis of Non-Constant-Time NTT Implementations with Harvey Butterflies
Nir Drucker and Tomer Pelleg
​
8. Machine-Learning Based Objective Function Selection for Community Detection
Asa Bornstein, Amir Rubin, and Danny Hendler
​
9. A Linear-Time 2-Party Secure Merge Protocol
Rohit Nema, Brett Falk and Rafail Ostrovsky
​
10. Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling
Hen Hayoon and Yossi Oren
​
11. Predicting the Direction of Changes in the Values of Time Series for Relatively Small Training Samples
Sergey Frenkel
​
12. Differentially-Private "Draw and Discard" Machine Learning: Training Distributed Models from Enormous Crowds
Vasyl Pihur, Moti Yung and Aleksandra Korolova
​
13. Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio
Sneha Chauhan and Sugata Gangopadhyay
​
14. Blind Rotation in Fully Homomorphic Encryption with Extended Keys
Marc Joye and Pascal Paillier
​
15. Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
Novak Boskov, Noar Radami, Trishita Tiwari and Ari Trachtenberg
​
16. A Heuristic Framework to search for Approximate Mutually Unbiased Bases
Sreejit Chaudhury, Ajeet Kumar, Subhamoy Maitra, Somjit Roy and Sourav Sen Gupta
​
17. Transfer Learning for Time Series Classification Using Synthetic Data Generation
Yarden Rotem, Nathaniel Shimoni, Lior Rokach and Bracha Shapira
​
18. FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker
Michele Ciampi, Muhammad Ishaq, Malik Magdon-Ismail, Rafail Ostrovsky and Vassilis Zikas
​
19. Reinforcement Based User Scheduling for Cellular Communications
Nimrod Gradus, Asaf Cohen, Erez Biton, and Omer Gurwitz
​
20. Mutual Accountability Layer: Accountable Anonymity within Accountable Trust
Vanesa Daza, Abida Haque, Alessandra Scafuro, Alexandros Zacharakis and Arantxa Zapico​
​
21. In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms
Karim Eldefrawy, Tancrède Lepoint and Laura Tam
​
22. Auditable, Available and Resilient Private Computation on the Blockchain via MPC
Christopher Cordi, Michael P. Frank, Kasimir Gabert, Carollan Helinski, Ryan C, Kao,
Vladimir Kolsesnikov, Abrahim Ladha and Nicholas Pattengale
​
23. Botnet Attack Identification Based on SDN
Dimiter Avresky and Dobrin Dobrev
​
24. Counter Mode for Long Messages and a Long Nonce
Shay Gueron