Cycle 2 Papers
CAGE-V: Confidential Computing Architecture supporting Guest Enclaves for RISC-V
Moritz Waser, Paul Gollob, Martin Unterguggenberger, Stefan Mangard (Graz University of Technology)
The Insider’s Advantage: Exploiting Automated Privacy Policy Analyzer Tools Through Subtle Text Manipulations
Tanusree Das Tithy, Poojitha Thota, Shirin Nilizadeh, Faysal Hossain Shezan (The University of Texas at Arlington)
PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments
Carolin Beer, Sheila Zingg, Kari Kostiainen (ETH Zurich); Karl Wüst (Mysten Labs); Vedran Capkun (HEC Paris); Srdjan Capkun (ETH Zurich)
SoK: Understanding zkVM: From Research to Practice
Yang Yunbo (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Yuejia Cheng (University of Sussex); Haibo Tang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Guomin Yang (Singapore Management University); Bingsheng Zhang, Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)
GradSent: Temporal Consistency-based Defense for U-Shaped Split Learning
Deependra Singh, Avinash Awasthi, Pritam Vediya, Ramesh Babu Battula (Malaviya National Institute of Technology Jaipur)
Concretely Efficient Correlated Oblivious Permutation
Feng Han (Alibaba Group); Xiao Lan (Chinese Academy of Sciences); Weiran Liu, Lei Zhang (Alibaba Group); Hao Ren (Nanyang Technological University); Lin Qu (Alibaba Group); Yuan Hong (University of Connecticut)
MaDoS: Matter DoS Attacks via Secure Channel Status Reports
Farzam ZOHDI, Daniele Antonioli (EURECOM)
A Differentiated Approach for Post-Quantum DNSSEC
Marc Espie, Hugo Mayer (EPITA Research Lab (LRE)); Ludovic Perret (EPITA/Sorbonne University)
“What is the Problem Space?” Defining Host-space Adversarial Perturbations against Network Intrusion Detection Systems
Miel Verkerken, Laurens D’hooge, Bruno Volckaert, Filip De Turck (Ghent University – imec); Giovanni Apruzzese (University of Liechtenstein and ReykjaviK University)
Mind the Web: The Security of Web Use Agents
Avishag Shapira, Parth Atulbhai Gandhi, Idan Habler, Asaf Shabtai (Ben Gurion University of the Negev)
Attack from Shadows: Unsupervised Side-channel Transfer Learning across Devices and Modalities
Saion Kumar Roy (Northeastern University); Ziyue Zhang (Northeastern university); A. Adam Ding, Yunsi Fei (Northeastern University)
From Curvature to Privacy: EER-Driven Differential Privacy in Deep Neural Networks
Islam Monir (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar); Gabriel Ghinita (Department of Computer Science, University of Massachusetts Boston); Mohamed Abdallah (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar)
SoK: Systematization, Detection, and Hunting of Windows Malware Persistence Techniques
Jorik van Nielen (University of Twente); Andrea Oliveri (EURECOM); Jerre Starink (University of Twente); Andreas Peter (University of Oldenburg); Marieke Huisman (University of Twente); Simone Aonzo, Davide Balzarotti (EURECOM); Andrea Continella (University of Twente)
Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts
Felix Mächtle (University of Luebeck); Ashwath Shetty (University of Kiel); Jonas Sander (University of Luebeck); Nils Loose (Universität zu Luebeck); Soeren Pirk (University of Kiel); Thomas Eisenbarth (University of Luebeck)
ImmuCheck: Selective Immutability for Container Escape Detection in Containerized Microservices
Asbat El Khairi (University of Twente); Amina Bassit (Mobai); Andreas Peter (Carl von Ossietzky Universität Oldenburg); Andrea Continella (University of Twente)
SoK: Practical Aspects of Releasing Differentially Private Graphs
Nicholas D’Silva (The University of New South Wales); Surya Nepal (CSIRO’s Data61 & The University of New South Wales); Salil S. Kanhere (The University of New South Wales)
HyperFond: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication
Yuanzhuo Yu (Shanghai Jiao Tong University); Mengling Liu (The Hong Kong Polytechnic University); Yuncong Zhang (Shandong University); Tianyi Ma, Shi-Feng Sun (Shanghai Jiao Tong University); Man Ho Au (The Hong Kong Polytechnic University); Dawu Gu (Shanghai Jiao Tong University)
Mitigating Collusion in Proofs of Liabilities
Malcom Mohamed, Ghassan Karame (Ruhr University Bochum)
Shape-Shifting Malicious Code in Software Backdoors via Language Models
Mohammad Ebrahimi Fard, Felix Weissberg, Erik Imgrund (BIFOLD & TU Berlin); Thorsten Eisenhofer (CISPA Helmholtz Center for Information Security); Konrad Rieck (BIFOLD & TU Berlin)
SecureAFL: Secure Asynchronous Federated Learning
Anjun Gao (University of Louisville); Feng Wang (Northeastern University); Zhenglin Wan (National University of Singapore); Yueyang Quan, Zhuqing Liu (University of North Texas); Minghong Fang (University of Louisville)
Sensing Censorship and Censuring Censors with Censorship-Evident Publishing Systems
Swaminathan Ramesh, Ryan Henry (University of Calgary)
Abortection: Robust TSX-Based Detection of Cache Side-Channel Attacks on Modern Intel CPUs with Non-Inclusive LLCs
Hyungjung Joo, Hodong Kim, Junbeom Hur (Korea University)
CCA-Droid: Context-Aware Cryptographic API Misuse Detection in Android Apps
Minwook Lee, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Joonsang Baek, Willy Susilo (University of Wollongong); Hyoungshick Kim (Sungkyunkwan University)
Unintended Privacy Risks of Using Assistive Technology on Web Applications
Abdul Haddi Amjad, Bless Jah, Muhammad Ali Gulzar (Virginia Tech)
Traceable Threshold Batch Encryption with Applications to Enhancing Mempool Privacy
Anirban Chakrabarti (Indian Institute of Science); Monosij Maitra (Indian Institute of Technology Kharagpur); Arup Mondal (Ashoka University)
SoK: Reshaping Research on Network Intrusion Detection Systems
Giovanni Apruzzese (University of Liechtenstein & Reykjavik University)
How Tough Is Location Anonymization? Re-identifying 100K Real-User Trajectories in Japan
Abhishek Kumar Mishra (Inria, Lyon, France); Mathieu Cunche (INSA-Lyon, Inria, CITI, UR3720, Villeurbanne, France); Héber H. Arcolezi (Inria, Grenoble, France; ÉTS Montréal, Montréal, Canada)
SoK: Analysis of Privacy Risks and Mitigation in Online Propaganda Detection through the PROMPT Framework
Dhiman Goswami, Al Nahian Bin Emran, Md Hasan Ullah Sadi, Sanchari Das (George Mason University)
Formal Verification of EDHOC-PSK: A Symbolic Approach with SAPIC+
Elsa López Pérez (Inria Paris); Thomas Watteyne (unaffiliated); Cristina Onete (University of Limoges, XLIM, CNRS UMR 7252); Dhekra Mahmoud (CISPA Helmholtz Center for Information Security); Pascal Lafourcade (Université Clermont Auvergne); Vaishnavi Sundararajan (IIT Delhi); Mališa Vučinić (Inria Paris)
From DePIN Hype to Operational Reality: Assessing Centralization and Usage of Commercial dVPNs
Bartan Oren (Eindhoven University of Technology); Maurantonio Caprolu (CEMSE Division, KAUST); Savio Sciancalepore, Nicola Zannone (Eindhoven University of Technology); Roberto Di Pietro (CEMSE Division, KAUST)
LASGen: Synergistic Harness–Seed Co-Synthesis for High-Coverage Library Fuzzing
Ming Chen, Yujie Xing (Shandong University); Jiongyi Chen (National University of Defense Technology); Wenrui Diao (Shandong University)
Binary Kummer Lines and Binary Edwards Curves: Efficient Two-way Vectorizations
Rittwik Hajra, Sabyasachi Karati (Indian Statistical Institute, India); Tanushri Sen (Silence Laboratories)
FLux: Covert Channels in FL through Transposed Training
Torsten Krauß (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen); Yisroel Mirsky (Ben Gurion University of the Negev)
Practical Real-time Detection of IPv4 Record Classical Domain Hijacking at Scale
Janos Szurdi, Mohammad Ghasemisharif, Reethika Ramesh, Zhanhao Chen (Palo Alto Networks); Ruian Duan (Palo Alto Networks Inc.); William Melicher, Daiping Liu (Palo Alto Networks)
SCREAM: Secure Channels for Real-time Evaluation of Additive Manufacturing
Prithwish Basu Roy (New York University Tandon School of Engineering); Jason Blocklove, Mudit Bhargava (NYU Tandon School of Engineering); Hammond Pearce (UNSW Sydney); Prashanth Krishnamurthy (NYU Tandon School of Engineering); Ozgur Sinanoglu (New York University, Abu Dhabi); Nikhil Gupta (New York University Tandon School of Engineering); Farshad Khorrami (NYU Tandon School of Engineering); Ramesh Karri (New York University)
Sub-Millisecond Gate Bootstrapping
Chunling Chen (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Zhihao Li (Digital Technologies, Ant Group); Qingyun Niu, Xianhui Lu, Ruida Wang, Lutan Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Rui Hou (Institute Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCASof Information Engineering, CAS)
LINE-Break: Cryptanalysis and Reverse Engineering of Letter Sealing
Diego F. Aranha, Adam Blatchley Hansen, Thomas Kingo T. Mogensen (Aarhus University)
DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition
Bikrant Bikram Pratap Maurya, Nitin Choudhury (IIIT-DELHI); Daksh Agarwal (Guru Gobind Singh Indraprastha University); Arun Balaji Buduru (IIIT-DELHI)
Fully Homomorphic Encryption Inference of Neural Networks Using CKKS-TFHE Scheme Switching and Accelerated Linear Layers
Anas Banta Seutia, Muhammad Zaky Firdaus (Universitas Gadjah Mada); Muhammad Alfi Ramadhan (University of Central Florida); Kabul Kurniawan, Muhammad Husni Santriaji, Muhammad Alfian Amrizal, Reza Pulungan (Universitas Gadjah Mada); Hiroyuki Takizawa (Tohoku University)
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security
Nilanjan Datta (Institute for Advancing Intelligence, TCG-CREST, Kolkata); Jean Paul Degabriele (Technology Innovation Institute, Abu Dhabi); Avijit Dutta (Institute for Advancing Intelligence, TCG-CREST, Kolkata and AcSIR India); Vukašin Karadžić (TU Darmstadt); Hrithik Nandi (Institute for Advancing Intelligence, TCG-CREST, Kolkata and RKMVERI)
ALPHA: Active Learning with PAC-Bayesian Theory for Android Malware Detection
Yaomengxi Han (Technical University of Munich); Yunru Wang (LMU Munich); Debarghya Ghoshdastidar (Technical University of Munich); Johannes Kinder (LMU Munich)
SoK: Navigating the Privacy–UX Trade-offs in Extended Reality (XR) — A Socio-Technical Taxonomy and Research Roadmap
Shunyao Wang (The University of Queensland); M.A.P. Chamikara, Mohan Baruwal Chhetri, Zhenchang Xing (CSIRO’s Data61); Ryan Ko (The University of Queensland)
Overseer: Enforcing fine-grained memory access control across execution environments
Darius Suciu, Sandeep Kiran Pinjala, Bin Sun, Radu Sion (Stony Brook University)
BMuSig2: Schnorr-Compatible Blind Multi-Signatures
Kanchan Bisht, Keerthi Aiswarya Varshini, Shivam Sethi, Maria Francis (Indian Institute of Technology Hyderabad); R. Kabaleeshwaran (Indian Institute of Information Technology Design and Manufacturing Kurnool)
StealthDev: Side-Channel-Resistant Forensic Framework for Investigating Websites with Anti-Debugging
Rahul Kanyal, Smruti R. Sarangi (IIT Delhi)
FIDES: End-to-end Compartments for Mixed-language Systems
Sai Venkata Krishnan Rajeswari Sridevi (Indian Institute of Technology Madras); Arjun Menon (InCore Semiconductors); Chester Rebeiro, KC Sivaramakrishnan (Indian Institute of Technology Madras)
Communication-Efficient Publication of Sparse Vectors under Differential Privacy via Poisson Private Representation
Quentin Hillebrand (University of Copenhagen); Vorapong Suppakitpaisarn, Tetsuo Shibuya (The University of Tokyo)
