CCSW 2020: The ACM Cloud Computing Security Workshop
in conjunction with the ACM Conference on Computer and Communications Security (CCS)
November 9, 2020, Virtual

New zoom link: https://osu.zoom.us/j/97407730247?pwd=dFhEUnovRW5XY3dDNTQyTkUyRXZKZz09



Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and government IT infrastructure. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including:
  • side channel attacks
  • practical cryptographic protocols for cloud security
  • secure cloud resource virtualization mechanisms
  • secure data management outsourcing (e.g., database as a service)
  • practical privacy and integrity mechanisms for outsourcing
  • foundations of cloud-centric threat models
  • secure computation outsourcing
  • remote attestation mechanisms in clouds
  • sandboxing and VM-based enforcements
  • trust and policy management in clouds
  • secure identity management mechanisms
  • new cloud-aware web service security paradigms and mechanisms
  • cloud-centric regulatory compliance issues and mechanisms
  • business and security risk models and clouds
  • cost and usability models and their interaction with security in clouds
  • scalability of security in global-size clouds
  • trusted computing technology and clouds
  • binary analysis of software for remote attestation and cloud protection
  • network security (DOS, IDS etc.) mechanisms for cloud contexts
  • security for emerging cloud programming models
  • energy/cost/efficiency of security in clouds
  • machine learning for cloud protection
CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds.

Student Stipends

Student stipends may be available to attend CCSW. Please apply on the CCS website for a CCS grant (if any) and then email grants@ccsw.io to let us know why you would be a good fit for CCSW. We plan on awarding several student travel grants (a function also of the quality of the applications).

Important Dates

Submissions due: 31 July, 2020 26 July, 2020 (3 days after CCS notification, 11:59pm anywhere in the world)
Author notification: 19 August, 2020
Camera-ready: 21 August, 2020
Workshop: November 9, 2020

Submissions

CCSW is soliciting full papers of up to 12 pages which will be judged based on the quality per page. Thus, shorter, high-quality papers are encouraged, and papers may be perceived as too long if they are repetitive or verbose. Submissions must be single PDF files, no more than 12 pages long in double-column ACM format (the sigconf template from
https://www.acm.org/publications/proceedings-template, with a simpler version at https://github.com/acmccs/format), excluding the bibliography, well-marked appendices, and supplementary material. Note that reviewers are not required to read the appendices or any supplementary material. Authors should not change the font or the margins of the ACM format. Submissions not following the required format may be rejected without review. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by the ACM Press and/or the ACM Digital Library.

Submissions must be anonymous, and authors should refer to their previous work in the third-person. Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Each accepted paper must be presented by one registered author. Submissions not meeting these guidelines risk immediate rejection. For questions about these policies, please contact the chairs.

One best paper award will be presented during the workshop.

Proposals for panels are also solicited. The proposals are to be concise, up to 2 pages in length, describe the handled topics, name potential panelists and briefly scope the panel for CCSW. Disruptive and controversial panels are particularly encouraged. Please submit your panel proposals as a PDF by email at chairs@ccsw.io.

Program
(All times are in the Eastern Timezone ET)
All paper PDFs can be accessed from
this link.

New zoom link: https://osu.zoom.us/j/97407730247?pwd=dFhEUnovRW5XY3dDNTQyTkUyRXZKZz09
       
Schedule  
  09:30 Welcome
Yinqian Zhang and Radu Sion
  Keynote I     
  09:35 - 10:15 Thomas Ristenpart
Associate Professor at Cornell Tech and the Department of Computer Science, Cornell University
Title: Threat Models in Cloud Computing
Abstract: Cloud computing -- ranging from infrastructure as a service up to consumer products like iCloud -- has changed the way we build, deploy, and use digital resources. Along with such change brings an evolution in the landscape of security threats. In this talk, I'll provide a tour of cloud computing security, organized according to a variety of the threat models I associate to cloud computing. I'll discuss classic issues related to multi-tenancy, efforts to mitigate the danger of compromised platforms via client-side encryption, and the impact of increasing centralization on security problems as well as the opportunity it represents for improvements.
Bio: Thomas Ristenpart is an Associate Professor at Cornell Tech and a member of the Computer Science department at Cornell University. Before joining Cornell Tech in May, 2015, he spent four and a half years as an Assistant Professor at the University of Wisconsin-Madison. He completed his PhD at UC San Diego in 2010. His research spans a wide range of computer security topics, with recent focuses including digital privacy and safety in intimate partner violence, new threats to, and improved opportunities for, cloud computing security, improvements to authentication mechanisms including passwords, confidentiality and privacy in machine learning, and topics in applied and theoretical cryptography. His work is routinely featured in the media and has been recognized by a number of distinguished paper awards, an ACM CCS test-of-time award, an Advocate of New York City award, an NSF CAREER Award, and a Sloan Research Fellowship.
  10:15 - 10:20 Virtual Coffee Break (5 minutes)
  Session 1: LEARNING AND PRIVACYChair: Ghassan Karame, NEC Laboratories Europe   
  10:20 - 11:40 Privacy-preserving Voice Analysis via Disentangled Representations , Ranya Aloufi , Imperial College London , Hamed Haddadi , Imperial College London , David Boyle , Imperial College London
  Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning , Benjamin Zi Hao Zhao , University of New South Wales and Data61 CSIRO , Mohamed Ali Kaafar , Macquarie University , Nicolas Kourtellis , Telefonica R&D (RUNNER UP to BEST PAPER AWARD)
  Tiki-Taka: Attacking and Defending Deep Learning-based Intrusion Detection Systems , Chaoyun Zhang , The University of Edinburgh , Xavier Costa-Perez , NEC Laboratories Europe , Paul Patras , The University of Edinburgh
  GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel , Yuntao Liu , University of Maryland, College Park , Ankur Srivastava , University of Maryland, College Park (BEST PAPER AWARD)
  11:40 - 11:45 Virtual Coffee Break (5 minutes)
  Keynote II     
  11:45 - 12:30 Xiaoning Li
Chief Security Architect, Director of Cloud Security Research at Alibaba Cloud
Title: Building Hardware Assisted Trusted Computing Architecture on Public Cloud
Abstract: In public cloud environment, how to protect user data and execution environment is always challenges. In 2018, We defined a hardware assited trusted computing architecture including key components from platform/hardware components root of trust to system trust chain and trusted exeuction environment. Each component solves different challenges and enforces security, and we also released a series of products to help customer build same architecture on public cloud. In this talk, we will discuss latest progress and future challenges.
Bio: Xiaoning Li is chief security architect at Alibaba cloud , initiated Alibaba encrypted computing technology to enable confidential computing on public cloud and drives Alibaba cloud trusted computing and confidential computing strategy and products/solutions. Previously he was a Security Researcher and Architect at Intel Labs. Focused on analyzing/detecting/preventing 0 day/malware with existing/new processor features. For the past 10+ years, his work has been focusing on both hardware/software security system co-design and advanced threat research. Li holds 20+ grant/filling patents in security areas, including processor/system security, and has published more than 20+ conference/invited talks, including BlackHat, CanSecWest, ShmooCon, Source, etc.
  12:30 - 12:35 Virtual Coffee Break (5 minutes)
  Session 2: HOSTING AND CONFINEMENTChair: Byoungyoung Lee, Seoul National University   
  12:35 - 13:55 Co-residency Attacks on Containers are Real , Sushrut Shringarputale , Microsoft , Patrick McDaniel , Penn State University , Kevin Butler , University of Florida , Thomas La Porta , Penn State University
  Towards Enabling Secure Web-based Cloud Services using Client-side Encryption , Martin Johns , Technische Universitaet Braunschweig , Alexandra Dirksen , Technische Universitaet Braunschweig
  MARTINI: Memory Access Traces to Detect Attacks , Yujun Qin , University of Michigan , Samuel Gonzalez , University of Michigan , Kevin Angstadt , St. Lawrence University , Xiaowei Wang , University of Michigan , Stephanie Forrest , Arizona State University , Reetuparna Das , University of Michigan , Kevin Leach , University of Michigan , Westley Weimer , University of Michigan
  bpfbox: Simple Precise Process Confinement with eBPF , William Findlay , Carleton University , Anil Somayaji , Carleton University , David Barrera , Carleton University
  13:55 - 14:00 Virtual Coffee Break (5 minutes)
  Keynote III     
  14:00 - 14:45 David Kaplan
Security Architecture Fellow at AMD
Title: Confidential Computing with AMD SEV-SNP
Abstract: Confidential Computing is a fast growing area that aims to protect cloud workloads from cloud administrators. This talk will discuss AMD's latest technology, SEV-SNP (Secure Nested Paging), the next generation of AMD's x86 virtualization isolation solution. Building upon the existing AMD SEV and AMD SEV-ES features released in 2017, SEV-SNP provides additional hardware security that is designed to protect VMs from malicious hypervisors. SEV-SNP adds new memory integrity protection, new use models, and more flexibility in attestation and VM management when working with protected VMs in hostile environments. This talk will delve into the specific security that is provided by the SEV-SNP architecture, the stronger threat model that it supports, and the new hardware structures and x86 instructions added to implement these protections. We'll also discuss where things go from here, future use cases, and potential research areas.
Bio: David Kaplan is a Fellow at AMD who focuses on developing new security technologies across the AMD product line as part of the Security Architecture Research and Development center. He is the lead architect for the AMD memory encryption features like SEV and has worked on both CPU and SOC level security features for the last 8 years. David has over 13 years of experience at AMD, has filed over 40 patents in his career so far, and spoken at events including Linux Security Summit, ISCA, and CCC.
  14:45 - 14:50 Virtual Coffee Break (5 minutes)
  Session 3: CRYPTO AND BEYONDChair: Anil Somayaji, Carleton University   
  14:50 - 16:10 Homomorphic string search with constant multiplicative depth , Charlotte Bonte , imec-COSIC, KU Leuven , Ilia Iliashenko , imec-COSIC, KU Leuven , ,
  Short-Lived Forward-Secure Delegation for TLS , Lukas Alber , Graz University of Technology , Stefan More , Graz University of Technology , Sebastian Ramacher , Austrian Institute of Technology
  On the Detection of Disinformation Campaign Activity with Network Analysis , Luis Vargas , University of Florida , Patrick Emami , University of Florida , Patrick Traynor , University of Florida
  The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects , Ralf Ramsauer , OTH Regensburg , Lukas Bulwahn , BMW AG , Daniel Lohmann , University of Hanover , Wolfgang Mauerer , OTH Regensburg
  16:10 - 16:15 Virtual Coffee Break (5 minutes)
  Keynote IV     
  16:15 - 17:00 Hany Farag
Senior Engineering Manager, Google Cloud Infrastructure Security team
Title: Machine integrity in a cloud environment: Emerging threats and mitigations
Abstract: Integrity of the computing environment is essential to any security claims a cloud provider can make. Without it, all bets are off. Ensuring the host machine is running trusted intended code is is a crucial, yet increasingly difficult task, given the ever increasing complexity of modern servers and the end of Moore's law. This talk discusses verified boot, first instruction (i.e. firmware) integrity, Google's approach to addressing them in our ever growing fleet, and major emerging challenges introduced by new, complex hardware that contains multiple computing complexes.
Bio: Hany manages the teams responsible for Google's credential infrastructure, verified boot, and software and infrastructure for the Titan root of trust chip. He has worked in the security space for 15 years at Google and Microsoft, where he worked on Xbox security, content protection and the TPM stack.
  17:00 - 17:05 Virtual Coffee Break (5 minutes)
  Session 4: BLITZ TALKSChair: Huibo Wang,Baidu Security   
  17:05 - 17:45 Verifpal: Cryptographic Protocol Analysis for the Real World , Nadim Kobeissi , Symbolic Software , Georgio Nicolas , Symbolic Software , Mukesh Tiwari , University of Melbourne
  Following the Pebble Trail: Extending Return-Oriented Programming to RISC-V , Bogdan Pavel Deac , Technical University of Cluj-Napoca , Adrian Colesa , Technical University of Cluj-Napoca
  Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization , Naufal Suryanto , Pusan National University , Hyoeun Kang , Pusan National University , Yongsu Kim , Pusan National University , Youngyeo Yun , Pusan National University , Harashta Tatimma Larasati , Pusan National University , Howon Kim , Pusan National University
  Non-Interactive Cryptographic Access Control for Secure Outsourced Storage , Wei Yuan , Jilin University
  Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation , Giovanni Di Crescenzo , Perspecta Labs , Kurt Rohloff , New Jersey Institute of Technology , Lisa Bahler , Perspecta Labs , Brian Coan , Applied Communication Sciences , Yuriy Polyakov , Duality Technologies , Dave Cousins , BBN Technologies
  17:45 Conclusion  


Registration

Registration is closed.

Organizers

CHAIRS

Yinqian Zhang, Ohio State University
Radu Sion, Stony Brook University and Private Machines Inc.


COMMITTEE

Alin Tomescu , VMware Research
Alpa Trivedi , Intel
Alptekin Kupcu , Koc University
Anil Somayaji, Carleton University
Anrin Chakraborti , Stony Brook University
Bogdan Carbunar , Florida International University
Byoungyoung Lee , Seoul National University
Charles Wright , Portland State University
Dimitrios Papadopoulos , The Hong Kong University of Science and Technology
Erik-Oliver Blass , Airbus Group Innovations
Evgenios Kornaropoulos , University of California, Berkeley
Ghassan Karame , NEC Laboratories Europe
Giorgos Vasiliadis , Qatar Computing Research Institute - HBKU
Guoxing Chen , Facebook
Haya Shulman , Fraunhofer Institute for Secure Information Technology
Huibo Wang , Baidu Security
Ioannis Demertzis , University of Maryland
Joel Coffman , United States Air Force Academy
Leendert Van Doorn, Microsoft
Matthias Schunter , Intel
Melek Onen , EURECOM
Ni Trieu , UC Berkeley
Nigel Smart , imec-COSIC, KU Leuven
Nikos Triandopoulos , Stevens Institute of Technology
Pierangela Samarati , Universita' degli Studi di Milano, Italy
Reyhaneh Safavi-Naini , University of Calgary
Roberto Di Pietro , Hamad Bin Khalifa University - College of Science and Engineering
Ruby Lee , Princeton University
Sean Smith , Dartmouth College
Sotiris Ioannidis , FORTH
Stefan Katzenbeisser , University of Passau
Tarik Moataz , Aroki Systems
Thomas Schneider , TU Darmstadt
Tianwei Zhang , Nanyang Technological University
Xiaokuan Zhang , The Ohio State University
Yan Huang , Indiana University Bloomington
Yang Zhang , CISPA Helmholtz Center for Information Security
Yuqiong Sun , Symantec Research Labs
Zhenyu Ning , Southern University of Science and Technology and Wayne State University
Zhou Li , University of California, Irvine



STEERING

Srdjan Capkun, ETH Zurich
Emiliano De Cristofaro, University College London
Kristin Lauter, Microsoft Research
Radu Sion, Stony Brook University (chair)
Yinqian Zhang, Ohio State University


Sponsorship

Interested in sponsoring CCSW (this or next year)? Please
contact us directly.




Bronze Sponsors




© 2009-2020 NSAC Lab.

All Rights Reserved.