Abstract is missing.
- Attacks and Countermeasures for Digital Microfluidic Biochips - Extended AbstractNavajit Singh Baban, Prithwish Basu Roy, Pauline John, Azhar Zam, Sukanta Bhattacharjee, Yong-Ak Song, Ramesh Karri, Krishnendu Chakrabarty. 1-5 [doi]
- SideLink: Exposing NVLink to Covert and Side-Channel Attacks Official Work-in-Progress PaperIssa Baddour, Dip Sankar Banerjee, Somitra Kumar Sanadhya. 6-15 [doi]
- Faster and More Energy-Efficient Equation Solvers over GF(2)Subhadeep Banik, Francesco Regazzoni 0001. 16-39 [doi]
- Transferability of Evasion Attacks Against FHE Encrypted Inference - Official Work-in-Progress PaperReeshav Chowdhury, Aman Kumar, Vaibhav Dashrath Mohite, Ayantika Chatterjee. 40-68 [doi]
- Security Analysis of ASCON Cipher Under Persistent Faults - Official Work-in-Progress PaperMadhurima Das, Bodhisatwa Mazumdar. 69-79 [doi]
- Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-money LaunderingFabrianne Effendi, Anupam Chattopadhyay. 80-105 [doi]
- CoPrIME: Complete Process Isolation Using Memory Encryption - Extended AbstractSaltanat Firdous, Asutosh Brahma, Arjun Menon, Chester Rebeiro. 106-109 [doi]
- Online Testing Entropy and Entropy Tests with a Two State Markov Model - Invited PaperDavid Johnston. 110-128 [doi]
- DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated LearningK. M. Sameera, M. Abhinav, P. P. Amal, T. Babu Abhiram, Raj K. Abishek, Tomichen Amal, P. Anaina, P. Vinod 0001, Rafidha Rehiman K. A., Mauro Conti. 129-148 [doi]
- Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning TechniquesRupesh Raj Karn, Ozgur Sinanoglu. 149-174 [doi]
- NID-TGN: Spatiotemporal Intrusion Detection System for IoT NetworksJonna Likith Sai, Souptik Majumder, Rohit Verma, Priyanka Bagade. 175-195 [doi]
- High Speed High Assurance Implementations of Multivariate Quadratic Based Signatures - Extended AbstractSamyuktha M, Pallavi Borkar, Chester Rebeiro. 196-200 [doi]
- "There's Always Another Counter": Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign SettingUpasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya, Debdeep Mukhopadhyay. 201-220 [doi]
- FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels - Extended AbstractRohith George Ninan, S. Kala. 221-224 [doi]
- Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from IsogeniesSikhar Patranabis. 225-257 [doi]
- BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks - Official Work-in-Progress PaperYi Hao Puah, Tu Anh Ngo, Nandish Chattopadhyay, Anupam Chattopadhyay. 258-276 [doi]
- Adversarial Malware Detection - Official Work-in-Progress PaperAshish Vishwakarma, Umesh Kashyap, Sk Subidh Ali. 277-286 [doi]
- ML Based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCONTarun Yadav, Manoj Kumar. 287-316 [doi]