


default search action
32nd CCS 2025: Taipei, Taiwan
- Chun-Ying Huang, Jyh-Cheng Chen, Shiuh-Pyng Shieh, David Lie, Véronique Cortier:

Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025. ACM 2025, ISBN 979-8-4007-1525-9
Keynote Talks
- Giovanni Vigna

:
Autonomous Vulnerability Analysis, Triaging, and Repair: A Historical Perspective. 1 - David A. Basin

, François Hublet
, Srdan Krstic, Hoàng Nguyen
:
Mechanizing Privacy by Design. 2-5
Session A2: LLMs and Web Security #1
- Gelei Deng

, Haoran Ou
, Yi Liu
, Jie Zhang
, Tianwei Zhang, Yang Liu:
Oedipus: LLM-enchanced Reasoning CAPTCHA Solver. 6-20 - Jian Cui, Mingming Zha

, XiaoFeng Wang, Xiaojing Liao:
The Odyssey of robots.txt Governance: Measuring Convention Implications of Web Bots in Large Language Model Services. 21-35 - Guoqiang Chen

, Xin Jin
, Zhiqiang Lin:
JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation. 36-50
Session A3: Security Usability and Measurement #1
- Jonas Hielscher

, Maximilian Golla:
Quantifying Security Training in Organizations Through the Analysis of U.S. SEC 10-K Filings. 51-65 - Zahra Moti, Tom Janssen-Groesbeek, Steven Monteiro, Andrea Continella, Gunes Acar:

WhisperTest: A Voice-Control-based Library for iOS UI Automation. 66-80 - Sena Sahin, Burak Sahin

, Robin Berthier, Kate Davis
, Saman A. Zonouz, Frank Li
:
The Challenges and Opportunities with Cybersecurity Regulations: A Case Study of the US Electric Power Sector. 81-95 - Asmit Nayak

, Yash Wani, Shirley Zhang
, Rishabh Khandelwal
, Kassem Fawaz:
Automatically Detecting Online Deceptive Patterns. 96-110
Session A4: Formal Methods and Programming Languages #1
- Zilong Wang

, Gideon Mohr
, Klaus von Gleissenthall
, Jan Reineke, Marco Guarnieri
:
Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors. 111-125 - Markus Scherer

, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Matteo Maffei:
Wanilla: Sound Noninterference Analysis for WebAssembly. 126-140 - Shixin Song

, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala, Mengjia Yan
:
Securing Cryptographic Software via Typed Assembly Language. 141-155 - Manuel Barbosa, Matthias J. Kannwischer

, Thing-Han Lim
, Peter Schwabe, Pierre-Yves Strub:
Formally Verified Correctness Bounds for Lattice-Based Cryptography. 156-169
Session A5: Software Security #1
- Weidong Zhu

, Carson Stillman
, Sara Rampazzi, Kevin R. B. Butler:
Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSD. 171-185 - Zeyang Zhuang

, Zilun Wang
, Wei Meng, Michael R. Lyu
:
Don't Panic! Finding Bugs Hidden Behind Rust Runtime Safety Checks. 186-200 - Zheng Zhong

, Ruoyu Wu, Junpeng Wan, Muqi Zou, Dave (Jing) Tian
:
Hardening Deep Neural Network Binaries against Reverse Engineering Attacks. 201-215 - Dong-ok Kim, Juhyun Song

, Insu Yun
:
CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel. 216-230
Session A6: Network Security #1
- Altaf Shaik, Robert Jaschek

, Jean-Pierre Seifert
:
Uncovering Hidden Paths in 5G: Exploiting Protocol Tunneling and Network Boundary Bridging. 231-245 - Fabian Bäumer

, Marcel Maehren, Marcus Brinkmann
, Jörg Schwenk
:
Finding SSH Strict Key Exchange Violations by State Learning. 246-260 - Ahmed Aly

, Essam Mansour, Amr M. Youssef
:
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs. 261-275 - Mincheol Son

, Kwangmin Kim
, Beomseok Oh
, CheolJun Park
, Yongdae Kim:
CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks. 276-290
Session A7: Machine Learning and Security #1
- Pritam Sen

, Yao Ma
, Cristian Borcea
:
CryptGNN: Enabling Secure Inference for Graph Neural Networks. 291-305 - Qin Yang, Nicholas Stout, Meisam Mohammady, Han Wang, Ayesha Samreen, Christopher J. Quinn, Yan Yan, Ashish Kundu

, Yuan Hong
:
PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable Optimization. 306-320 - Nojan Sheybani

, Alessandro Pegoraro, Jonathan Knauer
, Phillip Rieger
, Elissa Mollakuqe, Farinaz Koushanfar
, Ahmad-Reza Sadeghi:
ZORRO: Zero-Knowledge Robustness and Privacy for Split Learning. 321-334 - Kai Ye

, Liangcai Su, Chenxiong Qian
:
ImportSnare: Directed 'Code Manual' Hijacking in Retrieval-Augmented Code Generation. 335-349
Session A8: Applied Cryptography #1
- Lea Thiemt, Paul Rösler

, Alexander Bienstock
, Rolfe Schmidt
, Yevgeniy Dodis
:
Generic Anonymity Wrapper for Messaging Protocols. 350-364 - Jingyu Li

, Zhicong Huang
, Min Zhang
, Cheng Hong
, Jian Liu, Tao Wei, Wenguang Chen
:
Panther: Private Approximate Nearest Neighbor Search in the Single Server Setting. 365-379 - Hila Dahari-Garbian, Ariel Nof, Luke Parker:

Trout: Two-Round Threshold ECDSA from Class Groups. 380-393 - Fabrice Benhamouda

, Caicai Chen
, Shai Halevi, Yuval Ishai
, Hugo Krawczyk
, Tamer Mour, Tal Rabin, Alon Rosen
:
Encrypted Matrix-Vector Products from Secret Dual Codes. 394-408
Session B1: Applied Cryptography #2
- George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz

:
KZH-Fold: Accountable Voting from Sublinear Accumulation. 409-422 - Elizabeth C. Crites

, Aggelos Kiayias, Markulf Kohlweiss
, Amirreza Sarencheh:
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. 423-437 - Takumi Nishimura

, Kazunari Tozawa, Kunihiko Sadakane
:
Surpassing the Word Size Limitation of TFHE with Noise Calibration. 438-452 - Zibo Zhou, Zongyang Zhang

, Feng Hao
, Bowen Zheng
, Zulkarnaim Masyhur:
QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy. 453-467 - Ya-Nan Li

, Yaqing Song, Qiang Tang, Moti Yung
:
End-to-End Encrypted Git Services. 468-482 - Zhenhua Zou, Zhuotao Liu

, Jinyong Shan
, Qi Li, Ke Xu, Mingwei Xu
:
RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing. 483-497
Session B2: Privacy and Anonymity #1
- Ali Shahin Shamsabadi, Peter Snyder, Ralph Giles

, Aurélien Bellet, Hamed Haddadi
:
Nebula: Efficient, Private and Accurate Histogram Estimation. 498-512 - Zitao Chen

, Karthik Pattabiraman:
Anonymity Unveiled: A Practical Framework for Auditing Data Use in Deep Learning Models. 513-527 - Tsz Hon Yuen, Ying-Teng Chen

, Shimin Pan, Jiangshan Yu, Joseph K. Liu
:
Posterior Security: Anonymity and Message Hiding of Standard Signatures. 528-542 - Alejandro Russo

, Elisabet Lobo Vesga
, Marco Gaboardi
:
Accuracy for Differentially Private Quotients by Fractional Uncertainties. 543-557 - Christoph Coijanovic

, Laura Hetz, Kenneth G. Paterson
, Thorsten Strufe:
Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels. 558-572 - Zhi Lu

, Songfeng Lu
:
LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification. 573-587
Session B3: Security Usability and Measurement #2
- Anna Raymaker

, Akshaya Kumar
, Miuyin Yong Wong
, Ryan Pickren, Animesh Chhotaray, Frank Li
, Saman A. Zonouz, Raheem Beyah:
A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners. 588-602 - Zimo Ji, Daoyuan Wu

, Wenyuan Jiang, Pingchuan Ma, Zongjie Li
, Shuai Wang
:
Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges. 603-617 - Yevheniya Nosyk

, Maciej Korczynski, Carlos Gañán
, Sourena Maroofi, Jan Bayer
, Zul Odgerel
, Samaneh Tajalizadehkhoob, Andrzej Duda
:
Exposing the Roots of DNS Abuse: A Data-Driven Analysis of Key Factors Behind Phishing Domain Registrations. 618-632 - Lina Brunken, Markus Schöps, Annalina Buckmann

, Florian Meißner
, M. Angela Sasse
:
Noise and Stress Don't Help With Learning: A Qualitative Study to Inform Design of Effective Cybersecurity Awareness in Manufacturing Environments. 633-647 - Sen Deng, Zhibo Liu

, Shuai Wang
, Yinqian Zhang:
An Empirical Study Measuring In-The-Wild Cryptographic Microarchitectural Side-Channel Patches. 648-662 - Xander Bouwman, Aksel Ethembabaoglu, Bart Hermans, Carlos Gañán

, Michel van Eeten
:
Can IOCs Impose Cost? The Effects of Publishing Threat Intelligence on Adversary Behavior. 663-677
Session B4: Hardware, Side Channels, and Cyber Physical Systems #1
- Xieyang Sun

, Yuanqing Zheng
, Wei Xi
, Zuhao Chen
, Zhizhen Chen, Han Hao
, Zhiping Jiang, Sheng Zhong:
TEMPEST-LoRa: Cross-Technology Covert Communication. 678-692 - Hongyi Lu

, Yunjie Deng, J. Sukarno Mertoguno, Shuai Wang
, Fengwei Zhang
:
MOLE: Breaking GPU TEE with GPU-Embedded MCU. 693-707 - Alexander Seto, Oytun Kuday Duran, Samy Amer

, Jalen Chuang, Stephan van Schaik
, Daniel Genkin, Christina Garman:
WireTap: Breaking Server SGX via DRAM Bus Interposition. 708-722 - Twisha Chattopadhyay

, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner
, Saman A. Zonouz, Raheem Beyah:
One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels. 723-737 - Chen Ma

, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen:
ControlLoc: Physical-World Hijacking Attack on Camera-based Perception in Autonomous Driving. 738-752 - Muchen Pan, Yan Meng

, Yuxia Zhan
, Guoxing Chen
, Haojin Zhu
:
PipID: Light-Pupillary Response Based User Authentication for Virtual Reality. 753-767
Session B5: Software Security #2
- Yibo He

, Cunjian Huang, Xianmiao Qu
, Hongdeng Chen, Wei Yang
, Tao Xie
:
RVISmith: Fuzzing Compilers for RVV Intrinsics. 768-782 - Christoph Hochrainer

, Anastasia Isychev
, Valentin Wüstholz, Maria Christakis
:
Fuzzing Processing Pipelines for Zero-Knowledge Circuits. 783-797 - Yunpeng Tian, Feng Dong, Junhai Wang, Mu Zhang

, Zhiniang Peng, Zesen Ye, Xiapu Luo
, Haoyu Wang:
Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components. 798-812 - Yu Hao

, Juefei Pu
, Xingyu Li
, Zhiyun Qian
, Ardalan Amiri Sani:
SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution. 813-826 - Bing Shui, Yufan Zhou

, Jielun Wu
, Baowen Xu, Qingkai Shi:
Validating Interior Gateway Routing Protocols via Equivalent Topology Synthesis. 827-841 - Peicheng Wang, Monika Santra

, Mingyu Liu, Cong Sun
, Dongrui Zeng, Gang Tan
:
Disa: Accurate Learning-based Static Disassembly with Attentions. 843-857
Session B6: Blockchain and Distributed Systems #1
- Min Xie

, Zhengzhou Tu, Man Ho Au
, Junbin Fang, Xuan Wang, Zoe Lin Jiang:
Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments. 858-872 - Ábel Nagy

, János Tapolcai
, István András Seres
, Bence Ladóczki:
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. 873-887 - Loïc Miller

, Dorian Pacaud, Nathanël Derousseaux-Lebert
, Emmanuelle Anceaume
, Romaric Ludinard
:
Mining in Logarithmic Space with Variable Difficulty. 888-902 - Roozbeh Sarenche

, Alireza Aghabagherloo
, Svetla Nikova
, Bart Preneel
:
Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining. 903-917 - Eunchan Park, Taeung Yoon

, Hocheol Nam
, Deepak Maram
, Min Suk Kang:
On Frontrunning Risks in Batch-Order Fair Systems for Blockchains. 918-932 - Yogev Bar-On

, Roi Bar Zur, Omer Ben-Porat, Nimrod Cohen, Ittay Eyal, Matan Sitbon:
Aegis: Tethering a Blockchain with Primary-Chain Stake. 933-947
Session B7: Machine Learning and Security #2
- Yanna Jiang

, Guangsheng Yu
, Qin Wang, Xu Wang
, Baihe Ma
, Caijun Sun
, Wei Ni, Ren Ping Liu
:
Split Unlearning. 948-962 - Wei Qiao

, Yebo Feng, Teng Li, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu:
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. 963-977 - Yiling He

, Junchi Lei
, Zhan Qin, Kui Ren, Chun Chen:
Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware Classification. 978-992 - Renyang Liu

, Wenjie Feng, Tianwei Zhang, Wei Zhou
, Xueqi Cheng, See-Kiong Ng
:
Rethinking Machine Unlearning in Image Generation Models. 993-1007 - Tong Sun

, Bowen Jiang, Hailong Lin, Borui Li
, Yixiao Teng
, Yi Gao, Wei Dong:
TensorShield: Safeguarding On-Device Inference by Shielding Critical DNN Tensors with TEE. 1008-1022 - Philemon Hailemariam, Birhanu Eshete

:
PoisonSpot: Precise Spotting of Clean-Label Backdoors via Fine-Grained Training Provenance Tracking. 1023-1037
Session B8: Applied Cryptography #3
- Alex Davidson

, Amit Deo, Louis Tremblay Thibault
:
Pool: A Practical OT-based OPRF from Learning with Rounding. 1038-1052 - Arman Riasi, Haodi Wang

, Rouzbeh Behnia, Viet Vo
, Thang Hoang:
Zero-Knowledge AI Inference with High Precision. 1053-1067 - Xirong Ma

, Junling Fang
, Chunpeng Ge, Dung Hoang Duong
, Yali Jiang, Yanbin Li, Willy Susilo
, Lizhen Cui:
New Permutation Decomposition Techniques for Efficient Homomorphic Permutation. 1068-1082 - Hyeongmin Choe

, Jaehyung Kim
, Damien Stehlé, Elias Suvanto
:
Leveraging Discrete CKKS to Bootstrap in High Precision. 1083-1097 - Jung Hee Cheon

, Hyeongmin Choe
, Minsik Kang
, Jaehyung Kim
, Seonghak Kim
, Johannes Mono
, Taeyeong Noh
:
Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. 1098-1112 - Louis Tremblay Thibault

, Michael Walter
:
Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2. 1113-1126
Session C1: Applied Cryptography #4
- Marc Fischlin, Moritz Huppert

, Sam A. Markelon
:
Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees. 1127-1141 - Zihan Wang

, Lutan Zhao
, Ming Luo
, Zhiwei Wang
, Haoqi He, Wenzhe Lv
, Xuan Ding, Dan Meng, Rui Hou:
ShiftPIR: An Efficient PIR System with Gravity Shifting from Client to Server. 1143-1157 - Dennis Dayanikli

, Anja Lehmann:
Updatable aPAKE: Security Against Bulk Precomputation Attacks. 1158-1172 - Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang

, Ning Luo
:
Founding Zero-Knowledge Proof of Training on Optimum Vicinity. 1173-1187 - Michele Orrù

:
Revisiting Keyed-Verification Anonymous Credentials. 1188-1199 - Kévin Duverger, Pierre-Alain Fouque

, Charlie Jacomme
, Guilhem Niot
, Cristina Onete:
Subversion-resilient Key-exchange in the Post-quantum World. 1200-1214
Session C2: Privacy and Anonymity #2
- Pei Zhan

, Peng Tang, Yangzhuo Li, Puwen Wei
, Shanqing Guo:
Poisoning Attacks to Local Differential Privacy for Ranking Estimation. 1215-1229 - Xiaolin Li

, Ninghui Li
, Boyang Wang, Wenhai Sun
:
Mitigating Data Poisoning Attacks to Local Differential Privacy. 1230-1244 - Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari

, Alina Oprea
, Amir Houmansadr
:
Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation. 1245-1259 - Alexandra Nisenoff

, Deian Stefan
, Nicolas Christin
:
Exploiting the Shared Storage API. 1260-1274 - Michael A. Specter, Mihai Christodorescu

, Abbie Farr, Bo Ma
, Robin Lassonde
:
Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting. 1275-1289 - Ruiyao Liu

, Chenxi Qiu
:
PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with Anchor-Based Approximation. 1290-1304
Session C3: Web Security #1
- Haichuan Xu, Runze Zhang

, Mingxuan Yao, David Oygenblik, Yizhi Huang, Jeman Park
, Brendan Saltaformaggio
:
Lock the Door But Keep the Window Open: Extracting App-Protected Accessibility Information from Browser-Rendered Websites. 1305-1319 - Fengyu Liu, Yuan Zhang

, Enhao Li, Wei Meng, Youkun Shi, Qianheng Wang, Chenlin Wang
, Zihan Lin, Min Yang:
BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications. 1320-1333 - Side Liu

, Jiang Ming, Guodong Zhou, Xinyi Liu, Jianming Fu
, Guojun Peng
:
Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model. 1334-1348 - Alisha Ukani

, Hamed Haddadi
, Alex C. Snoeren
, Peter Snyder:
Local Frames: Exploiting Inherited Origins to Bypass Content Blockers. 1349-1363 - Jonathan Fuller

, Mingxuan Yao, Saumya Agarwal, Srimanta Barua, Taleb Hirani
, Amit Kumar Sikder
, Brendan Saltaformaggio
:
Enhanced Web Application Security Through Proactive Dead Drop Resolver Remediation. 1364-1378 - Jiaming Li

, Sen Chen, Chunlian Wu, Yuxin Zhang
, Lingling Fan:
ForeDroid: Scenario-Aware Analysis for Android Malware Detection and Explanation. 1379-1393
Session C4: Formal Methods and Programming Languages #2
- Simon Oddershede Gregersen

, Chaitanya Agarwal
, Joseph Tassarotti
:
Logical Relations for Formally Verified Authenticated Data Structures. 1394-1408 - José Bacelar Almeida

, Manuel Barbosa, Gilles Barthe
, Lionel Blatter
, Gustavo Xavier Delerue Marinho Alves, João Diogo Duarte
, Benjamin Grégoire
, Tiago Oliveira
, Miguel Quaresma
, Pierre-Yves Strub, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs. 1409-1423 - Cas Cremers, Alexander Dax

, Aurora Naska:
Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks. 1424-1438 - Bishnu Bhusal

, Rohit Chadha
, A. Prasad Sistla
, Mahesh Viswanathan:
Approximate Algorithms for Verifying Differential Privacy with Gaussian Distributions. 1439-1453 - Tarakaram Gollamudi, Anitha Gollamudi

, Joshua Gancher
:
ILA: Correctness via Type Checking for Fully Homomorphic Encryption. 1454-1468 - João C. Pereira

, Tobias Klenze, Sofia Giampietro
, Markus Limbeck, Dionysios Spiliopoulos, Felix Wolf
, Marco Eilers
, Christoph Sprenger
, David A. Basin
, Peter Müller, Adrian Perrig:
Protocols to Code: Formal Verification of a Secure Next-Generation Internet Router. 1469-1483
Session C5: Software Security #3
- Yue Sun, Yan Kang

, Chenggang Wu, Kangjie Lu, Jiming Wang
, Xingwei Li
, Yuhao Hu, Jikai Ren, Yuanming Lai, Mengyao Xie
, Zhe Wang:
SyzParam: Incorporating Runtime Parameters into Kernel Driver Fuzzing. 1484-1498 - Hao Zhang, Jian Liu, Jie Lu

, Shaomin Chen, Tianshuo Han, Bolun Zhang
, Xiaorui Gong:
Reviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata Fields. 1499-1513 - Junseung You

, Jiwon Seo, Kyeongryong Lee
, Yeongpil Cho, Yunheung Paek
:
BASTAG: Byte-level Access Control on Shared Memory using ARM Memory Tagging Extension. 1514-1528 - Seongyun Jeong, Minseong Choi

, Haehyun Cho, Seokwoo Choi
, Hyungsub Kim, Yuseok Jeon
:
Intent-aware Fuzzing for Android Hardened Application. 1529-1543 - Jason Z. Yu, Fangqi Han

, Kaustab Choudhury, Trevor E. Carlson, Prateek Saxena:
Securing Mixed Rust with Hardware Capabilities. 1544-1558 - Yuwei Liu

, Junquan Deng
, Xiangkun Jia
, Yanhao Wang, Minghua Wang
, Lin Huang
, Tao Wei, Purui Su
:
PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language Models. 1559-1573
Session C6: Network Security #2
- Meng Shen, Jinhe Wu, Junyu Ai, Qi Li, Chenchen Ren, Ke Xu, Liehuang Zhu:

Swallow: A Transfer-Robust Website Fingerprinting Attack via Consistent Feature Learning. 1574-1588 - Xiaoyu He

, Xiaohui Xie, Xin Wang
, Lei Zhang, Kun Xie, Lin Chen, Yong Cui:
FlowSentry: Accelerating NetFlow-based DDoS Detection. 1589-1603 - Keji Miao, Jie Yuan, Xinghai Wei

, Xingwu Wang, Dongqi Han
, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen
:
1BIT: Persistent Path Validation with Customized Noise Signal Characteristics. 1604-1618 - Xiang Li

, Mingming Zhang
, Zuyao Xu
, Fasheng Miao
, Yuqi Qiu
, Baojun Liu, Jia Zhang
, Xiaofeng Zheng, Haixin Duan
, Zheli Liu, Yunhai Zhang, Dunqiu Fan:
RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday Paradox. 1619-1633 - Hui Li

, Haotian Li
, Chi Ma, Jingjing Guan, Junchi Zeng, Haonan Feng, Ziming Zhao
:
5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems. 1634-1648 - Xuening Xu

, Chenglong Fu, Xiaojiang Du, Bo Luo:
Discovering and Exploiting IoT Device Hidden Attributes: A New Vulnerability in Smart Homes. 1649-1663
Session C7: Machine Learning and Security #3
- Luming Yang, Lin Liu

, Junjie Huang
, Zhuotao Liu
, Shiyu Liang, Shaojing Fu
, Yongjun Wang:
MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis. 1664-1678 - Tianyu Qi, Lei Xue

, Yufeng Zhan, Xiaobo Ma:
Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning. 1679-1693 - Changsheng Chen

, Wenyu Chen, Yinyin Lin
, Bin Li, Jiwu Huang:
Unmask Tampering: Efficient Document Tampering Localization under Recapturing Attacks with Real Distortion Knowledge. 1694-1708 - Peizhuo Lv

, Mengjie Sun, Hao Wang, XiaoFeng Wang, Shengzhi Zhang, Yuxuan Chen
, Kai Chen, Limin Sun:
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models. 1709-1723 - Zhiqi Wang, Chengyu Zhang, Yuetian Chen, Nathalie Baracaldo, Swanand Ravindra Kadhe

, Lei Yu
:
Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble. 1724-1738 - Xinjian Luo

, Ting Yu
, Xiaokui Xiao
:
Prompt Inference Attack on Distributed Large Language Model Inference Frameworks. 1739-1753
Session C8: Applied Cryptography #5
- Daniel Pöllmann

, Tianxin Tang
:
Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost? 1754-1768 - Anirban Chakrabarti, Monosij Maitra

, Arup Mondal
, Kushaz Sehgal:
Silent Threshold Traitor Tracing & Enhancing Mempool Privacy. 1769-1783 - Jiahui Gao

, Son Nguyen
, Marina Blanton, Ni Trieu:
PULSE: Parallel Private Set Union for Large-Scale Entities. 1784-1798 - Akhil Bandarupalli

, Xiaoyu Ji
, Aniket Kate, Chen-Da Liu-Zhang
, Daniel Pöllmann
, Yifan Song
:
Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography. 1799-1813 - David Adei

, Chris Orsini, Alessandra Scafuro, Tanner Verber:
How to Recover a Cryptographic Secret From the Cloud. 1814-1828 - Tian Zhou

, Fangyu Zheng
, Zhuoyu Xie, Wenxu Tang
, Guang Fan
, Yijing Ning
, Yi Bian
, Jingqiang Lin
, Jiwu Jing
:
ML-Cube: Accelerating Module-Lattice-Based Cryptography using Machine Learning Accelerators with a Memory-Less Design. 1829-1843
Session D2: Web Security #2
- Eric Cornelissen

, Musard Balliu
:
NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js. 1844-1858 - Anuj Gautam

, Tarun Kumar Yadav, Garrett Smith
, Kent E. Seamons, Scott Ruoti
:
Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers. 1859-1873 - Qiyi Zhang

, Fengyu Liu, Zihan Lin, Yuan Zhang
:
Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web Applications. 1874-1888 - Ahsan Zafar

, Junhua Su
, Sohom Datta
, Alexandros Kapravelos
, Anupam Das
:
Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms. 1889-1903
Session D3: Security Usability and Measurement #3
- Viktoria Koscinski

, Mark Nelson, Ahmet Okutan, Robert Falso, Mehdi Mirakhorli
:
Conflicting Scores, Confusing Signals: An Empirical Study of Vulnerability Scoring Systems. 1904-1918 - Simon Lachnit

, Ghassan Karame:
On Hyperparameters and Backdoor-Resistance in Horizontal Federated Learning. 1919-1933 - Xiaowei Chen

, Verena Distler
, Chloe Gordon
, Yaxing Yao, Ziwen Teuber
:
Empowering Parents to Support Children's Online Security and Privacy: Findings from a Randomized Controlled Trial. 1934-1948 - Mah Jan Dorazahi

, Deepthi Mungara, Yasemin Acar, Harshini Sri Ramulu
:
Security and Privacy Perceptions of Pakistani Facebook Matrimony Group Users. 1949-1963
Session D4: Hardware, Side Channels, and Cyber Physical Systems #2
- Zihui Guo

, Miaomiao Yuan, Yanqi Yang, Liwei Chen, Gang Shi, Dan Meng:
DiveFuzz: Enhancing CPU Fuzzing via Diverse Instruction Construction. 1964-1978 - Penghao Wang

, Shuo Huai
, Yetong Cao
, Chao Liu
, Jun Luo:
Threat from Windshield: Vehicle Windows as Involuntary Attack Sources on Automotive Voice Assistants. 1979-1993 - Suparna Kundu

, Quinten Norga
, Angshuman Karmakar
, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede
:
mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order. 1994-2008 - R. Spencer Hallyburton, Miroslav Pajic

:
Security-Aware Sensor Fusion with MATE: the Multi-Agent Trust Estimator. 2009-2023
Session D5: Software Security #4
- Shijia Li

, Jiang Ming, Lanqing Liu, Longwei Yang, Ni Zhang, Chunfu Jia
:
Adversarially Robust Assembly Language Model for Packed Executables Detection. 2024-2038 - Hossam ElAtali

, Merve Gülmez
, Thomas Nyman
, N. Asokan:
BLACKOUT: Data-Oblivious Computation with Blinded Capabilities. 2039-2053 - Haoyi Liu, Feng Dong, Yunpeng Tian, Mu Zhang

, Xuefeng Li, Fangming Gu, Zhiniang Peng, Haoyu Wang:
Needle in a Haystack: Automated and Scalable Vulnerability Hunting in the Windows ALPC Sea. 2054-2068 - Leon Trampert

, Daniel Weber
, Christian Rossow, Michael Schwarz
:
Styled to Steal: The Overlooked Attack Surface in Email Clients. 2069-2083
Session D6: Blockchain and Distributed Systems #2
- Zihao Li

, Zhiyuan Sun
, Zheyuan He
, Jinzhao Chu
, Hao Zhou
, Xiapu Luo
, Ting Chen, Yinqian Zhang:
Denial of Sequencing Attacks in Ethereum Layer 2 Rollups. 2084-2098 - Yizhong Liu, Andi Liu

, Zhuocheng Pan, Yuxuan Hu, Jianwei Liu, Song Bian, Yuan Lu
, Zhenyu Guan
, Dawei Li
, Meikang Qiu
:
Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience. 2099-2113 - Lucien K. L. Ng

, Pedro Moreno-Sanchez
, Mohsen Minaei, Panagiotis Chatzigiannis
, Adithya Bhat, Duc V. Le
:
Lite-PoT: Practical Powers-of-Tau Setup Ceremony. 2114-2128 - Margarita Capretto

, Martín Ceresa
, Antonio Fernández Anta
, Pedro Moreno-Sanchez
, César Sánchez:
A Secure Sequencer and Data Availability Committee for Rollups. 2129-2143
Session D7: Machine Learning and Security #4
- Jie Fu, Yuan Hong

, Zhili Chen, Wendy Hui Wang:
Safeguarding Graph Neural Networks against Topology Inference Attacks. 2144-2158 - Ruyi Ding

, Tianhong Xu
, Xinyi Shen
, Aidong Adam Ding
, Yunsi Fei:
MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs. 2159-2173 - De Zhang Lee, Han Fang, Hanyi Wang, Ee-Chien Chang:

Removal Attack and Defense on AI-generated Content Latent-based Watermarking. 2174-2188 - David Oygenblik, Abhinav Vemulapalli, Animesh Agrawal

, Debopam Sanyal
, Alexey Tumanov, Brendan Saltaformaggio
:
VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier. 2189-2203
Session D8: Applied Cryptography #6
- Chengrui Dang, Xv Zhou, Bei Liang

:
Efficient Fuzzy PSI Based on Prefix Representation. 2204-2218 - Yiping Ma

, Yue Guo, Harish Karthikeyan
, Antigoni Polychroniadou:
Armadillo: Robust Single-Server Secure Aggregation for Federated Learning with Input Validation. 2219-2233 - Sanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len

, Thomas Ristenpart:
The OCH Authenticated Encryption Scheme. 2234-2248 - Jack Doerner, Iftach Haitner, Yuval Ishai

, Nikolaos Makriyannis
:
From OT to OLE with Subquadratic Communication. 2249-2263
Session E1: Applied Cryptography #7
- Carolina Ortega Pérez, Thomas Ristenpart, Julia Len

:
Interoperable Symmetric Message Franking. 2264-2278 - Lichun Li, Zecheng Wu

, Yuan Zhao, Zhihao Li, Wen-jie Lu, Shan Yin:
Gibbon: Faster Secure Two-party Training of Gradient Boosting Decision Tree. 2279-2293 - Kien Tuong Truong

, Simon-Philipp Merz
, Matteo Scarlata
, Felix Günther, Kenneth G. Paterson
:
Breaking and Fixing Content-Defined Chunking. 2294-2308 - Ruida Wang

, Jincheol Ha
, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, Jooyoung Lee:
Refined TFHE Leveled Homomorphic Evaluation and Its Application. 2309-2323 - Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee

, Hussien Othman
:
CCA-Secure Traceable Threshold (ID-based) Encryption and Application. 2324-2338 - Guy Zyskind

, Doron Zarchy, Max Leibovich, Chris Peikert
:
High-Throughput Universally Composable Threshold FHE Decryption. 2339-2353
Session E2: Privacy and Anonymity #3
- Shuangqing Xu

, Yifeng Zheng, Zhongyun Hua:
Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization. 2354-2368 - Juanru Fang

, Ke Yi
:
Counting Subgraphs under Shuffle Differential Privacy. 2369-2383 - Syomantak Chaudhuri

, Thomas A. Courtade:
Managing Correlations in Data and Privacy Demand. 2384-2398 - Julian Todt

, Felix Morsbach
, Thorsten Strufe:
BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information. 2399-2413 - Yuntao Du

, Ninghui Li
:
Systematic Assessment of Tabular Data Synthesis. 2414-2428 - Hao Nie

, Wei Wang
, Peng Xu
, Wei Chen, Laurence T. Yang
, Mauro Conti
, Kaitai Liang
:
Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. 2429-2443
Session E3: Security Usability and Measurement #4
- Elijah Robert Bouma-Sims

, Mandy Lanyon
, Lorrie Faith Cranor
:
'Is this a scam?': The Nature and Quality of Reddit Discussion about Scams. 2444-2458 - David Schmidt

, Sebastian Schrittwieser, Edgar R. Weippl
:
Leaky Apps: Large-scale Analysis of Secrets Distributed in Android and iOS Apps. 2459-2473 - Zheyuan Ma

, Gaoxiang Liu
, Alex Eastman
, Kai Kaufman
, Md. Armanuzzaman
, Xi Tan
, Katherine Jesse, Robert J. Walls, Ziming Zhao
:
'We just did not have that on the embedded system': Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions. 2474-2488 - Joshua Wiedemeier

, Simon Klancher, Joel Flores, Max Zheng, Jaehyun Park
, Sang Kil Cha
, Kangkook Jee:
Walking The Last Mile: Studying Decompiler Output Correction in Practice. 2489-2503 - Yunze Zhao

, Wentao Guo
, Harrison Goldstein
, Daniel Votipka
, Kelsey R. Fulton
, Michelle L. Mazurek:
A Qualitative Analysis of Fuzzer Usability and Challenges. 2504-2518 - Lorenzo Neil

, Deepthi Mungara, Laurie A. Williams
, Yasemin Acar, Bradley Reaves:
It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools. 2519-2533
Session E4: Hardware, Side Channels, and Cyber Physical Systems #3
- Ali Hajiabadi

, Michele Marazzi
, Kaveh Razavi
:
CHaRM: Checkpointed and Hashed Counters for Flexible and Efficient Rowhammer Mitigation. 2534-2548 - Hai Lin, Chenglong Li

, Jiahai Yang
, Zhiliang Wang, Jiaqi Bai:
ZVDetector: State-Guided Vulnerability Detection System for Zigbee Devices. 2549-2563 - Fabian Thomas

, Michael Torres
, Daniel Moghimi
, Michael Schwarz
:
ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs. 2564-2578 - Tobias Kovats, Flavien Solt, Katharina Ceesay-Seitz

, Kaveh Razavi
:
MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking. 2579-2593 - Yitong Guo, Hongbo Chen, Haobin Hiroki Chen, Yukui Luo

, XiaoFeng Wang, Chenghong Wang:
BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM Accelerators. 2594-2608 - Chongqing Lei

, Zhen Ling, Xiangyu Xu
, Shaofeng Li
, Guangchi Liu, Kai Dong, Junzhou Luo:
FlexEmu: Towards Flexible MCU Peripheral Emulation. 2609-2623
Session E5: Software Security #5
- Rui Zhao, Muhammad Shoaib

, Viet Tung Hoang, Wajih Ul Hassan
:
Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing System. 2624-2638 - Nils Bars, Lukas Bernhard, Moritz Schloegel

, Thorsten Holz:
Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault Injection. 2639-2652 - Shixuan Zhao, Zhongshu Gu, Salman Ahmed

, Enriquillo Valdez, Hani Jamjoom, Zhiqiang Lin:
GPU Travelling: Efficient Confidential Collaborative Training with TEE-Enabled GPUs. 2653-2667 - Bruno Kreyssig

, Sabine Houy, Timothée Riom
, Alexandre Bartel:
Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes. 2668-2682 - Sheng Cao

, Hao Zhou
, Songzhou Shi
, Yanjie Zhao
, Haoyu Wang:
Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android. 2683-2698 - Paul Metzger

, A. Theodore Markettos, Edward Tomasz Napierala, Matthew Naylor, Robert N. M. Watson, Timothy M. Jones
:
Deprivileging Low-Level GPU Drivers Efficiently with User-Space Processes and CHERI Compartments. 2699-2713
Session E6: Formal Methods and Programming Languages #3
- Stefanos Chaliasos

, Denis Firsov
, Benjamin Livshits:
Towards a Formal Foundation for Blockchain ZK Rollups. 2714-2728 - Karthikeyan Bhargavan, Lasse Letager Hansen

, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
:
Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust. 2729-2743 - Tahina Ramananandro

, Gabriel Ebner
, Guido Martínez
, Nikhil Swamy:
Secure Parsing and Serializing with Separation Logic Applied to CBOR, CDDL, and COSE. 2744-2758 - Felix Linker

, Christoph Sprenger
, Cas Cremers, David A. Basin
:
Looping for Good: Cyclic Proofs for Security Protocols. 2759-2773 - Thomas A. Henzinger, Mahyar Karimi

, K. S. Thejaswini
:
Privacy-Preserving Runtime Verification. 2774-2787 - Huan Sun

, David Sanán
, Jingyi Wang
, Yongwang Zhao
, Jun Sun
, Wenhai Wang
:
Generalized Security-Preserving Refinement for Concurrent Systems. 2789-2803
Session E7: Machine Learning and Security #5
- Gaoyang Liu

, Xijie Wang, Zixiong Wang
, Chen Wang, Ahmed M. Abdelmoniem
, Desheng Wang:
Prototype Surgery: Tailoring Neural Prototypes via Soft Labels for Efficient Machine Unlearning. 2804-2817 - Peigui Qi

, Kunsheng Tang, Wenbo Zhou
, Weiming Zhang
, Nenghai Yu, Tianwei Zhang, Qing Guo
, Jie Zhang
:
SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models. 2818-2832 - Sizhe Chen

, Arman Zharmagambetov
, Saeed Mahloujifar
, Kamalika Chaudhuri, David A. Wagner
, Chuan Guo:
SecAlign: Defending Against Prompt Injection with Preference Optimization. 2833-2847 - Stanley Wu

, Ronik Bhaskar
, Anna Yoo Jeong Ha
, Shawn Shan
, Haitao Zheng, Ben Y. Zhao
:
On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial Mislabeling. 2848-2862 - Xiaoyun Xu

, Zhuoran Liu, Stefanos Koffas
, Stjepan Picek
:
Towards Backdoor Stealthiness in Model Parameter Space. 2863-2876 - De Zhang Lee

, Aashish Kolluri
, Prateek Saxena, Ee-Chien Chang:
A Practical and Secure Byzantine Robust Aggregator. 2877-2891
Session E8: Applied Cryptography #8
- Wenxuan Yu

, Minghui Xu, Bing Wu, Sisi Duan
, Xiuzhen Cheng:
AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output Delivery. 2892-2906 - Zeyu Liu

, Yunhao Wang, Ben Fisch:
IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model. 2907-2921 - Konrad Hanff, Anja Lehmann, Cavit Özbay:

Security Analysis of Privately Verifiable Privacy Pass. 2922-2936 - Yingjie Lyu

, Zengpeng Li, Hong-Sheng Zhou
, Xudong Deng:
Threshold ECDSA in Two Rounds. 2937-2950 - Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre:

Fast Homomorphic Evaluation of LWR-based PRFs. 2951-2965 - Antonio Guimarães

, Hilder V. L. Pereira
:
Fast Amortized Bootstrapping with Small Keys and Polynomial Noise Overhead. 2967-2981
Session F1: Web Security #3
- Robin Kirchner

, Chris Tsoukaladelis, Martin Johns
, Nick Nikiforakis
:
The Power to Never Be Wrong: Evasions and Anachronistic Attacks Against Web Archives. 2982-2996 - Woonghee Lee

, Junbeom Hur, Hyunsoo Kwon:
Deep Dive into In-app Browsers: Uncovering Hidden Pitfalls in Certificate Validation. 2997-3011 - Ruotian Xie

, Kun Xie, Pengcheng Zhao, Jiajun He
, Xin Zeng
, Jigang Wen, Yong Xie, Wei Liang, Gaogang Xie
:
GAPDiS: Gradient-Assisted Perturbation Design via Sequence Editing for Website Fingerprinting Defense. 3012-3026 - Johnny So, Michael Ferdman, Nick Nikiforakis

:
What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System. 3027-3041 - Jan Drescher, Sepehr Mirzaei

, Soheil Khodayari
, David Klein
, Thomas Barber
, Martin Johns
, Giancarlo Pellegrino
:
In the DOM We Trust: Exploring the Hidden Dangers of Reading from the DOM on the Web. 3042-3056 - Jannis Rautenstrauch

, Trung Tin Nguyen
, Karthik Ramakrishnan
, Ben Stock
:
Head(er)s Up! Detecting Security Header Inconsistencies in Browsers. 3057-3070
Session F2: Machine Learning and Security #6
- Zongjie Li

, Daoyuan Wu
, Shuai Wang
, Zhendong Su
:
Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMs. 3071-3085 - Binyan Xu, Xilin Dai

, Di Tang, Kehuan Zhang:
One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP. 3087-3101 - Wenshu Fan

, Minxing Zhang
, Hongwei Li, Wenbo Jiang
, Hanxiao Chen, Xiangyu Yue
, Michael Backes, Xiao Zhang
:
DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR Strategy. 3102-3116 - Jiamin Chang, Haoyang Li

, Hammond Pearce, Ruoxi Sun
, Bo Li, Minhui Xue:
What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift. 3117-3131 - Kaleel Mahmood, Caleb Manicke, Ethan Rathbun

, Aayushi Verma
, Sohaib Ahmad
, Nicholas Stamatakis
, Laurent Michel
, Benjamin Fuller
:
Busting the Paper Ballot: Voting Meets Adversarial Machine Learning. 3132-3146 - Yanxin Yang

, Ming Hu
, Xiaofei Xie, Yue Cao
, Pengyu Zhang
, Yihao Huang
, Mingsong Chen:
FilterFL: Knowledge Filtering-based Data-Free Backdoor Defense for Federated Learning. 3147-3161
Session F3: Security Usability and Measurement #5
- Harshini Sri Ramulu

, Helen Schmitt, Bogdan Rerich, Rachel Gonzalez Rodriguez, Tadayoshi Kohno
, Yasemin Acar:
Ethics in Computer Security Research: A Data-Driven Assessment of the Past, the Present, and the Possible Future. 3162-3176 - Lu Xian

, Van Hong Tran, Lauren Lee, Meera Kumar, Yichen Zhang, Florian Schaub
:
Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. Banks. 3177-3191 - Alexander Ponticello

, Filipo Sharevski
, Simon Anell
, Katharina Krombholz:
How Blind and Low-Vision Users Manage Their Passwords. 3192-3205 - Shakhzod Yuldoshkhujaev

, Mijin Jeon
, Doowon Kim
, Nick Nikiforakis
, Hyungjoon Koo
:
A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends. 3206-3220 - Yiting Qu

, Xinyue Shen, Yixin Wu
, Michael Backes, Savvas Zannettou
, Yang Zhang
:
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images. 3221-3235 - Georgi Ganev, Meenatchi Sundaram Muthu Selva Annamalai

, Sofiane Mahiou, Emiliano De Cristofaro:
The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic Data. 3236-3250
Session F4: Hardware, Side Channels, and Cyber Physical Systems #4
- Yang Lou, Haibo Hu, Qun Song

, Qian Xu, Yi Zhu
, Rui Tan, Wei-Bin Lee, Jianping Wang:
Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving. 3251-3265 - Alan Wang

, Pranav Gopalkrishnan, Yingchen Wang
, Christopher W. Fletcher, Hovav Shacham, David Kohlbrenner, Riccardo Paccagnella
:
Pixnapping: Bringing Pixel Stealing out of the Stone Age. 3266-3280 - Long Huang

, Kang G. Shin:
HW-Spy: Handwriting Inference by Tracing Pen-Tail Movements. 3281-3295 - Hadleigh Schwartz

, Xiaofeng Yan, Charles J. Carver
, Xia Zhou
:
Combating Falsification of Speech Videos with Live Optical Signatures. 3296-3310 - Jinwen Wang

, Hongchao Zhang
, Chuanrui Jiang, Andrew Clark, Ning Zhang:
ConTest: Taming the Cyber-physical Input Space in Fuzz Testing with Control Theory. 3311-3325 - Fabian Thomas

, Eric García Arribas
, Lorenz Hetterich
, Daniel Weber
, Lukas Gerlach
, Ruiyi Zhang
, Michael Schwarz
:
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs. 3326-3340
Session F5: Software Security #6
- Andreas D. Kellas, Neophytos Christou

, Wenxin Jiang
, Penghui Li
, Laurent Simon
, Yaniv David
, Vasileios P. Kemerlis
, James C. Davis
, Junfeng Yang
:
PickleBall: Secure Deserialization of Pickle-based Machine Learning Models. 3341-3355 - Bo Lin

, Shangwen Wang
, Yihao Qin, Liqian Chen, Xiaoguang Mao:
Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection. 3356-3370 - Mengfei Xie

, Yan Lin
, Hongtao Wu
, Jianming Fu
, Chenke Luo
, Guojun Peng
:
Beyond Tag Collision: Cluster-based Memory Management for Tag-based Sanitizers. 3371-3385 - Haohui Huang

, Yue Liu
, Yuxi Cheng, Haiyang Wei, Jiamu Liu, Yu Wang, Linzhang Wang
:
Recover Function Signature from Combined Constraints. 3386-3400 - Nanzi Yang

, Xingyu Liu, Wenbo Shen
, Jinku Li, Kangjie Lu:
Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in Kubernetes. 3401-3415 - Shiyang Zhang, Chenggang Wu, Chengxuan Hou

, Jinglin Lv, Yinqian Zhang, Qianyu Guo, Yuanming Lai, Mengyao Xie
, Yan Kang
, Zhe Wang:
Tide: An Efficient Kernel-level Isolation Execution Environment on AArch64 via Dynamically Adjusting Output Address Size. 3416-3430
Session F6: Blockchain and Distributed Systems #3
- Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden

, Luca Zanolini
:
Accountable Liveness. 3431-3445 - Shu-Jie Cao

, Dongning Guo:
How to Beat Nakamoto in the Race. 3446-3460 - Yucheng Sun

, Haifeng Yu, Ruomu Hou
:
Committee Selection with Non-Proportional Weights. 3461-3475 - Roi Bar Zur, Ittay Eyal:

Elastic Restaking Networks: United we fall, (partially) divided we stand. 3476-3489 - Shan Wang

, Ming Yang
, Yu Liu
, Yue Zhang, Shuaiqing Zhang
, Zhen Ling, Jiannong Cao
, Xinwen Fu:
Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction Fee. 3490-3504 - Mahimna Kelkar, Aadityan Ganesh

, Aditi Partap, Joseph Bonneau
, S. Matthew Weinberg
:
Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing. 3505-3519
Session F7: Machine Learning and Security #7
- Tianfang Zhang, Qiufan Ji

, Md Mojibur Rahman Redoy Akanda
, Zhengkun Ye
, Ahmed Tanvir Mahdad
, Cong Shi
, Yan Wang
, Nitesh Saxena
, Yingying Chen
:
Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication. 3520-3534 - Haitao Hu, Peng Chen

, Yanpeng Zhao, Yuqi Chen:
AgentSentinel: An End-to-End and Real-Time Security Defense Framework for Computer-Use Agents. 3535-3549 - Andrew Gan, Zahra Ghodsi:

Sentry: Authenticating Machine Learning Artifacts on the Fly. 3550-3563 - Yuqi Qing, Qilei Yin, Xinhao Deng

, Xiaoli Zhang, Peiyang Li, Zhuotao Liu
, Kun Sun
, Ke Xu, Qi Li:
Training Robust Classifiers for Classifying Encrypted Traffic under Dynamic Network Conditions. 3564-3578 - Erik Imgrund, Thorsten Eisenhofer

, Konrad Rieck
:
Adversarial Observations in Weather Forecasting. 3579-3590 - Shuo Xu, Jiming Xu

, Pengfei Xue, Xinyao Wang, Lei Ju
, Wei Zhang
:
Co-Prime: A Co-design Framework for Privacy Preserving Machine Learning on FPGA. 3591-3604
Session F8: Applied Cryptography #9
- Amey Shukla

, Luke Demarest, Benjamin Fuller
, Sohaib Ahmad
, Caleb Manicke, Alexander Russell
, Sixia Chen:
Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the Iris. 3605-3619 - Alexandra Boldyreva, Deep Inder Mohan

, Tianxin Tang
:
May the Force Not Be With You: Brute-Force Resistant Biometric Authentication and Key Reconstruction. 3620-3634 - Yunqing Sun, Hanlin Liu

, Kang Yang, Yu Yu, Xiao Wang
, Chenkai Weng
:
Committed Vector Oblivious Linear Evaluation and Its Applications. 3635-3648 - Jiping Yu

, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu
, Wenguang Chen
:
Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption. 3649-3663 - Yashvanth Kondi

, Divya Ravi:
Separating Broadcast from Cheater Identification. 3664-3677 - Yunyi Chen, Jiping Yu

, Kun Chen, Xiaoyu Fan, Xiaowei Zhu
, Wenguang Chen
:
Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph Analysis. 3679-3693
Session G2: Privacy and Anonymity #4
- Zachary Ratliff, Nicolás Berrios, James Mickens:

Timing Attacks on Differential Privacy are Practical. 3694-3707 - Jonathan Weiss

, Yossi Gilad:
SlicedPIR: Offloading Heavyweight Work with NTT. 3708-3722 - Pouneh Nikkhah Bahrami, Dylan Cutler

, Igor Bilogrevic
:
Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers. 3723-3736 - Ji Guan:

Optimal Mechanisms for Quantum Local Differential Privacy. 3737-3749
Session G3: Usability, Blockchain and Machine Learning #1
- Ivana Trummová, Juliane Schmüser

, Nicolas Huaman, Sascha Fahl
:
Competing for Attention: An Interview Study with Participants of Cryptography Competitions. 3750-3764 - Jungho Moon, Dongwoo Yoo, Xiaoqian Jiang

, Miran Kim
:
THOR: Secure Transformer Inference with Homomorphic Encryption. 3765-3779 - Nibesh Shrestha

, Qianyu Yu, Aniket Kate, Giuliano Losa, Kartik Nayak, Xuechao Wang
:
Optimistic, Signature-Free Reliable Broadcast and Its Applications. 3780-3794
Session G4: Hardware, Side Channels, and Cyber Physical Systems #5
- Yu Jin

, Minghong Sun, Dongsheng Wang, Pengfei Qiu, Yinqian Zhang, Shuwen Deng
:
GhostCache: Timer- and Counter-Free Cache Attacks Exploiting Weak Coherence on RISC-V and ARM Chips. 3795-3809 - Benedict Schlüter, Christoph Wech

, Shweta Shinde:
Heracles: Chosen Plaintext Attack on AMD SEV-SNP. 3810-3824 - Yan Zhang

, Zihao Liu
, Yi Zhu
, Chenglin Miao
:
Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous Driving. 3825-3839 - Benedict Schlüter, Shweta Shinde:

RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP. 3840-3854
Session G5: Software Security #7
- Ming Zhou

, Xupu Hu
, Zhihao Wang, Haining Wang, Hui Wen, Limin Sun, Peng Zhang
:
Dynamic Vulnerability Patching for Heterogeneous Embedded Systems Using Stack Frame Reconstruction. 3855-3869 - Minghao Lin

, Jiaxun Zhu
, Tingting Yin, Zechao Cai
, Guanxing Wen
, Yanan Guo
, Mengyuan Li
:
Chekhov's Gun: Uncovering Hidden Risks in macOS Application-Sandboxed PID-Domain Services. 3870-3884 - Pansilu Pitigalaarachchi, Xuhua Ding:

A System Framework to Symbolically Explore Intel TDX Module Execution. 3885-3899 - Dong-uk Kim, JunYoung Park

, Sanghak Oh
, Hyoungshick Kim
, Insu Yun
:
Windows plays Jenga: Uncovering Design Weaknesses in Windows File System Security. 3900-3914
Session G6: Network Security #3
- Maynard Koch, Florian Dolzmann

, Thomas C. Schmidt
, Matthias Wählisch
:
Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks. 3915-3929 - Chuanpu Fu

, Qi Li, Elisa Bertino, Ke Xu:
Training with Only 1.0 ‰ Samples: Malicious Traffic Detection via Cross-Modality Feature Fusion. 3930-3944 - Diwen Xue, Armin Huremagic

, Wayne Wang
, Ram Sundara Raman
, Roya Ensafi:
Fingerprinting Deep Packet Inspection Devices by their Ambiguities. 3945-3959 - Wenyi Morty Zhang

, Annie Dai, Keegan Ryan
, Dave Levin
, Nadia Heninger
, Aaron Schulman
:
Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites. 3960-3974
Session G7: Machine Learning and Security #8
- Stav Cohen

, Ron Bitton, Ben Nassi:
Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI Ecosystems. 3975-3989 - Fahad Alotaibi

, Euan Goodbrand, Sergio Maffeis
:
Deep Learning from Imperfectly Labeled Malware Data. 3990-4004 - Jian Lou, Chenyang Zhang

, Xiaoyu Zhang, Kai Wu
:
PreferCare: Preference Dataset Copyright Protection in LLM Alignment by Watermark Injection and Verification. 4005-4019 - Shenchen Zhu, Kai Chen, Yue Zhao

, Cheng'an Wei
:
SCOPE: Expanding Client-Side Post-Processing for Efficient Privacy-Preserving Model Inference. 4020-4034
Session G8: Applied Cryptography #10
- Xinxuan Zhang

, Ruida Wang
, Zeyu Liu
, Binwu Xiang
, Yi Deng, Ben Fisch, Xianhui Lu:
Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data. 4035-4048 - Intak Hwang

, Hyeonbum Lee
, Jinyeong Seo
, Yongsoo Song
:
Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic Encryption. 4049-4063 - Intak Hwang

, Seonhong Min
, Jinyeong Seo
, Yongsoo Song
:
Practical TFHE Ciphertext Sanitization for Oblivious Circuit Evaluation. 4064-4078 - Minglang Dong, Yu Chen, Cong Zhang

, Yujie Bai, Yang Cao:
Multi-Party Private Set Operations from Predicative Zero-Sharing. 4079-4093
Session H1: Machine Learning and Security #9
- Guiming Shi, Yuchen Wei

, Shengyu Fan, Xianglong Deng
, Liang Kong, Xianbin Li
, Jingwei Cai
, Shuwen Deng
, Mingzhe Zhang, Kaisheng Ma:
WPC: Weight Plaintext Compression for CNN Inference based on RNS-CKKS. 4094-4108 - Zhuo Chen

, Yuyang Gong, Jiawei Liu
, Miaokun Chen, Haotan Liu, Qikai Cheng, Fan Zhang
, Wei Lu, Xiaozhong Liu:
FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models. 4109-4123 - Ke Cheng

, Yuheng Xia
, Anxiao Song, Jiaxuan Fu, Wenjie Qu
, Yulong Shen, Jiaheng Zhang:
Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers. 4124-4138 - Chen Gong

, Kecen Li
, Zinan Lin, Tianhao Wang:
DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. 4139-4153 - Xiaoyong (Brian) Yuan, Xiaolong Ma, Linke Guo, Lan Zhang:

What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale. 4154-4168 - Jianan Ma

, Jingyi Wang
, Qi Xuan
, Zhen Wang
:
Provable Repair of Deep Neural Network Defects by Preimage Synthesis and Property Refinement. 4169-4183
Session H2: Privacy and Anonymity #5
- Xinyu Gao, Xiangtao Meng

, Yingkai Dong, Zheng Li
, Shanqing Guo:
DCMI: A Differential Calibration Membership Inference Attack Against Retrieval-Augmented Generation. 4184-4198 - Yujin Kang

, Eunsun Kim
, Yoon-Sik Cho
:
Can Personal Health Information Be Secured in LLM? Privacy Attack and Defense in the Medical Domain. 4199-4213 - Hanshen Xiao, Jun Wan

, Elaine Shi, Srinivas Devadas
:
One-Sided Bounded Noise: Theory, Optimization Algorithms and Applications. 4214-4228 - Paschalis Bekos

, Panagiotis Papadopoulos, Nicolas Kourtellis
, Michalis Polychronakis:
PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel. 4229-4243 - David Inyangson, Sarah Radway

, Tushar M. Jois
, Nelly Fazio
, James Mickens:
Amigo: Secure Group Mesh Messaging in Realistic Protest Settings. 4244-4258 - Somiya Chhillar, Mary K. Righi

, Rebecca E. Sutter, Evgenios M. Kornaropoulos
:
Exposing Privacy Risks in Anonymizing Clinical Data: Combinatorial Refinement Attacks on k-Anonymity Without Auxiliary Information. 4259-4273
Session H3: Security Usability and Measurement #6
- Janice Jianing Si, Xin Lin

, Haorui Cui
, Xiaobo Zhou, Kanye Ye Wang
:
Digital Safety for Children with Intellectual Disabilities When Using Mobile Devices from Parents' and Teachers' Perspectives. 4274-4288 - Vamsi Shankar Simhadri

, Yichang Xiong
, Habiba Farrukh, Xiaokuan Zhang
:
Virtual Reality, Real Problems: A Longitudinal Security Analysis of VR Firmware. 4289-4303 - Julia Nonnenkamp, Naman Gupta

, Abhimanyu Dev Gupta, Rahul Chatterjee:
Hidden in Plain Bytes: Investigating Interpersonal Account Compromise with Data Exports. 4304-4318 - Zhenduo Hou

, Tingwei Fan, Fei Duan, Ding Wang:
How to Design Secure Honey Vault Schemes. 4319-4333 - Jan Tolsdorf

, David Langer
, Luigi Lo Iacono
:
Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital. 4334-4348 - Yaman Yu

, Yiren Liu
, Yuqi Zhang
, Yun Huang, Yang Wang:
YouthSafe: A Youth-Centric Safety Benchmark and Safeguard Model for Large Language Models. 4349-4363
Session H4: Machine Learning and Security #10
- Matan Ben-Tov

, Mahmood Sharif
:
GASLITEing the Retrieval: Exploring Vulnerabilities in Dense Embedding-based Search. 4364-4378 - Yiteng Peng

, Dongwei Xiao
, Zhibo Liu
, Zhenlan Ji
, Daoyuan Wu
, Shuai Wang
, Juergen Rahmel
:
The Phantom Menace in Crypto-Based PET-Hardened Deep Learning Models: Invisible Configuration-Induced Attacks. 4379-4393 - Milad Nasr, Yanick Fratantonio

, Luca Invernizzi
, Ange Albertini
, Loua Farah
, Alex Petit-Bianco, Andreas Terzis
, Kurt Thomas
, Elie Bursztein, Nicholas Carlini:
Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks. 4394-4408 - Harsh Chaudhari

, Jamie Hayes, Matthew Jagielski, Ilia Shumailov, Milad Nasr, Alina Oprea
:
Cascading Adversarial Bias from Injection to Distillation in Language Models. 4409-4422 - Bochuan Cao, Changjiang Li, Yuanpu Cao, Yameng Ge, Ting Wang, Jinghui Chen

:
You Can't Steal Nothing: Mitigating Prompt Leakages in LLMs via System Vectors. 4423-4437 - Francesco Ranzato, Ahmad Shakeel, Marco Zanella:

Exact Robustness Certification of k-Nearest Neighbors. 4439-4453
Session H5: Software Security #8
- Sangho Lee, Jules Drean

, Yue Tan
, Marcus Peinado
:
IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data Processing. 4454-4468 - Satoru Takekoshi

, Manami Mori
, Takaaki Fukai, Takahiro Shinagawa
:
BadAML: Exploiting Legacy Firmware Interfaces to Compromise Confidential Virtual Machines. 4469-4483 - Moritz Bley

, Tobias Scharnowski
, Simon Wörner, Moritz Schloegel
, Thorsten Holz:
Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks. 4484-4498 - Brian Johannesmeyer

, Raphael Isemann
, Cristiano Giuffrida, Herbert Bos
:
Dynamic Detection of Vulnerable DMA Race Conditions. 4499-4513 - Daniel Hugenroth

, Mario Lins
, René Mayrhofer, Alastair R. Beresford:
Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments. 4514-4528 - Vidal Attias

, Nicolas Bellec
, Grégoire Menguy
, Sébastien Bardin
, Jean-Yves Marion
:
Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box Deobfuscation. 4529-4543
Session H6: Network Security #4
- Andong Chen

, Yangyang Wang, Jia Zhang
, Mingwei Xu
:
Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI. 4544-4558 - Dashuai Wu

, Yunyi Zhang
, Baojun Liu, Xiang Li
, Eihal Alowaisheq
, Haixin Duan
:
Exploring and Analyzing Cross Layer DoS Attack Against UDP-based Services on Linux. 4559-4573 - Xuewei Feng, Zhaoxi Li

, Qi Li, Ziqiang Wang
, Kun Sun
, Ke Xu:
Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios. 4574-4587 - Junjie Hu

, Feng Guo, Qihang Zhou
, Yixin Zhang
, Zibo Gao, Yinglong Han, Zhiqiang Lv
:
SISTAR: An Efficient DDoS Detection and Mitigation Framework Utilizing Programmable Data Planes. 4589-4603 - Xin He, Enhuan Dong

, Jiyuan Han
, Zhiliang Wang, Hui Zhang, Liang Liu
, Lianyi Sun, Supei Zhang, Pengfei Xue
, Guanglei Song, Han Li, Xiaowen Quan, Jiahai Yang:
ScannerGrouper: A Generalizable and Effective Scanning Organization Identification System Toward the Open World. 4604-4618 - Fabian Bäumer

, Marcus Brinkmann
, Maximilian Radoy
, Jörg Schwenk
, Juraj Somorovsky
:
On the Security of SSH Client Signatures. 4619-4633
Session H8: Applied Cryptography #11
- Lucien K. L. Ng

, Vladimir Kolesnikov
:
Toss: Garbled PIR from Table-Only Stacking. 4634-4648 - Olive Franzese, Congyu Fang

, Radhika Garg, Xiao Wang
, Somesh Jha, Nicolas Papernot, Adam Dziedzic
:
Secure Noise Sampling for Differentially Private Collaborative Learning. 4649-4663 - James Hsin-yu Chiang

, Ivan Damgård
, William R. Duro, Sunniva Engan, Sebastian Kolby
, Peter Scholl:
Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. 4664-4678 - Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov

, Vassilis Zikas
:
Distance-Aware OT with Application to Fuzzy PSI. 4679-4691 - Gilad Asharov

, Eliran Eiluz
, Ilan Komargodski, Wei-Kai Lin
:
MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM. 4692-4706 - Yiting Liu

, Biming Zhou, Haodong Jiang:
CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism. 4707-4721
Poster & Demo Session
- Tobias Kirsch

, Haya Schulmann, Niklas Vogel
:
Demo: Stopping Production Testing: A Graphical RPKI Test-Suite. 4722-4723 - Aleksandr Pilgun

:
Demo: Reverse Engineering Android Apps with Code Coverage. 4725-4727 - Haoying Zhang, Abhishek K. Mishra

, Héber Hwang Arcolezi
:
Demo: Exploring Utility and Attackability Trade-offs in Local Differential Privacy. 4728-4730 - Renrui Tian, Yahui Li

, Han Zhang, Xinzhe Liu, Xia Yin, Xingang Shi
, Zhiliang Wang, Jilong Wang:
Poster: ERIS: Evaluating ROV via ICMPv6 Rate Limiting Side Channels. 4731-4733 - Nayeon Ryu

, Heeyeong Suh
, Seyoung Lee
:
Poster: Longitudinal Analysis of Romance Scam Infrastructure Evolution: Evidence of Strategic Legitimization. 4734-4736 - Zijing Ma

, Leming Shen, Xinyu Huang
, Yuanqing Zheng
:
Poster: LLMalware: An LLM-Powered Robust and Efficient Android Malware Detection Framework. 4737-4739 - Hao Zhou

, Hua Dai
, Siqi Cai, Geng Yang
, Yang Xiang
:
Poster: Adaptive Gradient Clipping with Personalized Differential Privacy for Heterogeneous Federated Learning. 4740-4742 - Tetsu Ishizue, Sara Rampazzi, Takeshi Sugawara

:
Poster: Recapture Detection Using Disparity Map Obtained from Dual-Pixel Image Sensors. 4743-4745 - Chengbin Sun, Hailong Sun, Guancheng Li, Jiashuo Liang

:
Poster: Black-box Attacks on Multimodal Large Language Models through Adversarial ICC Profiles. 4746-4748 - Gustavo Sánchez

, Adam Lundqvist
:
Poster: Towards Intelligent Assurance for Autonomous AI Pentesters: Concurrent Compliance Auditing and Self-Augmentation via Execution Trace Analysis. 4749-4751 - Jens-Rene Giesen

, Christian Scholz
, Lucas Davi
:
Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart Contracts. 4752-4754 - Haya Schulmann, Niklas Vogel

:
Poster: We must talk about RPKI Repositories. 4755-4757 - Sangjun Chae

, Jangseop Choi
, Taeyang Kim, Eun Jung
, Sanghak Oh
, Hyoungshick Kim
:
Poster: Insecure Coding Habits Die Hard. Can PEFT Really Turn LLMs into Secure Coders? 4758-4760 - Andrew Lu, Mashrafi Kajol

, Wei Lu
, Dean Sullivan:
Poster: PainNOVA: Privacy-Aware Voice-Based Pain-Level Detection. 4761-4763 - Yi-Fan Tseng

, Jheng-Jia Huang, Guan-Yu Chen, Ting-Hsiang Su:
Poster: Public Key Encryption with Exclusionary Subset Keyword Search from Lattices. 4764-4766 - Katharina Miesch, Haya Schulmann, Niklas Vogel

:
Poster: The Rocky Road Towards RPKI Algorithm Agility. 4767-4769 - Xue Leng

, Hai Zhang, Tiantian Zhu
, Jianguo Sun
:
Poster: Leveraging Large Language Models to Effectively and Efficiently Identify Vulnerability Patches for WordPress Plugins. 4770-4772 - Donika Mirdita

, Haya Schulmann, Michael Waidner
:
Poster: Exploring the Landscape of RPKI Relying Parties. 4773-4775 - Guo-Wei Wong

, Yi-Ting Huang
, Ying-Ren Guo
, Ming-Chuan Yang, Shou-De Lin, Wang-Chien Lee
, Meng Chang Chen
:
Poster: When Logs Misbehave: Retrieving Known APTs from Noisy Graphs. 4776-4778 - Harshini Sri Ramulu

, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke
, Sascha Fahl
, Tadayoshi Kohno
, Juraj Somorovsky
, Yasemin Acar:
Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures. 4779-4781 - Eunbee Hwang

, Hyunsoo Kim
, Ted Taekyoung Kwon:
Poster: Reconsidering DNS-Based Domain Verification: Privacy and Overhead Implications. 4782-4784 - Shubham Malaviya

, Anuj Bagad, Manish Shukla
, Sachin Lodha:
Poster: Impulse in the Clickstream: Behavioral Insights from Browsing History. 4785-4787 - Xue Leng

, Kaiwen Shen
, Chengxuan Zhu, Xing Li
, Jianguo Sun
:
Poster: An Obfuscation Framework for Mitigating Topology Probing Attacks in Cloud-Native Systems. 4788-4790 - Junwei Zhou

, Yuyang Gao, Cheng Tan, Yanchao Yang, Jianwen Xiang
:
Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering. 4791-4793 - Animesh Thakur

, Mikael Asplund
:
Poster: PQ Noise Explorer. 4794-4796 - Xue Leng

, Fengming Zhu, Xing Li
, Ye Tian, Jianguo Sun
, Yan Chen
:
Poster: Obfuscating Function Activity States to Enhance Privacy in Serverless Applications. 4797-4799 - Muqaddas Naz, Muhammad Taimoor Khan

, Muhammad Waqas
:
Poster: Model-driven Privacy Analysis of Messaging Platforms. 4800-4802 - Kai Wei, Guangjing Wang

:
Poster: Agentic Shell Honeypot Using Structured Logging. 4803-4805 - Rentaro Shiba

, Tetsu Iwata:
Poster: An Improved Quantum Attack on the Two-round Even-Mansour Cipher with Independent Permutations and Keys. 4806-4808 - Kostas Kryptos Chalkias

:
Poster: Post-Quantum Readiness in EdDSA Chains. 4809-4811 - Keita Ishizuka

:
Poster: Reducing Hull Dimensions for Efficient Permutation Recovery in Code-Based Cryptography. 4812-4814 - Kai-Xian Wong, Chan-Jien Tan

, Yi-Ting Huang
, Ying-Ren Guo
, Yu-Zih Jheng, Guo-Wei Wong
, Meng Chang Chen
:
Poster: LogCraft: Crafting CVE-Aware Synthetic Worlds (Logs). 4815-4817 - Min-Chieh Wu, Jui-An Chang, Yu-Sung Wu:

Poster: High-Fidelity and Contextual User Activity Memory Forensics. 4818-4820 - Junwei Zhou

, Ying Zhu, Linhao Wang, Jianwen Xiang
, Cheng Tan, Yanchao Yang:
Poster: LogCADA: Cross-System Log Anomaly Detection based on Two-Stage Multi-Source Domain Adaptation. 4821-4823 - Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest:

Poster: Efficient Threshold ML-DSA up to 6 Parties. 4824-4826 - Yena Cho

, Hyoungshick Kim
:
Poster: Scalable Privacy-Preserving Linear Regression Training via Homomorphic Encryption. 4827-4829 - Tashi Stirewalt, Assefaw Hadish Gebremedhin

:
Poster: Adversarial Habituation Attack: A Psychological Extension and Re-framing of Boiling Frog Attack. 4830-4832 - Lin Li

, Youyang Qu, Jiayang Ao
, Ming Ding, Chao Chen
, Jun Zhang
:
Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks. 4833-4835 - Lucy Steele

, Fahad Alotaibi
, Sergio Maffeis
:
Poster: Randomness Unmasked: Towards Reproducible and Fair Evaluation of Shift-Aware Deep Learning NIDS. 4836-4838 - Gyujeong Jin, Seyoung Lee

:
Poster: Inferring On-Screen Keyboard Input via Gamepad-based Mouse Movement Traces. 4839-4841 - Yicun Tian

, Youyang Qu, Ming Ding, Shigang Liu
, Pei-Wei Tsai
, Jun Zhang
:
Poster: Decoding Social Engineering: A Multi-Level Framework for Tactic Generation, Annotation, and Evaluation. 4842-4844
Doctoral Symposium
- Rupshali Roy:

Addressing Vulnerabilities and Opacities in Quantum Service Providers. 4845-4847 - Monika Santra

:
AI-Augmented Static Analysis: Bridging Heuristics and Completeness for Practical Reverse Engineering. 4848-4850 - Hongyi Lu

:
Hardware-assisted Memory Isolation. 4851-4853 - Leonardo Erlacher

:
S2S-SED: A Speech-to-Speech Approach for Detection of Social Engineering Attacks in Audio Conversations. 4854-4856 - Gabriel K. Gegenhuber

:
Security and Privacy Measurements in Cellular Networks: Novel Approaches in a Global Roaming Context. 4857-4859 - Jennifer Vander Loop

:
Postmortem Voice Cloning: Individuals Perspectives of Ownership and Deceptive Harms. 4860-4862 - Raphael Antonius Frick:

Towards Explainable and Robust Deepfake Detection and Attribution: Enhancing Multimedia Forensics for the Next Generation of Synthetic Media. 4863-4865 - Gefei Tan:

Scalable Cryptography for Trustworthy Machine Learning in the LLM Era. 4866-4868 - Jie Xu:

Turning Uncertainty into Efficiency: Toward Practical, Quantum-Resistant Verifiable Privacy Tools. 4869-4871 - Daniel Olszewski:

On Defining Reproducible Outcomes for the Computer Security Community. 4872-4874 - Qishuang Fu:

Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency. 4875-4877 - Suparna Kundu

:
Towards Solving Real-world Problems of Post-quantum Cryptography. 4878-4880 - Lukas Gehrke:

Dissertation Research Description: The Potential of SBOMs to Increase Software Supply Chain Security. 4881-4883 - Tanusree Ghosh

:
Exploring the Janus Face of Synthetic Images: From Privacy-secure Biometrics Applications to Deepfake Detection for Misinformation-Free Social Networks. 4884-4886
Young Scholars Development Program
- F. Betül Durak

, Fengjun Li, Sophie Stephenson
:
ACM CCS Young Scholars Development Program. 4887-4888
Workshop Summaries
- Maura Pintor

, Matthew Jagielski, Ruoxi Jia:
AISec '25: 18th ACM Workshop on Artificial Intelligence and Security. 4889-4891 - Kassem Fawaz, Daisuke Mashima:

CPSIoTSec'25: The 7th Joint Workshop on CPS & IoT Security and Privacy. 4892-4893 - Gregory Blanc, Takeshi Takahashi, Zonghua Zhang

:
ARTMAN '25: Third Workshop on Recent Advances in Resilient and Trustworthy MAchine learning-driveN systems. 4894-4895 - Massimo Cafaro

, Eric Chan-Tin, Jerry Chou
, Jinoh Kim
:
WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC. 4896-4897 - Aditya Sirish A Yelgundhalli, Behnaz Hassanshahi, Dennis Roellke, Drew Davidson

, Kathleen Moriarty, Lorenzo De Carli
, Marcela S. Melara, Santiago Torres-Arias, Sarah Evans, Yuchen Zhang
:
SCORED '25: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 4898-4899 - Tianshi Li

, Toby Jia-Jun Li
, Yaxing Yao, Sauvik Das:
HAIPS '25: First ACM CCS Workshop on Human-Centered AI Privacy and Security. 4900-4901 - Jianying Zhou:

WPES '25: 24th Workshop on Privacy in the Electronic Society. 4902-4903 - Zion Leonahenahe Basque, Ati Priya Bajaj:

SURE '25: The 1st ACM Workshop on Software Understanding and Reverse Engineering. 4904-4905 - Sébastien Bardin

, Michele Ianni, Hyungon Moon:
CheckMATE '25: Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks. 4906-4907 - Paolo Palmieri

, Shivam Bhasin:
CCSW '25: Cloud Computing Security Workshop. 4908-4909 - Muhammad Taqi Raza, Jakub Szefer

:
QSec '25: Workshop on Quantum Security and Privacy. 4910-4911 - Ashish Kundu

, Attila A. Yavuz
, Cristina Nita-Rotaru:
QRSec 2025: ACM CCS First Workshop on Quantum-Resistant Cryptography and Security. 4912-4913 - Kwok-Yan Lam

, Xiaoning Liu
, Derui Wang
, Bo Li, Wenyuan Xu, Jieshan Chen, Minhui Xue
, Xingliang Yuan
, Guangdong Bai, Shuo Wang:
LAMPS '25: ACM CCS Workshop on Large AI Systems and Models with Privacy and Security Analysis. 4914-4915 - Hao Chung

, Yajin Zhou, Liyi Zhou
:
DeFi '25: 5th ACM Workshop on Decentralized Finance and Security. 4916-4917 - Abhishek Bichhawat, Jana Hofmann

:
The 20th Workshop on Programming Languages and Analysis for Security (PLAS 2025). 4918-4919 - Ruimin Sun

, Mu Zhang
:
RICSS'25: 3rd International Workshop on Re-design Industrial Control Systems with Security. 4920-4921 - Simon S. Woo

, Shahroz Tariq
, Sharif Abuadbba
, Kristen Moore
, Tim Walita
, Bimal Viswanath, Mario Fritz:
3D-Sec '25: The 1st ACM Workshop on Deepfake, Deception, and Disinformation Security. 4922-4923 - Luyi Xing, Yue Xiao

:
SaTS '25: The 3rd ACM Workshop on Security and Privacy of AI-Empowered Mobile Super Apps. 4924-4925 - Flávio Bergamaschi, Yuriy Polyakov

, Kurt Rohloff:
WAHC 2025: 13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. 4926-4927 - Jyh-Cheng Chen, K. K. Ramakrishnan

:
free5GC '25: The 1st free5GC World Forum. 4928-4929 - Hans-Joachim Hof

, Mario Fritz, Christoph Krauß
:
CSCS '25 - Cyber Security in CarS Workshop. 4930-4931

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














