Posters

POSTER: Small but Secure: Distilling SecAlign Defense on Edge LLMs via On-Policy RL

  Debasmita Dey (Techno Main Salt Lake); Arkajyoti Mitra (University of Texas at Arlington)

POSTER: Zero-Touch Mobility Data Governance with Differential Privacy in ZSM-Based Vehicular Edge Services

  Vishal Kumar (Indian Institute of Technology Roorkee); Awaneesh Kumar Yadav (Indian Institute of Technology Ropar); Pradumn Kumar Pandey, Manoj Misra (Indian Institute of Technology Roorkee); Madhusanka Liyanage (University College Dublin); An Braeken (Vrije Universiteit Brussel)

POSTER: Evading Visual Phish Detectors via Intelligent Visual Transformations

  Rina Mishra, Gaurav Varshney, Chandan Singh, Palak Arora (Indian Institute of Technology Jammu)

POSTER: Abuse Potential of Shared LLM Caches in Educational Environments through SniffLlama Timing Attack

  Dipesh, Rishit Kumar, Urbi Chatterjee (IIT Kanpur)

POSTER: Hector– An Agentic LLM Framework for Logic Locking

  Prithwish Basu Roy (New York University); Akashdeep Saha (New York University, Abu Dhabi); Lilas Alrahis (Khalifa University); Johann Knechtel, Ozgur Sinanoglu (New York University, Abu Dhabi); Ramesh Karri (New York University)

POSTER: SMAUG-SCA: Machine Learning Based Power Side-Channel Attack on SMAUG-T

  Madhumitha Ramaswamy, Rishav Saha (IISc Bangalore); Suparna Kundu (KU Leuven, Belgium); Anupam Golder (Intel Corporation); Angshuman Karmakar (Indian Institute of Technology Kanpur); Debayan Das (IISc Bangalore)

POSTER: A Verifiable Framework for Translating Natural Language Network Policies to P4 Code

   Kavin Rajan G, Micheal Berdinanth M, Shahul Hamead H (Sri Sivasubramaniya Nadar College of Engineering)

POSTER: Context-Aware Behavior Modeling of RESTful Services for Identifying State-Dependent Logic Vulnerabilities

  Abinaya J, Umang Agarwal, Gupta Harsh Hemant, Harsh Gupta, P. Santhi Thilagam, Sivakumar kaliappan (Department of Computer Science and Engineering, National Institute of Technology Karnataka, Surathkal, Mangalore, India)

POSTER: GEM-PLI Side Channel in GPON: Inferring Encrypted Streaming Traffic

  Hyunjun An (Heungdeok High School)

POSTER: FuzzyExtract — A Lightweight Approach for Cryptographic Bill of Materials Extraction from Java Binaries

  Manish Shukla, Sachin Lodha (TCS Research)

POSTER: Natural Neighbor Cohesion for Top-K Intrusion Alert Ranking

  Aafrin Khan, Abdul Wahid (Indian Institute of Information Technology Dharwad)

POSTER: HASFire – Hardware-Software Co-design for Accurate Packet Filtering at Line-Rate

  Arun Krishna AMS, Surya Prasad S, Megna Premkumar, Naveen Babu Devarakonda, Athish Pranav Dharmalingam (IIT Madras); Gnanambikai Krishnakumar (IIITD&M Kanchipuram); Sareena Karapoola (IIT Madras, Chennai, India.)

POSTER: DeLink-Deceptive Link Generation for Circuit Obfuscation

  Anania Temtim Cherkos (Khalifa University); Praveen Karmakar (IIT GUWAHATI); Lilas Alrahis (Khalifa University)

POSTER— CAIRN : Causal Active Inference for Real-Time Cyber Attack Diagnosis and Response

  Sayan Mondal, Avijit Gayen, Angshuman Jana (IIIT Guwahati)

POSTER: Phantom Force: Injecting Adversarial Tactile Perceptions into Embodied Intelligence via EMI

  Zirui Kong, Youqian Zhang (The Hong Kong Polytechnic University); Sze Yiu Chau (Simon Fraser University)

POSTER: Revisiting Timing-Based Class Leakage Under GPU Execution

  Shubhi Shukla (IIT Kharagpur)

POSTER: Taint-tracking Across Components in Web Browsers

  Shruti Dubey (Indian Institute of Technology, Gandhinagar,Gujarat); Abhishek Bichhawat (Indian Institute of Technology Gandhinagar)

POSTER: Advancing Enterprise Cyber Defense with Digital Twin–Modelling, Simulation and Prediction

  Manish Shukla, Shivam Shinde, Geetika Agarwal, Reshma Korabu, Souvik Barat (TCS Research)