| CryptNyx: Password-hardened encryption with strong anonymity guarantees | T. Dimitriou, S. Alshaher |
| SimSeq: A Robust TLS Traffic Classification Method | J. Cheng, F. Zeng |
| A Graph-Based Approach to Alert Contextualisation in Security Operations Centres | M. W. Eckhoff, P. M. Flydal, S. Peters, M. Eian, J. Halvorsen, V. Mavroeidis, G. Grov |
| Simulation-based Software Leakage Evaluation for the RISC-V Platform | N. Schmitt, J. Zeitschner, A. Heinemann |
| Efficient Dynamic Group Signatures with Forward Security | A. Mohammadali, R. AlTawy |
| Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA | Z. Zhang, Y. Chen, L. Song, Y. Lv |
| HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection | Y. Shen, H. Sun, J. Wang, H. Xu, G. Liu, F. Zhang |
| Towards Architecture-Independent Function Call Analysis for IoT Malware | K. Ma, C. Han, A. Tanaka, T. Takahashi, J. Takeuchi |
| HyperSec: an Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection | L. Hemmerle, G. Hiet, F. Tronel, P. Wilke, J.-C. Prevotet |
| Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures | W. Nakamura, Y. Suzuki, M. Fujio, K. Takahashi |
| BootMarker: UEFI Bootkit Defense via Control-Flow Verification | J. Lee, J. Kwon, M. Lee, H. Seo, J. Jung |
| Keyless Physical-Layer Cryptography | S. Liu, D. Cai, D. Han, H. Liu, X. Lu |
| Zero Trust Continuous Authentication Models and Automated Policy Formulation | N. Vombatkere, P. W. L. Fong |
| A New Code-Based Formulation of the Fuzzy Vault Scheme | S. Majbour, M. Barbier, J.-M. Le Bars |
| Jakiro: A Cross-modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts | Z. Niu, X. Li, H. Zhao, T. Zhou, H. Cheng |
| (Best Paper Award) The Multi-User Security of GCM-SST and Further Enhancements | Y. Naito, Y. Sasaki, T. Sugawara |
| GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks Via Global Indirect Replacement | H. Ma, Z. Wang, D. Xie, C. Ouyang, W. Song |
| Inference Attacks on Encrypted Online Voting via Traffic Analysis | A. Belousova, F. Marchiori, M. Conti |
| MSPP-Net: Fine-grained image privacy identification via multi-stage semantic perception | Y. Li, B. Chen, Q. Jiang, T. Chen |
| EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing using Evolutionary Game Theory | C. Wang, B. Yu, L. Yang |
| Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning | X. Huang, X. Zhu, C. Chen |
| Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment | X. Bai, Y. Wang, J. Du, C. Liang, S. Liang, Z. Jiang |
| Conditional Attribute-Based PRE: Definition and Construction from LWE | L. Yao, J. Weng, P. Wu, G. Tang, G. Yang, H. Xue, R. H. Deng |
| Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images | S. R. Khan, T. Islam, R. Hasan |
| HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection | R. Norouzian, C. Eckert |
| LastRings: Lattice-based Scalable Threshold Ring Signatures | S. Jeon, C. A. Haidar, M. Tibouchi |
| BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques | C. Feng, L. Fan |
| A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? | J. Henrich, N. Schmitt, N. Alnahawi, A. Heinemann |