Full Program
| Day 1 (Monday, June 1 2026) | ||||||
| Indian Affairs + Poolside | ||||||
| 18:00-21:00 | Registration | |||||
| 18:30-23:00 | Welcome Reception | |||||
| Day 2 (Tuesday, June 2 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Sigma-1 | Sigma-3 | Indian Affairs | ||
| 08:00-17:30 | Registration | |||||
| 09:00-10:00 | WDC-1 | CPSS-1 | SPAIC-1 | LM-SHIELD-1 | BSCI-1 | |
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 | WDC-2 | CPSS-2 | SPAIC-2 | LM-SHIELD-2 | BSCI-2 | |
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 | WDC-3 | CPSS-3 | SPAIC-3 | LM-SHIELD-3 | BSCI-3 | |
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 | WDC-3 | CPSS-3 | FL-1 | AMASS-1 | APKC-1 | |
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:15 | WDC-5 | CPSS-5 | FL-2 | AMASS-2 | APKC-2 | |
| 16:15-16:30 | Tea Break | |||||
| 16:30-17:30 | WDC-6 | CPSS-6 | FL-3 | AMASS-3 | APKC-3 | |
| Esquire/Executive conference room | ||||||
| 18:00-21:00 | AsiaCCS (steering committee) meeting (possibly online) | |||||
| Day 3 (Wednesday, June 3 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 09:00-09:30 | Opening Remarks | |||||
| 9:30-10:30 | Plenary Talk-1 (Grand Ballroom – 1 + 2) | |||||
| 10:30-10:45 | Tea Break | |||||
| 10:45-11:30 |
Session-1a: Outsourced Computation – I
MYao: Efficient Multiparty “Yao” Garbled Circuits with Row Reduction and Half Gates Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri (Ariel University)
Scalable Private Set Intersection over Distributed Encrypted Data Seunghun Paik (Hanyang University); Nirajan Koirala, Jack Nero (University of Notre Dame); Hyunjung Son, Yunki Kim, Jae Hong Seo (Hanyang University); Taeho Jung (University of Notre Dame)
Concretely Efficient Correlated Oblivious Permutation Feng Han (Alibaba Group); Xiao Lan (Chinese Academy of Sciences); Weiran Liu, Lei Zhang (Alibaba Group); Hao Ren (Nanyang Technological University); Lin Qu (Alibaba Group); Yuan Hong (University of Connecticut) |
Session-1b: Security – I
From DePIN Hype to Operational Reality: Assessing Centralization and Usage of Commercial dVPNs Bartan Oren (Eindhoven University of Technology); Maurantonio Caprolu (CEMSE Division, KAUST); Savio Sciancalepore, Nicola Zannone (Eindhoven University of Technology); Roberto Di Pietro (CEMSE Division, KAUST)
TRM: An Efficient Hypervisor-Based Framework For Malware Analysis and Memory Reconstruction Mohammad Sina Karvandi (Vrije Universiteit Amsterdam); Soroush Meghdadizanjani (Stony Brook University); Sima Arasteh (University of Southern California); Saleh Khalaj Monfared (Worcester Polytechnic Institute); Mohammad K. Fallah (Chosun University); Saeid Gorgin (SungKyunKwan University); Jeong-A Lee (Chosun University); Asia Slowinska, Erik van der Kouwe (Vrije Universiteit Amsterdam)
A First Look at the Mobile Driving License (mDL) Standard and its Real-world Usage Zeyu Lei (Purdue University); Güliz Seray Tuncay (Google); Abdullah Imran, Z. Berkay Celik, Antonio Bianchi (Purdue University) |
Session-1c: Cyber Physical Systems Security – I
SoK: Reviewing Two Decades of Security, Privacy, Accessibility, and Usability Studies on Internet of Things for Older Adults Suleiman Saka (University of Denver); Sanchari Das (George Mason University)
Beyond the Device: A Security Analysis of Children’s Smartwatches and Their Ecosystem Huancheng Hu, Christian Doerr (Hasso Plattner Institute)
The End of Anarchy? Understanding the Life of HTTP Exploits Used in IoT Malware Infections Ryu Kuki, Takayuki Sasaki (Yokohama National University); Arwa Al Alsadi (Delft University of Technology); Carlos Gañán (Delft University of Technology/Yokohama National University); Katsunari Yoshioka (Yokohama National University) |
|||
| 11:30-11:45 | Tea Break | |||||
| 11:45-12:30 |
Session-2a: Outsourced Computation – II Stateless 2PC Signatures for Internet-Scale Authentication and Authorization Michael Adjedj (Fireblocks); Geoffroy Couteau (Université Paris Cité, CNRS, IRIF); Arik Galansky, Nikolaos Makriyannis, Oren Yomtov (Fireblocks)
A New Construction Method for More Efficient Quadratic One-Time Noisy Multi-Client Functional Encryption Schemes Jasmin Zalonis (University of Mannheim); Linda Scheu-Hachtel (University of Mannheim, Germany); Frederik Armknecht (University of Mannheim)
Improved Verifiable Computation of Linear and Quadratic Functions over Encrypted Data and Its Applications Evan Schott (Yale University); Yinuo Zhang (University of Canterbury) |
Session-2b: Program Analysis Data Flows in You: Benchmarking and Improving Static Data-flow Analysis on Binary Executables Nicolaas Weideman (USC Information Sciences Institute); Sima Arasteh, Mukund Raghothaman (University of Southern California); Jelena Mirkovic (USC Information Sciences Institute); Christophe Hauser (Dartmouth College)
SysDiver: Lightweight and Fast Static Analysis for Windows Kernel Drivers Chanhee Park, Dongjoo Kim, Youngjoo Shin (Korea University)
Uncovering the Deceptive Tactics of Stalkerware: A Large Scale Measurement Study Malvika Jadhav, Wenxuan Bao, Vincent Bindschaedler (University of Florida) |
Session-2c: Cyber Physical Systems Security – II SCREAM: Secure Channels for Real-time Evaluation of Additive Manufacturing
Prithwish Basu Roy (New York University Tandon School of Engineering); Jason Blocklove, Mudit Bhargava (NYU Tandon School of Engineering); Hammond Pearce (UNSW Sydney); Prashanth Krishnamurthy (NYU Tandon School of Engineering); Ozgur Sinanoglu (New York University, Abu Dhabi); Nikhil Gupta (New York University Tandon School of Engineering); Farshad Khorrami (NYU Tandon School of Engineering); Ramesh Karri (New York University)
HidePrint: Protecting Device Anonymity by Obscuring Radio Fingerprints Gabriele Oligeri (Hamad bin Khalifa University); Savio Sciancalepore (TU Eindhoven (TU/e))
PHANTOM: Physics-Aware Adversarial Attacks against Federated Learning-Coordinated EV Charging Management System Mohammad Zakaria Haider (Florida International University); Amit Kumer Podder (North Carolina State University); Prabin Mali (Florida International University); Aranya Chakrabortty (North Carolina State University); Sumit Paudyal, Mohammad Ashiqur Rahman (Florida International University) |
|||
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 |
Session-3a: Encryption and Signatures
PUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives Andreas Weninger, Elena Andreeva (TU Wien)
Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers Osama Allabwani (Université Clermont Auvergne, LIMOS, CNRS, BeYs); Olivier Blazy (École Polytechnique); Pascal Lafourcade (Université Clermont Auvergne, LIMOS, CNRS, ASTEROIDE, Trust4Sign); Charles Olivier-Anclin, Olivier Raynaud (Université Clermont Auvergne, LIMOS, CNRS)
Traceable Threshold Batch Encryption with Applications to Enhancing Mempool Privacy Anirban Chakrabarti (Indian Institute of Science); Monosij Maitra (Indian Institute of Technology Kharagpur); Arup Mondal (Ashoka University)
BMuSig2: Schnorr-Compatible Blind Multi-Signatures Kanchan Bisht, Keerthi Aiswarya Varshini, Shivam Sethi, Maria Francis (Indian Institute of Technology Hyderabad); R. Kabaleeshwaran (Indian Institute of Information Technology Design and Manufacturing Kurnool) |
Session-3b: Cryptanalysis & Implementation Attacks BarkBeetle: Stealing Decision Tree Models with Fault Injection Qifan Wang (Durham University); Jonas Sander (University of Luebeck); Minmin Jiang (Queen’s University Belfast); Thomas Eisenbarth (University of Luebeck); David Oswald (Durham University)
Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption Aikata Aikata (Graz University of Technology); Ahaan Dabholkar (Purdue University); Dhiman Saha (Indian Institute of Technology Bhilai); Sujoy Sinha Roy (Graz University of Technology)
LINE-Break: Cryptanalysis and Reverse Engineering of Letter Sealing Diego F. Aranha, Adam Blatchley Hansen, Thomas Kingo T. Mogensen (Aarhus University)
Attack from Shadows: Unsupervised Side-channel Transfer Learning across Devices and Modalities Saion Kumar Roy (Northeastern University); Ziyue Zhang (Northeastern university); A. Adam Ding, Yunsi Fei (Northeastern University) |
Session-3c: Machine Learning – I
ADAGE: Active Defenses Against GNN Extraction Jing Xu, Franziska Boenisch, Adam Dziedzic (CISPA Helmholtz Center for Information Security)
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts Felix Mächtle (University of Luebeck); Ashwath Shetty (University of Kiel); Jonas Sander (University of Luebeck); Nils Loose (Universität zu Luebeck); Soeren Pirk (University of Kiel); Thomas Eisenbarth (University of Luebeck)
Reasoning That Leaks, Fine-Tuning That Amplifies: Exposing the Hidden Threats of Chain-of-Thought Models Zhiyuan Xu, Joseph Gardiner, Sana Belguith (University of Bristol)
Shape-Shifting Malicious Code in Software Backdoors via Language Models Mohammad Ebrahimi Fard, Felix Weissberg, Erik Imgrund (BIFOLD & TU Berlin); Thorsten Eisenhofer (CISPA Helmholtz Center for Information Security); Konrad Rieck (BIFOLD & TU Berlin) |
|||
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:15 |
Session-4a: Advanced Constructions Privacy-preserving Proximity Testing from Geometric Fuzzy Matching Florias Papadopoulos, Ioannis Katis, Katerina Mitrokotsa (University of St. Gallen)
A Differentiated Approach for Post-Quantum DNSSEC Marc Espie, Hugo Mayer (EPITA Research Lab (LRE)); Ludovic Perret (EPITA/Sorbonne University)
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security Nilanjan Datta (Institute for Advancing Intelligence, TCG-CREST, Kolkata); Jean Paul Degabriele (Technology Innovation Institute, Abu Dhabi); Avijit Dutta (Institute for Advancing Intelligence, TCG-CREST, Kolkata and AcSIR India); Vukašin Karadžić (TU Darmstadt); Hrithik Nandi (Institute for Advancing Intelligence, TCG-CREST, Kolkata and RKMVERI)
Binary Kummer Lines and Binary Edwards Curves: Efficient Two-way Vectorizations Rittwik Hajra, Sabyasachi Karati (Indian Statistical Institute, India); Tanushri Sen (Silence Laboratories) |
Session-4b: Confidential Computing & Containers TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters Fabian Rauscher, Hannes Weissteiner, Daniel Gruss (Graz University of Technology)
Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS Muhammad Usama Sardar (TU Dresden); Mariam Moustafa, Tuomas Aura (Aalto University)
CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines Joana Pecholt, Maximilian Peisl (Fraunhofer AISEC); Michael Weiß (Fraunhofer Institute AISEC)
CAGE-V: Confidential Computing Architecture supporting Guest Enclaves for RISC-V Moritz Waser, Paul Gollob, Martin Unterguggenberger, Stefan Mangard (Graz University of Technology) |
Session-4c: Machine Learning II Deep Learning Backdoor Defense via Adaptive Trigger Collisions in Latent Space Zixun Xiong (Stevens Institute of Technology); Hao Wang (Stevens Institue of Technology); Jian Li (Stony Brook University); Yang Hua (Queen’s University Belfast, UK); Miao Pan (University of Houston); Xiaojiang Du (Stevens Institute of Technology)
Purified Distillation Slimming (PDS) for Robust Backdoor Defense Liqun Shan, Kaiying Han (University of Louisiana at Lafayette); Yazhou Tu (Auburn University); Insup Lee (University of Pennsylvania); Xiali Hei (University of Louisiana at Lafayette)
Noise, Why Can’t You Bend? Detecting Adversarial Perturbations in Wireless Sensing via Structural Fragility Md Hasan Shahriar (Virginia Tech); Ning Wang (University of South Florida); Amit Kumar Sikder (Iowa State University); Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou (Virginia Tech)
FLux: Covert Channels in FL through Transposed Training Torsten Krauß (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen); Yisroel Mirsky (Ben Gurion University of the Negev) |
|||
| 16:15-16:30 | Tea Break | |||||
| 16:30-17:30 |
Session-5a: Protocols I Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and more… David Kretzler, Yong Li, Codrin Ogreanu (Huawei Heisenberg Research Center)
Aggregator-Based Voting using proof of Partition Marius Lombard-Platet, Doron Zarchy (Apsia, SnT, university of Luxembourg)
PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments Carolin Beer, Sheila Zingg, Kari Kostiainen (ETH Zurich); Karl Wüst (Mysten Labs); Vedran Capkun (HEC Paris); Srdjan Capkun (ETH Zurich)
Efficiency Improvements for Signal’s Handshake Protocol Barbara Jiabao Benedikt, Sebastian Clermont, Marc Fischlin, Tobias Schmalz (Technische Universität Darmstadt) |
Session-5b: Security II Sheriff: Arresting the Confused Deputy Undermining Ultra-low SWaP Device Trusted Execution Environments Prakhar Sah, Matthew Hicks (Virginia Tech)
Overseer: Enforcing fine-grained memory access control across execution environments Darius Suciu, Sandeep Kiran Pinjala, Bin Sun, Radu Sion (Stony Brook University)
FIDES: End-to-end Compartments for Mixed-language Systems Sai Venkata Krishnan Rajeswari Sridevi (Indian Institute of Technology Madras); Arjun Menon (InCore Semiconductors); Chester Rebeiro, KC Sivaramakrishnan (Indian Institute of Technology Madras)
ImmuCheck: Selective Immutability for Container Escape Detection in Containerized Microservices Asbat El Khairi (University of Twente); Amina Bassit (Mobai); Andreas Peter (Carl von Ossietzky Universität Oldenburg); Andrea Continella (University of Twente) |
Session-5c: Machine Learning – III Taming Data Challenges in ML-based Security Tasks Using Generative AI Shravya Kanchi (Virginia Tech); Neal Mangaokar (University of Michigan); Aravind Cheruvu, Sifat Muhammad Abdullah (Virginia Tech); Shirin Nilizadeh (The University of Texas at Arlington); Atul Prakash (University of Michigan); Bimal Viswanath (Virginia Tech)
ATAG: AI-Agent Application Threat Assessment with Attack Graphs Parth Atulbhai Gandhi (Ben Gurion University of the Negev); David Tayouri (Ben-Gurion University of the Negev); Akansha Shukla, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai (Ben Gurion University of the Negev)
VET Your Agent: Towards Host-Independent Autonomy via Verifiable Execution Traces Artem Grigor, Christian Schroeder de Witt, Simon Birnbach, Ivan Martinovic (University of Oxford)
Mind the Web: The Security of Web Use Agents Avishag Shapira, Parth Atulbhai Gandhi, Idan Habler, Asaf Shabtai (Ben Gurion University of the Negev) |
|||
| Day 4 (Thursday, June 4 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 08:00-08:45 |
Session-6a: Zero-Knowledge Proofs SoK: Understanding zkVM: From Research to Practice Yang Yunbo (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Yuejia Cheng (University of Sussex); Haibo Tang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Guomin Yang (Singapore Management University); Bingsheng Zhang, Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)
HyperFond: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication Yuanzhuo Yu (Shanghai Jiao Tong University); Mengling Liu (The Hong Kong Polytechnic University); Yuncong Zhang (Shandong University); Tianyi Ma, Shi-Feng Sun (Shanghai Jiao Tong University); Man Ho Au (The Hong Kong Polytechnic University); Dawu Gu (Shanghai Jiao Tong University)
A Linear Operator Framework for Polynomial Divisions in Cryptography Varun Madathil (Yale University); Arnab Roy, Konstantinos Chalkias (Mysten Labs); Charanjit Jutla (IBM Research); Jonas Lindstrom (Mysten Labs) |
Session-6b: Privacy I SoK: Navigating the Privacy–UX Trade-offs in Extended Reality (XR) — A Socio-Technical Taxonomy and Research Roadmap Shunyao Wang (The University of Queensland); M.A.P. Chamikara, Mohan Baruwal Chhetri, Zhenchang Xing (CSIRO’s Data61); Ryan Ko (The University of Queensland)
SoK: Analysis of Privacy Risks and Mitigation in Online Propaganda Detection through the PROMPT Framework Dhiman Goswami, Al Nahian Bin Emran, Md Hasan Ullah Sadi, Sanchari Das (George Mason University)
Sensing Censorship and Censuring Censors with Censorship-Evident Publishing Systems Swaminathan Ramesh, Ryan Henry (University of Calgary) |
||||
| 08:45-09:00 | Tea Break | |||||
| 9:00-10:00 | Plenary Talk-2 (Grand Ballroom – 1 + 2) | |||||
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 |
Session-7a: Micro-architectural Attacks and Defences CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers Jonah Heller, Marcel Pflaeging, Thore Tiemann, Thomas Eisenbarth (University of Luebeck)
Abortection: Robust TSX-Based Detection of Cache Side-Channel Attacks on Modern Intel CPUs with Non-Inclusive LLCs Hyungjung Joo, Hodong Kim, Junbeom Hur (Korea University)
TAGShield: Persistent Tagging for Robust Stack Memory Error Protection Michele Grisafi, Carlo Ramponi (University of Trento); Silviu Vlasceanu, Mahmoud Ammar (Huawei Research, Germany); Bruno Crispo (University of Trento)
Memory Tagging with Intra-Object Detection: Bridging the Gap in Fine-Grained Memory Safety Konrad Hohentanner, Lukas Hertel (Technical University of Munich); Minu Föger, Lukas Auer, Julian Horsch (Fraunhofer AISEC) |
Session-7b: Botnets and Intrusion Detection Systems LotBoNC: Novel Botnet Traffic Classification under Long-tailed Distributions Huancheng Hu (Hasso Plattner Institute); Ziyun Li (KTH Royal Institute of Technology); Christian Doerr (Hasso Plattner Institute)
SoK: Reshaping Research on Network Intrusion Detection Systems Giovanni Apruzzese (University of Liechtenstein & Reykjavik University)
“What is the Problem Space?” Defining Host-space Adversarial Perturbations against Network Intrusion Detection Systems Miel Verkerken, Laurens D’hooge, Bruno Volckaert, Filip De Turck (Ghent University – imec); Giovanni Apruzzese (University of Liechtenstein and ReykjaviK University)
StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS Manuel Kern, Dominik Steffan, Felix Schuster (Austrian Institute of Technology); Simon Freudenthaler (FH Hagenberg); Edgar Weippl (University of Vienna); Florian Skopik, Max Landauer, David Allison (Austrian Institute of Technology) |
Session-7c: Federated Learning Setup Once, Secure Always: A Single-Setup Secure Federated Learning Aggregation Protocol with Forward and Backward Secrecy for Dynamic Users Nazatul Haque Sultan (CSIRO’s Data61, Sydney); Yan Bo (CSIRO’s Data61); Yansong Gao (University of Western Australia); Seyit Camtepe (CSIRO’s Data61); Arash Mahboubi (CSU, Australia); Hang Thanh Bui (UNSW, Australia); Aufeef Chauhan (RMIT, Australia); Hamed Aboutorab (UNSW, Australia); Michael Bewong (CSU, Australia); Praveen Gauravaram (TCS, Australia); Dineshkumar Singh (TCS, India); Rafiqul Islam (CSU, Australia); Sharif Abuadbba (CSIRO’s Data61)
SecureAFL: Secure Asynchronous Federated Learning Anjun Gao (University of Louisville); Feng Wang (Northeastern University); Zhenglin Wan (National University of Singapore); Yueyang Quan, Zhuqing Liu (University of North Texas); Minghong Fang (University of Louisville)
ClieND: Client-Side Neuron-Level Detection against Poisoning Attacks on Cross-Silo Federated Learning Mengyao Ma, Shuofeng Liu (The University of Queensland); Viet Vo (Swinburne University of Technology); Minghong Fang (University of Louisville); Surya Nepal (CSIRO’s Data61 Australia); Guangdong Bai (City University of Hong Kong)
FedLeaks: Creating Timing Channel Leaks in Federated Learning of Adaptive Neural Networks Ayomide Akinsanya, Tegan Brennan (Stevens Institute of Technology) |
|||
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 |
Session-8a: Fuzzing and Program Obfuscation FUZZItizer: Hardware Sanitizer-Assisted Fuzzing for Automated SoC Vulnerability Detection Rahul Kande (Texas A & M University); Mohamadreza Rostami (Technical University of Darmstadt); Chen Chen (Texas A&M University); Hareesh Khattri, Jason M. Fung (Intel Corporation); Ahmad-Reza Sadeghi (Technical University of Darmstadt); Jeyavijayan Rajendran (Texas A&M University)
RESTing-LLAMA: Large Language Model based REST API Fuzzing Varun Gadey (University of Duisburg-Essen); Christoph Sendner, Keven Zimmermann (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen)
LASGen: Synergistic Harness–Seed Co-Synthesis for High-Coverage Library Fuzzing Ming Chen, Yujie Xing (Shandong University); Jiongyi Chen (National University of Defense Technology); Wenrui Diao (Shandong University)
SaMBA: Increasing Mixed Boolean-Arithmetic Complexity Through Equality Saturation Caroline König, David Schmidt, Philip König, Patrick Felbauer, Sebastian Schrittwieser (University of Vienna, Faculty of Computer Science, Christian Doppler Laboratory AsTra) |
Session-8b: Web Security CRX-ray: Large-Scale Detection of API Key Leakage in Browser Extensions Wei Zeng (University of Liverpool); Zhi Wang (Nankai University); Valerio Bucci (Queen’s University Belfast); Xiaoyu Chen, Xin Yang, Siyu Zhang (Nankai University); Yuejun Guo (Luxembourg Institute of Science and Technology); Wanpeng Li (University of Liverpool)
Original Sin of npm: A Study on Vulnerability Propagation in JavaScript Dependency Networks Michael Robinson (Data61, CSIRO, Australia); Sajal Halder (RMIT University and Data61, CSIRO, Australia); Muhammad Ejaz Ahmed (Data61, CSIRO, Australia); Muhammad Ikram (Macquarie University, Australia); Seyit Camtepe (Data61, CSIRO, Australia); Hyoungshick Kim (Sungkyunkwan University, South Korea)
Practical Real-time Detection of IPv4 Record Classical Domain Hijacking at Scale Janos Szurdi, Mohammad Ghasemisharif, Reethika Ramesh, Zhanhao Chen (Palo Alto Networks); Ruian Duan (Palo Alto Networks Inc.); William Melicher, Daiping Liu (Palo Alto Networks)
VDPCollect: Vulnerability Disclosure Programs as a Complement to Web Security Measurements Philip Decker (University Saarland); Florian Hantke (CISPA Helmholtz Center for Information Security) |
Session-8c: Privacy II How Tough Is Location Anonymization? Re-identifying 100K Real-User Trajectories in Japan Abhishek Kumar Mishra (Inria, Lyon, France); Mathieu Cunche (INSA-Lyon, Inria, CITI, UR3720, Villeurbanne, France); Héber H. Arcolezi (Inria, Grenoble, France; ÉTS Montréal, Montréal, Canada)
ZEEP: Zone Encryption with Enhanced Privacy for Vehicular Communication Kanchan Bisht, Ashish B Emmanuel, Prashanth Sriram S, Maria Francis (Indian Institute of Technology Hyderabad)
Unequal Privacy: Auditing Demographic Bias Vulnerabilities in Visual Protection Systems Seyyed Mohammad Sadegh Moosavi Khorzooghi (University of Texas at Arlington); Poojitha Thota (The University of Texas at Arlington); Mohit Singhal (Northeastern University); Abolfazl Asudeh (University of Illinois Chicago); Gautam Das, Shirin Nilizadeh (The University of Texas at Arlington)
bPk#: Delegatable Pseudonyms Stephan Krenn, Doryan Lesaignoux, Sebastian Ramacher (AIT Austrian Institute of Technology) |
|||
| 12:30-14:00 | Lunch | |||||
| Indian Affairs + Poolside | ||||||
| 14:00-17:00 | Poster Session | |||||
| Grand Ballroom – 1 + 2 | ||||||
| 18:00-19:00 | Award Ceremony | |||||
| 19:00-20:00 | Cultural Event | |||||
| 20:00-23:00 | Gala Dinner | |||||
| Day 5 (Friday, June 5 2026) | ||||||
| Grand Ballroom-1 | Grand Ballroom-2 | Indian Affairs | ||||
| 08:00-17:30 | Registration | |||||
| 9:00-10:00 | Plenary Talk-3 (Grand Ballroom – 1 + 2) | |||||
| 10:00-10:15 | Tea Break | |||||
| 10:15-11:15 |
Session-9a: Malware and Vulnerability Analysis A Comparative Analysis of NVD, JVNDB and CNVD: Insights into Global and Regional Vulnerability Reporting Juehao Lin, Xuanxiang William Wang, Gianluca Stringhini, Manuel Egele (Boston University)
Knowing your weaknesses is your greatest strength: Mapping CVE to CWE by leveraging CWE Hierarchy and fine-tuned LLMs Stefano Simonetto, Ronan Oostveen, Thijs Van Ede, Peter Bosch, Willem Jonker (University of Twente)
Kitten or Panda? Measuring the Specificity of Threat Group Behaviors in Public CTI Knowledge Bases Aakanksha Saha, Martina Lindorfer (TU Wien); Juan Caballero (IMDEA Software Institute)
SoK: Systematization, Detection, and Hunting of Windows Malware Persistence Techniques Jorik van Nielen (University of Twente); Andrea Oliveri (EURECOM); Jerre Starink (University of Twente); Andreas Peter (University of Oldenburg); Marieke Huisman (University of Twente); Simone Aonzo, Davide Balzarotti (EURECOM); Andrea Continella (University of Twente) |
Session-9b: Homomorphic Encryption Towards Lightweight CKKS: On Client Cost Efficiency Jung Hee Cheon (Seoul National University / CryptoLab Inc.); Minsik Kang (Seoul National University); Jai Hyun Park (CryptoLab Inc.)
Fully Homomorphic Encryption Inference of Neural Networks Using CKKS-TFHE Scheme Switching and Accelerated Linear Layers Anas Banta Seutia, Muhammad Zaky Firdaus (Universitas Gadjah Mada); Muhammad Alfi Ramadhan (University of Central Florida); Kabul Kurniawan, Muhammad Husni Santriaji, Muhammad Alfian Amrizal, Reza Pulungan (Universitas Gadjah Mada); Hiroyuki Takizawa (Tohoku University)
PP-Vul: Privacy-Preserving Vulnerability Detection Using Homomorphic Encryption Seungho Kim, Seonhye Park, Jihun Kim, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Hyunmin Choi (NAVER Cloud); Hyoungshick Kim (Sungkyunkwan University)
Sub-Millisecond Gate Bootstrapping Chunling Chen (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Zhihao Li (Digital Technologies, Ant Group); Qingyun Niu, Xianhui Lu, Ruida Wang, Lutan Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Rui Hou (Institute Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCASof Information Engineering, CAS) |
Session-9c: Mobile Security The Cost of Convenience: Identifying, Analyzing, and Mitigating Predatory Loan Applications on Android Olawale Amos Akanji, Manuel Egele, Gianluca Stringhini (Boston University)
DroidHunter: A Robust Vision-Based Detection Against Hidden Android Malware Victoire Nganfang (Univ Rennes, CNRS, INRIA, IRISA); Simon Queyrut (University of Neuchâtel); Yérom-David Bromberg (Univ Rennes, Inria, CNRS, IRISA); Valerio Schiavoni (University of Neuchâtel); Djob Mvondo (Univ Rennes, CNRS, IRISA, INRIA); KENGNE TCHENDJI Vianney (University of Dschang)
CCA-Droid: Context-Aware Cryptographic API Misuse Detection in Android Apps Minwook Lee, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Joonsang Baek, Willy Susilo (University of Wollongong); Hyoungshick Kim (Sungkyunkwan University)
ALPHA: Active Learning with PAC-Bayesian Theory for Android Malware Detection Yaomengxi Han (Technical University of Munich); Yunru Wang (LMU Munich); Debarghya Ghoshdastidar (Technical University of Munich); Johannes Kinder (LMU Munich) |
|||
| 11:15-11:30 | Tea Break | |||||
| 11:30-12:30 |
Session-10a: Vulnerability Detection Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction Felix Mächtle, Nils Loose (University of Luebeck); Tim Schulz (University of Hamburg); Florian Sieck, Jan-Niclas Serr (University of Luebeck); Ralf Moeller (University of Hamburg); Thomas Eisenbarth (University of Luebeck)
Toward Efficient and Effective Vulnerability Detection with GolDRuSh Gabriele Costa, Silvia De Francisci (IMT School for Advanced Studies Lucca)
Revisiting Pre-trained Language Models for Vulnerability Detection Youpeng Li, Weiliang Qi (University of Texas at Dallas); Xuyu Wang (Florida International University); Fuxun Yu (Microsoft); Xinda Wang (University of Texas at Dallas)
The Role of Domain-Specific Features in Malware Detection: A macOS Case Study Biagio Montaruli (EURECOM, SAP); Andrea Oliveri (EURECOM); Savino Dambra (Gendigital); Davide Balzarotti (EURECOM) |
Session-10b: Protocols II Formal Analysis Framework for E2EE Protocols Yu Wang, Xiaofeng Liu, Yu Hou, Chengyu Hu, Shanqing Guo (Shandong University)
Formal Verification of EDHOC-PSK: A Symbolic Approach with SAPIC+ Elsa López Pérez (Inria Paris); Thomas Watteyne (unaffiliated); Cristina Onete (University of Limoges, XLIM, CNRS UMR 7252); Dhekra Mahmoud (CISPA Helmholtz Center for Information Security); Pascal Lafourcade (Université Clermont Auvergne); Vaishnavi Sundararajan (IIT Delhi); Mališa Vučinić (Inria Paris)
Mitigating Collusion in Proofs of Liabilities Malcom Mohamed, Ghassan Karame (Ruhr University Bochum)
PrivaDE: Privacy-preserving Data Evaluation for Blockchain-based Data Marketplaces Wan Ki Wong, Sahel Torkamani, Michele Ciampi, Rik Sarkar (University Of Edinburgh) |
Session-10c: Privacy and Usable Security “To Pay or Not to Pay?”: Understanding User Decision-Making and Influence of Nudges in UPI Apps Nandini Bajaj, Shiladitya De, Kshitiz Sharma (Indian Institute of Technology, Kharagpur); Xinru Page (Brigham Young University); Bart Knijnenburg (Clemson University); Mainack Mondal (Indian Institute of Technology Kharagpur)
“Nobody should control the end user”: Exploring Privacy Perspectives of Indian Internet Users in Light of DPDPA Sana Athar (Max Planck Institute for Informatics); Devashish Gosain (Indian Institute of Technology Bombay); Anja Feldmann, Mannat Kaur, Ha Dao (Max Planck Institute for Informatics)
The Insider’s Advantage: Exploiting Automated Privacy Policy Analyzer Tools Through Subtle Text Manipulations Tanusree Das Tithy, Poojitha Thota, Shirin Nilizadeh, Faysal Hossain Shezan (The University of Texas at Arlington)
Unintended Privacy Risks of Using Assistive Technology on Web Applications Abdul Haddi Amjad, Bless Jah, Muhammad Ali Gulzar (Virginia Tech) |
|||
| 12:30-14:00 | Lunch | |||||
| 14:00-15:00 |
Session-11a: Attacks
Fooling the Deception: On The Feasibility of Detecting Chaff Bugs Alessandro Brighente (University of Padua); Mauro Conti (University of Padua & Örebro University); Sitora Salaeva (University of Padua)
DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition Bikrant Bikram Pratap Maurya, Nitin Choudhury (IIIT-DELHI); Daksh Agarwal (Guru Gobind Singh Indraprastha University); Arun Balaji Buduru (IIIT-DELHI)
MaDoS: Matter DoS Attacks via Secure Channel Status Reports Farzam ZOHDI, Daniele Antonioli (EURECOM)
SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles Michael Kühr, Mohammad Hamad (Technical University of Munich); Pedram MohajerAnsari, Mert D. Pesé (Clemson University); Sebastian Steinhorst (Technical University of Munich) |
Session-11b: Differential Privacy Auditing Differentially Private Interactive Database Systems Sagar Sharma, Wanrong Zhang, Qiang Yan (TikTok); Florian Tramer (ETH Zurich)
From Curvature to Privacy: EER-Driven Differential Privacy in Deep Neural Networks Islam Monir (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar); Gabriel Ghinita (Department of Computer Science, University of Massachusetts Boston); Mohamed Abdallah (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar)
Communication-Efficient Publication of Sparse Vectors under Differential Privacy via Poisson Private Representation Quentin Hillebrand (University of Copenhagen); Vorapong Suppakitpaisarn, Tetsuo Shibuya (The University of Tokyo)
SoK: Practical Aspects of Releasing Differentially Private Graphs Nicholas D’Silva (The University of New South Wales); Surya Nepal (CSIRO’s Data61 & The University of New South Wales); Salil S. Kanhere (The University of New South Wales) |
Session-11c: Defences StealthDev: Side-Channel-Resistant Forensic Framework for Investigating Websites with Anti-Debugging Rahul Kanyal, Smruti R. Sarangi (IIT Delhi)
Mitigating Gradient Inversion Risks in Language Models via Token Obfuscation Xinguo Feng, Zhongkui Ma, Zihan Wang (The University of Queensland); Alsharif Abuadbba (CSIRO’s Data61, Australia); Guangdong Bai (City University of Hong Kong)
GradSent: Temporal Consistency-based Defense for U-Shaped Split Learning Deependra Singh, Avinash Awasthi, Pritam Vediya, Ramesh Babu Battula (Malaviya National Institute of Technology Jaipur)
SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations Patrik Dobias (Brno University of Technology); Azade Rezaeezade (TU Delft, Radboud University); Lejla Batina (Radboud University); Łukasz Chmielewski (Masaryk University, Radboud University); Lukas Malina (Brno University of Technology) |
|||
| 15:00-15:15 | Tea Break | |||||
| 15:15-16:00 | Closing Remarks | |||||
