Yoshimichi Nakatsuka (University of California, Irvine)

GDPR and CCPA granted consumers various rights, including the right to access, modify, or delete any personal information collected by online services. During the process, services must authenticate the consumer and this is especially a challenge for users without accounts. To overcome this issue, we presented VICEROY at NDSS 2023. In this talk, we will be presenting the experimental efforts of VICEROY. The first section of the talk will provide a brief introduction of VICEROY and its design. Next, we will discuss the implementation and evaluation aspects of VICEROY and how the research community can benefit from it. Our talk will be especially focusing on: (1) the use of Solokey, a secure hardware token with open source firmware and bootloader, and (2) the challenges we faced during the end-to-end evaluation of VICEROY, including the server, browser extension, and the secure hardware token. Finally, we will conclude the talk with future directions for VICEROY.

Speaker’s Biography

Yoshimichi Nakatsuka is a Ph.D. candidate at the University of California, Irvine under the supervision of Professor Gene Tsudik. His main research interest lies in the intersection of Web security / privacy and Confidential Computing.

View More Papers

Automata-Based Automated Detection of State Machine Bugs in Protocol...

Paul Fiterau-Brostean (Uppsala University, Sweden), Bengt Jonsson (Uppsala University, Sweden), Konstantinos Sagonas (Uppsala University, Sweden and National Technical University of Athens, Greece), Fredrik Tåquist (Uppsala University, Sweden)

Read More

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose...

Runhao Li (National University of Defense Technology), Bin Zhang (National University of Defense Technology), Jiongyi Chen (National University of Defense Technology), Wenfeng Lin (National University of Defense Technology), Chao Feng (National University of Defense Technology), Chaojing Tang (National University of Defense Technology)

Read More

Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations

Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)

Read More