Title Authors
Accelerating Performance of Bilinear Map Cryptography using FPGA Andrei Ouatu, Gabriel Ghinita and Razvan Rughinis
Exploiting Update Leakage in Searchable Symmetric Encryption Jacob Haltiwanger and Thang Hoang
The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits Ihyun Nam
CoCoT: Collaborative Contact Tracing Trevor Kann, Lujo Bauer and Robert Cunningham
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation Alessandro Baccarini, Marina Blanton and Shaofeng Zou
Crypto’Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning Zelma Aubin Birba, Marc-Olivier Killijian, Sébastien Gambs and Sofiane Azogagh
Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files Aleksandr Dolgavin, Mark Yampolskiy and Moti Yung
From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity Saskia Nuñez von Voigt, Luise Mehner and Florian Tschorsch
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Naveen Kumar K, Krishna Mohan C and Aravind Machiry
Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs Clement Elliker, Emeric Tonnelier and Aymen Shabou
Re-pseudonymization strategies for smart-meter are not robust to deep learning-based profiling attacks Ana-Maria Cretu, Miruna Rusu and Yves-Alexandre de Montjoye
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response Matta Varun, Shuya Feng, Han Wang, Shamik Sural and Yuan Hong
(Dataset/Tool) Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types Mariana Cunha, Guilherme Duarte, Ricardo Andrade, Ricardo Mendes and João P. Vilela
WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection Gabriel Loiseau, Valentin Lefils, Maxime Meyer and Damien Riquet
CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs Kedrian James, Kevin Valakuzhy, Kevin Snow and Fabian Monrose
TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis Kiavash Satvat, Rigel Gjomemo and Vn Venkatakrishnan
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning Kento Hasegawa, Seira Hidano and Kazuhide Fukushima
Privacy Preserving Biometric Authentication Marina Blanton and Dennis Murphy
Remote Registration of Multiple Authenticators Yongqi Wang, Thalia Laing, José Moreira and Mark D. Ryan
SLIM-View: Sampling and Private Publishing of Multidimensional Databases Ala Eddine Laouir and Abdessamad Imine
Mining Domain-Based Policies Si Zhang and Philip W.L. Fong
Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android Shou-Ching Hsiao, Shih-Wei Li and Hsu-Chun Hsiao
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen and Weisong Shi
Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal Mashari Alatawi and Nitesh Saxena
(Dataset/Tool) A Community-Sourced Smishing Dataset: Insights from [anonymous].com Daniel Timko and Muhammad Lutfor Rahman
A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks Maisha Maliha and Shameek Bhattacharjee
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters Mahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour and Makan Pourzandi
Process-Aware Intrusion Detection in MQTT Networks Philip Empl, Fabian Böhm and Günther Pernul
Estimating the Runtime and Global Network Traffic of SMPC Protocols Andreas Klinger, Vincent Ehrmanntraut and Ulrike Meyer
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for “Dead-Drop" Deployments Luke Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler and Thomas Shrimpton
Investigating TLS Version Downgrade in Enterprise Software Ka Fun Tang, Ka Lok Wu and Sze Yiu Chau
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin Butler, William Enck and Patrick Traynor
Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang and Adam Doupe