Acceptance rate: 16%
(86 out of 535 submissions)
Spring Cycle
Winter Cycle
ID |
Authors |
Title |
252 |
Rui Lian, Yulong Ming, Chengjun Cai, Yifeng Zheng, Cong Wang and Xiaohua Jia
|
Nemesis: Combating Abusive Information in Encrypted Messaging with Private Reporting |
258 |
Junlin He, Lingguang Lei, Yuewu Wang, Pingjian Wang and Jiwu Jing
|
ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme based on RP Anonymization |
273 |
Yihao Luo, Yunjie Deng, Jingquan Ge, Zhenyu Ning and Fengwei Zhang
|
BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage |
274 |
Shang Shang, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang and Zhengwei Jiang
|
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts |
281 |
Md Mushfekur Rahman and Philip W.L. Fong
|
Social Control and Interactivity in Anonymous Public Events |
283 |
Xiangyu Hui and Sid Chi-Kin Chau
|
LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup |
286 |
Yukun Yan, Peng Tang, Rui Chen, Qilong Han and Ruochen Du
|
DPC: Filtering out Patch-based Poisoned Samples with Differential Privacy |
292 |
Nan Hu, Hua Wu, Hangyu Zhao, Shanshan Ni and Guang Cheng
|
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features |
297 |
Jieyu Zheng, Haoliang Zhu, Yifan Dong, Zhenyu Song, Zhenhao Zhang, Yafang Yang and Yunlei Zhao
|
Faster Post-Quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment |
298 |
Jiaxuan Fu, Ke Cheng, Yuheng Xia, Anxiao Song, Qianxing Li and Yulong Shen
|
Private Decision Tree Evaluation with Malicious Security via Function Secret Sharing |
299 |
Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan and Hai Jin
|
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification |
301 |
Omar Ibrahim and Roberto Di Pietro
|
MAG-JAM: Jamming Detection via Magnetic Emissions |
304 |
Keyang Liu, Xingxin Li and Tsuyoshi Takagi
|
Review the Cuckoo Hash-based Unbalanced Private Set Union: Leakage, Fix, and Optimization |
307 |
David Eklund, Alfonso Iacovazzi, Han Wang, Apostolos Pyrgelis and Shahid Raza
|
BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection |
308 |
Hamid Mozaffari, Sunav Choudhary and Amir Houmansadr
|
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning |
315 |
Sonakshi Garg and Vicenc Torra
|
Task-Specific Knowledge Distillation with Differential Privacy in LLMs |
316 |
Yulian Sun, Li Duan, Ricardo Mendes, Derui Zhu, Yue Xia, Yong Li and Asja Fischer
|
Exploiting Internal Randomness for Privacy in Vertical Federated Learning |
324 |
Jiahao Wu, Heng Pan, Penglai Cui, Yiwen Huang, Jianer Zhou, Peng He, Yanbiao Li, Zhenyu Li and Gaogang Xie
|
Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches |
325 |
Veronique Cortier, Alexandre Debant and Florian Moser
|
Code voting: when simplicity meets security |
326 |
Ubaid Ullah, Sonia Laudanna, Vinod P, Andrea Di Sorbo, Corrado Aaron Visaggio and Gerardo Canfora
|
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media |
336 |
Swantje Lange, Francesco Gringoli, Matthias Hollick and Jiska Classen
|
Wherever I May Roam: Stealthy Interception and Injection Attacks through Roaming Agreements |
338 |
Jean-Loup Hatchikian-Houdot, Pierre Wilke, Frédéric Besson and Guillaume Hiet
|
Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code |
341 |
Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu-Ming Yiu and Xuan Wang
|
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion |
349 |
Alessandro Palma and Marco Angelini
|
It Is Time To Steer: A Scalable Framework for Analysis-driven Attack Graph Generation |
363 |
Yu Chen, Lin Liu, Rongmao Chen, Shaojing Fu, Yuexiang Yang, Jiangyong Shi and Liangzhong He
|
Speedy Privacy-Preserving Skyline Queries on Outsourced Data |
382 |
Fei Hongming, Prosanta Gope, Owen Millwood and Biplab Sikdar
|
Optimal Machine-Learning Attacks on Hybrid PUFs |
389 |
Vincent Gramoli, Zhenliang Lu, Qiang Tang and Pouriya Zarbafian
|
Resilience to Chain-Quality Attacks in Fair Separability |
396 |
Daniel De Pascale, Giuseppe Cascavilla, Damian Tamburri and Willem-Jan Van Den Heuvel
|
CRATOR a CRAwler for TOR: Turning Dark Web Pages Into Open Source INTelligence |
404 |
Maximilian Radoy, Sven Hebrok and Juraj Somorovsky
|
In Search of Partitioning Oracle Attacks Against TLS Session Tickets |
421 |
Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang and Fran Casino
|
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection |
433 |
Xinrong Liu, He Wang, Meng Xu and Yuqing Zhang
|
SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries |
455 |
Mirco Beltrame, Mauro Conti, Pierpaolo Guglielmin, Francesco Marchiori and Gabriele Orazi
|
RedactBuster: Entity Type Recognition from Redacted Documents |
460 |
Youcef Korichi, Sébastien Gambs, Nadia Tawbi and Josée Desharnais
|
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation |
462 |
Hongbo Xu, Zhenyu Cheng, Shuhao Li, Chenxu Wang, Peishuai Sun, Jiang Xie and Qingyun Liu
|
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs |
465 |
Yungi Cho, Woorim Han, Miseon Yu, Younghan Lee, Ho Bae and Yunheung Paek
|
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification |
467 |
Marc-Antoine Faillon, Baptiste Bout, Julien Francq, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens and Reda Yaich
|
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach |
475 |
M. Caner Tol and Berk Sunar
|
ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMs |
491 |
Alpesh Bhudia, Dan O'Keeffe and Darren Hurley-Smith
|
Revoke: Mitigating Ransomware Attacks against Ethereum Validators |
496 |
Huseyin Gokay, Foteini Baldimtsi and Giuseppe Ateniese
|
Atomic Swap Protocol for Boneh–Lynn–Shacham (BLS) based Blockchains |
503 |
Wenxuan Wu, Soamar Homsi and Yupeng Zhang
|
Confidential and Verifiable Machine Learning Delegations on the Cloud |
504 |
Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo and Bo Luo
|
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking |
507 |
Qirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu and Rui Chang
|
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow |
508 |
Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim and Seyit Camtepe
|
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning |
509 |
Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen and Gene Tsudik
|
PIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants |
510 |
Radu-Alexandru Mantu, Mihai Chiroiu and Costin Raiciu
|
Process identity based firewalling |
515 |
Kane Walter, Surya Nepal and Salil Kanhere
|
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning |
528 |
Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee and Debdeep Mukhopadhyay
|
"Ask and Thou Shall Receive": Reaction-based Full Key Recovery Attacks on FHE |
531 |
Heewon Baek, Minwook Lee and Hyoungshick Kim
|
CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse |
533 |
Jiuheng Su, Zhili Chen, Haifeng Qian and Junqing Gong
|
Efffcient and Scalable Circuit-based Protocol for Multi-Party Private Set Intersection |
534 |
Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi and Mauro Conti
|
GAN-GRID: A Novel Adversarial Attack on Smart Grid Stability Prediction |
546 |
Junping Wan, Danjie Li, Junbing Fang and Zoe L. Jiang
|
LPFHE: Low-complexity Polynomial CNNs for Secure Inference over FHE |
549 |
Tjard Langhout, Huanhuan Chen and Kaitai Liang |
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures |
ID |
Authors |
Title |
10 |
Jan Philip Thoma, Florian Stolz and Tim Güneysu
|
CIPS: The Cache Intrusion Prevention System |
12 |
Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame Thomas Schneider and N. Asokan
|
Attesting Distributional Properties of Training Data for Machine Learning |
16 |
Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Qifan Xiao, Xiaoyu You, Yuan Tian and Min Yang
|
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization |
19 |
Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim and Younho Lee
|
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest |
32 |
Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad and Damith C. Ranasinghe
|
Bayesian Learned Models Can Detect Adversarial Malware For Free |
57 |
Fabio De Gaspari, Dorjan Hitaj and Luigi V. Mancini
|
Have You Poisoned My Data? Defending Neural Networks against Data Poisoning |
65 |
Feixiang Zhao, Huaxiong Wang and Jian Weng
|
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices |
69 |
Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Basel Alomair and David Wagner
|
Jatmo: Prompt Injection Defense by Task-Specific Finetuning |
77 |
Choongin Lee, Isa Jafarov, Sven Dietrich and Heejo Lee
|
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering |
93 |
Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang and Bo-Yin Yang
|
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking |
95 |
Prashanthi Mallojula, Fengjun Li, Xiaojiang Du and Bo Luo
|
Companion Apps or Backdoors? On the Security of Automotive Companion Apps |
100 |
Changsong Jiang, Chunxiang Xu and Guomin Yang
|
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication |
115 |
Weijie Chen, Yu Zhao, Yinqian Zhang, Weizhong Qiang, Deqing Zou and Hai Jin
|
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-channel Attacks |
118 |
David Joseph, Carlos Aguilar-Melchor, Douglas Stebila, Jason Goertzen, Adrien Guinet and Thomas Bailleux
|
TurboTLS: TLS connection establishment with 1 less round trip |
126 |
Lola-Baie Mallordy, Léo Robert, Pascal Lafourcade and Charles Olivier-Anclin
|
Secure Keyless Multi-Party Storage Scheme |
128 |
Luisa Siniscalchi and Ivan Visconti
|
Incremental Time-Deniable Signatures |
143 |
Michal Tereszkowski-Kaminski, Santanu Kumar Dash and Guillermo Suarez-Tangil
|
A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums |
150 |
Yu Luo, Weifeng Xu and Dianxiang Xu
|
Predicting Code Vulnerability Types via Heterogeneous GNN Learning |
157 |
Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc V. Le, Mohsen Minaei, Ranjit Kumaresan and Mahdi Zamani
|
Cumulus: A Plug-and-Play Long Range Defense System for Proof of Stake Blockchains |
160 |
Baiyang Li, Yujia Zhu, Yong Ding, Yong Sun, Yuedong Zhang, Qingyun Liu and Li Guo
|
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures |
162 |
Shangtong Cao, Ningyu He, Yao Guo and Haoyu Wang
|
WASMixer: Binary Obfuscation for WebAssembly |
164 |
Ning Luo, Chenkai Weng, Jaspal Singh, Gefei Tan, Mariana Raykova and Ruzica Piskac
|
Privacy-Preserving Regular Expression Matching using TNFA |
169 |
Pyeongju Ahn, Yeonseok Jang, Seunghoon Woo and Heejo Lee
|
BLOOMFUZZ: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines |
192 |
Volodymyr Bezsmertnyi, Jean-Michel Cioranesco and Thomas Eisenbarth
|
Duplication-Based Fault Tolerance for RISC-V Embedded Software |
193 |
Björn Ho, Huanhuan Chen, Zeshun Shi and Kaitai Liang
|
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages |
199 |
Nanyu Zhong, Yueqi Chen, Yanyan Zou, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao, Menghao Li, Binghong Liu and Wei Huo
|
TGRop: Top Gun of Return-Oriented Programming Automation |
205 |
Xianlong Wang, Shengshan Hu, Peng Xu, Wei Liu, Leo Yu Zhang, Minghui Li and Yanjun Zhang
|
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds |
207 |
Yifan Wu, Yinshuai Li, Hong Zhu and Yinqian Zhang
|
SAEG: Stateful Automatic Exploit Generation |
208 |
Yuxi Xue, Xingye Lu, Man Ho Au and Chengru Zhang
|
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations |
210 |
Jeroen Robben and Mathy Vanhoef |
Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations |
53 |
Kamil Malinka, Anton Firc, Petr Kaška, Tomáš Lapšanský, Oskar Šandor and Ivan Homoliak
|
Resilience of Voice Assistants to Synthetic Speech |
68 |
Yangyang Shi, Linan Tian, Liwei Chen, Yanqi Yang and Gang Shi
|
Scheduled Execution-based Binary Indirect Call Targets Refinement |
72 |
Zhiwei Li, Jun Xu, Yanli Zou and Lei Hu
|
Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario |
167 |
Zhiqiang Hao, Chuanyi Li, Xiao Fu, Bin Luo and Xiaojiang Du |
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques |
General Chairs: michal.choras@pbs.edu.pl (general inquiries)
PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)
Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)