Winter Cycle
ID |
Authors |
Title |
10 |
Thoma, Stolz, Güneysu |
CIPS: The Cache Intrusion Prevention System |
12 |
Duddu, Das, Khayata, Yalame, Schneider, Asokan |
Attesting Distributional Properties of Training Data for Machine Learning |
16 |
Huang, Zhang, Ding, Jiang, Xiao, You, Tian, Yang |
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization |
19 |
Shin, Choi, Lee, Kim, Lee |
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest |
32 |
Doan, Nguyen, Montague, Abraham, De Vel, Camtepe, Kanhere, Abbasnejad, Ranasinghe |
Bayesian Learned Models Can Detect Adversarial Malware For Free |
57 |
De Gaspari, Hitaj, Mancini |
Have You Poisoned My Data? Defending Neural Networks against Data Poisoning |
65 |
Zhao, Wang, Weng |
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices |
69 |
Piet, Alrashed, Sitawarin, Chen, Wei, Alomair, Wagner |
Jatmo: Prompt Injection Defense by Task-Specific Finetuning |
77 |
Lee, Jafarov, Dietrich, Lee |
PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering |
93 |
Lai, Liu, Shi, Tsai, Wang, Yang |
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking |
95 |
Mallojula, Li, Du, Luo |
Companion Apps or Backdoors? On the Security of Automotive Companion Apps |
100 |
Jiang, Xu, Yang |
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication |
115 |
Chen, Zhao, Zhang, Qiang, Zou, Jin |
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-channel Attacks |
118 |
Joseph, Aguilar-Melchor, Stebila, Goertzen, Guinet, Bailleux |
TurboTLS: TLS connection establishment with 1 less round trip |
126 |
Mallordy, Robert, Lafourcade, Olivier-Anclin |
Secure Keyless Multi-Party Storage Scheme |
128 |
Siniscalchi, Visconti |
Incremental Time-Deniable Signatures |
143 |
Tereszkowski-Kaminski, Dash, Suarez-Tangil |
A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums |
150 |
Luo, Xu, Xu |
Predicting Code Vulnerability Types via Heterogeneous GNN Learning |
157 |
Ng, Chatzigiannis, Le, Minaei, Kumaresan, Zamani |
Cumulus: A Plug-and-Play Long Range Defense System for Proof of Stake Blockchains |
160 |
Li, Zhu, Ding, Sun, Zhang, Liu, Guo |
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures |
162 |
Cao, He, Guo, Wang |
WASMixer: Binary Obfuscation for WebAssembly |
164 |
Luo, Weng, Singh, Tan, Raykova, Piskac |
Privacy-Preserving Regular Expression Matching using TNFA |
169 |
Ahn, Jang, Woo, Lee |
BLOOMFUZZ: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines |
192 |
Bezsmertnyi, Cioranesco, Eisenbarth |
Duplication-Based Fault Tolerance for RISC-V Embedded Software |
193 |
Ho, Chen, Shi, Liang |
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages |
199 |
Zhong, Chen, Zou, Xing, Dong, Xian, Zhao, Li, Liu, Huo |
TGRop: Top Gun of Return-Oriented Programming Automation |
205 |
Wang, Li, Xu, Liu, Zhang, Hu, Zhang |
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds |
207 |
Wu, Li, Zhu, Zhang |
SAEG: Stateful Automatic Exploit Generation |
208 |
Xue, Lu, Au, Zhang |
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations |
210 |
Robben, Vanhoef |
Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations |
General Chairs: michal.choras@pbs.edu.pl (general inquiries)
PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)
Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)