Abstract is missing.
- Universal Physical Adversarial Attack via Background ImageYidan Xu, Juan Wang, Yuanzhang Li, Yajie Wang, Zixuan Xu, Dianxin Wang. 3-14 [doi]
- Efficient Verifiable Boolean Range Query for Light Clients on Blockchain DatabaseJianpeng Gong, Jiaojiao Wu, Jianfeng Wang, Shichong Tan. 15-35 [doi]
- SuppliedTrust: A Trusted Blockchain Architecture for Supply ChainsLim Yong Zhi, Jianying Zhou, Martin Saerbeck. 36-52 [doi]
- Towards Interpreting Vulnerability of Object Detection Models via Adversarial DistillationYaoyuan Zhang, Yu-an Tan 0001, Mingfeng Lu, Lu Liu, Quanxin Zhang, Yuanzhang Li, Dianxin Wang. 53-65 [doi]
- Vulnerability Detection for Smart Contract via Backward Bayesian Active LearningJiale Zhang, Liangqiong Tu, Jie Cai, Xiaobing Sun, Bin Li, Weitong Chen, Yu Wang. 66-83 [doi]
- A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance ServiceShengang Hao, Jun Zheng 0007, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang. 84-103 [doi]
- Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust ArchitectureJingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li. 104-123 [doi]
- On the Effect of Clock Frequency on Voltage and Electromagnetic Fault InjectionStefanos Koffas, Praveen Kumar Vadnala. 127-145 [doi]
- S-box Pooling: Towards More Efficient Side-Channel Security EvaluationsYuanyuan Zhou 0006, François-Xavier Standaert. 146-164 [doi]
- Deep Learning-Based Side-Channel Analysis Against AES Inner RoundsSudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek. 165-182 [doi]
- A Side-Channel Based Disassembler for the ARM-Cortex M0Jurian van Geest, Ileana Buhan. 183-199 [doi]
- Towards Isolated AI Accelerators with OP-TEE on SoC-FPGAsTsunato Nakai, Daisuke Suzuki, Takeshi Fujino. 200-217 [doi]
- Order vs. Chaos: Multi-trunk Classifier for Side-Channel AttackPraveen Kulkarni, Vincent Verneuil. 218-232 [doi]
- Framework for Calculating Residual Cybersecurity Risk of Threats to Road Vehicles in Alignment with ISO/SAE 21434Ahmed-Khan, Jeremy W. Bryans, Giedre Sabaliauskaite. 235-247 [doi]
- Output Prediction Attacks on Block Ciphers Using Deep LearningHayato Kimura 0002, Keita Emura, Takanori Isobe 0001, Ryoma Ito 0001, Kazuto Ogawa, Toshihiro Ohigashi. 248-276 [doi]
- HolA: Holistic and Autonomous Attestation for IoT NetworksAlessandro Visintin, Flavio Toffalini, Eleonora Losiouk, Mauro Conti, Jianying Zhou 0001. 277-296 [doi]
- The Etiology of CybersecurityMichele Ambrosi, Francesco Beltramini, Federico De Meo, Oliviero Nardi, Mattia Pacchin, Marco Rocchetto. 299-319 [doi]
- Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange ProtocolZhiqiang Ma, Jun He. 320-337 [doi]
- Toward Safe Integration of Legacy SCADA Systems in the Smart GridAldar C.-F. Chan, Jianying Zhou 0001. 338-357 [doi]
- RATLS: Integrating Transport Layer Security with Remote AttestationRobert Walther, Carsten Weinhold, Michael Roitzsch. 361-379 [doi]
- DLPFS: The Data Leakage Prevention FileSystemStefano Braghin, Marco Simioni, Mathieu Sinn. 380-397 [doi]
- Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set IntersectionAllon Adir, Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha, Michael Mirkin, Omri Soceanu. 398-424 [doi]
- UniqueChain: Achieving (Near) Optimal Transaction Settlement Time via Single Leader ElectionPeifang Ni, Jing Xu 0002. 427-446 [doi]
- PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log ServersGuangshen Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang. 447-460 [doi]
- Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security LevelZihao Song, Junichi Sakamoto, Shigeo Mitsunari, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto. 461-478 [doi]
- Leaky Blinders: Information Leakage in Mobile VPNsThijs Heijligenberg, Oualid Lkhaouni, Katharina Kohls. 481-494 [doi]
- Instrumentation Blueprints: Towards Combining Several Android Instrumentation ToolsArthur van der Staaij, Olga Gadyatskaya. 495-512 [doi]
- A Siamese Neural Network for Scalable Behavioral Biometrics AuthenticationJesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, Johana Flórez, Martín Ochoa. 515-535 [doi]
- A Methodology for Training Homomorphic Encryption Friendly Neural NetworksMoran Baruch, Nir Drucker, Lev Greenberg, Guy Moshkowich. 536-553 [doi]
- Scalable and Secure HTML5 Canvas-Based User AuthenticationEsteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, Johana Flórez, Martín Ochoa. 554-574 [doi]
- Android Malware Detection Using BERTBadr Souani, Ahmed Khanfir, Alexandre Bartel, Kevin Allix, Yves Le Traon. 575-591 [doi]
- POSTER: A Transparent Remote Quantum Random Number Generator over a Quantum-Safe LinkSergejs Kozlovics, Juris Viksna. 595-599 [doi]
- POSTER: Enabling User-Accountable Mechanisms in Decision SystemsRosario Giustolisi, Carsten Schürmann. 600-605 [doi]
- Poster: Key Generation Scheme Based on Physical LayerHong Zhao, Chunhua Su. 606-610 [doi]
- POSTER: ODABE: Outsourced Decentralized CP-ABE in Internet of ThingsMohammed B. M. Kamel, Péter Ligeti, Christoph Reich. 611-615 [doi]
- POSTER: Ransomware Detection Mechanism - Current State of the ProjectMichal Glet, Kamil Kaczynski. 616-620 [doi]