Title Authors
CodeX: Contextual Flow Tracking for Browser Extensions Mohammad M. Ahmadpanah, Matías F. Gobbi, Daniel Hedin, Johannes Kinder and Andrei Sabelfeld.
CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels Md Rabbi Alam, Jinpeng Wei and Qingyang Wang.
Protecting DeFi Platforms against Non-Price Flash Loan Attacks Abdulrahman Alhaidari, Balaji Palanisamy and Prashant Krishnamurthy.
Proof of Compliance (PoC): A Consensus Mechanism to Verify Policy Compliance Md Al Amin, Hemanth Tummala, Rushabh Shah and Indrajit Ray.
Fancy programming languages and malware: Static analysis pitfalls and analysts nightmares Theodoros Apostolopoulos, Vasilios Koutsokostas, Nikolaos Totosis, Constantinos Patsakis and Georgios Smaragdakis.
Exploiting HDMI and USB Ports for GPU Side-Channel Insights Sayed Erfan Arefin and Abdul Serwadda.
Multi-Device Context-Sensitive Attacks Against Privacy Edgardo Barsallo Yi, Joshua Majors, Aditya Vardhan Padala, Darren Wu, Aravind Machiry and Saurabh Bagchi.
Espresso: Robust Concept Filtering in Text-to-Image Models Anudeep Das, Vasisht Duddu, Rui Zhang and N. Asokan.
Enhancing Relationship-Based Access Control Policies with Negative Rule Mining Ferhat Demirkiran and Amir Masoumzadeh.
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations Vasisht Duddu, Oskari Järvinen, Lachlan J. Gunn and N. Asokan.
Accuracy Limits as a Barrier to Biometric System Security Axel Durbet, Kevin Thiry-Atighehchi, Pascal Lafourcade and Paul-Marie Grollemund.
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang and Yuan Hong.
Probabilistic Data Structures in the Wild: A Security Analysis of Redis Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson and Anupama Unnikrishnan.
Blind Brother: Attribute-Based Selective Video Encryption Eugene Frimpong, Bin Liu, Camille Nuoskala and Antonis Michalas.
Citar: Cyberthreat Intelligence-driven Attack Reconstruction Sutanu Kumar Ghosh, Rigel Gjomemo and V.N. Venkatakrishnan.
Private Eyes: Zero-Leakage Iris Searchable Encryption Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad and Benjamin Fuller.
VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning Asmaa Hailane, Paria Shirani and Guy-Vincent Jourdan.
PromptShield: Deployable Detection for Prompt Injection Attacks Dennis Jacob, Hend Alzahrani, Zhanhao Hu, Basel Alomair and David Wagner.
To the Best of Knowledge and Belief: On Eventually Consistent Access Control Florian Jacob and Hannes Hartenstein.
Differentially Private Iterative Screening Rules for Linear Regression Amol Khanna, Fred Lu and Edward Raff.
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks Bingyu Liu, Ali Arastehfard, Rujia Wang, Weiran Liu, Zhongjie Ba, Shanglin Zhou and Yuan Hong.
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting Stephen Meisenbacher, Chaeeun Lee and Florian Matthes.
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats Seyed Mohammad Sanjari, Ashfak Md Shibli, Maraz Mia, Maanak Gupta and Mir Mehedi Ahsan Pritom.
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-Strategy Against Link Stealing Attacks? Mir Imtiaz Mostafiz, Imtiaz Karim and Elisa Bertino.
Evaluating Website Data Leaks through Spam Collection on Honeypots Oghenerukevwe Oyinloye and Carol Fung.
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems Powered by Deep Learning Advije Rizvani, Giovanni Apruzzese and Pavel Laskov.
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services Scott Seidenberger, Oluwasijibomi Ajisegiri, Noah Pursell, Fazil Raja and Anindya Maiti.
Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning Riccardo Taiello, Clémentine Gritti, Melek Önen and Marco Lorenzi.
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications Neil Thimmaiah, Rigel Gjomemo and Venkat Venkatakrishnan.
TerrARA: Automated Security Threat Modeling for Infrastructure as Code Anh-Duy Tran, Laurens Sion, Koen Yskout and Wouter Joosen.
VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts Matteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi and Andrea Lanzi.
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance (Dataset/Tool Paper) Abdulrahman Alhaidari, Bhavani Kalal, Balaji Palanisamy and Shamik Sural.
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications (Dataset/Tool Paper) Elisa Braconaro and Eleonora Losiouk.
Trilobyte: Plausibly Deniable Communications Through Single Player Games (Dataset/Tool Paper) Yuzhou Feng, Sandeep Kiran Pinjala, Radu Sion and Bogdan Carbunar.
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy (Dataset/Tool Paper) Lukas Ingmarsson, Karl Duckert Karlsson and Niklas Carlsson.
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems (Dataset/Tool Paper) Hyunwoo Lee, Charalampos Katsis, Alireza Lotfi, Taejun Choi, Soeun Kim, Ashish Kundu and Elisa Bertino.
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations (Dataset/Tool Paper) Pieter Philippaerts, Stef Verreydt and Wouter Joosen.
Padding Matters – Exploring Function Detection in PE Files (Dataset/Tool Paper) Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban and Christian Dietrich.
Sherlock: A Dataset for Process-Aware Intrusion Detection Research on Power Grid Networks (Dataset/Tool Paper) Eric Wagner, Lennart Bader, Konrad Wolsing and Martin Serror.