Abstract is missing.
- Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' BehaviorsNaoki Fukushi, Takashi Koide, Daiki Chiba 0001, Hiroki Nakano, Mitsuaki Akiyama. 3-22 [doi]
- XHunter: Understanding XXE Vulnerability via Automatic AnalysisZhenhua Wang, Wei Xie, Jing Tao, Yong Tang, Enze Wang. 23-42 [doi]
- Anonymous Short Communications over Social NetworksFrancesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini. 43-63 [doi]
- A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text AnalysisXiaojie Xu, Jian Dong, Zhengyu Liu, Jin Yang, Bin Wang, Zhaoyuan Wang. 64-76 [doi]
- An Empirical Study on Mobile Payment Credential Leaks and Their ExploitsShangcheng Shi, Xianbo Wang, Kyle Zeng, Ronghai Yang, Wing Cheong Lau. 79-98 [doi]
- System-Wide Security for Offline Payment TerminalsNikolay Ivanov, Qiben Yan. 99-119 [doi]
- Horus: A Security Assessment Framework for Android Crypto WalletsMd Shahab Uddin, Mohammad Mannan, Amr M. Youssef. 120-139 [doi]
- Leakuidator: Leaky Resource Attacks and CountermeasuresMojtaba Zaheri, Reza Curtmola. 143-163 [doi]
- JABBIC Lookups: A Backend Telemetry-Based System for Malware TriageOctavian Ciprian Bordeanu, Gianluca Stringhini, Yun Shen, Toby Davies. 164-184 [doi]
- Facilitating Parallel Fuzzing with Mutually-Exclusive Task DistributionYifan Wang, Yuchen Zhang, Chengbin Pang, Peng Li, Nikolaos Triandopoulos, Jun Xu. 185-206 [doi]
- Flowrider: Fast On-Demand Key Provisioning for Cloud NetworksNicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell. 207-228 [doi]
- Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and GoogleDouglas J. Leith. 231-251 [doi]
- Who's Accessing My Data? Application-Level Access Control for Bluetooth Low EnergyPallavi Sivakumaran, Jorge Blasco. 252-272 [doi]
- HTPD: Secure and Flexible Message-Based Communication for Mobile AppsYin Liu, Breno Dantas Cruz, Eli Tilevich. 273-294 [doi]
- Smartphone Location Spoofing Attack in Wireless NetworksChengbin Hu, Yao Liu, Zhuo Lu, Shangqing Zhao, Xiao Han, Junjie Xiong. 295-313 [doi]
- Compromised Through Compression - Privacy Implications of Smart Meter Traffic AnalysisPol Van Aubel, Erik Poll. 317-337 [doi]
- iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical SystemsMd Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, Badrul Chowdhury, Steven G. Whisenant. 338-359 [doi]
- Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network SecurityAlexandre Augusto Giron. 363-371 [doi]
- Quantitative and Qualitative Investigations into Trusted Execution EnvironmentsRyan Karl. 372-383 [doi]
- Phishing Web Page Detection with Semi-Supervised Deep Anomaly DetectionLinshu Ouyang, Yongzheng Zhang 0002. 384-393 [doi]
- Poisoning Attack for Inter-agent Transfer LearningZelei Cheng, Zuotian Li. 394-404 [doi]
- An Efficient Post-Quantum PKE from RLWR with Simple Security ProofParhat Abla, Mingsheng Wang. 407-423 [doi]
- Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A ProcessorsPakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, Mehran Mozaffari Kermani. 424-440 [doi]
- Compressed SIKE Round 3 on ARM Cortex-M4Mila Anastasova, Mojtaba Bisheh Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani. 441-457 [doi]
- A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based CryptosystemsSimone Perriello, Alessandro Barenghi, Gerardo Pelosi. 458-474 [doi]
- Hardware Deployment of Hybrid PQC: SIKE+ECDHReza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg. 475-491 [doi]
- Towards Stealing Deep Neural Networks on Mobile DevicesShashank Reddy Danda, Xiaoyong Yuan, Bo Chen. 495-508 [doi]
- Phishing Website Detection from URLs Using Classical Machine Learning ANN ModelSaid A. Salloum, Tarek Gaber, Sunil Vadera, Khaled Shaalan. 509-523 [doi]