Yoshimichi Nakatsuka (University of California, Irvine)

GDPR and CCPA granted consumers various rights, including the right to access, modify, or delete any personal information collected by online services. During the process, services must authenticate the consumer and this is especially a challenge for users without accounts. To overcome this issue, we presented VICEROY at NDSS 2023. In this talk, we will be presenting the experimental efforts of VICEROY. The first section of the talk will provide a brief introduction of VICEROY and its design. Next, we will discuss the implementation and evaluation aspects of VICEROY and how the research community can benefit from it. Our talk will be especially focusing on: (1) the use of Solokey, a secure hardware token with open source firmware and bootloader, and (2) the challenges we faced during the end-to-end evaluation of VICEROY, including the server, browser extension, and the secure hardware token. Finally, we will conclude the talk with future directions for VICEROY.

Speaker’s Biography

Yoshimichi Nakatsuka is a Ph.D. candidate at the University of California, Irvine under the supervision of Professor Gene Tsudik. His main research interest lies in the intersection of Web security / privacy and Confidential Computing.

View More Papers

Detection and Resolution of Control Decision Anomalies

Prof. Kang Shin (Kevin and Nancy O'Connor Professor of Computer Science, and the Founding Director of the Real-Time Computing Laboratory (RTCL) in the Electrical Engineering and Computer Science Department at the University of Michigan)

Read More

Do Not Give a Dog Bread Every Time He...

Chongqing Lei (Southeast University), Zhen Ling (Southeast University), Yue Zhang (Jinan University), Kai Dong (Southeast University), Kaizheng Liu (Southeast University), Junzhou Luo (Southeast University), Xinwen Fu (University of Massachusetts Lowell)

Read More

Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart...

Jiayun Fu (Huazhong University of Science and Technology), Xiaojing Ma (Huazhong University of Science and Technology), Bin B. Zhu (Microsoft Research Asia), Pingyi Hu (Huazhong University of Science and Technology), Ruixin Zhao (Huazhong University of Science and Technology), Yaru Jia (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Hai…

Read More