New England Security Day 2024



 New England Security Day 2024

Time: March 15, 2024 (all day)

Location: Innovation Partnership Building, UConn

After a hiatus the New England Security Day (NESD) is making a come back.  This event is designed to bring together security researchers throughout New England (and adjacent areas).


Registration: 9:00am – 11:30am

Registration, coffee, and light breakfast snacks

Introduction: 9:30-10am

Kazem Kazerounian, Dean and Professor of College of Engineering, UConn
Ben Fuller, Associate Professor of School of Computing, UConn

10-11:50 Machine Learning Security

TMI! Finetuned Models Leak Private Information from their Pretraining Data 

John Abascal (Northeastern University), Stanley Wu (University of Chicago), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University)

Improving Privacy attacks using Data Poisoning, [pdf1],[pdf2]

Harsh Chaudhari (Northeastern University), John Abascal (Northeastern University), Giorgio Severi (Northeastern University), Alina Oprea (Northeastern University), Jonathan Ullman (Northeastern University), Matthew Jagielski (Google Research), Florian Tramer (ETH Zurich)

Adversarial Attacks on Federated Learning Revisited: a Client-Selection Perspective

Xingyu Lyu (University of Massachusetts, Lowell), Shixiong Li (University of Massachusetts, Lowell), Ning Wang (University of South Florida), Tao Li (Purdue University), Danjue Chen (North Carolina State University), Yimin Chen (University of Massachusetts, Lowell)

SoK: Challenges and Opportunities in Federated Unlearning

Hyejun Jeong (UMass Amherst), Shiqing Ma (UMass Amherst), Amir Houmansadr (UMass Amherst)

Stealing the Decoding Algorithms of Language Models 

Ali Naseah (UMass Amherst), Kalpesh Krishna (UMass Amherst), Mohit Iyyer (UMass Amherst), Amir Houmansadr (UMass Amherst)

12-1:00 Network Security

Provable Security of PKI Schemes 

Sara Wrotniak (University of Connecticut), Hemi Leibowitz (The College of Management Academic Studies Rishon), Ewa Syta (Trinity College), Amir Herzberg (University of Connecticut)

BPF-Box: Hardening BPF against Transient Execution Attacks 

Di Jin (Brown University), Alexander J. Gaidis (Brown University), Vasileios P. Kemerlis (Brown University)

BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks 

Cameron Morris (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of Connecticut), Samuel Secondo (University of Connecticut)

1-2:30 Lunch and Poster Session

2:30-3:50 Applied Cryptography

ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes 

Maryam Rezapour (University of Connecticut), Benjamin Fuller (University of Connecticut)

On the provable security of data structures 

Sam A. Markelon (University of Florida)

HAVEN++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications 

Nicolas Alhaddad (BU), Mayank Varia (BU), Ziling Yang (UIUC)

Approximate Lower Bound Arguments 

Pyrros Chaidos (National & Kapodistrian University of Athens, IOG), Aggelos Kiayias (University of Edinburgh and IOG), Leo Reyzin (Boston University), Tolik Zinovyev (Boston University)

4-5:00 System Security

SysXCHG: Refining Privilege with Adaptive System Call Filters 

Alexander J. Gaidis (Brown University), Vaggelis Atlidakis (Brown University), Vasileios P. Kemerlis (Brown University)

IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks  

Neophytos Christou (Brown University), Di Jin (Brown University), Vaggelis Atlidakis (Brown University), Baishakhi Ray (Columbia University), Vasileios P. Kemerlis (Brown University)

ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels 

Marius Momeu (Technical University of Munich), Fabian Kilger (Technical University of Munich), Christopher Roemheld (Technical University of Munich), Simon Schnückel (Technical University of Munich), Sergej Proskurin (BedRock Systems), Michalis Polychronakis (Stony Brook University), Vasileios Kemerlis (Brown University)

5:00 Closing Remarks


SleeperNets: A Formalized Study of Backdoor Attacks Against Reinforcement Learning 

Ethan Rathbun (Northeastern University), Christopher Amato (Northeastern University), Alina Oprea (Northeastern University)

Security Risk Analysis of Machine Learning Systems Using Causality Graphs

Anoop Singhal (National Institute of Standards and Technology)

NOPout: Dynamic Pruning of Indirect Branch Targets for FineIBT 

Jamie Gabbay (Brown University), Alexander J. Gaidis (Brown University), Joao Moreira (Intel Corporation), Ke Sun (Intel Corporation), Alyssa Milburn (Intel Corporation), Vaggelis Atlidakis (Brown University), Vasileios P. Kemerlis (Brown University)

Exploring Data Poisoning Attacks on Contrastive Learning over Noisy Dataset 

Shixiong Li (University of Massachusetts Lowell), Xingyu Lyu (University of Massachusetts Lowell), Yimin Chen (University of Massachusetts Lowell)

Cryptography in Context: The Case Study of Apple's CSAM Scanning Proposal 

Julie Ha (Boston University), Gabe Kaptchuk (Boston University), Ran Canetti (Boston University)

The Nuanced Nature of Trust and Privacy Control Adoption in the Context of Google

Ehsan Ul Haque (University of Connecticut), Mohammad Maifi Hasan Khan (University of Connecticut), Mohammad Abdullah Al Fahim (University of Connecticut)

New Security Proof of a Restricted High-Dimensional QKD Protocol 

Hasan Iqbal (University of Connecticut), Walter Krawec (University of Connecticut)

Memory Triggers: Unveiling Memorization in Text-To-Image Generative Models through Word-Level Duplication 

Ali Naseh (University of Massachusetts Amherst), Jaechul Roh (University of Massachusetts Amherst), Amir Houmansadr (UMass)

Private Account Recovery for Anonymous Web Services 

Ryan Little (Boston University), Lucy Qin (Brown University), Mayank Varia (Boston University)


We would like to invite you to submit presentation proposals. We are interested in all presentations that concern research on computer security. We utilize a light touch reviewing focusing on quality and breadth of submissions.  We plan to accept 10-12 presentations slots and reserve an hour and a half for a poster session where we will accept more papers.  Submissions should be no more than a page in any format you choose. 
Your goal is to convey the topic you would be discussing.  Focus on the high level of the topic, rather than the low-level technical details.  
NESD presentations do not need to be about polished or complete results. Proposals for presentations of preliminary work, progress reports on ongoing projects, useful lessons from research that has failed, and tool demos are also welcomed at NESD. Recently published or submitted work can be presented at NESD, too.
Each presentation slot is 20 minutes long. However, we would like to use an unconventional slot structure. Each speaker will be given 15 minutes to present their material (strict). The last 5 minutes of each slot will involve Q&A between the speaker and the audience. Those proposals not accepted for a presentation will be considered for a poster. Like the talks, posters should concern security and can report on ongoing work. Posters will be displayed all day around the workshop space. Be advised to keep the size of your poster at most 30 inches by 40 inches. Click here to submit your presentation proposal.

Important Dates:

  • Submission: February 1, 2024
  • Notification: February 15, 2024
  • Publication of Final Program: March 1, 2024
  • Event: March 15, 2024

    Program Committee

    • Aanjhan Ranganathan
    • Alishah Chator
    • Amir Houmansadr
    • Anitha Gollamudi
    • Arinjita Paul
    • Fan Zhang
    • Fredrik Heiding
    • Ghada Almashaqbeh
    • Hamed Ghavamnia
    • Jun Dai
    • Katerina Sotiraki
    • Nicolas Alhaddad
    • Pubali Dutta
    • Sarah Scheffler
    • Vasileios Kemerlis
    • Xiaoyan Sun

      Venue And Travel Information

      NESD 2024 will be held at the Innovation Partnership Building, UConn, Room 317, 3rd Floor

      Light breakfast, lunch and coffee breaks will be provided.

      Transportation and Parking:
      More Detailed information can be found here.

      There are two hotels close to the Innovation Partnership Building.  More details can be found here.

      Previous NESDs:


        The open exchange of ideas and the freedom of thought and expression are central to the aims and goals of NESD; these require an environment that recognizes the inherent worth of every person and group, that fosters dignity, understanding, and mutual respect, and that embraces diversity. For these reasons, NESD is dedicated to providing a harassment-free experience, and implements the ACM policy against harassment. Participants violating these standards may be sanctioned or expelled from NESD, at the discretion of the organizing committee members.
        A useful related resource is the Geek Feminism Wiki, which includes models for public announcements and guidance for conference staff. If you hear an inappropriate remark, intended or misjudged, we encourage you not to stay silent. You may find this list of comebacks to be useful.