CodeX: Contextual Flow Tracking for Browser Extensions |
Mohammad M. Ahmadpanah, Matías F. Gobbi, Daniel Hedin, Johannes Kinder and Andrei Sabelfeld. |
CryptMove: Moving Stealthily through Legitimate and Encrypted Communication Channels |
Md Rabbi Alam, Jinpeng Wei and Qingyang Wang. |
Protecting DeFi Platforms against Non-Price Flash Loan Attacks |
Abdulrahman Alhaidari, Balaji Palanisamy and Prashant Krishnamurthy. |
Proof of Compliance (PoC): A Consensus Mechanism to Verify Policy Compliance |
Md Al Amin, Hemanth Tummala, Rushabh Shah and Indrajit Ray. |
Fancy programming languages and malware: Static analysis pitfalls and analysts nightmares |
Theodoros Apostolopoulos, Vasilios Koutsokostas, Nikolaos Totosis, Constantinos Patsakis and Georgios Smaragdakis. |
Exploiting HDMI and USB Ports for GPU Side-Channel Insights |
Sayed Erfan Arefin and Abdul Serwadda. |
Multi-Device Context-Sensitive Attacks Against Privacy |
Edgardo Barsallo Yi, Joshua Majors, Aditya Vardhan Padala, Darren Wu, Aravind Machiry and Saurabh Bagchi. |
Espresso: Robust Concept Filtering in Text-to-Image Models |
Anudeep Das, Vasisht Duddu, Rui Zhang and N. Asokan. |
Enhancing Relationship-Based Access Control Policies with Negative Rule Mining |
Ferhat Demirkiran and Amir Masoumzadeh. |
Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations |
Vasisht Duddu, Oskari Järvinen, Lachlan J. Gunn and N. Asokan. |
Accuracy Limits as a Barrier to Biometric System Security |
Axel Durbet, Kevin Thiry-Atighehchi, Pascal Lafourcade and Paul-Marie Grollemund. |
Universally Harmonizing Differential Privacy Mechanisms for Federated Learning: Boosting Accuracy and Convergence |
Shuya Feng, Meisam Mohammady, Hanbin Hong, Shenao Yan, Ashish Kundu, Binghui Wang and Yuan Hong. |
Probabilistic Data Structures in the Wild: A Security Analysis of Redis |
Mia Filić, Jonas Hofmann, Sam A. Markelon, Kenneth G. Paterson and Anupama Unnikrishnan. |
Blind Brother: Attribute-Based Selective Video Encryption |
Eugene Frimpong, Bin Liu, Camille Nuoskala and Antonis Michalas. |
Citar: Cyberthreat Intelligence-driven Attack Reconstruction |
Sutanu Kumar Ghosh, Rigel Gjomemo and V.N. Venkatakrishnan. |
Private Eyes: Zero-Leakage Iris Searchable Encryption |
Julie Ha, Chloe Cachet, Luke Demarest, Sohaib Ahmad and Benjamin Fuller. |
VulPatrol: Interprocedural Vulnerability Detection and Localization through Semantic Graph Learning |
Asmaa Hailane, Paria Shirani and Guy-Vincent Jourdan. |
PromptShield: Deployable Detection for Prompt Injection Attacks |
Dennis Jacob, Hend Alzahrani, Zhanhao Hu, Basel Alomair and David Wagner. |
To the Best of Knowledge and Belief: On Eventually Consistent Access Control |
Florian Jacob and Hannes Hartenstein. |
Differentially Private Iterative Screening Rules for Linear Regression |
Amol Khanna, Fred Lu and Edward Raff. |
Secure and Efficient Video Inferences with Compressed 3-Dimensional Deep Neural Networks |
Bingyu Liu, Ali Arastehfard, Rujia Wang, Weiran Liu, Zhongjie Ba, Shanglin Zhou and Yuan Hong. |
Spend Your Budget Wisely: Towards an Intelligent Distribution of the Privacy Budget in Differentially Private Text Rewriting |
Stephen Meisenbacher, Chaeeun Lee and Florian Matthes. |
SmishViz: Towards A Graph-based Visualization System for Monitoring and Characterizing Ongoing Smishing Threats |
Seyed Mohammad Sanjari, Ashfak Md Shibli, Maraz Mia, Maanak Gupta and Mir Mehedi Ahsan Pritom. |
How Feasible is Augmenting Fake Nodes with Learnable Features as a Counter-Strategy Against Link Stealing Attacks? |
Mir Imtiaz Mostafiz, Imtiaz Karim and Elisa Bertino. |
Evaluating Website Data Leaks through Spam Collection on Honeypots |
Oghenerukevwe Oyinloye and Carol Fung. |
The Ephemeral Threat: Assessing the Security of Algorithmic Trading Systems Powered by Deep Learning |
Advije Rizvani, Giovanni Apruzzese and Pavel Laskov. |
Why You've Got Mail: Evaluating Inbox Privacy Implications of Email Marketing Practices in Online Apps and Services |
Scott Seidenberger, Oluwasijibomi Ajisegiri, Noah Pursell, Fazil Raja and Anindya Maiti. |
Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning |
Riccardo Taiello, Clémentine Gritti, Melek Önen and Marco Lorenzi. |
SemFinder: A Semantics-Based Approach to Enhance Vulnerability Analysis in Web Applications |
Neil Thimmaiah, Rigel Gjomemo and Venkat Venkatakrishnan. |
TerrARA: Automated Security Threat Modeling for Infrastructure as Code |
Anh-Duy Tran, Laurens Sion, Koen Yskout and Wouter Joosen. |
VS-TEE: A Framework for Virtualizing TEEs in ARM Cloud Contexts |
Matteo Zoia, Marco Cutecchia, Davide Rusconi, Andrea Monzani, Mirco Picca, Danilo Bruschi and Andrea Lanzi. |
SolRPDS: A Dataset for Analyzing Rug Pulls in Solana Decentralized Finance (Dataset/Tool Paper) |
Abdulrahman Alhaidari, Bhavani Kalal, Balaji Palanisamy and Shamik Sural. |
A Dataset for Evaluating LLMs Vulnerability Repair Performance in Android Applications (Dataset/Tool Paper) |
Elisa Braconaro and Eleonora Losiouk. |
Trilobyte: Plausibly Deniable Communications Through Single Player Games (Dataset/Tool Paper) |
Yuzhou Feng, Sandeep Kiran Pinjala, Radu Sion and Bogdan Carbunar. |
Using Venom to Flip the Coin and Peel the Onion: Measurement Tool and Dataset for Studying the Bitcoin - Dark Web Synergy (Dataset/Tool Paper) |
Lukas Ingmarsson, Karl Duckert Karlsson and Niklas Carlsson. |
IoTDSCreator: A Framework to Create Labeled Datasets for IoT Intrusion Detection Systems (Dataset/Tool Paper) |
Hyunwoo Lee, Charalampos Katsis, Alireza Lotfi, Taejun Choi, Soeun Kim, Ashish Kundu and Elisa Bertino. |
Enhanced Threat Modeling and Attack Scenario Generation for OAuth 2.0 Implementations (Dataset/Tool Paper) |
Pieter Philippaerts, Stef Verreydt and Wouter Joosen. |
Padding Matters – Exploring Function Detection in PE Files (Dataset/Tool Paper) |
Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban and Christian Dietrich. |
Sherlock: A Dataset for Process-Aware Intrusion Detection Research on Power Grid Networks (Dataset/Tool Paper) |
Eric Wagner, Lennart Bader, Konrad Wolsing and Martin Serror. |