beandeau>

Program > Accepted papers

 Accepted Papers :

 

Authors Title
Sarat Chandra Prasad Gingupalli Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation
Jianqiao Cui, Fei Meng and Shun Qin WhiADD: Semantic-Acoustic Fusion for Robust Audio Deepfake Detection
Ankit Gangwal, Mauro Conti and Tommaso Pauselli KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks
Lin Ma, Xingwei Lin, Ziming Zhang and Yajin Zhou NLSaber : Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation
Palak Palak and Thomas Haines Formalisation of KZG commitment schemes in EasyCrypt
Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei and Liuyu Yang Extending Groth16 for Disjunctive Statements
Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig and Mehdi Tibouchi A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts
Hyunsik Na, Hajun Kim, Dooshik Yoon and Daeseon Choi Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers
Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, Platon Kotzias, Juan Caballero and Davide Balzarotti The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families
Novak Kaluderovic, Nan Cheng and Katerina Mitrokotsa A post-quantum Distributed OPRF from the Legendre PRF
Luis Ibanez-Lissen, Lorena González-Manzano, Jose Maria de Fuentes, Nicolas Anciaux and Joaquin Garcia-Alfaro LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states
Preston Robinette, Thuy Dung Nguyen, Samuel Sasaki and Taylor T Johnson Trigger-Based Fragile Model Watermarking for Image Transformation Networks
Taehun Kim, Hyerean Jang and Youngjoo Shin Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage
Martin Unterguggenberger, Lukas Lamster, Mathias Oberhuber, Simon Scherer and Stefan Mangard Code Encryption with Intel TME-MK for Control-Flow Enforcement
Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher and Daniel Gruss Verifying DRAM Addressing in Software
Matthew Reaney, Kieran Mclaughlin and Sandra Scott-Hayward Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios
Théophile Brézot, Chloé Hébant, Paola de Perthuis and David Pointcheval Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies
Emiliia Geloczi, Stefan Katzenbeisser and Nico Mexis PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking
Lukas Lamster, Fabian Rauscher, Martin Unterguggenberger and Stefan Mangard WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups
Gorka Abad, Stjepan Picek and Aitor Urbieta Time-Distributed Backdoor Attacks on Federated Spiking Learning
Changhong Xu and Honggang Hu Efficient Homomorphic Evaluation for Non-Polynomial Functions
Remma Kumazaki and Yuichi Kaji Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme
Ali Sadeghi Jahromi, Abdelrahman Abdou and Paul van Oorschot Formal Security Analysis of DNSSEC+
Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Chuan Chen and Qing Li High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis
Berkay Kemal Balioglu, Alireza Khodaie and M. Emre Gursoy Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy
Martin Heckel, Hannes Weissteiner, Florian Adamsky and Daniel Gruss Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Cédrick Austa, Jan Tobias Mühlberg and Jean-Michel Dricot Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors
Benoit Nougnanke, Gregory Blanc and Thomas Robert How Dataset Diversity Affects Generalization in ML-based NIDS
Ala Eddine Laouir and Abdessamad Imine RIPOST: Two-Phase Private Decomposition for Multidimensional Data
Terumi Yaguchi and Hiroaki Kikuchi Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data
Hugo Breniaux and Djedjiga Mouheb Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models
Utku Tefek, Ertem Esiner, Felix Kottmann and Deming Chen VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing
Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano De Cristofaro and Christophe Kiennert PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing.
Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur and Youngjoo Shin T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX
Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu and Cheng Hong Efficient End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces
Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo and Doowon Kim UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption
Qijia Fan, Chenhao Bao, Xuanyu Shi, Shuai Han and Shengli Liu Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions
Javier Parada, Cristina Alcaraz, Javier Lopez, Juan Caubet and Rodrigo Roman Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks
Giovanni Bartolomeo Functional Credentials: a Practical Construction for the European Digital Identity
Xin Zhang and Yifan Zhang SafePath: Encryption-less On-demand Input Path Protection For Mobile Devices
Pengkun Ren, Hai Dong, Zahir Tari and Pengcheng Zhang Efficient and Secure Sleepy Model for BFT Consensus
Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang Polylogarithmic Polynomial Commitment Scheme over Galois Rings
Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti and Roberto Di Pietro The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment
Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, Zhechen Li, Min Zhang and Dengguo Feng Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure
Bingxue Bian, Jianfeng Wang and Qiaoer Xu Efficient Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries
Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob Schuldt and Satoshi Yasuda Towards Preventing Free-riders in AI as a Service
Yansen Xin, Rui Zhang, Zhenglin Fan and Ze Jia Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies
Weihua Jiao, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang and Fei Cao Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces
Yifan Yang, Kexin Zhang, Peng Xu, Zhaojun Lu, Wei Wang, Weiqi Wang and Kaitai Liang Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU
Sara Zain, Jannik Mähn, Stefan Köpsell and Sebastian Ertel Formally-verified Security against Forgery of Remote Attestation using SSProve
Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss and Johanna Ullrich Zero-Click SnailLoad: From Minimal to No User Interaction
Eddie Billoir, Romain Laborde, Daniele Canavese, Yves Rutschle, Ahmad Samer Wazan and Abdelmalek Benzekri No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments
Omar Anser, Jérôme François, Isabelle Chrisment and Daishi Kondo TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation
Gennaro Avitabile, Vincenzo Botta and Dario Fiore Tetris! Traceable Extendable Threshold Ring Signatures and More
Sajal Halder, Muhammad Ejaz Ahmed and Seyit Camtepe FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk
Silei Ren, Coşku Acay and Andrew C. Myers An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference
Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang and Nenghai Yu WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection
Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr and Rainer Malaka Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns
Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon and Mališa Vučinić Fine-grained, privacy-augmenting LI-compliance in the LAKE standard
Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo and Jiadi Yu AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR
Jiali Xu, Shuo Wang, Valéria Loscrì, Alessandro Brighente, Mauro Conti and Romain Rouvoy GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation
Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni and Rongxing Lu SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts
Mahmoud Ghorbel, Selina Cheggour, Valeria Loscri, Youcef Imine, Hamza Ouarnoughi and Smail Niar Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO
Francesco Marchiori, Marco Alecci, Luca Pajola and Mauro Conti DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?
Yan Shao, Yuejun Liu, Yongbin Zhou and Mingyao Shao Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization
Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo and Erman Ayday A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization
Youcef Korichi, Nadia Tawbi, Josee Desharnais and Sebastien Gambs Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning
Kerui Wu, Ka-Ho Chow, Wenqi Wei and Lei Yu On the Adversarial Robustness of Graph Neural Networks with Graph Reduction
Wanying Zeng, Lijia Xie and Xiao Zhang Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains
Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy and Shamik Sural The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains
Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Zonghu Zhang, Wenting Li, Chenbin Zhang, Meng Ma and Ping Wang GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection
Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya and Suryadipta Majumdar CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers
Qinyi Li and Xavier Boyen Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices
Jiri Gavenda, Petr Svenda, Stanislav Bobon and Vladimir Sedlacek Analysis of input-output mappings in coinjoin transactions with arbitrary values
Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang and Robert Deng An Efficient Security-enhanced Accountable Access Control for Named Data Networking
Fuqi Qi, Haichang Gao, Boling Li, Guangyu He, Jiacheng Luo and Yuhong Zhang DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models
Dyna Soumhane Ouchebara and Stéphane Dupont Llama-based source code vulnerability detection: Prompt engineering vs Finetuning
Xiaoyang Wei, Shuai Han and Shengli Liu Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption
Fugeng Huang, Jiahong Yang, Haibo Cheng, Wenting Li and Ping Wang Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User
Baiyang Li, Zhu Yujia, Yuedong Zhang, Qingyun Liu and Li Guo Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences
Arturo Hernández Sánchez and Santiago Escobar A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA
Zexi Yao, Natasa Krco, Georgi Ganev and Yves-Alexandre de Montjoye The DCR Delusion: Measuring the Privacy Risk of Synthetic Data
Takumi Namiki, Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation
Michele Barbato, Alberto Ceselli, Sabrina De Capitani di Vimercati, Sara Foresti and Pierangela Samarati PriSM: A Privacy-friendly Support vector Machine
Aditya Damodaran, Simon Rastikian, Peter Roenne and P. Y. A. Ryan Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation
Howard Halim, Eyasu Getahun Chekole, Daniel Reijsbergen and Jianying Zhou BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication
Koki Hamada Concretely Efficient Parallel-accessible DORAM for 100K-sized Array
Cristian Daniele, Timme Bethe, Marcello Maugeri, Andrea Continella and Erik Poll LibAFL*: Fast and State-aware Protocol Fuzzing
Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh and Debdeep Mukhopadhyay TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications
Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixun Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang and Qingfeng Pan Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings
Shehel Yoosuf, Temoor Ali, Ahmed Lekssays, Mashael Al-Sabah and Issa Khalil StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models
Minu Chung and Hyungon Moon Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis
Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou and Wenjing Lou Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks
Amit Pravin Choudhari, Shorya Kumar and Christian Rossow NICraft: Malicious NIC Firmware-based Cache Side-channel Attack
Veronique Cortier, Alexandre Debant and Pierrick Gaudry Breaking verifiability and vote privacy in CHVote
Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing
Kian Kai Ang and Damith C. Ranasinghe QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol
Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang and Chuanyi Liu Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance
Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski and Gabriel Wechta Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws
Chongyu Long, Yuewu Wang, Lingguang Lei, Haoyang Xing and Jiwu Jing DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller
Jiaxin Li, Gorka Abad, Stjepan Picek and Mauro Conti Membership Privacy Evaluation in Deep Spiking Neural Networks

 

Loading... Loading...