Acceptance rate: 16%

(86 out of 535 submissions)

Spring Cycle

Winter Cycle

ID

Authors

Title

252

 

Rui Lian,

Yulong Ming,

Chengjun Cai,

Yifeng Zheng,

Cong Wang

and Xiaohua Jia

 

Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting

258

Junlin He,

Lingguang Lei,

Yuewu Wang,

Pingjian Wang

and Jiwu Jing

 

ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme based on RP Anonymization

273

Yihao Luo,

Yunjie Deng,

Jingquan Ge,

Zhenyu Ning

and Fengwei Zhang

 

BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage

274

Shang Shang,

Zhongjiang Yao,

Yepeng Yao,

Liya Su,

Zijing Fan,

Xiaodan Zhang

and Zhengwei Jiang

 

IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts

281

Md Mushfekur Rahman

and Philip W.L. Fong

 

Social Control and Interactivity in Anonymous Public Events

283

Xiangyu Hui

and Sid Chi-Kin Chau

 

LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup

286

Yukun Yan,

Peng Tang,

Rui Chen,

Qilong Han

and Ruochen Du

 

DPC: Filtering out Patch-based Poisoned Samples with Differential Privacy

292

Nan Hu,

Hua Wu,

Hangyu Zhao,

Shanshan Ni

and Guang Cheng

 

Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features

297

Jieyu Zheng,

Haoliang Zhu,

Yifan Dong,

Zhenyu Song,

Zhenhao Zhang,

Yafang Yang

and Yunlei Zhao

 

Faster Post-Quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment

298

Jiaxuan Fu,

Ke Cheng,

Yuheng Xia,

Anxiao Song,

Qianxing Li

and Yulong Shen

 

Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing

299

Xianlong Wang,

Shengshan Hu,

Yechao Zhang,

Ziqi Zhou,

Leo Yu Zhang,

Peng Xu,

Wei Wan

and Hai Jin

 

ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

301

Omar Ibrahim

and Roberto Di Pietro

 

MAG-JAM: Jamming Detection via Magnetic Emissions

304

Keyang Liu,

Xingxin Li

and Tsuyoshi Takagi

 

Review the Cuckoo Hash-based Unbalanced Private Set Union: Leakage, Fix, and Optimization

307

David Eklund,

Alfonso Iacovazzi,

Han Wang,

Apostolos Pyrgelis

and Shahid Raza

 

BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection

308

Hamid Mozaffari,

Sunav Choudhary

and Amir Houmansadr

 

Fake or Compromised? Making Sense of Malicious Clients in Federated Learning

315

Sonakshi Garg

and Vicenc Torra

 

Task-Specific Knowledge Distillation with Differential Privacy in LLMs

316

Yulian Sun,

Li Duan,

Ricardo Mendes,

Derui Zhu,

Yue Xia,

Yong Li

and Asja Fischer

 

Exploiting Internal Randomness for Privacy in Vertical Federated Learning

324

Jiahao Wu,

Heng Pan,

Penglai Cui,

Yiwen Huang,

Jianer Zhou,

Peng He,

Yanbiao Li,

Zhenyu Li

and Gaogang Xie

 

Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches

325

Veronique Cortier,

Alexandre Debant

and Florian Moser

 

Code voting: when simplicity meets security

326

Ubaid Ullah,

Sonia Laudanna,

Vinod P,

Andrea Di Sorbo,

Corrado Aaron Visaggio

and Gerardo Canfora

 

Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media

336

Swantje Lange,

Francesco Gringoli,

Matthias Hollick

and Jiska Classen

 

Wherever I May Roam: Stealthy Interception and Injection Attacks through Roaming Agreements

338

Jean-Loup Hatchikian-Houdot,

Pierre Wilke,

Frédéric Besson

and Guillaume Hiet

 

Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code

341

Peng Yang,

Zoe Lin Jiang,

Jiehang Zhuang,

Junbin Fang,

Siu-Ming Yiu

and Xuan Wang

 

FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion

349

Alessandro Palma

and Marco Angelini

 

It Is Time To Steer: A Scalable Framework for Analysis-driven Attack Graph Generation

363

Yu Chen,

Lin Liu,

Rongmao Chen,

Shaojing Fu,

Yuexiang Yang,

Jiangyong Shi

and Liangzhong He

 

Speedy Privacy-Preserving Skyline Queries on Outsourced Data

382

Fei Hongming,

Prosanta Gope,

Owen Millwood

and Biplab Sikdar

 

Optimal Machine-Learning Attacks on Hybrid PUFs

389

Vincent Gramoli,

Zhenliang Lu,

Qiang Tang

and Pouriya Zarbafian

 

Resilience to Chain-Quality Attacks in Fair Separability

396

Daniel De Pascale,

Giuseppe Cascavilla,

Damian Tamburri

and Willem-Jan

Van Den Heuvel

 

CRATOR a CRAwler for TOR: Turning Dark Web Pages Into Open Source INTelligence

404

Maximilian Radoy,

Sven Hebrok

and Juraj Somorovsky

 

In Search of Partitioning Oracle Attacks Against TLS Session Tickets

421

Yuejun Guo,

Constantinos Patsakis,

Qiang Hu,

Qiang Tang

and Fran Casino

 

Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection

433

Xinrong Liu,

He Wang,

Meng Xu

and Yuqing Zhang

 

SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries

455

Mirco Beltrame,

Mauro Conti,

Pierpaolo Guglielmin,

Francesco Marchiori

and Gabriele Orazi

 

RedactBuster: Entity Type Recognition from Redacted Documents

460

Youcef Korichi,

Sébastien Gambs,

Nadia Tawbi

and Josée Desharnais

 

Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation

462

Hongbo Xu,

Zhenyu Cheng,

Shuhao Li,

Chenxu Wang,

Peishuai Sun,

Jiang Xie

and Qingyun Liu

 

ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs

465

Yungi Cho,

Woorim Han,

Miseon Yu,

Younghan Lee,

Ho Bae

and Yunheung Paek

 

VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification

467

Marc-Antoine Faillon,

Baptiste Bout,

Julien Francq,

Christopher Neal,

Nora Boulahia-Cuppens,

Frédéric Cuppens

and Reda Yaich

 

How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach

475

M. Caner Tol

and Berk Sunar

 

ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMs

491

Alpesh Bhudia,

Dan O'Keeffe

and Darren Hurley-Smith 

 

Revoke: Mitigating Ransomware Attacks against Ethereum Validators

496

Huseyin Gokay,

Foteini Baldimtsi

and Giuseppe Ateniese

 

Atomic Swap Protocol for Boneh–Lynn–Shacham (BLS) based Blockchains

503

Wenxuan Wu,

Soamar Homsi

and Yupeng Zhang

 

Confidential and Verifiable Machine Learning Delegations on the Cloud

504

Yuying Li,

Zeyan Liu,

Junyi Zhao,

Liangqin Ren,

Fengjun Li,

Jiebo Luo

and Bo Luo

 

The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking

507

Qirui Liu,

Wenbo Shen,

Jinmeng Zhou,

Zhuoruo Zhang,

Jiayi Hu,

Shukai Ni,

Kangjie Lu

and Rui Chang

 

Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow

508

Diksha Goel,

Kristen Moore,

Mingyu Guo,

Derui Wang,

Minjune Kim

and Seyit Camtepe

 

Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

509

Seoyeon Hwang,

Stanislaw Jarecki,

Zane Karl,

Elina van Kempen

and Gene Tsudik

 

PIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants

510

Radu-Alexandru Mantu,

Mihai Chiroiu

and Costin Raiciu

 

Process identity based firewalling

515

Kane Walter,

Surya Nepal

and Salil Kanhere

 

Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning

528

Bhuvnesh Chaturvedi,

Anirban Chakraborty,

Ayantika Chatterjee

and Debdeep Mukhopadhyay

 

"Ask and Thou Shall Receive": Reaction-based Full Key Recovery Attacks on FHE

531

Heewon Baek,

Minwook Lee

and Hyoungshick Kim

 

CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse

533

Jiuheng Su,

Zhili Chen,

Haifeng Qian

and Junqing Gong

 

Efffcient and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection

534  

Emad Efatinasab,

Alessandro Brighente,

Mirco Rampazzo,

Nahal Azadi

and Mauro Conti

 

GAN-GRID: A Novel Adversarial Attack on Smart Grid Stability Prediction

546 

Junping Wan,

Danjie Li,

Junbing Fang

and Zoe L. Jiang

 

LPFHE: Low-complexity Polynomial CNNs for Secure Inference over FHE

549

Tjard Langhout,

 Huanhuan Chen

and Kaitai Liang

File-Injection Attacks on Searchable Encryption, Based on Binomial Structures

ID

Authors

Title

 

10

 

Jan Philip Thoma,

Florian Stolz

and Tim Güneysu

 

CIPS: The Cache Intrusion Prevention System

12

Vasisht Duddu,

Anudeep Das,

Nora Khayata,

Hossein Yalame

Thomas Schneider

and N. Asokan

 

Attesting Distributional Properties of Training Data for Machine Learning

16

Yuanmin Huang,

Mi Zhang,

Daizong Ding,

Erling Jiang,

Qifan Xiao,

Xiaoyu You,

Yuan Tian

and Min Yang

 

Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization

19

Hojune Shin,

Jina Choi,

Dain Lee,

Kyoungok Kim

and Younho Lee

 

Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest

32

Bao Gia Doan,

Dang Quang Nguyen,

Paul Montague,

Tamas Abraham,

Olivier De Vel,

Seyit Camtepe,

Salil S. Kanhere,

Ehsan Abbasnejad

and Damith C. Ranasinghe

 

Bayesian Learned Models Can Detect Adversarial Malware For Free

57

Fabio De Gaspari,

Dorjan Hitaj

and Luigi V. Mancini

 

Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

65

Feixiang Zhao,

Huaxiong Wang

and Jian Weng

 

Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices

69

Julien Piet,

Maha Alrashed,

Chawin Sitawarin,

Sizhe Chen,

Zeming Wei,

Basel Alomair

and David Wagner

 

Jatmo: Prompt Injection Defense by Task-Specific Finetuning

77

Choongin Lee,

Isa Jafarov,

Sven Dietrich

and Heejo Lee

 

PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering

93

Li-Chang Lai,

Jiaxiang Liu,

Xiaomu Shi,

Ming-Hsien Tsai,

Bow-Yaw Wang

and Bo-Yin Yang

 

Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking

95

Prashanthi Mallojula,

Fengjun Li,

Xiaojiang Du

and Bo Luo

 

Companion Apps or Backdoors? On the Security of Automotive Companion Apps

100

Changsong Jiang,

Chunxiang Xu

and Guomin Yang

 

Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication

115

Weijie Chen,

Yu Zhao,

Yinqian Zhang,

Weizhong Qiang,

Deqing Zou

and Hai Jin

 

ReminISCence: Trusted Monitoring Against Privileged Preemption Side-channel Attacks

118

David Joseph,

Carlos Aguilar-Melchor,

Douglas Stebila,

Jason Goertzen,

Adrien Guinet

and Thomas Bailleux

 

TurboTLS: TLS connection establishment with 1 less round trip

126

Lola-Baie Mallordy,

Léo Robert,

Pascal Lafourcade

and Charles Olivier-Anclin

 

Secure Keyless Multi-Party Storage Scheme

128

Luisa Siniscalchi

and Ivan Visconti

 

Incremental Time-Deniable Signatures

143

Michal Tereszkowski-Kaminski,

Santanu Kumar Dash

and Guillermo Suarez-Tangil

 

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

150

Yu Luo,

Weifeng Xu

and Dianxiang Xu

 

Predicting Code Vulnerability Types via Heterogeneous GNN Learning

157

Lucien K. L. Ng,

Panagiotis

Chatzigiannis,

Duc V. Le, Mohsen Minaei,

Ranjit Kumaresan

and Mahdi Zamani

 

Cumulus: A Plug-and-Play Long Range Defense System for Proof of Stake Blockchains

160

Baiyang Li,

Yujia Zhu,

Yong Ding,

Yong Sun,

Yuedong Zhang,

Qingyun Liu

and Li Guo

 

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures

162

Shangtong Cao,

Ningyu He,

Yao Guo

and Haoyu Wang

 

WASMixer: Binary Obfuscation for WebAssembly

164

Ning Luo,

Chenkai Weng,

Jaspal Singh,

Gefei Tan,

Mariana Raykova

and Ruzica Piskac

 

Privacy-Preserving Regular Expression Matching using TNFA

169

Pyeongju Ahn,

Yeonseok Jang,

Seunghoon Woo

and Heejo Lee

 

BLOOMFUZZ: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines

192

Volodymyr

Bezsmertnyi,

Jean-Michel

Cioranesco

and Thomas

Eisenbarth

 

Duplication-Based Fault Tolerance for RISC-V Embedded Software

193

Björn Ho,

Huanhuan Chen,

Zeshun Shi

and Kaitai Liang

 

Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages

199

Nanyu Zhong,

Yueqi Chen,

Yanyan Zou,

Xinyu Xing,

Jinwei Dong,

Bingcheng Xian,

Jiaxu Zhao,

Menghao Li,

Binghong Liu

and Wei Huo

 

TGRop: Top Gun of Return-Oriented Programming Automation

205 

Xianlong Wang,

Shengshan Hu,

Peng Xu,

Wei Liu,

Leo Yu Zhang,

Minghui Li

and Yanjun Zhang

 

PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds

207

Yifan Wu,

Yinshuai Li,

Hong Zhu

and Yinqian Zhang

 

SAEG: Stateful Automatic Exploit Generation

208

Yuxi Xue,

Xingye Lu,

Man Ho Au

and Chengru Zhang

 

Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations

210

Jeroen Robben

and Mathy Vanhoef

Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations

 

53

Kamil Malinka,

Anton Firc,

Petr Kaška,

Tomáš Lapšanský,

Oskar Šandor

and Ivan Homoliak

 

  Resilience of Voice Assistants to Synthetic Speech

68

Yangyang Shi,

Linan Tian,

Liwei Chen,

Yanqi Yang

and Gang Shi

 

Scheduled Execution-based Binary Indirect Call Targets Refinement

72

Zhiwei Li,

Jun Xu,

Yanli Zou

and Lei Hu

 

Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario

167  

Zhiqiang Hao,

Chuanyi Li,

Xiao Fu,

Bin Luo

and Xiaojiang Du

Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques

Accepted papers

Last updated on July 5, 2024

General Chairs: michal.choras@pbs.edu.pl (general inquiries)

PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)

Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)