Abstract is missing.
- Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion AttacksManel Slokom, Peter-Paul de Wolf, Martha A. Larson. 3-23 [doi]
- Privacy-Preserving Medical Data Generation Using Adversarial LearningPronaya Prosun Das, Despina Tawadros, Lena Wiese. 24-41 [doi]
- Balanced Privacy Budget Allocation for Privacy-Preserving Machine LearningBingchang He, Atsuko Miyaji. 42-56 [doi]
- SIFAST: An Efficient Unix Shell Embedding Framework for Malicious DetectionSongyue Chen, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu. 59-78 [doi]
- VNGuard: Intrusion Detection System for In-Vehicle NetworksYan Lin Aung, Shanshan Wang, Wang Cheng, Sudipta Chattopadhyay 0001, Jianying Zhou 0001, Anyu Cheng. 79-98 [doi]
- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz TestingWei Chen, Huaijin Wang, Weixi Gu, Shuai Wang 0011. 99-118 [doi]
- Loss and Likelihood Based Membership Inference of Diffusion ModelsHailong Hu, Jun Pang 0001. 121-141 [doi]
- Symmetry Defense Against CNN Adversarial Perturbation AttacksBlerta Lindqvist. 142-160 [doi]
- Load-and-Act: Increasing Page Coverage of Web ApplicationsNico Weidmann, Thomas Barber, Christian Wressnegger. 163-182 [doi]
- From Manifest V2 to V3: A Study on the Discoverability of Chrome ExtensionsValerio Bucci, Wanpeng Li. 183-202 [doi]
- Libra: Library Identification in Obfuscated Android AppsDavid A. Tomassi, Kenechukwu Nwodo, Mohamed Elsabagh. 205-225 [doi]
- Certificate Reuse in Android ApplicationsFatemeh Nezhadian, Enrico Branca, Natalia Stakhanova. 226-245 [doi]
- TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution EnvironmentsGilang Mentari Hamidy, Sri Yulianti, Pieter Philippaerts, Wouter Joosen. 246-264 [doi]
- Performance Impact of PQC KEMs on TLS 1.3 Under Varying Network CharacteristicsJohanna Henrich, Andreas Heinemann, Alexander Wiesmaier, Nicolai Schmitt. 267-287 [doi]
- Protecting Private Keys of Dilithium Using Hardware Transactional MemoryLingjia Meng, Yu Fu, Fangyu Zheng, ZiQiang Ma, Mingyu Wang, Dingfeng Ye, Jingqiang Lin. 288-306 [doi]
- Mercury: Constant-Round Protocols for Multi-Party Computation with RationalsLuke Harmon, Gaetan Delavignette. 309-326 [doi]
- Evolving Conditional Disclosure of SecretsNaty Peter. 327-347 [doi]
- Permutation-Based Deterministic Authenticated Encryption with Minimum Memory SizeYukihito Hiraga, Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001. 351-371 [doi]
- Impossible Differential Cryptanalysis of the FBC Block CipherJiqiang Lu, Xiao Zhang. 372-391 [doi]
- Fregata: Faster Homomorphic Evaluation of AES via TFHEBenqiang Wei, Ruida Wang, Zhihao Li, Qinju Liu, Xianhui Lu. 392-412 [doi]
- Efficient Forward Secrecy for TLS-PSK from Pure Symmetric CryptographyLi Duan, Yong Li 0021, Lijun Liao. 415-434 [doi]
- On the Privacy-Preserving Infrastructure for Authenticated Key ExchangeLi Duan, Yong Li. 435-454 [doi]
- Hybrid Group Key Exchange with Application to Constrained NetworksColin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord. 455-472 [doi]
- Dynamic Multi-server Updatable EncryptionJodie Knapp, Elizabeth A. Quaglia. 475-495 [doi]
- Trace-and-Revoke Quadratic Functional EncryptionQiuwei Zheng, Jun Zhao. 496-515 [doi]
- Function-Hiding Zero Predicate Inner Product Functional Encryption from PairingsMing Wan, Geng Wang, Shifeng Sun 0001, Dawu Gu. 516-534 [doi]
- Robust Property-Preserving Hash Meets HomomorphismKeyang Liu, Xingxin Li, Tsuyoshi Takagi. 537-556 [doi]
- Withdrawable Signature: How to Call Off a SignatureXin Liu 0074, Joonsang Baek, Willy Susilo. 557-577 [doi]
- An Improved BKW Algorithm for Solving LWE with Small SecretsYu Wei, Lei Bi 0002, Kunpeng Wang, Xianhui Lu. 578-595 [doi]