Abstract is missing.
- Privacy - From the Ivory Tower to the Trenches in the ParliamentOrr Dunkelman. 1-4 [doi]
- Covert Social Influence Operations: Past, Present, and FutureV. S. Subrahmanian. 5 [doi]
- CodeX: Contextual Flow Tracking for Browser ExtensionsMohammad M. Ahmadpanah, Matías F. Gobbi, Daniel Hedin, Johannes Kinder, Andrei Sabelfeld. 6-17 [doi]
- Coding Malware in Fancy Programming Languages for Fun and ProfitTheodoros Apostolopoulos, Vasilios Koutsokostas, Nikolaos Totosis, Constantinos Patsakis, Georgios Smaragdakis. 18-29 [doi]
- SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web ApplicationsNeil P. Thimmaiah, Rigel Gjomemo, V. N. Venkatakrishnan. 30-41 [doi]
- Evaluating Website Data Leaks through Spam Collection on HoneypotsOghenerukevwe Elohor Oyinloye, Carol Fung. 42-53 [doi]
- Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations: Data/Toolset paperPieter Philippaerts, Stef Verreydt, Wouter Joosen. 54-59 [doi]
- Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and ConvergenceShuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang, Yuan Hong 0001. 60-71 [doi]
- Differentially Private Iterative Screening Rules for Linear RegressionAmol Khanna, Fred Lu, Edward Raff. 72-83 [doi]
- Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text RewritingStephen Meisenbacher, Chaeeun Joy Lee, Florian Matthes. 84-95 [doi]
- Enhancing Relationship-Based Access Control Policies with Negative Rule MiningFerhat Demirkiran, Amir Masoumzadeh 0001. 96-106 [doi]
- To the Best of Knowledge and Belief: On Eventually Consistent Access ControlFlorian Jacob, Hannes Hartenstein. 107-118 [doi]
- Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in HealthcareMd. Al-Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray. 119-130 [doi]
- Exploiting HDMI and USB Ports for GPU Side-Channel InsightsSayed Erfan Arefin, Abdul Serwadda. 131-142 [doi]
- VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud ContextsMatteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi, Andrea Lanzi. 143-154 [doi]
- Defining Security Limits in BiometricsAxel Durbet, Paul-Marie Grollemund, Pascal Lafourcade 0001, Kevin Thiry-Atighehchi. 155-166 [doi]
- Probabilistic Data Structures in the Wild: A Security Analysis of RedisMia Filic, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson, Anupama Unnikrishnan. 167-178 [doi]
- Padding Matters - Exploring Function Detection in PE Files: Data/Toolset paperRaphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich 0005. 179-184 [doi]
- Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural NetworksBingyu Liu, Ali Arastehfard, Rujia Wang, Weiran Liu, Zhongjie Ba, Shanglin Zhou, Yuan Hong 0001. 185-196 [doi]
- Buffalo: A Practical Secure Aggregation Protocol for Buffered Asynchronous Federated LearningRiccardo Taiello, Clémentine Gritti, Melek Önen, Marco Lorenzi. 197-208 [doi]
- Multi-Device Context-Sensitive Attacks Against PrivacyEdgardo Alberto Barsallo Yi, Joshua David Oetting Majors, Aditya Vardhan Padala, Darren Wu, Aravind Machiry, Saurabh Bagchi. 209-220 [doi]
- Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and ServicesScott Seidenberger, Oluwasijibomi Ajisegiri, Noah Pursell, Fazil Raja, Anindya Maiti. 221-232 [doi]
- How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-strategy against Link Stealing Attacks?Mir Imtiaz Mostafiz, Imtiaz Karim, Elisa Bertino. 233-244 [doi]
- Citar: Cyberthreat Intelligence-driven Attack ReconstructionSutanu Kumar Ghosh, Rigel Gjomemo, V. N. Venkatakrishnan. 245-256 [doi]
- SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing ThreatsSeyed Mohammad Sanjari, Ashfak Md Shibli, Maraz Mia, Maanak Gupta, Mir Mehedi Ahsan Pritom. 257-268 [doi]
- TerrARA: Automated Security Threat Modeling for Infrastructure as CodeAnh Duy Tran, Laurens Sion, Koen Yskout, Wouter Joosen. 269-280 [doi]
- Protecting DeFi Platforms against Non-Price Flash Loan AttacksAbdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy. 281-292 [doi]
- SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized FinanceAbdulrahman Alhaidari, Bhavani Kalal, Balaji Palanisamy, Shamik Sural. 293-298 [doi]
- Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy: Data/Toolset PaperLukas Ingmarsson, Karl Duckert Karlsson, Niklas Carlsson. 299-304 [doi]
- Espresso: Robust Concept Filtering in Text-to-Image ModelsAnudeep Das, Vasisht Duddu, Rui Zhang, N. Asokan. 305-316 [doi]
- Laminator: Verifiable ML Property Cards using Hardware-assisted AttestationsVasisht Duddu, Lachlan J. Gunn, N. Asokan. 317-328 [doi]
- The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems powered by Deep LearningAdvije Rizvani, Giovanni Apruzzese, Pavel Laskov. 329-340 [doi]
- PromptShield: Deployable Detection for Prompt Injection AttacksDennis Jacob, Hend Alzahrani, Zhanhao Hu, Basel Alomair, David A. Wagner 0001. 341-352 [doi]
- A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications: Data/Toolset paperElisa Braconaro, Eleonora Losiouk. 353-358 [doi]
- CryptMove: Moving Stealthily through Legitimate and Encrypted Communication ChannelsMd Rabbi Alam, Jinpeng Wei, Qingyang Wang. 359-370 [doi]
- Blind Brother: Attribute-Based Selective Video EncryptionEugene Frimpong, Bin Liu, Camille Nuoskala, Antonis Michalas. 371-382 [doi]
- Private Eyes: Zero-Leakage Iris Searchable EncryptionJulie Ha, Chloé Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller 0001. 383-394 [doi]
- Trilobyte: Plausibly Deniable Communications Through Single Player Games: Data/Toolset PaperYuzhou Feng, Sandeep Kiran Pinjala, Radu Sion, Bogdan Carbunar. 395-400 [doi]
- VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph LearningAsmaa Hailane, Paria Shirani, Guy-Vincent Jourdan. 401-412 [doi]
- IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection SystemsHyunwoo Lee 0001, Charalampos Katsis, Alireza Lotfi, Taejun Choi, Soeun Kim, Ashish Kundu, Elisa Bertino. 413-418 [doi]
- Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks: Dataset PaperEric Wagner 0003, Lennart Bader, Konrad Wolsing, Martin Serror. 419-424 [doi]