Italian Trulli

ACM CCS 2024

October 14-18, 2024 Salt Lake City, U.S.A. Get Whova Now

ACCEPTED PAPERS

First Cycle

Title Author
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions Xueluan Gong (Wuhan University)
Rubin Wei (Wuhan University)
Ziyao Wang (Wuhan University)
Yuchen Sun (Wuhan University)
Jiawen Peng (Wuhan University)
Yanjiao Chen (Zhejiang University)
Qian Wang (Wuhan University)
Securely Training Decision Trees Efficiently Divyanshu Bhardwaj (Microsoft Research India)
Sandhya Saravanan (Microsoft Research India)
Nishanth Chandran (Microsoft Research, India)
Divya Gupta (Microsoft Research)
Isolate and detect the untrusted driver with a virtual box YongGang Li (the China University of Mining and Technology)
ShunRong Jiang (the China University of Mining and Technology)
Yu Bao (the China University of Mining and Technology)
PENGPENG CHEN (the China University of Mining and Technology)
Yong Zhou (the China University of Mining and Technology)
Yeh-Ching Chung (Chinese University of Hong Kong in Shenzhen)
Derecho: Privacy Pools with Proof-Carrying Disclosures Josh Beal (Yale University)
Ben Fisch (Yale University)
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries Sofia Celi (Brave)
Alex Davidson (Universidade NOVA de Lisboa & NOVA LINCS)
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis Xinhao Deng (Tsinghua University)
Qi Li (Tsinghua University)
Ke Xu (Tsinghua University)
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure Rei Ueno (Tohoku University)
Hiromichi Haneda (Tohoku University)
Naofumi Homma (Tohoku University)
Akiko Inoue (NEC Corporation)
Kazuhiko Minematsu (NEC Corporation)
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization Guopeng Lin (Fudan University)
Weili Han (Fudan University)
Wenqiang Ruan (Fudan University)
Ruisheng Zhou (Fudan University)
Lushan Song (Fudan University)
Bingshuai Li (Huawei Technologies)
Yunfeng Shao (Huawei Technologies)
Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware Haoyu Xiao (Fudan University)
Yuan Zhang (Fudan University)
Minghang Shen (Fudan University)
Chaoyang Lin (Fudan University)
Can Zhang (The State Key Laboratory of Mathematical Engineering and Advanced Computing)
Shengli Liu (The State Key Laboratory of Mathematical Engineering and Advanced Computing)
Min Yang (Fudan University)
LIFTFUZZ: Validating Binary Lifters through Context-aware Fuzzing with GPT Yutong Zhou (The Chinese University of Hong Kong)
Fan YANG (The Chinese University of Hong Kong)
Zirui Song (The Chinese Universiry of Hong Kong)
Ke Zhang (The Chinese Universiry of Hong Kong)
Jiongyi Chen (National University of Defense Technology)
Kehuan Zhang (Chinese University of Hong Kong)
Formal Privacy Proof of Heuristic Obfuscation – The Possibility and Impossibility of Learnable Encryption Hanshen Xiao (MIT)
G. Edward Suh (Cornell University / Meta)
Srinivas Devadas (Massachusetts Institute of Technology)
FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache Penghui Li (Zhongguancun Laboratory)
Mingxue Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)
Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys Marius Momeu (Technical University of Munich)
Simon Schnückel (Technical University of Munich)
Kai Angnis (Technical University of Munich)
Michalis Polychronakis (Stony Brook University)
Vasileios P. Kemerlis (Brown University)
Precio: Private Aggregate Measurement via Oblivious Shuffling Kim Laine (Microsoft Research)
Betül Durak (Microsoft Research)
Chenkai Weng (Northwestern University)
Melissa Chase (Microsoft Research)
Erik Anderson (Microsoft)
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget Jiankai Jin (The University of Melbourne)
Chitchanok Chuengsatiansup (The University of Melbourne)
Toby Murray (University of Melbourne)
Benjamin Rubinstein (University of Melbourne, Australia)
Yuval Yarom (Ruhr University Bochum)
Olga Ohrimenko (The University of Melbourne)
VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption Sylvain Chatel (EPFL)
Christian Knabenhans (EPFL)
Apostolos Pyrgelis (RISE)
Carmela Troncoso (EPFL)
Jean-Pierre Hubaux (EPFL)
Keeping Up with the KEMs: Stronger Security Notions for KEMs and automated analysis of KEM-based protocols Cas Cremers (CISPA Helmholtz Center for Information Security)
Alexander Dax (CISPA Helmholtz Center for Information Security)
Niklas Medinger (CISPA Helmholtz Center for Information Security)
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models Kunsheng Tang (University of Science and Technology of China)
Wenbo Zhou (University of Science and Technology of China)
Jie Zhang (Nanyang Technological University)
Aishan Liu (Beihang University)
Gelei Deng (Nanyang Technological University)
Shuai Li (University of Science and Technology of China)
Peigui Qi (University of Science and Technology of China)
Weiming Zhang (University of Science and Technology of China)
Tianwei Zhang (Nanyang Technological University)
NengHai Yu (School of Cyber Security, University of Science and Technology of China)
SafeEar: Content Privacy-Preserving Audio Deepfake Detection Xinfeng Li (Zhejiang University)
Kai Li (Tsinghua University)
Yifan Zheng (Zhejiang University)
Chen Yan (Zhejiang University)
Xiaoyu Ji (Zhejiang University)
Wenyuan Xu (Zhejiang University)
Lutris: A Blockchain Combining Broadcast and Consensus Sam Blackshear (MystenLabs)
Andrey Chursin (MystenLabs)
George Danezis (MystenLabs & University College London)
Anastasios Kichidis (MystenLabs)
Lefteris Kokoris-Kogias (MystenLabs & IST Austria)
Xun Li (MystenLabs)
Ashok Menon (MystenLabs)
Todd Nowacki (MystenLabs)
Alberto Sonnino (MystenLabs & University College London (UCL))
Williams (MystenLabs)
Lu Zhang (MystenLabs)
Batch Range Proof: How to Make Threshold ECDSA More Efficient Guofeng Tang (Ant Group)
Shuai Han (Shanghai Jiao Tong University)
Li Lin (Ant Group)
Changzheng Wei (Ant Group)
Ying Yan (Ant Group)
SECOMP: Formally Secure Compilation of Compartmentalized C Programs Jérémy Thibault (MPI-SP)
Roberto Blanco (MPI-SP)
Dongjae Lee (MPI-SP and Seoul National University)
Sven Argo (Ruhr University Bochum)
Arthur Azevedo de Amorim (Rochester Institute of Technology)
Aïna Linn Georges (MPI-SWS)
Catalin Hritcu (MPI-SP)
Andrew Tolmach (Portland State University)
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery Nicolas Mohnblatt (Geometry Research)
Alberto Sonnino (MystenLabs & University College London (UCL))
Kobi Gurkan (Geometry Research)
Philipp Jovanovic (University College London (UCL))
PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency Yuan Xu (Nanyang Technological University)
Gelei Deng (Nanyang Technological University)
Xinshuo Han (Nanyang Technological University)
Guanlin Li (Nanyang Technological University)
Han Qiu (Tsinghua University)
Tianwei Zhang (Nanyang Technological University)
Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks Xinyao Ma (Indiana University Bloomington)
Chaoqi Zhang (Indiana University Bloomington)
Huadi Zhu (The University of Texas at Arlington)
Jean Camp (Indiana University Bloomington)
Ming Li (The University of Texas at Arlington)
Xiaojing Liao (Indiana University Bloomington)
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies Guy Zyskind (MIT)
Avishay Yanai (None)
Alex Pentland (MIT)
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems Oubo Ma (Zhejiang University)
Yuwen Pu (Zhejiang University)
Linkang Du (Zhejiang University)
Yang Dai (National University of Defense Technology)
Ruo Wang (Chinese Aeronautical Establishment)
Xiaolei Liu (Institute of Computer Application, China Academy of Engineering Physics)
Yingcai Wu (Zhejiang University)
Shouling Ji (Zhejiang University)
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs Zidong Zhang (Shandong University)
Qinsheng Hou (Shandong University; QI-ANXIN Technology Research Institute)
Lingyun Ying (QI-ANXIN Technology Research Institute)
Wenrui Diao (Shandong University)
Yacong Gu (QI-ANXIN Technology Research Institute)
Rui Li (Shandong University)
Shanqing Guo (Shandong University)
Haixin Duan (Tsinghua University; Quancheng Laboratory)
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models Xinfeng Li (Zhejiang University)
Yuchen Yang (Johns Hopkins University)
Jiangyi Deng (Zhejiang University)
Chen Yan (Zhejiang University)
Yanjiao Chen (Zhejiang University)
Xiaoyu Ji (Zhejiang University)
Wenyuan Xu (Zhejiang University)
VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice Xingshuo Han (Nanyang Technological University)
Haozhao Wang (Huazhong University of Science and Technology)
Kangqiao Zhao (Nanyang Technological University)
Gelei Deng (Nanyang Technological University)
Yuan Xu (Nanyang Technological University)
Hangcheng Liu (Nanyang Technological University)
Han Qiu (Tsinghua University)
Tianwei Zhang (Nanyang Technological University)
Practical Post-Quantum Signatures for Privacy Sven Argo (Ruhr University Bochum)
Tim Güneysu (Ruhr University Bochum, Bochum, DFKI GmbH, Bremen)
Corentin Jeudy (Orange Labs, Applied Crypto Group; Univ Rennes, CNRS, IRISA)
Georg Land (Ruhr-University Bochum)
Adeline Roux-Langlois (Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, 14000 Caen, France)
Olivier Sanders (Orange Labs, France)
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols Wei Tong (Nanjing University)
Haoyu Chen (Nanjing University)
Jiacheng Niu (Nanjing University)
Sheng Zhong (Nanjing University)
Dye4AI: Assuring Data Boundary on Generative AI Services Shu Wang (George Mason University)
Kun Sun (George Mason University)
Yan Zhai (Visa Inc.)
CoGNN: Towards Secure and Efficient Collaborative Graph Learning Zhenhua Zou (Tsinghua University)
Zhuotao Liu (Tsinghua University)
Jinyong Shan (Sudo Technology Co.,LTD)
Qi Li (Tsinghua University)
Ke Xu (Tsinghua University)
Mingwei Xu (Tsinghua University)
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking Ben Weintraub (Northeastern University)
Jiwon Kim (Purdue University)
Ran Tao (Georgetown University)
Cristina Nita-Rotaru (Northeastern University)
Hamed Okhravi (MIT Lincoln Laboratory)
Dave (Jing) Tian (Purdue University)
Benjamin E. Ujcich (Georgetown University)
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS Jaehyung Kim (CryptoLab Inc.)
Jinyeong Seo (Seoul National University)
Yongsoo Song (Seoul National University)
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks Zhe Ren (Xidian University)
Xinghua Li (Xidian University)
Yinbin Miao (Xidian University)
Mengyao Zhu (Xidian University)
Shunjie Yuan (Xidian University)
Robert H. Deng (School of Information Systems, Singapore Management University, Singapore)
SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks Ronghai Yang (Sangfor Technologies Inc.)
Xianbo Wang (The Chinese University of Hong Kong)
Kaixuan Luo (The Chinese University of Hong Kong)
Xin Lei (Sangfor Technologies Inc.)
Ke Li (Sangfor Technologies Inc.)
Jiayuan Xin (Sangfor Technologies Inc.)
Wing Cheong Lau (The Chinese University of Hong Kong)
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries Francesca Falzon (ETH Zürich)
Esha Ghosh (Microsoft Research)
Kenny Paterson (ETH Zürich)
Roberto Tamassia (Brown University)
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? Anna Yoo Jeong Ha (University of Chicago)
Josephine Passananti (University of Chicago)
Ronik Bhaskar (University of Chicago)
Shawn Shan (University of Chicago)
Reid Southen (Concept Artist)
Haitao Zheng (University of Chicago)
Ben Y. Zhao (University of Chicago)
Toward Byzantine-Robust Decentralized Federated Learning Minghong Fang (Duke University)
Zifan Zhang (North Carolina State University)
Hairi (University of Wisconsin-Whitewater)
Prashant Khanduri (Wayne State University)
Jia (Kevin) Liu (The Ohio State University)
Songtao Lu (IBM Thomas J. Watson Research Center)
Neil Gong (Duke University)
Yuchen Liu (North Carolina State University)
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness Hao Xiang (Xidian University)
Zehui Cheng (Xidian Univerisity)
Jinku Li (Xidian University)
Jianfeng Ma (Xidian University)
Kangjie Lu (University of Minnesota)
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems Zheng Fang (Wuhan University)
Tao Wang (Wuhan University)
Lingchen Zhao (Wuhan University)
Shenyi Zhang (Wuhan University)
Bowen Li (Wuhan University)
Yunjie Ge (Wuhan University)
Qi Li (Tsinghua University; BNRist)
Chao Shen (Xi'an Jiaotong University)
Qian Wang (Wuhan University)
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts Ruijie Li (Southeast University; QI-ANXIN Technology Research Institute)
Chenyang Zhang (Fudan University)
Huajun Chai (QI-ANXIN Technology Research Institute)
Lingyun Ying (QI-ANXIN Technology Research Institute; Tsinghua University-QI-ANXIN Group JCNS)
Haixin Duan (Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS)
Jun Tao (Southeast University)
Secure Vickrey Auctions with Rational Parties Chaya Ganesh (Indian Institute of Science)
Shreyas Gupta (Indian Institute of Science)
Bhavana Kanukurthi (Indian Institute of Science)
Girisha Shankar (Indian Institute of Science)
Non-interactive VSS using Class Groups and Application to DKG Aniket Kate (Supra Research / Purdue University)
Easwar Mangipudi (Supra Research)
Pratyay Mukherjee (Supra Research)
Hamza Saleem (Supra Research)
Sri Aravinda Krishnan Thyagarajan (NTT Research)
Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs Evangelia Anna Markatou (TU Delft)
Roberto Tamassia (Brown University)
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications Tong Zhu (Shanghai Jiao Tong University)
Chaofan Shou (UC Berkeley)
Zhen Huang (Shanghai Jiao Tong University)
Guoxing Chen (Shanghai Jiao Tong University)
Xiaokuan Zhang (George Mason University)
Yan Meng (Shanghai Jiao Tong University)
Shuang Hao (University of Texas at Dallas)
Haojin Zhu (Shanghai Jiao Tong University)
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network Ben Weintraub (Northeastern University)
Satwik Prabhu Kumble (TU Delft)
Cristina Nita-Rotaru (Northeastern University)
Stefanie Roos (TU Delft)
Zero-Knowledge Proofs of Training for Deep Neural Networks Kasra Abbasazadeh (University of Maryland)
Christodoulos Pappas (The Hong Kong University of Science and Technology)
Dimitrios Papadopoulos (The Hong Kong University of Science and Technology)
Jonathan Katz (University of Maryland)
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors Zijin Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Yue Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Jinwen He (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
AuthSaber: Automated Safety Verification of OpenID Connect Programs Tamjid Al Rahat (University of California, Los Angeles)
Yu Feng (University of California, Santa Barbara)
Yuan Tian (University of California, Los Angeles)
Testing side-channel security of cryptographic implementations against future microarchitectures Gilles Barthe (Max Planck Institute for Security and Privacy & IMDEA Software Institute)
Marcel Böhme (Max Planck Institute for Security and Privacy)
Sunjay Cauligi (Max Planck Institute for Security and Privacy)
Chitchanok Chuengsatiansup (The University of Melbourne)
Daniel Genkin (Georgia Tech)
Marco Guarnieri (IMDEA Software Institute)
David Mateos Romero (IMDEA Software Institute)
Peter Schwabe (Max Planck Institute for Security and Privacy & Radboud University)
David Wu (University of Adelaide)
Yuval Yarom (Ruhr University Bochum)
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces Nathaniel Bennett (University of Florida)
Weidong Zhu (University of Florida)
Benjamin Simon (University of Florida)
Ryon Kennedy (University of Florida)
William Enck (North Carolina State University)
Patrick Traynor (University of Florida)
Kevin Butler (University of Florida)
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption Long Meng (University of Surrey)
Liqun Chen (University of Surrey)
Yangguang Tian (University of Surrey)
Mark Manulis (Universität der Bundeswehr München)
zkPi: Proving Lean Theorems in Zero-Knowledge Evan Laufer (Stanford University)
Alex Ozdemir (Stanford University)
Dan Boneh (Stanford University)
Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication Kailun Yan (Shandong University; George Mason University)
Xiaokuan Zhang (George Mason University)
Wenrui Diao (Shandong University)
A Succinct Range Proof for Polynomial-based Vector Commitment Rui Gao (Nanjing University of Posts and Telecommunications)
Zhiguo Wan (Zhejiang Lab, Hangzhou, China)
Yuncong Hu (Shanghai Jiao Tong University)
huaqun wang (Nanjing University of Posts and Telecommunications)
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors Kevin Warren (University of Florida)
Tyler Tucker (University of Florida)
Anna Crowder (University of Florida)
Daniel Olszewski (University of Florida)
Allison Lu (University of Florida)
Caroline Fedele (University of Florida)
Magdalena Pasternak (University of Florida)
Seth Layton (University of Florida)
Kevin Butler (University of Florida)
Carrie Gates (Bank of America)
Patrick Traynor (University of Florida)
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography Akhil Bandarupalli (Purdue University)
Adithya Bhat (Visa Research)
Saurabh Bagchi (Purdue University)
Aniket Kate (Purdue University / Supra Research)
Michael K. Reiter (Duke University)
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography Sourav Das (University of Illinois at Urbana Champaign)
Sisi Duan (Tsinghua University)
Shengqi Liu (Southern University of Science and Technology)
Atsuki Momose (University of Illinois at Urbana-Champaign)
Ling Ren (University of Illinois at Urbana-Champaign)
Victor Shoup (Offchain Labs)
Asynchronous Authentication Marwa Mouallem (Technion - Israel Institute of Technology)
Ittay Eyal (Technion - Israel Institute of Technology)
Blocking Tracking JavaScript at the Function Granularity Abdul Haddi Amjad (Virginia Tech)
Shaoor Munir (University of California, Davis)
Zubair Shafiq (University of California, Davis)
Muhammad Ali Gulzar (Virginia Tech)
Blockchain Bribing Attacks and the Efficacy of Counterincentives Dimitris Karakostas (University of Edinburgh)
Aggelos Kiayias (University of Edinburgh and IOG)
Thomas Zacharias (University of Glasgow)
ReactAppScan: Mining React Application Vulnerabilities via Component Graph Zhiyong Guo (Johns Hopkins University)
Mingqing Kang (Johns Hopkins University)
V.N. Venkatakrishnan (UIC)
Rigel Gjomemo (Discovery Partners Institute, UIC)
Yinzhi Cao (Johns Hopkins University)
On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead) Davide Davoli (Université Côte d’Azur, Inria)
Tamara Rezk (Inria, Université Côte d’Azur)
Martin Avanzini (Inria, Université Côte d’Azur)
Defying the Odds: Solana’s Unexpected Resilience in Spite of the Security Challenges Faced by Developers Sebastien Andreina (NEC Labs Europe)
Tobias Cloosters (University of Duisburg-Essen)
Lucas Davi (University of Duisburg-Essen)
Jens-Rene Giesen (University of Duisburg-Essen)
Marco Gutfleisch (Ruhr University Bochum)
Ghassan Karame (Ruhr University Bochum)
Alena Naiakshina (Ruhr University Bochum)
Houda Naji (Ruhr University Bochum)
zkLLM: Zero Knowledge Proofs for Large Language Models Haochen Sun (University of Waterloo)
Jason Li (University of Waterloo)
Hongyang Zhang (University of Waterloo)
Glitch-Stopping Circuits: Hardware Secure Masking without Registers Zhenda Zhang (COSIC, KU Leuven)
Svetla Petkova-Nikova (COSIC, KU Leuven, University of Bergen)
Ventzislav Nikov (NXP Semiconductors)
Understanding Routing-Induced Censorship Changes Globally Abhishek Bhaskar (Georgia Tech)
Paul Pearce (Georgia Tech)
AITIA: Efficient Secure Computation of Bivariate Causal Discovery Truong Son Nguyen (Arizona State University)
Lun Wang (Google)
Evgenios M. Kornaropoulos (George Mason University)
Ni Trieu (Arizona State University)
Non-Transferable Anonymous Tokens by Secret Binding F. Betül Durak (Microsoft Research)
Laurane Marco (EPFL)
Abdullah Talayhan (EPFL)
Serge Vaudenay (EPFL)
Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions Shubham Agarwal (CISPA Helmholtz Center for Information Security)
Aurore Fass (CISPA Helmholtz Center for Information Security)
Ben Stock (CISPA Helmholtz Center for Information Security)
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries Danning Xie (Purdue University)
Zhuo Zhang (Purdue University)
Nan Jiang (Purdue University)
Xiangzhe Xu (Purdue University)
Lin Tan (Purdue University)
Xiangyu Zhang (Purdue University)
RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection Penghao Wang (Ocean University of China)
Jingzhi Hu (Nanyang Technological University)
Chao Liu (Ocean University of China)
Jun Luo (Nanyang Technological University)
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices Kaizheng Liu (Southeast University)
Ming Yang (Southeast University)
Zhen Ling (Southeast University)
Yue Zhang (Drexel University)
Chongqing Lei (Southeast University)
Junzhou Luo (Southeast University)
Xinwen Fu (University of Massachusetts Lowell)
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery Chenglu Jin (CWI Amsterdam)
Chao Yin (Vrije University, Amsterdam)
Marten van Dijk (CWI Amsterdam)
Sisi Duan (Tsinghua University)
Fabio Massacci (Vrije University, Amsterdam)
Michael K. Reiter (Duke University)
Haibin Zhang (Yangtze Delta Region Institute of Tsinghua University, Zhejiang)
MGTBench: Benchmarking Machine-Generated Text Detection Xinlei He (The Hong Kong University of Science and Technology (Guangzhou))
Xinyue Shen (CISPA Helmholtz Center for Information Security)
Zeyuan Chen (CISPA Helmholtz Center for Information Security)
Michael Backes (CISPA Helmholtz Center for Information Security)
Yang Zhang (CISPA Helmholtz Center for Information Security)
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices Ron Steinfeld (Monash University)
Amin Sakzad (Monash University)
Muhammed F. Esgin (Monash University)
Veronika Kuchta (Florida Atlantic University)
Mert Yassi (Monash University)
Raymond K. Zhao (CSIRO's Data61)
HElium: Scalable MPC among Lightweight Participants and under Churn Christian Mouchet (EPFL)
Sylvain Chatel (EPFL)
Apostolos Pyrgelis (RISE)
Carmela Troncoso (EPFL)
Security–Throughput Tradeoff of Nakamoto Consensus under Bandwidth Constraints Lucianna Kiffer (ETH Zurich)
Joachim Neu (Stanford University)
Srivatsan Sridhar (Stanford University)
Aviv Zohar (Hebrew University of Jerusalem)
David Tse (Stanford University)
On Understanding and Forecasting Fuzzers Performance with Static Analysis Dongjia Zhang (EURECOM)
Andrea Fioraldi (EURECOM)
Davide Balzarotti (EURECOM)
UWB-AD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips Yuqiao Yang (University of Electronic Science and Technology of China)
Zhongjie Wu (GoGoByte Technology Co.,Ltd)
Yongzhao Zhang (University of Electronic Science and Technology of China)
Ting Chen (University of Electronic Science and Technology of China)
Jun Li (GoGoByte Technology Co.,Ltd)
Jie Yang (University of Electronic Science and Technology of China)
Wenhao Liu (GoGoByte Technology Co.,Ltd)
Xiaosong Zhang (University of Electronic Science and Technology of China)
Ruicong Shi (GoGoByte Technology Co.,Ltd)
Jingwei Li (University of Electronic Science and Technology of China)
Yu Jiang (Tsinghua University)
Zhuo Su (Tsinghua University)
Distributed PIR: Scaling Private Messaging via the Users’ Machines Elkana Tovey (The Hebrew University of Jerusalem)
Jonathan Weiss (The Hebrew University of Jerusalem)
Yossi Gilad (The Hebrew University of Jerusalem)
Cross-silo Federated Learning with Record-level Personalized Differential Privacy Junxu Liu (Renmin University of China)
Jian Lou (Zhejiang University)
Li Xiong (Emory University)
Jinfei Liu (Zhejiang University)
Xiaofeng Meng (Renmin University of China)
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers Enriquillo Valdez (IBM Research)
Salman Ahmed (IBM Research)
Zhongshu Gu (IBM Research)
Christophe de Dinechin (Red Hat)
Pau-Chen Cheng (IBM Research)
Hani Jamjoom (IBM Research)
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns Chuanpu Fu (Tsinghua University)
Qi Li (Tsinghua University)
Meng Shen (Beijing Institute of Technology)
Ke Xu (Tsinghua University)
Reckle Trees: Updatable Merkle Batch Proofs with Applications Charalampos Papamanthou (Lagrange Labs and Yale University)
Shravan Srinivasan (Lagrange Labs)
Ismael Hishon-Rezaizadeh (Lagrange Labs)
Nicolas Gailly (Lagrange Labs)
Andrus Salumets (Lagrange Labs)
Stjepan Golemac (Lagrange Labs)
Practical Non-interactive Conjunctive Searchable Encryption with Leakage Suppression Yunling Wang (Xi'an University of Posts & Telecommunications, China)
Shi-Feng Sun (Shanghai Jiao Tong University)
Jianfeng Wang (Xidian University)
Xiaofeng Chen (Xidian University)
Joseph K. Liu (Monash University)
Dawu Gu (Shanghai Jiao Tong University)
Batching-Efficient RAM using Updatable Lookup Arguments Moumita Dutta (Indian Institute of Science)
Chaya Ganesh (Indian Institute of Science)
Sikhar Patranabis (IBM Research, India)
Shubh Prakash (Indian Institute of Science)
Nitin Singh (IBM Research, India)
Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers Daniel Escudero (J.P. Morgan AI Research & J.P. Morgan AlgoCRYPT CoE)
Antigoni Polychroniadou (J.P. Morgan AI Research & J.P. Morgan AlgoCRYPT CoE)
Yifan Song (Tsinghua University)
Chenkai Weng (Northwestern University)
SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures Tianfang Zhang (Rutgers University)
Qiufan Ji (New Jersey Institute of Technology)
Zhengkun Ye (Temple University)
Md Mojibur Rahman Redoy Akanda (Texas A&M University, College Station)
Ahmed Tanvir Mahdad (Texas A&M University, College Station)
Cong Shi (New Jersey Institute of Technology)
Yan Wang (Temple University)
Nitesh Saxena (Texas A&M University, College Station)
Yingying Chen (Rutgers University)
Practical Key-Extraction Attacks in Leading MPC Wallets Nikolaos Makriyannis (Fireblocks)
Oren Yomtov (Fireblocks)
Arik Galansky (Fireblocks)
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication Marc Fischlin (Technische Universität Darmstadt)
Olga Sanina (Technische Universität Darmstadt)
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense Hua Ma (CSIRO's Data61)
Shang Wang (University of Technology Sydney)
Yansong Gao (CSIRO's Data61)
Zhi Zhang (The University of Western Australia)
Huming Qiu (Fudan University)
Minhui Xue (CSIRO's Data61)
Alsharif Abuadbba (CSIRO's Data61)
Anmin Fu (Nanjing University of Science and Technology)
Surya Nepal (CSIRO’s Data61 Australia)
Derek Abbott (The University of Adelaide)
FOX: Coverage-guided Fuzzing as Online Stochastic Control Dongdong She (Hong Kong University of Science and Technology)
Adam Storek (Columbia University)
Yuchong Xie (Hong Kong University of Science and Technology)
Seoyoung Kweon (Columbia University)
Prashast Srivastava (Columbia University)
Suman Jana (Columbia University)
SeMalloc: Semantics-Informed Memory Allocator Ruizhe Wang (University of Waterloo)
Meng Xu (University of Waterloo)
N. Asokan (University of Waterloo)
MaskPrint: Take the Initiative in Fingerprint Database Protection to Mitigate Harm of Disclosure Yihui Yan (ShanghaiTech University)
Zhice Yang (ShanghaiTech University)
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation yurong Hao (Beijing Jiaotong University)
Xihui Chen (University of Luxembourg)
Xiaoting Lyu (Beijing Jiaotong University)
Jiqiang Liu (Beijing Jiaotong University)
Yongsheng Zhu (Beijing Jiaotong University)
Zhiguo Wan (Zhejiang Lab, Hangzhou, China)
Sjouke Mauw (University of Luxembourg)
Wei Wang (Beijing Jiaotong University)
Toward Understanding the Security of Plugins in Continuous Integration Services Xiaofan Li (University of Delaware)
Yacong Gu (Tsinghua University, Tsinghua University-QI-ANXIN Group JCNS)
Chu Qiao (University of Delaware)
Zhenkai Zhang (Clemson University)
Daiping Liu (Palo Alto Networks)
Lingyun Ying (QI-ANXIN Technology Research Institute)
Haixin Duan (Tsinghua University, Tsinghua University-QI-ANXIN Group JCNS)
Xing Gao (University of Delaware)
Data Independent Order Policy Enforcement: Limitations and Solutions Sarisht Wadhwa (Duke University)
Luca Zanolini (Ethereum Foundation)
Aditya Asgaonkar (Ethereum Foundation)
Francesco D'Amato (Ethereum Foundation)
Fan Zhang (Yale University)
Kartik Nayak (Duke University)
Chengrui Fang (Zhejiang University)
The Privacy-Utility Trade-off in the Topics API Mário Alvim (Universidade Federal de Minas Gerais - UFMG)
Natasha Fernandes (Macquarie University, Sydney, Australia)
Annabelle McIver (Macquarie University, Sydney, Australia)
Gabriel H. Nunes (Macquarie University, Sydney, Australia)
Fast and Accurate Homomorphic Softmax Evaluation Wonhee Cho (Departement of Mathematics, Seoul National University)
Guillaume Hanrot (Cryptolab, Inc.)
Taeseong Kim (Departement of Mathematics, Seoul National University)
Minje Park (Cryptolab, Inc.)
Damien Stehlé (Cryptolab, Inc.)
PLeak: Prompt Leaking Attacks against Large Language Model Applications Bo Hui (Johns Hopkins University)
Haolin Yuan (Johns Hopkins University)
Neil Gong (Duke University)
Philippe Burlina (JHU/APL)
Yinzhi Cao (Johns Hopkins University)
Measuring Compliance Implications of Third-party Libraries’ Privacy Label Disclosure Guidelines Yue Xiao (Indiana University Bloomington)
Chaoqi Zhang (Indiana University Bloomington)
Yue Qin (Indiana University Bloomington)
Fares Fahad S Alharbi (Indiana University Bloomington)
Luyi Xing (Indiana University Bloomington)
Xiaojing Liao (Indiana University Bloomington)
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study Yue Zhang (Drexel University)
Melih Sirlanci (Ohio State University)
Ruoyu Wang (Arizona State University)
Zhiqiang Lin (Ohio State University)
Securing Lightning Channels against Rational Miners Lukas Aumayr (TU Wien)
Zeta Avarikioti (TU Wien)
Matteo Maffei (TU Wien, Christian Doppler Laboratory Blockchain Technologies for the Internet of Things, Vienna)
Subhra Mazumdar (TU Wien, Christian Doppler Laboratory Blockchain Technologies for the Internet of Things, Vienna)
Provable Security for PKI Schemes Sara Wrótniak (Dept. of Computer Science and Engineering, University of Connecticut, Storrs, CT)
Hemi Leibowitz (School of Computer Science, The College of Management Academic Studies Rishon Lezion, Israel)
Ewa Syta (Dept. of Computer Science, Trinity College, Hartford, CT)
Amir Herzberg (Dept. of Computer Science and Engineering, University of Connecticut, Storrs, CT)
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications Dongqi Han (Tsinghua University)
Zhiliang Wang (Tsinghua University)
Ruitao Feng (Singapore Management University)
Minghui Jin (State Grid Shanghai Municipal Electric Power Company)
Wenqi Chen (Tsinghua University)
Kai Wang (Tsinghua University)
Su Wang (Zhongguancun Laboratory)
Jiahai Yang (Tsinghua University)
Xingang Shi (Tsinghua University)
Xia Yin (Tsinghua University)
Yang Liu (Nanyang Technological University)
New Secret Keys for Enhanced Performance in (T)FHE Loris Bergerat (Zama, Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, 14000 Caen, France)
Ilaria Chillotti (Unaffiliated)
Damien Ligier (Unaffiliated)
Jean-Baptiste Orfila (Zama)
Adeline Roux-Langlois (Normandie Univ, UNICAEN, ENSICAEN, CNRS, GREYC, 14000 Caen, France)
Samuel Tap (Zama)
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps Shuai Li (Fudan University)
Zhemin Yang (Fudan University)
Yuhong Nan (Sun Yat-sen University)
Shutian Yu (Fudan University)
Qirui Zhu (Fudan University)
Min Yang (Fudan University)
Interactive Multi-Credential Authentication Deepak Maram (Mysten Labs, Cornell Tech)
Mahimna Kelkar (Cornell Tech)
Ittay Eyal (Technion)
Efficient Secret Sharing for Large-Scale Applications Sarvar Patel (Google)
Giuseppe Persiano (Universita' di Salerno and Google)
Joon Young Seo (Google)
Kevin Yeo (Google and Columbia University)
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks Xin'an Zhou (University of California, Riverside)
Qing Deng (University of California, Riverside)
Juefei Pu (University of California, Riverside)
Keyu Man (University of California, Riverside)
Zhiyun Qian (University of California, Riverside)
Srikanth V. Krishnamurthy (University of California, Riverside)
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted Yanxue Jia (Purdue University)
Varun Madathil (North Carolina State University)
Aniket Kate (Purdue University / Supra Research)
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition Ye Wang (The University of Kansas)
Zeyan Liu (The University of Kansas)
Bo Luo (The University of Kansas)
Rongqing Hui (The University of Kansas)
Fengjun Li (The University of Kansas)
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion Mingming Zha (Indiana University Bloomington)
Zilong Lin (Indiana University Bloomington)
Siyuan Tang (Indiana University Bloomington)
Xiaojing Liao (Indiana University Bloomington)
Yuhong Nan (Sun Yat-sen University)
XiaoFeng Wang (Indiana University Bloomington)
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption Zhou Zhang (Beihang University)
Song Bian (Beihang University)
Zian Zhao (Beihang University)
Ran Mao (Beihang University)
Haoyi Zhou (Beihang University)
Jiafeng Hua (Huawei Technology)
Yier Jin (University of Science and Technology of China)
Zhenyu Guan (Beihang University)
Multi-User Security of CCM Authenticated Encryption Mode Xiangyang Zhang (Shanghai Jiao Tong University)
Yaobin Shen (Xiamen University)
Lei Wang (Shanghai Jiao Tong University)
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors Jiahe Zhang (Tsinghua University)
Jianjun Chen (Tsinghua University & Zhongguancun Laboratory)
Qi Wang (Tsinghua University)
Hangyu Zhang (Tsinghua University)
Chuhan Wang (Tsinghua University)
Jianwei Zhuge (Tsinghua University & Zhongguancun Laboratory)
Haixin Duan (Tsinghua University & Zhongguancun Laboratory)
Fast Two-party Threshold ECDSA with Proactive Security S. Dov Gordon (George Mason University)
Craig Gentry (TripleBlind)
Brian Koziel (TripleBlind)
S. Dov Gordon (TripleBlind)
``Do Anything Now'': Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models Xinyue Shen (Unaffiliated)
Zeyuan Chen (CISPA Helmholtz Center for Information Security)
Michael Backes (CISPA Helmholtz Center for Information Security)
Yun Shen (Netapp)
Yang Zhang (CISPA Helmholtz Center for Information Security)
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC Elias Heftrig (GU)
Haya Schulmann (GU)
Niklas Vogel (GU)
Michael Waidner (Fraunhofer SIT and TU Darmstadt)
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems Lingjing Yu (Institute of Information Engineering, Chinese Academy of Sciences)
Jingli Hao (Sinsegye (Shenzhen) Computer System Co., LTD)
Jun Ma (Sinsegye (Shenzhen) Computer System Co., LTD)
Yong Sun (Institute of Information Engineering, Chinese Academy of Sciences)
Yijun Zhao (Institute of Information Engineering, Chinese Academy of Sciences)
Bo Luo (The University of Kansas)
Computationally Secure Private Information Retrieval and Aggregation in the Shuffle Model Adria Gascon (Google LLC)
Yuval Ishai (Technion)
Mahimna Kelkar (Cornell Tech)
Baiyu Li (Google LLC)
Yiping Ma (University of Pennsylvania)
Mariana Raykova (Google Inc.)
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing Zeyan Liu (The University of Kansas)
Zijun Yao (The University of Kansas)
Fengjun Li (The University of Kansas)
Bo Luo (The University of Kansas)
Graphiti: Secure Graph Computation Made More Scalable Nishat Koti (TU Darmstadt)
Varsha Bhat Kukkala (Unaffiliated)
Arpita Patra (IISc Bangalore)
Bhavish Raj Gopal (IISc Bangalore)
ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support Nada Lahjouji (UCI)
Sameera Ghayyur (Snap Inc.)
Xi He (University of Waterloo)
Sharad Mehrotra (UCI)
Alchemy: Data-Free Adversarial Training Yijie Bai (Zhejiang University)
Zhongming Ma (Wuhan University)
Yanjiao Chen (Zhejiang University)
Jiangyi Deng (Zhejiang University)
Shengyuan Pang (Zhejiang University)
Yan Liu (Ant Group)
Wenyuan Xu (Zhejiang University)
Prompt Fuzzing for Fuzz Driver Generation Yunlong Lyu (Tencent Security Big Data Lab)
Yuxuan Xie (Tencent Security Big Data Lab)
Peng Chen (Tencent Security Big Data Lab)
Hao Chen (University of California, Davis)
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy Xijia Che (Tsinghua University)
Yi He (Tsinghua University)
Xuewei Feng (Tsinghua University)
Kun Sun (George Mason University)
Ke Xu (Tsinghua University)
Qi Li (Tsinghua University)
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach Yuke Hu (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Jian Lou (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Jiaqi Liu (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Wangze Ni (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Feng Lin (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Zhan Qin (State Key Lab. of Blockchain and Data Security, Zhejiang University)
Kui Ren (State Key Lab. of Blockchain and Data Security, Zhejiang University)

Second Cycle

Title Author
Principled Microarchitectural Isolation on Cloud CPUs Stavros Volos (Azure Research, Microsoft)
Cédric Fournet (Azure Research, Microsoft)
Jana Hofmann (Azure Research, Microsoft)
Boris Köpf (Azure Research, Microsoft)
Oleksii Oleksenko (Azure Research, Microsoft)
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux Juhee Kim (Seoul National University)
Jinbum Park (Samsung Research)
Yoochan Lee (Seoul National University)
Chengyu Song (UC Riverside)
Taesoo Kim (Samsung Research and Georgia Institute of Technology)
Byoungyoung Lee (Seoul National University)
$S^2$NeRF: Privacy-preserving Training Framework for NeRF Bokang Zhang (The Chinese University of Hong Kong, Shenzhen)
Yanglin Zhang (The Chinese University of Hong Kong, Shenzhen)
Zhikun Zhang (Stanford & CISPA)
Jinglan Yang (The Chinese University of Hong Kong, Shenzhen)
Lingying Huang (Nanyang Technological University)
Junfeng Wu (The Chinese University of Hong Kong, Shenzhen)
RISiren: Wireless Sensing System Attacks via Metasurface Chenghan jiang (NorthWest University)
Jinjiang Yang (NorthWest University)
Xinyi Li (Tsinghua University)
Qi Li (Tsinghua University)
Xinyu Zhang (University of California San Diego)
Ju Ren (Tsinghua University)
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses Yuxin Yang (Jilin University & Illinois Institute of Technology)
Qiang Li (College of Computer Science and Technology, Jilin University)
Jinyuan Jia (Penn State)
Yuan Hong (University of Connecticut)
Binghui Wang (Illinois Institute of Technology)
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches Chuqi Zhang (National University of Singapore)
Jun Zeng (Independent Researcher)
Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University)
Adil Ahmad (Arizona State University)
Fengwei Zhang (Southern University of Science and Technology (SUStech))
Zhenkai Liang (National University of Singapore)
Hai Jin (Huazhong University of Science and Technology)
SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon Hyerean Jang (Korea University)
Taehun Kim (Korea University)
Youngjoo Shin (Korea University)
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development Philip Klostermeyer (CISPA Helmholtz Center for Information Security)
Sabrina Amft (CISPA Helmholtz Center for Information Security)
Sandra Höltervennhoff (Leibniz University Hannover)
Alexander Krause (CISPA Helmholtz Center for Information Security)
Niklas Busch (CISPA Helmholtz Center for Information Security)
Sascha Fahl (CISPA Helmholtz Center for Information Security)
Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning Yufei Zhou (SUN YAT-SEN UNIVERSITY)
Peijia Zheng (SUN YAT-SEN UNIVERSITY)
Xiaochun Cao (Sun Yat-Sen University)
Jiwu Huang (Shenzhen University)
Characterizing and Mitigating Phishing Attacks at ccTLD Scale Giovane Moura (SIDN Labs and TU Delft)
Thomas Daniels (DNS Belgium and KU Leuven, Department of Computer Science)
Maarten Bosteels (DNS Belgium)
Sebastian Castro (.IE Registry)
Moritz Mueller (SIDN Labs and University of Twente)
Thymen Wabeke (SIDN Labs)
Thijs van den Hout (SIDN Labs)
Maciej Korczynski (University of Grenoble Alps, Grenoble Informatics Laboratory)
Georgios Smaragdakis (Delft University of Technology)
Foundations for Cryptographic Reductions in CCSA Logics David Baelde (Univ Rennes, CNRS, IRISA)
Adrien Koutsos (Inria Paris)
Justine Sauvage (Inria Paris)
Evaluations of Machine Learning Privacy Defenses are Misleading Michael Aerni (ETH Zurich)
Jie Zhang (ETH Zurich)
Florian Tramèr (ETH Zurich)
Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs using Active Network Data Ryan Pickren (Georgia Institute of Technology)
Animesh Chhotaray (Georgia Institute of Technology)
Frank Li (Georgia Institute of Technology)
Saman Zonouz (Georgia Institute of Technology)
Raheem Beyah (Georgia Institute of Technology)
Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors’ Promises Jonas Hielscher (Ruhr University Bochum)
Markus Schöps (Ruhr University Bochum)
Jens Opdenbusch (Ruhr-University Bochum)
Felix Reichmann (Ruhr University Bochum)
Marco Gutfleisch (Ruhr University Bochum)
Karola Marky (Ruhr University Bochum)
Simon Parkin (Delft University of Technology)
SpecMon: Modular Black-Box Runtime Verification of Security Protocols Kevin Morio (CISPA Helmholtz Center for Information Security)
Robert Künnemann (CISPA Helmholtz Center for Information Security)
Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols Ellis Fenske (U.S. Naval Academy)
Aaron Johnson (U.S. Naval Research Laboratory)
RSA-Based Dynamic Accumulator without Hashing into Primes Victor Youdom Kemmoe (Brown University)
Anna Lysyanskaya (Brown University)
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy Shuangqing Xu (Harbin Institute of Technology, Shenzhen)
Yifeng Zheng (Harbin Institute of Technology, Shenzhen)
Zhongyun Hua (Harbin Institute of Technology, Shenzhen)
Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies Neophytos Christou (Brown University)
Alexander J. Gaidis (Brown University)
Vaggelis Atlidakis (Brown University)
Vasileios P. Kemerlis (Brown University)
A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability Jie Zhu (Peking University)
Jirong Zha (Tsinghua-Berkeley Shenzhen Institute, Tsinghua University)
Ding Li (Peking University)
Leye Wang (Peking University)
Specification and Verification of Strong Timing Isolation of Hardware Enclaves Stella Lau (MIT CSAIL)
Thomas Bourgeat (EPFL)
Clément Pit-Claudel (EPFL)
Adam Chlipala (MIT CSAIL)
Leakage-Resilient Circuit Garbling Ruiyang Li (shandong university)
Yiteng Sun (Shandong University)
Chun Guo (Shandong University)
Francois-Xavier Standaert (UCLouvain)
Weijia Wang (Shandong University)
Xiao Wang (Northwestern University)
Understanding Implosion in Text-to-Image Generative Models Wenxin Ding (University of Chicago)
Cathy Yuanchen Li (University of Chicago)
Shawn Shan (University of Chicago)
Ben Y. Zhao (University of Chicago)
Haitao Zheng (University of Chicago)
A Framework for Differential Privacy Against Timing Attacks Zachary Ratliff (Harvard University)
Salil Vadhan (Harvard University)
Secure Multiparty Computation with Lazy Sharing Shuaishuai Li (Zhongguancun Laboratory, Beijing, China)
Cong Zhang (Institute for Advanced Study, BNRist, Tsinghua University)
Dongdai Lin (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences)
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months Keane Lucas (Carnegie Mellon University)
Weiran Lin (Carnegie Mellon University)
Lujo Bauer (Carnegie Mellon University)
Michael K. Reiter (Duke University)
Mahmood Sharif (Tel Aviv University)
DarthShader: Fuzzing WebGPU Shader Translators & Compilers Lukas Bernhard (CISPA Helmholtz Center for Information Security)
Nico Schiller (CISPA Helmholtz Center for Information Security)
Moritz Schloegel (CISPA Helmholtz Center for Information Security)
Nils Bars (CISPA Helmholtz Center for Information Security)
Thorsten Holz (CISPA Helmholtz Center for Information Security)
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks Pritam Dash (University of British Columbia)
Ethan Chan (University of British Columbia)
Karthik Pattabiraman (University of British Columbia)
Towards Fine-Grained Webpage Fingerprinting at Scale Xiyuan Zhao (Tsinghua University)
Xinhao Deng (Tsinghua University)
Qi Li (Tsinghua University)
Yunpeng Liu (Tsinghua University)
Zhuotao Liu (Tsinghua University)
Kun Sun (George Mason University)
Ke Xu (Tsinghua University)
Employees' Attitude towards Phishing Simulations: "It's like when a child reaches onto the hot hob" Katharina Schiller (Institute of Information Systems, Hof University of Applied Science)
Florian Adamsky (Institute of Information Systems, Hof University of Applied Science)
Christian Eichenmüller (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
Matthias Reimert (Unaffiliated)
Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
Dora: A Simple Approach to Zero-Knowledge for RAM Programs Aarushi Goel (NTT Research)
Mathias Hall-Andersen (zkSecurity)
Gabriel Kaptchuk (Boston University, University of Maryland)
SemPat: Using Hyperproperty-based Semantic Analysis to Generate Attack Patterns Adwait Godbole (University of California, Berkeley)
Yatin A. Manerkar (University of Michigan)
Sanjit A. Seshia (University of California, Berkeley)
Understanding How Differentially Private Generative Models Spend their Privacy Budgets and their Impact on Utility Georgi Ganev (UCL & Hazy)
Kai Xu (MIT-IBM Watson AI Lab)
Emiliano De Cristofaro (UC Riverside)
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing Yue Zhang (Drexel University)
Zhen Ling (Southeast University)
Michael Cash (University of Central Florida)
Qiguang Zhang (Southeast University)
Christopher Morales-Gonzalez (University of Massachusetts Lowell)
Qun Zhou Sun (University of Central Florida)
Xinwen Fu (University of Massachusetts Lowell)
A Causal Explainable Guardrails for Large Language Models Zhixuan Chu (Ant Group)
Yan Wang (Ant Group)
Longfei Li (Ant Group)
Zhibo Wang (Zhejiang University)
Zhan Qin (Zhejiang University)
Kui Ren (Zhejiang University)
Pulsar: Secure Steganography for Diffusion Models Tushar M. Jois (City College of New York)
Gabrielle Beck (Johns Hopkins University)
Gabriel Kaptchuk (Boston University, University of Maryland)
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs Chaya Ganesh (Indian Institute of Science)
Vineet Nair (Arithmic Labs)
Ashish Sharma (Arithmic Labs)
Obfuscated Key Exchange Felix Günther (IBM Research Europe – Zurich)
Douglas Stebila (University of Waterloo)
Shannon Veitch (ETH Zurich)
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning Mingqi Lv (Zhejiang University of Technology)
Hongzhe Gao (Zhejiang University of Technology)
Xuebo Qiu (Zhejiang University of Technology)
Tieming Chen (Zhejiang University of Technology)
Tiantian Zhu (Zhejiang University of Technology)
Jinyin Chen (College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China)
Shouling Ji (Zhejiang University)
Block Ciphers in Idealized Models: Automated Proofs and New Security Results Miguel Ambrona (IOG Spain)
Pooya Farshim (IOG Switzerland and Durham University)
Patrick Harasser (TU Darmstadt)
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits Zhicong Huang (Ant Group)
Wen-jie Lu (Ant Group & Zhejiang University)
Yuchen Wang (Alibaba Group)
Cheng Hong (Ant Group)
Tao Wei (Ant Group)
WenGuang Chen (Ant Group)
Samplable Anonymous Aggregation for Private Federated Data Analysis Kunal Talwar (Apple)
Shan Wang (Apple)
Audra McMillan (Apple)
Vojta Jina (Unaffiliated)
Vitaly Feldman (Apple)
Pansy Bansal (Apple)
Bailey Basile (Apple)
Aine Cahill (Apple)
Yi Shen Chan (Apple)
Mike Chatzidakis (Apple)
Junye Chan (Apple)
Oliver Chick (Apple)
Mona Chitnis (Apple)
Suman Ganta (Apple)
Yusuf Goren (Apple)
Filip Granqvist (Apple)
Kristine Guo (Apple)
Frederic Jacobs (Apple)
Omid Javidbakht (Apple)
Albert Liu (Apple)
Richard Low (Apple)
Dan Mascenik (Apple)
Steve Myers (Apple)
David Park (Apple)
Wonhee Park (Apple)
Gianni Parsa (Apple)
Tommy Pauly (Apple)
Christian Priebe (Apple)
Rehan Rishi (Apple)
Guy Rothblum (Apple)
Michael Scaria (Unaffiliated)
Congzheng Song (Apple)
Linmao Song (Apple)
Karl Tarbe (Apple)
Sebastian Vogt (Apple)
Luke Winstrom (Apple)
Shundong Zhou (Apple)
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy Wei Dong (Carnegie Mellon University)
Qiyao Luo (Hong Kong University of Science and Technology)
Giulia Fanti (Carnegie Mellon University)
Elaine Shi (Carnegie Mellon University)
Ke Yi (Hong Kong University of Science and Technology)
A General Framework for Data-Use Auditing of ML Models Zonghao Huang (Duke University)
Neil Gong (Duke University)
Michael K. Reiter (Duke University)
Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications Yongheng Huang (SKLP, Institute of Computing Technology, CAS)
Chenghang Shi (SKLP, Institute of Computing Technology, CAS)
Jie Lu (SKLP, Institute of Computing Technology, CAS)
Haofeng Li (SKLP, Institute of Computing Technology, CAS)
Haining Meng (SKLP, Institute of Computing Technology, CAS)
Lian Li (SKLP, Institute of Computing Technology, CAS)
OSmart: Whitebox Program Option Fuzzing Kelin Wang (Institute of Software, Chinese Academy of Sciences)
Mengda Chen (Institute of Software, Chinese Academy of Sciences)
Liang He (Institute of Software, Chinese Academy of Sciences)
Purui Su (Institute of Software, Chinese Academy of Sciences)
Yan Cai (Institute of Software, Chinese Academy of Sciences)
Jiongyi Chen (College of Electronic Science and Technology,National University of Defense Technology)
Bin Zhang (College of Electronic Science and Technology,National University of Defense Technology)
Chao Feng (College of Electronic Science and Technology,National University of Defense Technology)
Chaojing Tang (College of Electronic Science and Technology,National University of Defense Technology)
Program Environment Fuzzing Ruijie Meng (National University of Singapore)
Gregory J. Duck (National University of Singapore)
Abhik Roychoudhury (National University of Singapore)
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX Luca Wilke (University of Lübeck)
Florian Sieck (University of Lübeck)
Thomas Eisenbarth (University of Lübeck)
ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model Dawei Wang (Zhongguancun Laboratory)
Geng Zhou (Zhongguancun Laboratory)
Li Chen (Zhongguancun Laboratory)
Dan Li (Tsinghua University)
Yukai Miao (Zhongguancun Laboratory)
Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing Jianzhong Liu (Tsinghua University)
Yuheng Shen (Tsinghua University)
Yiru Xu (Tsinghua University)
Yu Jiang (Tsinghua University)
Faster FHE-based Single-server Private Information Retrieval Ming Luo (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences)
Feng-Hao Liu (Washington State University)
Han Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences)
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning Cong Wu (Nanyang Technological University)
Jing Chen (Wuhan University)
Ziming Zhao (University at Buffalo)
Kun He (Wuhan University)
Guowen Xu (City University of Hong Kong)
Yueming Wu (Nanyang Technological University)
Haijun Wang (Xi'an Jiaotong University)
Hongwei Li (University of Electronic Science and Technology of China)
Yang Liu (Nanyang Technological University)
Yang Xiang (Swinburne University of Technology)
Stealing Maggie's Secrets—On the Challenges of IP Theft Through FPGA Reverse Engineering Simon Klix (Max Planck Institute for Security and Privacy (MPI-SP))
Nils Albartus (Max Planck Institute for Security and Privacy (MPI-SP))
Julian Speith (Max Planck Institute for Security and Privacy (MPI-SP))
Paul Staat (Max Planck Institute for Security and Privacy (MPI-SP))
Alice Verstege (Max Planck Institute for Security and Privacy (MPI-SP))
Annika Wilde (Ruhr University Bochum (RUB))
Daniel Lammers (Ruhr University Bochum (RUB))
Jörn Langheinrich (Max Planck Institute for Security and Privacy (MPI-SP))
Christian Kison (Bundeskriminalamt (BKA))
Sebastian Sester-Wehle (Bundeskriminalamt (BKA))
Daniel Holcomb (UMass Amherst)
Christof Paar (Max Planck Institute for Security and Privacy (MPI-SP))
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning Zhiyuan Yu (Washington University in St. Louis)
Ao Li (Washington University in St. Louis)
Ruoyao Wen (Washington University in St. Louis)
Yijia Chen (Washington University in St. Louis)
Ning Zhang (Washington University in St. Louis)
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing Chaoyuan Peng (Zhejiang University)
Muhui Jiang (The Hong Kong Polytechnic University)
Lei Wu (Zhejiang University)
Yajin Zhou (Zhejiang University)
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning Huiyu Xu (Zhejiang University)
Yaopeng Wang (Southeast University)
Zhibo Wang (Zhejiang University)
Zhongjie Ba (Zhejiang University)
Wenxin Liu (Ant Group)
Lu Jin (Ant Group)
Haiqin Weng (Ant Group)
Tao Wei (Ant Group)
Kui Ren (Zhejiang University)
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations Lorenzo Binosi (Politecnico di Milano)
Gregorio Barzasi (Politecnico di Milano)
Michele Carminati (Politecnico di Milano)
Mario Polino (Politecnico di Milano)
Stefano Zanero (Politecnico di Milano)
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments Nikhil Vanjani (Carnegie Mellon University)
Pratik Soni (University of Utah)
Sri AravindaKrishnan Thyagarajan (University of Sydney)
DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables Zhibo Liu (The Hong Kong University of Science and Technology)
Yuanyuan Yuan (The Hong Kong University of Science and Technology)
Yanzuo Chen (The Hong Kong University of Science and Technology)
Sihang Hu (Huawei Technologies)
Tianxiang Li (Huawei Technologies)
Shuai Wang (The Hong Kong University of Science and Technology)
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs Fabian Rauscher (Graz University of Technology)
Daniel Gruss (Graz University of Technology)
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup Zihao Li (The Hong Kong Polytechnic University)
Xinghao Peng (The Hong Kong Polytechnic University)
Zheyuan He (University of Electronic Science and Technology of China)
Xiapu Luo (The Hong Kong Polytechnic University)
Ting Chen (University of Electronic Science and Technology of China)
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly Freek Verbeek (Open University of The Netherlands & Virginia Tech)
Nico Naus (Open University of The Netherlands & Virginia Tech)
Binoy Ravindran (Virginia Tech)
Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing Ying Gao (School of Cyber Science and Technology, Beihang University; Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing)
Yuanchao Luo (School of Cyber Science and Technology, Beihang University)
Longxin Wang (School of Cyber Science and Technology, Beihang University)
Xiang Liu (School of Cyber Science and Technology, Beihang University)
Lin Qi (School of Cyber Science and Technology, Beihang University)
Wei Wang (School of Cyber Science and Technology, Beihang University)
Mengmeng Zhou (Beijing Academy of Blockchain and Edge Computing)
Manipulative Interference Attacks Samuel Mergendahl (University of Oregon)
Stephen Fickas (University of Oregon)
Boyana Norris (University of Oregon)
Richard Skowyra (MIT Lincoln Laboratory)
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software YongHo Song (KAIST)
Byeongsu Woo (KAIST)
Youngkwang Han (KAIST)
Brent ByungHoon Kang (KAIST)
Atomic and Fair Data Exchange via Blockchain Ertem Nusret Tas (Stanford University)
István András Seres (Eötvös Loránd University)
Yinuo Zhang (University of California Berkeley)
Márk Melczer (Eötvös Loránd University)
Mahimna Kelkar (Cornell University)
Joseph Bonneau (New York University)
Valeria Nikolaenko (A16Z Crypto Research)
The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective Andrea Mengascini (CISPA Helmholtz Center for Information Security)
Ryan Aurelio (CISPA Helmholtz Center for Information Security)
Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
Fisher Information guided Purification against Backdoor Attacks Nazmul Karim (University of Central Florida)
Abdullah Al Arafat (North Carolina State University)
Adnan Siraj Rakin (Binghamton University (SUNY))
Zhishan Guo (North Carolina State University)
Nazanin Rahnavard (University of Central Florida)
CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses Jianfeng Wang (Tsinghua University)
Huazhong Yang (Tsinghua University)
Shuwen Deng (Tsinghua University)
Xueqing Li (Tsinghua University)
Protoss: Protocol for Tight Optimal Symmetric Security Emanuele Di Giandomenico (Eindhoven University of Technology)
Yong Li (Huawei Technologies Duesseldorf)
Sven Schäge (Eindhoven University of Technology)
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing Hanwen Feng (The University of Sydney)
Tiancheng Mai (The University of Sydney)
Qiang Tang (The University of Sydney)
Looking from the Mirror: Automatic Reverse Engineering of Baseband Firmware from Radio Interface Layer Wenqiang Li (The Ohio State University)
Haohuang Wen (The Ohio State University)
Zhiqiang Lin (The Ohio State University)
AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices Mohsen Salehi (University of British Columbia)
Karthik Pattabiraman (University of British Columbia)
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back Zhiyuan Sun (The Hong Kong Polytechnic University & SUSTech)
Zihao Li (The Hong Kong Polytechnic University)
Xinghao Peng (The Hong Kong Polytechnic University)
Xiapu Luo (The Hong Kong Polytechnic University)
Muhui Jiang (The Hong Kong Polytechnic University)
Hao Zhou (The Hong Kong Polytechnic University)
Yinqian Zhang (Southern University of Science and Technology)
Benchmarking Secure Sampling Protocols for Differential Privacy Yucheng Fu (Sichuan University)
Tianhao Wang (University of Virginia)
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms Florian Hirner (Graz University of Technology)
Michael Streibl (Graz University of Technology)
Florian Krieger (Graz University of Technology)
Ahmet Can Mert (Graz University of Technology)
Sujoy Sinha Roy (Graz University of Technology)
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups Christof Ferreira Torres (ETH Zurich)
Albin Mamuti (ETH Zurich)
Ben Weintraub (Northeastern University)
Cristina Nita-Rotaru (Northeastern University)
Shweta Shinde (ETH Zurich)
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z2𝑘 without Ring Extensions Yun Li (Tsinghua University)
Daniel Escudero (J.P. Morgan AI Research & J.P. Morgan AlgoCRYPT CoE)
Yufei Duan (Tsinghua University)
Zhicong Huang (Ant Group)
Cheng Hong (Ant Group)
Chao Zhang (Tsinghua University)
Yifan Song (Tsinghua University)
Direct Range Proofs for Paillier Cryptosystem and Their Applications Zhikang Xie (The University of Hong Kong)
Mengling Liu (The Hong Kong Polytechnic University)
Haiyang Xue (The Hong Kong Polytechnic University; Singapore Management University)
Man Ho Au (The Hong Kong Polytechnic University)
Robert H. Deng (Singapore Management University)
Siu-Ming Yiu (The University of Hong Kong)
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles Mir Masood Ali (University of Illinois Chicago)
Peter Snyder (Brave Software)
Chris Kanich (University of Illinois Chicago)
Hamed Haddadi (Imperial College London, Brave Software)
Gaussian Elimination of Side-Channels: Inferring Memory Coloring Schemes Using Linear Algebra Jana Hofmann (Azure Research, Microsoft)
Cédric Fournet (Azure Research, Microsoft)
Boris Köpf (Azure Research, Microsoft)
Stavros Volos (Azure Research, Microsoft)
Conan: Distributed Proofs of Compliance for Anonymous Data Collection Mingxun Zhou (Carnegie Mellon University)
Giulia Fanti (Carnegie Mellon University)
Elaine Shi (Carnegie Mellon University)
Quarantined-TreeKEM: a Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users Guirec Lebrun (Ecole Normale Supérieure - Paris, ANSSI)
Céline Chevalier (Université Panthéon-Assas, Ecole Normale Supérieure - Paris)
Ange Martinelli (ANSSI)
Abdul Rahman Taleb (ANSSI)
Simple and Practical Amortized Sublinear Private Information Retrieval Ling Ren (University of Illinois at Urbana-Champaign)
Muhammad Haris Mughees (University of Illinois at Urbana–Champaign)
Sun I (University of Illinois at Urbana–Champaign)
ERACAN: Defending Against a Game-Changing CAN Threat Model Zhaozhou Tang (Georgia Institute of Technology)
Khaled Serag (Qatar Computing Research Institute)
Saman Zonouz (Georgia Tech)
Z. Berkay Celik (Purdue University)
Dongyan Xu (Purdue University)
Raheem Beyah (Georgia Institute of Technology)
Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense Qiankun Zhang (Huazhong University of Science and Technology)
Boyu Zhang (Huazhong University of Science and Technology)
Di Yuan (Huazhong University of Science and Technology)
Bin Yuan (Huazhong University of Science and Technology)
Bingqian Du (Huazhong University of Science and Technology)
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments Shenao Wang (Huazhong University of Science and Technology)
Feng Dong (Huazhong University of Science and Technology)
Hangfeng Yang (Sangfor Technologies Inc.)
Jingheng Xu (Sangfor Technologies Inc.)
Haoyu Wang (Huazhong University of Science and Technology)
A Qualitative Analysis of Practical De-identification Guides Wentao Guo (University of Maryland)
Aditya Kishore (University of Maryland)
Adam Aviv (The George Washington University)
Michelle L. Mazurek (University of Maryland)
DPM: Clustering Sensitive Data through Separation Johannes Liebenow (University of Luebeck)
Yara Sophie Schütt (University of Luebeck)
Tanya Braun (University of Muenster)
Marcel Gehrke (University of Hamburg)
Florian Thaeter (Unaffiliated)
Esfandiar Mohammadi (University of Luebeck)
Querycheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems Bozhidar Stevanoski (Imperial College London)
Ana-Maria Cretu (EPFL)
Yves-Alexandre de Montjoye (Imperial College London)
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets Mahimna Kelkar (Cornell Tech)
Kushal Babel (Cornell Tech)
Philip Daian (Cornell Tech)
James Austgen (Cornell Tech)
Vitalik Buterin (Ethereum Foundation)
Ari Juels (Cornell Tech)
No Peer, no Cry: Network Application Fuzzing via Fault Injection Nils Bars (CISPA Helmholtz Center for Information Security)
Moritz Schloegel (CISPA Helmholtz Center for Information Security)
Nico Schiller (CISPA Helmholtz Center for Information Security)
Lukas Bernhard (CISPA Helmholtz Center for Information Security)
Thorsten Holz (CISPA Helmholtz Center for Information Security)
Rust for Embedded Systems: Current State and Open Problems Ayushi Sharma (Purdue University)
Shashank Sharma (Purdue University)
Sai Ritvik Tanksalkar (Purdue University)
Santiago Torres-Arias (Purdue University)
Aravind Machiry (Purdue University)
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem Yuexi Zhang (School of Cyber Science and Technology, Beihang University, Beijing 100191, China)
Bingyu Li (School of Cyber Science and Technology, Beihang University, Beijing 100191, China)
Jingqiang Lin (School of Cyber Science and Technology, University of Science and Technology of China)
Linghui Li (Beijing University of Posts and Telecommunications)
Jiaju Bai (School of Cyber Science and Technology, Beihang University, Beijing 100191, China)
Shijie Jia (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, China)
Qianhong Wu (School of Cyber Science and Technology, Beihang University, Beijing 100191, China)
Characterizing Ethereum Address Poisoning Attack Shixuan Guan (San Diego State University)
Kai Li (San Diego State University)
Fuzz the Future: Uncovering Occluded Future Vulnerabilities by Robust Fuzzing Arvind S Raj (Arizona State University)
Wil Gibbs (Arizona State University)
Fangzhou Dong (Arizona State University)
Jayakrishna Menon Vadayath (Arizona State University)
Michael Tompkins (Arizona State University)
Steven Wirsz (Arizona State University)
Yibo Liu (Arizona State University)
Zhenghao Hu (New York University)
Chang Zhu (Arizona State University)
Gokulkrishna Praveen Menon (Arizona State University)
Brendan Dolan-Gavitt (New York University)
Adam Doupé (Arizona State University)
Ruoyu Wang (Arizona State University)
Yan Shoshitaishvili (Arizona State University)
Tiffany Bao (Arizona State University)
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps Ruixuan Liu (Emory University)
Tianhao Wang (University of Virginia)
Yang Cao (Tokyo Institute of Technology)
Fangzhao Wu (Microsoft Research Asia)
Li Xiong (Emory University)
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation Wenxu Tang (University of Science and Technology of China)
Fangyu Zheng (University of Chinese Academy of Sciences)
Guang Fan (Ant Group)
Tian Zhou (University of Science and Technology of China)
Jingqiang Lin (University of Science and Technology of China)
Jiwu Jing (University of Chinese Academy of Sciences)
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference Jiaxing He (Ant Group)
Kang Yang (State Key Laboratory of Cryptology)
Guofeng Tang (Ant Group)
Zhangjie Huang (Ant Group)
Li Lin (Ant Group)
Changzheng Wei (Ant Group)
Ying Yan (Ant Group)
Wei Wang (Ant Group)
Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation Michael Rosenberg (University Of Maryland)
Tushar Mopuri (University of Pennsylvania)
Hossein Hafezi (New York University)
Ian Miers (University of Maryland)
Pratyush Mishra (University of Pennsylvania)
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns Jan H. Klemmer (CISPA Helmholtz Center for Information Security)
Stefan Albert Horstmann (Ruhr University Bochum)
Nikhil Patnaik (University of Bristol)
Cordelia Ludden (Tufts University)
Cordell Burton (Tufts University)
Carson Powers (Tufts University)
Fabio Massacci (Vrije Universiteit Amsterdam and University of Trento)
Akond Rahman (Auburn University)
Daniel Votipka (Tufts University)
Heather Lipford (University of North Carolina at Charlotte)
Awais Rashid (University of Bristol)
Alena Naiakshina (Ruhr University Bochum)
Sascha Fahl (CISPA Helmholtz Center for Information Security)
BadMerging: Backdoor Attacks Against Model Merging Jinghuai Zhang (University of California, Los Angeles)
Jianfeng Chi (Meta)
Zheng Li (CISPA Helmholtz Center for Information Security)
Kunlin Cai (UCLA)
Yang Zhang (CISPA Helmholtz Center for Information Security)
Yuan Tian (UCLA)
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices Hanqiu Wang (University of Florida)
Zihao Zhan (University of Florida)
Haoqi Shan (Certik)
Siqi Dai (University of Florida)
Max Panoff (University of Florida)
Shuo Wang (University of Florida)
Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators Ahmed Tanvir Mahdad (Texas A&M University, College Station)
Mohammed Jubur (Jazan University)
Nitesh Saxena (Texas A&M University, College Station)
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity Renas Bacho (CISPA Helmholtz Center for Information Security)
Christoph Lenzen (CISPA Helmholtz Center for Information Security)
Julian Loss (CISPA Helmholtz Center for Information Security)
Simon Ochsenreither (Unaffiliated)
Dimitrios Papachristoudis (Hungry Cats Studio)
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution Yixin Wu (CISPA Helmholtz Center for Information Security)
Yun Shen (Netapp)
Michael Backes (CISPA Helmholtz Center for Information Security)
Yang Zhang (CISPA Helmholtz Center for Information Security)
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction Yibin Yang (Georgia Institute of Technology)
David Heath (University of Illinois Urbana-Champaign)
Carmit Hazay (Bar-Ilan University)
Vladimir Kolesnikov (Georgia Institute of Technology)
Muthuramakrishnan Venkitasubramaniam (Ligero Inc.)
Jäger: Automated Telephone Call Traceback David Adei (North Carolina State University)
Varun Madathil (North Carolina State University)
Sathvik Prasad (North Carolina State University)
Bradley Reaves (North Carolina State University)
Alessandra Scafuro (North Carolina State University)
Optimization-based Prompt Injection Attack to LLM-as-a-Judge Jiawen Shi (Huazhong University of Science and Technology)
Zenghui Yuan (Huazhong University of Science and Technology)
Yinuo Liu (Lehigh University)
Yue Huang (University of Notre Dame)
Pan Zhou (Huazhong University of Science and Technology)
Lichao Sun (Lehigh University)
Neil Gong (Duke University)
Uncovering Gradient Inversion Risks in Practical Language Model Training Xinguo Feng (The University of Queensland)
Zhongkui Ma (The University of Queensland)
Zihan Wang (The University of Queensland)
Chegne Eu Joe (The University of Queensland)
Mengyao Ma (The University of Queensland)
Alsharif Abuadbba (CSIRO's Data61, Australia)
Guangdong Bai (The University of Queensland)
FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols Hongbo Wen (University of California, Santa Barbara)
Hanzhi Liu (University of California, Santa Barbara)
Jiaxin Song (Shanghai Jiao Tong University)
Yanju Chen (University of California, Santa Barbara)
Wenbo Guo (University of California, Santa Barbara)
Yu Feng (University of California, Santa Barbara)
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem Song Liao (Clemson University)
Long Cheng (Clemson University)
Xiapu Luo (The Hong Kong Polytechnic University)
Zheng Song (University of Michigan-Dearborn)
Haipeng Cai (Washington State University)
Daphne Yao (Virginia Tech, Dept of Computer Science)
Hongxin Hu (University at Buffalo)
Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack Guanzhong Chen (Harbin Institute of Technology, Shenzhen)
Zhenghan Qin (Zhejiang University)
Mingxin Yang (Huazhong University of Science and Technology)
Yajie Zhou (Zhejiang University)
Tao Fan (Hong Kong University of Science and Technology, China, WeBank, China)
Tianyu Du (Zhejiang University)
Zenglin Xu (Harbin Institute of Technology, Shenzhen)
Secret Sharing with Snitching Stefan Dziembowski (University of Warsaw and IDEAS NCBR)
Sebastian Faust (Technische Universität Darmstadt)
Tomasz Lizurej (NASK & University of Warsaw)
Marcin Mielniczuk (University of Warsaw)
DIT: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models Zeyang Sha (CISPA Helmholtz Center for Information Security)
Yicong Tan (CISPA Helmholtz Center for Information Security)
Mingjie Li (CISPA Helmholtz Center for Information Security)
Michael Backes (CISPA Helmholtz Center for Information Security)
Yang Zhang (CISPA Helmholtz Center for Information Security)
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs) Mahmoud Nazzal (New Jersey Institute of Technology)
Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU)
Abdallah Khreishah (New Jersey Institute of Technology)
NhatHai Phan (New Jersey Institute of Technology)
BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering Jiayi Jiang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
Xiyuan Zhang (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
Chengcheng Wan (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
Haoyi Chen (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
Haiying Sun (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
Ting Su (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University)
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging Christian Badertscher (Input Output Switzerland)
Fabio Banfi (Zühlke Engineering AG)
Jesus Diaz (Input Output Spain)
S-BDT: Distributed Differentially Private Boosted Decision Trees Thorsten Peinemann (Universität zu Lübeck)
Moritz Kirschte (Universität zu Lübeck)
Joshua Stock (Universität Hamburg)
Carlos Cotrini (ETH Zurich)
Esfandiar Mohammadi (Universität zu Lübeck)
The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols Jeffrey Knockel (Citizen Lab, University of Toronto)
Mona Wang (Princeton University)
Zoë Reichert (Citizen Lab, University of Toronto)
Verifiable Security Policies for Distributed Systems Felix A. Wolf (ETH Zurich)
Peter Müller (ETH Zurich)
Analyzing Inference Privacy Risks Through Gradients In Machine Learning Zhuohang Li (Vanderbilt University)
Andrew Lowy (University of Wisconsin-Madison)
Jing Liu (Mitsubishi Electric Research Laboratories)
Toshiaki Koike-Akino (Mitsubishi Electric Research Laboratories)
Kieran Parsons (Mitsubishi Electric Research Laboratories)
Brad Malin (Vanderbilt University)
Ye Wang (Mitsubishi Electric Research Laboratories)
Blind and Low-Vision Individuals’ Detection of Audio Deepfakes Filipo Sharevski (DePaul University)
Aziz Zeidieh (University of Illinois Urbana-Champaign)
Jennifer Vander Loop (DePaul University)
Peter Jachim (DePaul University)
Membership Inference Attacks Against In-Context Learning Rui Wen (CISPA Helmholtz Center for Information Security)
Zheng Li (CISPA Helmholtz Center for Information Security)
Michael Backes (CISPA Helmholtz Center for Information Security)
Yang Zhang (CISPA Helmholtz Center for Information Security)
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware Abdullah Qasem (Security Research Centre, Concordia University, Montreal, QC, Canada)
Mourad Debbabi (Security Research Centre, Concordia University, Quebec, Canada)
Andrei Soeanu (Security Research Centre, Concordia University, Montreal, QC, Canada)
Unbalanced Private Set Union with Reduced Computation and Communication Cong Zhang (Institute for Advanced Study, BNRist, Tsinghua University)
Yu Chen (School of Cyber Science and Technology, Shandong University)
Weiran Liu (Alibaba Group)
Liqiang Peng (Alibaba Group)
Meng Hao (Singapore Management University)
Anyu Wang (Institute for advanced study, Tsinghua University)
Xiaoyun Wang (Tsinghua University)
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem Kien Tuong Truong (ETH Zurich)
Jonas Hofmann (ETH Zurich)
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects Kaiming Huang (The Pennsylvania State University)
Mathias Payer (EPFL)
Zhiyun Qian (UC Riverside)
Jack Sampson (The Pennsylvania State University)
Gang Tan (The Pennsylvania State University)
Trent Jaeger (UC Riverside)
Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices Thien-Phuc Doan (Soongsil University)
Hung Dinh-Xuan (Soongsil University)
Taewon Ryu (Soongsil University)
Inho Kim (Soongsil University)
Woongjae Lee (Soongsil University)
Kihun Hong (Soongsil University)
Souhwan Jung (Soongsil University)
State Machine Mutation-based Testing Framework for Wireless Communication Protocols Syed Md Mukit Rashid (The Pennsylvania State University)
Tianwei Wu (The Pennsylvania State University)
Kai Tu (Pennsylvania State University)
Abdullah Al Ishtiaq (Pennsylvania State University)
Ridwanul Hasan Tanvir (Pennsylvania State University)
Yilu Dong (The Pennsylvania State University)
Omar Chowdhury (Stony Brook University)
Syed Rafiul Hussain (Pennsylvania State University)
Spec-o-Scope: Cache Probing at Cache Speed Gal Horowitz (Tel Aviv University)
Eyal Ronen (Tel Aviv University)
Yuval Yarom (Ruhr University Bochum)
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases Peizhao Zhou (Nankai University)
Xiaojie Guo (Nankai University)
Pinzhi Chen (Nankai University)
Tong Li (Nankai University)
Siyi Lv (Nankai University)
Zheli Liu (Nankai University)
Secure Parallel Computation with Oblivious State Transitions Nuttapong Attrapadung (AIST)
Kota Isayama (SMBC Nikko Securities Inc.)
Kunihiko Sadakane (The University of Tokyo)
Kazunari Tozawa (The University of Tokyo)
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks Yu He (Wuhan University)
Boheng Li (Wuhan University)
Yao Wang (Wuhan University)
Mengda Yang (Wuhan University)
Juan Wang (Wuhan University)
Hongxin Hu (University at Buffalo)
Xingyu Zhao (University of Warwick)
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels Yuanyuan Yuan (The Hong Kong University of Science and Technology)
Zhibo Liu (The Hong Kong University of Science and Technology)
Sen Deng (The Hong Kong University of Science and Technology)
Yanzuo Chen (The Hong Kong University of Science and Technology)
Shuai Wang (The Hong Kong University of Science and Technology)
Yinqian Zhang (SUSTech)
Zhendong Su (ETH Zurich)
Sparrow : Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees Christodoulos Pappas (The Hong Kong University of Science and Technology)
Dimitrios Papadopoulos (The Hong Kong University of Science and Technology)
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors Hans Winderix (DistriNet, KU Leuven)
Marton Bognar (DistriNet, KU Leuven)
Lesly-Ann Daniel (DistriNet, KU Leuven)
Frank Piessens (DistriNet, KU Leuven)
CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel Shuangpeng Bai (The Pennsylvania State University)
Zhechang Zhang (The Pennsylvania State University)
Hong Hu (The Pennsylvania State University)
VPVet: Vetting Privacy Policies of Virtual Reality Apps Yuxia Zhan (Shanghai Jiao Tong University)
Yan Meng (Shanghai Jiao Tong University)
Lu Zhou (Xidian University)
Yichang Xiong (George Mason University)
Xiaokuan Zhang (George Mason University)
Lichuan Ma (Xidian University)
Guoxing Chen (Shanghai Jiao Tong University)
Qingqi Pei (Xidian University)
Haojin Zhu (Shanghai Jiao Tong University)
Legilimens: Practical and Unified Content Moderation for Large Language Model Services Jialin Wu (Zhejiang University)
Jiangyi Deng (Zhejiang University)
Shengyuan Pang (Zhejiang University)
Yanjiao Chen (Zhejiang University)
Jiayang Xu (Zhejiang University)
Xinfeng Li (Zhejiang University)
Wenyuan Xu (Zhejiang University)
Gramine-TDX: A Lightweight OS Kernel for Confidential VMs Dmitrii Kuvaiskii (Intel Labs)
Dimitrios Stavrakakis (Technical University of Munich & The University of Edinburgh)
Kailun Qin (Intel & Shanghai Jiao Tong University)
Cedric Xing (Intel)
Pramod Bhatotia (Technical University of Munich)
Mona Vij (Intel Labs)
CAPSID: A Private Session ID System for Small UAVs Yueshen Li (University of Illinois at Urbana-Champaign)
Jianli Jin (University of Illinois at Urbana-Champaign)
Kirill Levchenko (University of Illinois at Urbana-Champaign)
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks Xiaoyi Chen (Indiana University Bloomington)
Siyuan Tang (Indiana University Bloomington)
Rui Zhu (Indiana University Bloomington)
Shijun Yan (JD Cloud)
Lei Jin (JD Cloud)
Zihao Wang (Indiana University Bloomington)
Liya Su (JD Cloud)
Zhikun Zhang (Stanford & CISPA)
XiaoFeng Wang (Indiana University Bloomington)
Haixu Tang (Indiana University, Bloomington)
ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles Ben Fisch (Yale University)
Arthur Lazzaretti (Yale University)
Zeyu Liu (Yale University)
Charalampos Papamanthou (Yale University)
Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based Policies Peiran Wang (Tsinghua University)
Qiyu Li (University of California, San Diego)
Longxuan Yu (University of California, San Diego)
Ziyao Wang (University of Maryland College Park)
Ang Li (University of Maryland College Park)
Haojian Jin (University of California, San Diego)
Respire: High-Rate PIR for Databases with Small Records Alexander Burton (UT Austin)
Samir Jordan Menon (Blyss)
David J. Wu (UT Austin)
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models Feng Luo (The Hong Kong Polytechnic University)
Huangkun Lin (University of Electronic Science and Technology of China)
Zihao Li (The Hong Kong Polytechnic University)
Xiapu Luo (The Hong Kong Polytechnic University)
Ruijie Luo (University of Electronic Science and Technology of China)
Zheyuan He (University of Electronic Science and Technology of China)
Shuwei Song (University of Electronic Science and Technology of China)
Ting Chen (University of Electronic Science and Technology of China)
Wenxuan Luo (Unaffiliated)
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy Vadim Lyubashevsky (IBM Research Europe)
Gregor Seiler (IBM Research Europe)
Patrick Steuer (IBM Research Europe)
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator Rabiah Alnashwan (The University of Sheffield)
Yang Yang (The University of Sheffield)
Yilu Dong (Pennsylvania State University)
Prosanta Gope (The university of Sheffield)
Behzad Abdolmaleki (The University of Sheffield)
Syed Rafiul Hussain (Pennsylvania State University)
Augmenting PoC Exploit Generation for Node.js Applications using Test Suites Changhua Luo (The Chinese University of Hong Kong)
Penghui Li (Zhongguancun Laboratory)
Wei Meng (The Chinese University of Hong Kong)
Chao Zhang (Tsinghua University)
Unmasking the Security and Usability of Password Masking Yuqi Hu (Georgia Institute of Technology)
Suood Alroomi (Georgia Institute of Technology)
Sena Sahin (Georgia Institute of Technology)
Frank Li (Georgia Institute of Technology)
Neural Dehydration: Universal Erasure of Black-box Watermarks from DNNs with Limited Data Yifan Lu (Fudan University)
Wenxuan Li (Fudan University)
Mi Zhang (Fudan University)
Xudong Pan (Fudan University)
Min Yang (Fudan University)
SeqMIA: Sequential-Metric Based Membership Inference Attack Hao Li (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Zheng Li (CISPA Helmholtz Center for Information Security)
Siyuan Wu (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Chengrui Hu (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Yutong Ye (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Min Zhang (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Dengguo Feng (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences)
Yang Zhang (CISPA Helmholtz Center for Information Security)
Fuzzing JavaScript Engines with a Graph-based IR Haoran Xu (National University of Defense Technology)
Zhiyuan Jiang (National University of Defense Technology)
Yongjun Wang (National University of Defense Technology)
Shuhui Fan (National University of Defense Technology)
Shenglin Xu (National University of Defense Technology)
Peidai Xie (National University of Defense Technology)
Shaojing Fu (National University of Defense Technology)
Mathias Payer (EPFL)
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines Eugene Bagdasaryan (Cornell Tech)
Vitaly Shmatikov (Cornell Tech)
Demystifying RCE Vulnerabilities in LLM-Integrated Apps Tong Liu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China)
Zizhuang Deng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
Guozhu Meng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Yuekang Li (University of New South Wales)
Kai Chen (Institute of Information Engineering)
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform Julius Hermelink (Max Planck Institute for Security and Privacy)
Kai-Chun Ning (Max Planck Institute for Security and Privacy)
Richard Petri (Max Planck Institute for Security and Privacy)
Emanuele Strieder (Fraunhofer AISEC and Technical University of Munich)
uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem Hajeong Lim (Sungkyunkwan university)
Jaeyoon Kim (Sungkyunkwan University)
Hojoon Lee (Sungkyunkwan University)
Attacks Against the IND-CPA^D Security of Exact FHE Schemes Jung Hee Cheon (Seoul National University and CryptoLab Inc.)
Hyeongmin Choe (Seoul National University)
Alain Passelègue (CryptoLab Inc.)
Damien Stehlé (CryptoLab Inc.)
Elias Suvanto (CryptoLab Inc. and University of Luxembourg)
“I Had Sort of a Sense that I Was Always Being Watched...Since I Was”: Examining Interpersonal Discomfort From Continuous Location-Sharing Applications Kevin Childs (University of Florida)
Cassidy Gibson (University of Florida)
Anna Crowder (University of Florida)
Kevin Warren (University of Florida)
Carson Stillman (University of Florida)
Elissa Redmiles (Georgetown University)
Eakta Jain (University of Florida)
Patrick Traynor (University of Florida)
Kevin Butler (University of Florida)
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Hanbin Hong (University of Connecticut)
Xinyu Zhang (Zhejiang University)
Binghui Wang (Illinois Institute of Technology)
Zhongjie Ba (Zhejiang University)
Yuan Hong (University of Connecticut)
𝜇CFI: Formal Verification of Microarchitectural Control-flow Integrity Katharina Ceesay-Seitz (ETH Zurich)
Flavien Solt (ETH Zurich)
Kaveh Razavi (ETH Zurich)
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning Mingming Chen (Penn State University)
Thomas La Porta (Penn State University)
Teryl Taylor (IBM Research)
Frederico Araujo (IBM Research)
Trent Jaeger (UC Riverside)
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution Zhongjie Ba (Zhejiang University)
Jieming Zhong (ZheJiang University)
Jiachen Lei (Zhejiang University)
Peng Cheng (Zhejiang University)
Qinglong Wang (Zhejiang University)
Zhan Qin (Zhejiang University)
Zhibo Wang (Zhejiang University)
Kui Ren (Zhejiang University)
Securing Floating-Point Arithmetic for Noise Addition Naoise Holohan (IBM Research)
Stefano Braghin (IBM Research)
Mohamed Suliman (IBM Research)
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training Daniele Lain (ETH Zurich)
Tarek Jost (ETH Zurich)
Sinisa Matetic (ETH Zurich)
Kari Kostiainen (ETH Zurich)
Srdjan Čapkun (ETH Zurich)
Large-Scale Private Set Intersection in the Client-Server Setting Yunqing Sun (Northwestern University)
Jonathan Katz (Google and University of Maryland)
Mariana Raykova (Google)
Phillipp Schoppmann (Google)
Xiao Wang (Northwestern University)
Air Gap: Protecting Privacy-Conscious Conversational Agents Eugene Bagdasaryan (Google Research)
Ren Yi (Google Research)
Sahra Ghalebikesabi (Google Deepmind)
Peter Kairouz (Google Research)
Marco Gruteser (Google Research)
Sewoong Oh (Google Research)
Borja Balle (Google Deepmind)
Daniel Ramage (Google Research)
Real-World Universal zkSNARKs are Non-Malleable Antonio Faonio (EURECOM)
Dario Fiore (IMDEA Software Institute)
Luigi Russo (EURECOM)
Oblivious Single Access Machines - A New Model for Oblivious Computation Ananya Appan (University of Illinois at Urbana-Champaign)
David Heath (University of Illinois at Urbana-Champaign)
Ling Ren (University of Illinois at Urbana-Champaign)
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices Easton Kelso (Arizona State University)
Ananta Soneji (Arizona State University)
Sazzadur Rahaman (University of Arizona)
Yan Shoshitaishvili (Arizona State University)
Rakibul Hasan (Arizona State University)
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data Andy Zhou (UIUC)
Xiaojun Xu (Bytedance Research)
Ramesh Raghunathan (eBay)
Alok Lal (eBay)
Xinze Guan (eBay)
Bin Yu (UC Berkeley)
Bo Li (University of Chicago)
Compositional Verification of Composite Byzantine Protocols Qiyuan Zhao (National University of Singapore)
George Pîrlea (National University of Singapore)
Karolina Grzeszkiewicz (Yale-NUS College)
Seth Gilbert (National University of Singapore)
Ilya Sergey (National University of Singapore)
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials Foteini Baldimtsi (GMU and Mysten Labs)
Konstantinos Chalkias (Mysten Labs)
Yan Ji (Cornell)
Jonas Lindstrom (Mysten Labs)
Deepak Maram (Mysten Labs)
Ben Riva (Mysten Labs)
Arnab Roy (Mysten Labs)
Mahdi Sedaghat (KU Leuven)
Joy Wang (Mysten Labs)
Understanding Legal Professionals’ Practices and Expectations in Data Breach Incident Reporting Ece Gumusel (Indiana University Bloomington)
Yue Xiao (Indiana University Bloomington)
Yue Qin (Indiana University Bloomington)
Jiaxin Qin (China University of Political Science and Law)
Xiaojing Liao (Indiana University Bloomington)
Password-Protected Key Retrieval with(out) HSM Protection Sebastian Faller (IBM Research Europe / ETH Zurich)
Tobias Handirk (Bergische Universität Wuppertal)
Julia Hesse (IBM Research Europe — Zurich)
Máté Horváth (Bergische Universität Wuppertal)
Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam)
Secure Sorting and Selection via Function Secret Sharing Amit Agarwal (UIUC)
Elette Boyle (NTT Research and Reichman University)
Nishanth Chandran (Microsoft Research, India)
Niv Gilboa (Ben Gurion University, Israel)
Divya Gupta (Microsoft Research)
Yuval Ishai (Technion)
Mahimna Kelkar (Cornell University)
Yiping Ma (University of Pennsylvania)
On the Tight Security of the Double Ratchet Daniel Collins (EPFL)
Doreen Riepel (UC San Diego)
Si An Oliver Tran (ETH Zurich)
Internet’s Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild Yuejia Liang (Tsinghua University)
Jianjun Chen (Tsinghua University and Zhongguancun Laboratory)
Run Guo (Tsinghua University)
Kaiwen Shen (Tsinghua University)
Hui Jiang (Tsinghua University and Baidu Inc)
Man Hou (Zhongguancun Laboratory)
Yue Yu (Beijing University of Posts and Telecommunications)
Haixin Duan (Tsinghua University; Quancheng Laboratory)
GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations Yue Li (Hunan University)
Wenqiang Jin (Hunan University)
Zhengyu Ning (Hunan University)
Daibo Liu (Hunan University)
Zhenxiong Yan (Hunan University)
Zheng Qin (Hunan University)
Yu Liu (Hunan University)
Huadi Zhu (The University of Texas at Arlington)
Ming Li (The University of Texas at Arlington)
Metric Differential Privacy at the User-Level Jacob Imola (University of Copenhagen)
Amrita Roy Chowdhury (UCSD)
Kamalika Chaudhuri (UCSD)
Blind Multi-Signatures for Anonymous Tokens with Decentralized Issuance and Public Verifiability Ioanna Karantaidou (George Mason University)
Omar Renawi (CISPA Helmholtz Center for Information Security)
Foteini Baldimtsi (George Mason University, Mysten Labs)
Julian Loss (CISPA Helmholtz Center for Information Security)
Jonathan Katz (Google)
Nikolaos Kamarinakis (University of Maryland, Common Prefix)
Smooth Sensitivity for Geo-Privacy Yuting Liang (Hong Kong University of Science and Technology)
Ke Yi (Hong Kong University of Science and Technology)
Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing Yingquan Zhao (College of Intelligence and Computing, Tianjin University)
Zan Wang (College of Intelligence and Computing, Tianjin University)
Junjie Chen (College of Intelligence and Computing, Tianjin University)
Ruifeng Fu (College of Intelligence and Computing, Tianjin University)
Yanzhou Lu (College of Intelligence and Computing, Tianjin University)
Tianchang Gao (College of Intelligence and Computing, Tianjin University)
Haojie Ye (Programming Language Lab, Huawei)
Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power Shiming Wang (Shanghai Jiao Tong University)
Liyao Xiang (Shanghai Jiao Tong University)
Bowei Cheng (Shanghai Jiao Tong University)
Zhe Ji (Shanghai Jiao Tong University)
Tianran Sun (Shanghai Jiao Tong University)
Xinbing Wang (Shanghai Jiao Tong University)
Resilient RPKI Donika Mirdita (TU Darmstadt)
Jens Frieß (TU Darmstadt)
Haya Schulmann (Goethe-Universität Frankfurt and National Research Center for Applied Cybersecurity ATHENE)
Michael Waidner (TU Darmstadt and and National Research Center for Applied Cybersecurity ATHENE and Fraunhofer)
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning Jonathan Knauer (Technische Universität Darmstadt)
Phillip Rieger (Technische Universität Darmstadt)
HOSSEIN FEREIDOONI (KOBIL GmbH)
Ahmad-Reza Sadeghi (Technical University of Darmstadt)
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz Qingsong Yao (Xidian University)
Yuming Liu (Xidian University)
Xiongjia Sun (ZTE Corporation)
Xuewen Dong (Xidian University)
Xiaoyu Ji (Zhejiang University)
Jianfeng Ma (Xidian University)
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra Doreen Riepel (UC San Diego)
Marloes Venema (University of Wuppertal)
Tanya Verma (ArmisticeAI)
VMUD: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching Kaifeng Huang (Tongji University)
Chenhao Lu (Fudan University)
Yiheng Cao (Fudan University)
Bihuan Chen (Fudan University)
Xin Peng (Fudan University)
TabularMark: Watermarking Tabular Datasets for Machine Learning Yihao Zheng (Zhejiang University)
Haocheng Xia (University of Illinois Urbana-Champaign)
Junyuan Pang (Zhejiang University)
Jinfei Liu (Zhejiang University)
Kui Ren (Zhejiang University)
Lingyang Chu (McMaster University)
Yang Cao (Tokyo Institute of Technology)
Li Xiong (Emory U)
Conditional Encryption with Applications to Secure Personalized Password Typo Correction Mohammad Hassan Ameri (Purdue University)
Jeremiah Blocki (Purdue University)
NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE Bootstrapping Jae Hyung Ju (Seoul National University)
Jaiyoung Park (Seoul National University)
Jongmin Kim (Seoul National University)
Minsik Kang (Seoul National University)
Donghwan Kim (Seoul National University)
Jung Hee Cheon (CryptoLab Inc., Seoul National University)
Jung Ho Ahn (Seoul National University)
CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon Jiaxun Zhu (Zhejiang University)
Minghao Lin (Zhejiang University)
Tingting Yin (Zhongguancun Laboratory)
Zechao Cai (Zhejiang University)
Yu Wang (Cyberserval Co., Ltd.)
Rui Chang (Zhejiang University)
Wenbo Shen (Zhejiang University)
Scalable Equi-Join Queries over Encrypted Database Kai Du (Xidian University)
Jiaojiao Wu (Xidian University)
Yunling Wang (Xi'an University of Posts & Telecommunications, China)
Jianfeng Wang (Xidian University)