Aims and Scope
Since the appearance of Bitcoin in 2009, a plethora of new cryptocurrencies and other blockchain based systems have been deployed with different success. While some of them are slightly different copies of Bitcoin, other ones propose interesting improvements or new usages of the underlying blockchain technology. However, the novelty of such technologies is often tied with rapid developments and proof-of-concept software, and rigorous scientific analyses of the proposed systems are often skipped.
This workshop aims to provide a forum for researchers in this area to carefully analyze current systems and propose new ones in order to create a scientific background for a solid development of new cryptocurrencies and blockchain technology systems.
Topics
The main topics include (but are not limited to):
- Anonymity and privacy in cryptocurrencies
- Privacy-preserving technologies
- Cryptocurrency based trust systems
- Security analysis of existing cryptocurrencies
- Formal threat models in cryptocurrency systems
- Improvement proposals for existing cryptocurrencies
- Application and service cases of DLT and Smart-Contracts
- P2P network cryptocurrencies analysis
- Private transactions in blockchain based systems
- New usages of the blockchain technology
- Scalability solutions for blockchain systems
- Blockchain-defined networking
- Smart contracts
- Distributed consensus and fault tolerance
- Blockhain Protocols and algorithms
- Transaction Monitoring and Analysis
- Token Economy, finance and payments
- Consensus mechanisms: proof-of-work, proof of stake, proof of burn, proof-of-useful-work
- On-chain and off-chain code synergies
- Oracles, DeFi, NFT dapps and protocols
- Blockchain as a service
CBT Program
Thursday, 28th September 2023
CBT 2023 is held in conjunction with the DPM 2023 workshop, with some joint and parallel sessions.
- 08:00 – 08:45 (CEST — UTC+02:00) Workshop Registration
- 08:45 – 10:00 (CEST — UTC+02:00)
OPENING SESSION #1 (Room 1.6)
- Opening Remarks (Sokratis Katsikas, NTNU/Norway & Joaquin Garcia-Alfaro, Institut Polytechnique de Paris/France)
- Joint Keynote (DPM+CBT+CyberICPS)
- Practical applications of trustworthy AI in security: detection of cyber-attacks & fake news. Michał Choraś (Bydgoszcz University of Science and Technology).
- 10:00 – 10:30 (CEST — UTC+02:00) COFFEE BREAK
- 10:30 – 12:30 (CEST — UTC+02:00)
DPM SESSION #1 (Room 1.9), Chair: Joaquin Garcia-Alfaro (Institut Polytechnique de Paris, France)
- Synthetic is all you need: removing the auxiliary data assumption for membership inference attacks against synthetic data. Florent Guépin (Imperial College London), Matthieu Meeus (Imperial College London), Ana-Maria Creţu (Imperial College London), Yves-Alexandre de Montjoye (Imperial College London).
- Patient-centric health data sovereignty: an approach using proxy re-encryption. Bruno Rodrigues (University of Porto), Ivone Amorim (Polytechnic of Porto), Ivan Silva (Polytechnic of Porto), Alexandra Mendes (University of Porto).
- Integrally Private Model Selection for Support Vector Machine. Saloni Kwatra (Umeå University), Ayush K. Varshney (Umeå University), Vicenç Torra (Umeå University).
- PrivacySmart: Automatic and Transparent Management of Privacy Policies. Cristòfol Daudén-Esmel (Universitat Rovira i Virgili), Jordi Castellà-Roca (Universitat Rovira i Virgili), Alexandre Viejo (Universitat Rovira i Virgili), Eduard Josep Bel-Ribes (Universitat Rovira i Virgili).
- 12:30 – 13:30 (CEST — UTC+02:00) LUNCH BREAK
- 13:30 – 15:00 (CEST — UTC+02:00)
PARALLEL SESSION #1
- DPM SESSION #2 (Room 1.9), Chair: Ken Barker (University of Calgary, Canada)
- Analyzing Continuous ks-Anonymization for Smart Meter Data. Carolin Brunn (Technische Universität Berlin), Saskia Nuñez von Voigt (Technische Universität Berlin), Florian Tschorsch (Technische Universität Berlin).
- Differentially Private Traffic Flow Prediction using Transformers: A Federated Approach. Sargam Gupta (Umeå University), Vicenç Torra (Umeå University).
- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges. Michela Iezzi (Banca d’Italia), Carsten Maple (The Alan Turing Institute), Andrea Leonetti (Banca d’Italia).
- CBT SESSION #1 (Room 1.5), Chair: Pantaleone Nespoli (Universidad de Murcia, Spain)
- Transaction Fee Mechanism For Order-Sensitive Blockchain-based Applications. Mohammad Sadegh Nourbakhsh (The University of Warwick), Feng Hao (The University of Warwick), and Arshad Jhumka (The University of Warwick).
- Comparison of Ethereum Smart Contract Analysis and Verification Methods. Vincent Happersberger (TU Berlin), Frank-Walter Jaekel (Fraunhofer IPK), Thomas Knothe (Fraunhofer IPK), Yvonne-Anne Pignolet (DFINITY), and Stefan Schmid (TU Berlin).
- Chaussette: A Symbolic Verification of Bitcoin Scripts. Vincent Jacquot (University of Liège) and Benoit Donnet (University of Liège).
- DPM SESSION #2 (Room 1.9), Chair: Ken Barker (University of Calgary, Canada)
- 15:00 – 15:30 (CEST — UTC+02:00) COFFEE BREAK
- 15:30 – 17:15 (CEST — UTC+02:00)
PARALLEL SESSION #2
- DPM SESSION #3 (Room 1.9), Chair: Guillermo Navarro-Arribas (Universitat Autonoma de Barcelona, Spain)
- Secure multiparty sampling of a biased coin for differential privacy. Amir Zarei (Norwegian University of Science and Technology), Staal A. Vinterbo (Norwegian University of Science and Technology).
- AddShare: a Privacy-Preserving Approach for Federated Learning. Bernard Atiemo Asare (University of Ottawa), Paula Branco (University of Ottawa), Iluju Kiringa (University of Ottawa), Tet Yeap (University of Ottawa).
- Try on, Spied on?: Privacy Analysis of Virtual Try-On Websites and Android Apps. Abdelrahman Ragab (Concordia University), Mohammad Mannan (Concordia University) and Amr Youssef (Concordia University).
- DPM FAREWELL
- CBT SESSION #2 (Room 1.5), Chairs: Pantaleone Nespoli & Joaquin Garcia-Alfaro (Universidad de Murcia & Institut Polytechnique de Paris, Spain & France)
- A Simple Single Slot Finality Protocol For Ethereum. Francesco D'Amato (Ethereum Foundation) and Luca Zanolini (Ethereum Foundation).
- Timely Identification of Victim Addresses in DeFi Attacks. Bahareh Parhizkari (University of Luxembourg), Antonio Ken Iannillo (University of Luxembourg), Christof Ferreira Torres (ETH Zurich), Joseph Xu (Quantstamp), Sebastian Banescu (Quantstamp), and Radu State (University of Luxembourg).
- On the (Not So) Surprising Impact of Multi-Path Payments on Performance and Privacy in the Lightning Network. Charmaine Ndolo (Humboldt-Universität zu Berlin) and Florian Tschorsch (Humboldt-Universität zu Berlin & Technische Universität Dresden).
- CBT FAREWELL
- DPM SESSION #3 (Room 1.9), Chair: Guillermo Navarro-Arribas (Universitat Autonoma de Barcelona, Spain)
Program Commitee
PC Chairs:
Pantaleone Nespoli - University of Murcia
Joaquin Garcia-Alfaro - Institut Polytechnique de Paris
PC Members:
Lennart Ante - Blockchain Research Lab
Daniel Augot - INRIA Saclay
Artem Barger - IBM Research
Alex Biryukov - University of Luxembourg
Rainer Boehme - University of Innsbruck
James Chiang - Technical University of Denmark
Jeremy Clark - Concordia University
Mauro Conti - University of Padua
Vanesa Daza - Universitat Pompeu Fabra
Nour El-Madhoun - EPITA Engineering School
Kaoutar Elkhiyaoui - EURECOM
Joshua Ellul - University of Malta
Paula Fraga - University of A Coruna
Victor Garcia - Universitat Oberta de Catalunya
Hannes Hartenstein - KIT
Jordi Herrera-Joancomarti - Universitat Autonoma de Barcelona
Jiasun Li - George Mason University
Xiapu Luo - The Hong Kong Polytechnic University
Shin'ichiro Matsuo - Georgetown University
Darya Melnyk - Aalto University
Jose Luis Muñoz-Tapia - Universitat Politecnica de Catalunya
Guillermo Navarro-Arribas - Universitat Autonoma de Barcelona
Dongming Peng - University of Nebraska-Lincoln
Cristina Pérez-Solà - Universitat Oberta de Catalunya
Motoyoshi Sekiya - Fujitsu Limited
Weidong Shi - University of Houston
Matteo Signorini - Nokia Bell Labs
Hitesh Tewari - Trinity College Dublin
Florian Tschorsch - Technische Universitat Berlin
Eirini Tsiropoulou - University of New Mexico
Dimitrios Vasilopoulos - IMDEA Software Institute
Edgar Weippl - SBA Research
Call for papers
Regular and short papers: Papers must be original and not
submitted for publication elsewhere. Authors are invited to submit
their manuscripts following the LNCS Proceedings Manuscript style.
Papers are limited to 16 pages (full papers), or 8 pages (short
papers) including references and appendices. Paper must be
submitted in PDF format, using
the CBT 2023
submission entry at easychair.
Double blind review: CBT requires anonymized submissions
— please make sure that submitted papers contain no author names
or obvious self-references.
Accepted conference papers will be published by Springer in the LNCS
collection. At least one author of each accepted paper is required to
cover a full registration and present their work at the workshop;
otherwise the paper will not be included in the proceedings.
Please contact cbt2023@easychair.org in case of doubts and questions.
Venue
The workshop will be held in will be hosted by The Hague Conference Centre, The Netherlands, in collaboration with the 28th annual European Symposium on Research in Computer Security, ESORICS 2023. More information on accommodation and venue available from the ESORICS 2023 website at https://esorics2023.org/attend/venue/
Please contact cbt2023@easychair.org in case of doubts and questions.
Registration
Information about the registration is available at the ESORICS 2023 website.
Kindly use this link to register for the workshop (CBT 2023). Some important information follows:
- The early-bird registration ends on 23.08.2023.
- At least one regular registration (e.g., a non-student registration) has to be made for each accepted paper at the workshop.
Please contact cbt2023@easychair.org in case of doubts and questions.