| 2025 | A Cloudy View on Trust Relationships of CVMs: How Confidential Virtual Machines are Falling Short in Public Cloud. Jana Eisoldt, Anna Galanou, Andrey Ruzhanskiy, Nils Küchenmeister, Yewgenij Baburkin, Tianxiang Dai, Ivan Gudymenko, Stefan Köpsell, Rüdiger Kapitza |
| 2025 | A Period-Adaptive Traffic Fingerprint-Based Method for Smart Home Device Identification. Yingjie Hu, Weiping Wang, Shigeng Zhang, Hong Song, Shilei Kuang |
| 2025 | AGNOMIN - Architecture Agnostic Multi-Label Function Name Prediction. Yonatan Gizachew Achamyeleh, Tongtao Zhang, Joshua Hyunki Kim, Gabriel Garcia, Shih-Yuan Yu, Anton Kocheturov, Mohammad Abdullah Al Faruque |
| 2025 | APILOT: Improving the Security and Usability of LLM Code Suggestions via Outdated API Mitigation. Weiheng Bai, Keyang Xuan, Pengxiang Huang, Qiushi Wu, Jianing Wen, Jingjing Wu, Kangjie Lu |
| 2025 | AdvOSD: Adversarial One-Step Diffusion for Generalizable and Efficient Fake Image Detection. Liqun Shan, Kaiying Han, Yazhou Tu, Xiali Hei |
| 2025 | Analysis of Encryption Key Zeroization from System-Wide Perspective. Toyofumi Sawa, Kuniyasu Suzaki |
| 2025 | AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation. Mst. Eshita Khatun, Lamine Noureddine, Zhiyong Sui, Aisha I. Ali-Gombe |
| 2025 | Belt and Braces! Fight against Key Compromising in Single Sign-On Systems. Yuan Zhang, Yali Wang, Guowen Xu, Yaqing Song, Hongwei Li |
| 2025 | Beyond Driver Isolation - Triaging Threats against Driver Isolation. Yongzhe Huang, Kaiming Huang, Matthew Ennis, Vikram Narayanan, Anton Burtsev, Trent Jaeger, Gang Tan |
| 2025 | Big Broker is Tracking You! A Privacy Assessment of Large-Scale Location Trace Datasets. Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Vincent Naessens |
| 2025 | CAUA: A Realistic and Effective Attack on Machine Unlearning Under Limited Information. Jing Zhang, Yichen Zhang, Jie Cui, Xianfeng Xie, Chunyang Fan, Bei Li |
| 2025 | CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set. Wouter Hellemans, Jannis Hamborg, Timm Lauser, Md Masoom Rabbani, Bart Preneel, Christoph Krauß, Nele Mentens |
| 2025 | Clouseau: A Hierarchical Multi-Agent Approach for Autonomous Attack Investigation. Abdullah Aldaihan, Fahad Alotaibi, Sergio Maffeis |
| 2025 | Compact and Selective Disclosure for Verifiable Credentials. Alessandro Buldini, Carlo Mazzocca, Rebecca Montanari, A. Selcuk Uluagac |
| 2025 | Contextual Adversarial Triggers with Masked Language Models. JiaQi Wu, Chen Chen, Chunyan Hou, Hanwen Xing, Xiaojie Yuan |
| 2025 | Controllable Spoofing Attacks on Visual SLAM in Robotic Vehicles. Yuan Xu, Gelei Deng, Guanlin Li, Xingshuo Han, Shangwei Guo, Tianwei Zhang |
| 2025 | DP-Mix: Differentially Private Routing in Mix Networks. Mahdi Rahimi |
| 2025 | DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement. Daniel Moghimi, Alexandru-Cosmin Mihai, Borbala Benko, Catherine Vlasov, Elie Bursztein, Kurt Thomas, Laszlo Siroki, Pedro Barbosa, Remi Audebert |
| 2025 | Decentralized Privacy-Preserving Authenticated Key Exchange Using Real-World Attributes. Ling Chen, Xiao Lan, Hao Ren, Hui Guo, Long Chen, Kunpeng Bai |
| 2025 | DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis. Firas Ben Hmida, Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete |
| 2025 | ELK: Effective Lock-and-Key Technique for Temporal Memory Safety on Embedded Devices in ARMv8-M. Jeonghwan Kang, Kyounghwan Kim, Donghyun Kwon |
| 2025 | EM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded Systems. Carson Stillman, Jennifer Sheldon, Ian Y. Garrett, Patrick Traynor, Ryan M. Gerdes, Sara Rampazzi, Kevin R. B. Butler |
| 2025 | Enabling Plausible Deniability in Flash-based Storage through Data Permutation. Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi, Kevin R. B. Butler |
| 2025 | End-to-End Encrypted Applications with Strong Consistency Under Byzantine Actors. Natalie Popescu, Shai Caspin, Leon Schuermann, Jingyuan Chen, Amit Levy |
| 2025 | Enhancing Noisy Functional Encryption for Privacy-Preserving Machine Learning. Linda Scheu-Hachtel, Jasmin Zalonis |
| 2025 | Environmental Rate Manipulation Attacks on Power Grid Security. Yonatan Gizachew Achamyeleh, Yang Xiang, Yun-Ping Hsiao, Yasamin Moghaddas, Mohammad Abdullah Al Faruque |
| 2025 | FLAME: Flexible and Lightweight Biometric Authentication Scheme in Malicious Environments. Fuyi Wang, Fangyuan Sun, Mingyuan Fan, Jianying Zhou, Jin Ma, Chao Chen, Jiangang Shu, Leo Yu Zhang |
| 2025 | False Promises of Passwordless: Defeating Windows Hello through TPM Misuses. Jeongho Lee, Minkyeong Kang, Seunghwan Lee, Hyoung-Kee Choi |
| 2025 | Fix it - If you Can! Towards Understanding the Impact of Tool Support and Domain Owners' Reactions to SSHFP Misconfigurations. Anne Hennig, Sebastian Neef, Peter Mayer |
| 2025 | Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras. Roberto Riaño, Gorka Abad, Stjepan Picek, Aitor Urbieta |
| 2025 | Fooling Machine's Eyes: Unicode Modifier Letter Evasion Attack. Chao Gao, Guanglu Sun, Xin Liu, Feiyan Liu |
| 2025 | Fuzzing Acceleration for Memory Safety Bug Discovery with Slicer. Giyeol Kim, Dohyun Ryu, Seungjin Bae, Changyul Lee, Taegyu Kim |
| 2025 | GET /large. file HTTP /1.1: Connection-Based TCP Amplification Attacks. Yepeng Pan, Lars Richter, Christian Rossow |
| 2025 | Gravity of the Situation: Security Analysis on Rocket.Chat E2EE. Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Takanori Isobe |
| 2025 | IEEE Annual Computer Security Applications Conference, ACSAC 2025, Honolulu, HI, USA, December 8-12, 2025 |
| 2025 | In Pursuit of Lean OS Kernels: Improving Configuration-Based Debloating. Akshith Gunasekaran, Gabriel Ritter, Rakesh B. Bobba |
| 2025 | InteractionShield: Harnessing Event Relations for Interaction Threat Detection and Resolution in Smart Homes. Zhaohui Wang, Bo Luo, Fengjun Li |
| 2025 | Into the Unknown: Fuzzing CPU Non-standard Instructions with MystFuzz. Zihui Guo, Wenhao Cui, Liwei Chen, Miaomiao Yuan, Gang Shi, Dan Meng |
| 2025 | Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors. Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, Mohammad Abdullah Al Faruque |
| 2025 | It's a Non-Stop PARTEE! Practical Multi-Enclave Availability Through Partitioning and Asynchrony. Richard Habeeb, Hao Chen, Man-Ki Yoon, Zhong Shao |
| 2025 | Leaking Queries On Secure Stream Processing Systems. Hung Pham, Viet Vo, Tien Tuan Anh Dinh, Duc Tran, Shuhao Zhang |
| 2025 | Learned, Lagged, LLM-Splained: LLM Responses to End User Security Questions. Vijay Prakash, Kevin Lee, Arkaprabha Bhattacharya, Danny Yuxing Huang, Jessica Staddon |
| 2025 | MOEVIL: Poisoning Experts to Compromise the Safety of Mixture-of-Experts LLMs. Jaehan Kim, Seung Ho Na, Minkyoo Song, Seungwon Shin, Sooel Son |
| 2025 | MimicCall: Bypassing System Call Filters via Kernel Function Redundancy. Songah Joo, Minchan Park, Hyerean Jang, Youngjoo Shin |
| 2025 | Mizar: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration. Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jinsong Dong |
| 2025 | No Fish Is Too Big for Flash Boys! Frontrunning on DAG-Based Blockchains. Jianting Zhang, Aniket Kate |
| 2025 | Non-Bare-Metal User-Space Control-Flow Attestation. Nikita Yadav, Hrushikesh Salunke, Dev Tejas Gandhi, Vinod Ganapathy |
| 2025 | ORT: Unintended Text Recognition from Eyeglass Reflections in Video Conferencing Environments. Jieun Kim, Youngjoo Park, Rokyung Kwon, Jimin Han, Hoorin Park |
| 2025 | OTABase: Enhancing Over-the-Air Testing to Detect Memory Crashes in Cellular Basebands. CheolJun Park, Marc Egli, Beomseok Oh, Tuan Dinh Hoang, Suhwan Jeong, Martin Crettol, Insu Yun, Mathias Payer, Yongdae Kim |
| 2025 | Octopus: Fast Homomorphic Convolution for Secure Neural Network Inference. Yu Tong, Yu Fu, Tianshi Xu, Cheng Hong, Meng Li, Wei Wang, Dengguo Feng, Jingqiang Lin |
| 2025 | One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises. Biagio Montaruli, Luca Compagna, Serena Elisa Ponta, Davide Balzarotti |
| 2025 | PIM-ORAM: Towards Oblivious RAM Primitives in Commodity Processing-In-Memory. Byeongsu Woo, Kha Dinh Duy, Youngkwang Han, Brent ByungHoon Kang, Hojoon Lee |
| 2025 | PP3D: An In-Browser Vision-Based Defense Against Web Behavior Manipulation Attacks. Spencer King, Irfan Ozen, Karthika Subramani, Saranyan Senthivel, Phani Vadrevu, Roberto Perdisci |
| 2025 | PSan: Towards Hybrid Metadata Scheme for Efficient Pointer Checking. Shengjie Xu, Eric Liu, Wei Huang, Ilya Grishchenko, David Lie |
| 2025 | Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency. Xiaoqin Liang, Guannan Liu, Lin Jin, Shuai Hao, Haining Wang |
| 2025 | ProxyPrints: From Database Breach to Spoof, A Plug-and-Play Defense for Biometric Systems. Yaniv Hacmon, Keren Gorelik, Gilad Gressel, Yisroel Mirsky |
| 2025 | R+R: Anonymous Authentication and Key Agreement, Revisited. Yanqi Zhao, Xiangyu Liu, Min Xie, Xiaoyi Yang, Jianting Ning, Baodong Qin, Haibin Zhang, Yong Yu |
| 2025 | R+R: From Claims to Crashes: A Systematic Re-evaluation of Graph-Based Network Intrusion Detection Systems. Chenglong Wang, Pujia Zheng, Jiaping Gui, Cunqing Hua, Wajih Ul Hassan |
| 2025 | R+R: IoT Device Identification Under Realistic Conditions. Chakshu Gupta, Andreas Peter, Andrea Continella |
| 2025 | R+R: Revisiting Static Feature-Based Android Malware Detection Using Machine Learning. Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi |
| 2025 | REx86: A Local Large Language Model for Assisting in x86 Assembly Reverse Engineering. Darrin Lea, James M. Ghawaly, Golden G. Richard III, Aisha I. Ali-Gombe, Andrew Case |
| 2025 | Recovering Peripheral Maps and Protocols to Expedite Firmware Reverse Engineering. Bayan Turkistani, Carter Yagemann |
| 2025 | Rescuing the Unpoisoned: Efficient Defense Against Knowledge Corruption Attacks on RAG Systems. Minseok Kim, Hankook Lee, Hyungjoon Koo |
| 2025 | Retain the Date: Detecting Recycled Chips in the Supply Chain Through SRAM's Data Retention Behavior. Jubayer Mahmod, Matthew Hicks |
| 2025 | Revealing the True Indicators: Understanding and Improving IoC Extraction From Threat Reports. Evangelos Froudakis, Athanasios Avgetidis, Sean Tyler Frankum, Roberto Perdisci, Manos Antonakakis, Angelos D. Keromytis |
| 2025 | Revisiting Prime+Prune+Probe: Pitfalls and Remedies. Moritz Peters, Florian Stolz, Jan Philipp Thoma, Tim Güneysu, Yuval Yarom |
| 2025 | SMORE: Practical Redzone-Based Stack Memory Error Detection Mechanism for Embedded Systems. Jaeyeol Park, Yunju Gu, Donghyun Kwon |
| 2025 | Sagitta: Facilitating Post-Fuzzing Root Cause Analysis via Data Flow Differencing. Katsunori Aoki, Takahiro Shinagawa |
| 2025 | Securing On-device Transformer with Hardware Binding and Reversible Obfuscation. Peichun Hua, Hanxiu Zhang, Tuo Li, Yue Zheng |
| 2025 | Seti:Secure Time for Virtualized Systems. Adeel Nasrullah, Muhammad Abdullah Soomro, Fatima Muhammad Anwar |
| 2025 | Siren: A Learning-Based Multi-Turn Attack Framework for Simulating Real-World Human Jailbreak Behaviors. Yi Zhao, Youzhi Zhang |
| 2025 | SnoopDog: Detecting USB Bus Sniffers Using Responsive EMR. Srinivasan Murali, YoungTak Cho, Huadi Zhu, Pan Li, Ming Li |
| 2025 | Splash: Adversarial Defense with Short Perturbation Blocks Against Adversarial Training Aided Website Fingerprinting. Runsheng Ma, Chengshang Hou, Gaopeng Gou, Junzheng Shi, Zhen Li, Gang Xiong |
| 2025 | Supply Chain Reaction: Enhancing the Precision of Vulnerability Triage using Code Reachability Information. Harshvardhan Patel, Alexander Snit, Michalis Polychronakis |
| 2025 | TeTRIS: General-purpose Fuzzing for Translation Bugs in Source-to-Source Code Transpilers. Yeaseen Arafat, Stefan Nagy |
| 2025 | TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic Simulation. Kristen Moore, Diksha Goel, Cody James Christopher, Zhen Wang, Minjune Kim, Ahmed Ibrahim, Ahmad Mohsin, Seyit Camtepe |
| 2025 | The 2FA Illusion: Uncovering Weak Links of Web Account Access in the Wild. Ke Coby Wang, Sunpreet S. Arora, Michael K. Reiter |
| 2025 | TrustLeech: Privileged System Analysis using Nested Virtualization. Matti Schulze, Paul Bergmann, Jonas Röckl, Felix C. Freiling |
| 2025 | Uncovering Bigger Truths: Deobfuscating PHP with Phoebe. Manuel Karl, Simon Koch, David Klein, Martin Johns |
| 2025 | Understanding the Security Impact of CHERI on the Operating System Kernel. Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, Anton Burtsev |
| 2025 | VMIGEN: Utilizing Virtual Machine Introspection for Fuzzing Complex Closed-Source Targets. Florian Schweins, Moritz Schloegel, Moritz Bley, Nico Schiller, Thorsten Holz |
| 2025 | VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming. Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin |
| 2025 | WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls. Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, Engin Kirda |
| 2025 | XPOZ-HUB: Privacy Infiltration in Payment Channel Hubs through Balance Probing and Transaction Discovery. Alvi Ataur Khalil, Mohammad Ashiqur Rahman |
| 2025 | Zeus-IoT: Comprehensive Code Signing to Prevent IoT Device Weaponization. Alireza Roshandel, Manuel Egele |