| 2025 | 'Is this a scam?': The Nature and Quality of Reddit Discussion about Scams. Elijah Robert Bouma-Sims, Mandy Lanyon, Lorrie Faith Cranor |
| 2025 | 'We just did not have that on the embedded system': Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions. Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Kai Kaufman, Md. Armanuzzaman, Xi Tan, Katherine Jesse, Robert J. Walls, Ziming Zhao |
| 2025 | 1BIT: Persistent Path Validation with Customized Noise Signal Characteristics. Keji Miao, Jie Yuan, Xinghai Wei, Xingwu Wang, Dongqi Han, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen |
| 2025 | 3D-Sec '25: The 1st ACM Workshop on Deepfake, Deception, and Disinformation Security. Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore, Tim Walita, Bimal Viswanath, Mario Fritz |
| 2025 | 5G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems. Hui Li, Haotian Li, Chi Ma, Jingjing Guan, Junchi Zeng, Haonan Feng, Ziming Zhao |
| 2025 | A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends. Shakhzod Yuldoshkhujaev, Mijin Jeon, Doowon Kim, Nick Nikiforakis, Hyungjoon Koo |
| 2025 | A Practical and Secure Byzantine Robust Aggregator. De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang |
| 2025 | A Qualitative Analysis of Fuzzer Usability and Challenges. Yunze Zhao, Wentao Guo, Harrison Goldstein, Daniel Votipka, Kelsey R. Fulton, Michelle L. Mazurek |
| 2025 | A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners. Anna Raymaker, Akshaya Kumar, Miuyin Yong Wong, Ryan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah |
| 2025 | A Secure Sequencer and Data Availability Committee for Rollups. Margarita Capretto, Martín Ceresa, Antonio Fernández Anta, Pedro Moreno-Sanchez, César Sánchez |
| 2025 | A System Framework to Symbolically Explore Intel TDX Module Execution. Pansilu Pitigalaarachchi, Xuhua Ding |
| 2025 | ACM CCS Young Scholars Development Program. F. Betül Durak, Fengjun Li, Sophie Stephenson |
| 2025 | AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output Delivery. Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, Xiuzhen Cheng |
| 2025 | AI-Augmented Static Analysis: Bridging Heuristics and Completeness for Practical Reverse Engineering. Monika Santra |
| 2025 | AISec '25: 18th ACM Workshop on Artificial Intelligence and Security. Maura Pintor, Matthew Jagielski, Ruoxi Jia |
| 2025 | ARTMAN '25: Third Workshop on Recent Advances in Resilient and Trustworthy MAchine learning-driveN systems. Gregory Blanc, Takeshi Takahashi, Zonghua Zhang |
| 2025 | Accountable Liveness. Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini |
| 2025 | Accuracy for Differentially Private Quotients by Fractional Uncertainties. Alejandro Russo, Elisabet Lobo Vesga, Marco Gaboardi |
| 2025 | Addressing Vulnerabilities and Opacities in Quantum Service Providers. Rupshali Roy |
| 2025 | Adversarial Observations in Weather Forecasting. Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck |
| 2025 | Adversarially Robust Assembly Language Model for Packed Executables Detection. Shijia Li, Jiang Ming, Lanqing Liu, Longwei Yang, Ni Zhang, Chunfu Jia |
| 2025 | Aegis: Tethering a Blockchain with Primary-Chain Stake. Yogev Bar-On, Roi Bar Zur, Omer Ben-Porat, Nimrod Cohen, Ittay Eyal, Matan Sitbon |
| 2025 | AgentSentinel: An End-to-End and Real-Time Security Defense Framework for Computer-Use Agents. Haitao Hu, Peng Chen, Yanpeng Zhao, Yuqi Chen |
| 2025 | Amigo: Secure Group Mesh Messaging in Realistic Protest Settings. David Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens |
| 2025 | An Empirical Study Measuring In-The-Wild Cryptographic Microarchitectural Side-Channel Patches. Sen Deng, Zhibo Liu, Shuai Wang, Yinqian Zhang |
| 2025 | Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model. Side Liu, Jiang Ming, Guodong Zhou, Xinyi Liu, Jianming Fu, Guojun Peng |
| 2025 | Anonymity Unveiled: A Practical Framework for Auditing Data Use in Deep Learning Models. Zitao Chen, Karthik Pattabiraman |
| 2025 | Approximate Algorithms for Verifying Differential Privacy with Gaussian Distributions. Bishnu Bhusal, Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan |
| 2025 | Armadillo: Robust Single-Server Secure Aggregation for Federated Learning with Input Validation. Yiping Ma, Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou |
| 2025 | Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving. Yang Lou, Haibo Hu, Qun Song, Qian Xu, Yi Zhu, Rui Tan, Wei-Bin Lee, Jianping Wang |
| 2025 | Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments. Daniel Hugenroth, Mario Lins, René Mayrhofer, Alastair R. Beresford |
| 2025 | Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box Deobfuscation. Vidal Attias, Nicolas Bellec, Grégoire Menguy, Sébastien Bardin, Jean-Yves Marion |
| 2025 | Automatically Detecting Online Deceptive Patterns. Asmit Nayak, Yash Wani, Shirley Zhang, Rishabh Khandelwal, Kassem Fawaz |
| 2025 | Autonomous Vulnerability Analysis, Triaging, and Repair: A Historical Perspective. Giovanni Vigna |
| 2025 | BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications. Fengyu Liu, Yuan Zhang, Enhao Li, Wei Meng, Youkun Shi, Qianheng Wang, Chenlin Wang, Zihan Lin, Min Yang |
| 2025 | BASTAG: Byte-level Access Control on Shared Memory using ARM Memory Tagging Extension. Junseung You, Jiwon Seo, Kyeongryong Lee, Yeongpil Cho, Yunheung Paek |
| 2025 | BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information. Julian Todt, Felix Morsbach, Thorsten Strufe |
| 2025 | BLACKOUT: Data-Oblivious Computation with Blinded Capabilities. Hossam ElAtali, Merve Gülmez, Thomas Nyman, N. Asokan |
| 2025 | BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM Accelerators. Yitong Guo, Hongbo Chen, Haobin Hiroki Chen, Yukui Luo, Xiaofeng Wang, Chenghong Wang |
| 2025 | BadAML: Exploiting Legacy Firmware Interfaces to Compromise Confidential Virtual Machines. Satoru Takekoshi, Manami Mori, Takaaki Fukai, Takahiro Shinagawa |
| 2025 | Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web Applications. Qiyi Zhang, Fengyu Liu, Zihan Lin, Yuan Zhang |
| 2025 | Beyond Tag Collision: Cluster-based Memory Management for Tag-based Sanitizers. Mengfei Xie, Yan Lin, Hongtao Wu, Jianming Fu, Chenke Luo, Guojun Peng |
| 2025 | Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining. Roozbeh Sarenche, Alireza Aghabagherloo, Svetla Nikova, Bart Preneel |
| 2025 | Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing. Mahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg |
| 2025 | Breaking and Fixing Content-Defined Chunking. Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson |
| 2025 | Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks. Cas Cremers, Alexander Dax, Aurora Naska |
| 2025 | Busting the Paper Ballot: Voting Meets Adversarial Machine Learning. Kaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller |
| 2025 | Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers. Pouneh Nikkhah Bahrami, Dylan Cutler, Igor Bilogrevic |
| 2025 | CCA-Secure Traceable Threshold (ID-based) Encryption and Application. Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman |
| 2025 | CCSW '25: Cloud Computing Security Workshop. Paolo Palmieri, Shivam Bhasin |
| 2025 | CHaRM: Checkpointed and Hashed Counters for Flexible and Efficient Rowhammer Mitigation. Ali Hajiabadi, Michele Marazzi, Kaveh Razavi |
| 2025 | CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks. Mincheol Son, Kwangmin Kim, Beomseok Oh, CheolJun Park, Yongdae Kim |
| 2025 | CPSIoTSec'25: The 7th Joint Workshop on CPS & IoT Security and Privacy. Kassem Fawaz, Daisuke Mashima |
| 2025 | CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel. Dong-Ok Kim, Juhyun Song, Insu Yun |
| 2025 | CSCS '25 - Cyber Security in CarS Workshop. Hans-Joachim Hof, Mario Fritz, Christoph Krauß |
| 2025 | Can IOCs Impose Cost? The Effects of Publishing Threat Intelligence on Adversary Behavior. Xander Bouwman, Aksel Ethembabaoglu, Bart Hermans, Carlos Gañán, Michel van Eeten |
| 2025 | Can Personal Health Information Be Secured in LLM? Privacy Attack and Defense in the Medical Domain. Yujin Kang, Eunsun Kim, Yoon-Sik Cho |
| 2025 | Cascading Adversarial Bias from Injection to Distillation in Language Models. Harsh Chaudhari, Jamie Hayes, Matthew Jagielski, Ilia Shumailov, Milad Nasr, Alina Oprea |
| 2025 | CheckMATE '25: Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks. Sébastien Bardin, Michele Ianni, Hyungon Moon |
| 2025 | Chekhov's Gun: Uncovering Hidden Risks in macOS Application-Sandboxed PID-Domain Services. Minghao Lin, Jiaxun Zhu, Tingting Yin, Zechao Cai, Guanxing Wen, Yanan Guo, Mengyuan Li |
| 2025 | Co-Prime: A Co-design Framework for Privacy Preserving Machine Learning on FPGA. Shuo Xu, Jiming Xu, Pengfei Xue, Xinyao Wang, Lei Ju, Wei Zhang |
| 2025 | Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware Classification. Yiling He, Junchi Lei, Zhan Qin, Kui Ren, Chun Chen |
| 2025 | Combating Falsification of Speech Videos with Live Optical Signatures. Hadleigh Schwartz, Xiaofeng Yan, Charles J. Carver, Xia Zhou |
| 2025 | Committed Vector Oblivious Linear Evaluation and Its Applications. Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang, Chenkai Weng |
| 2025 | Committee Selection with Non-Proportional Weights. Yucheng Sun, Haifeng Yu, Ruomu Hou |
| 2025 | Competing for Attention: An Interview Study with Participants of Cryptography Competitions. Ivana Trummová, Juliane Schmüser, Nicolas Huaman, Sascha Fahl |
| 2025 | ConTest: Taming the Cyber-physical Input Space in Fuzz Testing with Control Theory. Jinwen Wang, Hongchao Zhang, Chuanrui Jiang, Andrew Clark, Ning Zhang |
| 2025 | Conflicting Scores, Confusing Signals: An Empirical Study of Vulnerability Scoring Systems. Viktoria Koscinski, Mark Nelson, Ahmet Okutan, Robert Falso, Mehdi Mirakhorli |
| 2025 | ControlLoc: Physical-World Hijacking Attack on Camera-based Perception in Autonomous Driving. Chen Ma, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen |
| 2025 | Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph Analysis. Yunyi Chen, Jiping Yu, Kun Chen, Xiaoyu Fan, Xiaowei Zhu, Wenguang Chen |
| 2025 | Counting Subgraphs under Shuffle Differential Privacy. Juanru Fang, Ke Yi |
| 2025 | CryptGNN: Enabling Secure Inference for Graph Neural Networks. Pritam Sen, Yao Ma, Cristian Borcea |
| 2025 | CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism. Yiting Liu, Biming Zhou, Haodong Jiang |
| 2025 | DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis. Chen Gong, Kecen Li, Zinan Lin, Tianhao Wang |
| 2025 | Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in Kubernetes. Nanzi Yang, Xingyu Liu, Wenbo Shen, Jinku Li, Kangjie Lu |
| 2025 | DeFi '25: 5th ACM Workshop on Decentralized Finance and Security. Hao Chung, Yajin Zhou, Liyi Zhou |
| 2025 | Deep Dive into In-app Browsers: Uncovering Hidden Pitfalls in Certificate Validation. Woonghee Lee, Junbeom Hur, Hyunsoo Kwon |
| 2025 | Deep Learning from Imperfectly Labeled Malware Data. Fahad Alotaibi, Euan Goodbrand, Sergio Maffeis |
| 2025 | Demo: Exploring Utility and Attackability Trade-offs in Local Differential Privacy. Haoying Zhang, Abhishek K. Mishra, Héber Hwang Arcolezi |
| 2025 | Demo: Reverse Engineering Android Apps with Code Coverage. Aleksandr Pilgun |
| 2025 | Demo: Stopping Production Testing: A Graphical RPKI Test-Suite. Tobias Kirsch, Haya Schulmann, Niklas Vogel |
| 2025 | Denial of Sequencing Attacks in Ethereum Layer 2 Rollups. Zihao Li, Zhiyuan Sun, Zheyuan He, Jinzhao Chu, Hao Zhou, Xiapu Luo, Ting Chen, Yinqian Zhang |
| 2025 | Deprivileging Low-Level GPU Drivers Efficiently with User-Space Processes and CHERI Compartments. Paul Metzger, A. Theodore Markettos, Edward Tomasz Napierala, Matthew Naylor, Robert N. M. Watson, Timothy M. Jones |
| 2025 | Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost? Daniel Pöllmann, Tianxin Tang |
| 2025 | Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMs. Zongjie Li, Daoyuan Wu, Shuai Wang, Zhendong Su |
| 2025 | Digital Safety for Children with Intellectual Disabilities When Using Mobile Devices from Parents' and Teachers' Perspectives. Janice Jianing Si, Xin Lin, Haorui Cui, Xiaobo Zhou, Kanye Ye Wang |
| 2025 | Disa: Accurate Learning-based Static Disassembly with Attentions. Peicheng Wang, Monika Santra, Mingyu Liu, Cong Sun, Dongrui Zeng, Gang Tan |
| 2025 | Discovering and Exploiting IoT Device Hidden Attributes: A New Vulnerability in Smart Homes. Xuening Xu, Chenglong Fu, Xiaojiang Du, Bo Luo |
| 2025 | Dissertation Research Description: The Potential of SBOMs to Increase Software Supply Chain Security. Lukas Gehrke |
| 2025 | Distance-Aware OT with Application to Fuzzy PSI. Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas |
| 2025 | DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR Strategy. Wenshu Fan, Minxing Zhang, Hongwei Li, Wenbo Jiang, Hanxiao Chen, Xiangyu Yue, Michael Backes, Xiao Zhang |
| 2025 | DiveFuzz: Enhancing CPU Fuzzing via Diverse Instruction Construction. Zihui Guo, Miaomiao Yuan, Yanqi Yang, Liwei Chen, Gang Shi, Dan Meng |
| 2025 | Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites. Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger, Aaron Schulman |
| 2025 | Don't Panic! Finding Bugs Hidden Behind Rust Runtime Safety Checks. Zeyang Zhuang, Zilun Wang, Wei Meng, Michael R. Lyu |
| 2025 | Dynamic Detection of Vulnerable DMA Race Conditions. Brian Johannesmeyer, Raphael Isemann, Cristiano Giuffrida, Herbert Bos |
| 2025 | Dynamic Vulnerability Patching for Heterogeneous Embedded Systems Using Stack Frame Reconstruction. Ming Zhou, Xupu Hu, Zhihao Wang, Haining Wang, Hui Wen, Limin Sun, Peng Zhang |
| 2025 | Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments. Min Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang, Zoe Lin Jiang |
| 2025 | Efficient Fuzzy PSI Based on Prefix Representation. Chengrui Dang, Xv Zhou, Bei Liang |
| 2025 | Elastic Restaking Networks: United we fall, (partially) divided we stand. Roi Bar Zur, Ittay Eyal |
| 2025 | Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault Injection. Nils Bars, Lukas Bernhard, Moritz Schloegel, Thorsten Holz |
| 2025 | Empowering Parents to Support Children's Online Security and Privacy: Findings from a Randomized Controlled Trial. Xiaowei Chen, Verena Distler, Chloe Gordon, Yaxing Yao, Ziwen Teuber |
| 2025 | Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSD. Weidong Zhu, Carson Stillman, Sara Rampazzi, Kevin R. B. Butler |
| 2025 | Encrypted Matrix-Vector Products from Secret Dual Codes. Fabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen |
| 2025 | End-to-End Encrypted Git Services. Ya-Nan Li, Yaqing Song, Qiang Tang, Moti Yung |
| 2025 | Enhanced Web Application Security Through Proactive Dead Drop Resolver Remediation. Jonathan Fuller, Mingxuan Yao, Saumya Agarwal, Srimanta Barua, Taleb Hirani, Amit Kumar Sikder, Brendan Saltaformaggio |
| 2025 | Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components. Yunpeng Tian, Feng Dong, Junhai Wang, Mu Zhang, Zhiniang Peng, Zesen Ye, Xiapu Luo, Haoyu Wang |
| 2025 | Ethics in Computer Security Research: A Data-Driven Assessment of the Past, the Present, and the Possible Future. Harshini Sri Ramulu, Helen Schmitt, Bogdan Rerich, Rachel Gonzalez Rodriguez, Tadayoshi Kohno, Yasemin Acar |
| 2025 | Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks. Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini |
| 2025 | Exact Robustness Certification of k-Nearest Neighbors. Francesco Ranzato, Ahmad Shakeel, Marco Zanella |
| 2025 | ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs. Fabian Thomas, Michael Torres, Daniel Moghimi, Michael Schwarz |
| 2025 | Exploiting the Shared Storage API. Alexandra Nisenoff, Deian Stefan, Nicolas Christin |
| 2025 | Exploring and Analyzing Cross Layer DoS Attack Against UDP-based Services on Linux. Dashuai Wu, Yunyi Zhang, Baojun Liu, Xiang Li, Eihal Alowaisheq, Haixin Duan |
| 2025 | Exploring the Janus Face of Synthetic Images: From Privacy-secure Biometrics Applications to Deepfake Detection for Misinformation-Free Social Networks. Tanusree Ghosh |
| 2025 | Exposing Privacy Risks in Anonymizing Clinical Data: Combinatorial Refinement Attacks on Somiya Chhillar, Mary K. Righi, Rebecca E. Sutter, Evgenios M. Kornaropoulos |
| 2025 | Exposing the Roots of DNS Abuse: A Data-Driven Analysis of Key Factors Behind Phishing Domain Registrations. Yevheniya Nosyk, Maciej Korczynski, Carlos Gañán, Sourena Maroofi, Jan Bayer, Zul Odgerel, Samaneh Tajalizadehkhoob, Andrzej Duda |
| 2025 | Fast Amortized Bootstrapping with Small Keys and Polynomial Noise Overhead. Antonio Guimarães, Hilder V. L. Pereira |
| 2025 | Fast Homomorphic Evaluation of LWR-based PRFs. Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre |
| 2025 | FilterFL: Knowledge Filtering-based Data-Free Backdoor Defense for Federated Learning. Yanxin Yang, Ming Hu, Xiaofei Xie, Yue Cao, Pengyu Zhang, Yihao Huang, Mingsong Chen |
| 2025 | Finding SSH Strict Key Exchange Violations by State Learning. Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, Jörg Schwenk |
| 2025 | Fingerprinting Deep Packet Inspection Devices by their Ambiguities. Diwen Xue, Armin Huremagic, Wayne Wang, Ram Sundara Raman, Roya Ensafi |
| 2025 | Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting. Michael A. Specter, Mihai Christodorescu, Abbie Farr, Bo Ma, Robin Lassonde |
| 2025 | FlexEmu: Towards Flexible MCU Peripheral Emulation. Chongqing Lei, Zhen Ling, Xiangyu Xu, Shaofeng Li, Guangchi Liu, Kai Dong, Junzhou Luo |
| 2025 | FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models. Zhuo Chen, Yuyang Gong, Jiawei Liu, Miaokun Chen, Haotan Liu, Qikai Cheng, Fan Zhang, Wei Lu, Xiaozhong Liu |
| 2025 | FlowSentry: Accelerating NetFlow-based DDoS Detection. Xiaoyu He, Xiaohui Xie, Xin Wang, Lei Zhang, Kun Xie, Lin Chen, Yong Cui |
| 2025 | ForeDroid: Scenario-Aware Analysis for Android Malware Detection and Explanation. Jiaming Li, Sen Chen, Chunlian Wu, Yuxin Zhang, Lingling Fan |
| 2025 | Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon. Ábel Nagy, János Tapolcai, István András Seres, Bence Ladóczki |
| 2025 | Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust. Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters |
| 2025 | Formally Verified Correctness Bounds for Lattice-Based Cryptography. Manuel Barbosa, Matthias J. Kannwischer, Thing-Han Lim, Peter Schwabe, Pierre-Yves Strub |
| 2025 | Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks. Maynard Koch, Florian Dolzmann, Thomas C. Schmidt, Matthias Wählisch |
| 2025 | Founding Zero-Knowledge Proof of Training on Optimum Vicinity. Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo |
| 2025 | From OT to OLE with Subquadratic Communication. Jack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis |
| 2025 | Fuzzing Processing Pipelines for Zero-Knowledge Circuits. Christoph Hochrainer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis |
| 2025 | Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the Iris. Amey Shukla, Luke Demarest, Benjamin Fuller, Sohaib Ahmad, Caleb Manicke, Alexander Russell, Sixia Chen |
| 2025 | GAPDiS: Gradient-Assisted Perturbation Design via Sequence Editing for Website Fingerprinting Defense. Ruotian Xie, Kun Xie, Pengcheng Zhao, Jiajun He, Xin Zeng, Jigang Wen, Yong Xie, Wei Liang, Gaogang Xie |
| 2025 | GASLITEing the Retrieval: Exploring Vulnerabilities in Dense Embedding-based Search. Matan Ben-Tov, Mahmood Sharif |
| 2025 | GPU Travelling: Efficient Confidential Collaborative Training with TEE-Enabled GPUs. Shixuan Zhao, Zhongshu Gu, Salman Ahmed, Enriquillo Valdez, Hani Jamjoom, Zhiqiang Lin |
| 2025 | Generalized Security-Preserving Refinement for Concurrent Systems. Huan Sun, David Sanán, Jingyi Wang, Yongwang Zhao, Jun Sun, Wenhai Wang |
| 2025 | Generic Anonymity Wrapper for Messaging Protocols. Lea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis |
| 2025 | GhostCache: Timer- and Counter-Free Cache Attacks Exploiting Weak Coherence on RISC-V and ARM Chips. Yu Jin, Minghong Sun, Dongsheng Wang, Pengfei Qiu, Yinqian Zhang, Shuwen Deng |
| 2025 | Gibbon: Faster Secure Two-party Training of Gradient Boosting Decision Tree. Lichun Li, Zecheng Wu, Yuan Zhao, Zhihao Li, Wen-jie Lu, Shan Yin |
| 2025 | Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection. Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao |
| 2025 | Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, Taeyeong Noh |
| 2025 | HAIPS '25: First ACM CCS Workshop on Human-Centered AI Privacy and Security. Tianshi Li, Toby Jia-Jun Li, Yaxing Yao, Sauvik Das |
| 2025 | HW-Spy: Handwriting Inference by Tracing Pen-Tail Movements. Long Huang, Kang G. Shin |
| 2025 | Hardening Deep Neural Network Binaries against Reverse Engineering Attacks. Zheng Zhong, Ruoyu Wu, Junpeng Wan, Muqi Zou, Dave (Jing) Tian |
| 2025 | Hardware-assisted Memory Isolation. Hongyi Lu |
| 2025 | Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization. Shuangqing Xu, Yifeng Zheng, Zhongyun Hua |
| 2025 | Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication. Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen |
| 2025 | Head(er)s Up! Detecting Security Header Inconsistencies in Browsers. Jannis Rautenstrauch, Trung Tin Nguyen, Karthik Ramakrishnan, Ben Stock |
| 2025 | Heracles: Chosen Plaintext Attack on AMD SEV-SNP. Benedict Schlüter, Christoph Wech, Shweta Shinde |
| 2025 | Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI Ecosystems. Stav Cohen, Ron Bitton, Ben Nassi |
| 2025 | Hidden in Plain Bytes: Investigating Interpersonal Account Compromise with Data Exports. Julia Nonnenkamp, Naman Gupta, Abhimanyu Dev Gupta, Rahul Chatterjee |
| 2025 | High-Throughput Universally Composable Threshold FHE Decryption. Guy Zyskind, Doron Zarchy, Max Leibovich, Chris Peikert |
| 2025 | How Blind and Low-Vision Users Manage Their Passwords. Alexander Ponticello, Filipo Sharevski, Simon Anell, Katharina Krombholz |
| 2025 | How to Beat Nakamoto in the Race. Shu-Jie Cao, Dongning Guo |
| 2025 | How to Design Secure Honey Vault Schemes. Zhenduo Hou, Tingwei Fan, Fei Duan, Ding Wang |
| 2025 | How to Recover a Cryptographic Secret From the Cloud. David Adei, Chris Orsini, Alessandra Scafuro, Tanner Verber |
| 2025 | ILA: Correctness via Type Checking for Fully Homomorphic Encryption. Tarakaram Gollamudi, Anitha Gollamudi, Joshua Gancher |
| 2025 | IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model. Zeyu Liu, Yunhao Wang, Ben Fisch |
| 2025 | IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data Processing. Sangho Lee, Jules Drean, Yue Tan, Marcus Peinado |
| 2025 | In the DOM We Trust: Exploring the Hidden Dangers of Reading from the DOM on the Web. Jan Drescher, Sepehr Mirzaei, Soheil Khodayari, David Klein, Thomas Barber, Martin Johns, Giancarlo Pellegrino |
| 2025 | Intent-aware Fuzzing for Android Hardened Application. Seongyun Jeong, Minseong Choi, Haehyun Cho, Seokwoo Choi, Hyungsub Kim, Yuseok Jeon |
| 2025 | Interoperable Symmetric Message Franking. Carolina Ortega Pérez, Thomas Ristenpart, Julia Len |
| 2025 | It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools. Lorenzo Neil, Deepthi Mungara, Laurie A. Williams, Yasemin Acar, Bradley Reaves |
| 2025 | Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Lionel Blatter, Gustavo Xavier Delerue Marinho Alves, João Diogo Duarte, Benjamin Grégoire, Tiago Oliveira, Miguel Quaresma, Pierre-Yves Strub, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang |
| 2025 | JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation. Guoqiang Chen, Xin Jin, Zhiqiang Lin |
| 2025 | KZH-Fold: Accountable Voting from Sublinear Accumulation. George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz |
| 2025 | LAMPS '25: ACM CCS Workshop on Large AI Systems and Models with Privacy and Security Analysis. Kwok-Yan Lam, Xiaoning Liu, Derui Wang, Bo Li, Wenyuan Xu, Jieshan Chen, Minhui Xue, Xingliang Yuan, Guangdong Bai, Shuo Wang |
| 2025 | LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification. Zhi Lu, Songfeng Lu |
| 2025 | Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. Banks. Lu Xian, Van Hong Tran, Lauren Lee, Meera Kumar, Yichen Zhang, Florian Schaub |
| 2025 | Leaky Apps: Large-scale Analysis of Secrets Distributed in Android and iOS Apps. David Schmidt, Sebastian Schrittwieser, Edgar R. Weippl |
| 2025 | Leveraging Discrete CKKS to Bootstrap in High Precision. Hyeongmin Choe, Jaehyung Kim, Damien Stehlé, Elias Suvanto |
| 2025 | Lite-PoT: Practical Powers-of-Tau Setup Ceremony. Lucien K. L. Ng, Pedro Moreno-Sanchez, Mohsen Minaei, Panagiotis Chatzigiannis, Adithya Bhat, Duc Viet Le |
| 2025 | Local Frames: Exploiting Inherited Origins to Bypass Content Blockers. Alisha Ukani, Hamed Haddadi, Alex C. Snoeren, Peter Snyder |
| 2025 | Lock the Door But Keep the Window Open: Extracting App-Protected Accessibility Information from Browser-Rendered Websites. Haichuan Xu, Runze Zhang, Mingxuan Yao, David Oygenblik, Yizhi Huang, Jeman Park, Brendan Saltaformaggio |
| 2025 | Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption. Jiping Yu, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu, Wenguang Chen |
| 2025 | Logical Relations for Formally Verified Authenticated Data Structures. Simon Oddershede Gregersen, Chaitanya Agarwal, Joseph Tassarotti |
| 2025 | Looping for Good: Cyclic Proofs for Security Protocols. Felix Linker, Christoph Sprenger, Cas Cremers, David A. Basin |
| 2025 | ML-Cube: Accelerating Module-Lattice-Based Cryptography using Machine Learning Accelerators with a Memory-Less Design. Tian Zhou, Fangyu Zheng, Zhuoyu Xie, Wenxu Tang, Guang Fan, Yijing Ning, Yi Bian, Jingqiang Lin, Jiwu Jing |
| 2025 | MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis. Luming Yang, Lin Liu, Junjie Huang, Zhuotao Liu, Shiyu Liang, Shaojing Fu, Yongjun Wang |
| 2025 | MOLE: Breaking GPU TEE with GPU-Embedded MCU. Hongyi Lu, Yunjie Deng, J. Sukarno Mertoguno, Shuai Wang, Fengwei Zhang |
| 2025 | Managing Correlations in Data and Privacy Demand. Syomantak Chaudhuri, Thomas A. Courtade |
| 2025 | May the Force Alexandra Boldyreva, Deep Inder Mohan, Tianxin Tang |
| 2025 | Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges. Zimo Ji, Daoyuan Wu, Wenyuan Jiang, Pingchuan Ma, Zongjie Li, Shuai Wang |
| 2025 | Mechanizing Privacy by Design. David A. Basin, François Hublet, Srdan Krstic, Hoàng Nguyen |
| 2025 | MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM. Gilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin |
| 2025 | Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble. Zhiqi Wang, Chengyu Zhang, Yuetian Chen, Nathalie Baracaldo, Swanand Ravindra Kadhe, Lei Yu |
| 2025 | MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking. Tobias Kovats, Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi |
| 2025 | Mining in Logarithmic Space with Variable Difficulty. Loïc Miller, Dorian Pacaud, Nathanël Derousseaux-Lebert, Emmanuelle Anceaume, Romaric Ludinard |
| 2025 | Mitigating Data Poisoning Attacks to Local Differential Privacy. Xiaolin Li, Ninghui Li, Boyang Wang, Wenhai Sun |
| 2025 | MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs. Ruyi Ding, Tianhong Xu, Xinyi Shen, Aidong Adam Ding, Yunsi Fei |
| 2025 | Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers. Ke Cheng, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu, Yulong Shen, Jiaheng Zhang |
| 2025 | Multi-Party Private Set Operations from Predicative Zero-Sharing. Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao |
| 2025 | Needle in a Haystack: Automated and Scalable Vulnerability Hunting in the Windows ALPC Sea. Haoyi Liu, Feng Dong, Yunpeng Tian, Mu Zhang, Xuefeng Li, Fangming Gu, Zhiniang Peng, Haoyu Wang |
| 2025 | New Permutation Decomposition Techniques for Efficient Homomorphic Permutation. Xirong Ma, Junling Fang, Chunpeng Ge, Dung Hoang Duong, Yali Jiang, Yanbin Li, Willy Susilo, Lizhen Cui |
| 2025 | NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js. Eric Cornelissen, Musard Balliu |
| 2025 | Noise and Stress Don't Help With Learning: A Qualitative Study to Inform Design of Effective Cybersecurity Awareness in Manufacturing Environments. Lina Brunken, Markus Schöps, Annalina Buckmann, Florian Meißner, M. Angela Sasse |
| 2025 | OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs. Ahmed Aly, Essam Mansour, Amr M. Youssef |
| 2025 | Oedipus: LLM-enchanced Reasoning CAPTCHA Solver. Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu |
| 2025 | Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios. Xuewei Feng, Zhaoxi Li, Qi Li, Ziqiang Wang, Kun Sun, Ke Xu |
| 2025 | On Defining Reproducible Outcomes for the Computer Security Community. Daniel Olszewski |
| 2025 | On Frontrunning Risks in Batch-Order Fair Systems for Blockchains. Eunchan Park, Taeung Yoon, Hocheol Nam, Deepak Maram, Min Suk Kang |
| 2025 | On Hyperparameters and Backdoor-Resistance in Horizontal Federated Learning. Simon Lachnit, Ghassan Karame |
| 2025 | On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial Mislabeling. Stanley Wu, Ronik Bhaskar, Anna Yoo Jeong Ha, Shawn Shan, Haitao Zheng, Ben Y. Zhao |
| 2025 | On the Security of SSH Client Signatures. Fabian Bäumer, Marcus Brinkmann, Maximilian Radoy, Jörg Schwenk, Juraj Somorovsky |
| 2025 | One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP. Binyan Xu, Xilin Dai, Di Tang, Kehuan Zhang |
| 2025 | One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels. Twisha Chattopadhyay, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner, Saman A. Zonouz, Raheem Beyah |
| 2025 | One-Sided Bounded Noise: Theory, Optimization Algorithms and Applications. Hanshen Xiao, Jun Wan, Elaine Shi, Srinivas Devadas |
| 2025 | Optimal Mechanisms for Quantum Local Differential Privacy. Ji Guan |
| 2025 | Optimistic, Signature-Free Reliable Broadcast and Its Applications. Nibesh Shrestha, Qianyu Yu, Aniket Kate, Giuliano Losa, Kartik Nayak, Xuechao Wang |
| 2025 | PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with Anchor-Based Approximation. Ruiyao Liu, Chenxi Qiu |
| 2025 | PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel. Paschalis Bekos, Panagiotis Papadopoulos, Nicolas Kourtellis, Michalis Polychronakis |
| 2025 | PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable Optimization. Qin Yang, Nicholas Stout, Meisam Mohammady, Han Wang, Ayesha Samreen, Christopher J. Quinn, Yan Yan, Ashish Kundu, Yuan Hong |
| 2025 | PULSE: Parallel Private Set Union for Large-Scale Entities. Jiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu |
| 2025 | Panther: Private Approximate Nearest Neighbor Search in the Single Server Setting. Jingyu Li, Zhicong Huang, Min Zhang, Cheng Hong, Jian Liu, Tao Wei, Wenguang Chen |
| 2025 | Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android. Sheng Cao, Hao Zhou, Songzhou Shi, Yanjie Zhao, Haoyu Wang |
| 2025 | Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers. Anuj Gautam, Tarun Kumar Yadav, Garrett Smith, Kent E. Seamons, Scott Ruoti |
| 2025 | Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations. Hao Nie, Wei Wang, Peng Xu, Wei Chen, Laurence T. Yang, Mauro Conti, Kaitai Liang |
| 2025 | Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data. Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Ben Fisch, Xianhui Lu |
| 2025 | Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital. Jan Tolsdorf, David Langer, Luigi Lo Iacono |
| 2025 | PickleBall: Secure Deserialization of Pickle-based Machine Learning Models. Andreas D. Kellas, Neophytos Christou, Wenxin Jiang, Penghui Li, Laurent Simon, Yaniv David, Vasileios P. Kemerlis, James C. Davis, Junfeng Yang |
| 2025 | PipID: Light-Pupillary Response Based User Authentication for Virtual Reality. Muchen Pan, Yan Meng, Yuxia Zhan, Guoxing Chen, Haojin Zhu |
| 2025 | Pixnapping: Bringing Pixel Stealing out of the Stone Age. Alan Wang, Pranav Gopalkrishnan, Yingchen Wang, Christopher W. Fletcher, Hovav Shacham, David Kohlbrenner, Riccardo Paccagnella |
| 2025 | PoisonSpot: Precise Spotting of Clean-Label Backdoors via Fine-Grained Training Provenance Tracking. Philemon Hailemariam, Birhanu Eshete |
| 2025 | Poisoning Attacks to Local Differential Privacy for Ranking Estimation. Pei Zhan, Peng Tang, Yangzhuo Li, Puwen Wei, Shanqing Guo |
| 2025 | Pool: A Practical OT-based OPRF from Learning with Rounding. Alex Davidson, Amit Deo, Louis Tremblay Thibault |
| 2025 | Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head. James Hsin-yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl |
| 2025 | Poster: Zijing Ma, Leming Shen, Xinyu Huang, Yuanqing Zheng |
| 2025 | Poster: Adaptive Gradient Clipping with Personalized Differential Privacy for Heterogeneous Federated Learning. Hao Zhou, Hua Dai, Siqi Cai, Geng Yang, Yang Xiang |
| 2025 | Poster: Adversarial Habituation Attack: A Psychological Extension and Re-framing of Boiling Frog Attack. Tashi Stirewalt, Assefaw Hadish Gebremedhin |
| 2025 | Poster: Agentic Shell Honeypot Using Structured Logging. Kai Wei, Guangjing Wang |
| 2025 | Poster: An Improved Quantum Attack on the Two-round Even-Mansour Cipher with Independent Permutations and Keys. Rentaro Shiba, Tetsu Iwata |
| 2025 | Poster: An Obfuscation Framework for Mitigating Topology Probing Attacks in Cloud-Native Systems. Xue Leng, Kaiwen Shen, Chengxuan Zhu, Xing Li, Jianguo Sun |
| 2025 | Poster: Black-box Attacks on Multimodal Large Language Models through Adversarial ICC Profiles. Chengbin Sun, Hailong Sun, Guancheng Li, Jiashuo Liang |
| 2025 | Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart Contracts. Jens-Rene Giesen, Christian Scholz, Lucas Davi |
| 2025 | Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures. Harshini Sri Ramulu, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, Yasemin Acar |
| 2025 | Poster: Decoding Social Engineering: A Multi-Level Framework for Tactic Generation, Annotation, and Evaluation. Yicun Tian, Youyang Qu, Ming Ding, Shigang Liu, Pei-Wei Tsai, Jun Zhang |
| 2025 | Poster: ERIS: Evaluating ROV via ICMPv6 Rate Limiting Side Channels. Renrui Tian, Yahui Li, Han Zhang, Xinzhe Liu, Xia Yin, Xingang Shi, Zhiliang Wang, Jilong Wang |
| 2025 | Poster: Efficient Threshold ML-DSA up to 6 Parties. Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest |
| 2025 | Poster: Exploring the Landscape of RPKI Relying Parties. Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2025 | Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering. Junwei Zhou, Yuyang Gao, Cheng Tan, Yanchao Yang, Jianwen Xiang |
| 2025 | Poster: High-Fidelity and Contextual User Activity Memory Forensics. Min-Chieh Wu, Jui-An Chang, Yu-Sung Wu |
| 2025 | Poster: Impulse in the Clickstream: Behavioral Insights from Browsing History. Shubham Malaviya, Anuj Bagad, Manish Shukla, Sachin Lodha |
| 2025 | Poster: Inferring On-Screen Keyboard Input via Gamepad-based Mouse Movement Traces. Gyujeong Jin, Seyoung Lee |
| 2025 | Poster: Insecure Coding Habits Die Hard. Can PEFT Really Turn LLMs into Secure Coders? Sangjun Chae, Jangseop Choi, Taeyang Kim, Eun Jung, Sanghak Oh, Hyoungshick Kim |
| 2025 | Poster: Leveraging Large Language Models to Effectively and Efficiently Identify Vulnerability Patches for WordPress Plugins. Xue Leng, Hai Zhang, Tiantian Zhu, Jianguo Sun |
| 2025 | Poster: LogCADA: Cross-System Log Anomaly Detection based on Two-Stage Multi-Source Domain Adaptation. Junwei Zhou, Ying Zhu, Linhao Wang, Jianwen Xiang, Cheng Tan, Yanchao Yang |
| 2025 | Poster: LogCraft: Crafting CVE-Aware Synthetic Worlds (Logs). Kai-Xian Wong, Chan-Jien Tan, Yi-Ting Huang, Ying-Ren Guo, Yu-Zih Jheng, Guo-Wei Wong, Meng Chang Chen |
| 2025 | Poster: Longitudinal Analysis of Romance Scam Infrastructure Evolution: Evidence of Strategic Legitimization. Nayeon Ryu, Heeyeong Suh, Seyoung Lee |
| 2025 | Poster: Model-driven Privacy Analysis of Messaging Platforms. Muqaddas Naz, Muhammad Taimoor Khan, Muhammad Waqas |
| 2025 | Poster: Obfuscating Function Activity States to Enhance Privacy in Serverless Applications. Xue Leng, Fengming Zhu, Xing Li, Ye Tian, Jianguo Sun, Yan Chen |
| 2025 | Poster: PQ Noise Explorer. Animesh Thakur, Mikael Asplund |
| 2025 | Poster: PainNOVA: Privacy-Aware Voice-Based Pain-Level Detection. Andrew Lu, Mashrafi Kajol, Wei Lu, Dean Sullivan |
| 2025 | Poster: Post-Quantum Readiness in EdDSA Chains. Kostas Kryptos Chalkias |
| 2025 | Poster: Public Key Encryption with Exclusionary Subset Keyword Search from Lattices. Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Ting-Hsiang Su |
| 2025 | Poster: Randomness Unmasked: Towards Reproducible and Fair Evaluation of Shift-Aware Deep Learning NIDS. Lucy Steele, Fahad Alotaibi, Sergio Maffeis |
| 2025 | Poster: Recapture Detection Using Disparity Map Obtained from Dual-Pixel Image Sensors. Tetsu Ishizue, Sara Rampazzi, Takeshi Sugawara |
| 2025 | Poster: Reconsidering DNS-Based Domain Verification: Privacy and Overhead Implications. Eunbee Hwang, Hyunsoo Kim, Ted Taekyoung Kwon |
| 2025 | Poster: Reducing Hull Dimensions for Efficient Permutation Recovery in Code-Based Cryptography. Keita Ishizuka |
| 2025 | Poster: Scalable Privacy-Preserving Linear Regression Training via Homomorphic Encryption. Yena Cho, Hyoungshick Kim |
| 2025 | Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks. Lin Li, Youyang Qu, Jiayang Ao, Ming Ding, Chao Chen, Jun Zhang |
| 2025 | Poster: The Rocky Road Towards RPKI Algorithm Agility. Katharina Miesch, Haya Schulmann, Niklas Vogel |
| 2025 | Poster: Towards Intelligent Assurance for Autonomous AI Pentesters: Concurrent Compliance Auditing and Self-Augmentation via Execution Trace Analysis. Gustavo Sánchez, Adam Lundqvist |
| 2025 | Poster: We must talk about RPKI Repositories. Haya Schulmann, Niklas Vogel |
| 2025 | Poster: When Logs Misbehave: Retrieving Known APTs from Noisy Graphs. Guo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Ming-Chuan Yang, Shou-De Lin, Wang-Chien Lee, Meng Chang Chen |
| 2025 | Posterior Security: Anonymity and Message Hiding of Standard Signatures. Tsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu |
| 2025 | Postmortem Voice Cloning: Individuals Perspectives of Ownership and Deceptive Harms. Jennifer Vander Loop |
| 2025 | Practical TFHE Ciphertext Sanitization for Oblivious Circuit Evaluation. Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song |
| 2025 | Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic Encryption. Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song |
| 2025 | PreferCare: Preference Dataset Copyright Protection in LLM Alignment by Watermark Injection and Verification. Jian Lou, Chenyang Zhang, Xiaoyu Zhang, Kai Wu |
| 2025 | Privacy-Preserving Runtime Verification. Thomas A. Henzinger, Mahyar Karimi, K. S. Thejaswini |
| 2025 | Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees. Marc Fischlin, Moritz Huppert, Sam A. Markelon |
| 2025 | Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025 Chun-Ying Huang, Jyh-Cheng Chen, Shiuh-Pyng Shieh, David Lie, Véronique Cortier |
| 2025 | PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language Models. Yuwei Liu, Junquan Deng, Xiangkun Jia, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei, Purui Su |
| 2025 | Prompt Inference Attack on Distributed Large Language Model Inference Frameworks. Xinjian Luo, Ting Yu, Xiaokui Xiao |
| 2025 | Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks. Moritz Bley, Tobias Scharnowski, Simon Wörner, Moritz Schloegel, Thorsten Holz |
| 2025 | Protocols to Code: Formal Verification of a Secure Next-Generation Internet Router. João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David A. Basin, Peter Müller, Adrian Perrig |
| 2025 | Prototype Surgery: Tailoring Neural Prototypes via Soft Labels for Efficient Machine Unlearning. Gaoyang Liu, Xijie Wang, Zixiong Wang, Chen Wang, Ahmed M. Abdelmoniem, Desheng Wang |
| 2025 | Provable Repair of Deep Neural Network Defects by Preimage Synthesis and Property Refinement. Jianan Ma, Jingyi Wang, Qi Xuan, Zhen Wang |
| 2025 | QRSec 2025: ACM CCS First Workshop on Quantum-Resistant Cryptography and Security. Ashish Kundu, Attila A. Yavuz, Cristina Nita-Rotaru |
| 2025 | QSec '25: Workshop on Quantum Security and Privacy. Muhammad Taqi Raza, Jakub Szefer |
| 2025 | QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy. Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur |
| 2025 | Quantifying Security Training in Organizations Through the Analysis of U.S. SEC 10-K Filings. Jonas Hielscher, Maximilian Golla |
| 2025 | RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models. Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun |
| 2025 | RICSS'25: 3rd International Workshop on Re-design Industrial Control Systems with Security. Ruimin Sun, Mu Zhang |
| 2025 | RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs. Fabian Thomas, Eric García Arribas, Lorenz Hetterich, Daniel Weber, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz |
| 2025 | RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP. Benedict Schlüter, Shweta Shinde |
| 2025 | RVISmith: Fuzzing Compilers for RVV Intrinsics. Yibo He, Cunjian Huang, Xianmiao Qu, Hongdeng Chen, Wei Yang, Tao Xie |
| 2025 | Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience. Yizhong Liu, Andi Liu, Zhuocheng Pan, Yuxuan Hu, Jianwei Liu, Song Bian, Yuan Lu, Zhenyu Guan, Dawei Li, Meikang Qiu |
| 2025 | RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday Paradox. Xiang Li, Mingming Zhang, Zuyao Xu, FaSheng Miao, Yuqi Qiu, Baojun Liu, Jia Zhang, Xiaofeng Zheng, Haixin Duan, Zheli Liu, Yunhai Zhang, Dunqiu Fan |
| 2025 | Recover Function Signature from Combined Constraints. Haohui Huang, Yue Liu, Yuxi Cheng, Haiyang Wei, Jiamu Liu, Yu Wang, Linzhang Wang |
| 2025 | Refined TFHE Leveled Homomorphic Evaluation and Its Application. Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, Jooyoung Lee |
| 2025 | Removal Attack and Defense on AI-generated Content Latent-based Watermarking. De Zhang Lee, Han Fang, Hanyi Wang, Ee-Chien Chang |
| 2025 | Rethinking Machine Unlearning in Image Generation Models. Renyang Liu, Wenjie Feng, Tianwei Zhang, Wei Zhou, Xueqi Cheng, See-Kiong Ng |
| 2025 | Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing System. Rui Zhao, Muhammad Shoaib, Viet Tung Hoang, Wajih Ul Hassan |
| 2025 | Revisiting Keyed-Verification Anonymous Credentials. Michele Orrù |
| 2025 | Reviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata Fields. Hao Zhang, Jian Liu, Jie Lu, Shaomin Chen, Tianshuo Han, Bolun Zhang, Xiaorui Gong |
| 2025 | Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation. Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr |
| 2025 | Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI. Andong Chen, Yangyang Wang, Jia Zhang, Mingwei Xu |
| 2025 | RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing. Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu |
| 2025 | S2S-SED: A Speech-to-Speech Approach for Detection of Social Engineering Attacks in Audio Conversations. Leonardo Erlacher |
| 2025 | SCOPE: Expanding Client-Side Post-Processing for Efficient Privacy-Preserving Model Inference. Shenchen Zhu, Kai Chen, Yue Zhao, Cheng'an Wei |
| 2025 | SCORED '25: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. Aditya Sirish A Yelgundhalli, Behnaz Hassanshahi, Dennis Roellke, Drew Davidson, Kathleen Moriarty, Lorenzo De Carli, Marcela S. Melara, Santiago Torres-Arias, Sarah Evans, Yuchen Zhang |
| 2025 | SISTAR: An Efficient DDoS Detection and Mitigation Framework Utilizing Programmable Data Planes. Junjie Hu, Feng Guo, Qihang Zhou, Yixin Zhang, Zibo Gao, Yinglong Han, Zhiqiang Lv |
| 2025 | SURE '25: The 1st ACM Workshop on Software Understanding and Reverse Engineering. Zion Leonahenahe Basque, Ati Priya Bajaj |
| 2025 | SaTS '25: The 3rd ACM Workshop on Security and Privacy of AI-Empowered Mobile Super Apps. Luyi Xing, Yue Xiao |
| 2025 | Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels. Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe |
| 2025 | SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models. Peigui Qi, Kunsheng Tang, Wenbo Zhou, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang |
| 2025 | Safeguarding Graph Neural Networks against Topology Inference Attacks. Jie Fu, Yuan Hong, Zhili Chen, Wendy Hui Wang |
| 2025 | Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms. Ahsan Zafar, Junhua Su, Sohom Datta, Alexandros Kapravelos, Anupam Das |
| 2025 | Scalable Cryptography for Trustworthy Machine Learning in the LLM Era. Gefei Tan |
| 2025 | ScannerGrouper: A Generalizable and Effective Scanning Organization Identification System Toward the Open World. Xin He, Enhuan Dong, Jiyuan Han, Zhiliang Wang, Hui Zhang, Liang Liu, Lianyi Sun, Supei Zhang, Pengfei Xue, Guanglei Song, Han Li, Xiaowen Quan, Jiahai Yang |
| 2025 | SecAlign: Defending Against Prompt Injection with Preference Optimization. Sizhe Chen, Arman Zharmagambetov, Saeed Mahloujifar, Kamalika Chaudhuri, David A. Wagner, Chuan Guo |
| 2025 | Secure Noise Sampling for Differentially Private Collaborative Learning. Olive Franzese, Congyu Fang, Radhika Garg, Xiao Wang, Somesh Jha, Nicolas Papernot, Adam Dziedzic |
| 2025 | Secure Parsing and Serializing with Separation Logic Applied to CBOR, CDDL, and COSE. Tahina Ramananandro, Gabriel Ebner, Guido Martínez, Nikhil Swamy |
| 2025 | Securing Cryptographic Software via Typed Assembly Language. Shixin Song, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala, Mengjia Yan |
| 2025 | Securing Mixed Rust with Hardware Capabilities. Jason Z. Yu, Fangqi Han, Kaustab Choudhury, Trevor E. Carlson, Prateek Saxena |
| 2025 | Security Analysis of Privately Verifiable Privacy Pass. Konrad Hanff, Anja Lehmann, Cavit Özbay |
| 2025 | Security and Privacy Measurements in Cellular Networks: Novel Approaches in a Global Roaming Context. Gabriel K. Gegenhuber |
| 2025 | Security and Privacy Perceptions of Pakistani Facebook Matrimony Group Users. Mah Jan Dorazahi, Deepthi Mungara, Yasemin Acar, Harshini Sri Ramulu |
| 2025 | Security-Aware Sensor Fusion with MATE: the Multi-Agent Trust Estimator. R. Spencer Hallyburton, Miroslav Pajic |
| 2025 | Sentry: Authenticating Machine Learning Artifacts on the Fly. Andrew Gan, Zahra Ghodsi |
| 2025 | Separating Broadcast from Cheater Identification. Yashvanth Kondi, Divya Ravi |
| 2025 | ShiftPIR: An Efficient PIR System with Gravity Shifting from Client to Server. Zihan Wang, Lutan Zhao, Ming Luo, Zhiwei Wang, Haoqi He, Wenzhe Lv, Xuan Ding, Dan Meng, Rui Hou |
| 2025 | Silent Threshold Traitor Tracing & Enhancing Mempool Privacy. Anirban Chakrabarti, Monosij Maitra, Arup Mondal, Kushaz Sehgal |
| 2025 | Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes. Bruno Kreyssig, Sabine Houy, Timothée Riom, Alexandre Bartel |
| 2025 | SlicedPIR: Offloading Heavyweight Work with NTT. Jonathan Weiss, Yossi Gilad |
| 2025 | Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. Wei Qiao, Yebo Feng, Teng Li, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu |
| 2025 | Split Unlearning. Yanna Jiang, Guangsheng Yu, Qin Wang, Xu Wang, Baihe Ma, Caijun Sun, Wei Ni, Ren Ping Liu |
| 2025 | Styled to Steal: The Overlooked Attack Surface in Email Clients. Leon Trampert, Daniel Weber, Christian Rossow, Michael Schwarz |
| 2025 | Subversion-resilient Key-exchange in the Post-quantum World. Kévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete |
| 2025 | Surpassing the Word Size Limitation of TFHE with Noise Calibration. Takumi Nishimura, Kazunari Tozawa, Kunihiko Sadakane |
| 2025 | Swallow: A Transfer-Robust Website Fingerprinting Attack via Consistent Feature Learning. Meng Shen, Jinhe Wu, Junyu Ai, Qi Li, Chenchen Ren, Ke Xu, Liehuang Zhu |
| 2025 | SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity. Elizabeth C. Crites, Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh |
| 2025 | Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning. Tianyu Qi, Lei Xue, Yufeng Zhan, Xiaobo Ma |
| 2025 | Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors. Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri |
| 2025 | Systematic Assessment of Tabular Data Synthesis. Yuntao Du, Ninghui Li |
| 2025 | SyzParam: Incorporating Runtime Parameters into Kernel Driver Fuzzing. Yue Sun, Yan Kang, Chenggang Wu, Kangjie Lu, Jiming Wang, Xingwei Li, Yuhao Hu, Jikai Ren, Yuanming Lai, Mengyao Xie, Zhe Wang |
| 2025 | SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution. Yu Hao, Juefei Pu, Xingyu Li, Zhiyun Qian, Ardalan Amiri Sani |
| 2025 | TEMPEST-LoRa: Cross-Technology Covert Communication. Xieyang Sun, Yuanqing Zheng, Wei Xi, Zuhao Chen, Zhizhen Chen, Han Hao, Zhiping Jiang, Sheng Zhong |
| 2025 | THOR: Secure Transformer Inference with Homomorphic Encryption. Jungho Moon, Dongwoo Yoo, Xiaoqian Jiang, Miran Kim |
| 2025 | TensorShield: Safeguarding On-Device Inference by Shielding Critical DNN Tensors with TEE. Tong Sun, Bowen Jiang, Hailong Lin, Borui Li, Yixiao Teng, Yi Gao, Wei Dong |
| 2025 | The 20th Workshop on Programming Languages and Analysis for Security (PLAS 2025). Abhishek Bichhawat, Jana Hofmann |
| 2025 | The Challenges and Opportunities with Cybersecurity Regulations: A Case Study of the US Electric Power Sector. Sena Sahin, Burak Sahin, Robin Berthier, Kate Davis, Saman A. Zonouz, Frank Li |
| 2025 | The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic Data. Georgi Ganev, Meenatchi Sundaram Muthu Selva Annamalai, Sofiane Mahiou, Emiliano De Cristofaro |
| 2025 | The OCH Authenticated Encryption Scheme. Sanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len, Thomas Ristenpart |
| 2025 | The Odyssey of robots.txt Governance: Measuring Convention Implications of Web Bots in Large Language Model Services. Jian Cui, Mingming Zha, Xiaofeng Wang, Xiaojing Liao |
| 2025 | The Phantom Menace in Crypto-Based PET-Hardened Deep Learning Models: Invisible Configuration-Induced Attacks. Yiteng Peng, Dongwei Xiao, Zhibo Liu, Zhenlan Ji, Daoyuan Wu, Shuai Wang, Juergen Rahmel |
| 2025 | The Power to Never Be Wrong: Evasions and Anachronistic Attacks Against Web Archives. Robin Kirchner, Chris Tsoukaladelis, Martin Johns, Nick Nikiforakis |
| 2025 | Threat from Windshield: Vehicle Windows as Involuntary Attack Sources on Automotive Voice Assistants. Penghao Wang, Shuo Huai, Yetong Cao, Chao Liu, Jun Luo |
| 2025 | Threshold ECDSA in Two Rounds. Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Xudong Deng |
| 2025 | Tide: An Efficient Kernel-level Isolation Execution Environment on AArch64 via Dynamically Adjusting Output Address Size. Shiyang Zhang, Chenggang Wu, Chengxuan Hou, Jinglin Lv, Yinqian Zhang, Qianyu Guo, Yuanming Lai, Mengyao Xie, Yan Kang, Zhe Wang |
| 2025 | Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction Fee. Shan Wang, Ming Yang, Yu Liu, Yue Zhang, Shuaiqing Zhang, Zhen Ling, Jiannong Cao, Xinwen Fu |
| 2025 | Timing Attacks on Differential Privacy are Practical. Zachary Ratliff, Nicolás Berrios, James Mickens |
| 2025 | Toss: Garbled PIR from Table-Only Stacking. Lucien K. L. Ng, Vladimir Kolesnikov |
| 2025 | Towards Backdoor Stealthiness in Model Parameter Space. Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Stjepan Picek |
| 2025 | Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency. Qishuang Fu |
| 2025 | Towards Explainable and Robust Deepfake Detection and Attribution: Enhancing Multimedia Forensics for the Next Generation of Synthetic Media. Raphael Antonius Frick |
| 2025 | Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous Driving. Yan Zhang, Zihao Liu, Yi Zhu, Chenglin Miao |
| 2025 | Towards Solving Real-world Problems of Post-quantum Cryptography. Suparna Kundu |
| 2025 | Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2. Louis Tremblay Thibault, Michael Walter |
| 2025 | Towards a Formal Foundation for Blockchain ZK Rollups. Stefanos Chaliasos, Denis Firsov, Benjamin Livshits |
| 2025 | Training Robust Classifiers for Classifying Encrypted Traffic under Dynamic Network Conditions. Yuqi Qing, Qilei Yin, Xinhao Deng, Xiaoli Zhang, Peiyang Li, Zhuotao Liu, Kun Sun, Ke Xu, Qi Li |
| 2025 | Training with Only 1.0 ‰ Samples: Malicious Traffic Detection via Cross-Modality Feature Fusion. Chuanpu Fu, Qi Li, Elisa Bertino, Ke Xu |
| 2025 | Trout: Two-Round Threshold ECDSA from Class Groups. Hila Dahari-Garbian, Ariel Nof, Luke Parker |
| 2025 | Turning Uncertainty into Efficiency: Toward Practical, Quantum-Resistant Verifiable Privacy Tools. Jie Xu |
| 2025 | Uncovering Hidden Paths in 5G: Exploiting Protocol Tunneling and Network Boundary Bridging. Altaf Shaik, Robert Jaschek, Jean-Pierre Seifert |
| 2025 | Unmask Tampering: Efficient Document Tampering Localization under Recapturing Attacks with Real Distortion Knowledge. Changsheng Chen, Wenyu Chen, Yinyin Lin, Bin Li, Jiwu Huang |
| 2025 | UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images. Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang |
| 2025 | Updatable aPAKE: Security Against Bulk Precomputation Attacks. Dennis Dayanikli, Anja Lehmann |
| 2025 | Validating Interior Gateway Routing Protocols via Equivalent Topology Synthesis. Bing Shui, Yufan Zhou, Jielun Wu, Baowen Xu, Qingkai Shi |
| 2025 | Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography. Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song |
| 2025 | VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier. David Oygenblik, Abhinav Vemulapalli, Animesh Agrawal, Debopam Sanyal, Alexey Tumanov, Brendan Saltaformaggio |
| 2025 | WAHC 2025: 13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Flávio Bergamaschi, Yuriy Polyakov, Kurt Rohloff |
| 2025 | WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC. Massimo Cafaro, Eric Chan-Tin, Jerry Chou, Jinoh Kim |
| 2025 | WPC: Weight Plaintext Compression for CNN Inference based on RNS-CKKS. Guiming Shi, Yuchen Wei, Shengyu Fan, Xianglong Deng, Liang Kong, Xianbin Li, Jingwei Cai, Shuwen Deng, Mingzhe Zhang, Kaisheng Ma |
| 2025 | WPES '25: 24th Workshop on Privacy in the Electronic Society. Jianying Zhou |
| 2025 | Walking The Last Mile: Studying Decompiler Output Correction in Practice. Joshua Wiedemeier, Simon Klancher, Joel Flores, Max Zheng, Jaehyun Park, Sang Kil Cha, Kangkook Jee |
| 2025 | Wanilla: Sound Noninterference Analysis for WebAssembly. Markus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Matteo Maffei |
| 2025 | What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System. Johnny So, Michael Ferdman, Nick Nikiforakis |
| 2025 | What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale. Xiaoyong (Brian) Yuan, Xiaolong Ma, Linke Guo, Lan Zhang |
| 2025 | What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift. Jiamin Chang, Haoyang Li, Hammond Pearce, Ruoxi Sun, Bo Li, Minhui Xue |
| 2025 | WhisperTest: A Voice-Control-based Library for iOS UI Automation. Zahra Moti, Tom Janssen-Groesbeek, Steven Monteiro, Andrea Continella, Gunes Acar |
| 2025 | Windows plays Jenga: Uncovering Design Weaknesses in Windows File System Security. Dong-uk Kim, Junyoung Park, Sanghak Oh, Hyoungshick Kim, Insu Yun |
| 2025 | WireTap: Breaking Server SGX via DRAM Bus Interposition. Alexander Seto, Oytun Kuday Duran, Samy Amer, Jalen Chuang, Stephan van Schaik, Daniel Genkin, Christina Garman |
| 2025 | You Can't Steal Nothing: Mitigating Prompt Leakages in LLMs via System Vectors. Bochuan Cao, Changjiang Li, Yuanpu Cao, Yameng Ge, Ting Wang, Jinghui Chen |
| 2025 | YouthSafe: A Youth-Centric Safety Benchmark and Safeguard Model for Large Language Models. Yaman Yu, Yiren Liu, Yuqi Zhang, Yun Huang, Yang Wang |
| 2025 | ZVDetector: State-Guided Vulnerability Detection System for Zigbee Devices. Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Jiaqi Bai |
| 2025 | Zero-Knowledge AI Inference with High Precision. Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang |
| 2025 | free5GC '25: The 1st free5GC World Forum. Jyh-Cheng Chen, K. K. Ramakrishnan |
| 2025 | mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order. Suparna Kundu, Quinten Norga, Angshuman Karmakar, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede |