21st Annual International Conference on Privacy, Security, and Trust (PST2024)
Technically Co-sponsored by IEEE Computer Society
18 October 2024 - Industry Summit - Fredericton, NB, Canada - In-Person & Online
28-30 August 2024 - Sydney, Australia (Hybrid)

Accepted Papers:

Track: Privacy

  1. Mst Mahamuda Sarkar Mithila, Fangyi Yu, Miguel Vargas Martin and Shengqian Wang - Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension
  2. Costanza Alfieri, Suryia Ganesh, Limin Ge, Jingxin Shi and Norman Sadeh - Exploring Sensitivity in Amazon Reviews: Detection and Rephrasing with ChatGPT
  3. Malte Breuer, Ulrike Meyer and Susanne Wetzel - Efficient Integration of Exchange Chains in Privacy-Preserving Kidney Exchange
  4. Jesse Merhi, Erik Buchholz and Salil S. Kanhere - Synthetic Trajectory Generation Through Convolutional Neural Networks
  5. Atthapan Daramas, Vimal Kumar and Marinho Barcellos - Quantifying Privacy in Cooperative Awareness Services Through Trajectory Reconstruction
  6. Jinglin Sun, Basem Suleiman and Imdad Ullah - Effectiveness of Privacy-Preserving Algorithms for Large Language Models: A Benchmark Analysis
  7. Masaya Kobayashi, Atsushi Fujioka, Koji Chida, Akira Nagai and Kan Yasuda - $Pk$-Anonymization Meets Differential Privacy
  8. Huanyi Ye, Ziyao Liu, Yu Jiang, Jiale Guo and Kwok-Yan Lam - Malicious Unlearning in Ensemble Models
  9. Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa - Group Signatures with Designated Traceability over Openers' Attributes from Symmetric-Key Primitives
  10. Mahmuda Akter, Nour Moustafa and Benjamin Turnbull - PEL: Privacy Embedded Learning in Smart Healthcare Systems
Track: Security
  1. Juliet Samandari and Clémentine Gritti - Post Quantum Authentication and Integrity in 3-Layer IoT Architectures
  2. Duc-Thuan Dam, Trong-Hung Nguyen, Thai-Ha Tran, Binh Kieu-Do-Nguyen, Trong-Thuc Hoang and Cong-Kha Pham - An Efficient Method for Accelerating Kyber and Dilithium Post-Quantum Cryptography
  3. Sandro Rodriguez Garzon, Dennis Natusch, Artur Philipp, Axel Küpper, Hans Joachim Einsiedler and Daniela Schneider - DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials
  4. Ahmed Tanvir Mahdad and Nitesh Saxena - Mobile Login Bridge: Subverting 2FA and Passwordless Authentication via Android Debug Bridge
  5. Mohammed-El-Amin Tebib, Oum-El-Kheir Aktouf, Pascal André and Mariem Graa - XXXBench: A Benchmark Capturing Privilege Escalation Vulnerabilities in Android
  6. Mohamed Abdelsalam, Isaac Mpidi Bita, Simon Greiner, Oum-El-Kheir Aktouf and Annabelle Mercier - Model-Based Security Analysis of Interconnected Subsystems: A Methodology for Security Compatibility Evaluation
  7. Kevin Saric, Gowri Sankar Ramachandran, Raja Jurdak and Surya Nepal - Efficient Data Security Using Predictions of File Availability on the Web
  8. William Aiken, Paula Branco and Guy-Vincent Jourdan - DevilDiffusion: Embedding Hidden Noise Backdoors into Diffusion Models
  9. Anuradha Mandal and Nitesh Saxena - Disease Detector: A Disease Inference Attack Using Brainwave Signals Associated with Body Postures
  10. Zehui Tang, Shengke Zeng, Song Han, Qi Yu, Shihai Jiang and Peng Chen - DEFD: Dual-Entity Fuzzy Deduplication for Untrusted Environments
  11. Ross Porter, Morteza Biglari-Abhari, Duleepa Thrimawithana and Benjamin Tan - Extending ISO 15118-20 EV Charging: Preventing Downgrade Attacks and Enabling New Security Capabilities
  12. Hesamodin Mohammadian, Arash Habibi Lashkari and Ali Ghorbani - Poisoning and Evasion: Deep Learning-Based NIDS under Adversarial Attacks
  13. Saurabh Anand, Shubham Malaviya, Manish Shukla and Sachin Lodha - CompFreeze : Combining Compacters and Layer Freezing for Enhanced Pre-Trained Language Model
  14. Abdelfattah Amamra, Rym Khettab and Raissa Mezine - Enhancing Network Intrusion Detection Systems: A Review of Feature Selection Algorithms for Streaming Data Processing
  15. Brooke Kidmose and Weizhi Meng - can-fp: An attack-aware analysis of false alarms in automotive intrusion detection models
  16. Arthur Drichel and Ulrike Meyer - A Comprehensive Study on Multi-Task Learning for Domain Generation Algorithm (DGA) Detection
Track: Trust
  1. Huong Nguyen, Hong-Tri Nguyen, Lauri Loven and Susanna Pirttikangas - Stake-Driven Rewards and Log-Based Free Rider Detection in Federated Learning
Track: Emerging Technologies and Trends
  1. Qi Li and Xiaodong Lin - Proactive Audio Authentication using Speaker Identity Watermarking
  2. Raymond K. Zhao, Nazatul H. Sultan, Phillip Yialeloglou, Dongxi Liu, David Liebowitz and Josef Pieprzyk - MIKA: A Minimalist Approach to Hybrid Key Exchange
  3. Guibin Zhao, Pengfei Li, Zhibo Zhang, Fusen Guo, Xueting Huang, Wei Xu, Jinyin Wang and Jianlong Chen - Towards SAR Automatic Target Recognition Multi- Category SAR Image Classification Based on Light Weight Vision Transformer
Short papers
  1. Mohammad Goudarzi, Arash Shaghaghi, Simon Finn and Sanjay Jha - Lack of Systematic Approach to Security of IoT Context Sharing Platforms
  2. Emma Romanous and Jeremy Ginger - AI Efficiency in Cybersecurity: Estimating Token Consumption for Optimal Operations
  3. Bruno Santos, Rogério Costa and Leonel Santos - Cybersecurity in Industry 5.0: Open Challenges and Future Direction
  4. Rishabh Kumar, Rohit Gupta, Sutapa Mondal, Mangesh Gharote, Praveen Gauravaram and Sachin Lodha - Privacy Preservation in Service Operations by Minimizing Sensitive Data Exposure
  5. Mohammad Nosouhi, Zubair Baig, Robin Doss, Praveen Gauravaram, Debi Prasad Pati, Divyans Mahansaria, Keshav Sood and Lei Pan - The Value of Strong Identity and Access Management for ICS/OT Security
  6. Joao Pedro Alonso Almeida, Gowri Ramachandran, Paul Ashley, Raja Jurdak, Steven McCown and Jo Ueyama - Towards a Portability Scheme for Decentralized Identifiers in Self-Sovereign Identities
  7. Zhibo Zhang, Jiankun Hu, Hemanshu Pota, Shabnam Kasra Kermanshahi, Benjamin Turnbull, Ernesto Damiani, Chan Yeob Yeun - Experimental Demonstration of Risks and Influences of Cyber Attacks on Wireless Communication in Microgrids
  8. Jason Ford and Caleb House - Insource vs Outsourcing Offensive Security Operations
  9. Thai-Ha Tran, Duc-Thuan Dam, Binh Kieu-Do-Nguyen, Van-Phuc Hoang, Trong-Thuc Hoang and Cong-Kha Pham - Hardware Implementation of a Hybrid Dynamic Gold Code-Based Countermeasure Against Side-Channel Attacks


Important Dates

Paper Submission:
May 1, 2024
May 18, 2024, 11:59pm (AoE)
Acceptance Notification:
July 1, 2024

Camera-Ready:
July 17, 2024
Conference Date:
August 28-30, 2024