


default search action
20th AsiaCCS 2025: Hanoi, Vietnam
- Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Vietnam, August 25-29, 2025. ACM 2025, ISBN 979-8-4007-1410-8

Homomorphic Encryption and Zero knowledge
- Seonhong Min

, Joon-Woo Lee
, Yongsoo Song
:
Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation. 1-12 - Animesh Singh

, Ayantika Chatterjee
, Anupam Chattopadhyay
, Debdeep Mukhopadhyay
:
An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization. 13-29 - Qingfeng Wang

, Li-Ping Wang
:
A Novel Asymmetric BSGS Polynomial Evaluation Algorithm under Homomorphic Encryption. 30-44 - Yini Lin

, Haibo Tian
:
Efficient Updatable Private Information Retrieval From Simulatable Homomorphic Ciphertexts. 45-57 - Mansi Goyal

, Aditi Kar Gangopadhyay
:
Key Extension: Multi-Key FHE Utilizing LWR. 58-71 - Semin Han

, Geonho Yoon
, Hyunok Oh
, Jihye Kim
:
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. 72-86
Multi-party Computation
- Soumyadyuti Ghosh

, Harishma Boyapally
, Ajith Suresh
, Arpita Patra
, Soumyajit Dey
, Debdeep Mukhopadhyay
:
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division. 87-103 - Mingli Wu

, Tsz Hon Yuen
, Siu-Ming Yiu
:
Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. 104-117 - Henri Dohmen

, Robin Hundt
, Nora Khayata
, Thomas Schneider
:
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. 118-135 - Fei Xiao

, Chunyang Lv
, Jianfeng Wang
:
Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF. 136-148 - Gowri R. Chandran

, Thomas Schneider
, Maximilian Stillger
, Christian Weinert
:
Concretely Efficient Private Set Union via Circuit-Based PSI. 149-162 - Amit Agarwal

, Stanislav Peceny
, Mariana Raykova
, Phillipp Schoppmann
, Karn Seth
:
Prior-Based Label Differential Privacy via Secure Two-Party Computation. 163-179
Applied Crypto
- Marc Fischlin

, Sascha Hoffmann
, Leonhard Ruppel
, Gözde Saçiak
, Tobias Schnitzler
, Christian Schwarz
, Maximilian Stillger
:
A Cryptographic Analysis of Google's PSP and Falcon Channel Protocols. 180-197 - Dominik Bojko

, Jacek Cichon
, Miroslaw Kutylowski
, Oliwer Sobolewski
:
Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices. 198-214 - Dien H. A. Tran

, Tam N. B. Nguyen
, Nhien-An Le-Khac
, Thuc D. Nguyen
:
LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation. 215-230 - Ioana Boureanu

, Cristina Onete
, Stephan Wesemeyer
, Léo Robert
, Rhys Miller
, Pascal Lafourcade
, Fortunat Rajaona
:
Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol. 231-247
Post-Quantum
- YoungBeom Kim

, Seog Chung Seo
:
An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes. 248-266 - Aditya Singh Rawat

, Mahabir Prasad Jhanwar
:
Quantum-safe Signatureless DNSSEC. 267-282 - Debadrita Talapatra

, Nimish Mishra
, Debdeep Mukhopadhyay
:
Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption. 283-297 - Guilhem Niot

:
Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay. 298-312 - Salman Shamshad

, Sana Belguith
, Alma Oracevic
:
A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment. 313-326 - Ruslan Kysil

, István András Seres
, Péter Kutas, Nándor Kelecsényi:
poqeth: Efficient, post-quantum signature verification on Ethereum. 327-343
LLM for Security
- Dominik M. Weber

, Ioannis Tzachristas
, Aifen Sui
:
Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity. 344-357 - Karl Rubel

, Maximilian Noppel
, Christian Wressnegger
:
Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion. 358-374 - Xiangmin Shen

, Lingzhi Wang
, Zhenyuan Li
, Yan Chen
, Wencheng Zhao
, Dawei Sun
, Jiashui Wang
, Wei Ruan
:
PentestAgent: Incorporating LLM Agents to Automated Penetration Testing. 375-391 - Van Nguyen

, Surya Nepal
, Xingliang Yuan
, Tingmin Wu
, Carsten Rudolph
:
SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models. 392-406 - João Figueiredo

, Afonso Carvalho
, Daniel Castro
, Daniel Gonçalves
, Nuno Santos
:
Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems. 407-424 - Yashothara Shanmugarasa

, Ming Ding
, Mahawaga Arachchige Pathum Chamikara
, Thierry Rakotoarivelo
:
SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation. 425-441
ML Security
- Brian Choi

, Shu Wang
, Isabelle Choi
, Kun Sun
:
ChainMarks: Securing DNN Watermark with Cryptographic Chain. 442-455 - Zhihao Dou

, Jiaqi Wang
, Wei Sun
, Zhuqing Liu
, Minghong Fang
:
Toward Malicious Clients Detection in Federated Learning. 456-472 - Meghali Nandi

, Arash Shaghaghi
, Nazatul Haque Sultan
, Gustavo Batista
, Raymond K. Zhao
, Sanjay K. Jha
:
Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI. 473-487 - Ruining Sun

, Hongsheng Hu
, Wei Luo
, Zhaoxi Zhang
, Yanjun Zhang
, Haizhuan Yuan
, Leo Yu Zhang
:
When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning. 488-500 - Fei Wang

, Yan Zhu
, Baochun Li
:
Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion Models. 501-516 - Mingyuan Fan

, Cen Chen
, Wenmeng Zhou
, Yinggui Wang
:
Transferable Adversarial Examples with Bayesian Approach. 517-529
ML Applications to Security
- Ahmed Najeeb

, Abdul Rafay
, Muhammad Hamad Alizai
, Naveed Anwar Bhatti
:
Glitch in Time: Exploiting Temporal Misalignment of IMU For Eavesdropping. 530-541 - Jafar Akhoundali

, Hamidreza Hamidi
, Kristian F. D. Rietveld
, Olga Gadyatskaya
:
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub. 542-558 - Govind Mittal

, Arthur Jakobsson
, Kelly O. Marshall
, Chinmay Hegde
, Nasir D. Memon
:
PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response. 559-575 - Dorjan Hitaj

, Giulio Pagnotta
, Fabio De Gaspari
, Lorenzo De Carli
, Luigi V. Mancini
:
Minerva: A File-Based Ransomware Detector. 576-590 - Eunjin Roh

, Sungwoo Jeon
, Sooel Son
, Sanghyun Hong
:
Evaluating Robustness of Reference-based Phishing Detectors. 591-604 - Hua Ma

, Alsharif Abuadbba
, Yansong Gao
, Hyoungshick Kim
, Surya Nepal
:
Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World. 605-620
Privacy 1
- Chaiwon Hwang

, Haeseung Jeon
, Jiwoo Hong
, Hosung Kang
, Nate Mathews
, Goun Kim
, Se Eun Oh
:
Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense. 621-634 - Amrita Roy Chowdhury

, Jacob Imola
, Kamalika Chaudhuri
:
Robust Locally Differentially Private Graph Analysis. 635-650 - Xuyuan Cai, Rui Song, Bin Xie, Qingjun Xiao, Bin Xiao:

PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X. 651-664 - Mateusz Lesniak

, Michal Wronski
, Ewa Syta
, Miroslaw Kutylowski
:
Unveiling Privacy Risks in Quantum Optimization Services. 665-681 - Thomas Grübl, Weijie Niu

, Jan von der Assen
, Burkhard Stiller
:
QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks. 682-695 - Yuanda Wang

, Bocheng Chen
, Hanqing Guo
, Guangjing Wang
, Weikang Ding
, Qiben Yan
:
ClearMask: Noise-Free and Naturalness-Preserving Protection Against Voice Deepfake Attacks. 696-709
Privacy 2
- Lucas Lange

, Tobias Schreieder
, Victor Christen
, Erhard Rahm
:
Slice it up: Unmasking User Identities in Smartwatch Health Data. 710-726 - Shanxiang Lyu

, Xinquan Xu
, Ling Liu
, Lip Yee Por
:
Secure Steganography Based on Chaos-Aided Quantization Index Modulation. 727-738 - Luis Adan Saavedra

, Hridoy S. Dutta
, Alastair R. Beresford
, Alice Hutchings
:
App-solutely Modded: Surveying Modded App Market Operators and Original App Developers. 739-758 - Abdulrahman Alaraj

, Eric Wustrow
:
Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran. 759-772 - Dennis Dayanikli

, Laura Holz
, Anja Lehmann
:
Virtual End-to-End Encryption: Analysis of the Doctolib Protocol. 773-789 - M. A. P. Chamikara

, Seung Ick Jang
, Ian J. Oppermann
, Dongxi Liu
, Musotto Roberto
, Sushmita Ruj
, Arindam Pal
, Meisam Mohammady
, Seyit Camtepe
, Sylvia Young
, Chris Dorrian
, Nasir David
:
Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility. 790-806
Blockchain 1
- Jia Liu

, Mark Manulis
:
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility. 807-822 - Yue Zhou

, Sid Chi-Kin Chau
:
VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More. 823-838 - Aydin Abadi

, Dan Ristea
, Artem Grigor
, Steven J. Murdoch
:
Scalable Time-Lock Puzzle. 839-855 - Poulami Das

, Andreas Erwig
, Sebastian Faust
, Philipp-Florens Lehwalder
, Julian Loss
, Ziyan Qu
, Siavash Riahi
:
BIP32-Compatible Threshold Wallets. 856-872
Blockchain 2
- Emrah Sariboz

, Gaurav Panwar
, Roopa Vishwanathan
, Satyajayant Misra
:
FIRST: FrontrunnIng Resistant Smart ConTracts. 873-889 - Jiaping Yu

, Shang Gao, Rui Song
, Zhiping Cai
, Bin Xiao:
Mining Attack with Zero Knowledge in the Blockchain. 890-905 - Xuelian Cao

, Zheng Yang
, Tao Xiang
, Jianting Ning
, Yuhan Liu
, Zhiming Liu
, Jianying Zhou
:
Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas. 906-922 - Minfeng Qi

, Qin Wang
, Ningran Li
, Shiping Chen
, Tianqing Zhu
:
BRC20 Snipping Attack. 923-938
Blockchain 3
- Kailun Yan

, Bo Lu
, Pranav Agrawal
, Jiasun Li
, Wenrui Diao
, Xiaokuan Zhang
:
An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and Activities. 939-954 - Tannishtha Devgun

, Gulshan Kumar
, Rahul Saha
, Alessandro Brighente
, Mauro Conti
:
AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. 955-970 - Mohsen Minaei

, Pedro Moreno-Sanchez
, Zhiyong Fang
, Srinivasan Raghuraman
, Navid Alamati
, Panagiotis Chatzigiannis
, Ranjit Kumaresan
, Duc V. Le
:
DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts. 971-984 - Jianhuan Wang

, Bin Xiao
:
Pace: Privacy-Preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges. 985-1002
IoT Security
- Andrea Ciccotelli

, Maurantonio Caprolu
, Roberto Di Pietro
:
NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks. 1003-1015 - Moses Ike

, Keaton Sadoski
, Romuald Valme
, Burak Sahin
, Saman A. Zonouz
, Wenke Lee
:
Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks. 1016-1031 - Arwa Abdulkarim Al Alsadi

, Mathew Vermeer
, Takayuki Sasaki
, Katsunari Yoshioka
, Michel van Eeten
, Carlos Gañán
:
Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation. 1032-1049 - Lukas Petzi

, Torsten Krauß
, Alexandra Dmitrienko
, Gene Tsudik
:
AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT. 1050-1064
CPS Security
- Xugui Zhou

, Anqi Chen
, Maxfield Kouzel
, Haotian Ren
, Morgan McCarty
, Cristina Nita-Rotaru
, Homa Alemzadeh
:
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems. 1065-1082 - Yuna Tanaka

, Kazuki Nomoto
, Ryunosuke Kobayashi
, Go Tsuruoka
, Tatsuya Mori
:
Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters. 1083-1100 - Abdullah Zubair Mohammed

, Ryan M. Gerdes
:
From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication. 1101-1113 - Muhammad Irfan

, Savio Sciancalepore
, Gabriele Oligeri
:
Preventing Radio Fingerprinting through Low-Power Jamming. 1114-1126
Hardware Security
- Dipesh

, Urbi Chatterjee
:
N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture. 1127-1140 - Hari Venugopalan

, Kaustav Goswami
, Zainul ul Abi Din
, Jason Lowe-Power
, Samuel T. King
, Zubair Shafiq
:
FP-Rowhammer: DRAM-Based Device Fingerprinting. 1141-1157 - Daehyeon Bae

, Sujin Park
, Minsig Choi
, Young-Giu Jung
, Changmin Jeong
, Heeseok Kim
, Seokhie Hong
:
ProbeShooter: A New Practical Approach for Probe Aiming. 1158-1174 - Daehyeon Lee

, Junghee Lee
:
GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs. 1175-1187 - Matteo Oldani

, William Blair
, Shweta Shinde
, Matthias Neugschwandtner
:
Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code. 1188-1202 - Philipp Schmitz

, Tobias Jauch
, Alex Wezel
, Mohammad Rahmani Fadiheh
, Thore Tiemann
, Jonah Heller
, Thomas Eisenbarth
, Dominik Stoffel
, Wolfgang Kunz
:
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments. 1203-1218
Fault Injection and Side Channels
- Kemal Derya

, M. Caner Tol
, Berk Sunar
:
FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack. 1219-1234 - Niclas Kühnapfel

, Christian Werling
, Hans Niklas Jacob
, Jean-Pierre Seifert
:
Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV. 1235-1249 - Suryeon Kim

, Seung Ho Na
, Jaehan Kim
, Seungwon Shin
, Hyunwoo Choi
:
AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces. 1250-1264 - Quancheng Wang

, Ming Tang
, Ke Xu
, Han Wang
:
BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors. 1265-1279 - Zhenyuan Liu

, Andrew Malnicof
, Arna Roy
, Patrick Schaumont
:
Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design. 1280-1293 - Tianhong Xu

, Aidong Adam Ding
, Yunsi Fei
:
EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks. 1294-1308
Web Security
- Trung Tin Nguyen

, Ben Stock
:
Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission Enforcement. 1309-1322 - Sunnyeo Park

, Jihwan Kim
, Seongho Keum
, Hyunjoon Lee
, Sooel Son
:
TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types. 1323-1337 - Dolière Francis Somé

:
ProwseBox: A Framework for the Analysis of the Web at Scale. 1338-1354 - Jakob Heher

, Stefan More
, Lena Heimberger
:
BISON: Blind Identification with Stateless scOped pseudoNyms. 1355-1371 - Jean Snyman

, Chris Culnane
, Ioana Boureanu
, Gerault David
:
Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy. 1372-1393 - Viet Vo

, Shangqi Lai, Xingliang Yuan
, Surya Nepal
, Qi Li:
OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access. 1394-1410
Network Security
- Zhixin Wen

, Guanhua Yan
:
OMAD5G: Online Malware Detection in 5G Networks using Compound Paths. 1411-1427 - Koen T. W. Teuwen

, Tom Mulders
, Emmanuele Zambon
, Luca Allodi
:
Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers. 1428-1441 - Anne Josiane Kouam

, Aline Carneiro Viana
, Philippe Martins
, Cédric Adjih
, Alain Tchana
:
SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge. 1442-1458 - Kian Kai Ang

, Guy Farrelly
, Cheryl Pope
, Damith C. Ranasinghe
:
An Automated Blackbox Noncompliance Checker for QUIC Server Implementations. 1459-1475 - Ayoub Ben Hassen

, Pascal Lafourcade
, Dhekra Mahmoud
, Maxime Puys
:
Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability. 1476-1489 - Haya Schulmann

, Shujie Zhao
:
Learning to Identify Conflicts in RPKI. 1490-1505
Usable Security and Privacy
- Yihong Hang

, Zhice Yang
:
NailKey: Mutable Biometric Using Fingernails. 1506-1519 - Oskar Braun

, Jan Hörnemann
, Norbert Pohlmann
, Tobias Urban
, Matteo Große-Kampmann
:
Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different Industries. 1520-1534 - Hangcheng Cao

, Guowen Xu
, Wenbin Huang
, Hongwei Li
:
Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication. 1535-1549 - Marie Weinz

, Nicola Zannone
, Luca Allodi
, Giovanni Apruzzese
:
The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations. 1550-1566 - YingTat Ng

, Zhe Chen
, Haiqing Qiu
, Xuhua Ding
:
PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework. 1567-1581 - Ming Xu

, Weili Han
, Jitao Yu
, Jing Liu
, Xinyi Zhang
, Yun Lin
, Jin Song Dong
:
On the Account Security Risks Posed by Password Strength Meters. 1582-1599
Software and OS Security
- Giorgia Di Pietro

, Daniele Cono D'Elia
, Leonardo Querzoni
:
Can You Run My Code? A Close Look at Process Injection in Windows Malware. 1600-1616 - Gyeonghoon Park

, Jaehan Kim
, Jinu Choi
, Jinwoo Kim
:
CryptoGuard: Lightweight Hybrid Detection and Response to Host-based Cryptojackers in Linux Cloud Environments. 1617-1631 - Wonseok Choi

, Youngjoo Shin
:
Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver. 1632-1642 - Supraja Sridhara

, Andrin Bertschi
, Benedict Schlüter
, Shweta Shinde
:
Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals. 1643-1658 - Masudul Hasan Masud Bhuiyan

, Berk Çakar
, Ethan H. Burmane
, James C. Davis
, Cristian-Alexandru Staicu
:
SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS). 1659-1675 - Fabian Rauscher

, Benedict Herzog
, Timo Hönig
, Daniel Gruss
:
Systematic Analysis of Kernel Security Performance and Energy Costs. 1676-1689
Binary Security
- Moritz Schneider

, Daniele Lain
, Ivan Puddu
, Nicolas Dutly
, Srdjan Capkun
:
Breaking Bad: How Compilers Break Constant-Time Implementations. 1690-1706 - Melih Sirlanci

, Carter Yagemann
, Zhiqiang Lin
:
An Empirical Study of C Decompilers: Performance Metrics and Error Taxonomy. 1707-1723 - August See

, Moritz Mönnich
, Mathias Fischer
:
Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework. 1724-1740 - Lambang Akbar Wijayadi

, Yuancheng Jiang
, Roland H. C. Yap
, Zhenkai Liang
, Zhuohao Liu
:
Evaluating Disassembly Errors With Only Binaries. 1741-1755 - Amin Abdulrahman

, Matthias J. Kannwischer
, Thing-Han Lim
:
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY. 1756-1771 - Chibin Zhang

, Gwangmu Lee
, Qiang Liu
, Mathias Payer
:
REFLECTA: Reflection-based Scalable and Semantic Scripting Language Fuzzing. 1772-1787
Poster
- Wei Jie Bryan Lee

, Siyi Wang
, Suman Dutta
, Walid El Maouaki
, Anupam Chattopadhyay
:
POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems. 1788-1790 - Minh-Khanh Vu

, Thanh-Cong Nguyen
, Duc-Ly Vu
:
Poster: Typosquatting Attacks on the Rust Ecosystem. 1791-1793 - Venkata Sai Pranav Bachina

, Ankit Gangwal
:
POSTER: Disappearing Ink: How Partial Model Extraction Erases Watermarks. 1794-1796 - Matthew Rossi

, Michele Beretta
, Dario Facchinetti
, Stefano Paraboschi
:
POSTER: Transparent Temporally-Specialized System Call Filters. 1797-1799 - Matthew Rossi

, Michele Beretta
, Dario Facchinetti
, Stefano Paraboschi
:
POSTER: Policy-driven security-aware scheduling in Kubernetes. 1800-1802 - Taeyoung Kim

, Gilhee Lee
, Hyoungshick Kim
:
POSTER: An Empirical Study of Smart Contract Patching Practices in the Wild. 1803-1805 - Fatih Kurt

, Neetesh Saxena
, Vijay Kumar
, George Theodorakopoulos
:
POSTER: Automating ICS Malware Analysis with MITRE ATT&CK. 1806-1808 - MingJun Zhang

, Mahrokh Abdollahi
, Thilina Ranbaduge
, Ming Ding
:
POSTER: When Models Speak Too Much: Privacy Leakage on Large Language Models. 1809-1811 - Ankit Gangwal

, Aaryan Ajay Sharma
:
POSTER: Investigating Transferability of Adversarial Examples in Model Merging. 1812-1814 - Cuong Dao

, Van Tong
, Hai Anh Tran
, Duc Tran
, Giang Nguyen
:
POSTER: Multimodal Graph Networks for Systematic Generalization in Code Clone Detection. 1815-1817 - Koen T. W. Teuwen

, Emmanuele Zambon
, Luca Allodi
:
POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering. 1818-1820

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














