Abstract is missing.
- A Formal Analysis of the FIDO2 ProtocolsJingjing Guan, Hui Li, Haisong Ye, Ziming Zhao. 3-21 [doi]
- A Composable Security Treatment of ECVRF and Batch VerificationsChristian Badertscher, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell. 22-41 [doi]
- Efficient Proofs of Knowledge for Threshold RelationsGennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti. 42-62 [doi]
- A Tale of Two Models: Formal Verification of KEMTLS via TamarinSofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers. 63-83 [doi]
- Browser-Based CPU FingerprintingLeon Trampert, Christian Rossow, Michael Schwarz 0001. 87-105 [doi]
- Polymorphic Protocols at the Example of Mitigating Web BotsAugust See, Leon Fritz, Mathias Fischer 0001. 106-124 [doi]
- Unlinkable Delegation of WebAuthn CredentialsNick Frymann, Daniel Gardham, Mark Manulis. 125-144 [doi]
- Large Scale Analysis of DoH Deployment on the InternetSebastián García, Joaquín Bogado, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek. 145-165 [doi]
- Equivocal URLs: Understanding the Fragmented Space of URL Parser ImplementationsJoshua Reynolds, Adam Bates 0001, Michael Bailey. 166-185 [doi]
- Exploring the Characteristics and Security Risks of Emerging Emoji Domain NamesMingxuan Liu, Yiming Zhang 0009, Baojun Liu, Haixin Duan. 186-206 [doi]
- CPU Port Contention Without SMTThomas Rokicki, Clémentine Maurice, Michael Schwarz 0001. 209-228 [doi]
- Protocols for a Two-Tiered Trusted Computing BaseJosé Moreira, Mark Ryan 0001, Flavio D. Garcia. 229-249 [doi]
- Using Memristor Arrays as Physical Unclonable FunctionsFlorian Frank, Tolga Arul, Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser 0001. 250-271 [doi]
- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network InferenceWenxing Zhu, Mengqi Wei, Xiangxue Li, Qiang Li. 275-294 [doi]
- Mixed-Technique Multi-Party Computations Composed of Two-Party ComputationsErik-Oliver Blass, Florian Kerschbaum. 295-319 [doi]
- PEA: Practical Private Epistasis Analysis Using MPCKay Hamacher, Tobias Kussel, Thomas Schneider 0003, Oleksandr Tkachenko. 320-339 [doi]
- Hide and Seek: On the Stealthiness of Attacks Against Deep Learning SystemsZeyan Liu, FengJun Li, Jingqiang Lin, Zhu Li, Bo Luo. 343-363 [doi]
- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint DevicesYoungHan Lee, Sohee Jun, Yungi Cho, Woorim Han, Hyungon Moon, Yunheung Paek. 364-383 [doi]
- Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and DefensesBuse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan. 384-404 [doi]
- FLMJR: Improving Robustness of Federated Learning via Model StabilityQi Guo, Di Wu, Yong Qi, Saiyu Qi, Qian Li 0024. 405-424 [doi]
- MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel CodingDorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz. 425-444 [doi]
- Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated LearningAshish Gupta 0012, Tie Luo, Mao V. Ngo, Sajal K. Das 0001. 445-465 [doi]
- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)Alaa Oqaily, Yosr Jarraya, Lingyu Wang 0001, Makan Pourzandi, Suryadipta Majumdar. 466-489 [doi]
- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control SystemsClement Fung, Shreya Srinarasi, Keane Lucas, Hay Bryan Phee, Lujo Bauer. 493-513 [doi]
- A Novel High-Performance Implementation of CRYSTALS-Kyber with AI AcceleratorLipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong. 514-534 [doi]
- From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber AttacksAhmed Amro, Vasileios Gkioulos. 535-553 [doi]
- Efficient Hash-Based Redactable Signature for Smart Grid ApplicationsFei Zhu, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang 0001. 554-573 [doi]
- Can Industrial Intrusion Detection Be SIMPLE?Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner 0003, Klaus Wehrle, Martin Henze. 574-594 [doi]
- For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment DetectionMatteo Cardaioli, Mauro Conti, Arpita Ravindranath. 595-613 [doi]
- Towards Efficient Auditing for Real-Time SystemsAyoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates 0001, Sibin Mohan. 614-634 [doi]
- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS StacksAina Toky Rasoamanana, Olivier Levillain, Hervé Debar. 637-657 [doi]
- PanoptiCANs - Adversary-Resilient Architectures for Controller Area NetworksBogdan Groza, Lucian Popa 0003, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici. 658-679 [doi]
- Detecting Cross-language Memory Management Issues in RustZhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui. 680-700 [doi]
- Reach Me if You Can: On Native Vulnerability Reachability in Android AppsLuca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto. 701-722 [doi]
- Extensible Virtual Call IntegrityYuancheng Jiang, Gregory J. Duck, Roland H. C. Yap, Zhenkai Liang, Pinghai Yuan. 723-739 [doi]
- Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked PasswordsDaniel Mølmark-O'Connor, Emmanouil Vasilomanolakis. 743-748 [doi]
- A Fast, Practical and Simple Shortest Path Protocol for Multiparty ComputationAbdelrahaman Aly, Sara Cleemput. 749-755 [doi]
- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNetFeng Yue, Jiale Chen, Zhaopin Su, Niansong Wang, Guofu Zhang. 756-762 [doi]
- MixCT: Mixing Confidential Transactions from Homomorphic CommitmentJiajun Du, Zhonghui Ge, Yu Long 0001, Zhen Liu 0008, Shifeng Sun, Xian Xu, Dawu Gu. 763-769 [doi]
- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in PythonHéber Hwang Arcolezi, Jean-François Couchot, Sébastien Gambs, Catuscia Palamidessi, Majid Zolfaghari. 770-775 [doi]
- The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative ModelsAmbrish Rawat, Killian Levacher, Mathieu Sinn. 776-783 [doi]