Abstract is missing.
- Microarchitectural Security of Firecracker VMM for Serverless Cloud PlatformsZane Weissman, Thore Tiemann, Thomas Eisenbarth 0001, Berk Sunar. 3-24 [doi]
- An OS Support for Tamper-Resistant Software Execution Using Empty InterruptionsSoma Kato, Yui Koyanagi, Tomoaki Ukezono. 25-41 [doi]
- S-RFUP: Secure Remote Firmware Update ProtocolRakesh Podder, Tyler Rios, Indrajit Ray, Presanna Raman, Stefano Righi. 42-62 [doi]
- Securing Virtual Reality Apps Inter-process CommunicationOluwatosin Falebita, Mahmoud Abdelgawad, Evan Anspach, Indrakshi Ray. 63-84 [doi]
- Securing the Web: Analysis of HTTP Security Headers in Popular Global WebsitesUrvashi Kishnani, Sanchari Das. 87-106 [doi]
- Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular CommunicationsJulian Parkin, Mahesh Tripunitara. 107-126 [doi]
- BP-MAP: A Secure and Convenient Mutual Authentication ProtocolHarika Narumanchi, Lakshmi Padmaja Maddali, N. Narendra Kumar. 127-145 [doi]
- Effects of Soft-Domain Transfer and Named Entity Information on Deception DetectionSteven Triplett, Simon Minami, Rakesh M. Verma. 146-155 [doi]
- Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF)Shubham Tomar, Meenakshi Tripathi. 159-179 [doi]
- From Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric DataN'Famoussa Kounon Nanamou, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Anis Bkakria. 180-200 [doi]
- Identifying Insecure Network Configurations Through Attack Modeling and Explainable AIBlessy Thomas, Sabu M. Thampi, Preetam Mukherjee 0001. 201-212 [doi]
- QIris: Quantum Implementation of Rainbow Table AttacksLee Jun Quan, Tan Jia Ye, Goh Geok Ling, Vivek Balachandran. 213-222 [doi]
- Insights from Running 24 Static Analysis Tools on Open Source Software RepositoriesFabiha Hashmat, Zeyad Alwaleed Aljaali, Mingjie Shen, Aravind Machiry. 225-245 [doi]
- REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial TrainingSanchit Gupta, Vireshwar Kumar. 246-264 [doi]
- Semantics-Based Static Vulnerability Detection in Solidity Using Abstract InterpretationMaitri Kushwaha, Arnab Mukherjee, Aishwarya Pandey, Raju Halder. 265-285 [doi]
- Web Privacy Perceptions Amongst Indian UsersGayatri Priyadarsini, Anshika Saxena, Aditi Dey, Prakriti, Abhishek Bichhawat. 289-309 [doi]
- Enabling Privacy in IT Service OperationsRohit Gupta, Rishabh Kumar, Sutapa Mondal, Mangesh S. Gharote, Sachin Lodha. 310-319 [doi]
- Privacy-Preserving Photo Sharing: An SSI Use CaseAshley Fraser, Abubakar-sadiq Shehu, Nick Frymann, Paul Haynes, Steve Schneider. 320-329 [doi]
- Zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching ProtocolShyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek 0001. 330-337 [doi]
- Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and AwarenessShamim Bin Zahid, Aishwarya Ghosh Bristy, Md. Musfikur Hasan Oli, Md. Fahim, Sarker T. Ahmed Rumee, Moinul Islam Zaber. 338-358 [doi]
- A Decoupling Mechanism for Transaction PrivacyVishwas Patil, R. K. Shyamasundar. 359-379 [doi]
- Protecting Ownership of Trained DNN Models with Zero-Knowledge ProofsShungo Sato, Hidema Tanaka. 383-403 [doi]
- MALAI: ML-Based Attack on Learning with Error ProblemMandru Suma Sri, Chakka Srikanth Yadav, Tikaram Sanyashi, Virendra Singh. 404-421 [doi]
- Patch Based Backdoor Attack on Deep Neural NetworksDebasmita Manna, Somanath Tripathy. 422-440 [doi]
- Integrating Crypto-Based Payment Systems for Data Marketplaces: Enhancing Efficiency, Security, and User AutonomyVipul Walunj, Vasanth Rajaraman, Jyotirmoy Dutta, Abhay Sharma. 443-452 [doi]
- IntelliSOAR: Intelligent Alert Enrichment Using Security Orchestration Automation and Response (SOAR)Surabhi Dwivedi, Balaji Rajendran, P. V. Akshay, Akshaya Acha, Praveen Ampatt, Sithu D. Sudarsan. 453-462 [doi]
- InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment System for Zero Trust NetworkN. Muraleedharan, Hrishikesh Rajendra Neve, Samar Sarkar, Balaji Rajendran. 463-472 [doi]