Abstract is missing.
- Shaping Blockchain Technology for Securing Supply ChainsLim Yong Zhi, Jianying Zhou, Martin Saerbeck. 3-18 [doi]
- The Obfuscation Method of User Identification SystemJing Xu, Fei Xu, Chi Xu. 19-26 [doi]
- Proof of Assets in the Diem BlockchainPanagiotis Chatzigiannis, Konstantinos Chalkias. 27-41 [doi]
- An Identity-Based Blind Signature Scheme with Message Recovery from PairingsYihong Wen, Cong Peng, Shicheng Wang, Li Li 0073, Min Luo. 42-55 [doi]
- A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep LearningAnirban Chakraborty, Manaar Alam, Debdeep Mukhopadhyay. 59-77 [doi]
- Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution EnvironmentKota Yoshida, Takeshi Fujino. 78-95 [doi]
- On Reverse Engineering Neural Network Implementation on GPULukasz Chmielewski, Leo Weissbart. 96-113 [doi]
- On the Importance of Pooling Layer Tuning for Profiling Side-Channel AnalysisLichao Wu, Guilherme Perin. 114-132 [doi]
- Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGALaurens Le Jeune, Toon Goedemé, Nele Mentens. 133-150 [doi]
- Towards Trained Model Confidentiality and Integrity Using Trusted Execution EnvironmentsTsunato Nakai, Daisuke Suzuki, Takeshi Fujino. 151-168 [doi]
- Quantum Computing Threat Modelling on a Generic CPS SetupCher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou 0001. 171-190 [doi]
- Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart GridMuhammad M. Roomi, Daisuke Mashima, Nandha Kumar Kandasamy, Partha P. Biswas. 191-208 [doi]
- Attacklets to Test Anomaly Detectors for Critical InfrastructureSalimah Liyakkathali, Gayathri Sugumar, Aditya Mathur. 209-227 [doi]
- WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing MapsAleksei Kharitonov, Axel Zimmermann. 231-251 [doi]
- Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and BlockchainSoumyadyuti Ghosh, Urbi Chatterjee, Durba Chatterjee, Rumia Masburah, Debdeep Mukhopadhyay, Soumyajit Dey. 252-275 [doi]
- BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?Pierre-Emmanuel Clet, Oana Stan, Martin Zuber. 279-300 [doi]
- Memory Deduplication as a Protective Factor in Virtualized SystemsAbdullah Albalawi, Vassilios G. Vassilakis, Radu Calinescu. 301-317 [doi]
- A (Bit)slice of RainbowFlorian Caullery. 321-331 [doi]
- Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full SecurityYanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia. 332-345 [doi]
- An Efficient Proactive Secret Sharing Scheme for Cloud StorageShuihai Zhang, Jingfu Wang, Yan Zhang, Bei Pei, Chunli Lyu. 346-357 [doi]
- PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitorAozhuo Sun, Bingyu Li, Huiqing Wan, Qiongxiao Wang. 358-377 [doi]
- Aggregate Signature with Traceability of Devices Dynamically Generating Invalid SignaturesRyu Ishii, Kyosuke Yamashita, Yusuke Sakai 0001, Takahiro Matsuda 0002, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto. 378-396 [doi]
- Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and SteganographyNiusen Chen, Wen Xie, Bo Chen. 397-413 [doi]
- Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit PassAïda Diop, Nicolas Desmoulins, Jacques Traoré. 417-435 [doi]
- Towards Demystifying Adversarial Robustness of Binarized Neural NetworksZihao Qin, Hsiao-Ying Lin, Jie Shi. 439-462 [doi]
- Kryptonite: An Adversarial Attack Using Regional FocusYogesh Kulkarni, Krisha Bhambani. 463-481 [doi]
- POSTER: Resistance Analysis of Two AES-Like Against the Boomerang AttackLaetitia Debesse, Sihem Mesnager, Mounira Msahli. 485-489 [doi]
- POSTER: LHSA: Lightweight Hardware Security ArbitratorYongjin Kim. 490-494 [doi]
- POSTER: Another Look at Boyar-Peralta's AlgorithmAnubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu. 495-499 [doi]
- POSTER: Optimizing Device Implementation of Linear Layers with Automated ToolsAnubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu. 500-504 [doi]