Winter Cycle

 ID

Authors 

Title

10

Thoma, Stolz, Güneysu

CIPS: The Cache Intrusion Prevention System

12

Duddu, Das, Khayata, Yalame,

Schneider, Asokan

Attesting Distributional Properties of Training Data for Machine Learning

16

Huang, Zhang, Ding, Jiang,

Xiao, You, Tian, Yang

Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization

19

Shin, Choi, Lee, Kim, Lee

Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest

32

Doan, Nguyen, Montague, Abraham,

De Vel, Camtepe, Kanhere,

Abbasnejad, Ranasinghe

Bayesian Learned Models Can Detect Adversarial Malware For Free

57

De Gaspari, Hitaj, Mancini

Have You Poisoned My Data? Defending Neural Networks against Data Poisoning

65

Zhao, Wang, Weng

Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices

69

Piet, Alrashed, Sitawarin,

Chen, Wei, Alomair, Wagner

Jatmo: Prompt Injection Defense by Task-Specific Finetuning

77

Lee, Jafarov, Dietrich, Lee

PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering

93

Lai, Liu, Shi, Tsai,

Wang, Yang

Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking

95

Mallojula, Li, Du, Luo

Companion Apps or Backdoors? On the Security of Automotive Companion Apps

100

Jiang, Xu, Yang

Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication

115

Chen, Zhao, Zhang, Qiang, Zou, Jin

ReminISCence: Trusted Monitoring Against Privileged Preemption Side-channel Attacks

118

Joseph, Aguilar-Melchor,

Stebila, Goertzen, Guinet,

Bailleux

TurboTLS: TLS connection establishment with 1 less round trip

126

Mallordy, Robert,

Lafourcade, Olivier-Anclin

Secure Keyless Multi-Party Storage Scheme

128

Siniscalchi, Visconti

Incremental Time-Deniable Signatures

143

Tereszkowski-Kaminski,

Dash, Suarez-Tangil

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

150

Luo, Xu, Xu

Predicting Code Vulnerability Types via Heterogeneous GNN Learning

157

Ng, Chatzigiannis,

Le, Minaei,

Kumaresan, Zamani

Cumulus: A Plug-and-Play Long Range Defense System for Proof of Stake Blockchains

160

Li, Zhu, Ding, Sun, Zhang,

Liu, Guo

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures

162

Cao, He, Guo, Wang

WASMixer: Binary Obfuscation for WebAssembly

164

Luo, Weng, Singh, Tan,

Raykova, Piskac

Privacy-Preserving Regular Expression Matching using TNFA

169

Ahn, Jang, Woo, Lee

BLOOMFUZZ: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines

192

Bezsmertnyi, Cioranesco,

Eisenbarth

Duplication-Based Fault Tolerance for RISC-V Embedded Software

193

Ho, Chen, Shi, Liang

Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages

199

Zhong, Chen, Zou, Xing,

Dong, Xian, Zhao, Li, Liu,

Huo

TGRop: Top Gun of Return-Oriented Programming Automation

205

Wang, Li, Xu, Liu,

Zhang, Hu, Zhang

PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds

207

Wu, Li, Zhu, Zhang

SAEG: Stateful Automatic Exploit Generation

208

Xue, Lu, Au, Zhang

Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations

210

Robben, Vanhoef

Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations

 

 

Accepted papers

Last updated on June 14, 2024

General Chairs: michal.choras@pbs.edu.pl (general inquiries)

PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)

Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)