| 2025 | A Cryptographic Analysis of Google's PSP and Falcon Channel Protocols. Marc Fischlin, Sascha Hoffmann, Leonhard Ruppel, Gözde Saçiak, Tobias Schnitzler, Christian Schwarz, Maximilian Stillger |
| 2025 | A Novel Asymmetric BSGS Polynomial Evaluation Algorithm under Homomorphic Encryption. Qingfeng Wang, Li-Ping Wang |
| 2025 | A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment. Salman Shamshad, Sana Belguith, Alma Oracevic |
| 2025 | AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces. Suryeon Kim, Seung Ho Na, Jaehan Kim, Seungwon Shin, Hyunwoo Choi |
| 2025 | AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks. Tannishtha Devgun, Gulshan Kumar, Rahul Saha, Alessandro Brighente, Mauro Conti |
| 2025 | Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters. Yuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka, Tatsuya Mori |
| 2025 | An Automated Blackbox Noncompliance Checker for QUIC Server Implementations. Kian Kai Ang, Guy Farrelly, Cheryl Pope, Damith C. Ranasinghe |
| 2025 | An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization. Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay |
| 2025 | An Empirical Study of C Decompilers: Performance Metrics and Error Taxonomy. Melih Sirlanci, Carter Yagemann, Zhiqiang Lin |
| 2025 | An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and Activities. Kailun Yan, Bo Lu, Pranav Agrawal, Jiasun Li, Wenrui Diao, Xiaokuan Zhang |
| 2025 | An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes. YoungBeom Kim, Seog Chung Seo |
| 2025 | App-solutely Modded: Surveying Modded App Market Operators and Original App Developers. Luis Adan Saavedra, Hridoy Sankar Dutta, Alastair R. Beresford, Alice Hutchings |
| 2025 | AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT. Lukas Petzi, Torsten Krauß, Alexandra Dmitrienko, Gene Tsudik |
| 2025 | BIP32-Compatible Threshold Wallets. Poulami Das, Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder, Julian Loss, Ziyan Qu, Siavash Riahi |
| 2025 | BISON: Blind Identification with Stateless scOped pseudoNyms. Jakob Heher, Stefan More, Lena Heimberger |
| 2025 | BRC20 Snipping Attack. Minfeng Qi, Qin Wang, Ningran Li, Shiping Chen, Tianqing Zhu |
| 2025 | Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation. Arwa Abdulkarim Al Alsadi, Mathew Vermeer, Takayuki Sasaki, Katsunari Yoshioka, Michel van Eeten, Carlos Gañán |
| 2025 | BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors. Quancheng Wang, Ming Tang, Ke Xu, Han Wang |
| 2025 | Breaking Bad: How Compilers Break Constant-Time Implementations. Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun |
| 2025 | Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication. Hangcheng Cao, Guowen Xu, Wenbin Huang, Hongwei Li |
| 2025 | Can You Run My Code? A Close Look at Process Injection in Windows Malware. Giorgia Di Pietro, Daniele Cono D'Elia, Leonardo Querzoni |
| 2025 | ChainMarks: Securing DNN Watermark with Cryptographic Chain. Brian Choi, Shu Wang, Isabelle Choi, Kun Sun |
| 2025 | ClearMask: Noise-Free and Naturalness-Preserving Protection Against Voice Deepfake Attacks. Yuanda Wang, Bocheng Chen, Hanqing Guo, Guangjing Wang, Weikang Ding, Qiben Yan |
| 2025 | Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World. Hua Ma, Alsharif Abuadbba, Yansong Gao, Hyoungshick Kim, Surya Nepal |
| 2025 | Concretely Efficient Private Set Union via Circuit-Based PSI. Gowri R. Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert |
| 2025 | CryptoGuard: Lightweight Hybrid Detection and Response to Host-based Cryptojackers in Linux Cloud Environments. Gyeonghoon Park, Jaehan Kim, Jinu Choi, Jinwoo Kim |
| 2025 | DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts. Mohsen Minaei, Pedro Moreno-Sanchez, Zhiyong Fang, Srinivasan Raghuraman, Navid Alamati, Panagiotis Chatzigiannis, Ranjit Kumaresan, Duc Viet Le |
| 2025 | DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim |
| 2025 | Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different Industries. Oskar Braun, Jan Hörnemann, Norbert Pohlmann, Tobias Urban, Matteo Große-Kampmann |
| 2025 | EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks. Tianhong Xu, Aidong Adam Ding, Yunsi Fei |
| 2025 | Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension. Mingli Wu, Tsz Hon Yuen, Siu-Ming Yiu |
| 2025 | Efficient Updatable Private Information Retrieval From Simulatable Homomorphic Ciphertexts. Yini Lin, Haibo Tian |
| 2025 | Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY. Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim |
| 2025 | Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation. Seonhong Min, Joon-Woo Lee, Yongsoo Song |
| 2025 | Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework. August See, Moritz Mönnich, Mathias Fischer |
| 2025 | Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense. Chaiwon Hwang, Haeseung Jeon, Jiwoo Hong, Hosung Kang, Nate Mathews, Goun Kim, Se Eun Oh |
| 2025 | Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub. Jafar Akhoundali, Hamidreza Hamidi, Kristian F. D. Rietveld, Olga Gadyatskaya |
| 2025 | Evaluating Disassembly Errors With Only Binaries. Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Zhuohao Liu |
| 2025 | Evaluating Robustness of Reference-based Phishing Detectors. Eunjin Roh, Sungwoo Jeon, Sooel Son, Sanghyun Hong |
| 2025 | FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack. Kemal Derya, M. Caner Tol, Berk Sunar |
| 2025 | FIRST: FrontrunnIng Resistant Smart ConTracts. Emrah Sariboz, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra |
| 2025 | FP-Rowhammer: DRAM-Based Device Fingerprinting. Hari Venugopalan, Kaustav Goswami, Zain ul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq |
| 2025 | Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF. Fei Xiao, Chunyang Lv, Jianfeng Wang |
| 2025 | Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility. Jia Liu, Mark Manulis |
| 2025 | Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability. Ayoub Ben Hassen, Pascal Lafourcade, Dhekra Mahmoud, Maxime Puys |
| 2025 | From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication. Abdullah Zubair Mohammed, Ryan M. Gerdes |
| 2025 | GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs. Daehyeon Lee, Junghee Lee |
| 2025 | Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion. Karl Rubel, Maximilian Noppel, Christian Wressnegger |
| 2025 | Glitch in Time: Exploiting Temporal Misalignment of IMU For Eavesdropping. Ahmed Najeeb, Abdul Rafay, Muhammad Hamad Alizai, Naveed Anwar Bhatti |
| 2025 | Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas. Xuelian Cao, Zheng Yang, Tao Xiang, Jianting Ning, Yuhan Liu, Zhiming Liu, Jianying Zhou |
| 2025 | Key Extension: Multi-Key FHE Utilizing LWR. Mansi Goyal, Aditi Kar Gangopadhyay |
| 2025 | Learning to Identify Conflicts in RPKI. Haya Schulmann, Shujie Zhao |
| 2025 | LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation. Dien H. A. Tran, Tam N. B. Nguyen, Nhien-An Le-Khac, Thuc D. Nguyen |
| 2025 | Minerva: A File-Based Ransomware Detector. Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini |
| 2025 | Mining Attack with Zero Knowledge in the Blockchain. Jiaping Yu, Shang Gao, Rui Song, Zhiping Cai, Bin Xiao |
| 2025 | Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code. Matteo Oldani, William Blair, Shweta Shinde, Matthias Neugschwandtner |
| 2025 | N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture. Dipesh, Urbi Chatterjee |
| 2025 | NailKey: Mutable Biometric Using Fingernails. Yihong Hang, Zhice Yang |
| 2025 | NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks. Andrea Ciccotelli, Maurantonio Caprolu, Roberto Di Pietro |
| 2025 | Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI. Meghali Nandi, Arash Shaghaghi, Nazatul Haque Sultan, Gustavo Batista, Raymond K. Zhao, Sanjay K. Jha |
| 2025 | OMAD5G: Online Malware Detection in 5G Networks using Compound Paths. Zhixin Wen, Guanhua Yan |
| 2025 | OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access. Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Qi Li |
| 2025 | Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments. Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad Rahmani Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, Wolfgang Kunz |
| 2025 | On the Account Security Risks Posed by Password Strength Meters. Ming Xu, Weili Han, Jitao Yu, Jing Liu, Xinyi Zhang, Yun Lin, Jin Song Dong |
| 2025 | Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission Enforcement. Trung Tin Nguyen, Ben Stock |
| 2025 | PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response. Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon |
| 2025 | POSTER: An Empirical Study of Smart Contract Patching Practices in the Wild. TaeYoung Kim, Gilhee Lee, Hyoungshick Kim |
| 2025 | POSTER: Automating ICS Malware Analysis with MITRE ATT&CK. Fatih Kurt, Neetesh Saxena, Vijay Kumar, George Theodorakopoulos |
| 2025 | POSTER: Disappearing Ink: How Partial Model Extraction Erases Watermarks. Venkata Sai Pranav Bachina, Ankit Gangwal |
| 2025 | POSTER: Investigating Transferability of Adversarial Examples in Model Merging. Ankit Gangwal, Aaryan Ajay Sharma |
| 2025 | POSTER: Multimodal Graph Networks for Systematic Generalization in Code Clone Detection. Cuong Dao, Van Tong, Hai Anh Tran, Duc Tran, Giang Nguyen |
| 2025 | POSTER: Policy-driven security-aware scheduling in Kubernetes. Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi |
| 2025 | POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems. Wei Jie Bryan Lee, Siyi Wang, Suman Dutta, Walid El Maouaki, Anupam Chattopadhyay |
| 2025 | POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering. Koen T. W. Teuwen, Emmanuele Zambon, Luca Allodi |
| 2025 | POSTER: Transparent Temporally-Specialized System Call Filters. Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi |
| 2025 | POSTER: When Models Speak Too Much: Privacy Leakage on Large Language Models. Mingjun Zhang, Mahrokh Abdollahi, Thilina Ranbaduge, Ming Ding |
| 2025 | PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework. YingTat Ng, Zhe Chen, Haiqing Qiu, Xuhua Ding |
| 2025 | PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X. Xuyuan Cai, Rui Song, Bin Xie, Qingjun Xiao, Bin Xiao |
| 2025 | Pace: Privacy-Preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges. Jianhuan Wang, Bin Xiao |
| 2025 | Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division. Soumyadyuti Ghosh, Harishma Boyapally, Ajith Suresh, Arpita Patra, Soumyajit Dey, Debdeep Mukhopadhyay |
| 2025 | PentestAgent: Incorporating LLM Agents to Automated Penetration Testing. Xiangmin Shen, Lingzhi Wang, Zhenyuan Li, Yan Chen, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan |
| 2025 | Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity. Dominik M. Weber, Ioannis Tzachristas, Aifen Sui |
| 2025 | Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol. Ioana Boureanu, Cristina Onete, Stephan Wesemeyer, Léo Robert, Rhys Miller, Pascal Lafourcade, Fortunat Rajaona |
| 2025 | Poster: Typosquatting Attacks on the Rust Ecosystem. Minh-Khanh Vu, Thanh-Cong Nguyen, Duc-Ly Vu |
| 2025 | Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay. Guilhem Niot |
| 2025 | Preventing Radio Fingerprinting through Low-Power Jamming. Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri |
| 2025 | Prior-Based Label Differential Privacy via Secure Two-Party Computation. Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth |
| 2025 | ProbeShooter: A New Practical Approach for Probe Aiming. Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, HeeSeok Kim, Seokhie Hong |
| 2025 | Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Vietnam, August 25-29, 2025 |
| 2025 | Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy. Jean Snyman, Chris Culnane, Ioana Boureanu, David Gérault |
| 2025 | ProwseBox: A Framework for the Analysis of the Web at Scale. Dolière Francis Somé |
| 2025 | Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran. Abdulrahman Alaraj, Eric Wustrow |
| 2025 | QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks. Thomas Grübl, Weijie Niu, Jan von der Assen, Burkhard Stiller |
| 2025 | Quantum-safe Signatureless DNSSEC. Aditya Singh Rawat, Mahabir Prasad Jhanwar |
| 2025 | REFLECTA: Reflection-based Scalable and Semantic Scripting Language Fuzzing. Chibin Zhang, Gwangmu Lee, Qiang Liu, Mathias Payer |
| 2025 | Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices. Dominik Bojko, Jacek Cichon, Miroslaw Kutylowski, Oliwer Sobolewski |
| 2025 | Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption. Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay |
| 2025 | Robust Locally Differentially Private Graph Analysis. Amrita Roy Chowdhury, Jacob Imola, Kamalika Chaudhuri |
| 2025 | Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers. Koen T. W. Teuwen, Tom Mulders, Emmanuele Zambon, Luca Allodi |
| 2025 | Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems. Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh |
| 2025 | SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models. Van Nguyen, Surya Nepal, Xingliang Yuan, Tingmin Wu, Carsten Rudolph |
| 2025 | SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. Henri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider |
| 2025 | Scalable Time-Lock Puzzle. Aydin Abadi, Dan Ristea, Artem Grigor, Steven J. Murdoch |
| 2025 | Secure Steganography Based on Chaos-Aided Quantization Index Modulation. Shanxiang Lyu, Xinquan Xu, Ling Liu, Lip Yee Por |
| 2025 | SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge. Anne Josiane Kouam, Aline Carneiro Viana, Philippe Martins, Cédric Adjih, Alain Tchana |
| 2025 | Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals. Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde |
| 2025 | Slice it up: Unmasking User Identities in Smartwatch Health Data. Lucas Lange, Tobias Schreieder, Victor Christen, Erhard Rahm |
| 2025 | SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS). Masudul Hasan Masud Bhuiyan, Berk Çakar, Ethan H. Burmane, James C. Davis, Cristian-Alexandru Staicu |
| 2025 | SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation. Yashothara Shanmugarasa, Ming Ding, Mahawaga Arachchige Pathum Chamikara, Thierry Rakotoarivelo |
| 2025 | Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems. João Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos |
| 2025 | Systematic Analysis of Kernel Security Performance and Energy Costs. Fabian Rauscher, Benedict Herzog, Timo Hönig, Daniel Gruss |
| 2025 | Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design. Zhenyuan Liu, Andrew Malnicof, Arna Roy, Patrick Schaumont |
| 2025 | The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations. Marie Weinz, Nicola Zannone, Luca Allodi, Giovanni Apruzzese |
| 2025 | Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV. Niclas Kühnapfel, Christian Werling, Hans Niklas Jacob, Jean-Pierre Seifert |
| 2025 | Toward Malicious Clients Detection in Federated Learning. Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang |
| 2025 | Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility. M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David |
| 2025 | Transferable Adversarial Examples with Bayesian Approach. Mingyuan Fan, Cen Chen, Wenmeng Zhou, Yinggui Wang |
| 2025 | TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types. Sunnyeo Park, Jihwan Kim, Seongho Keum, Hyunjoon Lee, Sooel Son |
| 2025 | Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion Models. Fei Wang, Yan Zhu, Baochun Li |
| 2025 | Unveiling Privacy Risks in Quantum Optimization Services. Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski |
| 2025 | VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More. Yue Zhou, Sid Chi-Kin Chau |
| 2025 | Virtual End-to-End Encryption: Analysis of the Doctolib Protocol. Dennis Dayanikli, Laura Holz, Anja Lehmann |
| 2025 | Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver. Wonseok Choi, Youngjoo Shin |
| 2025 | When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning. Ruining Sun, Hongsheng Hu, Wei Luo, Zhaoxi Zhang, Yanjun Zhang, Haizhuan Yuan, Leo Yu Zhang |
| 2025 | Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks. Moses Ike, Keaton Sadoski, Romuald Valme, Burak Sahin, Saman A. Zonouz, Wenke Lee |
| 2025 | poqeth: Efficient, post-quantum signature verification on Ethereum. Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi |