{"id":700093,"date":"2020-10-23T11:49:39","date_gmt":"2020-10-23T18:49:39","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=700093"},"modified":"2025-08-06T11:52:19","modified_gmt":"2025-08-06T18:52:19","slug":"ccs-2020","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/ccs-2020\/","title":{"rendered":"Microsoft at CCS 2020"},"content":{"rendered":"\n\n<p><strong>Website:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">ACM CCS 2020<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>Microsoft is proud to be a gold sponsor of the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. See more details on our contributions on the sessions tab.<\/p>\n<div style=\"height: 20px\"><\/div>\n<h2>Live chat with us<\/h2>\n<p>Chat with our experts in our gather.town booth at the below times:<br \/>\n<em>All times are displayed in UTC \u2013 05:00<\/em><\/p>\n<table style=\"border-spacing: inherit;border-collapse: collapse;width: 100%;padding: 6px;text-align: center;border-bottom: 1px solid #000000\">\n<tbody>\n<tr>\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Tuesday, November 10<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">8:00 AM\u20139:00 AM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">3:00 PM\u20133:30 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Deevashwer Rathee<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Wednesday, November 11<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">4:00 AM\u20135:00 AM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">12:00 PM\u201312:45 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Esha Ghosh<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Thursday, November 12<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">1:00 PM\u20132:00 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"height: 40px\"><\/div>\n<h3>Sponsorship Chair<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><\/p>\n<h3>Program Committee members<\/h3>\n<p>Hao Chen<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/esghosh\/\">Esha Ghosh<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p><em>All times are displayed in UTC \u2013 05:00<\/em><\/p>\n<h2>Monday, November 9<\/h2>\n<p><strong>CCSW 2020: The ACM Cloud Computing Security Workshop<\/strong><br \/>\nCommittee Members: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/leendert-van-doorn-740170\/\" target=\"_blank\" rel=\"noopener\">Leendert Van Doorn<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/klauter\/\">Kristin Lauter<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Tuesday, November\u00a010<\/h2>\n<p>2:30 &#8211; 3:30\u00a0| ML and Information Leakage<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow2-practical-2-party-secure-inference\/\"><strong>CrypTFlow: Practical 2-Party Secure Inference<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/deevashwer\/\" target=\"_blank\" rel=\"noopener\">Deevashwer Rathee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/mayank0403.github.io\/\" target=\"_blank\" rel=\"noopener\">Mayank Rathee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/nishant-kumar-87627441\/\" target=\"_blank\" rel=\"noopener\">Nishant Kumar<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya Gupta<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/analyzing-information-leakage-of-updates-to-natural-language-models\/\"><strong>Analyzing Information Leakage of Updates to Natural Language Models<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-B\u00e9guelin<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/lukaswutschitz\/\" target=\"_blank\" rel=\"noopener\">Lukas Wutschitz<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/shtople\/\">Shruti Tople<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/victor-r%C3%BChle-bb752195\/\" target=\"_blank\" rel=\"noopener\">Victor R\u00fchle<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/anpaverd\/\">Andrew Paverd<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Olga\u00a0Ohrimenko, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/mabrocks\/\">Marc Brockschmidt<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Wednesday, November 11<\/h2>\n<p>12:45 &#8211; 1:45 | Formal Methods<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/haclxn\/\"><strong>HACL\u00d7N: Verified Generic SIMD Crypto (for all your favourite platforms)<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nMarina\u00a0Polubelova,\u00a0Karthikeyan\u00a0Bhargavan,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan Protzenko<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0Benjamin\u00a0Beurdouche,\u00a0Aymeric\u00a0Fromherz,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago\u00a0Zanella-B\u00e9guelin<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Thursday, November\u00a012<\/h2>\n<p>12:45\u00a0&#8211;\u00a01:45 | Secure Messaging and Key Exchange<br \/>\n<strong>The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption<\/strong><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0Trevor Perrin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/gregz\/\">Greg Zaverucha<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Friday, November 13<\/h2>\n<p><strong>13th\u00a0ACM Workshop on Artificial Intelligence and Security<\/strong><br \/>\nProgram Committee Members:\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/hyrumanderson\/\" target=\"_blank\" rel=\"noopener\">Hyrum Anderson<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/milenko-drinic-9a84473\/\" target=\"_blank\" rel=\"noopener\">Milenko Drinic<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is proud to be a gold sponsor of the ACM Conference on Computer and Communications Security. See our contributions to the event this year.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2020-11-09","msr_enddate":"2020-11-13","msr_location":"Virtual\/Online","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":false,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558],"msr-region":[256048],"msr-event-type":[197941],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-700093","msr-event","type-msr-event","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-region-global","msr-event-type-conferences","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"Microsoft at CCS 2020\",\"backgroundColor\":\"grey\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"About\"} --><!-- wp:freeform --><p><strong>Website:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">ACM CCS 2020<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>Microsoft is proud to be a gold sponsor of the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<\/a>. See more details on our contributions on the sessions tab.<\/p>\n<div style=\"height: 20px\"><\/div>\n<h2>Live chat with us<\/h2>\n<p>Chat with our experts in our gather.town booth at the below times:<br \/>\n<em>All times are displayed in UTC \u2013 05:00<\/em><\/p>\n<table style=\"border-spacing: inherit;border-collapse: collapse;width: 100%;padding: 6px;text-align: center;border-bottom: 1px solid #000000\">\n<tbody>\n<tr>\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Tuesday, November 10<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">8:00 AM\u20139:00 AM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">3:00 PM\u20133:30 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Deevashwer Rathee<\/td>\n<\/tr>\n<tr>\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Wednesday, November 11<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">4:00 AM\u20135:00 AM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">12:00 PM\u201312:45 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Esha Ghosh<\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Thursday, November 12<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">1:00 PM\u20132:00 PM<\/td>\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"height: 40px\"><\/div>\n<h3>Sponsorship Chair<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><\/p>\n<h3>Program Committee members<\/h3>\n<p>Hao Chen<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/esghosh\/\">Esha Ghosh<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Sessions\"} --><!-- wp:freeform --><p><em>All times are displayed in UTC \u2013 05:00<\/em><\/p>\n<h2>Monday, November 9<\/h2>\n<p><strong>CCSW 2020: The ACM Cloud Computing Security Workshop<\/strong><br \/>\nCommittee Members: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/leendert-van-doorn-740170\/\" target=\"_blank\" rel=\"noopener\">Leendert Van Doorn<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/klauter\/\">Kristin Lauter<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Tuesday, November\u00a010<\/h2>\n<p>2:30 &#8211; 3:30\u00a0| ML and Information Leakage<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow2-practical-2-party-secure-inference\/\"><strong>CrypTFlow: Practical 2-Party Secure Inference<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/deevashwer\/\" target=\"_blank\" rel=\"noopener\">Deevashwer Rathee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/mayank0403.github.io\/\" target=\"_blank\" rel=\"noopener\">Mayank Rathee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/nishant-kumar-87627441\/\" target=\"_blank\" rel=\"noopener\">Nishant Kumar<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya Gupta<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/analyzing-information-leakage-of-updates-to-natural-language-models\/\"><strong>Analyzing Information Leakage of Updates to Natural Language Models<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-B\u00e9guelin<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/lukaswutschitz\/\" target=\"_blank\" rel=\"noopener\">Lukas Wutschitz<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/shtople\/\">Shruti Tople<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/victor-r%C3%BChle-bb752195\/\" target=\"_blank\" rel=\"noopener\">Victor R\u00fchle<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/anpaverd\/\">Andrew Paverd<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Olga\u00a0Ohrimenko, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/mabrocks\/\">Marc Brockschmidt<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Wednesday, November 11<\/h2>\n<p>12:45 &#8211; 1:45 | Formal Methods<br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/haclxn\/\"><strong>HACL\u00d7N: Verified Generic SIMD Crypto (for all your favourite platforms)<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nMarina\u00a0Polubelova,\u00a0Karthikeyan\u00a0Bhargavan,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan Protzenko<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0Benjamin\u00a0Beurdouche,\u00a0Aymeric\u00a0Fromherz,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago\u00a0Zanella-B\u00e9guelin<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Thursday, November\u00a012<\/h2>\n<p>12:45\u00a0&#8211;\u00a01:45 | Secure Messaging and Key Exchange<br \/>\n<strong>The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption<\/strong><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0Trevor Perrin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/gregz\/\">Greg Zaverucha<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<hr \/>\n<h2>Friday, November 13<\/h2>\n<p><strong>13th\u00a0ACM Workshop on Artificial Intelligence and Security<\/strong><br \/>\nProgram Committee Members:\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/hyrumanderson\/\" target=\"_blank\" rel=\"noopener\">Hyrum Anderson<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.linkedin.com\/in\/milenko-drinic-9a84473\/\" target=\"_blank\" rel=\"noopener\">Milenko Drinic<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"About","content":"Microsoft is proud to be a gold sponsor of the <a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2020\/\" target=\"_blank\" rel=\"noopener\">ACM Conference on Computer and Communications Security<\/a>. See more details on our contributions on the sessions tab.\r\n<div style=\"height: 20px\"><\/div>\r\n<h2>Live chat with us<\/h2>\r\nChat with our experts in our gather.town booth at the below times:\r\n<em>All times are displayed in UTC \u2013 05:00<\/em>\r\n<table style=\"border-spacing: inherit;border-collapse: collapse;width: 100%;padding: 6px;text-align: center;border-bottom: 1px solid #000000\">\r\n<tbody>\r\n<tr>\r\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Tuesday, November 10<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\r\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">8:00 AM\u20139:00 AM<\/td>\r\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">3:00 PM\u20133:30 PM<\/td>\r\n<td style=\"padding: inherit;border: inherit\">Deevashwer Rathee<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Wednesday, November 11<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\r\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">4:00 AM\u20135:00 AM<\/td>\r\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">12:00 PM\u201312:45 PM<\/td>\r\n<td style=\"padding: inherit;border: inherit\">Esha Ghosh<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;padding: inherit;border: inherit;background-color: #dddddd\" colspan=\"2\"><strong>Thursday, November 12<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 50%;padding: inherit;border: inherit\"><strong>Time (EST)<\/strong><\/td>\r\n<td style=\"padding: inherit;border: inherit\"><strong>Name<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"vertical-align: middle;width: 50%;padding: inherit;border: inherit\">1:00 PM\u20132:00 PM<\/td>\r\n<td style=\"padding: inherit;border: inherit\">Santiago Zanella-Beguelin<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<div style=\"height: 40px\"><\/div>\r\n<h3>Sponsorship Chair<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a>\r\n<h3>Program Committee members<\/h3>\r\nHao Chen\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/esghosh\/\">Esha Ghosh<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<\/a>"},{"id":1,"name":"Sessions","content":"<em>All times are displayed in UTC \u2013 05:00<\/em>\r\n<h2>Monday, November 9<\/h2>\r\n<strong>CCSW 2020: The ACM Cloud Computing Security Workshop<\/strong>\r\nCommittee Members: <a href=\"https:\/\/www.linkedin.com\/in\/leendert-van-doorn-740170\/\" target=\"_blank\" rel=\"noopener\">Leendert Van Doorn<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/klauter\/\">Kristin Lauter<\/a>\r\n\r\n<hr \/>\r\n\r\n<h2>Tuesday, November\u00a010<\/h2>\r\n2:30 - 3:30\u00a0| ML and Information Leakage\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow2-practical-2-party-secure-inference\/\"><strong>CrypTFlow: Practical 2-Party Secure Inference<\/strong><\/a>\r\n<a href=\"https:\/\/www.linkedin.com\/in\/deevashwer\/\" target=\"_blank\" rel=\"noopener\">Deevashwer Rathee<\/a>, <a href=\"https:\/\/mayank0403.github.io\/\" target=\"_blank\" rel=\"noopener\">Mayank Rathee<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/nishant-kumar-87627441\/\" target=\"_blank\" rel=\"noopener\">Nishant Kumar<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya Gupta<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<\/a>\r\n\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/analyzing-information-leakage-of-updates-to-natural-language-models\/\"><strong>Analyzing Information Leakage of Updates to Natural Language Models<\/strong><\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-B\u00e9guelin<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/lukaswutschitz\/\" target=\"_blank\" rel=\"noopener\">Lukas Wutschitz<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/shtople\/\">Shruti Tople<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/victor-r%C3%BChle-bb752195\/\" target=\"_blank\" rel=\"noopener\">Victor R\u00fchle<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/anpaverd\/\">Andrew Paverd<\/a>, Olga\u00a0Ohrimenko, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/mabrocks\/\">Marc Brockschmidt<\/a>\r\n\r\n<hr \/>\r\n\r\n<h2>Wednesday, November 11<\/h2>\r\n12:45 - 1:45 | Formal Methods\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/haclxn\/\"><strong>HACL\u00d7N: Verified Generic SIMD Crypto (for all your favourite platforms)<\/strong><\/a>\r\nMarina\u00a0Polubelova,\u00a0Karthikeyan\u00a0Bhargavan,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan Protzenko<\/a>,\u00a0Benjamin\u00a0Beurdouche,\u00a0Aymeric\u00a0Fromherz,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago\u00a0Zanella-B\u00e9guelin<\/a>\r\n\r\n<hr \/>\r\n\r\n<h2>Thursday, November\u00a012<\/h2>\r\n12:45\u00a0-\u00a01:45 | Secure Messaging and Key Exchange\r\n<strong>The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption<\/strong>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a>,\u00a0Trevor Perrin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/gregz\/\">Greg Zaverucha<\/a>\r\n\r\n<hr \/>\r\n\r\n<h2>Friday, November 13<\/h2>\r\n<strong>13th\u00a0ACM Workshop on Artificial Intelligence and Security<\/strong>\r\nProgram Committee Members:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/hyrumanderson\/\" target=\"_blank\" rel=\"noopener\">Hyrum Anderson<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/milenko-drinic-9a84473\/\" target=\"_blank\" rel=\"noopener\">Milenko Drinic<\/a>"}],"msr_startdate":"2020-11-09","msr_enddate":"2020-11-13","msr_event_time":"","msr_location":"Virtual\/Online","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"November 9, 2020","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"Microsoft is proud to be a gold sponsor of the ACM Conference on Computer and Communications Security. See our contributions to the event this year.","msr_research_lab":[],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/700093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":6,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/700093\/revisions"}],"predecessor-version":[{"id":1146922,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/700093\/revisions\/1146922"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=700093"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=700093"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=700093"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=700093"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=700093"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=700093"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=700093"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=700093"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=700093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}