Abstract is missing.
- Enhanced CKKS Bootstrapping with Generalized Polynomial Composites ApproximationSeonhong Min, Joon-Woo Lee, Yongsoo Song. 1-12 [doi]
- An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph OptimizationAnimesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay. 13-29 [doi]
- A Novel Asymmetric BSGS Polynomial Evaluation Algorithm under Homomorphic EncryptionQingfeng Wang, Li-Ping Wang. 30-44 [doi]
- Efficient Updatable Private Information Retrieval From Simulatable Homomorphic CiphertextsYini Lin, Haibo Tian. 45-57 [doi]
- Key Extension: Multi-Key FHE Utilizing LWRMansi Goyal, Aditi Kar Gangopadhyay. 58-71 [doi]
- DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA GroupSemin Han, Geonho Yoon, Hyunok Oh, Jihye Kim. 72-86 [doi]
- Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point DivisionSoumyadyuti Ghosh, Harishma Boyapally, Ajith Suresh, Arpita Patra, Soumyajit Dey, Debdeep Mukhopadhyay. 87-103 [doi]
- Efficient Private Set Intersection by Utilizing Oblivious Transfer ExtensionMingli Wu, Tsz Hon Yuen, Siu-Ming Yiu. 104-117 [doi]
- SEEC: Memory Safety Meets Efficiency in Secure Two-Party ComputationHenri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider 0003. 118-135 [doi]
- Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRFFei Xiao, Chunyang Lv, Jianfeng Wang 0001. 136-148 [doi]
- Concretely Efficient Private Set Union via Circuit-Based PSIGowri R. Chandran, Thomas Schneider 0003, Maximilian Stillger, Christian Weinert. 149-162 [doi]
- Prior-Based Label Differential Privacy via Secure Two-Party ComputationAmit Agarwal, Stanislav Peceny, Mariana Raykova 0001, Phillipp Schoppmann, Karn Seth. 163-179 [doi]
- A Cryptographic Analysis of Google's PSP and Falcon Channel ProtocolsMarc Fischlin, Sascha Hoffmann, Leonhard Ruppel, Gözde Saçiak, Tobias Schnitzler, Christian Schwarz, Maximilian Stillger. 180-197 [doi]
- Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-ChoicesDominik Bojko, Jacek Cichon, Miroslaw Kutylowski, Oliwer Sobolewski. 198-214 [doi]
- LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof GenerationDien H. A. Tran, Tam N. B. Nguyen, Nhien-An Le-Khac, Thuc D. Nguyen. 215-230 [doi]
- Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocolIoana Boureanu, Cristina Onete, Stephan Wesemeyer, Léo Robert, Rhys Miller, Pascal Lafourcade 0001, Fortunat Rajaona. 231-247 [doi]
- An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor NodesYoungBeom Kim, Seog Chung Seo. 248-266 [doi]
- Quantum-safe Signatureless DNSSECAditya Singh Rawat, Mahabir Prasad Jhanwar. 267-282 [doi]
- Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric EncryptionDebadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay. 283-297 [doi]
- Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-WaayGuilhem Niot. 298-312 [doi]
- A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-EstablishmentSalman Shamshad, Sana Belguith, Alma Oracevic. 313-326 [doi]
- poqeth: Efficient, post-quantum signature verification on EthereumRuslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi. 327-343 [doi]
- Perses: Unlocking Privilege Escalation for Small LLMs via Extensible HeterogeneityDominik M. Weber, Ioannis Tzachristas, Aifen Sui. 344-357 [doi]
- Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-CompletionKarl Rubel, Maximilian Noppel, Christian Wressnegger. 358-374 [doi]
- PentestAgent: Incorporating LLM Agents to Automated Penetration TestingXiangmin Shen, Lingzhi Wang 0002, Zhenyuan Li, Yan Chen 0004, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan. 375-391 [doi]
- SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language ModelsVan Nguyen 0002, Surya Nepal, Xingliang Yuan, Tingmin Wu, Carsten Rudolph. 392-406 [doi]
- Sounds Vishy: Automating Vishing Attacks with AI-Powered SystemsJoão Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos. 407-424 [doi]
- SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and MitigationYashothara Shanmugarasa, Ming Ding 0001, Mahawaga Arachchige Pathum Chamikara, Thierry Rakotoarivelo. 425-441 [doi]
- ChainMarks: Securing DNN Watermark with Cryptographic ChainBrian Choi, Shu Wang, Isabelle Choi, Kun Sun. 442-455 [doi]
- Toward Malicious Clients Detection in Federated LearningZhihao Dou, Jiaqi Wang, Wei Sun 0013, Zhuqing Liu, Minghong Fang. 456-472 [doi]
- Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AIMeghali Nandi, Arash Shaghaghi, Nazatul Haque Sultan, Gustavo Batista, Raymond K. Zhao, Sanjay K. Jha. 473-487 [doi]
- When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive LearningRuining Sun, Hongsheng Hu, Wei Luo 0001, Zhaoxi Zhang, Yanjun Zhang, Haizhuan Yuan, Leo Yu Zhang. 488-500 [doi]
- Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion ModelsFei Wang 0075, Yan Zhu, Baochun Li. 501-516 [doi]
- Transferable Adversarial Examples with Bayesian ApproachMingyuan Fan 0003, Cen Chen 0001, Wenmeng Zhou, Yinggui Wang. 517-529 [doi]
- Glitch in Time: Exploiting Temporal Misalignment of IMU For EavesdroppingAhmed Najeeb, Abdul Rafay 0002, Muhammad Hamad Alizai, Naveed Anwar Bhatti. 530-541 [doi]
- Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHubJafar Akhoundali, HamidReza Hamidi, Kristian F. D. Rietveld, Olga Gadyatskaya. 542-558 [doi]
- PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-ResponseGovind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon. 559-575 [doi]
- Minerva: A File-Based Ransomware DetectorDorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini. 576-590 [doi]
- Evaluating Robustness of Reference-based Phishing DetectorsEunjin Roh, Sungwoo Jeon, Sooel Son, Sanghyun Hong 0001. 591-604 [doi]
- Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-WorldHua Ma, Alsharif Abuadbba, Yansong Gao 0001, Hyoungshick Kim, Surya Nepal. 605-620 [doi]
- Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard DefenseChaiwon Hwang, Haeseung Jeon, Jiwoo Hong, Hosung Kang, Nate Mathews, Goun Kim, Se Eun Oh. 621-634 [doi]
- Robust Locally Differentially Private Graph AnalysisAmrita Roy Chowdhury 0001, Jacob Imola, Kamalika Chaudhuri. 635-650 [doi]
- PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2XXuyuan Cai, Rui Song, Bin Xie, Qingjun Xiao, Bin Xiao. 651-664 [doi]
- Unveiling Privacy Risks in Quantum Optimization ServicesMateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski. 665-681 [doi]
- QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration AttacksThomas Grübl, Weijie Niu, Jan von der Assen, Burkhard Stiller. 682-695 [doi]
- ClearMask: Noise-Free and Naturalness-Preserving Protection Against Voice Deepfake AttacksYuanda Wang, Bocheng Chen, Hanqing Guo, Guangjing Wang 0001, Weikang Ding, Qiben Yan. 696-709 [doi]
- Slice it up: Unmasking User Identities in Smartwatch Health DataLucas Lange, Tobias Schreieder, Victor Christen, Erhard Rahm. 710-726 [doi]
- Secure Steganography Based on Chaos-Aided Quantization Index ModulationShanxiang Lyu, Xinquan Xu, Ling Liu, Lip Yee Por. 727-738 [doi]
- App-solutely Modded: Surveying Modded App Market Operators and Original App DevelopersLuis Adan Saavedra, Hridoy S. Dutta, Alastair R. Beresford, Alice Hutchings. 739-758 [doi]
- Proxies as Sensors: Measuring Censorship of Refraction Networking in IranAbdulrahman Alaraj, Eric Wustrow. 759-772 [doi]
- Virtual End-to-End Encryption: Analysis of the Doctolib ProtocolDennis Dayanikli, Laura Holz, Anja Lehmann. 773-789 [doi]
- Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High UtilityM. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal 0001, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David. 790-806 [doi]
- Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum CompatibilityJia Liu, Mark Manulis. 807-822 [doi]
- VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and MoreYue Zhou, Sid Chi-Kin Chau. 823-838 [doi]
- Scalable Time-Lock PuzzleAydin Abadi, Dan Ristea, Artem Grigor, Steven J. Murdoch. 839-855 [doi]
- BIP32-Compatible Threshold WalletsPoulami Das 0003, Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder, Julian Loss, Ziyan Qu, Siavash Riahi 0002. 856-872 [doi]
- FIRST: FrontrunnIng Resistant Smart ConTractsEmrah Sariboz, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra. 873-889 [doi]
- Mining Attack with Zero Knowledge in the BlockchainJiaping Yu, Shang Gao 0006, Rui Song, Zhiping Cai, Bin Xiao 0001. 890-905 [doi]
- Infiltrated Selfish Mining: Think Win-Win to Escape DilemmasXuelian Cao, Zheng Yang 0001, Tao Xiang 0001, Jianting Ning, Yuhan Liu, Zhiming Liu 0001, Jianying Zhou 0001. 906-922 [doi]
- BRC20 Snipping AttackMinfeng Qi, Qin Wang 0008, Ningran Li, Shiping Chen 0001, Tianqing Zhu. 923-938 [doi]
- An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and ActivitiesKailun Yan, Bo Lu, Pranav Agrawal 0002, Jiasun Li, Wenrui Diao, Xiaokuan Zhang. 939-954 [doi]
- AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing FrameworksTannishtha Devgun, Gulshan Kumar, Rahul Saha, Alessandro Brighente, Mauro Conti. 955-970 [doi]
- DTL: Data Tumbling Layer A Composable Unlinkability for Smart ContractsMohsen Minaei, Pedro Moreno-Sanchez, Zhiyong Fang, Srinivasan Raghuraman, Navid Alamati, Panagiotis Chatzigiannis, Ranjit Kumaresan, Duc V. Le. 971-984 [doi]
- Pace: Privacy-Preserving and Atomic Cross-chain Swaps for Cryptocurrency ExchangesJianhuan Wang, Bin Xiao. 985-1002 [doi]
- NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacksAndrea Ciccotelli, Maurantonio Caprolu, Roberto Di Pietro. 1003-1015 [doi]
- Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA AttacksMoses Ike, Keaton Sadoski, Romuald Valme, Burak Sahin, Saman A. Zonouz, Wenke Lee. 1016-1031 [doi]
- Bits and Pieces: Piecing Together Factors of IoT Vulnerability ExploitationArwa Abdulkarim Al Alsadi, Mathew Vermeer, Takayuki Sasaki, Katsunari Yoshioka, Michel van Eeten, Carlos Gañán. 1032-1049 [doi]
- AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoTLukas Petzi, Torsten Krauß, Alexandra Dmitrienko, Gene Tsudik. 1050-1064 [doi]
- Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control SystemsXugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh. 1065-1082 [doi]
- Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing FiltersYuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka, Tatsuya Mori. 1083-1100 [doi]
- From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial CommunicationAbdullah Zubair Mohammed, Ryan M. Gerdes. 1101-1113 [doi]
- Preventing Radio Fingerprinting through Low-Power JammingMuhammad Irfan, Savio Sciancalepore, Gabriele Oligeri. 1114-1126 [doi]
- N-Tracer: A Trace Driven Attack on NoC-Based MPSoC ArchitectureDipesh, Urbi Chatterjee. 1127-1140 [doi]
- FP-Rowhammer: DRAM-Based Device FingerprintingHari Venugopalan, Kaustav Goswami 0002, Zainul ul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq. 1141-1157 [doi]
- ProbeShooter: A New Practical Approach for Probe AimingDaehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong. 1158-1174 [doi]
- GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow GraphsDaehyeon Lee, JungHee Lee. 1175-1187 [doi]
- Monocle: Transient Execution Proof Memory Views for Runtime Compiled CodeMatteo Oldani, William Blair, Shweta Shinde, Matthias Neugschwandtner. 1188-1202 [doi]
- Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed EnvironmentsPhilipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad Rahmani Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth 0001, Dominik Stoffel, Wolfgang Kunz. 1203-1218 [doi]
- FAULT+PROBE: A Generic Rowhammer-based Bit Recovery AttackKemal Derya, M. Caner Tol, Berk Sunar. 1219-1234 [doi]
- Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EVNiclas Kühnapfel, Christian Werling, Hans Niklas Jacob, Jean-Pierre Seifert. 1235-1249 [doi]
- AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level TracesSuryeon Kim, Seung Ho Na, Jaehan Kim, Seungwon Shin 0001, Hyunwoo Choi. 1250-1264 [doi]
- BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch PredictorsQuancheng Wang, Ming Tang 0002, Ke Xu, Han Wang 0057. 1265-1279 [doi]
- Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip DesignZhenyuan Liu, Andrew Malnicof, Arna Roy, Patrick Schaumont. 1280-1293 [doi]
- EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy AttacksTianhong Xu, Aidong Adam Ding, Yunsi Fei. 1294-1308 [doi]
- Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission EnforcementTrung Tin Nguyen, Ben Stock. 1309-1322 [doi]
- TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted TypesSunnyeo Park, Jihwan Kim, Seongho Keum, Hyunjoon Lee, Sooel Son. 1323-1337 [doi]
- ProwseBox: A Framework for the Analysis of the Web at ScaleDolière Francis Somé. 1338-1354 [doi]
- BISON: Blind Identification with Stateless scOped pseudoNymsJakob Heher, Stefan More, Lena Heimberger. 1355-1371 [doi]
- Protocols and Formal Models for Delegated Authorisation with Server-Side SecrecyJean Snyman, Chris Culnane, Ioana Boureanu, Gerault David. 1372-1393 [doi]
- OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content AccessViet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Qi Li 0002. 1394-1410 [doi]
- OMAD5G: Online Malware Detection in 5G Networks using Compound PathsZhixin Wen, Guanhua Yan. 1411-1427 [doi]
- Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations CentersKoen T. W. Teuwen, Tom Mulders, Emmanuele Zambon, Luca Allodi. 1428-1441 [doi]
- SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular EdgeAnne Josiane Kouam, Aline Carneiro Viana, Philippe Martins, Cédric Adjih, Alain Tchana. 1442-1458 [doi]
- An Automated Blackbox Noncompliance Checker for QUIC Server ImplementationsKian Kai Ang, Guy Farrelly, Cheryl Pope, Damith C. Ranasinghe. 1459-1475 [doi]
- Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and AccountabilityAyoub Ben Hassen, Pascal Lafourcade 0001, Dhekra Mahmoud, Maxime Puys. 1476-1489 [doi]
- Learning to Identify Conflicts in RPKIHaya Schulmann, Shujie Zhao. 1490-1505 [doi]
- NailKey: Mutable Biometric Using FingernailsYihong Hang, Zhice Yang. 1506-1519 [doi]
- Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different IndustriesOskar Braun, Jan Hörnemann, Norbert Pohlmann, Tobias Urban, Matteo Große-Kampmann. 1520-1534 [doi]
- Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric AuthenticationHangcheng Cao, Guowen Xu, Wenbin Huang 0003, Hongwei Li 0001. 1535-1549 [doi]
- The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against OrganizationsMarie Weinz, Nicola Zannone, Luca Allodi, Giovanni Apruzzese. 1550-1566 [doi]
- PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization FrameworkYingTat Ng, Zhe Chen, Haiqing Qiu, Xuhua Ding. 1567-1581 [doi]
- On the Account Security Risks Posed by Password Strength MetersMing Xu, Weili Han, Jitao Yu, Jing Liu, Xinyi Zhang, Yun Lin, Jin Song Dong. 1582-1599 [doi]
- Can You Run My Code? A Close Look at Process Injection in Windows MalwareGiorgia Di Pietro, Daniele Cono D'Elia, Leonardo Querzoni. 1600-1616 [doi]
- CryptoGuard: Lightweight Hybrid Detection and Response to Host-based Cryptojackers in Linux Cloud EnvironmentsGyeonghoon Park, Jaehan Kim, Jinu Choi, Jinwoo Kim. 1617-1631 [doi]
- Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel DriverWonseok Choi, Youngjoo Shin. 1632-1642 [doi]
- Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & SignalsSupraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde. 1643-1658 [doi]
- SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)Masudul Hasan Masud Bhuiyan, Berk Çakar, Ethan H. Burmane, James C. Davis 0001, Cristian-Alexandru Staicu. 1659-1675 [doi]
- Systematic Analysis of Kernel Security Performance and Energy CostsFabian Rauscher, Benedict Herzog, Timo Hönig, Daniel Gruss. 1676-1689 [doi]
- Breaking Bad: How Compilers Break Constant-Time ImplementationsMoritz Schneider 0001, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun. 1690-1706 [doi]
- An Empirical Study of C Decompilers: Performance Metrics and Error TaxonomyMelih Sirlanci, Carter Yagemann, Zhiqiang Lin 0001. 1707-1723 [doi]
- Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing FrameworkAugust See, Moritz Mönnich, Mathias Fischer 0001. 1724-1740 [doi]
- Evaluating Disassembly Errors With Only BinariesLambang Akbar Wijayadi, Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Zhuohao Liu. 1741-1755 [doi]
- Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHYAmin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim. 1756-1771 [doi]
- REFLECTA: Reflection-based Scalable and Semantic Scripting Language FuzzingChibin Zhang, Gwangmu Lee, Qiang Liu 0034, Mathias Payer. 1772-1787 [doi]
- POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud SystemsWei Jie Bryan Lee, Siyi Wang, Suman Dutta 0001, Walid El Maouaki, Anupam Chattopadhyay. 1788-1790 [doi]
- Poster: Typosquatting Attacks on the Rust EcosystemMinh-Khanh Vu, Thanh Cong Nguyen, Duc Ly Vu. 1791-1793 [doi]
- POSTER: Disappearing Ink: How Partial Model Extraction Erases WatermarksVenkata Sai Pranav Bachina, Ankit Gangwal. 1794-1796 [doi]
- POSTER: Transparent Temporally-Specialized System Call FiltersMatthew Rossi, Michele Beretta 0001, Dario Facchinetti, Stefano Paraboschi. 1797-1799 [doi]
- POSTER: Policy-driven security-aware scheduling in KubernetesMatthew Rossi, Michele Beretta 0001, Dario Facchinetti, Stefano Paraboschi. 1800-1802 [doi]
- POSTER: An Empirical Study of Smart Contract Patching Practices in the WildTaeyoung Kim, Gilhee Lee, Hyoungshick Kim. 1803-1805 [doi]
- POSTER: Automating ICS Malware Analysis with MITRE ATT&CKFatih Kurt, Neetesh Saxena, Vijay Kumar, George Theodorakopoulos. 1806-1808 [doi]
- POSTER: When Models Speak Too Much: Privacy Leakage on Large Language ModelsMingjun Zhang, Mahrokh Abdollahi, Thilina Ranbaduge, Ming Ding 0001. 1809-1811 [doi]
- POSTER: Investigating Transferability of Adversarial Examples in Model MergingAnkit Gangwal, Aaryan Ajay Sharma. 1812-1814 [doi]
- POSTER: Multimodal Graph Networks for Systematic Generalization in Code Clone DetectionCuong Dao, Van Tong, Hai Anh Tran, Duc Tran, Giang Nguyen. 1815-1817 [doi]
- POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule EngineeringKoen T. W. Teuwen, Emmanuele Zambon, Luca Allodi. 1818-1820 [doi]