Full Program

Day 1 (Monday, June 1 2026)
  Indian Affairs + Poolside
18:00-21:00 Registration
18:30-23:00 Welcome Reception
Day 2 (Tuesday, June 2 2026)
  Grand Ballroom-1 Grand Ballroom-2 Sigma-1 Sigma-3 Indian Affairs  
08:00-17:30 Registration
09:00-10:00 WDC-1 CPSS-1 SPAIC-1 LM-SHIELD-1 BSCI-1  
10:00-10:15 Tea Break
10:15-11:15 WDC-2 CPSS-2 SPAIC-2 LM-SHIELD-2 BSCI-2  
11:15-11:30 Tea Break
11:30-12:30 WDC-3 CPSS-3 SPAIC-3 LM-SHIELD-3 BSCI-3  
12:30-14:00 Lunch
14:00-15:00 WDC-3 CPSS-3 FL-1 AMASS-1 APKC-1  
15:00-15:15 Tea Break
15:15-16:15 WDC-5 CPSS-5 FL-2 AMASS-2 APKC-2  
16:15-16:30 Tea Break
16:30-17:30 WDC-6 CPSS-6 FL-3 AMASS-3 APKC-3  
  Esquire/Executive conference room
18:00-21:00 AsiaCCS (steering committee) meeting (possibly online)
Day 3 (Wednesday, June 3 2026)
  Grand Ballroom-1 Grand Ballroom-2 Indian Affairs
08:00-17:30 Registration
09:00-09:30 Opening Remarks
9:30-10:30 Plenary Talk-1 (Grand Ballroom – 1 + 2)
10:30-10:45 Tea Break
10:45-11:30

Session-1a: Outsourced Computation – I

 

MYao: Efficient Multiparty “Yao” Garbled Circuits with Row Reduction and Half Gates

Aner Ben-Efraim, Lior Breitman, Jonathan Bronshtein, Olga Nissenbaum, Eran Omri (Ariel University)

 

Scalable Private Set Intersection over Distributed Encrypted Data

Seunghun Paik (Hanyang University); Nirajan Koirala, Jack Nero (University of Notre Dame); Hyunjung Son, Yunki Kim, Jae Hong Seo (Hanyang University); Taeho Jung (University of Notre Dame)

 

Concretely Efficient Correlated Oblivious Permutation

Feng Han (Alibaba Group); Xiao Lan (Chinese Academy of Sciences); Weiran Liu, Lei Zhang (Alibaba Group); Hao Ren (Nanyang Technological University); Lin Qu (Alibaba Group); Yuan Hong (University of Connecticut)

Session-1b: Security – I

 

From DePIN Hype to Operational Reality: Assessing Centralization and Usage of Commercial dVPNs

Bartan Oren (Eindhoven University of Technology); Maurantonio Caprolu (CEMSE Division, KAUST); Savio Sciancalepore, Nicola Zannone (Eindhoven University of Technology); Roberto Di Pietro (CEMSE Division, KAUST)

 

TRM: An Efficient Hypervisor-Based Framework For Malware Analysis and Memory Reconstruction

Mohammad Sina Karvandi (Vrije Universiteit Amsterdam); Soroush Meghdadizanjani (Stony Brook University); Sima Arasteh (University of Southern California); Saleh Khalaj Monfared (Worcester Polytechnic Institute); Mohammad K. Fallah (Chosun University); Saeid Gorgin (SungKyunKwan University); Jeong-A Lee (Chosun University); Asia Slowinska, Erik van der Kouwe (Vrije Universiteit Amsterdam)

 

A First Look at the Mobile Driving License (mDL) Standard and its Real-world Usage

Zeyu Lei (Purdue University); Güliz Seray Tuncay (Google); Abdullah Imran, Z. Berkay Celik, Antonio Bianchi (Purdue University)

Session-1c: Cyber Physical Systems Security – I

 

SoK: Reviewing Two Decades of Security, Privacy, Accessibility, and Usability Studies on Internet of Things for Older Adults

Suleiman Saka (University of Denver); Sanchari Das (George Mason University)

 

Beyond the Device: A Security Analysis of Children’s Smartwatches and Their Ecosystem

Huancheng Hu, Christian Doerr (Hasso Plattner Institute)

 

The End of Anarchy? Understanding the Life of HTTP Exploits Used in IoT Malware Infections

Ryu Kuki, Takayuki Sasaki (Yokohama National University); Arwa Al Alsadi (Delft University of Technology); Carlos Gañán (Delft University of Technology/Yokohama National University); Katsunari Yoshioka (Yokohama National University)

11:30-11:45 Tea Break
11:45-12:30

Session-2a: Outsourced Computation – II

Stateless 2PC Signatures for Internet-Scale Authentication and Authorization

Michael Adjedj (Fireblocks); Geoffroy Couteau (Université Paris Cité, CNRS, IRIF); Arik Galansky, Nikolaos Makriyannis, Oren Yomtov (Fireblocks)

 

A New Construction Method for More Efficient Quadratic One-Time Noisy Multi-Client Functional Encryption Schemes

Jasmin Zalonis (University of Mannheim); Linda Scheu-Hachtel (University of Mannheim, Germany); Frederik Armknecht (University of Mannheim)

 

Improved Verifiable Computation of Linear and Quadratic Functions over Encrypted Data and Its Applications

Evan Schott (Yale University); Yinuo Zhang (University of Canterbury)

Session-2b: Program Analysis

Data Flows in You: Benchmarking and Improving Static Data-flow Analysis on Binary Executables

Nicolaas Weideman (USC Information Sciences Institute); Sima Arasteh, Mukund Raghothaman (University of Southern California); Jelena Mirkovic (USC Information Sciences Institute); Christophe Hauser (Dartmouth College)

 

SysDiver: Lightweight and Fast Static Analysis for Windows Kernel Drivers

Chanhee Park, Dongjoo Kim, Youngjoo Shin (Korea University)

 

Uncovering the Deceptive Tactics of Stalkerware: A Large Scale Measurement Study

Malvika Jadhav, Wenxuan Bao, Vincent Bindschaedler (University of Florida)

Session-2c: Cyber Physical Systems Security – II

SCREAM: Secure Channels for Real-time Evaluation of Additive Manufacturing

 

Prithwish Basu Roy (New York University Tandon School of Engineering); Jason Blocklove, Mudit Bhargava (NYU Tandon School of Engineering); Hammond Pearce (UNSW Sydney); Prashanth Krishnamurthy (NYU Tandon School of Engineering); Ozgur Sinanoglu (New York University, Abu Dhabi); Nikhil Gupta (New York University Tandon School of Engineering); Farshad Khorrami (NYU Tandon School of Engineering); Ramesh Karri (New York University)

 

HidePrint: Protecting Device Anonymity by Obscuring Radio Fingerprints

Gabriele Oligeri (Hamad bin Khalifa University); Savio Sciancalepore (TU Eindhoven (TU/e))

 

PHANTOM: Physics-Aware Adversarial Attacks against Federated Learning-Coordinated EV Charging Management System

Mohammad Zakaria Haider (Florida International University); Amit Kumer Podder (North Carolina State University); Prabin Mali (Florida International University); Aranya Chakrabortty (North Carolina State University); Sumit Paudyal, Mohammad Ashiqur Rahman (Florida International University)

12:30-14:00 Lunch
14:00-15:00

Session-3a: Encryption and Signatures

 

PUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives

Andreas Weninger, Elena Andreeva (TU Wien)

 

Sanitizable Signatures with Different Admissibility Policies for Multiple Sanitizers

Osama Allabwani (Université Clermont Auvergne, LIMOS, CNRS, BeYs); Olivier Blazy (École Polytechnique); Pascal Lafourcade (Université Clermont Auvergne, LIMOS, CNRS, ASTEROIDE, Trust4Sign); Charles Olivier-Anclin, Olivier Raynaud (Université Clermont Auvergne, LIMOS, CNRS)

 

Traceable Threshold Batch Encryption with Applications to Enhancing Mempool Privacy

Anirban Chakrabarti (Indian Institute of Science); Monosij Maitra (Indian Institute of Technology Kharagpur); Arup Mondal (Ashoka University)

 

BMuSig2: Schnorr-Compatible Blind Multi-Signatures

Kanchan Bisht, Keerthi Aiswarya Varshini, Shivam Sethi, Maria Francis (Indian Institute of Technology Hyderabad); R. Kabaleeshwaran (Indian Institute of Information Technology Design and Manufacturing Kurnool)

Session-3b: Cryptanalysis & Implementation Attacks

BarkBeetle: Stealing Decision Tree Models with Fault Injection

Qifan Wang (Durham University); Jonas Sander (University of Luebeck); Minmin Jiang (Queen’s University Belfast); Thomas Eisenbarth (University of Luebeck); David Oswald (Durham University)

 

Single-Fault Nonce Respecting Differential Attack on Hybrid Homomorphic Encryption

Aikata Aikata (Graz University of Technology); Ahaan Dabholkar (Purdue University); Dhiman Saha (Indian Institute of Technology Bhilai); Sujoy Sinha Roy (Graz University of Technology)

 

LINE-Break: Cryptanalysis and Reverse Engineering of Letter Sealing

Diego F. Aranha, Adam Blatchley Hansen, Thomas Kingo T. Mogensen (Aarhus University)

 

Attack from Shadows: Unsupervised Side-channel Transfer Learning across Devices and Modalities

Saion Kumar Roy (Northeastern University); Ziyue Zhang (Northeastern university); A. Adam Ding, Yunsi Fei (Northeastern University)

Session-3c: Machine Learning – I

 

ADAGE: Active Defenses Against GNN Extraction

Jing Xu, Franziska Boenisch, Adam Dziedzic (CISPA Helmholtz Center for Information Security)

 

Prompt Pirates Need a Map: Stealing Seeds helps Stealing Prompts

Felix Mächtle (University of Luebeck); Ashwath Shetty (University of Kiel); Jonas Sander (University of Luebeck); Nils Loose (Universität zu Luebeck); Soeren Pirk (University of Kiel); Thomas Eisenbarth (University of Luebeck)

 

Reasoning That Leaks, Fine-Tuning That Amplifies: Exposing the Hidden Threats of Chain-of-Thought Models

Zhiyuan Xu, Joseph Gardiner, Sana Belguith (University of Bristol)

 

Shape-Shifting Malicious Code in Software Backdoors via Language Models

Mohammad Ebrahimi Fard, Felix Weissberg, Erik Imgrund (BIFOLD & TU Berlin); Thorsten Eisenhofer (CISPA Helmholtz Center for Information Security); Konrad Rieck (BIFOLD & TU Berlin)

15:00-15:15 Tea Break
15:15-16:15

Session-4a: Advanced Constructions

Privacy-preserving Proximity Testing from Geometric Fuzzy Matching

Florias Papadopoulos, Ioannis Katis, Katerina Mitrokotsa (University of St. Gallen)

 

A Differentiated Approach for Post-Quantum DNSSEC

Marc Espie, Hugo Mayer (EPITA Research Lab (LRE)); Ludovic Perret (EPITA/Sorbonne University)

 

Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security

Nilanjan Datta (Institute for Advancing Intelligence, TCG-CREST, Kolkata); Jean Paul Degabriele (Technology Innovation Institute, Abu Dhabi); Avijit Dutta (Institute for Advancing Intelligence, TCG-CREST, Kolkata and AcSIR India); Vukašin Karadžić (TU Darmstadt); Hrithik Nandi (Institute for Advancing Intelligence, TCG-CREST, Kolkata and RKMVERI)

 

Binary Kummer Lines and Binary Edwards Curves: Efficient Two-way Vectorizations

Rittwik Hajra, Sabyasachi Karati (Indian Statistical Institute, India); Tanushri Sen (Silence Laboratories)

Session-4b: Confidential Computing & Containers

TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters

Fabian Rauscher, Hannes Weissteiner, Daniel Gruss (Graz University of Technology)

 

Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS

Muhammad Usama Sardar (TU Dresden); Mariam Moustafa, Tuomas Aura (Aalto University)

 

CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines

Joana Pecholt, Maximilian Peisl (Fraunhofer AISEC); Michael Weiß (Fraunhofer Institute AISEC)

 

CAGE-V: Confidential Computing Architecture supporting Guest Enclaves for RISC-V

Moritz Waser, Paul Gollob, Martin Unterguggenberger, Stefan Mangard (Graz University of Technology)

Session-4c: Machine Learning II

Deep Learning Backdoor Defense via Adaptive Trigger Collisions in Latent Space

Zixun Xiong (Stevens Institute of Technology); Hao Wang (Stevens Institue of Technology); Jian Li (Stony Brook University); Yang Hua (Queen’s University Belfast, UK); Miao Pan (University of Houston); Xiaojiang Du (Stevens Institute of Technology)

 

Purified Distillation Slimming (PDS) for Robust Backdoor Defense

Liqun Shan, Kaiying Han (University of Louisiana at Lafayette); Yazhou Tu (Auburn University); Insup Lee (University of Pennsylvania); Xiali Hei (University of Louisiana at Lafayette)

 

Noise, Why Can’t You Bend? Detecting Adversarial Perturbations in Wireless Sensing via Structural Fragility

Md Hasan Shahriar (Virginia Tech); Ning Wang (University of South Florida); Amit Kumar Sikder (Iowa State University); Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou (Virginia Tech)

 

FLux: Covert Channels in FL through Transposed Training

Torsten Krauß (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen); Yisroel Mirsky (Ben Gurion University of the Negev)

16:15-16:30 Tea Break
16:30-17:30

Session-5a: Protocols I

Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and more…

David Kretzler, Yong Li, Codrin Ogreanu (Huawei Heisenberg Research Center)

 

Aggregator-Based Voting using proof of Partition

Marius Lombard-Platet, Doron Zarchy (Apsia, SnT, university of Luxembourg)

 

PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments

Carolin Beer, Sheila Zingg, Kari Kostiainen (ETH Zurich); Karl Wüst (Mysten Labs); Vedran Capkun (HEC Paris); Srdjan Capkun (ETH Zurich)

 

Efficiency Improvements for Signal’s Handshake Protocol

Barbara Jiabao Benedikt, Sebastian Clermont, Marc Fischlin, Tobias Schmalz (Technische Universität Darmstadt)

Session-5b: Security II

Sheriff: Arresting the Confused Deputy Undermining Ultra-low SWaP Device Trusted Execution Environments

Prakhar Sah, Matthew Hicks (Virginia Tech)

 

Overseer: Enforcing fine-grained memory access control across execution environments

Darius Suciu, Sandeep Kiran Pinjala, Bin Sun, Radu Sion (Stony Brook University)

 

FIDES: End-to-end Compartments for Mixed-language Systems

Sai Venkata Krishnan Rajeswari Sridevi (Indian Institute of Technology Madras); Arjun Menon (InCore Semiconductors); Chester Rebeiro, KC Sivaramakrishnan (Indian Institute of Technology Madras)

 

ImmuCheck: Selective Immutability for Container Escape Detection in Containerized Microservices

Asbat El Khairi (University of Twente); Amina Bassit (Mobai); Andreas Peter (Carl von Ossietzky Universität Oldenburg); Andrea Continella (University of Twente)

Session-5c: Machine Learning – III

Taming Data Challenges in ML-based Security Tasks Using Generative AI

Shravya Kanchi (Virginia Tech); Neal Mangaokar (University of Michigan); Aravind Cheruvu, Sifat Muhammad Abdullah (Virginia Tech); Shirin Nilizadeh (The University of Texas at Arlington); Atul Prakash (University of Michigan); Bimal Viswanath (Virginia Tech)

 

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

Parth Atulbhai Gandhi (Ben Gurion University of the Negev); David Tayouri (Ben-Gurion University of the Negev); Akansha Shukla, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai (Ben Gurion University of the Negev)

 

VET Your Agent: Towards Host-Independent Autonomy via Verifiable Execution Traces

Artem Grigor, Christian Schroeder de Witt, Simon Birnbach, Ivan Martinovic (University of Oxford)

 

Mind the Web: The Security of Web Use Agents

Avishag Shapira, Parth Atulbhai Gandhi, Idan Habler, Asaf Shabtai (Ben Gurion University of the Negev)

Day 4 (Thursday, June 4 2026)
  Grand Ballroom-1 Grand Ballroom-2 Indian Affairs
08:00-17:30 Registration
08:00-08:45

Session-6a: Zero-Knowledge Proofs

SoK: Understanding zkVM: From Research to Practice

Yang Yunbo (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Yuejia Cheng (University of Sussex); Haibo Tang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Hangzhou High-Tech Zone (Bin jiang) Institute of Blockchain and Data Security); Guomin Yang (Singapore Management University); Bingsheng Zhang, Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)

 

HyperFond: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication

Yuanzhuo Yu (Shanghai Jiao Tong University); Mengling Liu (The Hong Kong Polytechnic University); Yuncong Zhang (Shandong University); Tianyi Ma, Shi-Feng Sun (Shanghai Jiao Tong University); Man Ho Au (The Hong Kong Polytechnic University); Dawu Gu (Shanghai Jiao Tong University)

 

A Linear Operator Framework for Polynomial Divisions in Cryptography

Varun Madathil (Yale University); Arnab Roy, Konstantinos Chalkias (Mysten Labs); Charanjit Jutla (IBM Research); Jonas Lindstrom (Mysten Labs)

Session-6b: Privacy I

SoK: Navigating the Privacy–UX Trade-offs in Extended Reality (XR) — A Socio-Technical Taxonomy and Research Roadmap

Shunyao Wang (The University of Queensland); M.A.P. Chamikara, Mohan Baruwal Chhetri, Zhenchang Xing (CSIRO’s Data61); Ryan Ko (The University of Queensland)

 

SoK: Analysis of Privacy Risks and Mitigation in Online Propaganda Detection through the PROMPT Framework

Dhiman Goswami, Al Nahian Bin Emran, Md Hasan Ullah Sadi, Sanchari Das (George Mason University)

 

Sensing Censorship and Censuring Censors with Censorship-Evident Publishing Systems

Swaminathan Ramesh, Ryan Henry (University of Calgary)

 
08:45-09:00 Tea Break
9:00-10:00 Plenary Talk-2 (Grand Ballroom – 1 + 2)
10:00-10:15 Tea Break
10:15-11:15

Session-7a: Micro-architectural Attacks and Defences

CTRL+ALT+TLB: Exploring Microarchitectural Weird Machines on Translation Look-aside Buffers

Jonah Heller, Marcel Pflaeging, Thore Tiemann, Thomas Eisenbarth (University of Luebeck)

 

Abortection: Robust TSX-Based Detection of Cache Side-Channel Attacks on Modern Intel CPUs with Non-Inclusive LLCs

Hyungjung Joo, Hodong Kim, Junbeom Hur (Korea University)

 

TAGShield: Persistent Tagging for Robust Stack Memory Error Protection

Michele Grisafi, Carlo Ramponi (University of Trento); Silviu Vlasceanu, Mahmoud Ammar (Huawei Research, Germany); Bruno Crispo (University of Trento)

 

Memory Tagging with Intra-Object Detection: Bridging the Gap in Fine-Grained Memory Safety

Konrad Hohentanner, Lukas Hertel (Technical University of Munich); Minu Föger, Lukas Auer, Julian Horsch (Fraunhofer AISEC)

Session-7b: Botnets and Intrusion Detection Systems

LotBoNC: Novel Botnet Traffic Classification under Long-tailed Distributions

Huancheng Hu (Hasso Plattner Institute); Ziyun Li (KTH Royal Institute of Technology); Christian Doerr (Hasso Plattner Institute)

 

SoK: Reshaping Research on Network Intrusion Detection Systems

Giovanni Apruzzese (University of Liechtenstein & Reykjavik University)

 

“What is the Problem Space?” Defining Host-space Adversarial Perturbations against Network Intrusion Detection Systems

Miel Verkerken, Laurens D’hooge, Bruno Volckaert, Filip De Turck (Ghent University – imec); Giovanni Apruzzese (University of Liechtenstein and ReykjaviK University)

 

StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS

Manuel Kern, Dominik Steffan, Felix Schuster (Austrian Institute of Technology); Simon Freudenthaler (FH Hagenberg); Edgar Weippl (University of Vienna); Florian Skopik, Max Landauer, David Allison (Austrian Institute of Technology)

Session-7c: Federated Learning

Setup Once, Secure Always: A Single-Setup Secure Federated Learning Aggregation Protocol with Forward and Backward Secrecy for Dynamic Users

Nazatul Haque Sultan (CSIRO’s Data61, Sydney); Yan Bo (CSIRO’s Data61); Yansong Gao (University of Western Australia); Seyit Camtepe (CSIRO’s Data61); Arash Mahboubi (CSU, Australia); Hang Thanh Bui (UNSW, Australia); Aufeef Chauhan (RMIT, Australia); Hamed Aboutorab (UNSW, Australia); Michael Bewong (CSU, Australia); Praveen Gauravaram (TCS, Australia); Dineshkumar Singh (TCS, India); Rafiqul Islam (CSU, Australia); Sharif Abuadbba (CSIRO’s Data61)

 

SecureAFL: Secure Asynchronous Federated Learning

Anjun Gao (University of Louisville); Feng Wang (Northeastern University); Zhenglin Wan (National University of Singapore); Yueyang Quan, Zhuqing Liu (University of North Texas); Minghong Fang (University of Louisville)

 

ClieND: Client-Side Neuron-Level Detection against Poisoning Attacks on Cross-Silo Federated Learning

Mengyao Ma, Shuofeng Liu (The University of Queensland); Viet Vo (Swinburne University of Technology); Minghong Fang (University of Louisville); Surya Nepal (CSIRO’s Data61 Australia); Guangdong Bai (City University of Hong Kong)

 

FedLeaks: Creating Timing Channel Leaks in Federated Learning of Adaptive Neural Networks

Ayomide Akinsanya, Tegan Brennan (Stevens Institute of Technology)

11:15-11:30 Tea Break
11:30-12:30

Session-8a: Fuzzing and Program Obfuscation

FUZZItizer: Hardware Sanitizer-Assisted Fuzzing for Automated SoC Vulnerability Detection

Rahul Kande (Texas A & M University); Mohamadreza Rostami (Technical University of Darmstadt); Chen Chen (Texas A&M University); Hareesh Khattri, Jason M. Fung (Intel Corporation); Ahmad-Reza Sadeghi (Technical University of Darmstadt); Jeyavijayan Rajendran (Texas A&M University)

 

RESTing-LLAMA: Large Language Model based REST API Fuzzing

Varun Gadey (University of Duisburg-Essen); Christoph Sendner, Keven Zimmermann (University of Würzburg); Alexandra Dmitrienko (University of Duisburg-Essen)

 

LASGen: Synergistic Harness–Seed Co-Synthesis for High-Coverage Library Fuzzing

Ming Chen, Yujie Xing (Shandong University); Jiongyi Chen (National University of Defense Technology); Wenrui Diao (Shandong University)

 

SaMBA: Increasing Mixed Boolean-Arithmetic Complexity Through Equality Saturation

Caroline König, David Schmidt, Philip König, Patrick Felbauer, Sebastian Schrittwieser (University of Vienna, Faculty of Computer Science, Christian Doppler Laboratory AsTra)

Session-8b: Web Security

CRX-ray: Large-Scale Detection of API Key Leakage in Browser Extensions

Wei Zeng (University of Liverpool); Zhi Wang (Nankai University); Valerio Bucci (Queen’s University Belfast); Xiaoyu Chen, Xin Yang, Siyu Zhang (Nankai University); Yuejun Guo (Luxembourg Institute of Science and Technology); Wanpeng Li (University of Liverpool)

 

Original Sin of npm: A Study on Vulnerability Propagation in JavaScript Dependency Networks

Michael Robinson (Data61, CSIRO, Australia); Sajal Halder (RMIT University and Data61, CSIRO, Australia); Muhammad Ejaz Ahmed (Data61, CSIRO, Australia); Muhammad Ikram (Macquarie University, Australia); Seyit Camtepe (Data61, CSIRO, Australia); Hyoungshick Kim (Sungkyunkwan University, South Korea)

 

Practical Real-time Detection of IPv4 Record Classical Domain Hijacking at Scale

Janos Szurdi, Mohammad Ghasemisharif, Reethika Ramesh, Zhanhao Chen (Palo Alto Networks); Ruian Duan (Palo Alto Networks Inc.); William Melicher, Daiping Liu (Palo Alto Networks)

 

VDPCollect: Vulnerability Disclosure Programs as a Complement to Web Security Measurements

Philip Decker (University Saarland); Florian Hantke (CISPA Helmholtz Center for Information Security)

Session-8c: Privacy II

How Tough Is Location Anonymization? Re-identifying 100K Real-User Trajectories in Japan

Abhishek Kumar Mishra (Inria, Lyon, France); Mathieu Cunche (INSA-Lyon, Inria, CITI, UR3720, Villeurbanne, France); Héber H. Arcolezi (Inria, Grenoble, France; ÉTS Montréal, Montréal, Canada)

 

ZEEP: Zone Encryption with Enhanced Privacy for Vehicular Communication

Kanchan Bisht, Ashish B Emmanuel, Prashanth Sriram S, Maria Francis (Indian Institute of Technology Hyderabad)

 

Unequal Privacy: Auditing Demographic Bias Vulnerabilities in Visual Protection Systems

Seyyed Mohammad Sadegh Moosavi Khorzooghi (University of Texas at Arlington); Poojitha Thota (The University of Texas at Arlington); Mohit Singhal (Northeastern University); Abolfazl Asudeh (University of Illinois Chicago); Gautam Das, Shirin Nilizadeh (The University of Texas at Arlington)

 

bPk#: Delegatable Pseudonyms

Stephan Krenn, Doryan Lesaignoux, Sebastian Ramacher (AIT Austrian Institute of Technology)

12:30-14:00 Lunch
  Indian Affairs + Poolside
14:00-17:00 Poster Session
  Grand Ballroom – 1 + 2
18:00-19:00 Award Ceremony
19:00-20:00 Cultural Event
20:00-23:00 Gala Dinner
Day 5 (Friday, June 5 2026)
  Grand Ballroom-1 Grand Ballroom-2 Indian Affairs
08:00-17:30 Registration
9:00-10:00 Plenary Talk-3 (Grand Ballroom – 1 + 2)
10:00-10:15 Tea Break
10:15-11:15

Session-9a: Malware and Vulnerability Analysis

A Comparative Analysis of NVD, JVNDB and CNVD: Insights into Global and Regional Vulnerability Reporting

Juehao Lin, Xuanxiang William Wang, Gianluca Stringhini, Manuel Egele (Boston University)

 

Knowing your weaknesses is your greatest strength: Mapping CVE to CWE by leveraging CWE Hierarchy and fine-tuned LLMs

Stefano Simonetto, Ronan Oostveen, Thijs Van Ede, Peter Bosch, Willem Jonker (University of Twente)

 

Kitten or Panda? Measuring the Specificity of Threat Group Behaviors in Public CTI Knowledge Bases

Aakanksha Saha, Martina Lindorfer (TU Wien); Juan Caballero (IMDEA Software Institute)

 

SoK: Systematization, Detection, and Hunting of Windows Malware Persistence Techniques

Jorik van Nielen (University of Twente); Andrea Oliveri (EURECOM); Jerre Starink (University of Twente); Andreas Peter (University of Oldenburg); Marieke Huisman (University of Twente); Simone Aonzo, Davide Balzarotti (EURECOM); Andrea Continella (University of Twente)

Session-9b: Homomorphic Encryption

Towards Lightweight CKKS: On Client Cost Efficiency

Jung Hee Cheon (Seoul National University / CryptoLab Inc.); Minsik Kang (Seoul National University); Jai Hyun Park (CryptoLab Inc.)

 

Fully Homomorphic Encryption Inference of Neural Networks Using CKKS-TFHE Scheme Switching and Accelerated Linear Layers

Anas Banta Seutia, Muhammad Zaky Firdaus (Universitas Gadjah Mada); Muhammad Alfi Ramadhan (University of Central Florida); Kabul Kurniawan, Muhammad Husni Santriaji, Muhammad Alfian Amrizal, Reza Pulungan (Universitas Gadjah Mada); Hiroyuki Takizawa (Tohoku University)

 

PP-Vul: Privacy-Preserving Vulnerability Detection Using Homomorphic Encryption

Seungho Kim, Seonhye Park, Jihun Kim, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Hyunmin Choi (NAVER Cloud); Hyoungshick Kim (Sungkyunkwan University)

 

Sub-Millisecond Gate Bootstrapping

Chunling Chen (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Zhihao Li (Digital Technologies, Ant Group); Qingyun Niu, Xianhui Lu, Ruida Wang, Lutan Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCAS); Rui Hou (Institute Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, UCASof Information Engineering, CAS)

Session-9c: Mobile Security

The Cost of Convenience: Identifying, Analyzing, and Mitigating Predatory Loan Applications on Android

Olawale Amos Akanji, Manuel Egele, Gianluca Stringhini (Boston University)

 

DroidHunter: A Robust Vision-Based Detection Against Hidden Android Malware

Victoire Nganfang (Univ Rennes, CNRS, INRIA, IRISA); Simon Queyrut (University of Neuchâtel); Yérom-David Bromberg (Univ Rennes, Inria, CNRS, IRISA); Valerio Schiavoni (University of Neuchâtel); Djob Mvondo (Univ Rennes, CNRS, IRISA, INRIA); KENGNE TCHENDJI Vianney (University of Dschang)

 

CCA-Droid: Context-Aware Cryptographic API Misuse Detection in Android Apps

Minwook Lee, Eunsoo Kim, Sanghak Oh (Sungkyunkwan University); Joonsang Baek, Willy Susilo (University of Wollongong); Hyoungshick Kim (Sungkyunkwan University)

 

ALPHA: Active Learning with PAC-Bayesian Theory for Android Malware Detection

Yaomengxi Han (Technical University of Munich); Yunru Wang (LMU Munich); Debarghya Ghoshdastidar (Technical University of Munich); Johannes Kinder (LMU Munich)

11:15-11:30 Tea Break
11:30-12:30

Session-10a: Vulnerability Detection

Trace Gadgets: Minimizing Code Context for Machine Learning-Based Vulnerability Prediction

Felix Mächtle, Nils Loose (University of Luebeck); Tim Schulz (University of Hamburg); Florian Sieck, Jan-Niclas Serr (University of Luebeck); Ralf Moeller (University of Hamburg); Thomas Eisenbarth (University of Luebeck)

 

Toward Efficient and Effective Vulnerability Detection with GolDRuSh

Gabriele Costa, Silvia De Francisci (IMT School for Advanced Studies Lucca)

 

Revisiting Pre-trained Language Models for Vulnerability Detection

Youpeng Li, Weiliang Qi (University of Texas at Dallas); Xuyu Wang (Florida International University); Fuxun Yu (Microsoft); Xinda Wang (University of Texas at Dallas)

 

The Role of Domain-Specific Features in Malware Detection: A macOS Case Study

Biagio Montaruli (EURECOM, SAP); Andrea Oliveri (EURECOM); Savino Dambra (Gendigital); Davide Balzarotti (EURECOM)

Session-10b: Protocols II

Formal Analysis Framework for E2EE Protocols

Yu Wang, Xiaofeng Liu, Yu Hou, Chengyu Hu, Shanqing Guo (Shandong University)

 

Formal Verification of EDHOC-PSK: A Symbolic Approach with SAPIC+

Elsa López Pérez (Inria Paris); Thomas Watteyne (unaffiliated); Cristina Onete (University of Limoges, XLIM, CNRS UMR 7252); Dhekra Mahmoud (CISPA Helmholtz Center for Information Security); Pascal Lafourcade (Université Clermont Auvergne); Vaishnavi Sundararajan (IIT Delhi); Mališa Vučinić (Inria Paris)

 

Mitigating Collusion in Proofs of Liabilities

Malcom Mohamed, Ghassan Karame (Ruhr University Bochum)

 

PrivaDE: Privacy-preserving Data Evaluation for Blockchain-based Data Marketplaces

Wan Ki Wong, Sahel Torkamani, Michele Ciampi, Rik Sarkar (University Of Edinburgh)

Session-10c: Privacy and Usable Security

“To Pay or Not to Pay?”: Understanding User Decision-Making and Influence of Nudges in UPI Apps

Nandini Bajaj, Shiladitya De, Kshitiz Sharma (Indian Institute of Technology, Kharagpur); Xinru Page (Brigham Young University); Bart Knijnenburg (Clemson University); Mainack Mondal (Indian Institute of Technology Kharagpur)

 

“Nobody should control the end user”: Exploring Privacy Perspectives of Indian Internet Users in Light of DPDPA

Sana Athar (Max Planck Institute for Informatics); Devashish Gosain (Indian Institute of Technology Bombay); Anja Feldmann, Mannat Kaur, Ha Dao (Max Planck Institute for Informatics)

 

The Insider’s Advantage: Exploiting Automated Privacy Policy Analyzer Tools Through Subtle Text Manipulations

Tanusree Das Tithy, Poojitha Thota, Shirin Nilizadeh, Faysal Hossain Shezan (The University of Texas at Arlington)

 

Unintended Privacy Risks of Using Assistive Technology on Web Applications

Abdul Haddi Amjad, Bless Jah, Muhammad Ali Gulzar (Virginia Tech)

12:30-14:00 Lunch
14:00-15:00

Session-11a: Attacks

 

Fooling the Deception: On The Feasibility of Detecting Chaff Bugs

Alessandro Brighente (University of Padua); Mauro Conti (University of Padua & Örebro University); Sitora Salaeva (University of Padua)

 

DECKER: Domain-invariant Embedding for Cross-Keyboard Extraction and Recognition

Bikrant Bikram Pratap Maurya, Nitin Choudhury (IIIT-DELHI); Daksh Agarwal (Guru Gobind Singh Indraprastha University); Arun Balaji Buduru (IIIT-DELHI)

 

MaDoS: Matter DoS Attacks via Secure Channel Status Reports

Farzam ZOHDI, Daniele Antonioli (EURECOM)

 

SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles

Michael Kühr, Mohammad Hamad (Technical University of Munich); Pedram MohajerAnsari, Mert D. Pesé (Clemson University); Sebastian Steinhorst (Technical University of Munich)

Session-11b: Differential Privacy

Auditing Differentially Private Interactive Database Systems

Sagar Sharma, Wanrong Zhang, Qiang Yan (TikTok); Florian Tramer (ETH Zurich)

 

From Curvature to Privacy: EER-Driven Differential Privacy in Deep Neural Networks

Islam Monir (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar); Gabriel Ghinita (Department of Computer Science, University of Massachusetts Boston); Mohamed Abdallah (College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar)

 

Communication-Efficient Publication of Sparse Vectors under Differential Privacy via Poisson Private Representation

Quentin Hillebrand (University of Copenhagen); Vorapong Suppakitpaisarn, Tetsuo Shibuya (The University of Tokyo)

 

SoK: Practical Aspects of Releasing Differentially Private Graphs

Nicholas D’Silva (The University of New South Wales); Surya Nepal (CSIRO’s Data61 & The University of New South Wales); Salil S. Kanhere (The University of New South Wales)

Session-11c: Defences

StealthDev: Side-Channel-Resistant Forensic Framework for Investigating Websites with Anti-Debugging

Rahul Kanyal, Smruti R. Sarangi (IIT Delhi)

 

Mitigating Gradient Inversion Risks in Language Models via Token Obfuscation

Xinguo Feng, Zhongkui Ma, Zihan Wang (The University of Queensland); Alsharif Abuadbba (CSIRO’s Data61, Australia); Guangdong Bai (City University of Hong Kong)

 

GradSent: Temporal Consistency-based Defense for U-Shaped Split Learning

Deependra Singh, Avinash Awasthi, Pritam Vediya, Ramesh Babu Battula (Malaviya National Institute of Technology Jaipur)

 

SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations

Patrik Dobias (Brno University of Technology); Azade Rezaeezade (TU Delft, Radboud University); Lejla Batina (Radboud University); Łukasz Chmielewski (Masaryk University, Radboud University); Lukas Malina (Brno University of Technology)

15:00-15:15 Tea Break
15:15-16:00 Closing Remarks