Abstract is missing.
- Reconstruction of Differentially Private Text Sanitization via Large Language ModelsShuchao Pang, Zhigang Lu 0001, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue 0001. 1-17 [doi]
- An In-model Spy in Edge IntelligenceFengxu Yang, Paizhuo Chen, Yihui Yan, Zhice Yang. 18-34 [doi]
- VulCodeMark: Adaptive Watermarking for Vulnerability Datasets ProtectionDi Cao, Shigang Liu, Jun Zhang 0010, Yang Xiang 0001. 35-49 [doi]
- Unsupervised Backdoor Detection and Mitigation for Spiking Neural NetworksJiachen Li, Bang Wu, Xiaoyu Xia, Xiaoning Liu, Xun Yi, Xiuzhen Zhang 0001. 50-64 [doi]
- Functional Encryption in Secure Neural Network Training: Data Leakage and Practical MitigationsAlexandru Ionita, Andreea Ionita. 65-76 [doi]
- DEPHP: A Source Code Recovery Method for PHP Bytecode with Improved Structural AnalysisShiwu Zhao, Ningjun Zheng, Haoyu Li, Ruizhi Feng, Xingchen Chen, Ru Tan, Qixu Liu. 77-91 [doi]
- SyzRetrospector: A Large-Scale Retrospective Study of SyzbotJoseph Bursey, Ardalan Amiri Sani, Zhiyun Qian. 92-105 [doi]
- SyzGrapher: Resource-Centric Graph-Based Kernel FuzzingMarius Fleischer, Harrison Green, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna. 106-121 [doi]
- SH3ARS: Privilege Reduction for ARMv8.0-A Secure MonitorsJonas Röckl, Julian Funk, Matti Schulze, Tilo Müller. 122-137 [doi]
- TypeFlexer: Type Directed Flexible Program PartitioningArunkumar Bhattar, Liyi Li 0002, Mingwei Zhu, Le Chang, Aravind Machiry. 138-157 [doi]
- Perry: A High-level Framework for Accelerating Cyber Deception ExperimentationBrian Singer, Yusuf Saquib, Lujo Bauer, Vyas Sekar. 158-173 [doi]
- Carbon Filter: Scalable, Efficient, and Secure Alert Triage for Endpoint Detection & ResponseMuhammad Adil Inam, Jonathan Oliver, Raghav Batta, Adam Bates 0001. 174-189 [doi]
- STGraph: Spatio-Temporal Graph Mining for Anomaly Detection in Distributed System LogsTeng Li 0003, Shengkai Zhang, Yebo Feng, Jiahua Xu 0002, Zexu Dang, Yang Liu 0003, Jianfeng Ma 0001. 190-203 [doi]
- Detecting and Adapting to Stealthy Label-Inversion Drifts via Conditional Distribution InferenceXiaoli Zhang 0003, Yue Xiao, Qilei Yin, Zhengyang Li, Xinyan Wang, Jianrong Zhang, Ke Xu 0002, Qi Li 0002, Xu-Cheng Yin. 204-219 [doi]
- NIDP: Solving Feature Distribution Shifts in Network Intrusion Detection via Neural PruningJiangtao Ding, Junli Zheng, Chengyang Mo, Zhicheng Xu, Hongbing Cheng. 220-232 [doi]
- DeepFW: A DNN-Based Firmware Version Identification Framework for Online IoT DevicesZhen Lei, Nian Xue, Zhen Li 0047, Dan Yu, Xin Huang 0005, Yongle Chen. 233-247 [doi]
- TAPPecker: TAP Logic Inference and Violation Detection in Heterogeneous Smart Home SystemsQixiao Lin, Jian Mao, Ziwen Liu, Zhenkai Liang. 248-265 [doi]
- Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant MessengersGabriel K. Gegenhuber, Maximilian Günther, Markus Maier, Aljosha Judmayer, Florian Holzbauer, Philipp É. Frenzel, Johanna Ullrich. 266-283 [doi]
- When (Inter)actions Speak Louder Than (Pass)words: Task-Based Evaluation of Implicit Authentication in Virtual RealityWoojin Jeon, Chaejin Lim, Hyoungshick Kim. 284-297 [doi]
- MotionDecipher: General Video-assisted Passcode Inference In Virtual RealityGuanchong Huang, Yan He, Shangqing Zhao, Yi Wu, Song Fang 0001. 298-313 [doi]
- A Comprehensive Quantification of Inconsistencies in Memory DumpsAndrea Oliveri, Davide Balzarotti. 314-328 [doi]
- MuSAR: Multi-Step Attack Reconstruction from Lightweight Security Logs via Event-Level Semantic Association in Multi-Host EnvironmentsYang Liu 0090, Zisen Xu, Zian Luo, Jin'ao Shang, Shilong Zhang, Haichuan Zhang, Ting Liu 0002. 329-348 [doi]
- Exploring Runtime Evolution in Android: A Cross-Version Analysis and Its Implications for Memory ForensicsBabangida Bappah, Lauren G. Bristol, Lamine Noureddine, Sideeq Bello, Umar Farooq, Aisha I. Ali-Gombe. 349-362 [doi]
- {{alert('CSTI')}}: Large-Scale Detection of Client-Side Template InjectionLorenzo Pisu, Davide Balzarotti, Davide Maiorca, Giorgio Giacinto. 363-377 [doi]
- Deep Learning-Based Attacks on Traditional Watermarking Systems in Real-Time Live Video StreamsHuixin Wang, Amin Sakzad, Stuart W. Hall. 378-390 [doi]
- Deception Meets Diagnostics: Deception-based Real-Time Threat Detection in Healthcare Web SystemsZeeshan Zulkifl Shah, Muhammad Ikram 0001, Hassan Jameel Asghar, Mohamed Ali Kâafar. 391-410 [doi]
- On the Effectiveness of Custom Transformers for Binary AnalysisXuezixiang Li, Lian Gao, Sheng Yu, Yu Qu, Heng Yin 0001. 411-424 [doi]
- Developing a Strong CPS Defender: An Evolutionary ApproachQingyuan Hu, Christopher M. Poskitt, Jun Sun 0001, Yuqi Chen 0001. 425-439 [doi]
- Scalable and Generalizable RL Agents for Attack Path Discovery via Continuous Invariant SpacesFranco Terranova, Abdelkader Lahmadi, Isabelle Chrisment. 440-457 [doi]
- From Text to Actionable Intelligence: Automating STIX Entity and Relationship ExtractionAhmed Lekssays, Husrev Taha Sencar, Ting Yu 0001. 458-473 [doi]
- Semantic Heat Guided Relational Privacy Inference Based on Panoptic Scene GraphQi Hao, Jie Huang, Changhao Ding, Zeping Zhang. 474-487 [doi]
- From Concealment to Exposure: Understanding the Lifecycle and Infrastructure of APT DomainsAthanasios Avgetidis, Aaron Faulkenberry, Boladji Vinny Adjibi, Tillson Galloway, Panagiotis Kintis, Omar Alrawi, Zane Ma, Fabian Monrose, Angelos D. Keromytis, Roberto Perdisci, Manos Antonakakis. 488-505 [doi]
- The Persistent Threat of DGA-Domains Used by BotnetsArthur Drichel, Ulrike Meyer. 506-522 [doi]
- CasinoLimit: An Offensive Dataset Labeled with MITRE ATT&CK TechniquesSébastien Kilian, Valérie Viet Triem Tong, Jean-François Lalande, Frédéric Majorczyk, Alexandre Sanchez, Natan Talon, Pierre-Victor Besson, Helene Orsini, Pierre Lledo, Pierre-François Gimenez. 523-537 [doi]
- A Longitudinal Analysis of LockBit 3.0's Extortion Lifecycle and Response to Law EnforcementYin Minn Pa Pa, Yuji Sekine, Yamato Kawaguchi, Tatsuki Yogo, Kelvin Lubbertsen, Rolf van Wegberg, Michel van Eeten, Katsunari Yoshioka. 538-551 [doi]
- EventHunter: Dynamic Clustering and Ranking of Security Events from Hacker Forum DiscussionsYasir Ech-Chammakhy, Anas Motii, Anass Rabii, Jaafar Chbili. 552-565 [doi]
- ViDToken: A Video-Transformer-Based Latent Token Defense for Adversarial Video DetectionWei Song, Yulei Sui, Zhenchang Xing, Liming Zhu 0001, Jingling Xue. 566-582 [doi]
- Robust Cross-Modal Deepfake Detection via Facial UV Maps and Momentum Contrastive LearningYuesen Tang, Yuanyang Zhang, Wangxiao Mao, Li Yao. 583-596 [doi]
- BadLogo: A Physically Realizable Adversarial Sticker for Evaluating the Robustness of Face Recognition ModelsFuqi Qi, Haichang Gao, Boling Li, Shiping Guo, Yuming Zheng, Bingqian Zhou. 597-610 [doi]
- The Adaptive Arms Race: Redefining Robustness in AI SecurityIlias Tsingenopoulos, Vera Rimmer, Davy Preuveneers, Fabio Pierazzi, Lorenzo Cavallaro, Wouter Joosen. 611-628 [doi]
- Red-Teaming LLMs with Token Control Score: Efficient, Universal, and Transferable JailbreaksLeo Hyun Park, Taekyoung Kwon 0002. 629-647 [doi]
- Malware and Vulnerability Analysis using Graph-synchronized Language ModelPaventhan Vivekanandan, Alexander Shroyer, Martin Swany. 648-663 [doi]
- Demystifying Feature Engineering in Malware Analysis of API Call SequencesTianheng Qu, Hongsong Zhu, Limin Sun 0001, Haining Wang 0001, Haiqiang Fei, Zheng He, Zhi Li 0018. 664-677 [doi]
- Evaluating LLM-Based Detection of Malicious Package Updates in npmElizabeth Wyss, Dominic Tassio, Lorenzo De Carli, Drew Davidson. 678-692 [doi]
- ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware DetectionMd Tanvirul Alam, Aritran Piplai, Nidhi Rastogi. 693-712 [doi]
- Revealing Informed Scanners by Colocating Reactive and Passive TelescopesDario Ferrero, Georgios Smaragdakis, Harm Griffioen. 713-727 [doi]
- PRIV-HFL: Privacy-Preserving and Robust Federated Learning for Heterogeneous Clients Against Data Reconstruction AttacksMohammadreza Najafi, Hooman Alavizadeh, Ahmad Salehi Shahraki, A. S. M. Kayes, Wenny Rahayu. 728-740 [doi]
- Guard-GBDT: Efficient Privacy-Preserving Approximated GBDT Training on Vertical DatasetAnxiao Song, Shujie Cui, Jianli Bai, Ke Cheng 0001, Yulong Shen 0001, Giovanni Russello. 741-756 [doi]
- Re-examine Federated Rank Learning: Analyzing Its Robustness Against Poisoning AttacksXiaofei Huang, Xiaojie Zhu, Chi Chen, Paulo Esteves Veríssimo. 757-772 [doi]
- BadFU: Backdoor Federated Learning through Adversarial Machine UnlearningBingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang 0012, Xiao Chen. 773-788 [doi]
- FedSIG: Privacy-Preserving Federated Recommendation via Synthetic Interaction GenerationThirasara Ariyarathna, Salil S. Kanhere, Meisam Mohammady, Hye-Young Paik. 789-800 [doi]
- Portal: Enabling Accurate Siemens PLC Rehosting via Peripheral Proxying and Proactive Interrupt SynchronizationHaoran Li, Dakun Shen, Wenbo Shen, Zhen Zhu. 801-814 [doi]
- Activation Functions Considered Harmful: Recovering Neural Network Weights through Controlled ChannelsJesse Spielman, David F. Oswald, Mark Dermot Ryan, Jo Van Bulck. 815-834 [doi]
- Zebrafix: Mitigating Memory-Centric Side-Channel Leakage via InterleavingAnna Pätschke, Jan Wichelmann, Thomas Eisenbarth 0001. 835-849 [doi]
- RF-Eye-D: Probing Feasibility of CMOS Camera Watermarking with Radio-Frequency InjectionHui Zhuang, Yan Long 0002, Kevin Fu. 850-865 [doi]
- ShuffleV: A Microarchitectural Defense Strategy against Electromagnetic Side-Channel Attacks in MicroprocessorsNuntipat Narkthong, Yukui Luo, Xiaolin Xu 0001. 866-885 [doi]
- Overlapping IPv4, IPv6, and TCP data: exploring errors, test case context, and multiple overlaps inside network stacks and NIDSes with PyrolyseLucas Aubard, Johan Mazel, Gilles Guette, Pierre Chifflier. 886-904 [doi]
- Active Attack Resilience in 5G: A New Take on Authentication and Key AgreementNazatul H. Sultan, Xinlong Guan, Josef Pieprzyk, Wei Ni 0001, Sharif Abuadbba, Hajime Suzuki. 905-919 [doi]
- H2Fuzz: Guided, Black-box, Differential Fuzzing for HTTP/2-to-HTTP/1 Conversion AnomaliesAnthony Gavazzi, Weixin Kong, Engin Kirda. 920-934 [doi]
- Uncontained Danger: Quantifying Remote Dependencies in Containerized ApplicationsChris Tsoukaladelis, Roberto Perdisci, Nick Nikiforakis. 935-949 [doi]
- RBAClock: Contain RBAC Permissions through Secure SchedulingQingwang Chen, Ru Tan, Xinyu Liu, Yuqi Shu, Zhou Tong, Haoqiang Wang, Ze Jin, Qixu Liu. 950-965 [doi]
- Scalable Active Directory Defense with α-MetagraphNhu Long Nguyen, Nickolas J. G. Falkner, Hung Nguyen 0004. 966-985 [doi]