| Authors |
Title |
| Sarat Chandra Prasad Gingupalli |
Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation |
| Ankit Gangwal, Mauro Conti and Tommaso Pauselli |
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks |
| Lin Ma, Xingwei Lin, Ziming Zhang and Yajin Zhou |
NLSaber : Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation |
| Palak Palak and Thomas Haines |
Formalisation of KZG commitment schemes in EasyCrypt |
| Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei and Liuyu Yang |
Extending Groth16 for Disjunctive Statements |
| Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig and Mehdi Tibouchi |
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts |
| Hyunsik Na, Hajun Kim, Dooshik Yoon and Daeseon Choi |
Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers |
| Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, Platon Kotzias, Juan Caballero and Davide Balzarotti |
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families |
| Novak Kaluderovic, Nan Cheng and Katerina Mitrokotsa |
A post-quantum Distributed OPRF from the Legendre PRF |
| Luis Ibanez-Lissen, Lorena González-Manzano, Jose Maria de Fuentes, Nicolas Anciaux and Joaquin Garcia-Alfaro |
LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states |
| Preston Robinette, Thuy Dung Nguyen, Samuel Sasaki and Taylor T Johnson |
Trigger-Based Fragile Model Watermarking for Image Transformation Networks |
| Taehun Kim, Hyerean Jang and Youngjoo Shin |
Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage |
| Martin Unterguggenberger, Lukas Lamster, Mathias Oberhuber, Simon Scherer and Stefan Mangard |
Code Encryption with Intel TME-MK for Control-Flow Enforcement |
| Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher and Daniel Gruss |
Verifying DRAM Addressing in Software |
| Matthew Reaney, Kieran Mclaughlin and Sandra Scott-Hayward |
Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios |
| Théophile Brézot, Chloé Hébant, Paola de Perthuis and David Pointcheval |
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies |
| Emiliia Geloczi, Stefan Katzenbeisser and Nico Mexis |
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking |
| Lukas Lamster, Fabian Rauscher, Martin Unterguggenberger and Stefan Mangard |
WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups |
| Gorka Abad, Stjepan Picek and Aitor Urbieta |
Time-Distributed Backdoor Attacks on Federated Spiking Learning |
| Changhong Xu and Honggang Hu |
Efficient Homomorphic Evaluation for Non-Polynomial Functions |
| Remma Kumazaki and Yuichi Kaji |
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme |
| Ali Sadeghi Jahromi, Abdelrahman Abdou and Paul van Oorschot |
Formal Security Analysis of DNSSEC+ |
| Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Chuan Chen and Qing Li |
High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis |
| Berkay Kemal Balioglu, Alireza Khodaie and M. Emre Gursoy |
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy |
| Martin Heckel, Hannes Weissteiner, Florian Adamsky and Daniel Gruss |
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity |
| Cédrick Austa, Jan Tobias Mühlberg and Jean-Michel Dricot |
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors |
| Benoit Nougnanke, Gregory Blanc and Thomas Robert |
How Dataset Diversity Affects Generalization in ML-based NIDS |
| Ala Eddine Laouir and Abdessamad Imine |
RIPOST: Two-Phase Private Decomposition for Multidimensional Data |
| Terumi Yaguchi and Hiroaki Kikuchi |
Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data |
| Hugo Breniaux and Djedjiga Mouheb |
Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models |
| Utku Tefek, Ertem Esiner, Felix Kottmann and Deming Chen |
VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing |
| Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano De Cristofaro and Christophe Kiennert |
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. |
| Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur and Youngjoo Shin |
T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX |
| Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu and Cheng Hong |
Efficient End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces |
| Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo and Doowon Kim |
UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption |
| Qijia Fan, Chenhao Bao, Xuanyu Shi, Shuai Han and Shengli Liu |
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions |
| Javier Parada, Cristina Alcaraz, Javier Lopez, Juan Caubet and Rodrigo Roman |
Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks |
| Giovanni Bartolomeo |
Functional Credentials: a Practical Construction for the European Digital Identity |
| Xin Zhang and Yifan Zhang |
SafePath: Encryption-less On-demand Input Path Protection For Mobile Devices |
| Pengkun Ren, Hai Dong, Zahir Tari and Pengcheng Zhang |
Efficient and Secure Sleepy Model for BFT Consensus |
| Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang |
Polylogarithmic Polynomial Commitment Scheme over Galois Rings |
| Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti and Roberto Di Pietro |
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment |
| Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, Zhechen Li, Min Zhang and Dengguo Feng |
Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure |
| Bingxue Bian, Jianfeng Wang and Qiaoer Xu |
Efficient Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries |
| Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob Schuldt and Satoshi Yasuda |
Towards Preventing Free-riders in AI as a Service |
| Yansen Xin, Rui Zhang, Zhenglin Fan and Ze Jia |
Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies |
| Weihua Jiao, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang and Fei Cao |
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces |
| Yifan Yang, Kexin Zhang, Peng Xu, Zhaojun Lu, Wei Wang, Weiqi Wang and Kaitai Liang |
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU |
| Sara Zain, Jannik Mähn, Stefan Köpsell and Sebastian Ertel |
Formally-verified Security against Forgery of Remote Attestation using SSProve |
| Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss and Johanna Ullrich |
Zero-Click SnailLoad: From Minimal to No User Interaction |
| Eddie Billoir, Romain Laborde, Daniele Canavese, Yves Rutschle, Ahmad Samer Wazan and Abdelmalek Benzekri |
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments |
| Omar Anser, Jérôme François, Isabelle Chrisment and Daishi Kondo |
TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation |
| Gennaro Avitabile, Vincenzo Botta and Dario Fiore |
Tetris! Traceable Extendable Threshold Ring Signatures and More |
| Sajal Halder, Muhammad Ejaz Ahmed and Seyit Camtepe |
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk |
| Silei Ren, Coşku Acay and Andrew C. Myers |
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference |
| Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang and Nenghai Yu |
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection |
| Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr and Rainer Malaka |
Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns |
| Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon and Mališa Vučinić |
Fine-grained, privacy-augmenting LI-compliance in the LAKE standard |
| Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo and Jiadi Yu |
AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR |
| Jiali Xu, Shuo Wang, Valéria Loscrì, Alessandro Brighente, Mauro Conti and Romain Rouvoy |
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation |
| Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni and Rongxing Lu |
SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts |
| Mahmoud Ghorbel, Selina Cheggour, Valeria Loscri, Youcef Imine, Hamza Ouarnoughi and Smail Niar |
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO |
| Francesco Marchiori, Marco Alecci, Luca Pajola and Mauro Conti |
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? |
| Yan Shao, Yuejun Liu, Yongbin Zhou and Mingyao Shao |
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization |
| Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo and Erman Ayday |
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization |
| Youcef Korichi, Nadia Tawbi, Josee Desharnais and Sebastien Gambs |
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning |
| Kerui Wu, Ka-Ho Chow, Wenqi Wei and Lei Yu |
On the Adversarial Robustness of Graph Neural Networks with Graph Reduction |
| Wanying Zeng, Lijia Xie and Xiao Zhang |
Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains |
| Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy and Shamik Sural |
The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains |
| Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Zonghu Zhang, Wenting Li, Chenbin Zhang, Meng Ma and Ping Wang |
GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection |
| Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya and Suryadipta Majumdar |
CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers |
| Qinyi Li and Xavier Boyen |
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices |
| Jiri Gavenda, Petr Svenda, Stanislav Bobon and Vladimir Sedlacek |
Analysis of input-output mappings in coinjoin transactions with arbitrary values |
| Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang and Robert Deng |
An Efficient Security-enhanced Accountable Access Control for Named Data Networking |
| Fuqi Qi, Haichang Gao, Boling Li, Guangyu He, Jiacheng Luo and Yuhong Zhang |
DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models |
| Dyna Soumhane Ouchebara and Stéphane Dupont |
Llama-based source code vulnerability detection: Prompt engineering vs Finetuning |
| Xiaoyang Wei, Shuai Han and Shengli Liu |
Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption |
| Fugeng Huang, Jiahong Yang, Haibo Cheng, Wenting Li and Ping Wang |
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User |
| Baiyang Li, Zhu Yujia, Yuedong Zhang, Qingyun Liu and Li Guo |
Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences |
| Arturo Hernández Sánchez and Santiago Escobar |
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA |
| Zexi Yao, Natasa Krco, Georgi Ganev and Yves-Alexandre de Montjoye |
The DCR Delusion: Measuring the Privacy Risk of Synthetic Data |
| Takumi Namiki, Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe |
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation |
| Michele Barbato, Alberto Ceselli, Sabrina De Capitani di Vimercati, Sara Foresti and Pierangela Samarati |
PriSM: A Privacy-friendly Support vector Machine |
| Aditya Damodaran, Simon Rastikian, Peter Roenne and P. Y. A. Ryan |
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation |
| Howard Halim, Eyasu Getahun Chekole, Daniel Reijsbergen and Jianying Zhou |
BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication |
| Koki Hamada |
Concretely Efficient Parallel-accessible DORAM for 100K-sized Array |
| Cristian Daniele, Timme Bethe, Marcello Maugeri, Andrea Continella and Erik Poll |
LibAFL*: Fast and State-aware Protocol Fuzzing |
| Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh and Debdeep Mukhopadhyay |
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications |
| Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixun Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang and Qingfeng Pan |
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings |
| Shehel Yoosuf, Temoor Ali, Ahmed Lekssays, Mashael Al-Sabah and Issa Khalil |
StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models |
| Minu Chung and Hyungon Moon |
Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis |
| Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou and Wenjing Lou |
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks |
| Amit Pravin Choudhari, Shorya Kumar and Christian Rossow |
NICraft: Malicious NIC Firmware-based Cache Side-channel Attack |
| Veronique Cortier, Alexandre Debant and Pierrick Gaudry |
Breaking verifiability and vote privacy in CHVote |
| Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee |
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing |
| Kian Kai Ang and Damith C. Ranasinghe |
QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol |
| Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang and Chuanyi Liu |
Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance |
| Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski and Gabriel Wechta |
Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws |
| Chongyu Long, Yuewu Wang, Lingguang Lei, Haoyang Xing and Jiwu Jing |
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller |
| Jiaxin Li, Gorka Abad, Stjepan Picek and Mauro Conti |
Membership Privacy Evaluation in Deep Spiking Neural Networks |