Abstract is missing.
- ISLAB: Immutable Memory Management Metadata for Commodity Operating System KernelsMarius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel, Sergej Proskurin, Michalis Polychronakis, Vasileios P. Kemerlis. [doi]
- DISCO: Dynamic Searchable Encryption with Constant StateXiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang. [doi]
- SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation AttacksSanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu. [doi]
- POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated ApplicationsFengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran. [doi]
- zkMatrix: Batched Short Proof for Committed Matrix MultiplicationMingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu. [doi]
- OPRFs from Isogenies: Designs and AnalysisLena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger. [doi]
- Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSIONSebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller 0001, Steffen Wendzel. [doi]
- Ratel: MPC-extensions for Smart ContractsYunqi Li 0002, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller 0001. [doi]
- Key Establishment for Secure Asymmetric Cross-Technology CommunicationWei Wang, Xin Liu, Zicheng Chi, Stuart Ray, Ting Zhu. [doi]
- Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing AttacksOshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa, Vincent Bindschaedler, Subodha Charles. [doi]
- Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your SystemKhaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Attallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi. [doi]
- FakeX: A Framework for Detecting Fake Reviews of Browser ExtensionsEric Eric Olsson, Benjamin Eriksson, Pablo Picazo-Sanchez, Lukas Andersson, Andrei Sabelfeld. [doi]
- Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception AttacksPritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman. [doi]
- Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward PrivacyArnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay. [doi]
- An Empirical Study of Consensus Protocols' DoS ResilienceGiacomo Giuliari, Alberto Sonnino, Marc Frei, Fabio Streun, Lefteris Kokoris-Kogias, Adrian Perrig. [doi]
- Kirin: Hitting the Internet with Distributed BGP AnnouncementsLars Prehn, Pawel Foremski, Oliver Gasser. [doi]
- Fuzzing API Error Handling Behaviors using Coverage Guided Fault InjectionShashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry. [doi]
- Efficient Privacy-Preserving Approximation of the Kidney Exchange ProblemMalte Breuer, Ulrike Meyer, Susanne Wetzel. [doi]
- Mitigating Distributed Backdoor Attack in Federated Learning Through Mode ConnectivityKane Walter, Meisam Mohammady, Surya Nepal, Salil S. Kanhere. [doi]
- MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep LearningYifei Cai, Qiao Zhang 0002, Rui Ning, Chunsheng Xin, Hongyi Wu. [doi]
- Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8Lorenz Hetterich, Markus Bauer 0004, Michael Schwarz 0001, Christian Rossow. [doi]
- On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersZhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang. [doi]
- Efficient Post-Quantum Secure Deterministic Threshold Wallets from IsogeniesPoulami Das 0003, Andreas Erwig, Michael Meyer, Patrick Struck. [doi]
- BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a BinaryNozima Murodova, Hyungjoon Koo. [doi]
- PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender SystemsLinkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen 0001, Zhikun Zhang. [doi]
- An Investigation into Misuse of Java Security APIs by Large Language ModelsZahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, M. Ali Babar. [doi]
- Building Your Own Trusted Execution Environments Using FPGAMd. Armanuzzaman, Ahmad-Reza Sadeghi, Ziming Zhao. [doi]
- Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFsFlorian Frank 0004, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong 0001, Tolga Arul, Stefan Katzenbeisser 0001. [doi]
- Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World EnvironmentsXiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen. [doi]
- Single Round-trip Hierarchical ORAM via Succinct IndicesWilliam L. Holland, Olga Ohrimenko, Anthony Wirth. [doi]
- The SA4P Framework: Sensing and Actuation as a PrivilegePiet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik. [doi]
- WhisperVoiceTrace: A Comprehensive Analysis of Voice Command FingerprintingHyoJin Kim, Minji Jo, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh. [doi]
- Cloud-Based Machine Learning Models as Covert Communication ChannelsTorsten Krauß, Jasper Stang, Alexandra Dmitrienko. [doi]
- BlindShuffler: Universal and Trustless Mixing for Confidential TransactionsChenke Wang, Zhonghui Ge, Yu Long 0001, Xian Xu 0001, Shi-Feng Sun 0001, Dawu Gu. [doi]
- Username Squatting on Online Social Networks: A Study on XAnastasios Lepipas, Anastasia Borovykh, Soteris Demetriou. [doi]
- Charting the Path to SBOM Adoption: A Business Stakeholder-Centric ApproachBerend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich. [doi]
- SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT PlatformsMehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen. [doi]
- Unstoppable Wallets: Chain-assisted Threshold ECDSA and its ApplicationsGuy Zyskind, Avishay Yanai, Alex Pentland. [doi]
- Catch me if you can: Covert Information Leakage from Drones using MAVLink ProtocolMaryna Veksler, Kemal Akkaya, A. Selcuk Uluagac. [doi]
- Revocable TACO: Revocable Threshold based Anonymous Credentials over BlockchainsKanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka. [doi]
- (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android DevicesYurak Choe, Hyungseok Yu, Taeho Kim 0001, Shinjae Lee, Hojoon Lee 0001, Hyoungshick Kim. [doi]
- SilentProof: Anonymous Authentication with Blockchain-Backed OffloadingJamal Mosakheil, Kan Yang 0001. [doi]
- ESem: To Harden Process Synchronization for ServersZhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu. [doi]
- Sync-Millibottleneck Attack on Microservices Cloud ArchitectureXuhang Gu, Qingyang Wang 0001, Qiben Yan, Jianshu Liu, Calton Pu. [doi]
- LightPIR: Single-Server PIR via FHE without Gaussian NoiseHan-xia, Mingsheng Wang. [doi]
- VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation ModelsThirasara Ariyarathna, Meisam Mohammady, Hye-Young Paik, Salil S. Kanhere. [doi]
- POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and RandomizationArezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran. [doi]
- SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret SharingYufan Jiang, Fei Mei, Tianxiang Dai, Yong Li. [doi]
- POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model DetectorsDinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran. [doi]
- External Attack-Surface of Modern OrganizationsNethanel Gelernter, Haya Schulmann, Michael Waidner. [doi]
- Model Extraction Attacks RevisitedJiacheng Liang, Ren Pang, Changjiang Li, Ting Wang. [doi]
- C2Miner: Tricking IoT Malware into Revealing Live Command & Control ServersAli Davanian, Michailis Faloutsos, Martina Lindorfer. [doi]
- Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud?Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana. [doi]
- SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu. [doi]
- Honest Majority Multiparty Computation over Rings with Constant Online CommunicationMinghua Zhao. [doi]
- VFCFinder: Pairing Security Advisories and PatchesTrevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves. [doi]
- Auroch: Auction-Based Multipath Routing for Payment Channel NetworksMohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan. [doi]
- Segment-Based Formal Verification of WiFi Fragmentation and Power Save ModeZilin Shen, Imtiaz Karim, Elisa Bertino. [doi]
- Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric AuthenticationNan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo. [doi]
- The Catcher in the Eye: Recognizing Users by their BlinksRyo Iijima, Tatsuya Takehisa, Tetsushi Ohki, Tatsuya Mori. [doi]
- Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance OptimizationTiziano Marinaro, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati. [doi]
- Exposed by Default: A Security Analysis of Home Router Default SettingsJunjian Ye, Xavier de Carné de Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu, Wei Zhang. [doi]
- Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity ResearchXiaofeng Wang. [doi]
- AIMFuzz: Automated Function-Level In-Memory Fuzzing on BinariesTaewook Kim, Seokhyun Hong, Yeongpil Cho. [doi]
- On the Role of Pre-trained Embeddings in Binary Code AnalysisAlwin Maier, Felix Weißberg, Konrad Rieck. [doi]
- POSTER: On the Feasibility of Inferring SGX Execution through PMUWoomin Lee, Taehun Kim, Youngjoo Shin. [doi]
- WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache AttacksEthan Ferguson, Adam Wilson, Hoda Naghibijouybari. [doi]
- Non-Fusion Based Coherent Cache Randomization Using Cross-Domain AccessesKartik Ramkrishnan, Stephen McCamant, Antonia Zhai, Pen-Chung Yew. [doi]
- SyzRisk: A Change-Pattern-Based Continuous Kernel Regression FuzzerGwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, Mathias Payer. [doi]
- POSTER: MalaQ - A Malware Against Quantum ComputerSiyi Wang, Alex Jin, Suman Deb, Tarun Dutta, Manas Mukherjee, Anupam Chattopadhyay. [doi]
- CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud EnvironmentsFuyi Wang, Zekai Chen, Lei Pan 0002, Leo Yu Zhang, Jianying Zhou 0001. [doi]
- Menhir: An Oblivious Database with Protection against Access and Volume Pattern LeakageLeonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider 0003, Björn Scheuermann 0001. [doi]
- Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated LearningZhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran. [doi]
- Reconstructing Chameleon Hash: Full Security and the Multi-Party SettingKwan Yin Chan, Liqun Chen 0002, Yangguang Tian, Tsz Hon Yuen. [doi]
- Quantum-Safe Account Recovery for WebAuthnDouglas Stebila, Spencer Wilson. [doi]
- SoK: Rowhammer on Commodity Operating SystemsZhi Zhang 0001, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang 0002, Yang Xiang 0001. [doi]
- Towards Robust Domain Generation Algorithm ClassificationArthur Drichel, Marc Meyer, Ulrike Meyer. [doi]
- POSTER: Defense against False Data Injection Attack in a Cyber-Physical SystemSushree Padhan, Ashok Kumar Turuk. [doi]
- Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot ModelsBocheng Chen, Nikolay Ivanov, Guangjing Wang 0001, Qiben Yan. [doi]
- OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy ControllersRomain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon. [doi]
- TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEsJonas Röckl, Nils Bernsdorf, Tilo Müller. [doi]
- POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?Anand Agrawal, Rajib Ranjan Maiti. [doi]
- Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-SchedulerSimon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere. [doi]
- Command Hijacking on Voice-Controlled IoT in Amazon Alexa PlatformWenbo Ding, Song Liao, Long Cheng 0005, Xianghang Mi, Ziming Zhao 0001, Hongxin Hu. [doi]
- Skye: An Expanding PRF based Fast KDF and its ApplicationsAmit Singh Bhati, Antonin Dufka, Elena Andreeva 0001, Arnab Roy 0005, Bart Preneel. [doi]
- Generic and Automated Drive-by GPU Cache Attacks from the BrowserLukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss. [doi]
- Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security ImpactJannis Rautenstrauch, Ben Stock. [doi]
- BinGo: Identifying Security Patches in Binary Code with Graph Representation LearningXu He, Shu Wang, Pengbin Feng, Xinda Wang 0001, ShiYu Sun, Qi Li 0002, Kun Sun 0001. [doi]
- TriSAS: Toward Dependable Inter-SAS Coordination with AuditabilityShanghao Shi, Yang Xiao 0010, Changlai Du, Yi Shi 0001, Chonggang Wang, Robert Gazda, Y. Thomas Hou 0001, Eric Burger, Luiz A. DaSilva, Wenjing Lou. [doi]
- Efficient Unbalanced Quorum PSI from Homomorphic EncryptionXinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun, Jingwei Hu. [doi]
- PowSpectre: Powering Up Speculation Attacks with TSX-based ReplayMd Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao. [doi]
- Transferable, Auditable and Anonymous Ticketing ProtocolPascal Lafourcade 0001, Dhekra Mahmoud, Gaël Marcadet, Charles Olivier-Anclin. [doi]
- Publishing Common Neighbors Histograms of Social Networks under Edge Differential PrivacyChaojie Lv, Xiaokui Xiao, Lan Zhang 0002, Ting Yu. [doi]
- SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness EstimationAndre Esser 0001, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini 0002. [doi]
- DMTI: Accelerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging ExtensionAndreas Hager-Clukas, Konrad Hohentanner. [doi]
- ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with RevocationsSamuel Jaques, Hart Montgomery, Michael Lodder. [doi]
- Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and IndustryRana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang 0001, Adam Doupé, Rida A. Bazzi. [doi]
- ABBY: Automating leakage modelling for side-channel analysisOmid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina. [doi]
- SPRITE: Secure and Private Routing in Payment Channel NetworksGaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra. [doi]
- Physical-Layer Public Key Encryption Through Massive MIMOSenlin Liu, Tong Gao, Yijian Liu, Xianhui Lu. [doi]
- SoK: Understanding Design Choices and Pitfalls of Trusted Execution EnvironmentsMengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan 0001, Yinqian Zhang. [doi]
- SoK: Where to Fuzz? Assessing Target Selection Methods in Directed FuzzingFelix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck. [doi]
- Toward Practical Client-Side Encryption in Cloud ComputingRobert Deng. [doi]
- A Formal Analysis of Data Distribution Service SecurityBinghan Wang, Hui Li, Jingjing Guan. [doi]
- Unmasking the Veiled: A Comprehensive Analysis of Android Evasive MalwareAntonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, Simone Aonzo. [doi]
- zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public BlockchainJongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim. [doi]
- On The Effect of Replacement Policies on The Security of Randomized Cache ArchitecturesMoritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu. [doi]
- What is in the Chrome Web Store?Sheryl Hsu, Manda Tran, Aurore Fass. [doi]
- Byzantine Fault-Tolerant Aggregate SignaturesQuentin Kniep, Roger Wattenhofer. [doi]
- POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital WalletsJongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek 0001, Ashish Nanda, Keerthivasan Viswanathan. [doi]
- RootFree Attacks: Exploiting Mobile Platform's Super Apps From DesktopChao Wang, Yue Zhang, Zhiqiang Lin. [doi]
- X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from MemoryFlorent Moriconi, Olivier Levillain, Aurélien Francillon, Raphaël Troncy. [doi]
- SweetPAKE: Key exchange with decoy passwordsAfonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot. [doi]
- MultiTEE: Distributing Trusted Execution EnvironmentsSimon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch, Vijayanand Nayani, Jan-Erik Ekberg. [doi]
- Mayhem: Targeted Corruption of Register and Stack VariablesAndrew J. Adiletta, M. Caner Tol, Yarkin Doröz, Berk Sunar. [doi]
- Cross-Language Differential Testing of JSON ParsersJonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck. [doi]
- REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum CryptographySamuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy. [doi]
- SRAM Imprinting for System Protection and DifferentiationJubayer Mahmod, Matthew Hicks. [doi]
- Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and BeyondMingyao Shao, Yuejun Liu, Yongbin Zhou. [doi]
- Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing WebsitesWoonghee Lee 0004, Junbeom Hur, Doowon Kim. [doi]
- Camel: E2E Verifiable Instant Runoff Voting without Tallying AuthoritiesLuke Harrison, Samiran Bag, Feng Hao 0001. [doi]
- CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classificationXiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang. [doi]
- HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated LearningBo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang, Fan Zhang. [doi]
- From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser ExtensionsRitik Roongta, Rachel Greenstadt. [doi]
- FAKEPCD: Fake Point Cloud Detection via Source AttributionYiting Qu, Zhikun Zhang 0001, Yun Shen, Michael Backes 0001, Yang Zhang 0016. [doi]
- POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code GenerationSomin Song, Ashish Kundu, Byungchul Tak. [doi]
- PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edgeEmrah Sariboz, Reza Tourani, Roopa Vishwanathan, Satyajayant Misra. [doi]
- Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the CloudXiaowei Ge, Guanxiong Ha, Chunfu Jia, Zhen Su. [doi]
- SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media ManipulationsMohammad Majid Akhtar, Rahat Masood, Muhammad Ikram 0001, Salil S. Kanhere. [doi]
- POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart ContractsVan Tong, Cuong Dao, Thep Dong, Hai Anh Tran, Duc Tran, Truong X. Tran. [doi]
- Federated Learning Security: From Dusk to DawnAlexandra Dmitrienko. [doi]
- Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic EncryptionAmir Sabbagh Molahosseini, Hans Vandierendonck. [doi]
- Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic LibrariesJenny Blessing, Michael A. Specter, Daniel J. Weitzner. [doi]
- Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFILukas Maar, Pascal Nasahl, Stefan Mangard. [doi]
- Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial CommunicationEric Wagner 0003, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze. [doi]
- Towards Understanding and Improving Security-Relevant Web Application LoggingMerve Sahin, Noemi Daniele. [doi]
- Semantic Ranking for Automated Adversarial Technique Annotation in Security TextUdesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov. [doi]
- RACED: Routing in Payment Channel Networks Using Distributed Hash TablesKartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan. [doi]
- A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service InferenceAbhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra. [doi]
- What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web ApplicationsSebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert. [doi]
- Delegating FIDO Credentials Using Single-use ECDSA SignaturesWei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta. [doi]
- ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial VehiclesMuneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Ahmad Mohammad. [doi]
- Formal Verification and Solutions for Estonian E-VotingSevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang 0001. [doi]