Workshop Arrangement

  • Date: March 6, 2024.
  • Venue: Room 001, A6 Building, New York University Abu Dhabi campus
  • Accommodation: The ACNS conference will provide transportation from and to these hotels from the NYU Abu Dhabi campus.
  • Schedule:
    • Opening Remarks (9:30-9:40, UTC+4)
    • Keynote (9:40-10:40, UTC+4): Searchable Symmetric Encryption and Its Attacks, by Dr. Kaitai Liang
    • Session 1 (10:50-11:40, UTC+4): Implementation of symmetric algorithms
      • Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits
      • Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests
    • Session 2 (11:50-12:40, UTC+4): Side-channel attack and defense
      • Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
      • A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework
    • Session 3 (14:00-14:50, UTC+4): Application of pubic-key algorithms
      • Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4
      • Towards Discovering Quantum-Threats for Applications using Open-Source Libraries

Keynote Speech

Title: Searchable Symmetric Encryption and Its Attacks.

Abstract: Searchable Symmetric Encryption (SSE) represents an intriguing technique that empowers users to delegate keyword searches over encrypted databases to an honest-but-curious server. The primary goal is to uphold the confidentiality of both the keywords and the encrypted documents. A comprehensive understanding of SSE entails navigating through the intricacies of how it facilitates secure and privacy-preserving searches within the realm of encrypted data. In this talk, we will embark on a detailed exploration of SSE's underlying concepts, mechanisms, and the intricate security notions that serve as the foundation for this cryptographic technique. Acknowledging that no cryptographic protocol is impervious to vulnerabilities, the discussion will delve into an examination of current attacks on SSE. This aims to deepen comprehension of the strengths and limitations inherent in SSE, a critical aspect for its ongoing development and effective deployment in real-world applications. At last, the talk will shed light on some of the open challenges associated with SSE.

Speaker: Dr. Kaitai Liang is a tenured faculty member in the Cybersecurity group at Delft University of Technology. His research, featured in esteemed international information security journals and conferences like USENIX Security, NDSS, ESORICS (with a best research paper award), IEEE TIFS, and IEEE TDSC, addresses cybersecurity challenges using information security and cryptographic tools. As a principal investigator in various EU funded projects, he has demonstrated real-world security impact through collaborations with academic and industrial partners. Dr. Liang has served TPC member, General Chair, and Steering Committee for international security and privacy conferences, e.g., IEEE Euro S&P, ESORICS, IEEE CSF, and PoPETs, and an Associate Editor for international journals such as the Computer Journal, IEEE Transactions on Artificial Intelligence, and the EURASIP Journal on Information Security. He has also contributed to ISO standards as a member of the standards committee 381027 "Cybersecurity & Privacy" at NEN.


Accepted Papers

  • #1 - Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits
  • #2 - Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests
  • #3 - Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems
  • #4 - Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4
  • #5 - A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework

Conditionally Accepted Papers

  • #1 - Towards Discovering Quantum-Threats for Applications using Open-Source Libraries
  • #2 - Analysis of Remote Attestation Mechanism for Heterogeneous TEEs

Note: Each accepted workshop paper needs one registration at full rate before (January 25th) and in-person presentation. Please refer to ACNS 2024 registration link to finish this process.



ACNS Workshop on SCI: Call for Papers

In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, Windows certificate validation vulnerabilities, PDF shadow attacks, Google Titan Token Bluetooth bugs, etc. It is critical for practitioners and researchers to ensure the security of cryptographic software and hardware, which are essential for a wide range of systems, services, and applications.

The aim of the SCI workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic solutions. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (4) weak cryptographic keys and random numbers in the cryptographic implementation; (5) runtime cryptographic key attacks and protections; (6) certificates and key management; (7) misuse or abuse of cryptographic services; and (8) other topics on secure cryptographic implementations.

We try to promote secure cryptographic solutions in the Internet, by exploring and discussing the (in)security issues. We solicit submissions of original research papers on a wide range of topics, including but not limited to:

  • Secure implementations of crypto algorithms & protocols
  • Fuzzing and vulnerabilities of crypto algorithms & protocols
  • Measurement of cryptographic solutions in the wild, defective or updated
  • Designs of random bit generators
  • Weak cryptographic keys and defective random bit generators
  • Side channel attacks and defenses
  • Cryptographic key protections and memory attacks
  • PKI certificate services and key management
  • HTTPS/TLS vulnerabilities and attacks
  • Measurement and bugs of certificate-based solutions
  • Audit and monitoring of cryptographic services
  • Physical attacks and defenses of cryptographic implementation
  • Verification and evaluation of cryptographic implementation
  • High-performance cryptographic engines
  • Cryptographic hardware
  • Cryptography for Blockchain
  • Cryptography for IoT/CPS
  • Cryptography for the Cloud
  • Cryptography for Mobile systems
  • Cryptography for VANET

We are especially interested in papers with novel ideas, position papers, pilot studies, and initial findings. ACNS will also award a best papers from the 2024 ACNS workshops (ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA and S&P-FL), with 500 EUR prize sponsored by Springer. Meanwhile, the workshop will include an interesting keynote talk, which will be announced on the workshop web site as arrangements are finalized.

ACNS'24 offers travel grants for students, which encourages greater student participation and submission of their papers. You can find more details about these grants on the ACNS'24 Student Travel Grants website (https://wp.nyu.edu/acns2024/student-travel-grants/).

Prospective authors are invited to submit manuscripts describing original work. The manuscript has to be written in English and in PDF format. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 20 pages including all references and appendices.

The proceedings of the SCI workshop will be published by Springer in the LNCS series.

Submit your papers: https://easychair.org/conferences/?conf=acnssci2024

Program Committee

  • Sebastian Berndt University of Lübeck, Germany
  • Florian Caullery HENSOLDT Cyber GmbH, Germany
  • Bo Chen Michigan Technological University, USA
  • Jiankuo Dong Nanjing University of Posts and Telecommunications, China
  • Haixin Duan Tsinghua University, China
  • Shanqing Guo Shandong University, China
  • Honggang Hu University of Science and Technology of China, China
  • Shijie Jia Chinese Academy of Sciences, China
  • Rongxing Lu University of New Brunswick, Canada
  • Bingyu Li Beihang University, China
  • Fengjun Li University of Kansas, USA
  • Ximeng Liu Fuzhou University, China
  • Chunli Lv China Agricultural University, China
  • Qiang Tang The University of Sydney, Australia
  • Sazzadur Rahaman University of Arizona, USA
  • Kui Ren Zhejiang University, China
  • Ruisheng Shi Beijing University of Posts and Telecommunications, China
  • Shifeng Sun Shanghai Jiao Tong University, China
  • An Wang Beijing Institute of Technology, China
  • Ding Wang Nankai University, China
  • Juan Wang Wuhan University, China
  • Fangyu Zheng Chinese Academy of Sciences, China
  • Cong Zuo Beijing Institute of Technology, China


In Conjunction with
ACNS 2024

Important Dates:

Paper submission deadline:
December 10, 2023. 23:59, AoE (EXTENDED)

Acceptance Notification:
January 10, 2024

Camera ready:
January 25, 2024

Workshop Chairs:

Dr. Jingqiang Lin
University of Science and Technology of China
linjq <at> ustc.edu.cn

Dr. Bo Luo
University of Kansas
bluo <at> ku.edu

Publication Chair

Dr. Jun Shao
Zhejiang Gongshang University
chn.junshao <at> gmail.com

Publicity Chair

Dr. An Wang
Beijing Institute of Technology
wanganl <at> bit.edu.cn

Web Chair

Fangyu Zheng
Chinese Academy of Sciences

Past SCI Workshops

ACNS Workshop on SCI 2023

ACNS Workshop on SCI 2022

ACNS Workshop on SCI 2021

ACNS Workshop on SCI 2020