{"id":1145612,"date":"2025-07-23T11:21:10","date_gmt":"2025-07-23T18:21:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=1145612"},"modified":"2025-08-18T10:28:17","modified_gmt":"2025-08-18T17:28:17","slug":"pre-usenix-security-mini-conference","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/pre-usenix-security-mini-conference\/","title":{"rendered":"Pre-USENIX Security Mini-Conference"},"content":{"rendered":"\n\n\n\n\n<p class=\"has-text-align-center has-red-color\"><strong>This is an invite-only event, unless you are a Microsoft employee. You must have received an invitation email from the organizers to register and attend. This is not an official USENIX Security-affiliated event.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>The event is over. Thank you for participating!<\/strong><\/p>\n\n\n\n<p><strong>Date<\/strong>: August 11 &#8211; 12, 2025&nbsp;<br><strong>Time:<\/strong>&nbsp;9:30 AM &#8211; 4:45 PM&nbsp;(Monday) \/ 5:15 PM (Tuesday)<strong><br>Location: <\/strong>14820 NE 36th St, Redmond, WA, 98052&nbsp;<br><div class=\"has-red-color\"><strong>Important:<\/strong> You will need to present a photo ID (not necessary gov&#8217;t issued) to check in to the Microsoft building. A university ID or any membership card with a photo will suffice.<\/div><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading h3\" id=\"schedule\">Schedule<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Monday August 11<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><tbody><tr><td>09:30 AM &#8211; 10:30 AM<\/td><td>Breakfast \/ Badge pick-up open<\/td><\/tr><tr><td>10:30 AM &#8211; 10:40 AM<\/td><td>Welcome<\/td><\/tr><tr><td>10:40 AM &#8211; 11:10 AM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/bhardwaj\">Understanding How Users Prepare for and React to Smartphone Theft<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Divyanshu Bhardwaj (<em>CISPA Helmholtz Center for Information Security<\/em>)<\/td><\/tr><tr><td>11:15 AM &#8211; 11:45 AM <\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/kim-hanna\">When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Hanna Kim (<em>KAIST<\/em>)<\/td><\/tr><tr><td>11:50 AM &#8211; 12:20 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/linker\">A Formal Analysis of Apple\u2019s iMessage PQ3 Protocol<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Felix Linker (<em>ETH Z\u00fcrich<\/em>)<\/td><\/tr><tr><td>12:20 PM &#8211; 02:00 PM<\/td><td>Lunch<\/td><\/tr><tr><td>02:00 PM &#8211; 03:00 PM<\/td><td><strong>Keynote:<\/strong> Carmela Troncoso (MPI-SP and EPFL)<br><br><strong>Abstract:<\/strong><em> In this talk we overview our collaboration with the International Committee of the Red Cross, in which we help them to digitalize their aid distribution process without increasing risks for the aid recipients. We will overview our requirements gathering process, and our solutions, highlighting the particularities of the ICRC needs and threat models which render straightforward solutions inapplicable to their scenarios.<\/em><\/td><\/tr><tr><td>03:00 PM &#8211; 03:10 PM<\/td><td>Break<\/td><\/tr><tr><td>03:10 PM &#8211; 03:40 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/wang-chuhan\">Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Gang Wang (<em>University of Illinois Urbana-Champaign<\/em>)<\/td><\/tr><tr><td>03:45 PM &#8211; 04:15 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/kireev\">Characterizing and Detecting Propaganda-Spreading Accounts on Telegram<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker: <\/strong>Rebekah Overdorf (<em>Ruhr University Bochum<\/em>)<\/td><\/tr><tr><td>04:15 PM &#8211; 04:30 PM<\/td><td>Closing<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Tuesday August 12<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>09:30 AM &#8211; 10:30 AM<\/td><td>Breakfast \/ Badge pick-up open<\/td><\/tr><tr><td>10:30 AM &#8211; 11:00 AM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/agarwal-sharad\">\u2018Hey mum, I dropped my phone down the toilet\u2019: Investigating Hi Mum and Dad SMS Scams in the United Kingdom<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Sharad Agarwal (<em>University College London<\/em>)<\/td><\/tr><tr><td>11:05 AM &#8211; 11:35 AM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/ortega-perez\">Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Carolina Ortega P\u00e9rez (<em>Cornell University<\/em>)<\/td><\/tr><tr><td>11:40 AM &#8211; 12:10 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/shih\">zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Maurice Shih (<em>University of Maryland<\/em>)<\/td><\/tr><tr><td>12:10 PM &#8211; 01:30 PM<\/td><td>Lunch<\/td><\/tr><tr><td>01:30 PM &#8211; 02:00 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/xie\">Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Qinge Xie (<em>Georgia Tech<\/em>)<\/td><\/tr><tr><td>02:05 PM &#8211; 02:35 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/daffalla\">A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat Models<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker: <\/strong>Alaa Daffalla (<em>Cornell University<\/em>)<\/td><\/tr><tr><td>02:35 PM &#8211; 03:00 PM<\/td><td>Coffee break<\/td><\/tr><tr><td>03:00 PM &#8211; 03:30 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/islam\">Detecting Compromise of Passkey Storage on the Cloud<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker: <\/strong>Mazharul Islam (<em>University of Wisconsin\u2014Madison<\/em>)<\/td><\/tr><tr><td>03:35 PM &#8211; 04:05 PM<\/td><td><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/pavlides\">More is Less: Extra Features in Contactless Payments Break Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br><strong>Speaker:<\/strong> Tom Chothia (<em>University of Birmingham<\/em>) and George Pavlides (<em>Surrey Centre for Cyber Security, University of Surrey<\/em>)<\/td><\/tr><tr><td>04:05 PM &#8211; 04:15 PM<\/td><td>Closing<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading h3\" id=\"location-and-commute\">Location and commute<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The event is organized at <strong>Microsoft Building 99<\/strong> (<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/maps.app.goo.gl\/96gtzcbSwCwuMAFr6\">14820 NE 36th St, Redmond, WA, 98052<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>) on the main Microsoft campus. The campus area is pleasant and totally walkable.<\/p>\n\n\n\n<p>Commuting from the USENIX Security conference hotel is easy by bus 545 (<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.soundtransit.org\/ride-with-us\/routes-schedules\/545\">see schedule<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>). You will need to take the stop <em>State Route 520 & NE 40th St<\/em> and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/maps.app.goo.gl\/qJSwyEvirFd6adjH8\">walk 10-15 minutes<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Going back, the bus stop is on the other side of the freeway (<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/maps.app.goo.gl\/gZVBTWAc4sPgNyEZ8\">map here<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>). Taking a cab\/Lyft\/Uber is reasonable as well, although note that these tend to be more expensive in the Seattle area than in many other cities.<\/p>\n\n\n\n<p>Staying on Monday and Tuesday in downtown Redmond is a good alternative. In this case, taking the Link Light Rail (line 2) to the Microsoft campus (Redmond Technology Station stop) is very convenient, followed by <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/maps.app.goo.gl\/3SFM31v9Cu3yUEoM6\">a 10-15 minute walk<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n\n\n\n<p>You can also choose to drive yourself to Microsoft Building 99 and park in the adjacent parking garage. There is ample free parking and you can park in any spot, but you <strong>will<\/strong> need to tell us upon checking in that you have parked a car, as it will need to be registered with the receptionist. Please be ready to provide basic information about the car (make, model, license plate #).<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading h3\" id=\"organizers\">Organizers<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"136\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/01\/melissa-chase-1.jpg\" alt=\"Melissa Chase\" class=\"wp-image-146567\" style=\"width:150px\" \/><\/figure>\n\n\n\n<div style=\"height:7px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center\" id=\"andromachi-chatzieleftheriou\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a><\/h5>\n\n\n\n<p class=\"has-text-align-center\">Principal Researcher<br>Microsoft Research Redmond<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"125\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Kim-Laine_125x125.jpg\" alt=\"Kim Laine\" class=\"wp-image-622569\" style=\"width:150px\" \/><\/figure>\n\n\n\n<div style=\"height:7px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center\" id=\"andromachi-chatzieleftheriou\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/kilai\/\">Kim Laine<\/a><\/h5>\n\n\n\n<p class=\"has-text-align-center\">Principal Researcher<br>Microsoft Research Redmond<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a data-bi-type=\"button\" class=\"wp-block-button__link wp-element-button\" href=\"mailto:melissac@microsoft.com\">Questions? Ask us<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a data-bi-type=\"button\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/msr-cryptography\/\">About the Cryptography Group<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"heading-microsoft%e2%80%99s-event-code-of-conduct\">Microsoft\u2019s Event Code of Conduct<\/h3>\n\n\n\n<p>Microsoft\u2019s mission is to empower every person and every organization on the planet to achieve more. This includes virtual events Microsoft hosts and participates in, where we seek to create a respectful, friendly, and inclusive experience for all participants. As such, we do not tolerate harassing or disrespectful behavior, messages, images, or interactions by any event participant, in any form, at any aspect of the program including business and social activities, regardless of location. We do not tolerate any behavior that is degrading to any gender, race, sexual orientation or disability, or any behavior that would violate <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s Anti-Harassment and Anti-Discrimination Policy, Equal Employment Opportunity Policy, or Standards of Business Conduct<\/a>. In short, the entire experience must meet our culture standards. We encourage everyone to assist in creating a welcoming and safe environment. Please <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\" target=\"_blank\" rel=\"noopener noreferrer\">report<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;any concerns, harassing behavior, or suspicious or disruptive activity. Microsoft reserves the right to ask attendees to leave at any time at its sole discretion.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--3\"><a data-bi-type=\"button\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\" target=\"_blank\" rel=\"noreferrer noopener\">Report a concern<\/a><\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>This is an invite-only event, unless you are a Microsoft employee. You must have received an invitation email from the organizers to register and attend. This is not an official USENIX Security-affiliated event. The event is over. Thank you for participating! Date: August 11 &#8211; 12, 2025&nbsp;Time:&nbsp;9:30 AM &#8211; 4:45 PM&nbsp;(Monday) \/ 5:15 PM (Tuesday)Location: [&hellip;]<\/p>\n","protected":false},"featured_media":621129,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2025-08-11","msr_enddate":"2025-08-12","msr_location":"Redmond, WA","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":false,"msr_hide_image_in_river":null,"footnotes":""},"research-area":[13558],"msr-region":[],"msr-event-type":[197944],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[269148,269142],"msr-impact-theme":[],"class_list":["post-1145612","msr-event","type-msr-event","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-event-type-hosted-by-microsoft","msr-locale-en_us","msr-post-option-approved-for-river","msr-post-option-include-in-river"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"Pre-USENIX Security Mini-Conference\",\"image\":{\"id\":621129,\"url\":\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205.png\",\"alt\":\"Research area: Security, privacy, and cryptography\"}} \/-->\n\n<!-- wp:msr\/content-tabs -->\n<!-- wp:msr\/content-tab -->\n<!-- wp:paragraph {\"className\":\"has-text-align-center has-red-color\"} -->\n<p class=\"has-text-align-center has-red-color\"><strong>This is an invite-only event, unless you are a Microsoft employee. You must have received an invitation email from the organizers to register and attend. This is not an official USENIX Security-affiliated event.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"className\":\"has-text-align-center\"} -->\n<p class=\"has-text-align-center\"><strong>The event is over. Thank you for participating!<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:html -->\n<p><strong>Date<\/strong>: August 11 - 12, 2025&nbsp;<br><strong>Time:<\/strong>&nbsp;9:30 AM - 4:45 PM&nbsp;(Monday) \/ 5:15 PM (Tuesday)<strong><br>Location: <\/strong>14820 NE 36th St, Redmond, WA, 98052&nbsp;<br><div class=\"has-red-color\"><strong>Important:<\/strong> You will need to present a photo ID (not necessary gov't issued) to check in to the Microsoft building. A university ID or any membership card with a photo will suffice.<\/div><\/p>\n<!-- \/wp:html -->\n\n<!-- wp:spacer {\"height\":\"20px\"} -->\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<!-- \/wp:spacer -->\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"className\":\"h3\"} -->\n<h2 class=\"wp-block-heading h3\" id=\"schedule\">Schedule<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:columns -->\n<div class=\"wp-block-columns\"><!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:paragraph -->\n<p><strong>Monday August 11<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:table {\"className\":\"is-style-regular\"} -->\n<figure class=\"wp-block-table is-style-regular\"><table class=\"has-fixed-layout\"><tbody><tr><td>09:30 AM - 10:30 AM<\/td><td>Breakfast \/ Badge pick-up open<\/td><\/tr><tr><td>10:30 AM - 10:40 AM<\/td><td>Welcome<\/td><\/tr><tr><td>10:40 AM - 11:10 AM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/bhardwaj\">Understanding How Users Prepare for and React to Smartphone Theft<\/a><br><strong>Speaker:<\/strong> Divyanshu Bhardwaj (<em>CISPA Helmholtz Center for Information Security<\/em>)<\/td><\/tr><tr><td>11:15 AM - 11:45 AM <\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/kim-hanna\">When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs<\/a><br><strong>Speaker:<\/strong> Hanna Kim (<em>KAIST<\/em>)<\/td><\/tr><tr><td>11:50 AM - 12:20 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/linker\">A Formal Analysis of Apple\u2019s iMessage PQ3 Protocol<\/a><br><strong>Speaker:<\/strong> Felix Linker (<em>ETH Z\u00fcrich<\/em>)<\/td><\/tr><tr><td>12:20 PM - 02:00 PM<\/td><td>Lunch<\/td><\/tr><tr><td>02:00 PM - 03:00 PM<\/td><td><strong>Keynote:<\/strong> Carmela Troncoso (MPI-SP and EPFL)<br><br><strong>Abstract:<\/strong><em> In this talk we overview our collaboration with the International Committee of the Red Cross, in which we help them to digitalize their aid distribution process without increasing risks for the aid recipients. We will overview our requirements gathering process, and our solutions, highlighting the particularities of the ICRC needs and threat models which render straightforward solutions inapplicable to their scenarios.<\/em><\/td><\/tr><tr><td>03:00 PM - 03:10 PM<\/td><td>Break<\/td><\/tr><tr><td>03:10 PM - 03:40 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/wang-chuhan\">Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability<\/a><br><strong>Speaker:<\/strong> Gang Wang (<em>University of Illinois Urbana-Champaign<\/em>)<\/td><\/tr><tr><td>03:45 PM - 04:15 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/kireev\">Characterizing and Detecting Propaganda-Spreading Accounts on Telegram<\/a><br><strong>Speaker: <\/strong>Rebekah Overdorf (<em>Ruhr University Bochum<\/em>)<\/td><\/tr><tr><td>04:15 PM - 04:30 PM<\/td><td>Closing<\/td><\/tr><\/tbody><\/table><\/figure>\n<!-- \/wp:table --><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:paragraph -->\n<p><strong>Tuesday August 12<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:table -->\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>09:30 AM - 10:30 AM<\/td><td>Breakfast \/ Badge pick-up open<\/td><\/tr><tr><td>10:30 AM - 11:00 AM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/agarwal-sharad\">\u2018Hey mum, I dropped my phone down the toilet\u2019: Investigating Hi Mum and Dad SMS Scams in the United Kingdom<\/a><br><strong>Speaker:<\/strong> Sharad Agarwal (<em>University College London<\/em>)<\/td><\/tr><tr><td>11:05 AM - 11:35 AM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/ortega-perez\">Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking<\/a><br><strong>Speaker:<\/strong> Carolina Ortega P\u00e9rez (<em>Cornell University<\/em>)<\/td><\/tr><tr><td>11:40 AM - 12:10 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/shih\">zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks<\/a><br><strong>Speaker:<\/strong> Maurice Shih (<em>University of Maryland<\/em>)<\/td><\/tr><tr><td>12:10 PM - 01:30 PM<\/td><td>Lunch<\/td><\/tr><tr><td>01:30 PM - 02:00 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/xie\">Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach<\/a><br><strong>Speaker:<\/strong> Qinge Xie (<em>Georgia Tech<\/em>)<\/td><\/tr><tr><td>02:05 PM - 02:35 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/daffalla\">A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat Models<\/a><br><strong>Speaker: <\/strong>Alaa Daffalla (<em>Cornell University<\/em>)<\/td><\/tr><tr><td>02:35 PM - 03:00 PM<\/td><td>Coffee break<\/td><\/tr><tr><td>03:00 PM - 03:30 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/islam\">Detecting Compromise of Passkey Storage on the Cloud<\/a><br><strong>Speaker: <\/strong>Mazharul Islam (<em>University of Wisconsin\u2014Madison<\/em>)<\/td><\/tr><tr><td>03:35 PM - 04:05 PM<\/td><td><a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity25\/presentation\/pavlides\">More is Less: Extra Features in Contactless Payments Break Security<\/a><br><strong>Speaker:<\/strong> Tom Chothia (<em>University of Birmingham<\/em>) and George Pavlides (<em>Surrey Centre for Cyber Security, University of Surrey<\/em>)<\/td><\/tr><tr><td>04:05 PM - 04:15 PM<\/td><td>Closing<\/td><\/tr><\/tbody><\/table><\/figure>\n<!-- \/wp:table --><\/div>\n<!-- \/wp:column --><\/div>\n<!-- \/wp:columns -->\n\n<!-- wp:heading {\"className\":\"h3\"} -->\n<h2 class=\"wp-block-heading h3\" id=\"location-and-commute\">Location and commute<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:columns -->\n<div class=\"wp-block-columns\"><!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:paragraph -->\n<p>The event is organized at <strong>Microsoft Building 99<\/strong> (<a href=\"https:\/\/maps.app.goo.gl\/96gtzcbSwCwuMAFr6\">14820 NE 36th St, Redmond, WA, 98052<\/a>) on the main Microsoft campus. The campus area is pleasant and totally walkable.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Commuting from the USENIX Security conference hotel is easy by bus 545 (<a href=\"https:\/\/www.soundtransit.org\/ride-with-us\/routes-schedules\/545\">see schedule<\/a>). You will need to take the stop <em>State Route 520 &amp; NE 40th St<\/em> and <a href=\"https:\/\/maps.app.goo.gl\/qJSwyEvirFd6adjH8\">walk 10-15 minutes<\/a>. Going back, the bus stop is on the other side of the freeway (<a href=\"https:\/\/maps.app.goo.gl\/gZVBTWAc4sPgNyEZ8\">map here<\/a>). Taking a cab\/Lyft\/Uber is reasonable as well, although note that these tend to be more expensive in the Seattle area than in many other cities.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Staying on Monday and Tuesday in downtown Redmond is a good alternative. In this case, taking the Link Light Rail (line 2) to the Microsoft campus (Redmond Technology Station stop) is very convenient, followed by <a href=\"https:\/\/maps.app.goo.gl\/3SFM31v9Cu3yUEoM6\">a 10-15 minute walk<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>You can also choose to drive yourself to Microsoft Building 99 and park in the adjacent parking garage. There is ample free parking and you can park in any spot, but you <strong>will<\/strong> need to tell us upon checking in that you have parked a car, as it will need to be registered with the receptionist. Please be ready to provide basic information about the car (make, model, license plate #).<\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:column --><\/div>\n<!-- \/wp:columns -->\n\n<!-- wp:heading {\"className\":\"h3\"} -->\n<h2 class=\"wp-block-heading h3\" id=\"organizers\">Organizers<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:columns -->\n<div class=\"wp-block-columns\"><!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:image {\"id\":146567,\"width\":\"150px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\",\"align\":\"center\",\"className\":\"is-style-rounded\"} -->\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><img src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/01\/melissa-chase-1.jpg\" alt=\"Melissa Chase\" class=\"wp-image-146567\" style=\"width:150px\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:spacer {\"height\":\"7px\"} -->\n<div style=\"height:7px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<!-- \/wp:spacer -->\n\n<!-- wp:heading {\"textAlign\":\"center\",\"level\":5} -->\n<h5 class=\"wp-block-heading has-text-align-center\" id=\"andromachi-chatzieleftheriou\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph {\"align\":\"center\"} -->\n<p class=\"has-text-align-center\">Principal Researcher<br>Microsoft Research Redmond<\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:image {\"id\":622569,\"width\":\"150px\",\"sizeSlug\":\"full\",\"linkDestination\":\"none\",\"align\":\"center\",\"className\":\"is-style-rounded\"} -->\n<figure class=\"wp-block-image aligncenter size-full is-resized is-style-rounded\"><img src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Kim-Laine_125x125.jpg\" alt=\"Kim Laine\" class=\"wp-image-622569\" style=\"width:150px\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:spacer {\"height\":\"7px\"} -->\n<div style=\"height:7px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<!-- \/wp:spacer -->\n\n<!-- wp:heading {\"textAlign\":\"center\",\"level\":5} -->\n<h5 class=\"wp-block-heading has-text-align-center\" id=\"andromachi-chatzieleftheriou\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/kilai\/\">Kim Laine<\/a><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph {\"align\":\"center\"} -->\n<p class=\"has-text-align-center\">Principal Researcher<br>Microsoft Research Redmond<\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><\/div>\n<!-- \/wp:column --><\/div>\n<!-- \/wp:columns -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"className\":\"is-style-outline\"} -->\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"mailto:melissac@microsoft.com\">Questions? Ask us<\/a><\/div>\n<!-- \/wp:button -->\n\n<!-- wp:button {\"className\":\"is-style-outline\"} -->\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/msr-cryptography\/\">About the Cryptography Group<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n\n<!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\" id=\"heading-microsoft%e2%80%99s-event-code-of-conduct\">Microsoft\u2019s Event Code of Conduct<\/h3>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Microsoft\u2019s mission is to empower every person and every organization on the planet to achieve more. This includes virtual events Microsoft hosts and participates in, where we seek to create a respectful, friendly, and inclusive experience for all participants. As such, we do not tolerate harassing or disrespectful behavior, messages, images, or interactions by any event participant, in any form, at any aspect of the program including business and social activities, regardless of location. We do not tolerate any behavior that is degrading to any gender, race, sexual orientation or disability, or any behavior that would violate <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/compliance\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s Anti-Harassment and Anti-Discrimination Policy, Equal Employment Opportunity Policy, or Standards of Business Conduct<\/a>. In short, the entire experience must meet our culture standards. We encourage everyone to assist in creating a welcoming and safe environment. Please <a href=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a>&nbsp;any concerns, harassing behavior, or suspicious or disruptive activity. Microsoft reserves the right to ask attendees to leave at any time at its sole discretion.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"className\":\"is-style-outline\"} -->\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/app.convercent.com\/en-us\/Anonymous\/IssueIntake\/LandingPage\/65d3b907-0933-e611-8105-000d3ab03673\" target=\"_blank\" rel=\"noreferrer noopener\">Report a concern<\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons -->\n<!-- \/wp:msr\/content-tab -->\n<!-- \/wp:msr\/content-tabs -->","tab-content":[],"msr_startdate":"2025-08-11","msr_enddate":"2025-08-12","msr_event_time":"","msr_location":"Redmond, WA","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"August 11, 2025","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-960x540.png\" class=\"img-object-cover\" alt=\"Research area: Security, privacy, and cryptography\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-960x540.png 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-1066x600.png 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-655x368.png 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-343x193.png 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-640x360.png 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2019\/11\/Area_IconHeader_Sys_Security_11_2019_1920x7205-1280x720.png 1280w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","event_excerpt":"This is an invite-only event, unless you are a Microsoft employee. You must have received an invitation email from the organizers to register and attend. This is not an official USENIX Security-affiliated event. The event is over. Thank you for participating! Date: August 11 - 12, 2025&nbsp;Time:&nbsp;9:30 AM - 4:45 PM&nbsp;(Monday) \/ 5:15 PM (Tuesday)Location: 14820 NE 36th St, Redmond, WA, 98052&nbsp;Important: You will need to present a photo ID (not necessary gov't issued) to&hellip;","msr_research_lab":[],"related-researchers":[{"type":"user_nicename","display_name":"Melissa Chase","user_id":32878,"people_section":"Organizers","alias":"melissac"},{"type":"user_nicename","display_name":"Kim Laine","user_id":32546,"people_section":"Organizers","alias":"kilai"}],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[1107918],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/1145612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":32,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/1145612\/revisions"}],"predecessor-version":[{"id":1148104,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/1145612\/revisions\/1148104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/621129"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=1145612"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=1145612"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=1145612"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=1145612"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=1145612"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=1145612"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=1145612"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=1145612"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=1145612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}