The 20th Annual International Conference on Privacy, Security & Trust (PST2023)


The PST 2022 Final Program is ready (Academic Conference + Industry Summit + Workshops) here!

Keynote Speakers:

N. Asokan
Affiliation: University of Waterloo

Bio: N. Asokan is a Professor of Computer Science at the University of Waterloo (since 2019) where he holds a David R. Cheriton Chair and serves as the Executive Director of the Waterloo Cybersecurity and Privacy Institute ( He is also an adjunct professor at Aalto University where he was the founding director of the Helsinki-Aalto Institute for Cybersecurity ( He was a Professor of Computer Science at Aalto University from 2013 to 2019 and at the University of Helsinki from 2012 to 2017. Between 1995 and 2012, he worked in industrial research laboratories designing and building secure systems, first at the IBM Zurich Research Laboratory as a Research Staff Member and then at Nokia Research Center, most recently as Distinguished Researcher. Asokan's primary research theme is systems security broadly, including topics like the development and use of novel platform security features, applying cryptographic techniques to design secure protocols for distributed systems, applying machine learning techniques to security/privacy problems, and understanding/addressing the security and privacy of machine learning applications themselves. Asokan received his doctorate in Computer Science from the University of Waterloo, MS in Computer and Information Science from Syracuse University, and BTech (Hons.) in Computer Science and Engineering from the Indian Institute of Technology at Kharagpur. He is an ACM Fellow and an IEEE Fellow.
Title: Extraction of Complex DNN Models: Real Threat or Boogeyman
Abstract: The success of deep learning in many application domains has been nothing short of dramatic. The success has brought the spotlight onto security and privacy concerns with deep learning. One of them is the threat of "model extraction": when a machine learning model is made available to customers via an inference interface, a malicious customer can use repeated queries to this interface and use the information gained to construct a surrogate model. In this talk, I will describe our work in exploring whether model extraction constitutes a realistic threat. I will also discuss possible countermeasures, focussing on deterrence mechanisms that allow for the verification of ownership of ML models. Finally I will touch on the issue of conflicts that arise when protection mechanisms for multiple different threats need to be applied simultaneously to a given ML model, using ownership verification techniques as a case study.

Xinwen Fu
Affiliation: University of Massachusetts Lowell

Bio: Dr. Xinwen Fu is a Professor in the Department of Computer Science, University of Massachusetts Lowell. He was a tenured Associate Professor at University of Central Florida. His current research interests are in computer and network security and privacy. Dr. Fu has published at prestigious conferences including the four top computer security conferences (Oakland, CCS, USENIX Security and NDSS), and journals such as ACM/IEEE Transactions on Networking (ToN) and IEEE Transactions on Dependable and Secure Computing (TDSC). He spoke at various technical security conferences including Black Hat. His research was reported by various Media including CNN, Wired, Huffington Post, Forbes, Yahoo, MIT Technology Review, PC Magazine and aired on CNN Domestic and International and the State Science and Education Channel of China (CCTV 10).
Title: Unified View of IoT and CPS and Trend of Research on Microcontroller Based IoT
Abstract: In this talk, I will first present a unified view of Internet of Things (IoT) and Cyber Physical Systems (CPS), and then discuss the trend of research on microcontroller (MCU) based IoT systems. From the perspective of network topologies and structures, IoT and CPS are similar. IoT devices and CPS field devices are controlled by particular types of actuators and controllers. The controllers have the networking functionality, connecting the devices to particular types of local area networks (LANs), which may use proprietary protocols. The LANs may be connected to the Internet so that administrators may access the devices remotely. Particular servers may be installed in LANs or on the Internet facilitating remote control. We will use a smart plug system as an IoT example and smart building as an example CPS to demonstrate the unified view of IoT and CPS. There is a broad spectrum of IoT devices. We can divide them into two categories: powerful microprocessor based IoT systems that can run powerful operating systems (OSs) such as Linux; low-power MCU based IoT systems that often do not run any OS or have limited OS support such as FreeRTOS. We will present an overview of MCU based IoT research from five aspects, including hardware, OS, software, networking and data, and discuss the trend of research in those fields.

Stephen Marsh
Affiliation: Ontario Tech University

Bio: Stephen Marsh is an Associate Professor of Trust Systems at Ontario Tech University. His research expertise covers areas as diverse as human-computer interaction, wisdom, trust, regret, forgiveness, energy management, hope, privacy, communications security, socially adept technology, and democracy. He is currently examining Trustworthy AI from the perspective of AI trusting people as well as the other way around ( His seminal work on Computational Trust brought together disciplines of cognitive science, psychology, philosophy, sociology and computational sciences , founded a new research field in Computational Trust, and has continued to influence the field for almost three decades. Steve lives on a nano-farm in Eastern Ontario, from where he builds stuff, teaches, makes music (his album will be out in October!), draws (badly), writes (Trust Systems the textbook is freely available as an Open Educational Resource at, he is currently working on a fiction trilogy and a non-fiction book about Hope), blogs occasionally at and shares life with people, dogs, cats, horses, a pig, sheep, goats, chickens and lizards. He quite possibly also has bats in the belfry.
Title: “You keep using that word. I do not think it means what you think it means.” (Inigo Montoya)
Abstract: We have come a long way, haven’t we? 30 years ago this summer, the first article on Computational Trust was published and presented in a small Multi-Agent Systems workshop in Italy. At which point lots of interesting things began to happen, for many different reasons, perhaps the biggest of which was the arrival of the public Internet and the Web. The result? Not really what I expected! Multiple models, plenty of applications (perhaps there’s a link between the two?!), increased understanding perhaps, increased complexity certainly, and now a bunch of thoughts about AI. And security. Some time ago, Dieter Gollmann pointed out that trust was ‘an absolute mess’ and was not the unifying theme for security people seem to think it is (or was). Maybe. Probably. But don’t vendors love to tell us we can trust their systems? Isn’t it lovely when we can look at trust-marks, or reviews, or reputation, and other more violent means of controlling people. Like social credit, for example. Here’s the thing: ‘trust’ is so overloaded a term as to be useless, so it’s probably time to figure out what on earth we are talking about when we are talking about trust. Because, as we all know, Inigo Montoya was right.

Qiang Tang
Affiliation: The University of Sydney

Bio: Dr.Qiang Tang is currently Senior Lecturer (equal to U.S. Associate Professor) at the University of Sydney. From 2016.8 - 2020.12, he was an assistant professor at New Jersey Institute of Technology and director of JD-NJIT-ISCAS Joint Blockchain Research Lab. Before joining NJIT, he was a postdoc at Cornell. His research spans broadly on theoretical and applied cryptography, and blockchain technology, and his work appeared mostly in top security/crypto/distributed computing venues such as Crypto, Eurocrypt, Asiacrypt, TCC, CCS, USENIX Sec, NDSS, PODC and others. He won a few prestigious awards including MIT Technical Review 35 Chinese Innovators under 35, Google Faculty Award, NJIT Research Award and more. His research is supported by various federal agencies and big tech, as well as leading blockchain foundations including Ethereum, Stellar, Filecoin, Algorand and more.
Title: The Dumbo Protocol Family: Making Asynchronous Consensus Real
Abstract: Asynchronous consensus is the most robust (assuming least trust on underlying network conditions) consensus protocol, thus critical for blockchains deployed over the open Internet. Unfortunately, all previous protocols suffer from high complexity and essentially none has been widely deployed. In this talk, we will give an overview of a sequence of our recent results of Dumbo protocols on pushing asynchronous BFT consensus to the optimal complexity, and finally, real.

Important Dates

Paper Submission:
May 2, 2022
April 15, 2022

Acceptance Notification:
June 13, 2022
June 3, 2022

July 1, 2022
Author Registration:
July 1, 2022
Industry Summit Early Registration:
July 8, 2022

Conference Date:
August 22-24, 2022