Cycle 2 Papers

CAGE-V: Confidential Computing Architecture supporting Guest Enclaves for RISC-V

    Moritz Waser, Paul Gollob, Martin Unterguggenberger, Stefan Mangard (Graz University of Technology)

The Insider’s Advantage: Exploiting Automated Privacy Policy Analyzer Tools Through Subtle Text Manipulations

    Tanusree Das Tithy, Poojitha Thota, Shirin Nilizadeh, Faysal Hossain Shezan (The University of Texas at Arlington)

PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments

    Carolin Beer, Sheila Zingg, Kari Kostiainen (ETH Zurich); Karl Wüst (Mysten Labs); Vedran Capkun (HEC Paris); Srdjan Capkun (ETH Zurich)

SoK: Understanding zkVM: From Research to Practice

    Yang Yunbo (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Yuejia Cheng (University of Sussex); Haibo Tang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Guomin Yang (Singapore Management University); Bingsheng Zhang, Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)

GradSent: Temporal Consistency-based Defense for U-Shaped Split Learning

    Deependra Singh, Avinash Awasthi, Pritam Vediya, Ramesh Babu Battula (Malaviya National Institute of Technology Jaipur)

Concretely Efficient Correlated Oblivious Permutation

    Feng Han (Alibaba Group); Xiao Lan (Chinese Academy of Sciences); Weiran Liu, Lei Zhang (Alibaba Group); Hao Ren (Nanyang Technological University); Lin Qu (Alibaba Group); Yuan Hong (University of Connecticut)

MaDoS: Matter DoS Attacks via Secure Channel Status Reports

    Farzam ZOHDI, Daniele Antonioli (EURECOM)

A Differentiated Approach for Post-Quantum DNSSEC

    Marc Espie, Hugo Mayer (EPITA Research Lab (LRE)); Ludovic Perret (EPITA/Sorbonne University)

“What is the Problem Space?” Defining Host-space Adversarial Perturbations against Network Intrusion Detection Systems

    Miel Verkerken, Laurens D’hooge, Bruno Volckaert, Filip De Turck (Ghent University – imec); Giovanni Apruzzese (University of Liechtenstein and ReykjaviK University)

Mind the Web: The Security of Web Use Agents

    Avishag Shapira, Parth Atulbhai Gandhi, Idan Habler, Asaf Shabtai (Ben Gurion University of the Negev)

Attack from Shadows: Unsupervised Side-channel Transfer Learning across Devices and Modalities

    Saion Kumar Roy (Northeastern University); Ziyue Zhang (Northeastern university); A. Adam Ding, Yunsi Fei (Northeastern University)

From Curvature to Privacy: EER-Driven Differential Privacy in Deep Neural Networks

    Islam Monir (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar); Gabriel Ghinita (Department of Computer Science, University of Massachusetts Boston); Mohamed Abdallah (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar)

SoK: Systematization, Detection, and Hunting of Windows Malware Persistence Techniques

    Jorik van Nielen (University of Twente); Andrea Oliveri (EURECOM); Jerre Starink (University of Twente); Andreas Peter (University of Oldenburg); Marieke Huisman (University of Twente); Simone Aonzo, Davide Balzarotti (EURECOM); Andrea Continella (University of Twente)

Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts

    Felix Mächtle (University of Luebeck); Ashwath Shetty (University of Kiel); Jonas Sander (University of Luebeck); Nils Loose (Universität zu Luebeck); Soeren Pirk (University of Kiel); Thomas Eisenbarth (University of Luebeck)

ImmuCheck: Selective Immutability for Container Escape Detection in Containerized Microservices

    Asbat El Khairi (University of Twente); Amina Bassit (Mobai); Andreas Peter (Carl von Ossietzky Universität Oldenburg); Andrea Continella (University of Twente)

SoK: Practical Aspects of Releasing Differentially Private Graphs

   Nicholas D’Silva (The University of New South Wales); Surya Nepal (CSIRO’s Data61 & The University of New South Wales); Salil S. Kanhere (The University of New South Wales)

HyperFond: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication

   Yuanzhuo Yu (Shanghai Jiao Tong University); Mengling Liu (The Hong Kong Polytechnic University); Yuncong Zhang (Shandong University); Tianyi Ma, Shi-Feng Sun (Shanghai Jiao Tong University); Man Ho Au (The Hong Kong Polytechnic University); Dawu Gu (Shanghai Jiao Tong University)

Mitigating Collusion in Proofs of Liabilities

   Malcom Mohamed, Ghassan Karame (Ruhr University Bochum)

Shape-Shifting Malicious Code in Software Backdoors via Language Models

   Mohammad Ebrahimi Fard, Felix Weissberg, Erik Imgrund (BIFOLD & TU Berlin); Thorsten Eisenhofer (CISPA Helmholtz Center for Information Security); Konrad Rieck (BIFOLD & TU Berlin)

SecureAFL: Secure Asynchronous Federated Learning

   Anjun Gao (University of Louisville); Feng Wang (Northeastern University); Zhenglin Wan (National University of Singapore); Yueyang Quan, Zhuqing Liu (University of North Texas); Minghong Fang (University of Louisville)

Sensing Censorship and Censuring Censors with Censorship-Evident Publishing Systems

   Swaminathan Ramesh, Ryan Henry (University of Calgary)

Abortection: Robust TSX-Based Detection of Cache Side-Channel Attacks on Modern Intel CPUs with Non-Inclusive LLCs

   Hyungjung Joo, Hodong Kim, Junbeom Hur (Korea University)

CCA-Droid: Context-Aware Cryptographic API Misuse Detection in Android Apps

   Minwook Lee, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Joonsang Baek, Willy Susilo (University of Wollongong); Hyoungshick Kim (Sungkyunkwan University)

Unintended Privacy Risks of Using Assistive Technology on Web Applications

   Abdul Haddi Amjad, Bless Jah, Muhammad Ali Gulzar (Virginia Tech)

Traceable Threshold Batch Encryption with Applications to Enhancing Mempool Privacy

   Anirban Chakrabarti (Indian Institute of Science); Monosij Maitra (Indian Institute of Technology Kharagpur); Arup Mondal (Ashoka University)

SoK: Reshaping Research on Network Intrusion Detection Systems

   Giovanni Apruzzese (University of Liechtenstein & Reykjavik University)

How Tough Is Location Anonymization? Re-identifying 100K Real-User Trajectories in Japan

   Abhishek Kumar Mishra (Inria, Lyon, France); Mathieu Cunche (INSA-Lyon, Inria, CITI, UR3720, Villeurbanne, France); Héber H. Arcolezi (Inria, Grenoble, France; ÉTS Montréal, Montréal, Canada)

SoK: Analysis of Privacy Risks and Mitigation in Online Propaganda Detection through the PROMPT Framework

   Dhiman Goswami, Al Nahian Bin Emran, Md Hasan Ullah Sadi, Sanchari Das (George Mason University)

Formal Verification of EDHOC-PSK: A Symbolic Approach with SAPIC+

   Elsa López Pérez (Inria Paris); Thomas Watteyne (unaffiliated); Cristina Onete (University of Limoges, XLIM, CNRS UMR 7252); Dhekra Mahmoud (CISPA Helmholtz Center for Information Security); Pascal Lafourcade (Université Clermont Auvergne); Vaishnavi Sundararajan (IIT Delhi); Mališa Vučinić (Inria Paris)

From DePIN Hype to Operational Reality: Assessing Centralization and Usage of Commercial dVPNs

   Bartan Oren (Eindhoven University of Technology); Maurantonio Caprolu (CEMSE Division, KAUST); Savio Sciancalepore, Nicola Zannone (Eindhoven University of Technology); Roberto Di Pietro (CEMSE Division, KAUST)

LASGen: Synergistic Harness–Seed Co-Synthesis for High-Coverage Library Fuzzing

   Ming Chen, Yujie Xing (Shandong University); Jiongyi Chen (National University of Defense Technology); Wenrui Diao (Shandong University)

Binary Kummer Lines and Binary Edwards Curves: Efficient Two-way Vectorizations

   Rittwik Hajra, Sabyasachi Karati (Indian Statistical Institute, India); Tanushri Sen (Silence Laboratories)

FLux: Covert Channels in FL through Transposed Training

   Torsten Krauß (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen); Yisroel Mirsky (Ben Gurion University of the Negev)

Practical Real-time Detection of IPv4 Record Classical Domain Hijacking at Scale

   Janos Szurdi, Mohammad Ghasemisharif, Reethika Ramesh, Zhanhao Chen (Palo Alto Networks); Ruian Duan (Palo Alto Networks Inc.); William Melicher, Daiping Liu (Palo Alto Networks)

SCREAM: Secure Channels for Real-time Evaluation of Additive Manufacturing

   Prithwish Basu Roy (New York University Tandon School of Engineering); Jason Blocklove, Mudit Bhargava (NYU Tandon School of Engineering); Hammond Pearce (UNSW Sydney); Prashanth Krishnamurthy (NYU Tandon School of Engineering); Ozgur Sinanoglu (New York University, Abu Dhabi); Nikhil Gupta (New York University Tandon School of Engineering); Farshad Khorrami (NYU Tandon School of Engineering); Ramesh Karri (New York University)

Sub-Millisecond Gate Bootstrapping

   Chunling Chen (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Zhihao Li (Digital Technologies, Ant Group); Qingyun Niu, Xianhui Lu, Ruida Wang, Lutan Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Rui Hou (Institute Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCASof Information Engineering, CAS)

LINE-Break: Cryptanalysis and Reverse Engineering of Letter Sealing

   Diego F. Aranha, Adam Blatchley Hansen, Thomas Kingo T. Mogensen (Aarhus University)

DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition

   Bikrant Bikram Pratap Maurya, Nitin Choudhury (IIIT-DELHI); Daksh Agarwal (Guru Gobind Singh Indraprastha University); Arun Balaji Buduru (IIIT-DELHI)

Fully Homomorphic Encryption Inference of Neural Networks Using CKKS-TFHE Scheme Switching and Accelerated Linear Layers

   Anas Banta Seutia, Muhammad Zaky Firdaus (Universitas Gadjah Mada); Muhammad Alfi Ramadhan (University of Central Florida); Kabul Kurniawan, Muhammad Husni Santriaji, Muhammad Alfian Amrizal, Reza Pulungan (Universitas Gadjah Mada); Hiroyuki Takizawa (Tohoku University)

Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security

   Nilanjan Datta (Institute for Advancing Intelligence, TCG-CREST, Kolkata); Jean Paul Degabriele (Technology Innovation Institute, Abu Dhabi); Avijit Dutta (Institute for Advancing Intelligence, TCG-CREST, Kolkata and AcSIR India); Vukašin Karadžić (TU Darmstadt); Hrithik Nandi (Institute for Advancing Intelligence, TCG-CREST, Kolkata and RKMVERI)

ALPHA: Active Learning with PAC-Bayesian Theory for Android Malware Detection

   Yaomengxi Han (Technical University of Munich); Yunru Wang (LMU Munich); Debarghya Ghoshdastidar (Technical University of Munich); Johannes Kinder (LMU Munich)

SoK: Navigating the Privacy–UX Trade-offs in Extended Reality (XR) — A Socio-Technical Taxonomy and Research Roadmap

   Shunyao Wang (The University of Queensland); M.A.P. Chamikara, Mohan Baruwal Chhetri, Zhenchang Xing (CSIRO’s Data61); Ryan Ko (The University of Queensland)

Overseer: Enforcing fine-grained memory access control across execution environments

   Darius Suciu, Sandeep Kiran Pinjala, Bin Sun, Radu Sion (Stony Brook University)

BMuSig2: Schnorr-Compatible Blind Multi-Signatures

   Kanchan Bisht, Keerthi Aiswarya Varshini, Shivam Sethi, Maria Francis (Indian Institute of Technology Hyderabad); R. Kabaleeshwaran (Indian Institute of Information Technology Design and Manufacturing Kurnool)

StealthDev: Side-Channel-Resistant Forensic Framework for Investigating Websites with Anti-Debugging

   Rahul Kanyal, Smruti R. Sarangi (IIT Delhi)

 FIDES: End-to-end Compartments for Mixed-language Systems

   Sai Venkata Krishnan Rajeswari Sridevi (Indian Institute of Technology Madras); Arjun Menon (InCore Semiconductors); Chester Rebeiro, KC Sivaramakrishnan (Indian Institute of Technology Madras)

Communication-Efficient Publication of Sparse Vectors under Differential Privacy via Poisson Private Representation

   Quentin Hillebrand (University of Copenhagen); Vorapong Suppakitpaisarn, Tetsuo Shibuya (The University of Tokyo)