COMPSAC 2023 Symposium on Security, Privacy & Trust in Computing (SEPT)

Technical Program

*= in-person presentation in Torino

Reconstructing Android User Behavior through Timestamped State Models
Honghe Zhou, Phuong Dinh Nguyen, Lin Deng, Weifeng Xu, Josh Dehlinger and Suranjan Chakraborty

Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation*
Leo Song and Steven Ding

A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions
Jianyi Zhang, Leixin Yang, Yuang Han, Zixiao Xiang and Xiali Hei

SILK: Constraint-guided Hybrid Fuzzing
Junhao Li and Yujian Zhang

Privacy Protection Federated Learning Framework Based on Blockchain and Committee Consensus in IoT Devices
Shuxin Zhang and Jinghua Zhu

Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks*
Samer Khamaiseh, Derek Bagagem, Mathew Mancino, Abdullah Al-Alaj, Hakam Alomari and Ahmed Aleroud

AirKeyLogger: Hardwareless Air-Gap Keylogging Attack*
Mordechai Guri

A Linux Audit and MQTT-based Security Monitoring Framework*
Jie Yin, Yutaka Ishikawa and Atsuko Takefusa

MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis*
Weihan Ou and Steven Ding

IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning*
Adebayo Omotosho, Yaman Qendah and Christian Hammer

Detecting and Preventing ROP Attacks using Machine Learning on ARM*
Gebrehiwet Biyane Welearegai, Christian Hammer and Chenpo Hu

Preserving Privacy of Neuromorphic Hardware From PCI-e Congestion Side-Channel Attack
Anup Das

CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph
Xiangfei Xu, Tianyuan Hu, Bixin Li and Li Liao

Research on Malicious Account Detection Mechanism of Ethereum Based on Community Discovery*
Min Li, Bo Cui, Wenhan Hou and Ru Li

Reputation-Based Trust Assessment of Transacting Service Components
Konstantinos Tsiounis and Kostas Kontogiannis

Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents*
Keisuke Hamajima, Daisuke Kotani and Yasuo Okabe

Toward Face Biometric De-identification using Adversarial Examples
Mahdi Ghafourian, Julian Fierrez, Luis F Gomez, Ruben Vera-Rodriguez, Aythami Morales, Zohra Rezgui and Raymond Veldhuis

RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning
Xuebin Ma, Nan Xiang and Yulan Gao

FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated Learning
Geming Xia, Jian Chen, Xinyi Huang, Chaodong Yu and Zhong Zhang

A Decentralized Authorization and Security Framework for Distributed Research Workflows*
Richard Cardone, Smruti Padhy, Steve Black, Sean Cleveland and Joe Stubbs

Modeling and Verifying Privacy-Preserving Authentication Scheme for VANET Using CSP
Ning Qin and Hongyan Mao

Security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic
Long Chen, Qiaojuan Wang, Yanqing Song and Jianguo Chen

Improved Bayesian network differential privacy data-releasing method based on junction tree
Xuebin Ma, Xuejian Qi and Yulei Meng

Digital intelligence is more and more utilized in everyday computing. As most of our personal and organizational information is stored and communicated digitally, security, privacy, and trust aspects relevant to the information and communication are crucial. The security, privacy, and trust requirements need to be specified, analyzed, implemented, verified, and monitored in all software systems where the quality of service depends on these requirements. The COMPSAC Symposium on Security, Privacy and Trust in Computing (SEPT) focuses on the security, privacy, and trust aspects of software technologies and applications. Following the theme of the COMPSAC main conference, the SEPT Symposium invites submissions of research papers and industrial experience reports on various software application systems where security, privacy, and trust are major concerns.

In addition to regular papers (10pages) we welcome short papers (6 pages) and fast abstracts (2 pages). Authors are invited to submit original, unpublished research work and industrial experience reports. Simultaneous submission to other publication venues is not permitted except as highlighted in the COMPSAC 2022 J1C2 & C1J2 program. All submissions must adhere to IEEE Publishing Policies, and will be vetted through the IEEE CrossCheck portal.

Paper Templates


IEEE Paper templates are available in MS Word 2003 and LaTex. All submissions must use US 8.5×11 letter page format.

Important Dates


Main Conference/Symposium
Main conference/symposium papers due: 15 January 2023
Extended to 15 February 2023
Notification: 7 April 2023
Camera-ready and registration due: 7 May 2023 Updated: 18 May 2023

Journal then Conference Submissions
Due date: April 7, 2023
Notifications: April 30, 2023

Workshops, Fast Abstract, SRS Programs
EXTENDED: Workshop papers due: 21 April 2023
UPDATED: Notifications: 7 May 2023
UPDATED: Camera-ready and registration due: Updated: 18 May 2023

Submission Link


Please submit your paper on EasyChair

IEEE Conference Publishing Policies


All submissions must adhere to IEEE Conference Publishing Policies.

IEEE Cross Check


All submission will be screened for plagiarized material through the IEEE Cross Check portal.

SEPT Symposium Chairs

Yoshiaki Hori, Saga University
Email: horiyo@cc.saga-u.ac.jp

Dianxiang Xu, University of Missouri-Kansas City
Email: dxu@umkc.edu

Program Committee

Samer Khamaiseh, Boise State University
Mordechai Guri, Ben-Gurion University
Lotfi Ben Othmane, University of North Texas
Carlo Blundo, Università degli Studi di Salerno
Barbara Gallina, Mälardalen University
Mitsuaki Akiyama, NTT
Yongzhi Wang, Park University
Atilla Elci, Hasan Kalyoncu University
Yoshiaki Kasahara, Kyushu University
Seokwoo Choi, NSR
Lara Mauri, University of Milan
Ahmed Bouabdallah, IMT Atlantique
William Claycomb, CMU CERT
Stelvio Cimato, Università degli studi di Milano
Weifeng Xu, University of Baltimore
Ching-Nung Yang, National Dong Hwa Uniersity
Zhiyuan Li, Jiangsu University
Takahiro Shinagawa, The University of Tokyo
Jia-Chun Lin, Norwegian University of Science and Technology
Martin Gilje Jaatun, SINTEF Digital
Myungsun Kim, Gachon University
Eun-Sun Cho, Chungnam National University
Yunpeng Zhang, University of Hosuton
Manghui Tu, Purdue University Northwest
Katsuyoshi Iida, Hokkaido University
Ragib Hasan, University of Alabama at Birmingham
Saed Alrabaee, United Arab Emirates University
Jafar Haadi Jafarian, University of Colorado Denver
Frédéric Cuppens, Polytechnique Montreal