Abstract is missing.
- Classification-Based Anomaly Prediction in XACML PoliciesMaryam Davari, Mohammad Zulkernine. 3-19 [doi]
- An Evolutionary Learning Approach Towards the Open Challenge of IoT Device IdentificationJingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun. 20-38 [doi]
- SecureBERT: A Domain-Specific Language Model for CybersecurityEhsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer. 39-56 [doi]
- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural NetworkHaitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu. 57-71 [doi]
- Towards High Transferability on Neural Network for Black-Box Adversarial AttacksHaochen Zhai, Futai Zou, Junhua Tang, Yue Wu 0010. 72-88 [doi]
- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low RedundancyZhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang 0003. 89-108 [doi]
- Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per SignatureZiQiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai 0001, Shuqin Fan, Fan Zhang, Bo Luo. 111-129 [doi]
- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoTOmar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro. 130-149 [doi]
- A Cross-layer Plausibly Deniable Encryption System for Mobile DevicesNiusen Chen, Bo Chen, Weisong Shi. 150-169 [doi]
- Language and Platform Independent Attribution of Heterogeneous CodeFarzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova. 173-191 [doi]
- Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity ComparisonQige Song, Yongzheng Zhang, Shuhao Li. 192-211 [doi]
- Cost-Effective Malware Classification Based on Deep Active LearningQian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi. 212-227 [doi]
- CTDRB: Controllable Timed Data Release Using BlockchainsJingzhe Wang, Balaji Palanisamy. 231-249 [doi]
- FairBlock: Preventing Blockchain Front-Running with Minimal OverheadsPeyman Momeni, Sergey Gorbunov 0001, Bohan Zhang. 250-271 [doi]
- Blockchain-Based Ciphertext Policy-Hiding Access Control SchemeRuizhong Du, Tianhe Zhang. 272-289 [doi]
- Granting Access Privileges Using OpenID Connect in Permissioned Distributed LedgersShohei Kakei, Yoshiaki Shiraishi, Shoichi Saito. 290-308 [doi]
- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity VerificationKemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma. 309-328 [doi]
- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream AggregationJonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung. 331-352 [doi]
- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric PrimitivesAlexandros Bakas, Eugene Frimpong, Antonis Michalas. 353-370 [doi]
- Replicated Additive Secret Sharing with the Optimized Number of SharesJuanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin. 371-389 [doi]
- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient InstantiationHanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou. 390-410 [doi]
- A Random Reversible Watermarking Scheme for Relational DataQiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu. 413-430 [doi]
- Enabling Accurate Data Recovery for Mobile Devices Against Malware AttacksWen Xie, Niusen Chen, Bo Chen. 431-449 [doi]
- Bootstrapping Trust in Community Repository ProjectsSangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola. 450-469 [doi]
- Assessing the Quality of Differentially Private Synthetic Data for Intrusion DetectionMd Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto. 473-490 [doi]
- Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine LearningSanjeev Shukla, Manoj Misra, Gaurav Varshney. 491-509 [doi]
- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit LogsYuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng. 510-528 [doi]
- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS AttacksSivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy. 529-546 [doi]
- What Data Do the Google Dialer and Messages Apps on Android Send to Google?Douglas J. Leith. 549-568 [doi]
- Detection and Privacy Leakage Analysis of Third-Party Libraries in Android AppsXiantong Hao, Dandan Ma, Hongliang Liang. 569-587 [doi]
- Secure CV2X Using COTS Smartphones over LTE InfrastructureSpandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu. 588-607 [doi]
- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor NetworkMuhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri. 611-629 [doi]
- Message Recovery Attack of Kyber Based on Information Leakage in Decoding OperationMengyao Shi, Zhu Wang, Tingting Peng, FengHua Li. 630-647 [doi]
- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable InformationQiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia. 648-669 [doi]
- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the ElderlyPranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef. 673-691 [doi]
- MetaPriv: Acting in Favor of Privacy on Social Media PlatformsRobert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas. 692-709 [doi]
- Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social NetworksXiaoting Li, Lingwei Chen, Dinghao Wu. 710-728 [doi]
- No-Fuzz: Efficient Anti-fuzzing TechniquesZhengxiang Zhou, Cong Wang 0001, Qingchuan Zhao. 731-751 [doi]
- eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI DefenseTianning Zhang, Miao Cai, Diming Zhang, Hao Huang. 752-769 [doi]
- Breaking Embedded Software Homogeneity with Protocol MutationsTongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu. 770-790 [doi]
- A Generalized Unknown Malware ClassificationNanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade. 793-806 [doi]
- Research on the Grouping Method of Side-Channel Leakage DetectionXiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan. 807-818 [doi]
- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGXCavidan Yakupoglu, Kurt Rohloff. 819-837 [doi]