Accelerating Performance of Bilinear Map Cryptography using FPGA |
Andrei Ouatu, Gabriel Ghinita and Razvan Rughinis |
Exploiting Update Leakage in Searchable Symmetric Encryption |
Jacob Haltiwanger and Thang Hoang |
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits |
Ihyun Nam |
CoCoT: Collaborative Contact Tracing |
Trevor Kann, Lujo Bauer and Robert Cunningham |
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation |
Alessandro Baccarini, Marina Blanton and Shaofeng Zou |
Crypto’Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning |
Zelma Aubin Birba, Marc-Olivier Killijian, Sébastien Gambs and Sofiane Azogagh |
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files |
Aleksandr Dolgavin, Mark Yampolskiy and Moti Yung |
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity |
Saskia Nuñez von Voigt, Luise Mehner and Florian Tschorsch |
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning |
Naveen Kumar K, Krishna Mohan C and Aravind Machiry |
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs |
Clement Elliker, Emeric Tonnelier and Aymen Shabou |
Re-pseudonymization strategies for smart-meter are not robust to deep learning-based profiling attacks |
Ana-Maria Cretu, Miruna Rusu and Yves-Alexandre de Montjoye |
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response |
Matta Varun, Shuya Feng, Han Wang, Shamik Sural and Yuan Hong |
(Dataset/Tool) Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types |
Mariana Cunha, Guilherme Duarte, Ricardo Andrade, Ricardo Mendes and João P. Vilela |
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection |
Gabriel Loiseau, Valentin Lefils, Maxime Meyer and Damien Riquet |
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs |
Kedrian James, Kevin Valakuzhy, Kevin Snow and Fabian Monrose |
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis |
Kiavash Satvat, Rigel Gjomemo and Vn Venkatakrishnan |
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning |
Kento Hasegawa, Seira Hidano and Kazuhide Fukushima |
Privacy Preserving Biometric Authentication |
Marina Blanton and Dennis Murphy |
Remote Registration of Multiple Authenticators |
Yongqi Wang, Thalia Laing, José Moreira and Mark D. Ryan |
SLIM-View: Sampling and Private Publishing of Multidimensional Databases |
Ala Eddine Laouir and Abdessamad Imine |
Mining Domain-Based Policies |
Si Zhang and Philip W.L. Fong |
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android |
Shou-Ching Hsiao, Shih-Wei Li and Hsu-Chun Hsiao |
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices |
Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen and Weisong Shi |
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal |
Mashari Alatawi and Nitesh Saxena |
(Dataset/Tool) A Community-Sourced Smishing Dataset: Insights from [anonymous].com |
Daniel Timko and Muhammad Lutfor Rahman |
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks |
Maisha Maliha and Shameek Bhattacharjee |
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters |
Mahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour and Makan Pourzandi |
Process-Aware Intrusion Detection in MQTT Networks |
Philip Empl, Fabian Böhm and Günther Pernul |
Estimating the Runtime and Global Network Traffic of SMPC Protocols |
Andreas Klinger, Vincent Ehrmanntraut and Ulrike Meyer |
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for “Dead-Drop" Deployments |
Luke Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler and Thomas Shrimpton |
Investigating TLS Version Downgrade in Enterprise Software |
Ka Fun Tang, Ka Lok Wu and Sze Yiu Chau |
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores |
K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin Butler, William Enck and Patrick Traynor |
Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem |
Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang and Adam Doupe |