Abstract is missing.
- Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space ModelsBipin Paudel, George T. Amariucai. 3-22 [doi]
- Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking AttacksYunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong 0002. 23-43 [doi]
- The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningMaria Rigaki, Sebastian García. 44-64 [doi]
- FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive ModelsYoungHan Lee, Yungi Cho, Woorim Han, Ho Bae, Yunheung Paek. 65-84 [doi]
- Machine Learning for SAST: A Lightweight and Adaptable ApproachLorenz Hüther, Karsten Sohr, Bernhard J. Berger, Hendrik Rothe, Stefan Edelkamp. 85-104 [doi]
- Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word PredictionMohamed Suliman, Douglas J. Leith. 105-122 [doi]
- Privacy-Preserving Split Learning via Pareto Optimal SearchXi Yu, Liyao Xiang, Shiming Wang, Chengnian Long. 123-142 [doi]
- Security of NVMe Offloaded Data in Large-Scale Machine LearningTorsten Krauß, Raphael Götz, Alexandra Dmitrienko. 143-163 [doi]
- PassGPT: Password Modeling and (Guided) Generation with Large Language ModelsJavier Rando, Fernando Pérez-Cruz, Briland Hitaj. 164-183 [doi]
- Learning Type Inference for Enhanced Dataflow AnalysisLukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi. 184-203 [doi]
- Efficient Pruning for Machine Learning Under Homomorphic EncryptionEhud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi K. Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculín. 204-225 [doi]
- SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their CompositionsMuaz Ali, Muhammad Muzammil, Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifah Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, Sazzadur Rahaman. 229-249 [doi]
- On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in AndroidZiyi Zhou, Xuangan Xiao, Tianxiao Hou, Yikun Hu, Dawu Gu. 250-270 [doi]
- DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM DevicesZhe Chen, Haiqing Qiu, Xuhua Ding. 271-289 [doi]
- SplITS: Split Input-to-State Mapping for Effective Firmware FuzzingGuy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe. 290-310 [doi]
- μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded SystemsLuca Degani, Majid Salehi, Fabio Martinelli, Bruno Crispo. 311-331 [doi]
- Aion: Secure Transaction Ordering Using TEEsPouriya Zarbafian, Vincent Gramoli. 332-350 [doi]
- Towards a Privacy-Preserving Attestation for Virtualized NetworksGhada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert. 351-370 [doi]
- An Empirical Study of the Imbalance Issue in Software Vulnerability DetectionYuejun Guo 0001, Qiang Hu, Qiang Tang 0001, Yves Le Traon. 371-390 [doi]
- AttnCall: Refining Indirect Call Targets in Binaries with AttentionRui Sun, Yinggang Guo, ZiCheng Wang, Qingkai Zeng 0002. 391-409 [doi]
- Acumen: Analysing the Impact of Organisational Change on Users' Access EntitlementsSelasi Kwashie, Wei Kang 0004, Sandeep Santhosh Kumar, Geoff Jarrad, Seyit Camtepe, Surya Nepal. 410-430 [doi]