To authors: Both regular and dataset/tool paper presentations are 20 minutes in total (including 5 minutes Q&A).
Cryptography has been used both, historically and in modern times, as a tool to protect and authenticate information: encryption of messages and storage, and protecting information in usage as well. For the last 30+ years, the notion of Malicious Cryptography has been developed and evolved. The idea behind the notion is that when a cryptographic system is implemented in a larger system, then it can be repurposed to perform tasks beyond its specified goals. Repurposing means that the system’s goal as specified, and algorithms as designed to adhere to the specification, change covertly to achieve extended goals, originally involving service of malicious activity. The notion and various subareas of malicious cryptography, call for revision of the relationships of model and specifications of cryptographic systems on the one hand, and their implementations and proof of correctness and security, on the other hand.
Moti Yung is a Distinguished Research Scientist with Google, and a Senior Adjunct Research Faculty Member in the Computer Science Department at Columbia University. He received his PhD from Columbia University in 1988. Previously, he worked at IBM Research, CertCo/Bankers Trust, RSA Laboratories (EMC), and Snap. He is a Fellow of IEEE, ACM, IACR, and EATCS, and his research interests focus on security, privacy, and cryptography.
The world we inhabit is increasingly shaped and structured by digital technologies that act autonomously, both on our behalf and to fulfill our needs. This transformation raises profound ethical concerns about the potential impact of interactions between humans and autonomous systems on the values underpinning our societies. Over the past decades, the implications of digital technologies for privacy have been widely examined from both technical and regulatory perspectives. Yet privacy, unlike security, is fundamentally an ethical notion: it concerns the individual's right to retain meaningful control over personal information. This perspective calls for a shift in how we design and deploy technology towards systems that actively empower individuals to protect and manage their privacy in digital environments. In this talk, I will discuss selected technologies and approaches that embody this vision, highlighting the key research directions and technical challenges involved in developing privacy-preserving solutions that place individuals at the center.
Paola Inverardi is Rector of Gran Sasso Science Institute since September 2022. Before she was a professor of Computer Science and rector at the University of L’Aquila. Paola Inverardi's research focuses on software architectures, mobile applications, and adaptive and autonomous systems. Currently, her research focuses on the ethics of autonomous systems, with a particular emphasis on their interactions with society and human beings. Inverardi served on the editorial boards of IEEE, ACM, Springer and Elsevier Journals. She has served as general or program chair of leading software engineering conferences (e.g., ASE, ICSE, ESEC/FSE) and as chair of the ICSE and ESEC Steering Committees. She has received honorary doctorates from Mälardalen University in Sweden and Shibaura Institute of Technology in Tokyo, Japan. She is an ACM Fellow and has received the 2013 IEEE TCSE Distinguished Service Award.