Cycle 2 Accepted Papers
SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge
Kouam Djuigne (TU Berlin), Aline Carneiro Viana (INRIA), Philippe Martins (Telecom Paris), Cédric Adjih (INRIA), Alain Tchana (Grenoble INP)
Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication
Hangcheng Cao (University of Electronic Science and Technology of China), Guowen Xu (University of Electronic Science and Technology of China), Wenbin Huang (Nanjing University of Information Science and Technology), Hongwei Li (University of Electronic Science and Technology of China)
Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters
Yuna Tanaka (Waseda University), Kazuki Nomoto (Waseda University), Ryunosuke Kobayashi (Waseda University), Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN)
Different Seas, Different Phishes – Large-Scale Analysis of Phishing Simulations Across Different Industries
Oskar Braun (AWARE7 GmbH / Rhine-Waal University), Jan Hörnemann (Institute for Internet Security and AWARE7), Norbert Pohlmann (Westphalian University of Applied Sciences), Tobias Urban (Westphalian University of Applied Sciences), Matteo Grosse-Kampmann (Rhine-Waal University of Applied Sciences)
Mining Attack with Zero Knowledge in the Blockchain
Yu Jiaping (The Hong Kong Polytechnic University), Gao Shang (The Hong Kong Polytechnic University), Song Rui (The Hong Kong Polytechnic University), Zhiping Cai (National University of Defense Technology), Xiao Bin (The Hong Kong Polytechnic University)
Scalable Time-Lock Puzzle
Aydin Abadi (Newcastle University), Dan Ristea (University College London), Artem Grigor (University of Oxford), Steven Murdoch (University College London)
Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices
Dominik Bojko (Wroclaw University of Science and Technology), Jacek Cichoń (Wroclaw University of Science and Technology), Mirosław Kutyłowski (NASK National Research Institute), Oliwer Sobolewski (NASK National Research Institute)
Breaking Bad: How Compilers Break Constant-Time Implementations
Moritz Schneider (ETH Zurich), Daniele Lain (ETH Zurich), Ivan Puddu (ETH Zurich), Nicolas Dutly (ETH Zurich), Srdjan Capkun (ETH Zurich)
Post-Compromise Security with Application-Level Key-Controls – with a comprehensive study of the 5G AKMA protocol –
Ioana Boureanu (Surrey Centre for Cyber Security), Cristina Onete (University of Limoges/XLIM/CNRS 7252), Stephan Wesemeyer (Surrey Centre for Cyber Security), Léo Robert (Université de Picardie Jules Verne), Rhys Miller (Surrey Centre for Cyber Security), Pascal Lafourcade (Universite Clermont Auvergne), Fortunat Rajaona (Surrey Centre for Cyber Security)
From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication
Abdullah Zubair Mohammed (Virginia Tech), Ryan Gerdes (Virginia Tech)
SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)
Masudul Hasan Masud Bhuiyan (CISPA Helmholtz Center for Information Security), Berk Çakar (Purdue University), Ethan H Burmane (Purdue University), James C Davis (Purdue University), Cristian-Alexandru Staicu (CISPA Helmholtz Center for Information Security)
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division
Soumyadyuti Ghosh (Indian Institute of Technology Kharagpur), Boyapally Harishma (Nanyang Technological University), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Arpita Patra (Indian Institute of Science Bangalore), Soumyajit Dey (Department of Computer Science and Engineering, IIT Kharagpur), Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)
Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense
Haeseung Jeon (Ewha Womans University), Chaiwon Hwang (Ewha Womans University), Jiwoo Hong (Ewha Womans University), Hosung Kang (Ewha Womans University), Nate Mathews (Rochester Institute of Technology), Goun Kim (Ewha Womans University), Se Eun Oh (Ewha Womans University)
When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning
Ruining Sun (Xiangtan University), Hongsheng Hu (University of Newcastle), Wei Luo (Deakin University), Zhaoxi Zhang (University of Technology Sydney), Yanjun Zhang (University of Technology Sydney), Haizhuan Yuan (Xiangtan University), Leo Yu Zhang (Griffith University)
CryptoGuard: Lightweight Hybrid Detection and Prevention of Host-based Cryptojackers
Gyeonghoon Park (UC Irvine), Jaehan Kim (KAIST), Jinu Choi (Kwangwoon University), Jinwoo Kim (Kwangwoon University)
Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility
M.A.P. Chamikara (CSIRO’s Data61, Australia), Seung Ick Jang (CSIRO’s Data61, Australia), Ian Oppermann (Department of Customer Service, New South Wales, Australia), Dongxi Liu (CSIRO’s Data61, Australia), Musotto Roberto (Cyber Security Cooperative Research Centre (CSCRC), Australia), Sushmita Ruj (University of New South Wales, Australia), Arindam Pal (Optym), Meisam Mohammady (Iowa State University of Science and Technology, The USA), Seyit Camtepe (CSIRO’s Data61, Australia), Sylvia Young (Department of Health, Western Australia, Australia), Chris Dorrian (Department of Health, Western Australia, Australia), Nasir David (Department of Health, Western Australia, Australia)
Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI
Meghali Nandi (The University of New South Wales (UNSW), Sydney, Australia), Arash Shaghaghi (The University of New South Wales (UNSW), Sydney, Australia), Nazatul Haque Sultan (CSIRO’s Data61, Australia), Gustavo Batista (The University of New South Wales (UNSW), Sydney, Australia), Raymond K. Zhao (CSIRO’s Data61, Sydney), Sanjay Jha (The University of New South Wales (UNSW), Sydney, Australia)
Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity
Dominik M. Weber (Huawei Munich Research Center), Ioannis Tzachristas (Huawei Munich Research Center), Aifen Sui (Huawei Munich Research Center)
FIRST: FrontrunnIng Resistant Smart ConTracts
Emrah Sariboz (New Mexico State University), Gaurav Panwar (New Mexico State University), Roopa Vishwanathan (New Mexico State University), Satyajayant Misra (New Mexico State University)
Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas
Xuelian Cao (Southwest University), Zheng Yang (Southwest University), Tao Xiang (Chongqing University), Jianting Ning (Wuhan University), Yuhan Liu (Southwest University), Zhiming Liu (Southwest University, China), Jianying Zhou (Singapore University of Technology and Design)
Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
Guilhem Niot (PQShield, Univ Rennes, CNRS, IRISA)
poqeth: Efficient, post-quantum signature verification on Ethereum
Ruslan Kysil (Eötvös Loránd University), István András Seres (Eötvös Loránd University), Péter Kutas (Eötvös Loránd University and University of Birmingham), Nándor Kelecsényi (Eötvös Loránd University)
Toward Malicious Clients Detection in Federated Learning
Zhihao Dou (Duke University), Jiaqi Wang (Hainan normal University), Wei Sun (Wichita State University), Zhuqing Liu (University of North Texas), Minghong Fang (University of Louisville)
The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations
Marie Weinz (University of Liechtenstein), Nicola Zannone (Eindhoven University of Technology), Luca Allodi (Eindhoven University of Technology), Giovanni Apruzzese (University of Liechtenstein)
NailKey: Mutable Biometric Using Fingernails
Yihong Hang (Shanghaitech University), Zhice Yang (ShanghaiTech University)
Systematic Analysis of Kernel Security Performance and Energy Costs
Fabian Rauscher (Graz University of Technology), Daniel Gruss (Graz University of Technology), Benedict Herzog (Ruhr-Universität Bochum (RUB)), Timo Hönig (Ruhr-Universität Bochum)
BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors
Quancheng Wang (Wuhan University), Ming Tang (Wuhan University), Ke Xu (Wuhan University), Han Wang (Wuhan University)
Robust Locally Differentially Private Graph Analysis
Amrita Roy Chowdhury (University of Michigan, Ann Arbor), Jacob Imola (University of Copenhagen), Kamalika Chaudhuri (UCSD)
BRC20 Snipping Attack
Minfeng Qi (City University of Macau), Qin Wang (CSIRO Data61), Ningran Li (The University of Adelaide), Shiping Chen (CSIRO Data61), Tianqing Zhu (City University of Macau)
N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture
Dipesh (Indian Institute of Technology, Kanpur), Urbi Chatterjee (Indian Institute of Technology Kharagpur)
On the Account Security Risks Posed by Password Strength Meters
Ming Xu (Fudan University, National University of Singapore), Weili Han (Fudan University), Jitao Yu (Fudan University), Jing Liu (UC Irvine & MPI-SP), Xinyi Zhang (Facebook), Yun Lin (Shanghai Jiao Tong University), Jin Song Dong (National University of Singapore)
Prior-Based Label Differential Privacy via Secure Two-Party Computation
Amit Agarwal (University of Illinois Urbana-Champaign), Stanislav Peceny (Georgia Tech), Mariana Raykova (Google), Phillipp Schoppmann (Google), Karn Seth (Google)
LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation
Dien H. A. Tran (University Of Science, VNUHCM), Tam N. B. Nguyen (University Of Science, VNUHCM), Nhien-An Le-Khac (University College Dublin), Thuc D. Nguyen (University Of Science, VNUHCM)
PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework
YingTat Ng (Singapore Management University), Zhe Chen (Singapore Management University), Haiqing Qiu (Singapore Management University), Xuhua Ding (SMU)
Can You Run My Code? A Close Look at Process Injection in Windows Malware
Giorgia Di Pietro (Sapienza University of Rome), Daniele Cono D’Elia (Sapienza University of Rome), Leonardo Querzoni (Sapienza University of Rome)
Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework
August See (Universität Hamburg), Moritz Mönnich (Universität Hamburg), Mathias Fischer (Universität Hamburg)
SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models
Van Nguyen (Monash University), Surya Nepal (CSIRO Data61 Australia), Xingliang Yuan (The University of Melbourne), Tingmin Wu (CSIRO’s Data61), Carsten Rudolph (Monash University)
Key Extension: Multi-Key FHE Utilizing LWR
Mansi Goyal (Indian Institute of Technology Roorkee), Aditi Kar Gangopadhyay (Indian Institute of Technology Roorkee)
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
Amin Abdulrahman (Max Planck Institute for Security and Privacy (MPI-SP)), Matthias J. Kannwischer (Chelpis Quantum Corp), Thing-Han Lim (Chelpis Quantum Corp)
Pace: Privacy-preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges
Jianhuan Wang (The Hong Kong Polytechnic University), Bin Xiao (The Hong Kong Polytechnic University)
PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X
Xuyuan Cai (The Hong Kong Polytechnic University), SONG Rui (The Hong Kong Polytechnic University), Bin Xie (The Hong Kong Polytechnic University), Qingjun Xiao (Southeast University of China), Bin Xiao (The Hong Kong Polytechnic University)
Unveiling Privacy Risks in Quantum Optimization Services
Mateusz Leśniak (NASK National Research Institute), Michał Wroński (NASK National Research Institute), Ewa Syta (Trinity College), Mirosław Kutyłowski (NASK National Research Institute)
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi (Johns Hopkins University), Shu Wang (Palo Alto Networks, Inc.), Isabelle Choi (University of California, Los Angeles), Kun Sun (George Mason University)
Secure Steganography Based on Chaos-Aided Quantization Index Modulation
Xinquan Xu (Jinan university), Ling Liu (Xidian University), Shanxiang Lyu (Jinan University), Lip Yee Por (Universiti Malaya)
Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design
Zhenyuan Liu (Worcester Polytechnic Institute), Andrew Malnicof (Worcester Polytechnic Institute), Arna Roy (Worcester Polytechnic Institute), Patrick Schaumont (Worcester Polytechnic Institute)
Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy
Jean Snyman (University of Surrey and Hewlett Packard Enterprise), Chris Culnane (Castellate Consulting Ltd, London, University of Melbourne, Melbourne), Ioana Boureanu (University of Surrey), Gerault David (Technology Innovation Institute (TII))
Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF
Fei Xiao (XIDIAN UNIVERSITY), Chunyang Lv (XIDIAN UNIVERSITY), Jianfeng Wang (XIDIAN UNIVERSITY)
A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment
Salman Shamshad (University of Bristol), SANA BELGUITH (University of Bristol), ALMA ORACEVIC (University of Bristol)
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub
Jafar Akhoundali (Leiden University), Hamidreza Hamidi (Technical and Vocational University), Kristian Rietveld (Leiden University), Olga Gadyatskaya (Leiden University)
DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts
Mohsen Minaei (Visa Research), Pedro Moreno-Sanchez (IMDEA Software Institute, Visa Research, MPI-SP), Zhiyong Fang (Texas A&M University), Srinivasan Raghuraman (Visa Research and MIT), Navid Alamati (VISA Research), Panagiotis Chatzigiannis (Visa Research), Ranjit Kumaresan (Visa Research), Duc Le (Visa Research)
An Automated Blackbox Noncompliance Checker for QUIC Server Implementations
Kian Kai Ang (University of Adelaide), Guy Farrelly (The University of Adelaide, Adelaide), Cheryl Pope (University of Adelaide), Damith C. Ranasinghe (University of Adelaide)
Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption
Debadrita Talapatra (Indian Institute of Technology Kharagpur), Nimish Mishra (Indian Institute of Technology Kharagpur), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation
Henri Dohmen (TU Darmstadt), Robin William Hundt (TU Darmstadt), Nora Khayata (TU Darmstadt), Thomas Schneider (TU Darmstadt)