Abstract is missing.
- Autonomous Vulnerability Analysis, Triaging, and Repair: A Historical PerspectiveGiovanni Vigna. 1 [doi]
- Mechanizing Privacy by DesignDavid A. Basin, François Hublet, Srdan Krstic, Hoàng Nguyen. 2-5 [doi]
- Oedipus: LLM-enchanced Reasoning CAPTCHA SolverGelei Deng, Haoran Ou, Yi Liu 0069, Jie Zhang 0073, Tianwei Zhang 0004, Yang Liu 0003. 6-20 [doi]
- The Odyssey of robots.txt Governance: Measuring Convention Implications of Web Bots in Large Language Model ServicesJian Cui, Mingming Zha 0001, Xiaofeng Wang 0001, Xiaojing Liao. 21-35 [doi]
- JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript DeobfuscationGuoqiang Chen, Xin Jin, Zhiqiang Lin 0001. 36-50 [doi]
- Quantifying Security Training in Organizations Through the Analysis of U.S. SEC 10-K FilingsJonas Hielscher, Maximilian Golla. 51-65 [doi]
- WhisperTest: A Voice-Control-based Library for iOS UI AutomationZahra Moti, Tom Janssen-Groesbeek, Steven Monteiro, Andrea Continella, Gunes Acar. 66-80 [doi]
- The Challenges and Opportunities with Cybersecurity Regulations: A Case Study of the US Electric Power SectorSena Sahin, Burak Sahin, Robin Berthier, Kate Davis 0001, Saman A. Zonouz, Frank Li 0001. 81-95 [doi]
- Automatically Detecting Online Deceptive PatternsAsmit Nayak, Yash Wani, Shirley Zhang 0002, Rishabh Khandelwal, Kassem Fawaz. 96-110 [doi]
- Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V ProcessorsZilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke 0001, Marco Guarnieri. 111-125 [doi]
- Wanilla: Sound Noninterference Analysis for WebAssemblyMarkus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Matteo Maffei. 126-140 [doi]
- Securing Cryptographic Software via Typed Assembly LanguageShixin Song, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala, Mengjia Yan 0001. 141-155 [doi]
- Formally Verified Correctness Bounds for Lattice-Based CryptographyManuel Barbosa, Matthias J. Kannwischer, Thing-Han Lim, Peter Schwabe, Pierre-Yves Strub. 156-169 [doi]
- Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSDWeidong Zhu 0002, Carson Stillman, Sara Rampazzi, Kevin R. B. Butler. 171-185 [doi]
- Don't Panic! Finding Bugs Hidden Behind Rust Runtime Safety ChecksZeyang Zhuang, Zilun Wang, Wei Meng 0001, Michael R. Lyu. 186-200 [doi]
- Hardening Deep Neural Network Binaries against Reverse Engineering AttacksZheng Zhong, Ruoyu Wu, Junpeng Wan, Muqi Zou, Dave (Jing) Tian. 201-215 [doi]
- CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux KernelDong-Ok Kim, Juhyun Song, Insu Yun. 216-230 [doi]
- Uncovering Hidden Paths in 5G: Exploiting Protocol Tunneling and Network Boundary BridgingAltaf Shaik, Robert Jaschek, Jean-Pierre Seifert. 231-245 [doi]
- Finding SSH Strict Key Exchange Violations by State LearningFabian Bäumer 0001, Marcel Maehren, Marcus Brinkmann, Jörg Schwenk. 246-260 [doi]
- OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMsAhmed Aly, Essam Mansour 0001, Amr M. Youssef. 261-275 [doi]
- CITesting: Systematic Testing of Context Integrity Violations in LTE Core NetworksMincheol Son, Kwangmin Kim, Beomseok Oh, CheolJun Park, Yongdae Kim. 276-290 [doi]
- CryptGNN: Enabling Secure Inference for Graph Neural NetworksPritam Sen, Yao Ma, Cristian Borcea. 291-305 [doi]
- PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable OptimizationQin Yang, Nicholas Stout, Meisam Mohammady, Han Wang 0021, Ayesha Samreen, Christopher J. Quinn, Yan Yan 0002, Ashish Kundu, Yuan Hong 0001. 306-320 [doi]
- ZORRO: Zero-Knowledge Robustness and Privacy for Split LearningNojan Sheybani, Alessandro Pegoraro, Jonathan Knauer, Phillip Rieger, Elissa Mollakuqe, Farinaz Koushanfar, Ahmad-Reza Sadeghi. 321-334 [doi]
- ImportSnare: Directed 'Code Manual' Hijacking in Retrieval-Augmented Code GenerationKai Ye, LiangCai Su, Chenxiong Qian. 335-349 [doi]
- Generic Anonymity Wrapper for Messaging ProtocolsLea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis. 350-364 [doi]
- Panther: Private Approximate Nearest Neighbor Search in the Single Server SettingJingyu Li, Zhicong Huang, Min Zhang, Cheng Hong 0001, Jian Liu, Tao Wei 0002, Wenguang Chen. 365-379 [doi]
- Trout: Two-Round Threshold ECDSA from Class GroupsHila Dahari-Garbian, Ariel Nof, Luke Parker. 380-393 [doi]
- Encrypted Matrix-Vector Products from Secret Dual CodesFabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen. 394-408 [doi]
- KZH-Fold: Accountable Voting from Sublinear AccumulationGeorge Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz. 409-422 [doi]
- SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized IdentityElizabeth C. Crites, Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh. 423-437 [doi]
- Surpassing the Word Size Limitation of TFHE with Noise CalibrationTakumi Nishimura, Kazunari Tozawa, Kunihiko Sadakane. 438-452 [doi]
- QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot SecrecyZibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur. 453-467 [doi]
- End-to-End Encrypted Git ServicesYa-Nan Li 0007, Yaqing Song, Qiang Tang 0005, Moti Yung. 468-482 [doi]
- RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph ProcessingZhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li 0002, Ke Xu 0002, Mingwei Xu 0001. 483-497 [doi]
- Nebula: Efficient, Private and Accurate Histogram EstimationAli Shahin Shamsabadi, Peter Snyder, Ralph Giles, Aurélien Bellet, Hamed Haddadi. 498-512 [doi]
- Anonymity Unveiled: A Practical Framework for Auditing Data Use in Deep Learning ModelsZitao Chen 0001, Karthik Pattabiraman. 513-527 [doi]
- Posterior Security: Anonymity and Message Hiding of Standard SignaturesTsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu. 528-542 [doi]
- Accuracy for Differentially Private Quotients by Fractional UncertaintiesAlejandro Russo, Elisabet Lobo Vesga, Marco Gaboardi. 543-557 [doi]
- Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication ChannelsChristoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe. 558-572 [doi]
- LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input VerificationZhi Lu, Songfeng Lu. 573-587 [doi]
- A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of MarinersAnna Raymaker, Akshaya Kumar, Miuyin Yong Wong, Ryan Pickren, Animesh Chhotaray, Frank Li 0001, Saman A. Zonouz, Raheem Beyah. 588-602 [doi]
- Measuring and Augmenting Large Language Models for Solving Capture-the-Flag ChallengesZimo Ji, Daoyuan Wu, Wenyuan Jiang, Pingchuan Ma 0004, Zongjie Li, Shuai Wang. 603-617 [doi]
- Exposing the Roots of DNS Abuse: A Data-Driven Analysis of Key Factors Behind Phishing Domain RegistrationsYevheniya Nosyk, Maciej Korczynski, Carlos Gañán, Sourena Maroofi, Jan Bayer, Zul Odgerel, Samaneh Tajalizadehkhoob, Andrzej Duda. 618-632 [doi]
- Noise and Stress Don't Help With Learning: A Qualitative Study to Inform Design of Effective Cybersecurity Awareness in Manufacturing EnvironmentsLina Brunken, Markus Schöps, Annalina Buckmann, Florian Meißner, M. Angela Sasse. 633-647 [doi]
- An Empirical Study Measuring In-The-Wild Cryptographic Microarchitectural Side-Channel PatchesSen Deng, Zhibo Liu, Shuai Wang, Yinqian Zhang. 648-662 [doi]
- Can IOCs Impose Cost? The Effects of Publishing Threat Intelligence on Adversary BehaviorXander Bouwman, Aksel Ethembabaoglu, Bart Hermans, Carlos Gañán, Michel van Eeten. 663-677 [doi]
- TEMPEST-LoRa: Cross-Technology Covert CommunicationXieyang Sun, Yuanqing Zheng, Wei Xi, Zuhao Chen, Zhizhen Chen, Han Hao, Zhiping Jiang, Sheng Zhong. 678-692 [doi]
- MOLE: Breaking GPU TEE with GPU-Embedded MCUHongyi Lu, Yunjie Deng, J. Sukarno Mertoguno, Shuai Wang, Fengwei Zhang. 693-707 [doi]
- WireTap: Breaking Server SGX via DRAM Bus InterpositionAlexander Seto, Oytun Kuday Duran, Samy Amer, Jalen Chuang, Stephan van Schaik, Daniel Genkin, Christina Garman. 708-722 [doi]
- One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-ChannelsTwisha Chattopadhyay, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner, Saman A. Zonouz, Raheem Beyah. 723-737 [doi]
- ControlLoc: Physical-World Hijacking Attack on Camera-based Perception in Autonomous DrivingChen Ma, Ningfei Wang, Zhengyu Zhao 0001, Qian Wang, Qi Alfred Chen, Chao Shen 0001. 738-752 [doi]
- PipID: Light-Pupillary Response Based User Authentication for Virtual RealityMuchen Pan, Yan Meng 0001, Yuxia Zhan, Guoxing Chen, Haojin Zhu. 753-767 [doi]
- RVISmith: Fuzzing Compilers for RVV IntrinsicsYibo He, Cunjian Huang, Xianmiao Qu, Hongdeng Chen, Wei Yang 0013, Tao Xie 0001. 768-782 [doi]
- Fuzzing Processing Pipelines for Zero-Knowledge CircuitsChristoph Hochrainer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis. 783-797 [doi]
- Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing ComponentsYunpeng Tian, Feng Dong 0008, Junhai Wang, Mu Zhang 0001, Zhiniang Peng, Zesen Ye, Xiapu Luo, Haoyu Wang 0001. 798-812 [doi]
- SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic ExecutionYu Hao 0006, Juefei Pu, Xingyu Li, Zhiyun Qian, Ardalan Amiri Sani. 813-826 [doi]
- Validating Interior Gateway Routing Protocols via Equivalent Topology SynthesisBing Shui, Yufan Zhou, Jielun Wu, Baowen Xu, Qingkai Shi. 827-841 [doi]
- Disa: Accurate Learning-based Static Disassembly with AttentionsPeicheng Wang, Monika Santra, Mingyu Liu, Cong Sun 0001, Dongrui Zeng, Gang Tan. 843-857 [doi]
- Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership ArgumentsMin Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang 0002, Zoe Lin Jiang. 858-872 [doi]
- Forking the RANDAO: Manipulating Ethereum's Distributed Randomness BeaconÁbel Nagy, János Tapolcai, István András Seres, Bence Ladóczki. 873-887 [doi]
- Mining in Logarithmic Space with Variable DifficultyLoïc Miller, Dorian Pacaud, Nathanël Derousseaux-Lebert, Emmanuelle Anceaume, Romaric Ludinard. 888-902 [doi]
- Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin MiningRoozbeh Sarenche, Alireza Aghabagherloo, Svetla Nikova, Bart Preneel. 903-917 [doi]
- On Frontrunning Risks in Batch-Order Fair Systems for BlockchainsEunchan Park, Taeung Yoon, HoCheol Nam, Deepak Maram, Min-Suk Kang. 918-932 [doi]
- Aegis: Tethering a Blockchain with Primary-Chain StakeYogev Bar-On, Roi Bar Zur, Omer Ben-Porat, Nimrod Cohen, Ittay Eyal, Matan Sitbon. 933-947 [doi]
- Split UnlearningYanna Jiang, Guangsheng Yu, Qin Wang 0008, Xu Wang 0004, Baihe Ma, Caijun Sun, Wei Ni 0001, Ren Ping Liu 0001. 948-962 [doi]
- Slot: Provenance-Driven APT Detection through Graph Reinforcement LearningWei Qiao, Yebo Feng, Teng Li 0003, Zhuo Ma 0001, Yulong Shen 0001, Jianfeng Ma 0001, Yang Liu 0003. 963-977 [doi]
- Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware ClassificationYiling He, Junchi Lei, Zhan Qin, Kui Ren 0001, Chun Chen 0001. 978-992 [doi]
- Rethinking Machine Unlearning in Image Generation ModelsRenYang Liu, Wenjie Feng 0001, Tianwei Zhang, Wei Zhou, Xueqi Cheng, See-Kiong Ng. 993-1007 [doi]
- TensorShield: Safeguarding On-Device Inference by Shielding Critical DNN Tensors with TEETong Sun 0006, Bowen Jiang, Hailong Lin, Borui Li 0001, Yixiao Teng, Yi Gao 0001, Wei Dong 0001. 1008-1022 [doi]
- PoisonSpot: Precise Spotting of Clean-Label Backdoors via Fine-Grained Training Provenance TrackingPhilemon Hailemariam, Birhanu Eshete. 1023-1037 [doi]
- Pool: A Practical OT-based OPRF from Learning with RoundingAlex Davidson, Amit Deo, Louis Tremblay Thibault. 1038-1052 [doi]
- Zero-Knowledge AI Inference with High PrecisionArman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang. 1053-1067 [doi]
- New Permutation Decomposition Techniques for Efficient Homomorphic PermutationXirong Ma, Junling Fang, Chunpeng Ge, Dung Hoang Duong, Yali Jiang, Yanbin Li 0001, Willy Susilo, LiZhen Cui. 1068-1082 [doi]
- Leveraging Discrete CKKS to Bootstrap in High PrecisionHyeongmin Choe, Jaehyung Kim 0002, Damien Stehlé, Elias Suvanto. 1083-1097 [doi]
- Grafting: Decoupled Scale Factors and Modulus in RNS-CKKSJung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim 0002, Seonghak Kim, Johannes Mono, Taeyeong Noh. 1098-1112 [doi]
- Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2Louis Tremblay Thibault, Michael Walter 0001. 1113-1126 [doi]
- Probabilistic Skipping-Based Data Structures with Robust Efficiency GuaranteesMarc Fischlin, Moritz Huppert, Sam A. Markelon. 1127-1141 [doi]
- ShiftPIR: An Efficient PIR System with Gravity Shifting from Client to ServerZihan Wang, Lutan Zhao, Ming Luo, Zhiwei Wang, Haoqi He, Wenzhe Lv, Xuan Ding, Dan Meng 0002, Rui Hou 0001. 1143-1157 [doi]
- Updatable aPAKE: Security Against Bulk Precomputation AttacksDennis Dayanikli, Anja Lehmann. 1158-1172 [doi]
- Founding Zero-Knowledge Proof of Training on Optimum VicinityGefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova 0001, Xiao Wang 0012, Ning Luo. 1173-1187 [doi]
- Revisiting Keyed-Verification Anonymous CredentialsMichele Orrù. 1188-1199 [doi]
- Subversion-resilient Key-exchange in the Post-quantum WorldKévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete. 1200-1214 [doi]
- Poisoning Attacks to Local Differential Privacy for Ranking EstimationPei Zhan, Peng Tang, Yangzhuo Li, Puwen Wei, Shanqing Guo. 1215-1229 [doi]
- Mitigating Data Poisoning Attacks to Local Differential PrivacyXiaolin Li, Ninghui Li, Boyang Wang 0001, Wenhai Sun. 1230-1244 [doi]
- Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented GenerationAli Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr. 1245-1259 [doi]
- Exploiting the Shared Storage APIAlexandra Nisenoff, Deian Stefan, Nicolas Christin. 1260-1274 [doi]
- Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device FingerprintingMichael A. Specter, Mihai Christodorescu, Abbie Farr, Bo Ma, Robin Lassonde. 1275-1289 [doi]
- PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with Anchor-Based ApproximationRuiyao Liu, Chenxi Qiu. 1290-1304 [doi]
- Lock the Door But Keep the Window Open: Extracting App-Protected Accessibility Information from Browser-Rendered WebsitesHaichuan Xu, Runze Zhang, Mingxuan Yao, David Oygenblik, Yizhi Huang, Jeman Park 0001, Brendan Saltaformaggio. 1305-1319 [doi]
- BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web ApplicationsFengyu Liu, Yuan Zhang 0009, Enhao Li, Wei Meng 0001, Youkun Shi, Qianheng Wang, Chenlin Wang, Zihan Lin, Min Yang 0002. 1320-1333 [doi]
- Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language ModelSide Liu, Jiang Ming 0002, Guodong Zhou, Xinyi Liu, Jianming Fu, Guojun Peng. 1334-1348 [doi]
- Local Frames: Exploiting Inherited Origins to Bypass Content BlockersAlisha Ukani, Hamed Haddadi, Alex C. Snoeren, Peter Snyder. 1349-1363 [doi]
- Enhanced Web Application Security Through Proactive Dead Drop Resolver RemediationJonathan Fuller, Mingxuan Yao, Saumya Agarwal, Srimanta Barua, Taleb Hirani, Amit Kumar Sikder, Brendan Saltaformaggio. 1364-1378 [doi]
- ForeDroid: Scenario-Aware Analysis for Android Malware Detection and ExplanationJiaming Li 0013, Sen Chen 0001, Chunlian Wu, Yuxin Zhang, Lingling Fan 0003. 1379-1393 [doi]
- Logical Relations for Formally Verified Authenticated Data StructuresSimon Oddershede Gregersen, Chaitanya Agarwal, Joseph Tassarotti. 1394-1408 [doi]
- Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin ProgramsJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Lionel Blatter, Gustavo Xavier Delerue Marinho Alves, João Diogo Duarte, Benjamin Grégoire, Tiago Oliveira 0004, Miguel Quaresma, Pierre-Yves Strub, Ming-Hsien Tsai 0001, Bow-Yaw Wang, Bo-Yin Yang. 1409-1423 [doi]
- Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol AttacksCas Cremers, Alexander Dax, Aurora Naska. 1424-1438 [doi]
- Approximate Algorithms for Verifying Differential Privacy with Gaussian DistributionsBishnu Bhusal, Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan 0001. 1439-1453 [doi]
- ILA: Correctness via Type Checking for Fully Homomorphic EncryptionTarakaram Gollamudi, Anitha Gollamudi, Joshua Gancher. 1454-1468 [doi]
- Protocols to Code: Formal Verification of a Secure Next-Generation Internet RouterJoão C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix Wolf, Marco Eilers, Christoph Sprenger 0001, David A. Basin, Peter Müller 0001, Adrian Perrig. 1469-1483 [doi]
- SyzParam: Incorporating Runtime Parameters into Kernel Driver FuzzingYue Sun, Yan Kang 0002, Chenggang Wu 0002, Kangjie Lu, Jiming Wang, Xingwei Li, Yuhao Hu, Jikai Ren, Yuanming Lai, Mengyao Xie, Zhe Wang 0017. 1484-1498 [doi]
- Reviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata FieldsHao Zhang, Jian Liu, Jie Lu, Shaomin Chen, Tianshuo Han, Bolun Zhang, Xiaorui Gong. 1499-1513 [doi]
- BASTAG: Byte-level Access Control on Shared Memory using ARM Memory Tagging ExtensionJunseung You, Jiwon Seo, Kyeongryong Lee, Yeongpil Cho, Yunheung Paek. 1514-1528 [doi]
- Intent-aware Fuzzing for Android Hardened ApplicationSeongyun Jeong, Minseong Choi, Haehyun Cho, Seokwoo Choi, Hyungsub Kim, Yuseok Jeon. 1529-1543 [doi]
- Securing Mixed Rust with Hardware CapabilitiesJason Z. Yu, Fangqi Han, Kaustab Choudhury, Trevor E. Carlson, Prateek Saxena. 1544-1558 [doi]
- PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language ModelsYuwei Liu, Junquan Deng, Xiangkun Jia, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei, Purui Su. 1559-1573 [doi]
- Swallow: A Transfer-Robust Website Fingerprinting Attack via Consistent Feature LearningMeng Shen 0001, Jinhe Wu, Junyu Ai, Qi Li, Chenchen Ren, Ke Xu 0002, Liehuang Zhu. 1574-1588 [doi]
- FlowSentry: Accelerating NetFlow-based DDoS DetectionXiaoyu He, Xiaohui Xie, Xin Wang, Lei Zhang, Kun Xie 0001, Lin Chen, Yong Cui 0001. 1589-1603 [doi]
- 1BIT: Persistent Path Validation with Customized Noise Signal CharacteristicsKeji Miao, Jie Yuan 0001, Xinghai Wei, Xingwu Wang, Dongqi Han, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen. 1604-1618 [doi]
- RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday ParadoxXiang Li, Mingming Zhang, Zuyao Xu, Fasheng Miao, Yuqi Qiu, Baojun Liu, Jia Zhang 0004, Xiaofeng Zheng, Haixin Duan, Zheli Liu, Yunhai Zhang, Dunqiu Fan. 1619-1633 [doi]
- 5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G SystemsHui Li 0070, Haotian Li, Chi Ma, Jingjing Guan, Junchi Zeng, Haonan Feng, Ziming Zhao 0001. 1634-1648 [doi]
- Discovering and Exploiting IoT Device Hidden Attributes: A New Vulnerability in Smart HomesXuening Xu, Chenglong Fu 0002, Xiaojiang Du, Bo Luo. 1649-1663 [doi]
- MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic AnalysisLuMing Yang, Lin Liu, Junjie Huang 0001, Zhuotao Liu, Shiyu Liang, Shaojing Fu, Yongjun Wang. 1664-1678 [doi]
- Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuningTianyu Qi, Lei Xue, Yufeng Zhan, Xiaobo Ma. 1679-1693 [doi]
- Unmask Tampering: Efficient Document Tampering Localization under Recapturing Attacks with Real Distortion KnowledgeChangsheng Chen, Wenyu Chen, Yinyin Lin, Bin Li, Jiwu Huang. 1694-1708 [doi]
- RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language ModelsPeizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang 0001, Shengzhi Zhang, Yuxuan Chen, Kai Chen 0012, Limin Sun 0001. 1709-1723 [doi]
- Membership Inference Attacks as Privacy Tools: Reliability, Disparity and EnsembleZhiqi Wang, Chengyu Zhang, Yuetian Chen, Nathalie Baracaldo, Swanand Ravindra Kadhe, Lei Yu. 1724-1738 [doi]
- Prompt Inference Attack on Distributed Large Language Model Inference FrameworksXinjian Luo, Ting Yu 0001, Xiaokui Xiao. 1739-1753 [doi]
- Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?Daniel Pöllmann, Tianxin Tang. 1754-1768 [doi]
- Silent Threshold Traitor Tracing & Enhancing Mempool PrivacyAnirban Chakrabarti, Monosij Maitra, Arup Mondal, Kushaz Sehgal. 1769-1783 [doi]
- PULSE: Parallel Private Set Union for Large-Scale EntitiesJiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu. 1784-1798 [doi]
- Velox: Scalable Fair Asynchronous MPC from Lightweight CryptographyAkhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu Zhang, Daniel Pöllmann, Yifan Song 0001. 1799-1813 [doi]
- How to Recover a Cryptographic Secret From the CloudDavid Adei, Chris Orsini, Alessandra Scafuro, Tanner Verber. 1814-1828 [doi]
- ML-Cube: Accelerating Module-Lattice-Based Cryptography using Machine Learning Accelerators with a Memory-Less DesignTian Zhou, Fangyu Zheng, Zhuoyu Xie, Wenxu Tang, Guang Fan, Yijing Ning, Yi Bian 0001, Jingqiang Lin 0001, Jiwu Jing. 1829-1843 [doi]
- NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.jsEric Cornelissen, Musard Balliu. 1844-1858 [doi]
- Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web BrowsersAnuj Gautam, Tarun Kumar Yadav, Garrett Smith, Kent E. Seamons, Scott Ruoti. 1859-1873 [doi]
- Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web ApplicationsQiyi Zhang, Fengyu Liu, Zihan Lin, Yuan Zhang 0009. 1874-1888 [doi]
- Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device PlatformsAhsan Zafar, Junhua Su, Sohom Datta, Alexandros Kapravelos, Anupam Das 0001. 1889-1903 [doi]
- Conflicting Scores, Confusing Signals: An Empirical Study of Vulnerability Scoring SystemsViktoria Koscinski, Mark Nelson, Ahmet Okutan, Robert Falso, Mehdi Mirakhorli. 1904-1918 [doi]
- On Hyperparameters and Backdoor-Resistance in Horizontal Federated LearningSimon Lachnit, Ghassan Karame. 1919-1933 [doi]
- Empowering Parents to Support Children's Online Security and Privacy: Findings from a Randomized Controlled TrialXiaowei Chen 0013, Verena Distler, Chloe Gordon, Yaxing Yao, Ziwen Teuber. 1934-1948 [doi]
- Security and Privacy Perceptions of Pakistani Facebook Matrimony Group UsersMah Jan Dorazahi, Deepthi Mungara, Yasemin Acar, Harshini Sri Ramulu. 1949-1963 [doi]
- DiveFuzz: Enhancing CPU Fuzzing via Diverse Instruction ConstructionZihui Guo, Miaomiao Yuan, Yanqi Yang, Liwei Chen, Gang Shi, Dan Meng 0002. 1964-1978 [doi]
- Threat from Windshield: Vehicle Windows as Involuntary Attack Sources on Automotive Voice AssistantsPengHao Wang, Shuo Huai, Yetong Cao, Chao Liu, Jun Luo 0001. 1979-1993 [doi]
- mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-OrderSuparna Kundu, Quinten Norga, Angshuman Karmakar, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede. 1994-2008 [doi]
- Security-Aware Sensor Fusion with MATE: the Multi-Agent Trust EstimatorR. Spencer Hallyburton, Miroslav Pajic. 2009-2023 [doi]
- Adversarially Robust Assembly Language Model for Packed Executables DetectionShijia Li, Jiang Ming 0002, Lanqing Liu, Longwei Yang, Ni Zhang, Chunfu Jia. 2024-2038 [doi]
- BLACKOUT: Data-Oblivious Computation with Blinded CapabilitiesHossam ElAtali, Merve Gülmez, Thomas Nyman, N. Asokan. 2039-2053 [doi]
- Needle in a Haystack: Automated and Scalable Vulnerability Hunting in the Windows ALPC SeaHaoyi Liu, Feng Dong 0008, Yunpeng Tian, Mu Zhang, Xuefeng Li, Fangming Gu, Zhiniang Peng, Haoyu Wang 0001. 2054-2068 [doi]
- Styled to Steal: The Overlooked Attack Surface in Email ClientsLeon Trampert, Daniel Weber 0007, Christian Rossow, Michael Schwarz 0001. 2069-2083 [doi]
- Denial of Sequencing Attacks in Ethereum Layer 2 RollupsZihao Li 0001, Zhiyuan Sun, Zheyuan He, Jinzhao Chu, Hao Zhou 0043, Xiapu Luo, Ting Chen 0002, Yinqian Zhang. 2084-2098 [doi]
- Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global ResilienceYizhong Liu, Andi Liu, Zhuocheng Pan, Yuxuan Hu, Jianwei Liu, Song Bian 0001, Yuan Lu, Zhenyu Guan 0002, Dawei Li 0009, Meikang Qiu. 2099-2113 [doi]
- Lite-PoT: Practical Powers-of-Tau Setup CeremonyLucien K. L. Ng, Pedro Moreno-Sanchez, Mohsen Minaei, Panagiotis Chatzigiannis, Adithya Bhat, Duc V. Le. 2114-2128 [doi]
- A Secure Sequencer and Data Availability Committee for RollupsMargarita Capretto, Martín Ceresa, Antonio Fernández Anta, Pedro Moreno-Sanchez, César Sánchez 0001. 2129-2143 [doi]
- Safeguarding Graph Neural Networks against Topology Inference AttacksJie Fu 0003, Yuan Hong 0001, Zhili Chen, Wendy Hui Wang. 2144-2158 [doi]
- MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMsRuyi Ding, Tianhong Xu, Xinyi Shen, Aidong Adam Ding, Yunsi Fei. 2159-2173 [doi]
- Removal Attack and Defense on AI-generated Content Latent-based WatermarkingDe Zhang Lee, Han Fang, Hanyi Wang, Ee-Chien Chang. 2174-2188 [doi]
- VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto FrontierDavid Oygenblik, Abhinav Vemulapalli, Animesh Agrawal, Debopam Sanyal, Alexey Tumanov, Brendan Saltaformaggio. 2189-2203 [doi]
- Efficient Fuzzy PSI Based on Prefix RepresentationChengrui Dang, Xv Zhou, Bei Liang. 2204-2218 [doi]
- Armadillo: Robust Single-Server Secure Aggregation for Federated Learning with Input ValidationYiping Ma 0001, Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou. 2219-2233 [doi]
- The OCH Authenticated Encryption SchemeSanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len, Thomas Ristenpart. 2234-2248 [doi]
- From OT to OLE with Subquadratic CommunicationJack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis. 2249-2263 [doi]
- Interoperable Symmetric Message FrankingCarolina Ortega Pérez, Thomas Ristenpart, Julia Len. 2264-2278 [doi]
- Gibbon: Faster Secure Two-party Training of Gradient Boosting Decision TreeLichun Li, Zecheng Wu, Yuan Zhao, Zhihao Li 0001, Wen-Jie Lu, Shan Yin. 2279-2293 [doi]
- Breaking and Fixing Content-Defined ChunkingKien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther 0001, Kenneth G. Paterson. 2294-2308 [doi]
- Refined TFHE Leveled Homomorphic Evaluation and Its ApplicationRuida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang 0001, Jooyoung Lee 0001. 2309-2323 [doi]
- CCA-Secure Traceable Threshold (ID-based) Encryption and ApplicationRishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman. 2324-2338 [doi]
- High-Throughput Universally Composable Threshold FHE DecryptionGuy Zyskind, Doron Zarchy, Max Leibovich, Chris Peikert. 2339-2353 [doi]
- Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private RealizationShuangqing Xu, Yifeng Zheng 0001, Zhongyun Hua. 2354-2368 [doi]
- Counting Subgraphs under Shuffle Differential PrivacyJuanru Fang, Ke Yi 0001. 2369-2383 [doi]
- Managing Correlations in Data and Privacy DemandSyomantak Chaudhuri, Thomas A. Courtade. 2384-2398 [doi]
- BFId: Identity Inference Attacks Utilizing Beamforming Feedback InformationJulian Todt, Felix Morsbach, Thorsten Strufe. 2399-2413 [doi]
- Systematic Assessment of Tabular Data SynthesisYuntao Du 0002, Ninghui Li. 2414-2428 [doi]
- Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent ObservationsHao Nie, Wei Wang 0088, Peng Xu 0003, Wei Chen, Laurence T. Yang, Mauro Conti, Kaitai Liang. 2429-2443 [doi]
- 'Is this a scam?': The Nature and Quality of Reddit Discussion about ScamsElijah Robert Bouma-Sims, Mandy Lanyon, Lorrie Faith Cranor. 2444-2458 [doi]
- Leaky Apps: Large-scale Analysis of Secrets Distributed in Android and iOS AppsDavid Schmidt, Sebastian Schrittwieser, Edgar R. Weippl. 2459-2473 [doi]
- 'We just did not have that on the embedded system': Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF CompetitionsZheyuan Ma, Gaoxiang Liu, Alex Eastman, Kai Kaufman, Md. Armanuzzaman, Xi Tan 0002, Katherine Jesse, Robert J. Walls, Ziming Zhao 0001. 2474-2488 [doi]
- Walking The Last Mile: Studying Decompiler Output Correction in PracticeJoshua Wiedemeier, Simon Klancher, Joel Flores, Max Zheng, Jaehyun Park, Sang Kil Cha, Kangkook Jee. 2489-2503 [doi]
- A Qualitative Analysis of Fuzzer Usability and ChallengesYunze Zhao, Wentao Guo 0005, Harrison Goldstein, Daniel Votipka, Kelsey R. Fulton, Michelle L. Mazurek. 2504-2518 [doi]
- It Should Be Easy but... New Users' Experiences and Challenges with Secret Management ToolsLorenzo Neil, Deepthi Mungara, Laurie A. Williams, Yasemin Acar, Bradley Reaves. 2519-2533 [doi]
- CHaRM: Checkpointed and Hashed Counters for Flexible and Efficient Rowhammer MitigationAli Hajiabadi, Michele Marazzi, Kaveh Razavi. 2534-2548 [doi]
- ZVDetector: State-Guided Vulnerability Detection System for Zigbee DevicesHai Lin, Chenglong Li 0006, Jiahai Yang 0001, Zhiliang Wang, Jiaqi Bai. 2549-2563 [doi]
- ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUsFabian Thomas, Michael Torres, Daniel Moghimi, Michael Schwarz 0001. 2564-2578 [doi]
- MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint TrackingTobias Kovats, Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi. 2579-2593 [doi]
- BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM AcceleratorsYitong Guo, Hongbo Chen, Haobin Hiroki Chen, Yukui Luo, Xiaofeng Wang 0001, Chenghong Wang. 2594-2608 [doi]
- FlexEmu: Towards Flexible MCU Peripheral EmulationChongqing Lei, Zhen Ling 0001, Xiangyu Xu 0001, Shaofeng Li, Guangchi Liu, Kai Dong 0001, Junzhou Luo. 2609-2623 [doi]
- Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing SystemRui Zhao, Muhammad Shoaib, Viet Tung Hoang, Wajih Ul Hassan. 2624-2638 [doi]
- Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault InjectionNils Bars, Lukas Bernhard, Moritz Schloegel, Thorsten Holz. 2639-2652 [doi]
- GPU Travelling: Efficient Confidential Collaborative Training with TEE-Enabled GPUsShixuan Zhao 0002, Zhongshu Gu, Salman Ahmed 0001, Enriquillo Valdez, Hani Jamjoom, Zhiqiang Lin. 2653-2667 [doi]
- Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code ChangesBruno Kreyssig, Sabine Houy, Timothée Riom, Alexandre Bartel. 2668-2682 [doi]
- Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in AndroidSheng Cao, Hao Zhou 0043, Songzhou Shi, Yanjie Zhao, Haoyu Wang 0001. 2683-2698 [doi]
- Deprivileging Low-Level GPU Drivers Efficiently with User-Space Processes and CHERI CompartmentsPaul Metzger, A. Theodore Markettos, Edward Tomasz Napierala, Matthew Naylor, Robert N. M. Watson, Timothy M. Jones 0001. 2699-2713 [doi]
- Towards a Formal Foundation for Blockchain ZK RollupsStefanos Chaliasos, Denis Firsov, Benjamin Livshits. 2714-2728 [doi]
- Formal Security and Functional Verification of Cryptographic Protocol Implementations in RustKarthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters. 2729-2743 [doi]
- Secure Parsing and Serializing with Separation Logic Applied to CBOR, CDDL, and COSETahina Ramananandro, Gabriel Ebner, Guido Martínez, Nikhil Swamy. 2744-2758 [doi]
- Looping for Good: Cyclic Proofs for Security ProtocolsFelix Linker, Christoph Sprenger 0001, Cas Cremers, David A. Basin. 2759-2773 [doi]
- Privacy-Preserving Runtime VerificationThomas A. Henzinger, Mahyar Karimi, K. S. Thejaswini. 2774-2787 [doi]
- Generalized Security-Preserving Refinement for Concurrent SystemsHuan Sun, David Sanán, Jingyi Wang, Yongwang Zhao, Jun Sun 0001, Wenhai Wang. 2789-2803 [doi]
- Prototype Surgery: Tailoring Neural Prototypes via Soft Labels for Efficient Machine UnlearningGaoyang Liu, Xijie Wang, Zixiong Wang, Chen Wang, Ahmed M. Abdelmoniem, Desheng Wang 0001. 2804-2817 [doi]
- SafeGuider: Robust and Practical Content Safety Control for Text-to-Image ModelsPeigui Qi, Kunsheng Tang, Wenbo Zhou, Weiming Zhang 0001, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang 0073. 2818-2832 [doi]
- SecAlign: Defending Against Prompt Injection with Preference OptimizationSizhe Chen, Arman Zharmagambetov, Saeed Mahloujifar, Kamalika Chaudhuri, David A. Wagner 0001, Chuan Guo 0001. 2833-2847 [doi]
- On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial MislabelingStanley Wu, Ronik Bhaskar, Anna Yoo Jeong Ha, Shawn Shan, Haitao Zheng 0001, Ben Y. Zhao. 2848-2862 [doi]
- Towards Backdoor Stealthiness in Model Parameter SpaceXiaoyun Xu, Zhuoran Liu 0001, Stefanos Koffas, Stjepan Picek. 2863-2876 [doi]
- A Practical and Secure Byzantine Robust AggregatorDe Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang. 2877-2891 [doi]
- AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output DeliveryWenxuan Yu, Minghui Xu 0001, Bing Wu, Sisi Duan, Xiuzhen Cheng 0001. 2892-2906 [doi]
- IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger ModelZeyu Liu 0004, Yunhao Wang, Ben Fisch. 2907-2921 [doi]
- Security Analysis of Privately Verifiable Privacy PassKonrad Hanff, Anja Lehmann, Cavit Özbay. 2922-2936 [doi]
- Threshold ECDSA in Two RoundsYingjie Lyu, Zengpeng Li 0001, Hong-Sheng Zhou, Xudong Deng. 2937-2950 [doi]
- Fast Homomorphic Evaluation of LWR-based PRFsAmit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre. 2951-2965 [doi]
- Fast Amortized Bootstrapping with Small Keys and Polynomial Noise OverheadAntonio Guimarães, Hilder V. L. Pereira. 2967-2981 [doi]
- The Power to Never Be Wrong: Evasions and Anachronistic Attacks Against Web ArchivesRobin Kirchner, Chris Tsoukaladelis, Martin Johns, Nick Nikiforakis. 2982-2996 [doi]
- Deep Dive into In-app Browsers: Uncovering Hidden Pitfalls in Certificate ValidationWoonghee Lee 0004, Junbeom Hur, Hyunsoo Kwon. 2997-3011 [doi]
- GAPDiS: Gradient-Assisted Perturbation Design via Sequence Editing for Website Fingerprinting DefenseRuotian Xie, Kun Xie 0001, Pengcheng Zhao, Jiajun He, Xin Zeng, Jigang Wen, Yong Xie, Wei Liang 0005, Gaogang Xie. 3012-3026 [doi]
- What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management SystemJohnny So, Michael Ferdman, Nick Nikiforakis. 3027-3041 [doi]
- In the DOM We Trust: Exploring the Hidden Dangers of Reading from the DOM on the WebJan Drescher, Sepehr Mirzaei, Soheil Khodayari, David Klein 0001, Thomas Barber, Martin Johns, Giancarlo Pellegrino. 3042-3056 [doi]
- Head(er)s Up! Detecting Security Header Inconsistencies in BrowsersJannis Rautenstrauch, Trung Tin Nguyen, Karthik Ramakrishnan, Ben Stock. 3057-3070 [doi]
- Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMsZongjie Li, Daoyuan Wu, Shuai Wang, Zhendong Su 0001. 3071-3085 [doi]
- One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIPBinyan Xu, Xilin Dai, Di Tang 0001, Kehuan Zhang. 3087-3101 [doi]
- DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR StrategyWenshu Fan, Minxing Zhang, Hongwei Li 0001, Wenbo Jiang 0001, Hanxiao Chen 0001, Xiangyu Yue 0001, Michael Backes 0001, Xiao Zhang. 3102-3116 [doi]
- What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept ShiftJiamin Chang, Haoyang Li, Hammond Pearce, Ruoxi Sun 0001, Bo Li 0026, Minhui Xue 0001. 3117-3131 [doi]
- Busting the Paper Ballot: Voting Meets Adversarial Machine LearningKaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller 0001. 3132-3146 [doi]
- FilterFL: Knowledge Filtering-based Data-Free Backdoor Defense for Federated LearningYanxin Yang, Ming Hu 0003, Xiaofei Xie, Yue Cao, Pengyu Zhang, Yihao Huang 0001, Mingsong Chen 0001. 3147-3161 [doi]
- Ethics in Computer Security Research: A Data-Driven Assessment of the Past, the Present, and the Possible FutureHarshini Sri Ramulu, Helen Schmitt, Bogdan Rerich, Rachel Gonzalez Rodriguez, Tadayoshi Kohno, Yasemin Acar. 3162-3176 [doi]
- Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. BanksLu Xian, Van Hong Tran, Lauren Lee, Meera Kumar, Yichen Zhang, Florian Schaub. 3177-3191 [doi]
- How Blind and Low-Vision Users Manage Their PasswordsAlexander Ponticello, Filipo Sharevski, Simon Anell, Katharina Krombholz. 3192-3205 [doi]
- A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global TrendsShakhzod Yuldoshkhujaev, Mijin Jeon, Doowon Kim, Nick Nikiforakis, Hyungjoon Koo. 3206-3220 [doi]
- UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated ImagesYiting Qu, Xinyue Shen 0001, Yixin Wu 0001, Michael Backes 0001, Savvas Zannettou, Yang Zhang 0016. 3221-3235 [doi]
- The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic DataGeorgi Ganev, Meenatchi Sundaram Muthu Selva Annamalai, Sofiane Mahiou, Emiliano De Cristofaro. 3236-3250 [doi]
- Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous DrivingYang Lou, Haibo Hu, Qun Song 0001, Qian Xu 0010, Yi Zhu 0012, Rui Tan, Wei-Bin Lee, Jianping Wang 0001. 3251-3265 [doi]
- Pixnapping: Bringing Pixel Stealing out of the Stone AgeAlan Wang 0004, Pranav Gopalkrishnan, Yingchen Wang, Christopher W. Fletcher, Hovav Shacham, David Kohlbrenner, Riccardo Paccagnella. 3266-3280 [doi]
- HW-Spy: Handwriting Inference by Tracing Pen-Tail MovementsLong Huang, Kang G. Shin. 3281-3295 [doi]
- Combating Falsification of Speech Videos with Live Optical SignaturesHadleigh Schwartz, Xiaofeng Yan, Charles J. Carver, Xia Zhou. 3296-3310 [doi]
- ConTest: Taming the Cyber-physical Input Space in Fuzz Testing with Control TheoryJinwen Wang, Hongchao Zhang, Chuanrui Jiang, Andrew Clark 0001, Ning Zhang 0017. 3311-3325 [doi]
- RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUsFabian Thomas, Eric García Arribas, Lorenz Hetterich, Daniel Weber 0007, Lukas Gerlach 0001, Ruiyi Zhang 0001, Michael Schwarz 0001. 3326-3340 [doi]
- PickleBall: Secure Deserialization of Pickle-based Machine Learning ModelsAndreas D. Kellas, Neophytos Christou, Wenxin Jiang 0001, Penghui Li 0001, Laurent Simon, Yaniv David, Vasileios P. Kemerlis, James C. Davis 0001, Junfeng Yang. 3341-3355 [doi]
- Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge InjectionBo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao. 3356-3370 [doi]
- Beyond Tag Collision: Cluster-based Memory Management for Tag-based SanitizersMengfei Xie, Yan Lin 0003, Hongtao Wu, Jianming Fu, Chenke Luo, Guojun Peng. 3371-3385 [doi]
- Recover Function Signature from Combined ConstraintsHaohui Huang, Yue Liu, Yuxi Cheng, Haiyang Wei, Jiamu Liu, Yu Wang, Linzhang Wang. 3386-3400 [doi]
- Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in KubernetesNanzi Yang, Xingyu Liu, Wenbo Shen, Jinku Li, Kangjie Lu. 3401-3415 [doi]
- Tide: An Efficient Kernel-level Isolation Execution Environment on AArch64 via Dynamically Adjusting Output Address SizeShiyang Zhang, Chenggang Wu 0002, Chengxuan Hou, Jinglin Lv, Yinqian Zhang, Qianyu Guo, Yuanming Lai, Mengyao Xie, Yan Kang 0002, Zhe Wang 0017. 3416-3430 [doi]
- Accountable LivenessAndrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini. 3431-3445 [doi]
- How to Beat Nakamoto in the RaceShu-Jie Cao, Dongning Guo. 3446-3460 [doi]
- Committee Selection with Non-Proportional WeightsYucheng Sun, Haifeng Yu, Ruomu Hou. 3461-3475 [doi]
- Elastic Restaking Networks: United we fall, (partially) divided we standRoi Bar Zur, Ittay Eyal. 3476-3489 [doi]
- Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction FeeShan Wang 0008, Ming Yang 0001, Yu Liu, Yue Zhang 0025, Shuaiqing Zhang, Zhen Ling 0001, Jiannong Cao 0001, Xinwen Fu. 3490-3504 [doi]
- Breaking Omertà: On Threshold Cryptography, Smart Collusion, and WhistleblowingMahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg. 3505-3519 [doi]
- Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User AuthenticationTianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi 0004, Yan Wang 0003, Nitesh Saxena, Yingying Chen 0001. 3520-3534 [doi]
- AgentSentinel: An End-to-End and Real-Time Security Defense Framework for Computer-Use AgentsHaitao Hu, Peng Chen, Yanpeng Zhao, Yuqi Chen 0001. 3535-3549 [doi]
- Sentry: Authenticating Machine Learning Artifacts on the FlyAndrew Gan, Zahra Ghodsi. 3550-3563 [doi]
- Training Robust Classifiers for Classifying Encrypted Traffic under Dynamic Network ConditionsYuqi Qing, Qilei Yin, Xinhao Deng, Xiaoli Zhang 0003, Peiyang Li, Zhuotao Liu, Kun Sun 0001, Ke Xu 0002, Qi Li 0002. 3564-3578 [doi]
- Adversarial Observations in Weather ForecastingErik Imgrund, Thorsten Eisenhofer, Konrad Rieck. 3579-3590 [doi]
- Co-Prime: A Co-design Framework for Privacy Preserving Machine Learning on FPGAShuo Xu, Jiming Xu, Pengfei Xue, Xinyao Wang, Lei Ju 0001, Wei Zhang 0173. 3591-3604 [doi]
- Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the IrisAmey Shukla, Luke Demarest, Benjamin Fuller 0001, Sohaib Ahmad, Caleb Manicke, Alexander Russell, Sixia Chen. 3605-3619 [doi]
- Not Be With You: Brute-Force Resistant Biometric Authentication and Key ReconstructionAlexandra Boldyreva, Deep Inder Mohan, Tianxin Tang. 3620-3634 [doi]
- Committed Vector Oblivious Linear Evaluation and Its ApplicationsYunqing Sun, Hanlin Liu, Kang Yang 0002, Yu Yu 0001, Xiao Wang, Chenkai Weng. 3635-3648 [doi]
- Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic EncryptionJiping Yu, Kun Chen 0004, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu 0001, Wenguang Chen. 3649-3663 [doi]
- Separating Broadcast from Cheater IdentificationYashvanth Kondi, Divya Ravi 0001. 3664-3677 [doi]
- Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph AnalysisYunyi Chen, Jiping Yu, Kun Chen 0004, Xiaoyu Fan, Xiaowei Zhu 0001, Wenguang Chen. 3679-3693 [doi]
- Timing Attacks on Differential Privacy are PracticalZachary Ratliff, Nicolás Berrios, James Mickens. 3694-3707 [doi]
- SlicedPIR: Offloading Heavyweight Work with NTTJonathan Weiss, Yossi Gilad. 3708-3722 [doi]
- Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode TransformersPouneh Nikkhah Bahrami, Dylan Cutler, Igor Bilogrevic. 3723-3736 [doi]
- Optimal Mechanisms for Quantum Local Differential PrivacyJi Guan 0001. 3737-3749 [doi]
- Competing for Attention: An Interview Study with Participants of Cryptography CompetitionsIvana Trummová, Juliane Schmüser, Nicolas Huaman, Sascha Fahl. 3750-3764 [doi]
- THOR: Secure Transformer Inference with Homomorphic EncryptionJungho Moon, Dongwoo Yoo, Xiaoqian Jiang, Miran Kim. 3765-3779 [doi]
- Optimistic, Signature-Free Reliable Broadcast and Its ApplicationsNibesh Shrestha, Qianyu Yu 0001, Aniket Kate, Giuliano Losa, Kartik Nayak, Xuechao Wang. 3780-3794 [doi]
- GhostCache: Timer- and Counter-Free Cache Attacks Exploiting Weak Coherence on RISC-V and ARM ChipsYu Jin 0010, Minghong Sun, Dongsheng Wang 0002, Pengfei Qiu, Yinqian Zhang, Shuwen Deng. 3795-3809 [doi]
- Heracles: Chosen Plaintext Attack on AMD SEV-SNPBenedict Schlüter, Christoph Wech, Shweta Shinde. 3810-3824 [doi]
- Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous DrivingYan Zhang, Zihao Liu, Yi Zhu, Chenglin Miao. 3825-3839 [doi]
- RMPocalypse: How a Catch-22 Breaks AMD SEV-SNPBenedict Schlüter, Shweta Shinde. 3840-3854 [doi]
- Dynamic Vulnerability Patching for Heterogeneous Embedded Systems Using Stack Frame ReconstructionMing Zhou, Xupu Hu, ZhiHao Wang, Haining Wang 0001, Hui-Wen, Limin Sun 0001, Peng Zhang 0044. 3855-3869 [doi]
- Chekhov's Gun: Uncovering Hidden Risks in macOS Application-Sandboxed PID-Domain ServicesMinghao Lin, Jiaxun Zhu, Tingting Yin, Zechao Cai, Guanxing Wen, Yanan Guo, Mengyuan Li 0004. 3870-3884 [doi]
- A System Framework to Symbolically Explore Intel TDX Module ExecutionPansilu Pitigalaarachchi, Xuhua Ding. 3885-3899 [doi]
- Windows plays Jenga: Uncovering Design Weaknesses in Windows File System SecurityDong-Uk Kim, Junyoung Park, Sanghak Oh, Hyoungshick Kim, Insu Yun. 3900-3914 [doi]
- Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification AttacksMaynard Koch, Florian Dolzmann, Thomas C. Schmidt, Matthias Wählisch. 3915-3929 [doi]
- Training with Only 1.0 ‰ Samples: Malicious Traffic Detection via Cross-Modality Feature FusionChuanpu Fu, Qi Li 0002, Elisa Bertino, Ke Xu 0002. 3930-3944 [doi]
- Fingerprinting Deep Packet Inspection Devices by their AmbiguitiesDiwen Xue, Armin Huremagic, Wayne Wang, Ram Sundara Raman, Roya Ensafi. 3945-3959 [doi]
- Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO SatellitesWenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger, Aaron Schulman. 3960-3974 [doi]
- Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI EcosystemsStav Cohen, Ron Bitton, Ben Nassi. 3975-3989 [doi]
- Deep Learning from Imperfectly Labeled Malware DataFahad Alotaibi, Euan Goodbrand, Sergio Maffeis. 3990-4004 [doi]
- PreferCare: Preference Dataset Copyright Protection in LLM Alignment by Watermark Injection and VerificationJian Lou 0001, Chenyang Zhang, Xiaoyu Zhang, Kai Wu. 4005-4019 [doi]
- SCOPE: Expanding Client-Side Post-Processing for Efficient Privacy-Preserving Model InferenceShenchen Zhu, Kai Chen 0012, Yue Zhao 0018, Cheng'an Wei. 4020-4034 [doi]
- Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted DataXinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng 0002, Ben Fisch, Xianhui Lu. 4035-4048 [doi]
- Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic EncryptionIntak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song. 4049-4063 [doi]
- Practical TFHE Ciphertext Sanitization for Oblivious Circuit EvaluationIntak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song. 4064-4078 [doi]
- Multi-Party Private Set Operations from Predicative Zero-SharingMinglang Dong, Yu Chen 0003, Cong Zhang, Yujie Bai, Yang Cao. 4079-4093 [doi]
- WPC: Weight Plaintext Compression for CNN Inference based on RNS-CKKSGuiming Shi, Yuchen Wei, Shengyu Fan, Xianglong Deng, Liang Kong, Xianbin Li, Jingwei Cai, Shuwen Deng, Mingzhe Zhang, Kaisheng Ma. 4094-4108 [doi]
- FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation ModelsZhuo Chen, Yuyang Gong, Jiawei Liu 0002, Miaokun Chen, Haotan Liu, Qikai Cheng, Fan Zhang, Wei Lu 0019, Xiaozhong Liu. 4109-4123 [doi]
- Mosformer: Maliciously Secure Three-Party Inference Framework for Large TransformersKe Cheng 0001, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu 0001, Yulong Shen, Jiaheng Zhang. 4124-4138 [doi]
- DPImageBench: A Unified Benchmark for Differentially Private Image SynthesisChen Gong 0005, Kecen Li, Zinan Lin 0001, Tianhao Wang 0001. 4139-4153 [doi]
- What Lurks Within? Concept Auditing for Shared Diffusion Models at ScaleXiaoyong (Brian) Yuan, Xiaolong Ma, Linke Guo, Lan Zhang 0005. 4154-4168 [doi]
- Provable Repair of Deep Neural Network Defects by Preimage Synthesis and Property RefinementJianan Ma, Jingyi Wang 0004, Qi Xuan 0001, Zhen Wang 0013. 4169-4183 [doi]
- DCMI: A Differential Calibration Membership Inference Attack Against Retrieval-Augmented GenerationXinyu Gao, Xiangtao Meng, Yingkai Dong, Zheng Li 0023, Shanqing Guo. 4184-4198 [doi]
- Can Personal Health Information Be Secured in LLM? Privacy Attack and Defense in the Medical DomainYujin Kang, Eunsun Kim, Yoon-Sik Cho. 4199-4213 [doi]
- One-Sided Bounded Noise: Theory, Optimization Algorithms and ApplicationsHanshen Xiao, Jun Wan 0008, Elaine Shi, Srinivas Devadas. 4214-4228 [doi]
- PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta PixelPaschalis Bekos, Panagiotis Papadopoulos, Nicolas Kourtellis, Michalis Polychronakis. 4229-4243 [doi]
- Amigo: Secure Group Mesh Messaging in Realistic Protest SettingsDavid Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens. 4244-4258 [doi]
- k-Anonymity Without Auxiliary InformationSomiya Chhillar, Mary K. Righi, Rebecca E. Sutter, Evgenios M. Kornaropoulos. 4259-4273 [doi]
- Digital Safety for Children with Intellectual Disabilities When Using Mobile Devices from Parents' and Teachers' PerspectivesJanice Jianing Si, Xin Lin, Haorui Cui, Xiaobo Zhou 0002, Kanye Ye Wang. 4274-4288 [doi]
- Real Problems: A Longitudinal Security Analysis of VR FirmwareVamsi Shankar Simhadri, Yichang Xiong, Habiba Farrukh, Xiaokuan Zhang. 4289-4303 [doi]
- Hidden in Plain Bytes: Investigating Interpersonal Account Compromise with Data ExportsJulia Nonnenkamp, Naman Gupta, Abhimanyu Dev Gupta, Rahul Chatterjee 0001. 4304-4318 [doi]
- How to Design Secure Honey Vault SchemesZhenduo Hou, Tingwei Fan, Fei Duan, Ding Wang 0002. 4319-4333 [doi]
- Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University HospitalJan Tolsdorf, David Langer, Luigi Lo Iacono. 4334-4348 [doi]
- YouthSafe: A Youth-Centric Safety Benchmark and Safeguard Model for Large Language ModelsYaman Yu, Yiren Liu, Yuqi Zhang, Yun Huang, Yang Wang 0005. 4349-4363 [doi]
- GASLITEing the Retrieval: Exploring Vulnerabilities in Dense Embedding-based SearchMatan Ben-Tov, Mahmood Sharif. 4364-4378 [doi]
- The Phantom Menace in Crypto-Based PET-Hardened Deep Learning Models: Invisible Configuration-Induced AttacksYiteng Peng, Dongwei Xiao, Zhibo Liu, Zhenlan Ji, Daoyuan Wu, Shuai Wang, Juergen Rahmel. 4379-4393 [doi]
- Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial AttacksMilad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini. 4394-4408 [doi]
- Cascading Adversarial Bias from Injection to Distillation in Language ModelsHarsh Chaudhari, Jamie Hayes, Matthew Jagielski, Ilia Shumailov, Milad Nasr, Alina Oprea. 4409-4422 [doi]
- You Can't Steal Nothing: Mitigating Prompt Leakages in LLMs via System VectorsBochuan Cao, Changjiang Li, Yuanpu Cao, Yameng Ge, Ting Wang 0006, Jinghui Chen. 4423-4437 [doi]
- Exact Robustness Certification of k-Nearest NeighborsFrancesco Ranzato, Ahmad Shakeel, Marco Zanella. 4439-4453 [doi]
- IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data ProcessingSangho Lee 0001, Jules Drean, Yue Tan, Marcus Peinado. 4454-4468 [doi]
- BadAML: Exploiting Legacy Firmware Interfaces to Compromise Confidential Virtual MachinesSatoru Takekoshi, Manami Mori, Takaaki Fukai, Takahiro Shinagawa. 4469-4483 [doi]
- Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network StacksMoritz Bley, Tobias Scharnowski, Simon Wörner, Moritz Schloegel, Thorsten Holz. 4484-4498 [doi]
- Dynamic Detection of Vulnerable DMA Race ConditionsBrian Johannesmeyer, Raphael Isemann, Cristiano Giuffrida, Herbert Bos. 4499-4513 [doi]
- Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution EnvironmentsDaniel Hugenroth, Mario Lins, René Mayrhofer, Alastair R. Beresford. 4514-4528 [doi]
- Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box DeobfuscationVidal Attias, Nicolas Bellec 0001, Grégoire Menguy, Sébastien Bardin, Jean-Yves Marion. 4529-4543 [doi]
- Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKIAndong Chen, Yangyang Wang, Jia Zhang, Mingwei Xu. 4544-4558 [doi]
- Exploring and Analyzing Cross Layer DoS Attack Against UDP-based Services on LinuxDashuai Wu, Yunyi Zhang, Baojun Liu, Xiang Li, Eihal Alowaisheq, Haixin Duan. 4559-4573 [doi]
- Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing ScenariosXuewei Feng, Zhaoxi Li, Qi Li 0002, Ziqiang Wang, Kun Sun 0001, Ke Xu 0002. 4574-4587 [doi]
- SISTAR: An Efficient DDoS Detection and Mitigation Framework Utilizing Programmable Data PlanesJunjie Hu, Feng Guo, Qihang Zhou, Yixin Zhang, Zibo Gao, Yinglong Han, Zhiqiang Lv. 4589-4603 [doi]
- ScannerGrouper: A Generalizable and Effective Scanning Organization Identification System Toward the Open WorldXin He, Enhuan Dong, Jiyuan Han, Zhiliang Wang, Hui Zhang, Liang Liu, Lianyi Sun, Supei Zhang, Pengfei Xue, Guanglei Song, Han Li, Xiaowen Quan, Jiahai Yang 0001. 4604-4618 [doi]
- On the Security of SSH Client SignaturesFabian Bäumer, Marcus Brinkmann, Maximilian Radoy, Jörg Schwenk, Juraj Somorovsky. 4619-4633 [doi]
- Toss: Garbled PIR from Table-Only StackingLucien K. L. Ng, Vladimir Kolesnikov. 4634-4648 [doi]
- Secure Noise Sampling for Differentially Private Collaborative LearningOlive Franzese, Congyu Fang, Radhika Garg 0002, Xiao Wang 0012, Somesh Jha, Nicolas Papernot, Adam Dziedzic. 4649-4663 [doi]
- Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-HeadJames Hsin-yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl. 4664-4678 [doi]
- Distance-Aware OT with Application to Fuzzy PSILucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas. 4679-4691 [doi]
- MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAMGilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin. 4692-4706 [doi]
- CuKEM: A Concise and Unified Hybrid Key Encapsulation MechanismYiting Liu, Biming Zhou, Haodong Jiang. 4707-4721 [doi]
- Demo: Stopping Production Testing: A Graphical RPKI Test-SuiteTobias Kirsch, Haya Schulmann, Niklas Vogel. 4722-4723 [doi]
- Demo: Reverse Engineering Android Apps with Code CoverageAleksandr Pilgun. 4725-4727 [doi]
- Demo: Exploring Utility and Attackability Trade-offs in Local Differential PrivacyHaoying Zhang, Abhishek K. Mishra, Héber Hwang Arcolezi. 4728-4730 [doi]
- Poster: ERIS: Evaluating ROV via ICMPv6 Rate Limiting Side ChannelsRenrui Tian, YaHui Li, Han Zhang 0009, Xinzhe Liu, Xia Yin 0001, Xingang Shi, Zhiliang Wang, Jilong Wang 0001. 4731-4733 [doi]
- Poster: Longitudinal Analysis of Romance Scam Infrastructure Evolution: Evidence of Strategic LegitimizationNayeon Ryu, Heeyeong Suh, Seyoung Lee. 4734-4736 [doi]
- LLMalware: An LLM-Powered Robust and Efficient Android Malware Detection FrameworkZijing Ma, Leming Shen, Xinyu Huang, Yuanqing Zheng. 4737-4739 [doi]
- Poster: Adaptive Gradient Clipping with Personalized Differential Privacy for Heterogeneous Federated LearningHao Zhou 0043, Hua Dai, Siqi Cai, Geng Yang, Yang Xiang. 4740-4742 [doi]
- Poster: Recapture Detection Using Disparity Map Obtained from Dual-Pixel Image SensorsTetsu Ishizue, Sara Rampazzi, Takeshi Sugawara 0001. 4743-4745 [doi]
- Poster: Black-box Attacks on Multimodal Large Language Models through Adversarial ICC ProfilesChengbin Sun, Hailong Sun 0001, Guancheng Li, Jiashuo Liang. 4746-4748 [doi]
- Poster: Towards Intelligent Assurance for Autonomous AI Pentesters: Concurrent Compliance Auditing and Self-Augmentation via Execution Trace AnalysisGustavo Sánchez, Adam Lundqvist. 4749-4751 [doi]
- Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart ContractsJens-Rene Giesen, Christian Scholz, Lucas Davi. 4752-4754 [doi]
- Poster: We must talk about RPKI RepositoriesHaya Schulmann, Niklas Vogel. 4755-4757 [doi]
- Poster: Insecure Coding Habits Die Hard. Can PEFT Really Turn LLMs into Secure Coders?Sangjun Chae, Jangseop Choi, Taeyang Kim, Eun Jung, Sanghak Oh, Hyoungshick Kim. 4758-4760 [doi]
- Poster: PainNOVA: Privacy-Aware Voice-Based Pain-Level DetectionAndrew Lu, Mashrafi Kajol, Wei Lu, Dean Sullivan. 4761-4763 [doi]
- Poster: Public Key Encryption with Exclusionary Subset Keyword Search from LatticesYi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Ting-Hsiang Su. 4764-4766 [doi]
- Poster: The Rocky Road Towards RPKI Algorithm AgilityKatharina Miesch, Haya Schulmann, Niklas Vogel. 4767-4769 [doi]
- Poster: Leveraging Large Language Models to Effectively and Efficiently Identify Vulnerability Patches for WordPress PluginsXue Leng, Hai Zhang, Tiantian Zhu, Jianguo Sun. 4770-4772 [doi]
- Poster: Exploring the Landscape of RPKI Relying PartiesDonika Mirdita, Haya Schulmann, Michael Waidner. 4773-4775 [doi]
- Poster: When Logs Misbehave: Retrieving Known APTs from Noisy GraphsGuo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Ming-Chuan Yang, Shou-de Lin, Wang-Chien Lee, Meng Chang Chen. 4776-4778 [doi]
- Poster: Computer Security Researchers' Experiences with Vulnerability DisclosuresHarshini Sri Ramulu, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, Yasemin Acar. 4779-4781 [doi]
- Poster: Reconsidering DNS-Based Domain Verification: Privacy and Overhead ImplicationsEunbee Hwang, Hyunsoo Kim, Ted Taekyoung Kwon. 4782-4784 [doi]
- Poster: Impulse in the Clickstream: Behavioral Insights from Browsing HistoryShubham Malaviya, Anuj Bagad, Manish Shukla 0001, Sachin Lodha. 4785-4787 [doi]
- Poster: An Obfuscation Framework for Mitigating Topology Probing Attacks in Cloud-Native SystemsXue Leng, Kaiwen Shen, Chengxuan Zhu, Xing Li, Jianguo Sun. 4788-4790 [doi]
- Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and ClusteringJunwei Zhou, Yuyang Gao, Cheng Tan, Yanchao Yang 0002, Jianwen Xiang. 4791-4793 [doi]
- Poster: PQ Noise ExplorerAnimesh Thakur, Mikael Asplund. 4794-4796 [doi]
- Poster: Obfuscating Function Activity States to Enhance Privacy in Serverless ApplicationsXue Leng, Fengming Zhu, Xing Li, Ye Tian, Jianguo Sun, Yan Chen. 4797-4799 [doi]
- Poster: Model-driven Privacy Analysis of Messaging PlatformsMuqaddas Naz, Muhammad Taimoor Khan, Muhammad Waqas. 4800-4802 [doi]
- Poster: Agentic Shell Honeypot Using Structured LoggingKai Wei, Guangjing Wang. 4803-4805 [doi]
- Poster: An Improved Quantum Attack on the Two-round Even-Mansour Cipher with Independent Permutations and KeysRentaro Shiba, Tetsu Iwata. 4806-4808 [doi]
- Poster: Post-Quantum Readiness in EdDSA ChainsKostas Kryptos Chalkias. 4809-4811 [doi]
- Poster: Reducing Hull Dimensions for Efficient Permutation Recovery in Code-Based CryptographyKeita Ishizuka. 4812-4814 [doi]
- Poster: LogCraft: Crafting CVE-Aware Synthetic Worlds (Logs)Kai-Xian Wong, Chan-Jien Tan, Yi-Ting Huang, Ying-Ren Guo, Yu-Zih Jheng, Guo-Wei Wong, Meng Chang Chen. 4815-4817 [doi]
- Poster: High-Fidelity and Contextual User Activity Memory ForensicsMin-Chieh Wu, Jui-An Chang, Yu-Sung Wu. 4818-4820 [doi]
- Poster: LogCADA: Cross-System Log Anomaly Detection based on Two-Stage Multi-Source Domain AdaptationJunwei Zhou 0002, Ying Zhu, Linhao Wang, Jianwen Xiang, Cheng Tan, Yanchao Yang. 4821-4823 [doi]
- Poster: Efficient Threshold ML-DSA up to 6 PartiesSofía Celi, Rafaël Del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest. 4824-4826 [doi]
- Poster: Scalable Privacy-Preserving Linear Regression Training via Homomorphic EncryptionYena Cho, Hyoungshick Kim. 4827-4829 [doi]
- Poster: Adversarial Habituation Attack: A Psychological Extension and Re-framing of Boiling Frog AttackTashi Stirewalt, Assefaw Hadish Gebremedhin. 4830-4832 [doi]
- Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning AttacksLin Li, Youyang Qu, Jiayang Ao, Ming Ding, Chao Chen, Jun Zhang. 4833-4835 [doi]
- Poster: Randomness Unmasked: Towards Reproducible and Fair Evaluation of Shift-Aware Deep Learning NIDSLucy Steele, Fahad Alotaibi, Sergio Maffeis. 4836-4838 [doi]
- Poster: Inferring On-Screen Keyboard Input via Gamepad-based Mouse Movement TracesGyujeong Jin, Seyoung Lee 0003. 4839-4841 [doi]
- Poster: Decoding Social Engineering: A Multi-Level Framework for Tactic Generation, Annotation, and EvaluationYicun Tian, Youyang Qu, Ming Ding, Shigang Liu, Pei-wei Tsai, Jun Zhang. 4842-4844 [doi]
- Addressing Vulnerabilities and Opacities in Quantum Service ProvidersRupshali Roy. 4845-4847 [doi]
- AI-Augmented Static Analysis: Bridging Heuristics and Completeness for Practical Reverse EngineeringMonika Santra. 4848-4850 [doi]
- Hardware-assisted Memory IsolationHongyi Lu. 4851-4853 [doi]
- S2S-SED: A Speech-to-Speech Approach for Detection of Social Engineering Attacks in Audio ConversationsLeonardo Erlacher. 4854-4856 [doi]
- Security and Privacy Measurements in Cellular Networks: Novel Approaches in a Global Roaming ContextGabriel K. Gegenhuber. 4857-4859 [doi]
- Postmortem Voice Cloning: Individuals Perspectives of Ownership and Deceptive HarmsJennifer Vander Loop. 4860-4862 [doi]
- Towards Explainable and Robust Deepfake Detection and Attribution: Enhancing Multimedia Forensics for the Next Generation of Synthetic MediaRaphael Antonius Frick. 4863-4865 [doi]
- Scalable Cryptography for Trustworthy Machine Learning in the LLM EraGefei Tan. 4866-4868 [doi]
- Turning Uncertainty into Efficiency: Toward Practical, Quantum-Resistant Verifiable Privacy ToolsJie Xu. 4869-4871 [doi]
- On Defining Reproducible Outcomes for the Computer Security CommunityDaniel Olszewski. 4872-4874 [doi]
- Towards Explainable and Effective Anti-Money Laundering for CryptocurrencyQishuang Fu. 4875-4877 [doi]
- Towards Solving Real-world Problems of Post-quantum CryptographySuparna Kundu. 4878-4880 [doi]
- Dissertation Research Description: The Potential of SBOMs to Increase Software Supply Chain SecurityLukas Gehrke. 4881-4883 [doi]
- Exploring the Janus Face of Synthetic Images: From Privacy-secure Biometrics Applications to Deepfake Detection for Misinformation-Free Social NetworksTanusree Ghosh. 4884-4886 [doi]
- ACM CCS Young Scholars Development ProgramF. Betül Durak, FengJun Li, Sophie Stephenson. 4887-4888 [doi]
- AISec '25: 18th ACM Workshop on Artificial Intelligence and SecurityMaura Pintor, Matthew Jagielski, Ruoxi Jia 0001. 4889-4891 [doi]
- CPSIoTSec'25: The 7th Joint Workshop on CPS & IoT Security and PrivacyKassem Fawaz, Daisuke Mashima. 4892-4893 [doi]
- ARTMAN '25: Third Workshop on Recent Advances in Resilient and Trustworthy MAchine learning-driveN systemsGregory Blanc, Takeshi Takahashi 0001, Zonghua Zhang. 4894-4895 [doi]
- WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCCMassimo Cafaro, Eric Chan-Tin, Jerry Chou 0001, Jinoh Kim. 4896-4897 [doi]
- SCORED '25: Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesAditya Sirish A Yelgundhalli, Behnaz Hassanshahi, Dennis Roellke, Drew Davidson, Kathleen Moriarty, Lorenzo De Carli, Marcela S. Melara, Santiago Torres-Arias, Sarah Evans, Yuchen Zhang 0006. 4898-4899 [doi]
- HAIPS '25: First ACM CCS Workshop on Human-Centered AI Privacy and SecurityTianshi Li 0001, Toby Jia-Jun Li, Yaxing Yao, Sauvik Das. 4900-4901 [doi]
- WPES '25: 24th Workshop on Privacy in the Electronic SocietyJianying Zhou 0001. 4902-4903 [doi]
- SURE '25: The 1st ACM Workshop on Software Understanding and Reverse EngineeringZion Leonahenahe Basque, Ati Priya Bajaj. 4904-4905 [doi]
- CheckMATE '25: Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) AttacksSébastien Bardin, Michele Ianni, Hyungon Moon. 4906-4907 [doi]
- CCSW '25: Cloud Computing Security WorkshopPaolo Palmieri 0001, Shivam Bhasin. 4908-4909 [doi]
- QSec '25: Workshop on Quantum Security and PrivacyMuhammad Taqi Raza, Jakub Szefer. 4910-4911 [doi]
- QRSec 2025: ACM CCS First Workshop on Quantum-Resistant Cryptography and SecurityAshish Kundu, Attila A. Yavuz, Cristina Nita-Rotaru. 4912-4913 [doi]
- LAMPS '25: ACM CCS Workshop on Large AI Systems and Models with Privacy and Security AnalysisKwok-Yan Lam, Xiaoning Liu 0002, Derui Wang, Bo Li 0026, Wenyuan Xu, Jieshan Chen, Minhui Xue 0001, Xingliang Yuan, Guangdong Bai, Shuo Wang. 4914-4915 [doi]
- DeFi '25: 5th ACM Workshop on Decentralized Finance and SecurityHao Chung, Yajin Zhou, Liyi Zhou. 4916-4917 [doi]
- The 20th Workshop on Programming Languages and Analysis for Security (PLAS 2025)Abhishek Bichhawat, Jana Hofmann. 4918-4919 [doi]
- RICSS'25: 3rd International Workshop on Re-design Industrial Control Systems with SecurityRuimin Sun, Mu Zhang 0001. 4920-4921 [doi]
- 3D-Sec '25: The 1st ACM Workshop on Deepfake, Deception, and Disinformation SecuritySimon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore, Tim Walita, Bimal Viswanath, Mario Fritz. 4922-4923 [doi]
- SaTS '25: The 3rd ACM Workshop on Security and Privacy of AI-Empowered Mobile Super AppsLuyi Xing, Yue Xiao 0007. 4924-4925 [doi]
- WAHC 2025: 13th Workshop on Encrypted Computing & Applied Homomorphic CryptographyFlávio Bergamaschi, Yuriy Polyakov, Kurt Rohloff. 4926-4927 [doi]
- free5GC '25: The 1st free5GC World ForumJyh-Cheng Chen, K. K. Ramakrishnan. 4928-4929 [doi]
- CSCS '25 - Cyber Security in CarS WorkshopHans-Joachim Hof, Mario Fritz, Christoph Krauß. 4930-4931 [doi]