Title | Author |
---|---|
Poster: Privacy Norms for Fertility Data in the Roe v. Wade era | Zander Chown (Skidmore College) Aarathi Prasad (Skidmore College) |
Poster: The concept of a system for automatic detection and correction of vulnerabilities in the source code | Tomasz Hyla (West Pomeranian University of Technology in Szczecin) Natalia Wawrzyniak (Maritime University of Szczecin) |
Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection | Sachin Shukla (Cisco Talos) Omid Mirzaei (Cisco Talos) |
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key | Jheng-Jia Huang (Department of Information Management, National Taiwan University of Science and Technology) Guan-Yu Chen (Department of Information Management, National Taiwan University of Science and Technology) Nai-Wei Lo (Department of Information Management, National Taiwan University of Science and Technology) |
Poster: Kill Krill or Proxy RPKI | Louis Cattepoel (TU Darmstadt) Donika Mirdita (TU Darmstadt) Haya Schulmann (Goethe-Universität Frankfurt) Michael Waidner (National Research Center for Applied Cybersecurity ATHENE, Fraunhofer Institute for Secure Information Technology SIT, Technische Universität Darmstadt) |
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly | Oliver Jacobsen (Goethe-Universität Frankfurt) Haya Schulmann (Goethe-Universität Frankfurt) |
Poster: An Exploration of Large Language Models in Malicious Source Code Detection | Di Xue (Huawei Technologies Co., Ltd.) Gang Zhao (Huawei Technologies Co., Ltd.) Yin Liu (Huawei Technologies Co., Ltd.) Zhongqi Fan (Huawei Technologies Co., Ltd.) Yahong Xu (Huawei Technologies Co., Ltd.) Wei Li (Huawei Technologies Co., Ltd.) Zhen Liu (Huawei Technologies Co., Ltd.) Zhongliang Yuan (Huawei Technologies Co., Ltd.) |
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution | Zhaoxuan Li (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences) Ziming Zhao (Zhejiang University) Wenhao Li (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences) Rui Zhang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences) Siqi Lu (Information Engineering University) Rui Xue (State Key Laboratory of Information Security, Institute of Information) Fan Zhang (Zhejiang University) |
Poster: POSTER: Cyber Security Economics Model (CYSEM) | Tong Xin (Queen Mary University of London) Ying He (Queen Mary University of London) Efpraxia Zamani (Durham University Business School) Cunjin Luo (University of Essex) |
Poster: AuditVotes: a Framework towards Deployable Certified Robustness for GNNs | Yuni Lai (The Hong Kong Polytechnic University) Kai Zhou (The Hong Kong Polytechnic University) |
Poster: zkTax: A pragmatic way to support zero-knowledge tax disclosures | Alex Berke (MIT) Tobin South (MIT) Robert Mahari (MIT) Kent Larson (MIT) Alex Pentland (MIT) |
Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration | Keiichi Ochiai (NTT DOCOMO, INC.) Masayuki Terada (NTT DOCOMO, INC.) |
Poster: yFuzz: Data-Driven Fuzzing | Yuan Chang (National Taiwan University) Chun-Chia Huang (National Taiwan University) Tatsuya Mori (Waseda University) Hsu-Chun Hsiao (National Taiwan University) |
Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model | Elisa Zhang (Dougherty Valley High School) Shiyu Sun (George Mason University) Yunlong Xing (George Mason University) Kun Sun (George Mason University) |
Poster: Poster: In-switch Defense against DNS Amplification DDoS Attacks | Seyed Mohammad Hadi Mirsadeghi (Tallinn University of Technology) |
Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices | Bo Chen (Michigan Technological University) Caleb Rother (Michigan Technological University) Josh Dafoe (Michigan Technological University) |
Poster: Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training | Yizhi Li (Tsinghua University) Jiang Li (Zhongguancun Laboratory) Jiahao Cao (Tsinghua University) Renjie Xie (Tsinghua University) Yangyang Wang (Tsinghua University) Mingwei Xu (Tsinghua University) |
Poster: Formally Verified Binary Lifting to P-Code | Nico Naus (Open University of The Netherlands and Virginia Tech) Freek Verbeek (Open University of The Netherlands and Virginia Tech) Sagar Atla (Virginia Tech) Binoy Ravindran (Virginia Tech) |
Poster: libdebug, Build Your Own Debugger For A Better (Hello) World | Gabriele Digregorio (Politecnico di Milano) Roberto Alessandro Bertolini (Politecnico di Milano) Francesco Panebianco (Politecnico di Milano) Mario Polino (Unaffiliated) |
Poster: M2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping | Qiaoran Meng (National University of Singapore) Nay Oo (NCS Cyber Special Ops-R&D) Yuning Jiang (National University of Singapore) Hoon Wei Lim (NCS Cyber Special Ops-R&D) Biplab Sikdar (National University of Singapore) |
Poster: Synchronization Concerns of DNS Domain Name Integrations | Andrew Kaizer (Verisign) Will Naciri (Verisign) Swapneel Sheth (Verisign) |
Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical Study | Seoksu Lee (Chungnam National University) Hyeongchang Jeon (Chungnam National University) Eun-Sun Cho (Chungnam National University) |
Poster: Poster: Formalizing Cognitive Biases for Cybersecurity Defenses | Jasmine Vang (Montana State University) Matthew Revelle (Montana State University) |
Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models | Huan Bui (University of North Carolina at Charlotte) Harper Lienerth (Albion College) Chenglong Fu (University of North Carolina at Charlotte) Meera Sridhar (University of North Carolina at Charlotte) |
Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting | Joel Osher (University of Minnesota) James K. Holland (University of Minnesotta) Nicholas Hopper (University of Minnesota) |
Poster: Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks | Seok Min Hong (Hanyang University ERICA) Beom Heyn Kim (Hanyang University ERICA) Mohammad Mannan (Concordia University) |
Poster: Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption | Christian Mouchet (Hasso-Plattner-Institute, University of Potsdam) Sylvain Chatel (CISPA Helmholtz Center for Information Security) Lea Nürnberger (Norwegian University of Science and Technology (NTNU)) Wouter Lueks (CISPA Helmholtz Center for Information Security) |
Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation | Yuechun Gu (Marquette University) Jiajie He (Marquette University) Keke Chen (Marquette University) |
Poster: A Multi-step Approach for Classification of Malware Samples | Arnaldo Sgueglia (University of Sannio) Rocco Addabbo (TIM) Andrea Di Sorbo (University of Sannio, Italy) Stanislav Dashevskyi (Forescout) Daniel dos Santos (Forescout) Corrado Aaron Visaggio (University of Sannio, Italy) |
Poster: Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection | Jiawen Diao (Beijing Electronic Science and Technology Institute) shengmin zhao (Beijing Electronic Science and Technology Institute) Jianguo Xie (Beijing Electronic Science and Technology Institute) Rongna Xie (Beijing Electronic Science and Technology Institute) Guozhen Shi (Beijing Electronic Science and Technology Institute) |
Poster: From Fort to Foe: The Threat of RCE in RPKI | Oliver Jacobsen (National Research Center for Applied Cybersecurity ATHENE, Goethe-Universität Frankfurt) Haya Schulmann (National Research Center for Applied Cybersecurity ATHENE, Goethe-Universität Frankfurt) Niklas Vogel (National Research Center for Applied Cybersecurity ATHENE, Goethe-Universität Frankfurt) Michael Waidner (National Research Center for Applied Cybersecurity ATHENE, Technische Universität Darmstadt, Fraunhofer Institute for Secure Information Technology SIT) |
Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks | Shubham Malaviya (TCS Research) Manish Shukla (TCS Research) Saurabh Anand (TCS Research) Sachin Lodha (TCS Research) |
Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web? | Abdul Haddi Amjad (Virginia Tech) Muhammad Ali Gulzar (Virginia Tech) |
Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models | Wanpeng Li (Department of Computing Science University of Aberdeen AB24 3UE) Yuejun GUO (Luxembourg Institute of Science and Technology) |
Poster: Acoustic Side-Channel Attack on Robot Vacuums | Peter Chen (Virginia Tech) Guannan Liu (Colorado School of Mines) Haining Wang (Virginia Tech) |
Poster: Poster: Protecting Source Code Privacy When Hunting Bugs | Jielun Wu (Nanjing University) Qingkai Shi (Nanjing University) |
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code | That Khiem Ton (New Jersey Insititute of Technology) Nhi Nguyen (New Jersey Insititute of Technology) Mahmoud Nazzal (NJIT) Abdallah Khreishah (New Jersey Institute of Technology) Cristian Borcea (New Jersey Institute of Technology) NhatHai Phan (New Jersey Institute of Technology) Ruoming Jin (Kent State University) Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU) Yelong Shen (Microsoft) |
Poster: Poster: RewardRandRunner: Distributed Randomness Beacon with Reward and Penalty Mechanism | Arup Mondal (Ashoka University) |
Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches | Solayman Ayoubi (Sorbonne Université, CNRS, LIP6) Sébastien Tixeuil (Sorbonne Université, CNRS, LIP6) Gregory Blanc (SAMOVAR, Télécom SudParis Institut Polytechnique de Paris) Houda Jmila (Université Paris-Saclay, CEA, List) |
Poster: Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation | Faqi Zhao (Institute of Information Engineering; University of Chinese Academy of Sciences) Wenhao Li (China Telecom Research Institute) Duohe Ma (Institute of Information Engineering) Feng Liu (Institute of Information Engineering) Wen Wang (Institute of Information Engineering) |
Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling | Andreas Athanasiou (INRIA, École polytechnique) Catuscia Palamidessi (Inria) Kangsoo Jung (INRIA, Ecole Polytechnique) |
Poster: M2X: Multi-Modal eXplainable AI for Malware Analysis | Mohd Saqib (McGill University) Benjamin C. M. Fung (McGill University) |
Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi | Abdulrahman Alhaidari (University of Pittsburgh) Balaji Palanisamy (University of Pittsburgh) Prashant Krishnamurthy (University of Pittsburgh) |
Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database | Sevval Simsek (Boston University) Zhenpeng Shi (Boston University) Howell Xia (Boston University) David Sastre Medina (Red Hat Inc.) David Starobinski (Boston University) |
Poster: Solving the Free-rider Problem in Bittensor | SIN TAI LIU (Miss) Jiayuan Yu (Mr.) Jacob Steeves (Mr.) |
Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users | Zhaoxiang Liu (Kansas State University) Ning Luo (UIUC) Samuel Judson (Yale University) Raj Gautam Dutta (Silicon Assurance) Xiaolong Guo (Kansas State University) Mark Santolucito (Barnard College, Columbia University) |
Poster: POSTER: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE) | Jelena Mirkovic (USC Information Sciences Institute) David Balenson (USC Information Sciences Institute) Brian Kocoloski (USC Information Sciences Institute) David Choffnes (Northeastern University) Daniel Dubois (Northeastern University) Geoff Lawler (USC Information Sciences Institute) Chris Tran (USC Information Sciences Institute) Joseph Barnes (USC Information Sciences Institute) Yuri Pradkin (USC Information Sciences Institute) Terry Benzel (USC Information Sciences Institute) Srivatsan Ravi (USC Information Sciences Institute) Ganesh Sankaran (USC Information Sciences Institute) Alba Regalado (USC Information Sciences Institute) Luis Garcia (University of Utah) |
Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor | Donghoon Kim (Arkansas State University) Andrew Booth (Arkansas State University) Euijin Choo (University of Alberta) Doosung Hwang (Dankook University) |
Poster: Byzantine discrepancy attacks against calendar, set-intersection and nations | Yvo Desmedt (University of Texas at Dallas) Aydin Abadi (Newcastle University) Alireza Kavousi (University College London) |
Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience | Weimin Fu (Kansas State University) Yifang Zhao (University of Science and Technology of China) Yier Jin (University of Science and Technology of China) Xiaolong Guo (Kansas State University) |
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network | huaifeng bao (Tencent) Wenhao Li (China Telecom Corp Ltd, Guangdong Research Institute, Guangdong, China) Zhaoxuan Li (Institute of Information Engineering, Chinese Academy of Science) Han Miao (Institute of Information Engineering, Chinese Academy of Science) Wen Wang (State Key Laboratory of Information Security, Institute of Information Engineering and University of Chinese Academy of Sciences, Chinese Academy of Sciences) Feng Liu (State Key Laboratory of Information Security, Institute of Information Engineering and University of Chinese Academy of Sciences, Chinese Academy of Sciences) |
Poster: Context-Based Effective Password Detection in Plaintext | Manish Shukla (TCS Research) Shubham Malaviya (TCS Research) Sachin Lodha (TCS Research) |
Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms | Pankaj Dayama (IBM Research India) Vinayaka Pandit (IBM Research India) Sikhar Patranabis (IBM Research India) Abhishek Singh (IBM Research India) Nitin Singh (IBM Research India) |
Poster: Security of Login Interfaces in Modern Organizations | Kevin Nsieyanji Tchokodeu (TU Darmstadt, ATHENE) Haya Schulmann (Goethe-University, ATHENE) Gil Sobol (ATHENE, Goethe-University) Michael Waidner (TU Darmstadt, ATHENE, Fraunhofer SIT) |
Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications? | Yuchen Ji (ShanghaiTech University) Ting Dai (IBM Research) Yutian Tang (University of Glasgow) Jingzhu He (ShanghaiTech University) |
Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions | Thomas Szymkowiak (Tampere University) Endrit Isufi (Tampere University) Markku-Juhani Saarinen (Tampere University) |
Poster: Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector | Wenhao Li (China Telecom Corp Ltd, Guangdong Research Institute, Guangdong, China) Duohe Ma (State Key Laboratory of Information Security,Institute of Information Engineering, CAS) Zhaoxuan Li (Institute of Information Engineering, Chinese Academy of Science) Huaifeng bao (Tencent) Shuai Wang (China Telecom Corp Ltd, Guangdong Research Institute, Guangdong, China) Huamin Jin (China Telecom Corp Ltd, Guangdong Research Institute, Guangdong, China) Xiao-Yu Zhang (Institute of Information Engineering, Chinese Academy of Science) |
Demo: An End-to-End Anonymous Traffic Analysis System | Huang Xianglan (School of Cyber Science and Engineering, Southeast University) Zhou Qiang (Jiangsu University) Wang Liangmin (School of Cyber Science and Engineering, Southeast University) Yu Weiqi (School of Cyber Science and Engineering, Southeast University) Wang Wenjin (School of Cyber Science and Engineering, Southeast University) Shen Shi (School of Cyber Science and Engineering, Southeast University) |