History
PST 2018, UKPST 2017, Canada
PST 2016, New Zealand
PST 2015, Turkey
PST 2014, Canada
PST 2013, Catalonia
PST 2012, France
PST 2011, Canada
PST 2010, Canada
PST 2009, Canada
PST 2008, Canada
PST 2007, Canada
PST 2006, Canada
PST 2005, Canada
PST 2004, Canada
Proceedings of the PST2019 Conference
PROCEEDINGS E-BOOK
Click here to access the PST2019 proceedings!Camera ready instructions
For camera ready instructions click here!Accepted apapers and posters
Regular Papers
- Khalid Mursi, Yu Zhuang, Mohammed Alkatheiri and Ahmad Aseeri. Extensive Examination of XOR Arbiter PUFs as Security Primitives for Resource-Constrained IoT Devices
- Elahe Fazeldehkordi, Olaf Owe and Josef Noll. Security and Privacy Functionalities in IoT
- Jehyun Lee, Debin Gao and Akshaya Venkateswara Raja. SplitSecond: Flexible Privilege Separation of Android Apps
- Jessica Staddon and Noelle Easterday. "it's a generally exhausting field": A Large-Scale Study of Security Incident Management Workflows and Pain Points
- Xue Bai, Licheng Wang, Lijing Zhou, Lixiang Li and Sijia Yang. RZcash A Privacy Protection Scheme for the Account-based Blockchain
- Xiaoya Hu, Licheng Wang, Lijing Zhou, Lixiang Li, and Sijia Yang. A blockchain-based loan over-prevention mechanism
- Babins Shrestha, Manar Mohamed, and Nitesh Saxena. ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics
- Munir Geden, and Kasper Rasmussen. Hardware-assisted Remote Runtime Attestation for Critical Embedded Systems
- Jimmy Tekli, Bechara Al Bouna, Raphael Couturier, Gilbert Tekli, Zeinab Al Zein, and Marc Kamradt. A Framework for Evaluating Image Obfuscation under Deep Learning-Assisted Privacy Attacks
- Xin Yang, and Lei Shi. Ari: a P2P optimization for blockchain systems
- Jason Chang, and Rongxing Lu. Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data
- Maliheh Shirvanian, and Nitesh Saxena. Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations
- Yomna Abdelaziz, Daniela Napoli, and Sonia Chiasson. End-Users and Service Providers: Trust and Distributed Responsibility for Account Security
- Sophie Le Page, and Guy-Vincent Jourdan. Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks
- Ajaya Neupane, Kiavash Satvat, Mahshid Hosseini, and Nitesh Saxena. Brain Hemorrhage: When Brainwaves Leak Sensitive Medical Conditions and Personal Information
- Hemant Gupta, and Paul van Oorschot, Onboarding and Software Update Architecture for IoT Devices
- Duc-Phong Le, Guomin Yang, and Ali Ghorbani. A New Multisignature Scheme with Public Key Aggregation for Blockchain
- Liang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, and Xuemin (Sherman) Shen. Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing
- S Abhishek Anand, Payton Walker, and Nitesh Saxena. Compromising Speech Privacy under Continuous Masking in Personal Spaces
- Alaadin Addas, Julie Thorpe, Amirali Salehi-Abari. Geographic Hints for Passphrase Authentication
- Zakery Fyke, Isaac Griswold-Steiner, and Abdul Serwadda. Prying into Private Spaces Using Mobile DeviceMotion Sensors
- Hamid Azimy, and Ali Ghorbani, Competitive Selfish Mining
- Espen Kjellstadli Lund, Mariusz Nowostawski, Abylay Satybaldy and Nader Aeinehchi, Privacy-preserving Tax-case Processing
Short Papers
- Sultan Alqahtani, and Juergen Rilling. Semantic Modeling Approach for Software Vulnerabilities Data Sources
- Milica Stojmenovi Eric Spero, Temitayo Oyelowo, and Robert Biddle. Website Identity Notification: Testing the Simplest Thing That Could Possibly Work
- Batnyam Enkhtaivan, Takao Takenouchi, and Kazue Sako. A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain
- Kazuya Kakizaki, Kosuke Yoshida, and Tsubasa Takahashi. GlassMasq: Adversarial Examples Masquerading in Face Identification Systems with Feature Extractor
- Alaadin Addas, Amirali Salehi-Abari,and Julie Thorpe. Geographical Security Questions for Fallback Authentication
- Stefan Wueller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Foerg, and Susanne Wetzel. Privacy-Preserving Multi-Party Conditional Random Selection
- Amit Maraj, Miguel Vargas Martin, Matthew Shane, and Mohammad Mannan. On the null relationship between personality types and passwords
- Guruprasad Eswaraiah, Lalitha Muthu Subramanian, and Roopa Vishwanathan. Exploring Automation in Proofs of Attribute-basedEncryption in the Standard Model
- Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, and Olivier Zendra. Model Checking the IKEv2 Protocol Using Spin
- Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, and Shinsaku Kiyomoto. On Embedding Backdoor in Malware Detectors Using Machine Learning
- Christopher Bellman, and Paul van Oorschot. Analysis, Implications, and Challenges of an Evolving Consumer IoT Security Landscape
- Lalitha Muthu Subramanian, Guruprasad Eswaraiah, and Roopa Vishwanathan. Rebalancing in Acyclic Payment Networks
- Mahdi Daghmehchi Firoozjaei, Ali Ghorbani, Hyoungshick Kim, and Jaeseung Song. EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging
- Pouyan Momeni, Yu Wang, and Reza Samavi. Machine Learning Model for Smart ContractsSecurity Analysis
- Iago Ochôa, Leonardo Calbusch, Karize Viecelli, Juan De Paz, Valderi Leithardt, and Cesar Zeferino. Privacy in the Internet of Things: A Study to Protect User's Data in LPR Systems Using Blockchain
- Jafar Haadi Jafarian, and Kuntal Das. A Novel Permutational Sampling Technique for Cooperative Network Scanning
- Matthew Hagan, Fahad Siddiqui, and Sakir Sezer. Enhancing Security and Privacy of Next-Generation Edge Computing Technologies
- Meriem Smache, Alexis Olivereau, Assia Tria and Thibault Franco-Rondisson. Time Synchronization Attack Scenarios and Analysis of Effective Self-Detection Parameters in a Distributed Industrial Wireless Sensor Network
Posters
- Mary Bispham, Ioannis Agrafiotis, Michael Goldsmith and Swetlana Schuster. Proposals for Novel Defence Mechanisms against Attacks via the Speech Interface
- Eric Spero, Milica Stojmenovi, Zahra Hassanzadeh, Sonia Chiasson, and Robert Biddle. Mixed Pictures: Mental Models of Malware
- Timothy Chadza, onstantinos Kyriakopoulos, and Sangarapillai Lambotharan. Contemporary Sequential Network Attacks Prediction using Hidden Markov Model
- DAVID LIAU, Razieh Nokhbeh Zaeem, and Suzanne Barber. Evaluation Framework for Future Privacy Protection Systems
- Muhamad Erza Aminanto, Lei Zhu, Tao Ban, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue. Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest
- May Almousa, Mohd Anwar. Detecting Exploit Websites Using Browser-based Predictive Analytics
- Andrew Foresi, Reza Samavi. User Authentication Using Keystroke Dynamics via Crowdsourcing
- Yu Wang, Reza Samavi, Nitin Sood. Blockchain-based Marketplace for Software Testing
- Sultan Alqahtani. Automated Extraction of Security Concerns from Bug Reports
Important Dates
Paper Submission:Acceptance Notification:
Camera-Ready:
Early-Bird Registration:
12 July 2019
Registration:
5 August 2019
Conference Date:
26-28 August 2019
Poster Submission:
5 July 2019
Acceptance Notification:
15 July 2019
Poster Author Registration:
22 July 2019