Full Program (Main Conference)

Day 3 (Wednesday, 27 August 2025)
Ballroom 1 Ballroom 2 Ballroom 3
08:00-09:00 Registration
09:00-09:30 Opening Remark
09:30-10:30 Keynote 1
10:30-11:00 Tea Break
11:00-12:30 Session 1: Homomorphic Encryption and Zero knowledge Session 2: LLM for Security Session 3: Hardware Security
Optimized Composite Polynomials in CKKS Bootstrapping
Seonhong Min (Seoul National University), Joon-Woo Lee (Chung-Ang University), Yongsoo Song (Seoul National University)

An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization
Animesh Singh, Ayantika Chatterjee (Indian Institute of Technology Kharagpur), Anupam Chattopadhyay (Nanyang Technological University), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)

A Novel Asymmetric BSGS Polynomial Evaluation Algorithm under Homomorphic Encryption
Qingfeng Wang, Li-Ping Wang (Chinese Academy of Sciences)

Efficient Updatable Private Information Retrieval From Simulatable Homomorphic Ciphertexts
Haibo Tian, Yini Lin (Sun Yat-sen University)

Key Extension: Multi-Key FHE Utilizing LWR
Mansi Goyal, Aditi Kar Gangopadhyay (Indian Institute of Technology Roorkee)

DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
Semin Han, Geonho Yoon, Hyunok Oh (Hanyang University), Jihye Kim (Kookmin University)
Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity
Dominik M. Weber, Ioannis Tzachristas, Aifen Sui (Huawei Munich Research Center)

Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion
Karl Rubel, Maximilian Noppel, Christian Wressnegger (Karlsruhe Institute of Technology)

PentestAgent: Incorporating LLM Agents to Automated Penetration Testing
Xiangmin Shen, Lingzhi Wang (Northwestern University), Zhenyuan Li (Zhejiang University), Yan Chen (Northwestern University), Wencheng Zhao, Dawei Sun (Ant Group), Jiashui Wang, Wei Ruan (Zhejiang University)

SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models
Van Nguyen (Monash University), Surya Nepal (CSIRO’s Data61), Xingliang Yuan (The University of Melbourne), Tingmin Wu (CSIRO’s Data61), Carsten Rudolph (Monash University)

Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems
João Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos (University of Lisbon)

SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation
Yashothara Shanmugarasa, Ming Ding, Chamikara Mahawaga Arachchige, Thierry Rakotoarivelo (CSIRO’s Data61)
N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture
Dipesh, Urbi Chatterjee (Indian Institute of Technology Kharagpur)

FP-Rowhammer: DRAM-Based Device Fingerprinting
Hari Venugopalan, Kaustav Goswami, Zainul Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq (US Davis)

ProbeShooter: A New Practical Approach for Probe Aiming
Daehyeon Bae, Sujin Park, Minsig Choi (Korea University), Young-Giu Jeong (YM-NaeulTech), Changmin Jeong (Agency for Defense Development), Heeseok Kim, Seokhie Hong (Korea University)

GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs
Daehyeon Lee, Junghee Lee (Korea University)

Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code
Matteo Oldani (ETH Zürich), William Blair (Oracle Labs), Shweta Shinde (ETH Zürich), Matthias Neugschwandtner (Oracle Labs)

Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments
Philipp Schmitz, Tobias Jauch, Alex Wezel (RPTU Kaiserslautern-Landau), Mohammad Rahmani Fadiheh (Stanford University), Thore Tiemann, Jonah Heller, Thomas Eisenbarth (University of Lübeck), Dominik Stoffel, Wolfgang Kunz (RPTU Kaiserslautern-Landau)
12:30-14:00 Lunch
14:00-17:00 Poster Session
POSTER:Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems
Wei Jie Bryan Lee, Siyi Wang, Suman Dutta (Nanyang Technological University), Walid El Maouaki (Hassan II University of Casablanca), Anupam Chattopadhyay (Nanyang Technological University)

POSTER:TYPOSQUATTING ATTACKS ON THE RUST ECOSYSTEM
Thanh-Cong Nguyen (University of Information Technology Vietnam), Minh-Khanh Vu (Birmingham City University), Duc-Ly Vu (Eastern International University)

POSTER:Dissappearing Ink: How Partial Model Extraction Erases Watermarks
Venkata Sai Pranav Bachina, Ankit Gangwal (International Institute of Information Technology Hyderabad, India)

POSTER:Transparent Temporally-Specialized System Call Filters
Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi (Università degli Studi di Bergamo, Bergamo)

POSTER:Policy-driven security-aware scheduling in Kubernetes
Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi (Università degli Studi di Bergamo)

POSTER:An Empirical Study of Smart Contract Patching Practices in the Wild
Taeyoung Kim, Gilhee Lee, Hyoungshick Kim (Sungkyunkwan University)

POSTER:Automating ICS Malware Analysis with MITRE ATT&CK
Fatih Kurt, Neetesh Saxena, Vijay Kumar, George Theodorakopoulos (Cardiff University)

POSTER:When Models Speak Too Much: Privacy Leakage on Large Language Models
MingJun Zhang (ANU), Mahrokh Abdollahi, Thilina Ranbaduge, Ming Ding (CSIRO’s Data61)

POSTER:Investigating Transferability of Adversarial Examples in Model Merging
Ankit Gangwal, Aaryan Ajay Sharma (International Institute of Information Technology Hyderabad)

POSTER:Multimodal Graph Networks for Systematic Generalization in Code Clone Detection
Cuong Dao (Hanoi University of Civil Engineering), Van Tong, Hai Anh Tran, Duc Tran, Giang Nguyen (Hanoi University of Science and Technology)

POSTER:SuriCap – A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering
Koen Teuwen, Emmanuele Zambon, Luca Allodi (Eindhoven University of Technology)
14:00-15:30 Session 4: Multi-party Computation Session 5: ML Security Session 6: Fault Injection and Side Channels
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division
Soumyadyuti Ghosh (Indian Institute of Technology Kharagpur), Boyapally Harishma (Nanyang Technological University), Ajith Suresh (Technology Innovation Institute), Arpita Patra (Indian Institute of Science Bangalore), Soumyajit Dey, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)

Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension
Mingli Wu (The University of Hong Kong), Tsz Hon Yuen (Monash University), Siu-Ming Yiu (The University of Hong Kong)

SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation
Henri Dohmen, Robin William Hundt, Nora Khayata, Thomas Schneider (Technical University of Darmstadt)

Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF
Fei Xiao, Chunyang Lv, Jianfeng Wang (Xidian University)

Concretely Efficient Private Set Union via Circuit-Based PSI
Gowri R Chandran (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt), Maximilian Stillger (Technical University of Darmstadt), Christian Weinert (University of London)

Prior-Based Label Differential Privacy via Secure Two-Party Computation
Amit Agarwal (University of Illinois Urbana-Champaign), Stanislav Peceny (Georgia Tech), Mariana Raykova, Phillipp Schoppmann, Karn Seth (Google)
ChainMarks: Securing DNN Watermark with Cryptographic Chain
Brian Choi (Johns Hopkins University), Shu Wang (Palo Alto Networks, Inc.), Isabelle Choi (University of California), Kun Sun (George Mason University)

Toward Malicious Clients Detection in Federated Learning
Zhihao Dou (Duke University), Jiaqi Wang (Hainan normal University), Wei Sun (Wichita State University), Zhuqing Liu (University of North Texas), Minghong Fang (University of Louisville)

Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI
Meghali Nandi, Arash Shaghaghi (The University of New South Wales), Nazatul Haque Sultan (CSIRO’s Data61), Gustavo Batista (The University of New South Wales), Raymond K. Zhao (CSIRO’s Data61), Sanjay Jha (The University of New South Wales)

When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning
Ruining Sun (Xiangtan University), Hongsheng Hu (University of Newcastle), Wei Luo (Deakin University), Zhaoxi Zhang, Yanjun Zhang (University of Technology Sydney), Haizhuan Yuan (Xiangtan University), Leo Yu Zhang (Griffith University)

Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion Models
Fei Wang, Yan Zhu, Baochun Li (University of Toronto)

Transferable Adversarial Examples with Bayesian Approach
Mingyuan Fan, Cen Chen (East China Normal University), Wenmeng Zhou (Alibaba Group), Yinggui Wang (Ant Group)
FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack
Kemal Derya, M. Caner Tol, Berk Sunar (Worcester Polytechnic Institute)

Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV
Niclas Kühnapfel, Christian Werling, Hans Niklas Jacob, Jean-Pierre Seifert (Technical University Berlin)

AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces
Suryeon Kim, Seung Ho Na, Jaehan Kim, Seungwon Shin (KAIST), Hyunwoo Choi (Sungshin Women’s University)

BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors
Quancheng Wang, Ming Tang, Ke Xu, Han Wang (Wuhan University)

Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design
Zhenyuan Liu, Andrew Malnicof, Arna Roy, Patrick Schaumont (Worcester Polytechnic Institute)

EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks
Tianhong Xu, Aidong Adam Ding, Yunsi Fei (Northeastern University)
15:30-16:00 Tea Break
16:00-17:00 Session 7: Applied Crypto Session 8: IoT Security Session 9: Blockchain 1
A Cryptographic Analysis of Google’s PSP and Falcon Channel Protocols
Marc Fischlin, Sascha Hoffmann, Leonhard Ruppel, Gözde Saçıak, Tobias Schnitzler, Christian Schwarz, Maximilian Stillger (Technical University of Darmstadt)

Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices
Dominik Bojko, Jacek Cichoń (Wroclaw University of Science and Technology), Mirosław Kutyłowski, Oliwer Sobolewski (NASK National Research Institute)

LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation
Dien H. A. Tran, Tam N. B. Nguyen (Vietnam National University, Ho Chi Minh City), Nhien-An Le-Khac (University College Dublin), Thuc D. Nguyen (Vietnam National University, Ho Chi Minh City)

Post-Compromise Security with Application-Level Key-Controls – with a comprehensive study of the 5G AKMA protocol
Ioana Boureanu (Surrey Centre for Cyber Security), Cristina Onete (University of Limoges/XLIM/CNRS 7252), Stephan Wesemeyer (Surrey Centre for Cyber Security), Léo Robert (Université de Picardie Jules Verne), Rhys Miller (Surrey Centre for Cyber Security), Pascal Lafourcade (Universite Clermont Auvergne), Fortunat Rajaona (Surrey Centre for Cyber Security)
NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks
Andrea Ciccotelli, Maurantonio Caprolu, Roberto Di Pietro (King Abdullah University of Science and Technology)

Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks
Moses Ike, Keaton Sadoski, Romuald Valme (Sandia National Laboratories), Burak Sahin, Saman Zonouz, Wenke Lee (Georgia Institute of Technology)

Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation
Arwa Abdulkarim Al Alsadi, Mathew Vermeer (Delft University of Technology), Takayuki Sasaki, Katsunari Yoshioka (Yokohama National University), Michel Van Eeten, Carlos Gañán (Delft University of Technology)

AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT
Lukas Petzi, Torsten Krauß, Alexandra Dmitrienko (University of Würzburg), Gene Tsudik (UC Irvine)
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility
Jia Liu (Enya Labs), Mark Manulis (Universität der Bundeswehr München)

VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More
Yue Zhou (Australian National University), Sid Chi-Kin Chau (CSIRO’s Data61)

Scalable Time-Lock Puzzle
Aydin Abadi (Newcastle University), Dan Ristea (University College London), Artem Grigor (University of Oxford), Steven Murdoch (University College London)

BIP32-Compatible Threshold Wallets
Poulami Das (Least Authority ), Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder (Technische Universität Darmstadt), Julian Loss (CISPA Helmholtz Center for Information Security), Ziyan Qu, Siavash Riahi (Technische Universität Darmstadt)
17:30-20:30 Steering Committee Meeting

Day 4 (Thurday, 28 August 2025)
Ballroom 1 Ballroom 2 Ballroom 3
09:00-10:30 Session 10: Post-Quantum Session 11: ML Applications to Security Session 12: Privacy 1
An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes
YoungBeom Kim, Seog Chung Seo (Kookmin University)

Quantum-safe Signatureless DNSSEC
Aditya Singh Rawat, Mahabir Prasad Jhanwar (Ashoka University)

Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption
Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur)

Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
Guilhem Niot (IRISA)

A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment
Salman Shamshad, SANA BELGUITH, ALMA ORACEVIC (University of Bristol)

poqeth: Efficient, post-quantum signature verification on Ethereum
Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi (Eötvös Loránd University)
Glitch in Time: Exploiting Temporal Misalignment of IMU For Eavesdropping
Ahmed Najeeb, Abdul Rafay, Muhammad Hamad Alizai, Naveed Anwar Bhatti (LUMS)

Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub
Jafar Akhoundali (Leiden University), Hamidreza Hamidi (Technical and Vocational University), Kristian Rietveld, Olga Gadyatskaya (Leiden University)

PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response
Govind Mittal (New York University), Arthur Jakobsson (Carnegie Mellon University), Kelly Marshall, Chinmay Hegde, Nasir Memon (New York University)

Minerva: A File-Based Ransomware Detector
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari (Sapienza University of Rome), Lorenzo De Carli (University of Calgary), Luigi Mancini (Sapienza University of Rome)

Evaluating Robustness of Reference-based Phishing Detectors
Eunjin Roh (Oregon State University), Sungwoo Jeon, Sooel Son (KAIST), Sanghyun Hong (Oregon State University)

Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World
Hua Ma, Alsharif Abuadbba (CSIRO’s Data61), Yansong Gao (The University of Western Australia), Hyoungshick Kim (Sungkyunkwan University), Surya Nepal (CSIRO’s Data61)

Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense
Haeseung Jeon, Chaiwon Hwang, Jiwoo Hong, Hosung Kang (Ewha Womans University), Nate Mathews (Rochester Institute of Technology), Goun Kim, Se Eun Oh (Ewha Womans University)

Robust Locally Differentially Private Graph Analysis
Amrita Roy Chowdhury (University of Michigan, Ann Arbor), Jacob Imola (University of Copenhagen), Kamalika Chaudhuri (UCSD)

PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X
Xuyuan Cai, SONG Rui, Bin Xie (The Hong Kong Polytechnic University), Qingjun Xiao (Southeast University of China), Bin Xiao (The Hong Kong Polytechnic University)

Unveiling Privacy Risks in Quantum Optimization Services
Mateusz Leśniak, Michał Wroński (NASK National Research Institute), Ewa Syta (Trinity College), Mirosław Kutyłowski (NASK National Research Institute)

QUIC-Exfiltration: Exploiting QUIC’s Server Preferred Address Feature to Perform Data Exfiltration Attacks
Thomas Grübl, Weijie Niu, Jan von der Assen, Burkhard Stiller (University of Zürich UZH)

ClearMask: Noise-Free and Naturalness-Preserving Protection Against Voice Deepfake Attacks
Yuanda Wang, Bocheng Chen (Michigan State University), Hanqing Guo (University of Hawaii at Mānoa), Guangjing Wang (University of South Florida), Weikang Ding, Qiben Yan (Michigan State University)
10:30-11:00 Tea Break
11:00-12:00 Keynote 2
12:00-14:00 Lunch
14:00-17:30 Social Event (Bat Trang Pottery Museum)
19:00-22:00 Conference Dinner, Award Ceremony, Test-of-time Award Presentation, and Announcement of AsiaCCS 2026 (Conference Hotel )

Day 5 (Friday, 29 August 2025)
Ballroom 1 Ballroom 2 Ballroom 3
09:00-10:00 Keynote 3
10:00-10:30 Tea Break
10:30-12:00 Session 13: Privacy 2 Session 14: Software and OS Security Session 15: Web Security
Slice it up: Unmasking User Identities in Smartwatch Health Data
Lucas Lange, Tobias Schreieder, Victor Christen, Erhard Rahm (Leipzig University & ScaDS.AI Dresden/Leipzig)

Secure Steganography Based on Chaos-Aided Quantization Index Modulation
Xinquan Xu (Jinan university), Ling Liu (Xidian University), Shanxiang Lyu (Jinan University), Lip Yee Por (University Malaya)

App-solutely Modded: The Rift Between Modded App Market Operators and Original Developers
Luis Adán Saavedra del Toro, Hridoy S. Dutta, Alastair Beresford, Alice Hutchings (University of Cambridge)

Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran
Abdulrahman Alaraj (Prince Sattam Bin Abdulaziz University), Eric Wustrow (University of Colorado Boulder)

Virtual End-to-End Encryption: Analysis of the Doctolib Protocol
Dennis Dayanikli, Laura Holz, Anja Lehmann (University of Potsdam)

Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility
M.A.P. Chamikara, Seung Ick Jang (CSIRO’s Data61), Ian Oppermann (Department of Customer Service, New South Wales, Australia), Dongxi Liu (CSIRO’s Data61, Australia), Musotto Roberto (Cyber Security Cooperative Research Centre), Sushmita Ruj (University of New South Wales), Arindam Pal (Optym), Meisam Mohammady (Iowa State University of Science and Technology), Seyit Camtepe (CSIRO’s Data61), Sylvia Young, Chris Dorrian, Nasir David (Department of Health, Western Australia, Australia)
Can You Run My Code? A Close Look at Process Injection in Windows Malware
Giorgia Di Pietro, Daniele Cono D’Elia, Leonardo Querzoni (Sapienza University of Rome)

CryptoGuard: Lightweight Hybrid Detection and Prevention of Host-based Cryptojackers
Gyeonghoon Park (UC Irvine), Jaehan Kim (KAIST), Jinu Choi, Jinwoo Kim (Kwangwoon University)

Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver
Wonseok Choi, Youngjoo Shin (Korea University)

Starmie: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde (ETH Zurich)

SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)
Masudul Hasan Masud Bhuiyan (CISPA Helmholtz Center for Information Security), Berk Çakar, Ethan H Burmane, James C Davis (Purdue University), Cristian-Alexandru Staicu (CISPA Helmholtz Center for Information Security)

Systematic Analysis of Kernel Security Performance and Energy Costs
Fabian Rauscher, Daniel Gruss (Graz University of Technology), Benedict Herzog, Timo Hönig (Ruhr-Universität Bochum)

Open Access Alert: Studying the Privacy Risks in Android WebView’s Web Permission Enforcement
Trung Tin Nguyen, Ben Stock (CISPA Helmholtz Center for Information Security)

TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types
Sunnyeo Park, Jihwan Kim, Seongho Keum, Hyunjoon Lee, Sooel Son (KAIST)

ProwseBox: A Framework for the Analysis of the Web at Scale
Dolière Francis Somé (CISPA Helmholtz Center for Information Security)

BISON: Blind Identification with Stateless scOped pseudoNyms
Jakob Heher, Stefan More, Lena Heimberger (Graz University of Technology)

Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy
Jean Snyman (University of Surrey and Hewlett Packard Enterprise), Chris Culnane (University of Melbourne), Ioana Boureanu (University of Surrey), Gerault David (Technology Innovation Institute)

OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access
Viet Vo (Swinburne University of Technology), Shangqi Lai (CSIRO’s Data61), Xingliang Yuan (The University of Melbourne), Surya Nepal (CSIRO’s Data61), Qi Li (Tsinghua University)
12:00-13:30 Lunch
13:30-15:00 Session 16: Usable Security and Privacy Session 17: Binary Security Session 18: Network Security
NailKey: Mutable Biometric Using Fingernails
Yihong Hang, Zhice Yang (ShanghaiTech University)

Different Seas, Different Phishes: Large-Scale Analysis of Phishing Simulations Across Different Industries
Oskar Braun (AWARE7 GmbH / Rhine-Waal University), Jan Hörnemann (Institute for Internet Security and AWARE7), Norbert Pohlmann, Tobias Urban, Matteo Grosse-Kampmann (Rhine-Waal University of Applied Sciences)

Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication
Hangcheng Cao, Guowen Xu (University of Electronic Science and Technology of China), Wenbin Huang (Nanjing University of Information Science and Technology), Hongwei Li (University of Electronic Science and Technology of China)

The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations
Marie Weinz (University of Liechtenstein), Nicola Zannone, Luca Allodi (Eindhoven University of Technology), Giovanni Apruzzese (University of Liechtenstein)

PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework
YingTat Ng, Zhe Chen, Haiqing Qiu, Xuhua Ding (Singapore Management University)

On the Account Security Risks Posed by Password Strength Meters
Ming Xu (Fudan University), Weili Han (Fudan University), Jitao Yu (Fudan University), Jing Liu (UC Irvine & MPI-SP), Xinyi Zhang (Facebook), Yun Lin (Shanghai Jiao Tong University), Jin Song Dong (National University of Singapore)
Breaking Bad: How Compilers Break Constant-Time Implementations
Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun (ETH Zurich)

An Empirical Study of C Decompilers: Performance Metrics and Error Taxonomy
Melih Sirlanci, Carter Yagemann, Zhiqiang Lin (The Ohio State University)

Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework
August See, Moritz Mönnich, Mathias Fischer (Universität Hamburg)

Evaluating Disassembly Errors With Only Binaries
Lambang Akbar Wijayadi, Yuancheng Jiang, Roland Yap, Zhenkai Liang, Zhuohao Liu (National University of Singapore)

Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
Amin Abdulrahman (Max Planck Institute for Security and Privacy), Matthias J. Kannwischer, Thing-Han Lim (Chelpis Quantum Corp)

REFLECTA: Reflection-based Scalable and Semantic Scripting Language Fuzzing
Chibin Zhang, Gwangmu Lee, Qiang Liu, Mathias Payer (EPFL)

OMALDA5G: Online Malware Detection and Attribution in 5G Networks using Compound Paths
Zhixin Wen, Guanhua Yan (Binghamton University)

Ruling the Unruly: Network Intrusion Detection Rule Design Principles for Specificity and Coverage to Decrease Unnecessary Workload in SOCs
Koen T. W. Teuwen, Tom Mulders, Emmanuele Zambon, Luca Allodi (Eindhoven University of Technology)

SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge
Kouam Djuigne (TU Berlin), Aline Carneiro Viana (INRIA), Philippe Martins (Telecom Paris), Cédric Adjih (INRIA), Alain Tchana (Grenoble INP)

An Automated Blackbox Noncompliance Checker for QUIC Server Implementations
Kian Kai Ang, Guy Farrelly, Cheryl Pope, Damith C. Ranasinghe (University of Adelaide)

Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability
Ayoub Ben Hassen (École Supérieure des Communications), Pascal Lafourcade, Dhekra Mahmoud, Maxime Puys (Université Clermont Auvergne)

Learning to Identify Conflicts in RPKI
Haya Schulmann (Goethe-Universität Frankfurt and National Research Center for Applied Cybersecurity ATHENE), Shujie Zhao (Fraunhofer SIT, ATHENE)
15:00-15:30 Tea Break
15:30-16:30 Session 19: CPS Security Session 20: Blockchain 2 Session 21: Blockchain 3
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems
Xugui Zhou (Louisiana State University), Anqi Chen (Northeastern University), Maxfield Kouzel, Haotian Ren (University of Virginia), Morgan McCarty, Cristina Nita-Rotaru (Northeastern University), Homa Alemzadeh (University of Virginia)

Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters
Yuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN)

From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication
Abdullah Zubair Mohammed, Ryan Gerdes (Virginia Tech)

Preventing Radio Fingerprinting through Friendly Jamming
Muhammad Irfan (Hamad Bin Khalifa University), Savio Sciancalepore (Eindhoven University of Technology), Gabriele Oligeri (Hamad Bin Khalifa University)
FIRST: FrontrunnIng Resistant Smart ConTracts
Emrah Sariboz, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra (New Mexico State University)

Mining Attack with Zero Knowledge in the Blockchain
Yu Jiaping, Gao Shang, Song Rui (The Hong Kong Polytechnic University), Zhiping Cai (National University of Defense Technology), Xiao Bin (The Hong Kong Polytechnic University)

Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas
Xuelian Cao, Zheng Yang (Southwest University), Tao Xiang (Chongqing University), Jianting Ning (Wuhan University), Yuhan Liu, Zhiming Liu (Southwest University), Jianying Zhou (Singapore University of Technology and Design)

BRC20 Snipping Attack
Minfeng Qi (City University of Macau), Qin Wang (CSIRO’s Data61), Ningran Li (The University of Adelaide), Shiping Chen (CSIRO Data61), Tianqing Zhu (City University of Macau)
An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and Activities
Kailun Yan (Shandong University,George Mason University), Bo Lu (George Mason University), Pranav Agrawal, Jiasun Li (George Mason University), Wenrui Diao (Shandong University), Xiaokuan Zhang (George Mason University)

AWOSE: Probabilistic State Model for Consensus Algorithms Fuzzing Frameworks
Tannishtha Devgun, Gulshan Kumar, Rahul Saha, Alessandro Brighente, Mauro Conti (University of Padua)

DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts
Mohsen Minaei, Pedro Moreno-Sanchez (Visa Research), Zhiyong Fang (Texas A&M University), Srinivasan Raghuraman (Visa Research and MIT), Navid Alamati, Panagiotis Chatzigiannis, Ranjit Kumaresan, Duc Le (Visa Research)

Pace: Privacy-preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges
Jianhuan Wang, Bin Xiao (The Hong Kong Polytechnic University)
16:30-17:00 Closing Remark