beandeau>

Program > Schedule

The program at a glance :

 

       
September 22      
From 08:00 Registration    
8:45 - 9:00 Welcome statement    
9:00 - 10:00 Keynote : Joao Moita (Airbus)    
10:00 - 10:20 Coffee Break    
10:20 - 12:00 Track 1 (Privacy 1)

The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. Zexi Yao, Natasa Krco, Georgi Ganev and Yves-Alexandre de Montjoye.
RIPOST: Two-Phase Private Decomposition for Multidimensional Data. Ala Eddine Laouir and Abdessamad Imine.
PriSM: A Privacy-friendly Support vector Machine. Michele Barbato, Alberto Ceselli, Sabrina De Capitani di Vimercati, Sara Foresti and Pierangela Samarati.
Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr and Rainer Malaka
Track 2 (Attack Analysis 1)

Zero-Click SnailLoad: From Minimal to No User Interaction. Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss and Johanna Ullrich.
AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR. Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo and Jiadi Yu.
DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. Fuqi Qi, Haichang Gao, Boling Li, Guangyu He, Jiacheng Luo and Yuhong Zhang.
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. Fugeng Huang, Jiahong Yang, Haibo Cheng, Wenting Li and Ping Wang.
Track 3 (Crypto 1)

Extending Groth16 for Disjunctive Statements. Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei and Liuyu Yang
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig and Mehdi Tibouchi.
Code Encryption with Intel TME-MK for Control-Flow Enforcement. Martin Unterguggenberger, Lukas Lamster, Mathias Oberhuber, Simon Scherer and Stefan Mangard.
Efficient Homomorphic Evaluation for Non-Polynomial Functions. Changhong Xu and Honggang Hu.
       
12:00 - 13:30 Lunch    
13:30 - 15:10 Track 4 (Privacy 2 )

Membership Privacy Evaluation in Deep Spiking Neural Networks. Jiaxin Li, Gorka Abad, Stjepan Picek and Mauro Conti.
Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. Xiaoyang Wei, Shuai Han and Shengli Liu.
Functional Credentials: a Practical Construction for the European Digital Identity. Giovanni Bartolomeo.
Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. Yansen Xin, Rui Zhang, Zhenglin Fan and Ze Jia
Track 5 (Detection 1)

Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. Hyunsik Na, Hajun Kim, Dooshik Yoon and Daeseon Choi.
WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. Lukas Lamster, Fabian Rauscher, Martin Unterguggenberger and Stefan Mangard.
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano De Cristofaro and Christophe Kiennert.
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. Mahmoud Ghorbel, Selina Cheggour, Valeria Loscri, Youcef Imine, Hamza Ouarnoughi and Smail Niar.
Track 6 (Crypto 2)

Formalisation of KZG commitment schemes in EasyCrypt. Palak Palak and Thomas Haines.
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. Remma Kumazaki and Yuichi Kaji.
SafePath: Encryption-less On-demand Input Path Protection For Mobile Devices. Xin Zhang and Yifan Zhang.
Polylogarithmic Polynomial Commitment Scheme over Galois Rings. Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang.

       
15:10 - 15:40 Coffee Break    
15:40 - 17:20 Track 7 (Attack Analysis 2)

LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. Luis Ibanez-Lissen, Lorena González-Manzano, Jose Maria de Fuentes, Nicolas Anciaux and Joaquin Garcia-Alfaro.
Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. Taehun Kim, Hyerean Jang and Youngjoo Shin.
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. Martin Heckel, Hannes Weissteiner, Florian Adamsky and Daniel Gruss.
T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur and Youngjoo Shin

Track 8 (Privacy 3)

Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. Terumi Yaguchi and Hiroaki Kikuchi.
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo and Erman Ayday.
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. Berkay Kemal Balioglu, Alireza Khodaie and M. Emre Gursoy.
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. Youcef Korichi, Nadia Tawbi, Josee Desharnais and Sebastien Gambs.
Track 9 (Crypto 3)

UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo and Doowon Kim.
Efficient Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. Bingxue Bian, Jianfeng Wang and Qiaoer Xu.
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. Yifan Yang, Kexin Zhang, Peng Xu, Zhaojun Lu, Wei Wang, Weiqi Wang and Kaitai Liang.
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. Qinyi Li and Xavier Boyen.
 
17:20 - 17:30 Conference Information    
18:30 Welcome Reception at the City-Hall of Toulouse  
September 23      
8:30 - 9:00 Registration    
9:00 - 10:00 Keynote : V.S. Subrahmanian (Northwestern University)  
10:00 - 10:30 Coffee Break    
10:30 - 12:10 Track 10 (Blockchain Secured Systems)

Efficient and Secure Sleepy Model for BFT Consensus. Pengkun Ren, Hai Dong, Zahir Tari and Pengcheng Zhang.
Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. Wanying Zeng, Lijia Xie and Xiao Zhang.
The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy and Shamik Sural.
Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski and Gabriel Wechta.
Track 11 (Vulnerability Assessment)

Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. Cédrick Austa, Jan Tobias Mühlberg and Jean-Michel Dricot.
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. Arturo Hernández Sánchez and Santiago Escobar.
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. Sajal Halder, Muhammad Ejaz Ahmed and Seyit Camtepe.
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang and Nenghai Yu.
Track 12 (Crypto 4)

Tetris! Traceable Extendable Threshold Ring Signatures and More. Gennaro Avitabile, Vincenzo Botta and Dario Fiore.
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh and Debdeep Mukhopadhyay.
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. Chongyu Long, Yuewu Wang, Lingguang Lei, Haoyang Xing and Jiwu Jing.
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. Yan Shao, Yuejun Liu, Yongbin Zhou and Mingyao Shao.
       
12:10 - 14:00 Lunch    
14:00 - 15:40 Track 13 (AI Security 1)

Towards Preventing Free-riders in AI as a Service. Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob Schuldt and Satoshi Yasuda.
Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. Matthew Reaney, Kieran Mclaughlin and Sandra Scott-Hayward
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou and Wenjing Lou.
StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models. Shehel Yoosuf, Temoor Ali, Ahmed Lekssays, Mashael Al-Sabah and Issa Khalil.
Track 14 (Detection 2)

Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. Hugo Breniaux and Djedjiga Mouheb.
TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. Omar Anser, Jérôme François, Isabelle Chrisment and Daishi Kondo.
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation.
Jiali Xu, Shuo Wang, Valéria Loscrì, Alessandro Brighente, Mauro Conti and Romain Rouvoy.
GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Zonghu Zhang, Wenting Li, Chenbin Zhang, Meng Ma and Ping Wang.
Track 15 (Mitigation)

CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya and Suryadipta Majumdar.
Verifying DRAM Addressing in Software. Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher and Daniel Gruss.
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. Emiliia Geloczi, Stefan Katzenbeisser and Nico Mexis.
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. Eddie Billoir, Romain Laborde, Daniele Canavese, Yves Rutschle, Ahmad Samer Wazan and Abdelmalek Benzekri.
       
15:40 - 16:10 Coffee Break    
16:10 - 17:50 Track 16 (AI security 2)

SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni and Rongxing Lu.
On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. Kerui Wu, Ka-Ho Chow, Wenqi Wei and Lei Yu.
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Francesco Marchiori, Marco Alecci, Luca Pajola and Mauro Conti.
Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. Dyna Soumhane Ouchebara and Stéphane Dupont.
Track 17 (Protection)

Formally-verified Security against Forgery of Remote Attestation using SSProve. Sara Zain, Jannik Mähn, Stefan Köpsell and Sebastian Ertel.
Trigger-Based Fragile Model Watermarking for Image Transformation Networks. Preston Robinette, Thuy Dung Nguyen, Samuel Sasaki and Taylor T Johnson.
Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. Sarat Chandra Prasad Gingupalli.
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. Ankit Gangwal, Mauro Conti and Tommaso Pauselli.
Track 18 (Attack Analysis 3)

Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixun Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang and Qingfeng Pan.
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. Takumi Namiki, Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe.
NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. Amit Pravin Choudhari, Shorya Kumar and Christian Rossow.
Analysis of input-output mappings in coinjoin transactions with arbitrary values. Jiri Gavenda, Petr Svenda, Stanislav Bobon and Vladimir Sedlacek.
 
17:50 - 18:00 Conference Information    
19:30 Gala Dinner at Hotel Dieu    
September 24      
08:30 - 9:00 Registration    
9:00 - 10:00 Keynote : Pierangela Samarati (Universita degli Studi di Milano)  
10:00 - 10:30 Coffee Break    
10:30 - 12:10 Track 19 (Security Protocols 1)

Formal Security Analysis of DNSSEC+. Ali Sadeghi Jahromi, Abdelrahman Abdou and Paul van Oorschot.
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. Aditya Damodaran, Simon Rastikian, Peter Roenne and P. Y. A. Ryan.
Breaking verifiability and vote privacy in CHVote. Veronique Cortier, Alexandre Debant and Pierrick Gaudry.
Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang and Chuanyi Liu.
Track 20 (Access and Information Flow Control)

BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. Howard Halim, Eyasu Getahun Chekole, Daniel Reijsbergen and Jianying Zhou.
An Efficient Security-enhanced Accountable Access Control for Named Data Networking. Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang and Robert Deng
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. Silei Ren, Coşku Acay and Andrew C. Myers.
Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. M.inu Chung and Hyungon Moon



Track 21 (Security Protocols 2)

Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. Baiyang Li, Zhu Yujia, Yuedong Zhang, Qingyun Liu and Li Guo.
Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. Kian Kai Ang and Damith C. Ranasinghe.
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee.
VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. Utku Tefek, Ertem Esiner, Felix Kottmann and Deming Chen.
       
12:10 - 14:00 Lunch    
14:00 - 15:15 Track 22 (Software Testing 2)

QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. Kian Kai Ang and Damith C. Ranasinghe.
LibAFL*: Fast and State-aware Protocol Fuzzing.
Cristian Daniele, Timme Bethe, Marcello Maugeri, Andrea Continella and Erik Poll.
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. Weihua Jiao, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang and Fei Cao.
Track 23 (Software Testing 1)

NLSaber : Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. Lin Ma, Xingwei Lin, Ziming Zhang and Yajin Zhou.
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, Platon Kotzias, Juan Caballero and Davide Balzarotti.
High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Chuan Chen and Qing Li.
Track 24 (Attack Analysis 4)

Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. Javier Parada, Cristina Alcaraz, Javier Lopez, Juan Caubet and Rodrigo Roman.
Efficient End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu and Cheng Hong.
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti and Roberto Di Pietro.
       
15:15 - 15:45 Coffee Break    
15:45 - 17:00 Track 25 (Post-Quantum)

A post-quantum Distributed OPRF from the Legendre PRF. Novak Kaluderovic, Nan Cheng and Katerina Mitrokotsa.
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. Théophile Brézot, Chloé Hébant, Paola de Perthuis and David Pointcheval.
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. Qijia Fan, Chenhao Bao, Xuanyu Shi, Shuai Han and Shengli Liu.
Track 26 (AI Security 3)

Time-Distributed Backdoor Attacks on Federated Spiking Learning. Gorka Abad, Stjepan Picek and Aitor Urbieta.
How Dataset Diversity Affects Generalization in ML-based NIDS.
Benoit Nougnanke, Gregory Blanc and Thomas Robert.
Track 27 (Privacy 4)

Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, Zhechen Li, Min Zhang and Dengguo Feng.
Fine-grained, privacy-augmenting LI-compliance in the LAKE standard. Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon and Mališa Vučinić.
 
17:00-17:20 Conference Closing Remarks (awards, annoucements and workshops information)

 

Loading... Loading...