Cycle 1 Papers

Efficiency Improvements for Signal’s Handshake Protocol

    Barbara Jiabao Benedikt, Sebastian Clermont, Marc Fischlin, Tobias Schmalz (Technische Universität Darmstadt)

BarkBeetle: Stealing Decision Tree Models with Fault Injection

    Qifan Wang (Durham University); Jonas Sander (University of Luebeck); Minmin Jiang (Queen’s University Belfast); Thomas Eisenbarth (University of Luebeck); David Oswald (Durham University)

Kitten or Panda? Measuring the Specificity of Threat Group Behaviors in Public CTI Knowledge Bases 

    Aakanksha Saha, Martina Lindorfer (TU Wien); Juan Caballero (IMDEA Software Institute)

MYao: Efficient Multiparty “Yao” Garbled Circuits with Row Reduction and Half Gates

    Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri (Ariel University)

VDPCollect: Vulnerability Disclosure Programs as a Complement to Web Security Measurements

    Philip Decker (University Saarland); Florian Hantke (CISPA Helmholtz Center for Information Security)

Privacy-preserving Proximity Testing from Geometric Fuzzy Matching

    Florias Papadopoulos, Ioannis Katis, Katerina Mitrokotsa (University of St. Gallen)

Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction

    Felix Mächtle, Nils Loose (University of Luebeck); Tim Schulz (University of Hamburg); Florian Sieck, Jan-Niclas Serr (University of Luebeck); Ralf Moeller (University of Hamburg); Thomas Eisenbarth (University of Luebeck)

Knowing your weaknesses is your greatest strength: Mapping CVE to CWE by leveraging CWE Hierarchy and fine-tuned LLMs

    Stefano Simonetto, Ronan Oostveen, Thijs Van Ede, Peter Bosch, Willem Jonker (University of Twente)

Formal Analysis Framework for E2EE Protocols

    Yu Wang, Xiaofeng Liu, Yu Hou, Chengyu Hu, Shanqing Guo (Shandong University)

FUZZItizer: Hardware Sanitizer-Assisted Fuzzing for Automated SoC Vulnerability Detection 

    Rahul Kande (Texas A & M University); Mohamadreza Rostami (Technical University of Darmstadt); Chen Chen (Texas A&M University); Hareesh Khattri, Jason M. Fung (Intel Corporation); Ahmad-Reza Sadeghi (Technical University of Darmstadt); Jeyavijayan Rajendran (Texas A&M University)

The Cost of Convenience: Identifying, Analyzing, and Mitigating Predatory Loan Applications on Android

    Olawale Amos Akanji, Manuel Egele, Gianluca Stringhini (Boston University)

CRX-ray: Large-Scale Detection of API Key Leakage in Browser Extensions

    Wei Zeng (University of Liverpool); Zhi Wang (Nankai University); Valerio Bucci (Queen’s University Belfast); Xiaoyu Chen, Xin Yang, Siyu Zhang (Nankai University); Yuejun Guo (Luxembourg Institute of Science and Technology); Wanpeng Li (University of Liverpool)

Setup Once, Secure Always: A Single-Setup Secure Federated Learning Aggregation Protocol with Forward and Backward Secrecy for Dynamic Users

    Nazatul Haque Sultan (CSIRO’s Data61, Sydney); Yan Bo (CSIRO’s Data61); Yansong Gao (University of Western Australia); Seyit Camtepe (CSIRO’s Data61); Arash Mahboubi (CSU, Australia); Hang Thanh Bui (UNSW, Australia); Aufeef Chauhan (RMIT, Australia); Hamed Aboutorab (UNSW, Australia); Michael Bewong (CSU, Australia); Praveen Gauravaram (TCS, Australia); Dineshkumar Singh (TCS, India); Rafiqul Islam (CSU, Australia); Sharif Abuadbba (CSIRO’s Data61)

Improved Verifiable Computation of Linear and Quadratic Functions over Encrypted Data and Its Applications

    Evan Schott (Yale University); Yinuo Zhang (University of Canterbury)

Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption

    Aikata Aikata (Graz University of Technology); Ahaan Dabholkar (Purdue University); Dhiman Saha (Indian Institute of Technology Bhilai); Sujoy Sinha Roy (Graz University of Technology)

Taming Data Challenges in ML-based Security Tasks Using Generative AI

    Shravya Kanchi (Virginia Tech); Neal Mangaokar (University of Michigan); Aravind Cheruvu, Sifat Muhammad Abdullah (Virginia Tech); Shirin Nilizadeh (The University of Texas at Arlington); Atul Prakash (University of Michigan); Bimal Viswanath (Virginia Tech)

Deep Learning Backdoor Defense via Adaptive Trigger Collisions in Latent Space

    Zixun Xiong (Stevens Institute of Technology); Hao Wang (Stevens Institue of Technology); Jian Li (Stony Brook University); Yang Hua (Queen’s University Belfast, UK); Miao Pan (University of Houston); Xiaojiang Du (Stevens Institute of Technology)

Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers

    Osama Allabwani (Université Clermont Auvergne, LIMOS, CNRS, BeYs); Olivier Blazy (École Polytechnique); Pascal Lafourcade (Université Clermont Auvergne, LIMOS, CNRS, ASTEROIDE, Trust4Sign); Charles Olivier-Anclin, Olivier Raynaud (Université Clermont Auvergne, LIMOS, CNRS)

HidePrint: Protecting Device Anonymity by Obscuring Radio Fingerprints

    Gabriele Oligeri (Hamad bin Khalifa University); Savio Sciancalepore (TU Eindhoven (TU/e))

SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles

    Michael Kühr, Mohammad Hamad (Technical University of Munich); Pedram MohajerAnsari, Mert D. Pesé (Clemson University); Sebastian Steinhorst (Technical University of Munich)

TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters 

    Fabian Rauscher, Hannes Weissteiner, Daniel Gruss (Graz University of Technology)

Towards Lightweight CKKS: On Client Cost Efficiency

    Jung Hee Cheon (Seoul National University / CryptoLab Inc.); Minsik Kang (Seoul National University); Jai Hyun Park (CryptoLab Inc.)

Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and more

    David Kretzler, Yong Li, Codrin Ogreanu (Huawei Heisenberg Research Center)

SoK: Reviewing Two Decades of Security, Privacy, Accessibility, and Usability Studies on Internet of Things for Older Adults

    Suleiman Saka (University of Denver); Sanchari Das (George Mason University)

Fooling the Deception: On The Feasibility of Detecting Chaff Bugs

    Alessandro Brighente (University of Padua); Mauro Conti (University of Padua & Örebro University); Sitora Salaeva (University of Padua)

Reasoning That Leaks, Fine-Tuning That Amplifies: Exposing the Hidden Threats of Chain-of-Thought Models

    Zhiyuan Xu, Joseph Gardiner, Sana Belguith (University of Bristol)

Scalable Private Set Intersection over Distributed Encrypted Data

    Seunghun Paik (Hanyang University); Nirajan Koirala, Jack Nero (University of Notre Dame); Hyunjung Son, Yunki Kim, Jae Hong Seo (Hanyang University); Taeho Jung (University of Notre Dame)

PUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives 

    Andreas Weninger, Elena Andreeva (TU Wien)

Data Flows in You: Benchmarking and Improving Static Data-flow Analysis on Binary Executables

    Nicolaas Weideman (USC Information Sciences Institute); Sima Arasteh, Mukund Raghothaman (University of Southern California); Jelena Mirkovic (USC Information Sciences Institute); Christophe Hauser (Dartmouth College)

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

    Parth Atulbhai Gandhi (Ben Gurion University of the Negev); David Tayouri (Ben-Gurion University of the Negev); Akansha Shukla, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai (Ben Gurion University of the Negev)

A New Construction Method for More Efficient Quadratic One-Time Noisy Multi-Client Functional Encryption Schemes

    Jasmin Zalonis (University of Mannheim); Linda Scheu-Hachtel (University of Mannheim, Germany); Frederik Armknecht (University of Mannheim)

Stateless 2PC Signatures for Internet-Scale Authentication and Authorization

    Michael Adjedj (Fireblocks); Geoffroy Couteau (Université Paris Cité, CNRS, IRIF); Arik Galansky, Nikolaos Makriyannis, Oren Yomtov (Fireblocks)

LotBoNC: Novel Botnet Traffic Classification under Long-tailed Distributions

    Huancheng Hu (Hasso Plattner Institute); Ziyun Li (KTH Royal Institute of Technology); Christian Doerr (Hasso Plattner Institute)

VET Your Agent: Towards Host-Independent Autonomy via Verifiable Execution Traces

    Artem Grigor, Christian Schroeder de Witt, Simon Birnbach, Ivan Martinovic (University of Oxford)

SaMBA: Increasing Mixed Boolean-Arithmetic Complexity Through Equality Saturation 

    Caroline König, David Schmidt, Philip König, Patrick Felbauer, Sebastian Schrittwieser (University of Vienna, Faculty of Computer Science, Christian Doppler Laboratory AsTra)

RESTing-LLAMA: Large Language Model based REST API Fuzzing

    Varun Gadey (University of Duisburg-Essen); Christoph Sendner, Keven Zimmermann (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen)

Sheriff: Arresting the Confused Deputy Undermining Ultra-low SWaP Device Trusted Execution Environments

    Prakhar Sah, Matthew Hicks (Virginia Tech)

SysDiver: Lightweight and Fast Static Analysis for Windows Kernel Drivers

    Chanhee Park, Dongjoo Kim, Youngjoo Shin (Korea University)

CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines 

    Joana Pecholt, Maximilian Peisl (Fraunhofer AISEC); Michael Weiß (Fraunhofer Institute AISEC)

Beyond the Device: A Security Analysis of Children’s Smartwatches and Their Ecosystem

    Huancheng Hu, Christian Doerr (Hasso Plattner Institute)

DroidHunter: A Robust Vision-Based Detection Against Hidden Android Malware

    Victoire Nganfang (Univ Rennes, CNRS, INRIA, IRISA); Simon Queyrut (University of Neuchâtel); Yérom-David Bromberg (Univ Rennes, Inria, CNRS, IRISA); Valerio Schiavoni (University of Neuchâtel); Djob Mvondo (Univ Rennes, CNRS, IRISA, INRIA); KENGNE TCHENDJI Vianney (University of Dschang)

Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS

    Muhammad Usama Sardar (TU Dresden); Mariam Moustafa, Tuomas Aura (Aalto University)

TAGShield: Persistent Tagging for Robust Stack Memory Error Protection

    Michele Grisafi, Carlo Ramponi (University of Trento); Silviu Vlasceanu, Mahmoud Ammar (Huawei Research, Germany); Bruno Crispo (University of Trento)

CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers

    Jonah Heller, Marcel Pflaeging, Thore Tiemann, Thomas Eisenbarth (University of Luebeck)

Noise, Why Can’t You Bend? Detecting Adversarial Perturbations in Wireless Sensing via Structural Fragility

    Md Hasan Shahriar (Virginia Tech); Ning Wang (University of South Florida); Amit Kumar Sikder (Iowa State University); Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou (Virginia Tech)

Toward Efficient and Effective Vulnerability Detection with GolDRuSh

    Gabriele Costa, Silvia De Francisci (IMT School for Advanced Studies Lucca)

Original Sin of npm: A Study on Vulnerability Propagation in JavaScript Dependency Networks

    Michael Robinson (Data61, CSIRO, Australia); Sajal Halder (RMIT University and Data61, CSIRO, Australia); Muhammad Ejaz Ahmed (Data61, CSIRO, Australia); Muhammad Ikram (Macquarie University, Australia); Seyit Camtepe (Data61, CSIRO, Australia); Hyoungshick Kim (Sungkyunkwan University, South Korea)

The End of Anarchy? Understanding the Life of HTTP Exploits Used in IoT Malware Infections

    Ryu Kuki, Takayuki Sasaki (Yokohama National University); Arwa Al Alsadi (Delft University of Technology); Carlos Gañán (Delft University of Technology/Yokohama National University); Katsunari Yoshioka (Yokohama National University)

Purified Distillation Slimming (PDS) for Robust Backdoor Defense

    Liqun Shan, Kaiying Han (University of Louisiana at Lafayette); Yazhou Tu (Auburn University); Insup Lee (University of Pennsylvania); Xiali Hei (University of Louisiana at Lafayette)

Memory Tagging with Intra-Object Detection: Bridging the Gap in Fine-Grained Memory Safety

    Konrad Hohentanner, Lukas Hertel (Technical University of Munich); Minu Föger, Lukas Auer, Julian Horsch (Fraunhofer AISEC)

Uncovering the Deceptive Tactics of Stalkerware: A Large Scale Measurement Study

    Malvika Jadhav, Wenxuan Bao, Vincent Bindschaedler (University of Florida)

Mitigating Gradient Inversion Risks in Language Models via Token Obfuscation

    Xinguo Feng, Zhongkui Ma, Zihan Wang (The University of Queensland); Alsharif Abuadbba (CSIRO’s Data61, Australia); Guangdong Bai (City University of Hong Kong)

“To Pay or Not to Pay?”: Understanding User Decision-Making and Influence of Nudges in UPI Apps

    Nandini Bajaj, Shiladitya De, Kshitiz Sharma (Indian Institute of Technology, Kharagpur); Xinru Page (Brigham Young University); Bart Knijnenburg (Clemson University); Mainack Mondal (Indian Institute of Technology Kharagpur)

A Comparative Analysis of NVD, JVNDB and CNVD: Insights into Global and Regional Vulnerability Reporting

    Juehao Lin, Xuanxiang William Wang, Gianluca Stringhini, Manuel Egele (Boston University)

ClieND: Client-Side Neuron-Level Detection against Poisoning Attacks on Cross-Silo Federated Learning

    Mengyao Ma, Shuofeng Liu (The University of Queensland); Viet Vo (Swinburne University of Technology); Minghong Fang (University of Louisville); Surya Nepal (CSIRO’s Data61 Australia); Guangdong Bai (City University of Hong Kong)

PP-Vul: Privacy-Preserving Vulnerability Detection Using Homomorphic Encryption 

    Seungho Kim, Seonhye Park, Jihun Kim, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Hyunmin Choi (NAVER Cloud); Hyoungshick Kim (Sungkyunkwan University)

ADAGE: Active Defenses Against GNN Extraction

    Jing Xu, Franziska Boenisch, Adam Dziedzic (CISPA Helmholtz Center for Information Security)

A First Look at the Mobile Driving License (mDL) Standard and its Real-world Usage

    Zeyu Lei (Purdue University); Güliz Seray Tuncay (Google); Abdullah Imran, Z. Berkay Celik, Antonio Bianchi (Purdue University)

A Linear Operator Framework for Polynomial Divisions in Cryptography

   Varun Madathil (Yale University); Arnab Roy, Konstantinos Chalkias (Mysten Labs); Charanjit Jutla (IBM Research); Jonas Lindstrom (Mysten Labs)

ZEEP: Zone Encryption with Enhanced Privacy for Vehicular Communication

   Kanchan Bisht, Ashish B Emmanuel, Prashanth Sriram S, Maria Francis (Indian Institute of Technology Hyderabad)

“Nobody should control the end user”: Exploring Privacy Perspectives of Indian Internet Users in Light of DPDPA

    Sana Athar (Max Planck Institute for Informatics); Devashish Gosain (Indian Institute of Technology Bombay); Anja Feldmann, Mannat Kaur, Ha Dao (Max Planck Institute for Informatics)

Auditing Differentially Private Interactive Database Systems

    Sagar Sharma, Wanrong Zhang, Qiang Yan (TikTok); Florian Tramer (ETH Zurich)

bPk#: Delegatable Pseudonyms

    Stephan Krenn, Doryan Lesaignoux, Sebastian Ramacher (AIT Austrian Institute of Technology)

The Role of Domain-Specific Features in Malware Detection: A macOS Case Study

    Biagio Montaruli (EURECOM, SAP); Andrea Oliveri (EURECOM); Savino Dambra (Gendigital); Davide Balzarotti (EURECOM)

SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations

    Patrik Dobias (Brno University of Technology); Azade Rezaeezade (TU Delft, Radboud University); Lejla Batina (Radboud University); Łukasz Chmielewski (Masaryk University, Radboud University); Lukas Malina (Brno University of Technology)

Aggregator-Based Voting using proof of Partition

    Marius Lombard-Platet, Doron Zarchy (Apsia, SnT, university of Luxembourg)

PrivaDE: Privacy-preserving Data Evaluation for Blockchain-based Data Marketplaces

   Wan Ki Wong, Sahel Torkamani, Michele Ciampi, Rik Sarkar (University Of Edinburgh)

Revisiting Pre-trained Language Models for Vulnerability Detection

   Youpeng Li, Weiliang Qi (University of Texas at Dallas); Xuyu Wang (Florida International University); Fuxun Yu (Microsoft); Xinda Wang (University of Texas at Dallas)

FedLeaks: Creating Timing Channel Leaks in Federated Learning of Adaptive Neural Networks

    Ayomide Akinsanya, Tegan Brennan (Stevens Institute of Technology)

Unequal Privacy: Auditing Demographic Bias Vulnerabilities in Visual Protection Systems

   Seyyed Mohammad Sadegh Moosavi Khorzooghi (University of Texas at Arlington); Poojitha Thota (The University of Texas at Arlington); Mohit Singhal (Northeastern University); Abolfazl Asudeh (University of Illinois Chicago); Gautam Das, Shirin Nilizadeh (The University of Texas at Arlington)

TRM: An Efficient Hypervisor-Based Framework For Malware Analysis and Memory Reconstruction

   Mohammad Sina Karvandi (Vrije Universiteit Amsterdam); Soroush Meghdadizanjani (Stony Brook University); Sima Arasteh (University of Southern California); Saleh Khalaj Monfared (Worcester Polytechnic Institute); Mohammad K. Fallah (Chosun University); Saeid Gorgin (SungKyunKwan University); Jeong-A Lee (Chosun University); Asia Slowinska, Erik van der Kouwe (Vrije Universiteit Amsterdam)

StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS

   Manuel Kern, Dominik Steffan, Felix Schuster (Austrian Institute of Technology); Simon Freudenthaler (FH Hagenberg); Edgar Weippl (University of Vienna); Florian Skopik, Max Landauer, David Allison (Austrian Institute of Technology)

PHANTOM: Physics-Aware Adversarial Attacks against Federated Learning-Coordinated EV Charging Management System 

   Mohammad Zakaria Haider (Florida International University); Amit Kumer Podder (North Carolina State University); Prabin Mali (Florida International University); Aranya Chakrabortty (North Carolina State University); Sumit Paudyal, Mohammad Ashiqur Rahman (Florida International University)