
ACM CCS 2025
October 13-17, 2025
Taipei, Taiwan
Doctoral Symposium Program
| Time | Session & Title & Authors |
|---|---|
| 08:40 - 08:50 | Welcoming remarks |
| 08:50 – 10:30 | Session 1 (Chair: Danfeng (Daphne) Yao) AI, ML, & Application Security Towards Explainable and Robust Deepfake Detection and Attribution: Enhancing Multimedia Forensics for the Next Generation of Synthetic Media Raphael Antonius Frick (Fraunhofer SIT | ATHENE) The potential of SBOMs to increase Software Supply Chain Security Lukas Gehrke (Technical University of Munich) Scalable Cryptography for Trustworthy Machine Learning in the LLM Era Gefei Tan (Northwestern University) S2S-SED: A Speech-to-Speech Approach for Detection of Social Engineering Attacks in Audio Conversations Leonardo Erlacher (University of the Bundeswehr Munich) AI-Augmented Static Analysis: Bridging Heuristics and Completeness for Practical Reverse Engineering Monika Santra (Penn State) |
| 10:30 – 10:50 | Break |
| 10:50 – 12:10 | Session 2 (Chair: Dominik Merli) Fundamental Security & Research Practices On Defining Reproducible Outcomes for the Computer Security Community Daniel Olszewski (University of Florida) Hardware-assisted Memory Isolation Hongyi Lu (SUSTech / HKUST) Turning Uncertainty into Efficiency: Toward Practical, Quantum-Resistant Verifiable Privacy Tools Jie Xu (Monash University) Towards solving real-world problems of post-quantum cryptography Suparna Kundu (KU Leuven) |
| 12:10 – 13:20 | Lunch |
| 13:20 – 15:00 | Session 3 (Chair: Kevin Butler) Emerging Threats & Social Impact Addressing Vulnerabilities and Opacities in Quantum Service Providers Rupshali Roy (Pennsylvania State University) Active Measurements in Cellular Networks: Exploring Novel Approaches in a Globalized (Roaming) Context Gabriel Karl Gegenhuber (University of Vienna) Postmortem Voice Cloning: Individuals Perspectives of Ownership and Deceptive Harms Jennifer Vander Loop (DePaul University) Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency Qishuang Fu (Monash University) Exploring the Janus Face of Synthetic Images: From Privacy-secure Biometrics Applications to Deepfake Detection for Misinformation-Free Social Networks Tanusree Ghosh (Indian Institute of Engineering Science and Technology, Shibpur) |
| 15:00 - 15:10 | Concluding remarks |
| 15:10 - 15:30 | Break |
| 15:30 | Conference Closing |