Abstract is missing.
- Towards a Formally Verified Implementation of the MimbleWimble Cryptocurrency ProtocolGustavo Betarte, Maximiliano Cristiá, Carlos Daniel Luna, Adrián Silveira, Dante Zanarini. 3-23 [doi]
- Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable FunctionsJavier Arcenegui, Rosario Arjona, Iluminada Baturone. 24-40 [doi]
- Bitcoin Blockchain Steganographic AnalysisAlexandre Augusto Giron, Jean Everson Martina, Ricardo Felipe Custódio. 41-57 [doi]
- Dynamic Group Key Agreement for Resource-constrained Devices Using BlockchainsYasar Berkay Taçyildiz, Orhan Ermis, Gürkan Gür, Fatih Alagöz. 58-76 [doi]
- Tokenization of Real Estate Using Blockchain TechnologyAshutosh Gupta, Jash Rathod, Dhiren Patel, Jay Bothra, Sanket Shanbhag, Tanmay Bhalerao. 77-90 [doi]
- Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning AlgorithmDirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma. 93-105 [doi]
- Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from HeuristicsServio Paguada, Unai Rioja, Igor Armendariz. 106-125 [doi]
- A Comparison of Weight Initializers in Deep Learning-Based Side-Channel AnalysisHuimin Li, Marina Krcek, Guilherme Perin. 126-143 [doi]
- Leakage Assessment Through Neural Estimation of the Mutual InformationValence Cristiani, Maxime Lecomte, Philippe Maurine. 144-162 [doi]
- Evolvable Hardware Architectures on FPGA for Side-Channel SecurityMansoureh Labafniya, Shahram Etemadi Borujeni, Nele Mentens. 163-180 [doi]
- Simple Electromagnetic Analysis Against Activation Functions of Deep Neural NetworksGo Takatoi, Takeshi Sugawara, Kazuo Sakiyama, Yang Li 0001. 181-197 [doi]
- Performance Analysis of Multilayer Perceptron in Profiling Side-Channel AnalysisLeo Weissbart. 198-216 [doi]
- The Forgotten Hyperparameter: - Introducing Dilated Convolution for Boosting CNN-Based Side-Channel AttacksServio Paguada, Igor Armendariz. 217-236 [doi]
- ARM-AFL: Coverage-Guided Fuzzing Framework for ARM-Based IoT DevicesRong Fan, Jianfeng Pan, Shaomang Huang. 239-254 [doi]
- Post-exploitation and Persistence Techniques Against Programmable Logic ControllerAndrei Bytes, Jianying Zhou 0001. 255-273 [doi]
- Investigation of Cyber Attacks on a Water Distribution SystemSridhar Adepu, Venkata Reddy Palleti, Gyanendra Mishra, Aditya Mathur. 274-291 [doi]
- Computing Neural Networks with Homomorphic Encryption and Verifiable ComputingAbbass Madi, Renaud Sirdey, Oana Stan. 295-317 [doi]
- Attribute-Based Symmetric Searchable EncryptionHai-Van Dang, Amjad Ullah, Alexandros Bakas, Antonis Michalas. 318-336 [doi]
- Towards Inclusive Privacy Protections in the CloudTanusree Sharma, Tian Wang, Carlo Di Giulio, Masooda Bashir. 337-359 [doi]
- A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-ServiceBenjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner. 360-377 [doi]
- On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local RevocationYanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia. 381-399 [doi]
- Proofs of Ownership on Encrypted Cloud Data via Intel SGXWeijing You, Bo Chen. 400-416 [doi]
- On the Verification of Signed MessagesBowen Xu, Xin Xu, Quanwei Cai 0001, Wei Wang, Qiongxiao Wang. 417-434 [doi]
- Applications and Developments of the Lattice Attack in Side Channel AttacksZiQiang Ma, Bingyu Li, Quanwei Cai 0001, Jun Yang. 435-452 [doi]
- Exploring the Security of Certificate Transparency in the WildBingyu Li, FengJun Li, ZiQiang Ma, Qianhong Wu. 453-470 [doi]
- DaVinci: Android App Analysis Beyond Frida via Dynamic System Call InstrumentationAlexander Druffel, Kris Heid. 473-489 [doi]
- MobHide: App-Level Runtime Data Anonymization on MobileDavide Caputo, Luca Verderame, Alessio Merlo. 490-507 [doi]
- Evaluation of the Adoption and Privacy Risks of Google PromptsChristos Avraam, Elias Athanasopoulos. 508-522 [doi]
- On the Evolution of Security Issues in Android App VersionsAnatoli Kalysch, Joschua Schilling, Tilo Müller. 523-541 [doi]
- Unsupervised Labelling of Stolen Handwritten Digit Embeddings with Density MatchingThomas Thebaud, Gaël Le Lan, Anthony Larcher. 545-563 [doi]
- Minority Reports Defense: Defending Against Adversarial PatchesMichael McCoyd, won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David A. Wagner 0001. 564-582 [doi]