Abstract is missing.
- Automatic Search Model for Related-Tweakey Impossible Differential CryptanalysisHuiqin Chen, Yongqiang Li 0001, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang. 3-22 [doi]
- Comprehensive Preimage Security Evaluations on Rijndael-Based HashingTianyu Zhang. 23-42 [doi]
- Conditional Cube Key Recovery Attack on Round-Reduced XoodyakMohammad Vaziri, Vesselin Velichkov. 43-62 [doi]
- Smart Contract-Based E-Voting System Using Homomorphic Encryption and Zero-Knowledge ProofYuxiao Wu, Shoji Kasahara. 67-83 [doi]
- Preventing Content Cloning in NFT CollectionsIvan Visconti, Andrea Vitaletti, Marco Zecchini. 84-99 [doi]
- NFT Trades in Bitcoin with Off-Chain ReceiptsMehmet Sabir Kiraz, Enrique Larraia, Owen Vaughan. 100-117 [doi]
- A Comparison of Multi-task Learning and Single-Task Learning ApproachesThomas Marquet, Elisabeth Oswald. 121-138 [doi]
- Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs - An Evaluation of the ASCAD DatabasesThomas Schamberger, Maximilian Egger, Lars Tebelmann. 139-158 [doi]
- Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and SaberLinus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova. 159-177 [doi]
- SoK: Assisted Fault Simulation - Existing Challenges and Opportunities Offered by AIAsmita Adhikary, Ileana Buhan. 178-195 [doi]
- Using Model Optimization as Countermeasure against Model Recovery AttacksDirmanto Jap, Shivam Bhasin. 196-209 [doi]
- Blockchain-Enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous NetworksAli Hussain Khan, Naveed Ul Hassan, Chuadhry Mujeeb Ahmed, Zartash Afzal Uzmi, Chau Yuen. 215-230 [doi]
- A Security Policy Engine for Building Energy Management SystemsJiahui Lim, Wen Shei Ong, Utku Tefek, Ertem Esiner. 231-244 [doi]
- EARIC: Exploiting ADC Registers in IoT and Control SystemsEyasu Getahun Chekole, Rajaram Thulasiraman, Jianying Zhou 0001. 245-265 [doi]
- Round-Efficient Security Authentication Protocol for 5G NetworkGuining Geng, Junfeng Miao, Nan Xiao. 269-283 [doi]
- A Framework for TLS Implementation Vulnerability Testing in 5GYong Wang, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang, Lei Ma, Fangzhe Zhang, Lili Sun, Zhenghao Li. 284-298 [doi]
- Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control SystemsSim Siang Tze Victor, Chuadhry Mujeeb Ahmed, Koh Yoong Keat Kelvin, Jianying Zhou 0001. 299-320 [doi]
- Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing SystemsMahender Kumar, Gregory Epiphaniou, Carsten Maple. 321-335 [doi]
- WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISMFuyi Wang, Yanping Wang, Leo Yu Zhang, Yuval Hertzog, Michael Loewy, Dominique Valladolid, Julio Medeiros, Muna Al-Hawawreh 0001, Robin Doss. 336-354 [doi]
- slytHErin: An Agile Framework for Encrypted Deep Neural Network InferenceFrancesco Intoci, Sinem Sav, Apostolos Pyrgelis, Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux. 359-377 [doi]
- Trust Management Framework for Containerized Workloads Applications to 5G NetworksAicha Miloudi, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens, Stere Preda. 378-393 [doi]
- cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media ConsumptionWenyuan Li, Wei Wang 0314, Fan Lang, Linli Lu, Heqing Huang. 399-418 [doi]
- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block CiphersTongxia Deng, Ping Li, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, Yiyuan Luo. 419-438 [doi]
- Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V PlatformHaosong Zhao, Rui Su, Rui Lin, Jiankuo Dong, Donglong Chen. 439-458 [doi]
- Generic Constructions of Server-Aided Revocable ABE with Verifiable TransformationFeng Yang, Hui Cui, Jiwu Jing. 459-479 [doi]
- Hybrid Post-quantum Signatures in Hardware Security KeysDiana Ghinea, Fabian Kaczmarczyck, Jennifer Pullman, Julien Cretin, Stefan Kölbl, Rafael Misoczki, Jean Michel Picod, Luca Invernizzi, Elie Bursztein. 480-499 [doi]
- +Gustavo Banegas, Florian Caullery. 500-514 [doi]
- SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis CompositionsSazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao. 515-529 [doi]
- ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-SecretTeik Guan Tan, Vishal Sharma 0001, Zengpeng Li, Pawel Szalachowski, Jianying Zhou 0001. 530-550 [doi]
- If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile AppsFederico Carboni, Mauro Conti, Denis Donadel, Mariano Sciacco. 553-570 [doi]
- Enabling Lightweight Privilege Separation in Applications with MicroGuardsZahra Tarkhani, Anil Madhavapeddy. 571-598 [doi]
- Eliminating Adversarial Perturbations Using Image-to-Image Translation MethodHaibo Zhang 0008, Zhihua Yao, Kouichi Sakurai. 601-620 [doi]
- Federated Learning Approach for Distributed Ransomware AnalysisAldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno. 621-641 [doi]
- Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural NetworksMohammed M. Alani, Atefeh Mashatan, Ali Miri. 642-656 [doi]
- POSTER: Ransomware Detection Mechanism - Project Status at the Beginning of 2023Michal Glet, Kamil Kaczynski. 659-663 [doi]
- POSTER: AuthZit: Multi-modal Authentication with Visual-Spatial and Text SecretsJoon Kuy Han, Dennis Wong, Byungkon Kang. 664-668 [doi]
- POSTER: Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTTHung-Yu Chien. 669-674 [doi]
- POSTER: Stopping Run-Time Countermeasures in Cryptographic PrimitivesMyung-Hyun Kim, Taek-Young Youn, Seungkwang Lee. 675-679 [doi]
- POSTER: Swarm-Based IoT Network Penetration Testing by IoT DevicesThomas Schiller, Sean C. Mondesire. 680-684 [doi]
- POSTER: Advancing Federated Edge Computing with Continual Learning for Secure and Efficient PerformanceChunlu Chen, Kevin I-Kai Wang, Peng Li, Kouichi Sakurai. 685-689 [doi]
- POSTER: A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and DefensesHaibo Zhang 0008, Zhihua Yao, Kouichi Sakurai. 690-694 [doi]
- POSTER: Integrating Quantum Key Distribution into Hybrid Quantum-Classical NetworksJuris Viksna, Sergejs Kozlovics, Edgars Rencis. 695-699 [doi]
- POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power SystemsMuhammad Nouman Nafees, Neetesh Saxena, Pete Burnap. 700-704 [doi]
- POSTER: PriAuct: Privacy Preserving Auction MechanismNeha Joshi, Abhishek Thakur, A. Antony Franklin. 705-709 [doi]
- POSTER: Using Verifiable Credentials for Authentication of UAVs in LogisticsKen Watanabe, Kazue Sako. 710-715 [doi]
- POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert ScaleYuji Suga. 716-721 [doi]
- POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control EncryptionDequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang. 722-726 [doi]