Abstract is missing.
- The Encryption Debate: An Enduring StruggleBart Preneel. 1-3 [doi]
- Malware Research: History, Milestones, and Open QuestionsDavide Balzarotti. 5-6 [doi]
- Estimating the Runtime and Global Network Traffic of SMPC ProtocolsAndreas Klinger, Vincent Ehrmanntraut, Ulrike Meyer. 7-18 [doi]
- A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS AttacksMaisha Maliha, Shameek Bhattacharjee. 19-30 [doi]
- Investigating TLS Version Downgrade in Enterprise SoftwareKa Fun Tang, Ka Lok Wu, Sze Yiu Chau. 31-42 [doi]
- Examining Cryptography and Randomness Failures in Open-Source Cellular CoresK. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin R. B. Butler, William Enck, Patrick Traynor. 43-54 [doi]
- Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial EcosystemMehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang 0001, Adam Doupé. 55-65 [doi]
- Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" DeploymentsLuke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton. 67-78 [doi]
- CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes ClustersMahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang 0001, Boubakr Nour, Makan Pourzandi. 79-90 [doi]
- Process-Aware Intrusion Detection in MQTT NetworksPhilip Empl, Fabian Böhm, Günther Pernul. 91-102 [doi]
- Accelerating Performance of Bilinear Map Cryptography using FPGAAndrei Ouatu, Gabriel Ghinita, Razvan Rughinis. 103-113 [doi]
- Exploiting Update Leakage in Searchable Symmetric EncryptionJacob Haltiwanger, Thang Hoang. 115-126 [doi]
- The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep CircuitsIhyun Nam. 127-138 [doi]
- DroidDefender: An Image-based Android Antimalware Proof-of-ConceptGiovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 139-141 [doi]
- Security Policy Generation and Verification through Large Language Models: A ProposalFabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone. 143-145 [doi]
- Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK AttackAnand Agrawal, Rajib Ranjan Maiti. 147-149 [doi]
- Machine Learning Techniques for Python Source Code Vulnerability DetectionTalaya Farasat, Joachim Posegga. 151-153 [doi]
- A-COPILOT: Android Covert Operation for Private Information Lifting and OTP Theft: A study on how Malware Masquerading as Legitimate Applications compromise Security and PrivacyJoseph Guan Quan Lim, Zhen Yu Kwok, Isaac Soon, Jun Xian Yong, Samuel Song Yuhao, Siti Halilah Binte Rosley, Vivek Balachandran. 155-157 [doi]
- Communicate Less, Learn More: A Locally Differential Private Approach for Counting Triangles with Better AccuracySasi Bhushan V. Saladi, Nagesh Bhattu Sristy. 159-161 [doi]
- Aunor: Converting Rust crates to [no_std] at scaleShashank Sharma, Ayushi Sharma, Aravind Machiry. 163-165 [doi]
- An Overview of Threats Exploring the Confusion Between Top-Level Domains and File Type Extensions?Anderson Sales, Nuno Torres, Pedro Pinto 0001. 167-169 [doi]
- IoTFuzzSentry: Hunting Bugs In The IoT Wilderness In Operational Phase Using Payload FuzzingPriyanka Rushikesh Chaudhary, N. Pranav Krishna, Rajib Ranjan Maiti. 171-173 [doi]
- CoCoT: Collaborative Contact TracingTrevor Kann, Lujo Bauer, Robert K. Cunningham. 175-186 [doi]
- Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary ComputationAlessandro N. Baccarini, Marina Blanton, Shaofeng Zou. 187-198 [doi]
- Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph LearningSofiane Azogagh, Zelma Aubin Birba, Sébastien Gambs, Marc-Olivier Killijian. 199-210 [doi]
- Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesAleksandr Dolgavin, Mark Yampolskiy, Moti Yung. 211-220 [doi]
- From Theory to Comprehension: A Comparative Study of Differential Privacy and k-AnonymitySaskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch. 221-232 [doi]
- Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated LearningK. Naveen Kumar, C. Krishna Mohan, Aravind Machiry. 233-244 [doi]
- Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANsClément Elliker, Emeric Tonnelier, Aymen Shabou. 245-252 [doi]
- Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in AndroidShou-Ching Hsiao, Shih-wei Li, Hsu-Chun Hsiao. 253-264 [doi]
- FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile DevicesJinghui Liao, Niusen Chen, Lichen Xia, Bo Chen 0028, Weisong Shi. 265-276 [doi]
- Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of SignalMashari Alatawi, Nitesh Saxena. 277-288 [doi]
- Smishing Dataset I: Phishing SMS Dataset from Smishtank.comDaniel Timko, Muhammad Lutfor Rahman. 289-294 [doi]
- Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling AttacksAna-Maria Cretu 0002, Miruna Rusu, Yves-Alexandre de Montjoye. 295-306 [doi]
- Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized ResponseMatta Varun, Shuya Feng, Han Wang, Shamik Sural, Yuan Hong. 307-318 [doi]
- Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data TypesMariana Cunha, Guilherme Duarte, Ricardo Andrade, Ricardo Mendes, João P. Vilela. 319-324 [doi]
- AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement LearningKento Hasegawa, Seira Hidano, Kazuhide Fukushima. 325-336 [doi]
- CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security BugsKedrian James, Kevin Valakuzhy, Kevin Z. Snow, Fabian Monrose. 337-347 [doi]
- TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness AnalysisKiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan. 349-360 [doi]
- WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection: Data/Toolset PaperGabriel Loiseau, Valentin Lefils, Maxime Meyer, Damien Riquet. 361-366 [doi]
- Privacy Preserving Biometric Authentication for Fingerprints and BeyondMarina Blanton, Dennis Murphy. 367-378 [doi]
- Remote Registration of Multiple AuthenticatorsYongqi Wang, Thalia Laing, José Moreira, Mark D. Ryan 0001. 379-390 [doi]
- SLIM-View: Sampling and Private Publishing of Multidimensional DatabasesAla Eddine Laouir, Abdessamad Imine. 391-402 [doi]
- Mining Domain-Based PoliciesSi Zhang, Philip W. L. Fong. 403-414 [doi]