Program

 
Financial Cryptography and Data Security 2020

Twenty-Fourth International Conference
February 10–14, 2020
Shangri-La Tanjung Aru Resort & Spa
Kota Kinabalu, Sabah, Malaysia

Please note, this program is provisional and subject to change.

All events take place in the Kinabalu Room unless otherwise indicated.
Sunday, February 9, 2020

16:00–18:00 Registration Reception
Location: Sunset Beach & Coco Joe's Cabana
Monday, February 10, 2020

08:30–09:15 Registration

09:15–09:25 Opening Remarks

09:25–10:25
Session 1: Keynote

Speaker TBA

10:25–10:55 Break

10:55–12:30
Session 2: Attacks

Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems. Federico Franzoni (Universitat Pompeu Fabra), Vanesa Daza (Universitat Pompeu Fabra), Iván Abellán (Universitat Pompeu Fabra)

Security Analysis on dBFT protocol of NEO. Qin Wang (Swinburne University of Technology), Jiangshan Yu (Monash University), Zhiniang Peng (Qihoo 360 Core Security), Vancuong Bui (Swinburne University of Technology), Shiping Chen (Csiro, Data61), Yong Ding (Cyberspace Security Research Center), Yang Xiang (Swinburne University of Technology)

Breaking the encryption scheme of the Moscow internet voting system. Pierrick Gaudry (CNRS, Inria, Université de Lorraine), Alexander Golovnev (Harvard University)

Short Paper: XOR Arbiter PUFs have Systematic Response Bias. Nils Wisiol (Technische Universität Berlin), Niklas Pirnay (Technische Universität Berlin)


12:30–14:00 Lunch
Location: Pavilion

14:00–15:15
Session 3: Consensus

Selfish Mining Re-Examined. Kevin Alarcón Negy (Cornell University), Peter R. Rizun (Bitcoin Unlimited), Emin Gün Sirer (Cornell University)

Fairness and Efficiency in DAG-based Cryptocurrencies. Georgios Birmpas (University of Oxford), Elias Koutsoupias (University of Oxford), Philip Lazos (Sapienza University of Rome), Francisco J. Marmolejo Cossío (University of Oxford)

Stake Shift in Major Cryptocurrencies: An Empirical Study. Rainer Stütz (Austrian Institute of Technology), Peter Gaži (IOHK), Bernhard Haslhofer (Austrian Institute of Technology), Jacob Illium (Chainalysis)


15:15–15:45 Break

15:45–17:00
Session 4: Cryptoeconomics

Distributed Privacy-Preserving Netting Protocol on Blockchain for Payment Systems. Shengjiao Cao (Ant Financial), Yuan Yuan (Ant Financial), Angelo De Caro (IBM Research), Karthik Nandakumar (IBM Research), Kaoutar Elkhiyaoui (IBM Research), Yanyan Hu (IBM Research)

The Arwen Trading Protocols. Ethan Heilman (Boston University/Arwen), Sebastien Lipmann (Arwen), Sharon Goldberg (Boston University/Arwen)

SoK: A Classification Framework for Stablecoin Designs. Amani Moin (Cornell University), Kevin Sekniqi (Cornell University), Emin Gün Sirer (Cornell University)


18:00–20:00 Welcome Reception and Poster Session
Location: Tanjung Garden

Availability and Validity. Jeff Burdges (Web3 Foundation), Handan Kılınç Alper (Web3 Foundation), Alistair Stewart (Web3 Foundation)

Echidna: A Practical Smart Contract Fuzzer. John-Paul Smith (Trail of Bits), Alex Groce (Trail of Bits), Gustavo Grieco (Trail of Bits), Josselin Feist (Trail of Bits)

Taproot Analysis. Lloyd Fournier

Assessing or incentivising correct mixing without authorities. Jeff Burdges (Web3 Foundation)

A New Protocol for Fair Addition of a Transaction Fee When Closing a Payment Channel Uncooperatively. Takahiro Nagamine (The University of Tokyo) and Kanta Matsuura (The University of Tokyo)

On the Applicability of Behavioral Biometric Authentication on Smartphones. Ahmed Mahfouz (Minia University), Mohamed Alaa (Minia University), Ahmed Hamdy (Minia University), Tarek Mostafa (Minia University)

Rethinking Blockchain Layers: Do Payment Channel Networks Need a Blockchain?. Matthias Grundmann (Karlsruhe Institute of Technology), Hannes Hartenstein (Karlsruhe Institute of Technology)

Prevention of Bouncing Attack on Casper FFG. Ryuya Nakamura (The University of Tokyo)

Advances in Fully Homomorphic Encryption. Benjamin Case (Clemson University), Shuhong Gao (Clemson University)

Etherolic: A Concolic Execution System for Security Analysis of Smart Contracts. Carmen Ahr

Tuesday, February 11, 2020

09:00–10:40
Session 5: Layer 2

SoK: Layer-Two Blockchain Protocols. Lewis Gudgeon (Imperial College London), Pedro Moreno-Sanchez (TU Wein), Stefanie Roos (TU Delft), Patrick McCorry (PISA Research), Arthur Gervais (Imperial College London)

MicroCash: Practical Concurrent Processing of Micropayments. Ghada Almashaqbeh (Columbia), Allison Bishop (Proof of Trading and Columbia), Justin Cappos (New York University)

LockDown: Balance Availability Attack against Lightning Network Channels. Cristina Pérez-Solà (Universitat Oberta de Catalunya), Alejandro Ranchal-Pedrosa (University of Sydney), Jordi Herrera-Joancomarti (Universitat Autònoma de Barcelona), Guillermo Navarro-Arribas (Universitat Autònoma de Barcelona), Joaquin Garcia-Alfaro (Institut Polytechnique de Paris)

Ride the Lightning: The Game Theory of Payment Channels. Zeta Avarikioti (ETH Zurich), Lioba Heimbach (ETH Zurich), Yuyi Wang (ETH Zurich), Roger Wattenhofer (ETH Zurich)


10:40–11:10 Break

11:10–12:50
Session 6: Layer 2, Part Deux

How to profit from payment channels. Oguzhan Ersoy (Delft University of Technology), Stefanie Roos (Delft University of Technology), Zekeriya Erkin (Delft University of Technology)

Boomerang: Redundancy Improves Latency and Throughput in Payment Networks. Joachim Neu (Stanford University), Vivek Bagaria (Stanford University), David Tse (Stanford University)

DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. Pedro Moreno-Sanchez (TU Wien), Arthur Blue, Duc Le (Purdue University), Sarang Noether (Monero Research Lab), Brandon Goodell (Monero Research Lab), Aniket Kate (Purdue University)

Cerberus Channels: Incentivizing Watchtowers for Bitcoin. Zeta Avarikioti (ETH Zurich), Orfeas Stefanos Thyfronitis Litos (University of Edinburgh), Roger Wattenhofer (ETH Zurich)


12:50–14:00 Lunch
Location: Pavilion

14:00–21:00 Excursion and BBQ
Location: Shangri-La Rasa Ria Resort & Spa (transfers provided)

An afternoon at the beach, including rainforest trail tours and a beach barbecue.


21:00–22:00 General Meeting
Location: Kinabalu Room

22:00–00:00 Rump Session
Location: Kinabalu Room
Wednesday, February 12, 2020

09:00–10:15
Session 7: Secure Computation

Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. Satsuya Ohata (AIST), Koji Nuida (The University of Tokyo / AIST)

Secure Computation of the kth-Ranked Element in a Star Network. Anselme Tueno (SAP SE), Florian Kerschbaum (University of Waterloo), Stefan Katzenbeisser (University of Passau), Yordan Boev (SAP SE), Mubashir Qureshi (SAP SE)

Insured MPC: Efficient Secure Computation with Financial Penalties. Carsten Baum (Aarhus University), Bernardo David (IT University of Copenhagen), Rafael Dowsley (Bar-Ilan University)


10:15–10:45 Break

10:45–12:25
Session 8: Privacy

Zether: Towards Privacy in a Smart Contract World. Benedikt Bünz (Stanford University), Shashank Agrawal (Visa Research), Mahdi Zamani (Visa Research), Dan Boneh (Stanford University)

An airdrop that preserves recipient privacy. Riad S. Wahby (Stanford), Dan Boneh (Stanford), Christopher Jeffrey (Purse.io), Joseph Poon (Lightning Network)

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Tsz Hon Yuen (The University of Hong Kong), Shi-feng Sun (Monash University), Joseph K. Liu (Monash University), Man Ho Au (Hong Kong Polytechnic University), Muhammed F. Esgin (Monash University), Qingzhao Zhang (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University)

BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications. Nabil Alkeilani Alkadri (Technische Universität Darmstadt), Rachid El Bansarkhani (QuantiCor Security GmbH), Johannes Buchmann (Technische Universität Darmstadt)


12:30–14:00 Lunch
Location: Pavilion

14:00–15:40
Session 9: Crypto Foundations

Non-Interactive Proofs of Proof-of-Work. Aggelos Kiayias (University of Edinburgh and IOHK), Andrew Miller (University of Illinois at Urbana-Champaign), Dionysis Zindros (University of Athens and IOHK)

Proof-of-Burn. Kostis Karantias (IOHK), Aggelos Kiayias (University of Edinburgh and IOHK), Dionysis Zindros (University of Athens and IOHK)

Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. Esteban Landerreche (CWI Amsterdam), Marc Stevens (CWI Amsterdam), Christian Schaffner (University of Amsterdam)

Coded Merkle Tree: Solving Data Availability Attacks in Blockchains. Mingchao Yu (University of Southern California), Saeid Sahraei (University of Southern California), Songze Li, Salman Avestimehr (University of Southern California), Sreeram Kannan (University of Washington), Pramod Viswanath (University of Illinois at Urbana-Champaign)


19:00–21:00 Sabahan (Kadazan-Dusun) Dinner
Location: J Borneo Native Village (transfers provided)
Thursday, February 13, 2020

09:00–10:15
Session 10: Empirical Studies

Open Market or Ghost Town? The Curious Case of OpenBazaar. James E. Arps (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)

Exploring the Monero Peer-to-Peer Network. Tong Cao (University of Luxembourg), Jiangshan Yu (Monash University), Jérémie Decouchant (University of Luxembourg), Xiapu Luo (The Hong Kong Polytechnic University), Paulo Esteves-Veríssimo (University of Luxembourg)

Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. Artemij Voskobojnikov (University of British Columbia), Borke Obada-Obieh (University of British Columbia), Yue Huang (University of British Columbia), Konstantin Beznosov (University of British Columbia)


10:15–10:45 Break

10:45–12:20
Session 11: Smart Contracts

Entity identification for Ethereum's account model. Friedhelm Victor (Technical University of Berlin)

What are the Actual Flaws in Important Smart Contracts (and How Can We Find Them)?. Alex Groce (Northern Arizona University), Josselin Feist (Trail of Bits), Gustavo Grieco (Trail of Bits), Michael Colburn (Trail of Bits)

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Ningyu He (Peking University), Lei Wu (Zhejiang University), Haoyu Wang (Beijing University of Posts and Telecommunications), Yao Guo (Peking University), Xuxian Jiang (PeckShield, Inc)

Short Paper: Smart Contracts for Government Processes Case Study and Prototype Implementation. Magnus Krogsbøll (IT University of Copenhagen), Liv Hartoft (IT University of Copenhagen), Tijs Slaats (University of Copenhagen), Søren Debois (IT University of Copenhagen)


12:20–12:30 Closing Remarks

12:30–14:00 Lunch
Location: Pavilion

14:00–18:00 Free Afternoon with Activities
(sign-up sheets will be available)

A: Islands

B: City Tour

C: Cultural Village


18:00–20:00 Workshop Reception
Location: TBA
Friday, February 14, 2020

08:30–09:00 Workshops Registration

Note: the timing of the lunch and breaks is coordinated among all of the workshops, but some workshops might start earlier in the morning or end later in the afternoon. See their individual programs for details. Workshop registrants can attend any of the workshops and can switch between them as desired.


09:00–10:30
Workshops Early Morning Session

AsiaUSEC'20: 1st Asian Workshop on Usable Security
Location: Tanjung Room 1

CoDeFi'20: 1st Workshop on Coordination of Decentralized Finance
Location: Tanjung Room 2 & 3

VOTING'20: 5th Workshop on Advances in Secure Electronic Voting
Location: Kinabalu Room 1

WTSC'20: 4th Workshop on Trusted Smart Contracts
Location: Kinabalu Room 2 & 3


10:30–11:00 Break

11:00–12:30
Workshops Late Morning Session

AsiaUSEC'20: 1st Asian Workshop on Usable Security
Location: Tanjung Room 1

CoDeFi'20: 1st Workshop on Coordination of Decentralized Finance
Location: Tanjung Room 2 & 3

VOTING'20: 5th Workshop on Advances in Secure Electronic Voting
Location: Kinabalu Room 1

WTSC'20: 4th Workshop on Trusted Smart Contracts
Location: Kinabalu Room 2 & 3


12:30–14:00 Lunch
Location: Pavilion

14:00–15:30
Workshops Early Afternoon Session

AsiaUSEC'20: 1st Asian Workshop on Usable Security
Location: Tanjung Room 1

CoDeFi'20: 1st Workshop on Coordination of Decentralized Finance
Location: Tanjung Room 2 & 3

VOTING'20: 5th Workshop on Advances in Secure Electronic Voting
Location: Kinabalu Room 1

WTSC'20: 4th Workshop on Trusted Smart Contracts
Location: Kinabalu Room 2 & 3


15:30–16:00 Break

16:00–17:30
Workshops Late Afternoon Session

AsiaUSEC'20: 1st Asian Workshop on Usable Security
Location: Tanjung Room 1

CoDeFi'20: 1st Workshop on Coordination of Decentralized Finance
Location: Tanjung Room 2 & 3

VOTING'20: 5th Workshop on Advances in Secure Electronic Voting
Location: Kinabalu Room 1

WTSC'20: 4th Workshop on Trusted Smart Contracts
Location: Kinabalu Room 2 & 3

 

 

 

This conference is organized annually by the International Financial Cryptography Association.