Accepted Papers
Click here for free access to Springer volume of the conference.
8 | Robust Property-Preserving Hash Meets Homomorphism | Keyang Liu (The University of Tokyo), Xingxin Li (The University of Tokyo), Tsuyoshi Takagi (The University of Tokyo) |
13 | Dynamic Multi-Server Updatable Encryption | Jodie Knapp (Royal Holloway, University of London), Elizabeth A. Quaglia (Royal Holloway, University of London) |
24 | Load-and-Act: Increasing Page Coverage of Web Applications | Nico Weidmann (SAP Security Research), Thomas Barber (SAP Security Research), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)) |
26 | TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments | Gilang Mentari Hamidy (KU Leuven), Sri Yulianti (Sandhiguna), Pieter Philippaerts (KU Leuven), Wouter Joosen (KU Leuven) |
28 | Loss and Likelihood Based Membership Inference of Diffusion Models | Hailong HU (University of Luxembourg), Jun Pang (University of Luxembourg) |
41 | Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size | Yukihito Hiraga (The University of Electro-Communications), Yusuke Naito (Mitsubishi Electric Corporation), Yu Sasaki (NTT Social Informatics Laboratories), Takeshi Sugawara (The University of Electro-Communications) |
46 | Traceable Quadratic Functional Encryption | Qiuwei Zheng (East China Normal University), Jun Zhao (East China Normal University) |
51 | Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals | Luke Harmon (Algemetric Inc), Gaetan Delavignette (Algemetric Inc) |
53 | Cryptographic reuse in Android applications | Fatemeh Nezhadian (The University of Saskatchewan), Enrico Branca (The University of Saskatchewan), Natalia Stakhanova (The University of Saskatchewan) |
54 | Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks | Manel Slokom (Delft University of Technology), Peter-Paul de Wolf (Statistics Netherlands, The Hague), Martha Larson (Radboud University) |
59 | Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics | Johanna Henrich (Darmstadt University of Applied Sciences/ATHENE), Andreas Heinemann (Darmstadt University of Applied Sciences/ATHENE), Alexander Wiesmaier (Darmstadt University of Applied Sciences/ATHENE), Nicolai Schmitt (Darmstadt University of Applied Sciences/ATHENE) |
69 | From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions | Valerio Bucci (University of Aberdeen), Wanpeng Li (University of Aberdeen) |
72 | Libra: Library Identification in Obfuscated Android Apps | David A. Tomassi (Quokka), Kenechukwu Nwodo (Virginia Tech), Mohamed Elsabagh (Quokka) |
73 | SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection | Songyue Chen (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China), Rong Yang (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China), Hong Zhang (National Computer network Emergency Response technical Team/Coordination Center of China, Beijing, China), Yanqin Zheng (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China), Hongwei Wu (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China), Xingyu Fu (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China), Qingyun Liu (Institute of Information Engineering, Chinese Academy of Science; School of CyberSecurity, University of Chinese Academy of China, Beijing, China) |
76 | VNGuard: Intrusion Detection System for In-Vehicle Networks | Yan Lin Aung (Singapore University of Technology and Design), Shanshan Wang (Chongqing University of Posts and Telecommunications), Wang Cheng (Singapore University of Technology and Design), Sudipta Chattopadhyay (Singapore University of Technology and Design), Jianying Zhou (Singapore University of Technology and Design), Anyu Cheng (Chongqing University of Posts and Telecommunications) |
78 | Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography | Li Duan (Paderborn University Germany), Yong Li (Huawei Technologies Duesseldorf, Germany), Lijun Liao (Huawei Technologies Duesseldorf, Germany) |
80 | Withdrawable Signature: How to Call off a Signature | Xin Liu (University of Wollongong), Joonsang Baek (University of Wollongong), Willy Susilo (University of Wollongong) |
87 | Protecting Private Keys of Dilithium using Hardware Transactional Memory | Lingjia Meng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China), Yu Fu (School of Cyber Science and Technology, University of Science and Technology of China, China), Fangyu Zheng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China), Ziqiang Ma (School of Information Engineering, Ningxia University, China), Mingyu Wang (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China), Dingfeng Ye (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China), Jingqiang Lin (School of Cyber Science and Technology, University of Science and Technology of China, China) |
88 | On the Privacy-preserving Infrastructure for Authenticated Key Exchange | Li Duan (Paderborn University Germany), Yong Li (Huawei Technologies Duesseldorf, Germany) |
90 | RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing | Wei Chen (Hong Kong University of Science and Technology), Huaijin Wang (Hong Kong University of Science and Technology), Weixi Gu (China Academy of Industrial Internet), Shuai Wang (Hong Kong University of Science and Technology) |
91 | Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings | Ming Wan (Shanghai Jiao Tong University), Geng Wang (Shanghai Jiao Tong University), Shi-Feng Sun (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University) |
92 | Symmetry Defense Against CNN Adversarial Perturbation Attacks | Blerta Lindqvist (Aalto University) |
95 | Privacy-preserving Medical Data Generation using Adversarial Learning | Pronaya Prosun (Fraunhofer Institute for Toxicology and Experimental Medicine (Fraunhofer ITEM)), Das Despina Tawadros (Fraunhofer Institute for Toxicology and Experimental Medicine (Fraunhofer ITEM)), Lena Wiese (Fraunhofer Institute for Toxicology and Experimental Medicine (Fraunhofer ITEM)) |
97 | Impossible Differential Cryptanalysis of the FBC Block Cipher | Jiqiang Lu (Beihang University), Xiao Zhang (Beihang University) |
101 | Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning | Bingchang He (Osaka University), Atsuko Miyaji (Osaka University) |
102 | Evolving Conditional Disclosure of Secrets | Naty Peter (Georgetown University) |
103 | Fregata: Faster Homomorphic Evaluation of AES via TFHE | Benqiang Wei (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Ruida Wang (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Zhihao Li (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Qinju Liu (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Xianhui Lu (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS) |
111 | Hybrid Group Key Exchange with Application to Constrained Networks | Colin Boyd (NTNU), Elsie Mestl Fondevik (Kongsberg Defence & Aerospace, NTNU), Kristian Gjøsteen (NTNU), Lise Millerjord (NTNU) |
114 | An Improved BKW Algorithm for Solving LWE with Small Secrets | Yu Wei (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Lei Bi (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Kunpeng Wang (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS), Xianhui Lu (State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS) |