Yoshimichi Nakatsuka (University of California, Irvine)

GDPR and CCPA granted consumers various rights, including the right to access, modify, or delete any personal information collected by online services. During the process, services must authenticate the consumer and this is especially a challenge for users without accounts. To overcome this issue, we presented VICEROY at NDSS 2023. In this talk, we will be presenting the experimental efforts of VICEROY. The first section of the talk will provide a brief introduction of VICEROY and its design. Next, we will discuss the implementation and evaluation aspects of VICEROY and how the research community can benefit from it. Our talk will be especially focusing on: (1) the use of Solokey, a secure hardware token with open source firmware and bootloader, and (2) the challenges we faced during the end-to-end evaluation of VICEROY, including the server, browser extension, and the secure hardware token. Finally, we will conclude the talk with future directions for VICEROY.

Speaker’s Biography

Yoshimichi Nakatsuka is a Ph.D. candidate at the University of California, Irvine under the supervision of Professor Gene Tsudik. His main research interest lies in the intersection of Web security / privacy and Confidential Computing.

View More Papers

Tactics, Threats & Targets: Modeling Disinformation and its Mitigation

Shujaat Mirza (New York University), Labeeba Begum (New York University Abu Dhabi), Liang Niu (New York University), Sarah Pardo (New York University Abu Dhabi), Azza Abouzied (New York University Abu Dhabi), Paolo Papotti (EURECOM), Christina Pöpper (New York University Abu Dhabi)

Read More

Guess Which Car Type I Am Driving: Information Leak...

Dongyao Chen (Shanghai Jiao Tong University), Mert D. Pesé (Clemson University), Kang G. Shin (University of Michigan, Ann Arbor)

Read More

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Caiqin Dong (Jinan University), Jian Weng (Jinan University), Jia-Nan Liu (Jinan University), Yue Zhang (Jinan University), Yao Tong (Guangzhou Fongwell Data Limited Company), Anjia Yang (Jinan University), Yudan Cheng (Jinan University), Shun Hu (Jinan University)

Read More

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used...

Piyush Kumar Sharma (imec-COSIC, KU Leuven), Devashish Gosain (Max Planck Institute for Informatics), Claudia Diaz (Nym Technologies, SA and imec-COSIC, KU Leuven)

Read More