Abstract is missing.
- Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV EcosystemChristian Böttger, Henry Hosseini, Christine Utz, Nurullah Demir, Jan Hörnemann, Christian Wressnegger, Thomas Hupperich, Norbert Pohlmann, Matteo Große-Kampmann, Tobias Urban. 1-15 [doi]
- Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-MemoryF. Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, A. Giray Yaglikçi, Ismail Emir Yüksel, Nika Mansouri-Ghiasi, Zülal Bingöl, Mohammad Sadrosadati, Onur Mutlu. 16-32 [doi]
- GTV: Generating Tabular Data via Vertical Federated LearningZilong Zhao 0001, Han Wu 0001, Aad van Moorsel, Lydia Y. Chen. 33-46 [doi]
- BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic IndexingYong Zhao, Ang Xia, Jie Yin, Zhi Wang, Yaqin Cao, Xiangyi Zeng, Yuling Liu. 47-60 [doi]
- LAGER: Layer-wise Graph Feature Extractor for Network Intrusion DetectionKe He, Dan Dongseong Kim, Muhammad Rizwan Asghar. 61-74 [doi]
- VerifyVFL: Practical Verifiable Vertical Federated LearningJunchen Hou, Lan Zhang. 75-87 [doi]
- Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair ApproachesMd Rashedul Hasan, Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri. 88-101 [doi]
- PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script GenerationYuanda Wang, Xinhui Han. 102-115 [doi]
- 5G-STREAM: Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the CloudTolga O. Atalay, Alireza Famili, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang 0001. 116-128 [doi]
- A Human Study of Automatically Generated Decompiler AnnotationsYuwei Yang, Skyler Grandel, Jeremy Lacomis, Edward J. Schwartz, Bogdan Vasilescu, Claire Le Goues, Kevin Leach. 129-142 [doi]
- ammBoost: State Growth Control for AMMsNicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh. 143-156 [doi]
- ReCraft: Self-Contained Split, Merge, and Membership Change of Raft ProtocolKezhi Xiong, Soonwon Moon, Joshua H. Kang, Bryant Curto, Jieung Kim, Ji-Yong Shin. 157-170 [doi]
- Semantically Improved Adversarial Attack Based on Masked Language Model via Context PreservationHao Tian, Hao-Tian Wu, Yiu-ming Cheung, Junhui He, Zhihong Tian. 171-182 [doi]
- Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed BanditLorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov, Aleksei Stafeev, Giancarlo Pellegrino. 183-192 [doi]
- ICSTracker: Backtracking Intrusions in Modern Industrial Control SystemsMd. Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia 0001, Mu Zhang 0001. 193-207 [doi]
- GnuZero: A Compiler-Based Zeroization Static Detection Tool for the MassesPierrick Philippe, Mohamed Sabt, Pierre-Alain Fouque. 208-221 [doi]
- PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM OpcodesPasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni. 222-232 [doi]
- GREAT: Global Representation and Edge-Attention for Hardware Trojan DetectionZhengyi Li, Wei Cheng, Huanrong Tang, Yaohua Wang. 233-245 [doi]
- IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow SemanticsHong-wei Li, Ping-Ting Liu, Bo-Wei Lin, Yennun Huang. 246-255 [doi]
- Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of KeylimeMargie Ruffin, Chenkai Wang, Gheorghe Almási 0001, Abdulhamid Adebayo, Hubertus Franke, Gang Wang. 256-265 [doi]
- Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting ProvidersQihang Peng, Mingming Zhang, Deliang Chang, Jia Zhang 0004, Baojun Liu, Haixin Duan. 266-278 [doi]
- ConfBench: A Tool for Easy Evaluation of Confidential Virtual MachinesAndrea De Murtas, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Pascal Felber, Leonardo Querzoni, Valerio Schiavoni. 279-288 [doi]
- SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-ChannelHaoran Wang, Zheng Yang, Sangdon Park, Yibin Yang, Seulbae Kim, Willian T. Lunardi, Martin Andreoni, Taesoo Kim, Wenke Lee. 289-302 [doi]
- Faster Hash-based Multi-valued Validated Asynchronous Byzantine AgreementHanwen Feng 0001, Zhenliang Lu, Tiancheng Mai, Qiang Tang 0005. 303-316 [doi]
- LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram ScalingLiqun Shan, Xingli Zhang 0004, Md. Imran Hossen, Xiali Hei 0001. 317-330 [doi]
- EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM TechniquesOguzhan Canpolat, Ataberk Olgun, David Novo, Oguz Ergin, Onur Mutlu. 331-344 [doi]
- What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source SoftwareJialiang Dong, Xinzhang Chen, Willy Susilo, Nan Sun 0002, Arash Shaghaghi, Siqi Ma. 345-357 [doi]
- Attack-Defense Trees with Offensive and Defensive AttributesDanut-Valentin Copae, Reza Soltani 0001, Milan Lopuhaä-Zwakenberg. 358-370 [doi]
- An Analysis of Malicious Packages in Open-Source Software in the WildXiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang 0001, Qiang Li 0007. 371-385 [doi]
- ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data CentersMinli Julie Liao, Sam Ainsworth, Lev Mukhanov, Adrián Barredo, Markos Kynigos, Timothy M. Jones 0001. 386-400 [doi]
- Detecting Code Vulnerabilities using LLMsLarry Huynh, Yinghao Zhang, Djimon Jayasundera, Woojin Jeon, Hyoungshick Kim, Tingting Bi, Jin B. Hong. 401-414 [doi]
- Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting StudyMohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito. 415-428 [doi]
- Securing In-Network Traffic Control Systems with P4AuthRanjitha K., Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath, Rinku Shah, Praveen Tammana. 429-442 [doi]
- MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN ControllersMert D. Pesé, Bulut Gözübüyük, Eric Andrechek, Habeeb Olufowobi, Mohammad Hamad, Kang G. Shin. 443-456 [doi]
- SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural NetworkXiaodong Lei, Yongjun Wang, Lin Liu, Jun-Jie Huang, Jiangyong Shi, LuMing Yang. 457-469 [doi]
- MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction MiningRenjie Li, Zhou Zhou 0007, Hao Miao, Fengyuan Shi 0005, Qingyun Liu 0001. 470-482 [doi]
- Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive AttacksNikhilesh Singh, Chester Rebeiro. 483-496 [doi]
- KubeFence: Security Hardening of the Kubernetes Attack SurfaceCarmine Cesarano 0002, Roberto Natella. 497-510 [doi]
- Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic ArchitectureSuman Kumar, Abhishek Kumar Mishra, Anup Das 0001, Nagarajan Kandasamy. 511-523 [doi]
- QUIC-Aware Load Balancing: Attacks and MitigationsLiliana Kistenmacher, Anum Talpur, Mathias Fischer 0001. 524-536 [doi]
- RAVAGE: Robotic Autonomous Vehicles' Attack Generation EnginePritam Dash, Karthik Pattabiraman. 537-546 [doi]
- Prompting the Unseen: Detecting Hidden Backdoors in Black-Box ModelsZi Xuan Huang, Jia-Wei Chen, Zhi-peng Zhang, Chia-Mu Yu. 547-561 [doi]
- MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time ExecutionMoein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu. 562-575 [doi]
- Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on BlockchainsYuqi Liu, Rui Xi, Karthik Pattabiraman. 576-588 [doi]
- On Security Vulnerabilities in Transportation IoT DevicesJason Yih, Katerina Goseva-Popstojanova, Michel Cukier. 589-598 [doi]
- Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance SystemCheng Chen, Grant Xiao, DaeHyun Lee, Lishan Yang, Evgenia Smirni, Homa Alemzadeh, Xugui Zhou. 599-608 [doi]
- Secure access to network data for mobile network traffic analysis applicationsDjob Mvondo, Yérom-David Bromberg. 609-626 [doi]
- Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality ApplicationsDaniele Ottaviano, Marco Barletta, Francesco Boccola. 627-636 [doi]
- Mitigating Front-Running Attacks through Fair and Resilient Transaction DisseminationWassim Yahyaoui, Joachim Bruneau-Queyreix, Jérémie Decouchant, Marcus Völp. 637-649 [doi]
- A Closer Look At Modern Evasive Phishing EmailsElyssa Boulila, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, Simone Aonzo. 650-663 [doi]
- Towards Automated and Explainable Threat Hunting with Generative AIMoumita Das Purba, Bill Chu, Will French. 664-677 [doi]
- ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer ImplementationCarlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee. 678-690 [doi]
- ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training DataAbraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan. 691-705 [doi]
- "I will always be by your side": A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial VehiclesMuneeba Asif, Jean C. Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya. 706-719 [doi]
- Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical SystemsQiang Wen, Júlio Mendonça 0001, Fumio Machida, Marcus Völp. 720-733 [doi]
- Automatically Generating Rules of Malicious Software Packages via Large Language ModelXiangrui Zhang, Xuejie Du, Haoyu Chen, Yongzhong He, Wenjia Niu, Qiang Li. 734-747 [doi]