Authors |
Title |
Sarat Chandra Prasad Gingupalli |
Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation |
Jianqiao Cui, Fei Meng and Shun Qin |
WhiADD: Semantic-Acoustic Fusion for Robust Audio Deepfake Detection |
Ankit Gangwal, Mauro Conti and Tommaso Pauselli |
KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks |
Lin Ma, Xingwei Lin, Ziming Zhang and Yajin Zhou |
NLSaber : Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation |
Palak Palak and Thomas Haines |
Formalisation of KZG commitment schemes in EasyCrypt |
Xudong Zhu, Xinxuan Zhang, Xuyang Song, Yi Deng, Yuanju Wei and Liuyu Yang |
Extending Groth16 for Disjunctive Statements |
Masayuki Abe, Masaya Nanri, Miyako Ohkubo, Octavio Perez Kempner, Daniel Slamanig and Mehdi Tibouchi |
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts |
Hyunsik Na, Hajun Kim, Dooshik Yoon and Daeseon Choi |
Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers |
Antonino Vitale, Simone Aonzo, Savino Dambra, Nanda Rani, Lorenzo Ippolito, Platon Kotzias, Juan Caballero and Davide Balzarotti |
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families |
Novak Kaluderovic, Nan Cheng and Katerina Mitrokotsa |
A post-quantum Distributed OPRF from the Legendre PRF |
Luis Ibanez-Lissen, Lorena González-Manzano, Jose Maria de Fuentes, Nicolas Anciaux and Joaquin Garcia-Alfaro |
LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states |
Preston Robinette, Thuy Dung Nguyen, Samuel Sasaki and Taylor T Johnson |
Trigger-Based Fragile Model Watermarking for Image Transformation Networks |
Taehun Kim, Hyerean Jang and Youngjoo Shin |
Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage |
Martin Unterguggenberger, Lukas Lamster, Mathias Oberhuber, Simon Scherer and Stefan Mangard |
Code Encryption with Intel TME-MK for Control-Flow Enforcement |
Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher and Daniel Gruss |
Verifying DRAM Addressing in Software |
Matthew Reaney, Kieran Mclaughlin and Sandra Scott-Hayward |
Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios |
Théophile Brézot, Chloé Hébant, Paola de Perthuis and David Pointcheval |
Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies |
Emiliia Geloczi, Stefan Katzenbeisser and Nico Mexis |
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking |
Lukas Lamster, Fabian Rauscher, Martin Unterguggenberger and Stefan Mangard |
WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups |
Gorka Abad, Stjepan Picek and Aitor Urbieta |
Time-Distributed Backdoor Attacks on Federated Spiking Learning |
Changhong Xu and Honggang Hu |
Efficient Homomorphic Evaluation for Non-Polynomial Functions |
Remma Kumazaki and Yuichi Kaji |
Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme |
Ali Sadeghi Jahromi, Abdelrahman Abdou and Paul van Oorschot |
Formal Security Analysis of DNSSEC+ |
Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Chuan Chen and Qing Li |
High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis |
Berkay Kemal Balioglu, Alireza Khodaie and M. Emre Gursoy |
Don't Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy |
Martin Heckel, Hannes Weissteiner, Florian Adamsky and Daniel Gruss |
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity |
Cédrick Austa, Jan Tobias Mühlberg and Jean-Michel Dricot |
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors |
Benoit Nougnanke, Gregory Blanc and Thomas Robert |
How Dataset Diversity Affects Generalization in ML-based NIDS |
Ala Eddine Laouir and Abdessamad Imine |
RIPOST: Two-Phase Private Decomposition for Multidimensional Data |
Terumi Yaguchi and Hiroaki Kikuchi |
Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data |
Hugo Breniaux and Djedjiga Mouheb |
Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models |
Utku Tefek, Ertem Esiner, Felix Kottmann and Deming Chen |
VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing |
Sara Chennoufi, Yufei Han, Gregory Blanc, Emiliano De Cristofaro and Christophe Kiennert |
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. |
Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur and Youngjoo Shin |
T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX |
Jintong Yu, Yuxuan Wang, Shipei Qu, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu and Cheng Hong |
Efficient End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces |
Jaehwan Park, Hyeonbum Lee, Junbeom Hur, Jae Hong Seo and Doowon Kim |
UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption |
Qijia Fan, Chenhao Bao, Xuanyu Shi, Shuai Han and Shengli Liu |
Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions |
Javier Parada, Cristina Alcaraz, Javier Lopez, Juan Caubet and Rodrigo Roman |
Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks |
Giovanni Bartolomeo |
Functional Credentials: a Practical Construction for the European Digital Identity |
Xin Zhang and Yifan Zhang |
SafePath: Encryption-less On-demand Input Path Protection For Mobile Devices |
Pengkun Ren, Hai Dong, Zahir Tari and Pengcheng Zhang |
Efficient and Secure Sleepy Model for BFT Consensus |
Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang |
Polylogarithmic Polynomial Commitment Scheme over Galois Rings |
Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti and Roberto Di Pietro |
The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment |
Jialin Chi, Cheng Hong, Axin Wu, Tianqi Sun, Zhechen Li, Min Zhang and Dengguo Feng |
Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure |
Bingxue Bian, Jianfeng Wang and Qiaoer Xu |
Efficient Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries |
Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob Schuldt and Satoshi Yasuda |
Towards Preventing Free-riders in AI as a Service |
Yansen Xin, Rui Zhang, Zhenglin Fan and Ze Jia |
Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies |
Weihua Jiao, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang and Fei Cao |
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces |
Yifan Yang, Kexin Zhang, Peng Xu, Zhaojun Lu, Wei Wang, Weiqi Wang and Kaitai Liang |
Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU |
Sara Zain, Jannik Mähn, Stefan Köpsell and Sebastian Ertel |
Formally-verified Security against Forgery of Remote Attestation using SSProve |
Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss and Johanna Ullrich |
Zero-Click SnailLoad: From Minimal to No User Interaction |
Eddie Billoir, Romain Laborde, Daniele Canavese, Yves Rutschle, Ahmad Samer Wazan and Abdelmalek Benzekri |
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments |
Omar Anser, Jérôme François, Isabelle Chrisment and Daishi Kondo |
TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation |
Gennaro Avitabile, Vincenzo Botta and Dario Fiore |
Tetris! Traceable Extendable Threshold Ring Signatures and More |
Sajal Halder, Muhammad Ejaz Ahmed and Seyit Camtepe |
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk |
Silei Ren, Coşku Acay and Andrew C. Myers |
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference |
Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang and Nenghai Yu |
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection |
Mehrdad Bahrini, Alexander Herbst, Merle Freye, Matthias Kohn, Karsten Sohr and Rainer Malaka |
Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns |
Pascal Lafourcade, Elsa López Pérez, Charles Olivier-Anclin, Cristina Onete, Clément Papon and Mališa Vučinić |
Fine-grained, privacy-augmenting LI-compliance in the LAKE standard |
Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo and Jiadi Yu |
AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR |
Jiali Xu, Shuo Wang, Valéria Loscrì, Alessandro Brighente, Mauro Conti and Romain Rouvoy |
GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation |
Xiaodong Wu, Xiangman Li, Qi Li, Jianbing Ni and Rongxing Lu |
SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts |
Mahmoud Ghorbel, Selina Cheggour, Valeria Loscri, Youcef Imine, Hamza Ouarnoughi and Smail Niar |
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO |
Francesco Marchiori, Marco Alecci, Luca Pajola and Mauro Conti |
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? |
Yan Shao, Yuejun Liu, Yongbin Zhou and Mingyao Shao |
Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization |
Osama Zafar, Mina Namazi, Yuqiao Xu, Youngjin Yoo and Erman Ayday |
A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization |
Youcef Korichi, Nadia Tawbi, Josee Desharnais and Sebastien Gambs |
Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning |
Kerui Wu, Ka-Ho Chow, Wenqi Wei and Lei Yu |
On the Adversarial Robustness of Graph Neural Networks with Graph Reduction |
Wanying Zeng, Lijia Xie and Xiao Zhang |
Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains |
Bhavani Kalal, Abdulrahman Alhaidari, Balaji Palanisamy and Shamik Sural |
The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains |
Zhicheng Huang, Fengyuan Xu, Jiahong Yang, Zonghu Zhang, Wenting Li, Chenbin Zhang, Meng Ma and Ping Wang |
GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection |
Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya and Suryadipta Majumdar |
CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers |
Qinyi Li and Xavier Boyen |
Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices |
Jiri Gavenda, Petr Svenda, Stanislav Bobon and Vladimir Sedlacek |
Analysis of input-output mappings in coinjoin transactions with arbitrary values |
Jianfei Sun, Yuxian Li, Xuehuan Yang, Guomin Yang and Robert Deng |
An Efficient Security-enhanced Accountable Access Control for Named Data Networking |
Fuqi Qi, Haichang Gao, Boling Li, Guangyu He, Jiacheng Luo and Yuhong Zhang |
DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models |
Dyna Soumhane Ouchebara and Stéphane Dupont |
Llama-based source code vulnerability detection: Prompt engineering vs Finetuning |
Xiaoyang Wei, Shuai Han and Shengli Liu |
Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption |
Fugeng Huang, Jiahong Yang, Haibo Cheng, Wenting Li and Ping Wang |
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User |
Baiyang Li, Zhu Yujia, Yuedong Zhang, Qingyun Liu and Li Guo |
Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences |
Arturo Hernández Sánchez and Santiago Escobar |
A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA |
Zexi Yao, Natasa Krco, Georgi Ganev and Yves-Alexandre de Montjoye |
The DCR Delusion: Measuring the Privacy Risk of Synthetic Data |
Takumi Namiki, Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe |
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation |
Michele Barbato, Alberto Ceselli, Sabrina De Capitani di Vimercati, Sara Foresti and Pierangela Samarati |
PriSM: A Privacy-friendly Support vector Machine |
Aditya Damodaran, Simon Rastikian, Peter Roenne and P. Y. A. Ryan |
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation |
Howard Halim, Eyasu Getahun Chekole, Daniel Reijsbergen and Jianying Zhou |
BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication |
Koki Hamada |
Concretely Efficient Parallel-accessible DORAM for 100K-sized Array |
Cristian Daniele, Timme Bethe, Marcello Maugeri, Andrea Continella and Erik Poll |
LibAFL*: Fast and State-aware Protocol Fuzzing |
Chandan Kumar, Nimish Mishra, Suvradip Chakraborty, Satrajit Ghosh and Debdeep Mukhopadhyay |
TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications |
Bingyang Guo, Mingxuan Liu, Yihui Ma, Ruixun Li, Fan Shi, Min Zhang, Baojun Liu, Chengxi Xu, Haixin Duan, Geng Hong, Min Yang and Qingfeng Pan |
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings |
Shehel Yoosuf, Temoor Ali, Ahmed Lekssays, Mashael Al-Sabah and Issa Khalil |
StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models |
Minu Chung and Hyungon Moon |
Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis |
Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou and Wenjing Lou |
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks |
Amit Pravin Choudhari, Shorya Kumar and Christian Rossow |
NICraft: Malicious NIC Firmware-based Cache Side-channel Attack |
Veronique Cortier, Alexandre Debant and Pierrick Gaudry |
Breaking verifiability and vote privacy in CHVote |
Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee |
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing |
Kian Kai Ang and Damith C. Ranasinghe |
QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol |
Qingming Zeng, Mo Li, Ximing Fu, Hui Jiang and Chuanyi Liu |
Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance |
Adrian Cinal, Przemysław Kubiak, Mirosław Kutyłowski and Gabriel Wechta |
Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws |
Chongyu Long, Yuewu Wang, Lingguang Lei, Haoyang Xing and Jiwu Jing |
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller |
Jiaxin Li, Gorka Abad, Stjepan Picek and Mauro Conti |
Membership Privacy Evaluation in Deep Spiking Neural Networks |