Accepted Papers

CryptNyx: Password-hardened encryption with strong anonymity guaranteesT. Dimitriou, S. Alshaher
SimSeq: A Robust TLS Traffic Classification MethodJ. Cheng, F. Zeng
A Graph-Based Approach to Alert Contextualisation in Security Operations CentresM. W. Eckhoff, P. M. Flydal, S. Peters, M. Eian, J. Halvorsen, V. Mavroeidis, G. Grov
Simulation-based Software Leakage Evaluation for the RISC-V PlatformN. Schmitt, J. Zeitschner, A. Heinemann
Efficient Dynamic Group Signatures with Forward SecurityA. Mohammadali, R. AlTawy
Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENAZ. Zhang, Y. Chen, L. Song, Y. Lv
HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat DetectionY. Shen, H. Sun, J. Wang, H. Xu, G. Liu, F. Zhang
Towards Architecture-Independent Function Call Analysis for IoT MalwareK. Ma, C. Han, A. Tanaka, T. Takahashi, J. Takeuchi
HyperSec: an Extensible Hypervisor-Assisted Framework for Kernel Rootkit DetectionL. Hemmerle, G. Hiet, F. Tronel, P. Wilke, J.-C. Prevotet
Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy SignaturesW. Nakamura, Y. Suzuki, M. Fujio, K. Takahashi
BootMarker: UEFI Bootkit Defense via Control-Flow VerificationJ. Lee, J. Kwon, M. Lee, H. Seo, J. Jung
Keyless Physical-Layer CryptographyS. Liu, D. Cai, D. Han, H. Liu, X. Lu
Zero Trust Continuous Authentication Models and Automated Policy FormulationN. Vombatkere, P. W. L. Fong
A New Code-Based Formulation of the Fuzzy Vault SchemeS. Majbour, M. Barbier, J.-M. Le Bars
Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart ContractsZ. Niu, X. Li, H. Zhao, T. Zhou, H. Cheng
(Best Paper Award) The Multi-User Security of GCM-SST and Further EnhancementsY. Naito, Y. Sasaki, T. Sugawara
GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect ReplacementH. Ma, Z. Wang, D. Xie, C. Ouyang, W. Song
Inference Attacks on Encrypted Online Voting via Traffic AnalysisA. Belousova, F. Marchiori, M. Conti
MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perceptionY. Li, B. Chen, Q. Jiang, T. Chen
EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game TheoryC. Wang, B. Yu, L. Yang
Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-TuningX. Huang, X. Zhu, C. Chen
Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal AlignmentX. Bai, Y. Wang, J. Du, C. Liang, S. Liang, Z. Jiang
Conditional Attribute-Based PRE: Definition and Construction from LWEL. Yao, J. Weng, P. Wu, G. Tang, G. Yang, H. Xue, R. H. Deng
Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated ImagesS. R. Khan, T. Islam, R. Hasan
HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware DetectionR. Norouzian, C. Eckert
LastRings: Lattice-based Scalable Threshold Ring SignaturesS. Jeon, C. A. Haidar, M. Tibouchi
BlockLens: Detecting Malicious Transactions in Ethereum Using LLM TechniquesC. Feng, L. Fan
A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection?J. Henrich, N. Schmitt, N. Alnahawi, A. Heinemann