CCS A*

391 papers

YearTitle / Authors
2025'Is this a scam?': The Nature and Quality of Reddit Discussion about Scams.
Elijah Robert Bouma-Sims, Mandy Lanyon, Lorrie Faith Cranor
2025'We just did not have that on the embedded system': Insights and Challenges for Securing Microcontroller Systems from the Embedded CTF Competitions.
Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Kai Kaufman, Md. Armanuzzaman, Xi Tan, Katherine Jesse, Robert J. Walls, Ziming Zhao
20251BIT: Persistent Path Validation with Customized Noise Signal Characteristics.
Keji Miao, Jie Yuan, Xinghai Wei, Xingwu Wang, Dongqi Han, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen
20253D-Sec '25: The 1st ACM Workshop on Deepfake, Deception, and Disinformation Security.
Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore, Tim Walita, Bimal Viswanath, Mario Fritz
20255G-RNAKA : A Random Number-based Authentication and Key Agreement Protocol for 5G Systems.
Hui Li, Haotian Li, Chi Ma, Jingjing Guan, Junchi Zeng, Haonan Feng, Ziming Zhao
2025A Decade-long Landscape of Advanced Persistent Threats: Longitudinal Analysis and Global Trends.
Shakhzod Yuldoshkhujaev, Mijin Jeon, Doowon Kim, Nick Nikiforakis, Hyungjoon Koo
2025A Practical and Secure Byzantine Robust Aggregator.
De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang
2025A Qualitative Analysis of Fuzzer Usability and Challenges.
Yunze Zhao, Wentao Guo, Harrison Goldstein, Daniel Votipka, Kelsey R. Fulton, Michelle L. Mazurek
2025A Sea of Cyber Threats: Maritime Cybersecurity from the Perspective of Mariners.
Anna Raymaker, Akshaya Kumar, Miuyin Yong Wong, Ryan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah
2025A Secure Sequencer and Data Availability Committee for Rollups.
Margarita Capretto, Martín Ceresa, Antonio Fernández Anta, Pedro Moreno-Sanchez, César Sánchez
2025A System Framework to Symbolically Explore Intel TDX Module Execution.
Pansilu Pitigalaarachchi, Xuhua Ding
2025ACM CCS Young Scholars Development Program.
F. Betül Durak, Fengjun Li, Sophie Stephenson
2025AD-MPC: Asynchronous Dynamic MPC with Guaranteed Output Delivery.
Wenxuan Yu, Minghui Xu, Bing Wu, Sisi Duan, Xiuzhen Cheng
2025AI-Augmented Static Analysis: Bridging Heuristics and Completeness for Practical Reverse Engineering.
Monika Santra
2025AISec '25: 18th ACM Workshop on Artificial Intelligence and Security.
Maura Pintor, Matthew Jagielski, Ruoxi Jia
2025ARTMAN '25: Third Workshop on Recent Advances in Resilient and Trustworthy MAchine learning-driveN systems.
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang
2025Accountable Liveness.
Andrew Lewis-Pye, Joachim Neu, Tim Roughgarden, Luca Zanolini
2025Accuracy for Differentially Private Quotients by Fractional Uncertainties.
Alejandro Russo, Elisabet Lobo Vesga, Marco Gaboardi
2025Addressing Vulnerabilities and Opacities in Quantum Service Providers.
Rupshali Roy
2025Adversarial Observations in Weather Forecasting.
Erik Imgrund, Thorsten Eisenhofer, Konrad Rieck
2025Adversarially Robust Assembly Language Model for Packed Executables Detection.
Shijia Li, Jiang Ming, Lanqing Liu, Longwei Yang, Ni Zhang, Chunfu Jia
2025Aegis: Tethering a Blockchain with Primary-Chain Stake.
Yogev Bar-On, Roi Bar Zur, Omer Ben-Porat, Nimrod Cohen, Ittay Eyal, Matan Sitbon
2025AgentSentinel: An End-to-End and Real-Time Security Defense Framework for Computer-Use Agents.
Haitao Hu, Peng Chen, Yanpeng Zhao, Yuqi Chen
2025Amigo: Secure Group Mesh Messaging in Realistic Protest Settings.
David Inyangson, Sarah Radway, Tushar M. Jois, Nelly Fazio, James Mickens
2025An Empirical Study Measuring In-The-Wild Cryptographic Microarchitectural Side-Channel Patches.
Sen Deng, Zhibo Liu, Shuai Wang, Yinqian Zhang
2025Analyzing PDFs like Binaries: Adversarially Robust PDF Malware Analysis via Intermediate Representation and Language Model.
Side Liu, Jiang Ming, Guodong Zhou, Xinyi Liu, Jianming Fu, Guojun Peng
2025Anonymity Unveiled: A Practical Framework for Auditing Data Use in Deep Learning Models.
Zitao Chen, Karthik Pattabiraman
2025Approximate Algorithms for Verifying Differential Privacy with Gaussian Distributions.
Bishnu Bhusal, Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan
2025Armadillo: Robust Single-Server Secure Aggregation for Federated Learning with Input Validation.
Yiping Ma, Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou
2025Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving.
Yang Lou, Haibo Hu, Qun Song, Qian Xu, Yi Zhu, Rui Tan, Wei-Bin Lee, Jianping Wang
2025Attestable Builds: Compiling Verifiable Binaries on Untrusted Systems using Trusted Execution Environments.
Daniel Hugenroth, Mario Lins, René Mayrhofer, Alastair R. Beresford
2025Augmenting Search-based Program Synthesis with Local Inference Rules to Improve Black-box Deobfuscation.
Vidal Attias, Nicolas Bellec, Grégoire Menguy, Sébastien Bardin, Jean-Yves Marion
2025Automatically Detecting Online Deceptive Patterns.
Asmit Nayak, Yash Wani, Shirley Zhang, Rishabh Khandelwal, Kassem Fawaz
2025Autonomous Vulnerability Analysis, Triaging, and Repair: A Historical Perspective.
Giovanni Vigna
2025BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications.
Fengyu Liu, Yuan Zhang, Enhao Li, Wei Meng, Youkun Shi, Qianheng Wang, Chenlin Wang, Zihan Lin, Min Yang
2025BASTAG: Byte-level Access Control on Shared Memory using ARM Memory Tagging Extension.
Junseung You, Jiwon Seo, Kyeongryong Lee, Yeongpil Cho, Yunheung Paek
2025BFId: Identity Inference Attacks Utilizing Beamforming Feedback Information.
Julian Todt, Felix Morsbach, Thorsten Strufe
2025BLACKOUT: Data-Oblivious Computation with Blinded Capabilities.
Hossam ElAtali, Merve Gülmez, Thomas Nyman, N. Asokan
2025BOLT: Bandwidth-Optimized Lightning-Fast Oblivious Map powered by Secure HBM Accelerators.
Yitong Guo, Hongbo Chen, Haobin Hiroki Chen, Yukui Luo, Xiaofeng Wang, Chenghong Wang
2025BadAML: Exploiting Legacy Firmware Interfaces to Compromise Confidential Virtual Machines.
Satoru Takekoshi, Manami Mori, Takaaki Fukai, Takahiro Shinagawa
2025Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web Applications.
Qiyi Zhang, Fengyu Liu, Zihan Lin, Yuan Zhang
2025Beyond Tag Collision: Cluster-based Memory Management for Tag-based Sanitizers.
Mengfei Xie, Yan Lin, Hongtao Wu, Jianming Fu, Chenke Luo, Guojun Peng
2025Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining.
Roozbeh Sarenche, Alireza Aghabagherloo, Svetla Nikova, Bart Preneel
2025Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing.
Mahimna Kelkar, Aadityan Ganesh, Aditi Partap, Joseph Bonneau, S. Matthew Weinberg
2025Breaking and Fixing Content-Defined Chunking.
Kien Tuong Truong, Simon-Philipp Merz, Matteo Scarlata, Felix Günther, Kenneth G. Paterson
2025Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks.
Cas Cremers, Alexander Dax, Aurora Naska
2025Busting the Paper Ballot: Voting Meets Adversarial Machine Learning.
Kaleel Mahmood, Caleb Manicke, Ethan Rathbun, Aayushi Verma, Sohaib Ahmad, Nicholas Stamatakis, Laurent Michel, Benjamin Fuller
2025Byte by Byte: Unmasking Browser Fingerprinting at the Function Level using V8 Bytecode Transformers.
Pouneh Nikkhah Bahrami, Dylan Cutler, Igor Bilogrevic
2025CCA-Secure Traceable Threshold (ID-based) Encryption and Application.
Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Pratyay Mukherjee, Hussien Othman
2025CCSW '25: Cloud Computing Security Workshop.
Paolo Palmieri, Shivam Bhasin
2025CHaRM: Checkpointed and Hashed Counters for Flexible and Efficient Rowhammer Mitigation.
Ali Hajiabadi, Michele Marazzi, Kaveh Razavi
2025CITesting: Systematic Testing of Context Integrity Violations in LTE Core Networks.
Mincheol Son, Kwangmin Kim, Beomseok Oh, CheolJun Park, Yongdae Kim
2025CPSIoTSec'25: The 7th Joint Workshop on CPS & IoT Security and Privacy.
Kassem Fawaz, Daisuke Mashima
2025CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel.
Dong-Ok Kim, Juhyun Song, Insu Yun
2025CSCS '25 - Cyber Security in CarS Workshop.
Hans-Joachim Hof, Mario Fritz, Christoph Krauß
2025Can IOCs Impose Cost? The Effects of Publishing Threat Intelligence on Adversary Behavior.
Xander Bouwman, Aksel Ethembabaoglu, Bart Hermans, Carlos Gañán, Michel van Eeten
2025Can Personal Health Information Be Secured in LLM? Privacy Attack and Defense in the Medical Domain.
Yujin Kang, Eunsun Kim, Yoon-Sik Cho
2025Cascading Adversarial Bias from Injection to Distillation in Language Models.
Harsh Chaudhari, Jamie Hayes, Matthew Jagielski, Ilia Shumailov, Milad Nasr, Alina Oprea
2025CheckMATE '25: Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks.
Sébastien Bardin, Michele Ianni, Hyungon Moon
2025Chekhov's Gun: Uncovering Hidden Risks in macOS Application-Sandboxed PID-Domain Services.
Minghao Lin, Jiaxun Zhu, Tingting Yin, Zechao Cai, Guanxing Wen, Yanan Guo, Mengyuan Li
2025Co-Prime: A Co-design Framework for Privacy Preserving Machine Learning on FPGA.
Shuo Xu, Jiming Xu, Pengfei Xue, Xinyao Wang, Lei Ju, Wei Zhang
2025Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware Classification.
Yiling He, Junchi Lei, Zhan Qin, Kui Ren, Chun Chen
2025Combating Falsification of Speech Videos with Live Optical Signatures.
Hadleigh Schwartz, Xiaofeng Yan, Charles J. Carver, Xia Zhou
2025Committed Vector Oblivious Linear Evaluation and Its Applications.
Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang, Chenkai Weng
2025Committee Selection with Non-Proportional Weights.
Yucheng Sun, Haifeng Yu, Ruomu Hou
2025Competing for Attention: An Interview Study with Participants of Cryptography Competitions.
Ivana Trummová, Juliane Schmüser, Nicolas Huaman, Sascha Fahl
2025ConTest: Taming the Cyber-physical Input Space in Fuzz Testing with Control Theory.
Jinwen Wang, Hongchao Zhang, Chuanrui Jiang, Andrew Clark, Ning Zhang
2025Conflicting Scores, Confusing Signals: An Empirical Study of Vulnerability Scoring Systems.
Viktoria Koscinski, Mark Nelson, Ahmet Okutan, Robert Falso, Mehdi Mirakhorli
2025ControlLoc: Physical-World Hijacking Attack on Camera-based Perception in Autonomous Driving.
Chen Ma, Ningfei Wang, Zhengyu Zhao, Qian Wang, Qi Alfred Chen, Chao Shen
2025Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph Analysis.
Yunyi Chen, Jiping Yu, Kun Chen, Xiaoyu Fan, Xiaowei Zhu, Wenguang Chen
2025Counting Subgraphs under Shuffle Differential Privacy.
Juanru Fang, Ke Yi
2025CryptGNN: Enabling Secure Inference for Graph Neural Networks.
Pritam Sen, Yao Ma, Cristian Borcea
2025CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism.
Yiting Liu, Biming Zhou, Haodong Jiang
2025DPImageBench: A Unified Benchmark for Differentially Private Image Synthesis.
Chen Gong, Kecen Li, Zinan Lin, Tianhao Wang
2025Dangers Behind Access Control: Understanding and Exploiting Implicit Permissions in Kubernetes.
Nanzi Yang, Xingyu Liu, Wenbo Shen, Jinku Li, Kangjie Lu
2025DeFi '25: 5th ACM Workshop on Decentralized Finance and Security.
Hao Chung, Yajin Zhou, Liyi Zhou
2025Deep Dive into In-app Browsers: Uncovering Hidden Pitfalls in Certificate Validation.
Woonghee Lee, Junbeom Hur, Hyunsoo Kwon
2025Deep Learning from Imperfectly Labeled Malware Data.
Fahad Alotaibi, Euan Goodbrand, Sergio Maffeis
2025Demo: Exploring Utility and Attackability Trade-offs in Local Differential Privacy.
Haoying Zhang, Abhishek K. Mishra, Héber Hwang Arcolezi
2025Demo: Reverse Engineering Android Apps with Code Coverage.
Aleksandr Pilgun
2025Demo: Stopping Production Testing: A Graphical RPKI Test-Suite.
Tobias Kirsch, Haya Schulmann, Niklas Vogel
2025Denial of Sequencing Attacks in Ethereum Layer 2 Rollups.
Zihao Li, Zhiyuan Sun, Zheyuan He, Jinzhao Chu, Hao Zhou, Xiapu Luo, Ting Chen, Yinqian Zhang
2025Deprivileging Low-Level GPU Drivers Efficiently with User-Space Processes and CHERI Compartments.
Paul Metzger, A. Theodore Markettos, Edward Tomasz Napierala, Matthew Naylor, Robert N. M. Watson, Timothy M. Jones
2025Differentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?
Daniel Pöllmann, Tianxin Tang
2025Differentiation-Based Extraction of Proprietary Data from Fine-Tuned LLMs.
Zongjie Li, Daoyuan Wu, Shuai Wang, Zhendong Su
2025Digital Safety for Children with Intellectual Disabilities When Using Mobile Devices from Parents' and Teachers' Perspectives.
Janice Jianing Si, Xin Lin, Haorui Cui, Xiaobo Zhou, Kanye Ye Wang
2025Disa: Accurate Learning-based Static Disassembly with Attentions.
Peicheng Wang, Monika Santra, Mingyu Liu, Cong Sun, Dongrui Zeng, Gang Tan
2025Discovering and Exploiting IoT Device Hidden Attributes: A New Vulnerability in Smart Homes.
Xuening Xu, Chenglong Fu, Xiaojiang Du, Bo Luo
2025Dissertation Research Description: The Potential of SBOMs to Increase Software Supply Chain Security.
Lukas Gehrke
2025Distance-Aware OT with Application to Fuzzy PSI.
Lucas Piske, Jaspal Singh, Ni Trieu, Vladimir Kolesnikov, Vassilis Zikas
2025DivTrackee versus DynTracker: Promoting Diversity in Anti-Facial Recognition against Dynamic FR Strategy.
Wenshu Fan, Minxing Zhang, Hongwei Li, Wenbo Jiang, Hanxiao Chen, Xiangyu Yue, Michael Backes, Xiao Zhang
2025DiveFuzz: Enhancing CPU Fuzzing via Diverse Instruction Construction.
Zihui Guo, Miaomiao Yuan, Yanqi Yang, Liwei Chen, Gang Shi, Dan Meng
2025Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites.
Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger, Aaron Schulman
2025Don't Panic! Finding Bugs Hidden Behind Rust Runtime Safety Checks.
Zeyang Zhuang, Zilun Wang, Wei Meng, Michael R. Lyu
2025Dynamic Detection of Vulnerable DMA Race Conditions.
Brian Johannesmeyer, Raphael Isemann, Cristiano Giuffrida, Herbert Bos
2025Dynamic Vulnerability Patching for Heterogeneous Embedded Systems Using Stack Frame Reconstruction.
Ming Zhou, Xupu Hu, Zhihao Wang, Haining Wang, Hui Wen, Limin Sun, Peng Zhang
2025Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments.
Min Xie, Zhengzhou Tu, Man Ho Au, Junbin Fang, Xuan Wang, Zoe Lin Jiang
2025Efficient Fuzzy PSI Based on Prefix Representation.
Chengrui Dang, Xv Zhou, Bei Liang
2025Elastic Restaking Networks: United we fall, (partially) divided we stand.
Roi Bar Zur, Ittay Eyal
2025Empirical Security Analysis of Software-based Fault Isolation through Controlled Fault Injection.
Nils Bars, Lukas Bernhard, Moritz Schloegel, Thorsten Holz
2025Empowering Parents to Support Children's Online Security and Privacy: Findings from a Randomized Controlled Trial.
Xiaowei Chen, Verena Distler, Chloe Gordon, Yaxing Yao, Ziwen Teuber
2025Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSD.
Weidong Zhu, Carson Stillman, Sara Rampazzi, Kevin R. B. Butler
2025Encrypted Matrix-Vector Products from Secret Dual Codes.
Fabrice Benhamouda, Caicai Chen, Shai Halevi, Yuval Ishai, Hugo Krawczyk, Tamer Mour, Tal Rabin, Alon Rosen
2025End-to-End Encrypted Git Services.
Ya-Nan Li, Yaqing Song, Qiang Tang, Moti Yung
2025Enhanced Web Application Security Through Proactive Dead Drop Resolver Remediation.
Jonathan Fuller, Mingxuan Yao, Saumya Agarwal, Srimanta Barua, Taleb Hirani, Amit Kumar Sikder, Brendan Saltaformaggio
2025Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components.
Yunpeng Tian, Feng Dong, Junhai Wang, Mu Zhang, Zhiniang Peng, Zesen Ye, Xiapu Luo, Haoyu Wang
2025Ethics in Computer Security Research: A Data-Driven Assessment of the Past, the Present, and the Possible Future.
Harshini Sri Ramulu, Helen Schmitt, Bogdan Rerich, Rachel Gonzalez Rodriguez, Tadayoshi Kohno, Yasemin Acar
2025Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks.
Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini
2025Exact Robustness Certification of k-Nearest Neighbors.
Francesco Ranzato, Ahmad Shakeel, Marco Zanella
2025ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs.
Fabian Thomas, Michael Torres, Daniel Moghimi, Michael Schwarz
2025Exploiting the Shared Storage API.
Alexandra Nisenoff, Deian Stefan, Nicolas Christin
2025Exploring and Analyzing Cross Layer DoS Attack Against UDP-based Services on Linux.
Dashuai Wu, Yunyi Zhang, Baojun Liu, Xiang Li, Eihal Alowaisheq, Haixin Duan
2025Exploring the Janus Face of Synthetic Images: From Privacy-secure Biometrics Applications to Deepfake Detection for Misinformation-Free Social Networks.
Tanusree Ghosh
2025Exposing Privacy Risks in Anonymizing Clinical Data: Combinatorial Refinement Attacks on
Somiya Chhillar, Mary K. Righi, Rebecca E. Sutter, Evgenios M. Kornaropoulos
2025Exposing the Roots of DNS Abuse: A Data-Driven Analysis of Key Factors Behind Phishing Domain Registrations.
Yevheniya Nosyk, Maciej Korczynski, Carlos Gañán, Sourena Maroofi, Jan Bayer, Zul Odgerel, Samaneh Tajalizadehkhoob, Andrzej Duda
2025Fast Amortized Bootstrapping with Small Keys and Polynomial Noise Overhead.
Antonio Guimarães, Hilder V. L. Pereira
2025Fast Homomorphic Evaluation of LWR-based PRFs.
Amit Deo, Marc Joye, Benoît Libert, Benjamin R. Curtis, Mayeul de Bellabre
2025FilterFL: Knowledge Filtering-based Data-Free Backdoor Defense for Federated Learning.
Yanxin Yang, Ming Hu, Xiaofei Xie, Yue Cao, Pengyu Zhang, Yihao Huang, Mingsong Chen
2025Finding SSH Strict Key Exchange Violations by State Learning.
Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, Jörg Schwenk
2025Fingerprinting Deep Packet Inspection Devices by their Ambiguities.
Diwen Xue, Armin Huremagic, Wayne Wang, Ram Sundara Raman, Roya Ensafi
2025Fingerprinting SDKs for Mobile Apps and Where to Find Them: Understanding the Market for Device Fingerprinting.
Michael A. Specter, Mihai Christodorescu, Abbie Farr, Bo Ma, Robin Lassonde
2025FlexEmu: Towards Flexible MCU Peripheral Emulation.
Chongqing Lei, Zhen Ling, Xiangyu Xu, Shaofeng Li, Guangchi Liu, Kai Dong, Junzhou Luo
2025FlippedRAG: Black-Box Opinion Manipulation Adversarial Attacks to Retrieval-Augmented Generation Models.
Zhuo Chen, Yuyang Gong, Jiawei Liu, Miaokun Chen, Haotan Liu, Qikai Cheng, Fan Zhang, Wei Lu, Xiaozhong Liu
2025FlowSentry: Accelerating NetFlow-based DDoS Detection.
Xiaoyu He, Xiaohui Xie, Xin Wang, Lei Zhang, Kun Xie, Lin Chen, Yong Cui
2025ForeDroid: Scenario-Aware Analysis for Android Malware Detection and Explanation.
Jiaming Li, Sen Chen, Chunlian Wu, Yuxin Zhang, Lingling Fan
2025Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon.
Ábel Nagy, János Tapolcai, István András Seres, Bence Ladóczki
2025Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust.
Karthikeyan Bhargavan, Lasse Letager Hansen, Franziskus Kiefer, Jonas Schneider-Bensch, Bas Spitters
2025Formally Verified Correctness Bounds for Lattice-Based Cryptography.
Manuel Barbosa, Matthias J. Kannwischer, Thing-Han Lim, Peter Schwabe, Pierre-Yves Strub
2025Forward to Hell? On the Potentials of Misusing Transparent DNS Forwarders in Reflective Amplification Attacks.
Maynard Koch, Florian Dolzmann, Thomas C. Schmidt, Matthias Wählisch
2025Founding Zero-Knowledge Proof of Training on Optimum Vicinity.
Gefei Tan, Adrià Gascón, Sarah Meiklejohn, Mariana Raykova, Xiao Wang, Ning Luo
2025From OT to OLE with Subquadratic Communication.
Jack Doerner, Iftach Haitner, Yuval Ishai, Nikolaos Makriyannis
2025Fuzzing Processing Pipelines for Zero-Knowledge Circuits.
Christoph Hochrainer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis
2025Fuzzy Extractors are Practical: Cryptographic Strength Key Derivation from the Iris.
Amey Shukla, Luke Demarest, Benjamin Fuller, Sohaib Ahmad, Caleb Manicke, Alexander Russell, Sixia Chen
2025GAPDiS: Gradient-Assisted Perturbation Design via Sequence Editing for Website Fingerprinting Defense.
Ruotian Xie, Kun Xie, Pengcheng Zhao, Jiajun He, Xin Zeng, Jigang Wen, Yong Xie, Wei Liang, Gaogang Xie
2025GASLITEing the Retrieval: Exploring Vulnerabilities in Dense Embedding-based Search.
Matan Ben-Tov, Mahmood Sharif
2025GPU Travelling: Efficient Confidential Collaborative Training with TEE-Enabled GPUs.
Shixuan Zhao, Zhongshu Gu, Salman Ahmed, Enriquillo Valdez, Hani Jamjoom, Zhiqiang Lin
2025Generalized Security-Preserving Refinement for Concurrent Systems.
Huan Sun, David Sanán, Jingyi Wang, Yongwang Zhao, Jun Sun, Wenhai Wang
2025Generic Anonymity Wrapper for Messaging Protocols.
Lea Thiemt, Paul Rösler, Alexander Bienstock, Rolfe Schmidt, Yevgeniy Dodis
2025GhostCache: Timer- and Counter-Free Cache Attacks Exploiting Weak Coherence on RISC-V and ARM Chips.
Yu Jin, Minghong Sun, Dongsheng Wang, Pengfei Qiu, Yinqian Zhang, Shuwen Deng
2025Gibbon: Faster Secure Two-party Training of Gradient Boosting Decision Tree.
Lichun Li, Zecheng Wu, Yuan Zhao, Zhihao Li, Wen-jie Lu, Shan Yin
2025Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection.
Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao
2025Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS.
Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, Taeyeong Noh
2025HAIPS '25: First ACM CCS Workshop on Human-Centered AI Privacy and Security.
Tianshi Li, Toby Jia-Jun Li, Yaxing Yao, Sauvik Das
2025HW-Spy: Handwriting Inference by Tracing Pen-Tail Movements.
Long Huang, Kang G. Shin
2025Hardening Deep Neural Network Binaries against Reverse Engineering Attacks.
Zheng Zhong, Ruoyu Wu, Junpeng Wan, Muqi Zou, Dave (Jing) Tian
2025Hardware-assisted Memory Isolation.
Hongyi Lu
2025Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization.
Shuangqing Xu, Yifeng Zheng, Zhongyun Hua
2025Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication.
Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
2025Head(er)s Up! Detecting Security Header Inconsistencies in Browsers.
Jannis Rautenstrauch, Trung Tin Nguyen, Karthik Ramakrishnan, Ben Stock
2025Heracles: Chosen Plaintext Attack on AMD SEV-SNP.
Benedict Schlüter, Christoph Wech, Shweta Shinde
2025Here Comes the AI Worm: Preventing the Propagation of Adversarial Self-Replicating Prompts Within GenAI Ecosystems.
Stav Cohen, Ron Bitton, Ben Nassi
2025Hidden in Plain Bytes: Investigating Interpersonal Account Compromise with Data Exports.
Julia Nonnenkamp, Naman Gupta, Abhimanyu Dev Gupta, Rahul Chatterjee
2025High-Throughput Universally Composable Threshold FHE Decryption.
Guy Zyskind, Doron Zarchy, Max Leibovich, Chris Peikert
2025How Blind and Low-Vision Users Manage Their Passwords.
Alexander Ponticello, Filipo Sharevski, Simon Anell, Katharina Krombholz
2025How to Beat Nakamoto in the Race.
Shu-Jie Cao, Dongning Guo
2025How to Design Secure Honey Vault Schemes.
Zhenduo Hou, Tingwei Fan, Fei Duan, Ding Wang
2025How to Recover a Cryptographic Secret From the Cloud.
David Adei, Chris Orsini, Alessandra Scafuro, Tanner Verber
2025ILA: Correctness via Type Checking for Fully Homomorphic Encryption.
Tarakaram Gollamudi, Anitha Gollamudi, Joshua Gancher
2025IND-CPA-D of Relaxed Functional Bootstrapping: A New Attack, A General Fix, and A Stronger Model.
Zeyu Liu, Yunhao Wang, Ben Fisch
2025IOValve: Leakage-Free I/O Sandbox for Large-Scale Untrusted Data Processing.
Sangho Lee, Jules Drean, Yue Tan, Marcus Peinado
2025In the DOM We Trust: Exploring the Hidden Dangers of Reading from the DOM on the Web.
Jan Drescher, Sepehr Mirzaei, Soheil Khodayari, David Klein, Thomas Barber, Martin Johns, Giancarlo Pellegrino
2025Intent-aware Fuzzing for Android Hardened Application.
Seongyun Jeong, Minseong Choi, Haehyun Cho, Seokwoo Choi, Hyungsub Kim, Yuseok Jeon
2025Interoperable Symmetric Message Franking.
Carolina Ortega Pérez, Thomas Ristenpart, Julia Len
2025It Should Be Easy but... New Users' Experiences and Challenges with Secret Management Tools.
Lorenzo Neil, Deepthi Mungara, Laurie A. Williams, Yasemin Acar, Bradley Reaves
2025Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs.
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Lionel Blatter, Gustavo Xavier Delerue Marinho Alves, João Diogo Duarte, Benjamin Grégoire, Tiago Oliveira, Miguel Quaresma, Pierre-Yves Strub, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
2025JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation.
Guoqiang Chen, Xin Jin, Zhiqiang Lin
2025KZH-Fold: Accountable Voting from Sublinear Accumulation.
George Kadianakis, Arantxa Zapico, Hossein Hafezi, Benedikt Bünz
2025LAMPS '25: ACM CCS Workshop on Large AI Systems and Models with Privacy and Security Analysis.
Kwok-Yan Lam, Xiaoning Liu, Derui Wang, Bo Li, Wenyuan Xu, Jieshan Chen, Minhui Xue, Xingliang Yuan, Guangdong Bai, Shuo Wang
2025LZKSA: Lattice-Based Special Zero-Knowledge Proofs for Secure Aggregation's Input Verification.
Zhi Lu, Songfeng Lu
2025Layered, Overlapping, and Inconsistent: A Large-Scale Analysis of the Multiple Privacy Policies and Controls of U.S. Banks.
Lu Xian, Van Hong Tran, Lauren Lee, Meera Kumar, Yichen Zhang, Florian Schaub
2025Leaky Apps: Large-scale Analysis of Secrets Distributed in Android and iOS Apps.
David Schmidt, Sebastian Schrittwieser, Edgar R. Weippl
2025Leveraging Discrete CKKS to Bootstrap in High Precision.
Hyeongmin Choe, Jaehyung Kim, Damien Stehlé, Elias Suvanto
2025Lite-PoT: Practical Powers-of-Tau Setup Ceremony.
Lucien K. L. Ng, Pedro Moreno-Sanchez, Mohsen Minaei, Panagiotis Chatzigiannis, Adithya Bhat, Duc Viet Le
2025Local Frames: Exploiting Inherited Origins to Bypass Content Blockers.
Alisha Ukani, Hamed Haddadi, Alex C. Snoeren, Peter Snyder
2025Lock the Door But Keep the Window Open: Extracting App-Protected Accessibility Information from Browser-Rendered Websites.
Haichuan Xu, Runze Zhang, Mingxuan Yao, David Oygenblik, Yizhi Huang, Jeman Park, Brendan Saltaformaggio
2025Lodia: Towards Optimal Sparse Matrix-Vector Multiplication for Batched Fully Homomorphic Encryption.
Jiping Yu, Kun Chen, Xiaoyu Fan, Yunyi Chen, Xiaowei Zhu, Wenguang Chen
2025Logical Relations for Formally Verified Authenticated Data Structures.
Simon Oddershede Gregersen, Chaitanya Agarwal, Joseph Tassarotti
2025Looping for Good: Cyclic Proofs for Security Protocols.
Felix Linker, Christoph Sprenger, Cas Cremers, David A. Basin
2025ML-Cube: Accelerating Module-Lattice-Based Cryptography using Machine Learning Accelerators with a Memory-Less Design.
Tian Zhou, Fangyu Zheng, Zhuoyu Xie, Wenxu Tang, Guang Fan, Yijing Ning, Yi Bian, Jingqiang Lin, Jiwu Jing
2025MM4flow: A Pre-trained Multi-modal Model for Versatile Network Traffic Analysis.
Luming Yang, Lin Liu, Junjie Huang, Zhuotao Liu, Shiyu Liang, Shaojing Fu, Yongjun Wang
2025MOLE: Breaking GPU TEE with GPU-Embedded MCU.
Hongyi Lu, Yunjie Deng, J. Sukarno Mertoguno, Shuai Wang, Fengwei Zhang
2025Managing Correlations in Data and Privacy Demand.
Syomantak Chaudhuri, Thomas A. Courtade
2025May the Force
Alexandra Boldyreva, Deep Inder Mohan, Tianxin Tang
2025Measuring and Augmenting Large Language Models for Solving Capture-the-Flag Challenges.
Zimo Ji, Daoyuan Wu, Wenyuan Jiang, Pingchuan Ma, Zongjie Li, Shuai Wang
2025Mechanizing Privacy by Design.
David A. Basin, François Hublet, Srdan Krstic, Hoàng Nguyen
2025MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM.
Gilad Asharov, Eliran Eiluz, Ilan Komargodski, Wei-Kai Lin
2025Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble.
Zhiqi Wang, Chengyu Zhang, Yuetian Chen, Nathalie Baracaldo, Swanand Ravindra Kadhe, Lei Yu
2025MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking.
Tobias Kovats, Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi
2025Mining in Logarithmic Space with Variable Difficulty.
Loïc Miller, Dorian Pacaud, Nathanël Derousseaux-Lebert, Emmanuelle Anceaume, Romaric Ludinard
2025Mitigating Data Poisoning Attacks to Local Differential Privacy.
Xiaolin Li, Ninghui Li, Boyang Wang, Wenhai Sun
2025MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs.
Ruyi Ding, Tianhong Xu, Xinyi Shen, Aidong Adam Ding, Yunsi Fei
2025Mosformer: Maliciously Secure Three-Party Inference Framework for Large Transformers.
Ke Cheng, Yuheng Xia, Anxiao Song, Jiaxuan Fu, Wenjie Qu, Yulong Shen, Jiaheng Zhang
2025Multi-Party Private Set Operations from Predicative Zero-Sharing.
Minglang Dong, Yu Chen, Cong Zhang, Yujie Bai, Yang Cao
2025Needle in a Haystack: Automated and Scalable Vulnerability Hunting in the Windows ALPC Sea.
Haoyi Liu, Feng Dong, Yunpeng Tian, Mu Zhang, Xuefeng Li, Fangming Gu, Zhiniang Peng, Haoyu Wang
2025New Permutation Decomposition Techniques for Efficient Homomorphic Permutation.
Xirong Ma, Junling Fang, Chunpeng Ge, Dung Hoang Duong, Yali Jiang, Yanbin Li, Willy Susilo, Lizhen Cui
2025NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js.
Eric Cornelissen, Musard Balliu
2025Noise and Stress Don't Help With Learning: A Qualitative Study to Inform Design of Effective Cybersecurity Awareness in Manufacturing Environments.
Lina Brunken, Markus Schöps, Annalina Buckmann, Florian Meißner, M. Angela Sasse
2025OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs.
Ahmed Aly, Essam Mansour, Amr M. Youssef
2025Oedipus: LLM-enchanced Reasoning CAPTCHA Solver.
Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu
2025Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios.
Xuewei Feng, Zhaoxi Li, Qi Li, Ziqiang Wang, Kun Sun, Ke Xu
2025On Defining Reproducible Outcomes for the Computer Security Community.
Daniel Olszewski
2025On Frontrunning Risks in Batch-Order Fair Systems for Blockchains.
Eunchan Park, Taeung Yoon, Hocheol Nam, Deepak Maram, Min Suk Kang
2025On Hyperparameters and Backdoor-Resistance in Horizontal Federated Learning.
Simon Lachnit, Ghassan Karame
2025On the Feasibility of Poisoning Text-to-Image AI Models via Adversarial Mislabeling.
Stanley Wu, Ronik Bhaskar, Anna Yoo Jeong Ha, Shawn Shan, Haitao Zheng, Ben Y. Zhao
2025On the Security of SSH Client Signatures.
Fabian Bäumer, Marcus Brinkmann, Maximilian Radoy, Jörg Schwenk, Juraj Somorovsky
2025One Surrogate to Fool Them All: Universal, Transferable, and Targeted Adversarial Attacks with CLIP.
Binyan Xu, Xilin Dai, Di Tang, Kehuan Zhang
2025One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels.
Twisha Chattopadhyay, Fabricio Ceschin, Marco E. Garza, Dymytriy Zyunkin, Animesh Chhotaray, Aaron P. Stebner, Saman A. Zonouz, Raheem Beyah
2025One-Sided Bounded Noise: Theory, Optimization Algorithms and Applications.
Hanshen Xiao, Jun Wan, Elaine Shi, Srinivas Devadas
2025Optimal Mechanisms for Quantum Local Differential Privacy.
Ji Guan
2025Optimistic, Signature-Free Reliable Broadcast and Its Applications.
Nibesh Shrestha, Qianyu Yu, Aniket Kate, Giuliano Losa, Kartik Nayak, Xuechao Wang
2025PAnDA: Rethinking Metric Differential Privacy Optimization at Scale with Anchor-Based Approximation.
Ruiyao Liu, Chenxi Qiu
2025PIIxel Leaks: Passive Identification of Personally Identifiable Information Leakage through Meta Pixel.
Paschalis Bekos, Panagiotis Papadopoulos, Nicolas Kourtellis, Michalis Polychronakis
2025PLRV-O: Advancing Differentially Private Deep Learning via Privacy Loss Random Variable Optimization.
Qin Yang, Nicholas Stout, Meisam Mohammady, Han Wang, Ayesha Samreen, Christopher J. Quinn, Yan Yan, Ashish Kundu, Yuan Hong
2025PULSE: Parallel Private Set Union for Large-Scale Entities.
Jiahui Gao, Son Nguyen, Marina Blanton, Ni Trieu
2025Panther: Private Approximate Nearest Neighbor Search in the Single Server Setting.
Jingyu Li, Zhicong Huang, Min Zhang, Cheng Hong, Jian Liu, Tao Wei, Wenguang Chen
2025Parcel Mismatch Demystified: Addressing a Decade-Old Security Challenge in Android.
Sheng Cao, Hao Zhou, Songzhou Shi, Yanjie Zhao, Haoyu Wang
2025Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers.
Anuj Gautam, Tarun Kumar Yadav, Garrett Smith, Kent E. Seamons, Scott Ruoti
2025Peekaboo, I See Your Queries: Passive Attacks Against DSSE Via Intermittent Observations.
Hao Nie, Wei Wang, Peng Xu, Wei Chen, Laurence T. Yang, Mauro Conti, Kaitai Liang
2025Phalanx: An FHE-Friendly SNARK for Verifiable Computation on Encrypted Data.
Xinxuan Zhang, Ruida Wang, Zeyu Liu, Binwu Xiang, Yi Deng, Ben Fisch, Xianhui Lu
2025Phishing Susceptibility and the (In-)Effectiveness of Common Anti-Phishing Interventions in a Large University Hospital.
Jan Tolsdorf, David Langer, Luigi Lo Iacono
2025PickleBall: Secure Deserialization of Pickle-based Machine Learning Models.
Andreas D. Kellas, Neophytos Christou, Wenxin Jiang, Penghui Li, Laurent Simon, Yaniv David, Vasileios P. Kemerlis, James C. Davis, Junfeng Yang
2025PipID: Light-Pupillary Response Based User Authentication for Virtual Reality.
Muchen Pan, Yan Meng, Yuxia Zhan, Guoxing Chen, Haojin Zhu
2025Pixnapping: Bringing Pixel Stealing out of the Stone Age.
Alan Wang, Pranav Gopalkrishnan, Yingchen Wang, Christopher W. Fletcher, Hovav Shacham, David Kohlbrenner, Riccardo Paccagnella
2025PoisonSpot: Precise Spotting of Clean-Label Backdoors via Fine-Grained Training Provenance Tracking.
Philemon Hailemariam, Birhanu Eshete
2025Poisoning Attacks to Local Differential Privacy for Ranking Estimation.
Pei Zhan, Peng Tang, Yangzhuo Li, Puwen Wei, Shanqing Guo
2025Pool: A Practical OT-based OPRF from Learning with Rounding.
Alex Davidson, Amit Deo, Louis Tremblay Thibault
2025Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head.
James Hsin-yu Chiang, Ivan Damgård, William R. Duro, Sunniva Engan, Sebastian Kolby, Peter Scholl
2025Poster:
Zijing Ma, Leming Shen, Xinyu Huang, Yuanqing Zheng
2025Poster: Adaptive Gradient Clipping with Personalized Differential Privacy for Heterogeneous Federated Learning.
Hao Zhou, Hua Dai, Siqi Cai, Geng Yang, Yang Xiang
2025Poster: Adversarial Habituation Attack: A Psychological Extension and Re-framing of Boiling Frog Attack.
Tashi Stirewalt, Assefaw Hadish Gebremedhin
2025Poster: Agentic Shell Honeypot Using Structured Logging.
Kai Wei, Guangjing Wang
2025Poster: An Improved Quantum Attack on the Two-round Even-Mansour Cipher with Independent Permutations and Keys.
Rentaro Shiba, Tetsu Iwata
2025Poster: An Obfuscation Framework for Mitigating Topology Probing Attacks in Cloud-Native Systems.
Xue Leng, Kaiwen Shen, Chengxuan Zhu, Xing Li, Jianguo Sun
2025Poster: Black-box Attacks on Multimodal Large Language Models through Adversarial ICC Profiles.
Chengbin Sun, Hailong Sun, Guancheng Li, Jiashuo Liang
2025Poster: Code HarvETHter: Corpus-Driven Decompilation of Ethereum Smart Contracts.
Jens-Rene Giesen, Christian Scholz, Lucas Davi
2025Poster: Computer Security Researchers' Experiences with Vulnerability Disclosures.
Harshini Sri Ramulu, Anna Lena Rotthaler, Jost Rossel, Rachel Gonzalez Rodriguez, Dominik Wermke, Sascha Fahl, Tadayoshi Kohno, Juraj Somorovsky, Yasemin Acar
2025Poster: Decoding Social Engineering: A Multi-Level Framework for Tactic Generation, Annotation, and Evaluation.
Yicun Tian, Youyang Qu, Ming Ding, Shigang Liu, Pei-Wei Tsai, Jun Zhang
2025Poster: ERIS: Evaluating ROV via ICMPv6 Rate Limiting Side Channels.
Renrui Tian, Yahui Li, Han Zhang, Xinzhe Liu, Xia Yin, Xingang Shi, Zhiliang Wang, Jilong Wang
2025Poster: Efficient Threshold ML-DSA up to 6 Parties.
Sofía Celi, Rafaël del Pino, Thomas Espitau, Guilhem Niot, Thomas Prest
2025Poster: Exploring the Landscape of RPKI Relying Parties.
Donika Mirdita, Haya Schulmann, Michael Waidner
2025Poster: GLog: Self-Evolving Log Anomaly Type Prediction via Instruction-Tuned LLM and Clustering.
Junwei Zhou, Yuyang Gao, Cheng Tan, Yanchao Yang, Jianwen Xiang
2025Poster: High-Fidelity and Contextual User Activity Memory Forensics.
Min-Chieh Wu, Jui-An Chang, Yu-Sung Wu
2025Poster: Impulse in the Clickstream: Behavioral Insights from Browsing History.
Shubham Malaviya, Anuj Bagad, Manish Shukla, Sachin Lodha
2025Poster: Inferring On-Screen Keyboard Input via Gamepad-based Mouse Movement Traces.
Gyujeong Jin, Seyoung Lee
2025Poster: Insecure Coding Habits Die Hard. Can PEFT Really Turn LLMs into Secure Coders?
Sangjun Chae, Jangseop Choi, Taeyang Kim, Eun Jung, Sanghak Oh, Hyoungshick Kim
2025Poster: Leveraging Large Language Models to Effectively and Efficiently Identify Vulnerability Patches for WordPress Plugins.
Xue Leng, Hai Zhang, Tiantian Zhu, Jianguo Sun
2025Poster: LogCADA: Cross-System Log Anomaly Detection based on Two-Stage Multi-Source Domain Adaptation.
Junwei Zhou, Ying Zhu, Linhao Wang, Jianwen Xiang, Cheng Tan, Yanchao Yang
2025Poster: LogCraft: Crafting CVE-Aware Synthetic Worlds (Logs).
Kai-Xian Wong, Chan-Jien Tan, Yi-Ting Huang, Ying-Ren Guo, Yu-Zih Jheng, Guo-Wei Wong, Meng Chang Chen
2025Poster: Longitudinal Analysis of Romance Scam Infrastructure Evolution: Evidence of Strategic Legitimization.
Nayeon Ryu, Heeyeong Suh, Seyoung Lee
2025Poster: Model-driven Privacy Analysis of Messaging Platforms.
Muqaddas Naz, Muhammad Taimoor Khan, Muhammad Waqas
2025Poster: Obfuscating Function Activity States to Enhance Privacy in Serverless Applications.
Xue Leng, Fengming Zhu, Xing Li, Ye Tian, Jianguo Sun, Yan Chen
2025Poster: PQ Noise Explorer.
Animesh Thakur, Mikael Asplund
2025Poster: PainNOVA: Privacy-Aware Voice-Based Pain-Level Detection.
Andrew Lu, Mashrafi Kajol, Wei Lu, Dean Sullivan
2025Poster: Post-Quantum Readiness in EdDSA Chains.
Kostas Kryptos Chalkias
2025Poster: Public Key Encryption with Exclusionary Subset Keyword Search from Lattices.
Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Ting-Hsiang Su
2025Poster: Randomness Unmasked: Towards Reproducible and Fair Evaluation of Shift-Aware Deep Learning NIDS.
Lucy Steele, Fahad Alotaibi, Sergio Maffeis
2025Poster: Recapture Detection Using Disparity Map Obtained from Dual-Pixel Image Sensors.
Tetsu Ishizue, Sara Rampazzi, Takeshi Sugawara
2025Poster: Reconsidering DNS-Based Domain Verification: Privacy and Overhead Implications.
Eunbee Hwang, Hyunsoo Kim, Ted Taekyoung Kwon
2025Poster: Reducing Hull Dimensions for Efficient Permutation Recovery in Code-Based Cryptography.
Keita Ishizuka
2025Poster: Scalable Privacy-Preserving Linear Regression Training via Homomorphic Encryption.
Yena Cho, Hyoungshick Kim
2025Poster: The Art of Deception: Crafting Chimera Images for Covert and Robust Semantic Poisoning Attacks.
Lin Li, Youyang Qu, Jiayang Ao, Ming Ding, Chao Chen, Jun Zhang
2025Poster: The Rocky Road Towards RPKI Algorithm Agility.
Katharina Miesch, Haya Schulmann, Niklas Vogel
2025Poster: Towards Intelligent Assurance for Autonomous AI Pentesters: Concurrent Compliance Auditing and Self-Augmentation via Execution Trace Analysis.
Gustavo Sánchez, Adam Lundqvist
2025Poster: We must talk about RPKI Repositories.
Haya Schulmann, Niklas Vogel
2025Poster: When Logs Misbehave: Retrieving Known APTs from Noisy Graphs.
Guo-Wei Wong, Yi-Ting Huang, Ying-Ren Guo, Ming-Chuan Yang, Shou-De Lin, Wang-Chien Lee, Meng Chang Chen
2025Posterior Security: Anonymity and Message Hiding of Standard Signatures.
Tsz Hon Yuen, Ying-Teng Chen, Shimin Pan, Jiangshan Yu, Joseph K. Liu
2025Postmortem Voice Cloning: Individuals Perspectives of Ownership and Deceptive Harms.
Jennifer Vander Loop
2025Practical TFHE Ciphertext Sanitization for Oblivious Circuit Evaluation.
Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025Practical Zero-Knowledge PIOP for Maliciously Secure Multiparty Homomorphic Encryption.
Intak Hwang, Hyeonbum Lee, Jinyeong Seo, Yongsoo Song
2025PreferCare: Preference Dataset Copyright Protection in LLM Alignment by Watermark Injection and Verification.
Jian Lou, Chenyang Zhang, Xiaoyu Zhang, Kai Wu
2025Privacy-Preserving Runtime Verification.
Thomas A. Henzinger, Mahyar Karimi, K. S. Thejaswini
2025Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees.
Marc Fischlin, Moritz Huppert, Sam A. Markelon
2025Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025
Chun-Ying Huang, Jyh-Cheng Chen, Shiuh-Pyng Shieh, David Lie, Véronique Cortier
2025PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language Models.
Yuwei Liu, Junquan Deng, Xiangkun Jia, Yanhao Wang, Minghua Wang, Lin Huang, Tao Wei, Purui Su
2025Prompt Inference Attack on Distributed Large Language Model Inference Frameworks.
Xinjian Luo, Ting Yu, Xiaokui Xiao
2025Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks.
Moritz Bley, Tobias Scharnowski, Simon Wörner, Moritz Schloegel, Thorsten Holz
2025Protocols to Code: Formal Verification of a Secure Next-Generation Internet Router.
João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David A. Basin, Peter Müller, Adrian Perrig
2025Prototype Surgery: Tailoring Neural Prototypes via Soft Labels for Efficient Machine Unlearning.
Gaoyang Liu, Xijie Wang, Zixiong Wang, Chen Wang, Ahmed M. Abdelmoniem, Desheng Wang
2025Provable Repair of Deep Neural Network Defects by Preimage Synthesis and Property Refinement.
Jianan Ma, Jingyi Wang, Qi Xuan, Zhen Wang
2025QRSec 2025: ACM CCS First Workshop on Quantum-Resistant Cryptography and Security.
Ashish Kundu, Attila A. Yavuz, Cristina Nita-Rotaru
2025QSec '25: Workshop on Quantum Security and Privacy.
Muhammad Taqi Raza, Jakub Szefer
2025QV-net: Decentralized Self-Tallying Quadratic Voting with Maximal Ballot Secrecy.
Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng, Zulkarnaim Masyhur
2025Quantifying Security Training in Organizations Through the Analysis of U.S. SEC 10-K Filings.
Jonas Hielscher, Maximilian Golla
2025RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models.
Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun
2025RICSS'25: 3rd International Workshop on Re-design Industrial Control Systems with Security.
Ruimin Sun, Mu Zhang
2025RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs.
Fabian Thomas, Eric García Arribas, Lorenz Hetterich, Daniel Weber, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
2025RMPocalypse: How a Catch-22 Breaks AMD SEV-SNP.
Benedict Schlüter, Shweta Shinde
2025RVISmith: Fuzzing Compilers for RVV Intrinsics.
Yibo He, Cunjian Huang, Xianmiao Qu, Hongdeng Chen, Wei Yang, Tao Xie
2025Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience.
Yizhong Liu, Andi Liu, Zhuocheng Pan, Yuxuan Hu, Jianwei Liu, Song Bian, Yuan Lu, Zhenyu Guan, Dawei Li, Meikang Qiu
2025RebirthDay Attack: Reviving DNS Cache Poisoning with the Birthday Paradox.
Xiang Li, Mingming Zhang, Zuyao Xu, FaSheng Miao, Yuqi Qiu, Baojun Liu, Jia Zhang, Xiaofeng Zheng, Haixin Duan, Zheli Liu, Yunhai Zhang, Dunqiu Fan
2025Recover Function Signature from Combined Constraints.
Haohui Huang, Yue Liu, Yuxi Cheng, Haiyang Wei, Jiamu Liu, Yu Wang, Linzhang Wang
2025Refined TFHE Leveled Homomorphic Evaluation and Its Application.
Ruida Wang, Jincheol Ha, Xuan Shen, Xianhui Lu, Chunling Chen, Kunpeng Wang, Jooyoung Lee
2025Removal Attack and Defense on AI-generated Content Latent-based Watermarking.
De Zhang Lee, Han Fang, Hanyi Wang, Ee-Chien Chang
2025Rethinking Machine Unlearning in Image Generation Models.
Renyang Liu, Wenjie Feng, Tianwei Zhang, Wei Zhou, Xueqi Cheng, See-Kiong Ng
2025Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing System.
Rui Zhao, Muhammad Shoaib, Viet Tung Hoang, Wajih Ul Hassan
2025Revisiting Keyed-Verification Anonymous Credentials.
Michele Orrù
2025Reviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata Fields.
Hao Zhang, Jian Liu, Jie Lu, Shaomin Chen, Tianshuo Han, Bolun Zhang, Xiaorui Gong
2025Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation.
Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr
2025Right the Ship: Assessing the Legitimacy of Invalid Routes in RPKI.
Andong Chen, Yangyang Wang, Jia Zhang, Mingwei Xu
2025RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing.
Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2025S2S-SED: A Speech-to-Speech Approach for Detection of Social Engineering Attacks in Audio Conversations.
Leonardo Erlacher
2025SCOPE: Expanding Client-Side Post-Processing for Efficient Privacy-Preserving Model Inference.
Shenchen Zhu, Kai Chen, Yue Zhao, Cheng'an Wei
2025SCORED '25: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Aditya Sirish A Yelgundhalli, Behnaz Hassanshahi, Dennis Roellke, Drew Davidson, Kathleen Moriarty, Lorenzo De Carli, Marcela S. Melara, Santiago Torres-Arias, Sarah Evans, Yuchen Zhang
2025SISTAR: An Efficient DDoS Detection and Mitigation Framework Utilizing Programmable Data Planes.
Junjie Hu, Feng Guo, Qihang Zhou, Yixin Zhang, Zibo Gao, Yinglong Han, Zhiqiang Lv
2025SURE '25: The 1st ACM Workshop on Software Understanding and Reverse Engineering.
Zion Leonahenahe Basque, Ati Priya Bajaj
2025SaTS '25: The 3rd ACM Workshop on Security and Privacy of AI-Empowered Mobile Super Apps.
Luyi Xing, Yue Xiao
2025Sabot: Efficient and Strongly Anonymous Bootstrapping of Communication Channels.
Christoph Coijanovic, Laura Hetz, Kenneth G. Paterson, Thorsten Strufe
2025SafeGuider: Robust and Practical Content Safety Control for Text-to-Image Models.
Peigui Qi, Kunsheng Tang, Wenbo Zhou, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang
2025Safeguarding Graph Neural Networks against Topology Inference Attacks.
Jie Fu, Yuan Hong, Zhili Chen, Wendy Hui Wang
2025Same Script, Different Behavior: Characterizing Divergent JavaScript Execution Across Different Device Platforms.
Ahsan Zafar, Junhua Su, Sohom Datta, Alexandros Kapravelos, Anupam Das
2025Scalable Cryptography for Trustworthy Machine Learning in the LLM Era.
Gefei Tan
2025ScannerGrouper: A Generalizable and Effective Scanning Organization Identification System Toward the Open World.
Xin He, Enhuan Dong, Jiyuan Han, Zhiliang Wang, Hui Zhang, Liang Liu, Lianyi Sun, Supei Zhang, Pengfei Xue, Guanglei Song, Han Li, Xiaowen Quan, Jiahai Yang
2025SecAlign: Defending Against Prompt Injection with Preference Optimization.
Sizhe Chen, Arman Zharmagambetov, Saeed Mahloujifar, Kamalika Chaudhuri, David A. Wagner, Chuan Guo
2025Secure Noise Sampling for Differentially Private Collaborative Learning.
Olive Franzese, Congyu Fang, Radhika Garg, Xiao Wang, Somesh Jha, Nicolas Papernot, Adam Dziedzic
2025Secure Parsing and Serializing with Separation Logic Applied to CBOR, CDDL, and COSE.
Tahina Ramananandro, Gabriel Ebner, Guido Martínez, Nikhil Swamy
2025Securing Cryptographic Software via Typed Assembly Language.
Shixin Song, Tingzhen Dong, Kosi Nwabueze, Julian Zanders, Andres Erbsen, Adam Chlipala, Mengjia Yan
2025Securing Mixed Rust with Hardware Capabilities.
Jason Z. Yu, Fangqi Han, Kaustab Choudhury, Trevor E. Carlson, Prateek Saxena
2025Security Analysis of Privately Verifiable Privacy Pass.
Konrad Hanff, Anja Lehmann, Cavit Özbay
2025Security and Privacy Measurements in Cellular Networks: Novel Approaches in a Global Roaming Context.
Gabriel K. Gegenhuber
2025Security and Privacy Perceptions of Pakistani Facebook Matrimony Group Users.
Mah Jan Dorazahi, Deepthi Mungara, Yasemin Acar, Harshini Sri Ramulu
2025Security-Aware Sensor Fusion with MATE: the Multi-Agent Trust Estimator.
R. Spencer Hallyburton, Miroslav Pajic
2025Sentry: Authenticating Machine Learning Artifacts on the Fly.
Andrew Gan, Zahra Ghodsi
2025Separating Broadcast from Cheater Identification.
Yashvanth Kondi, Divya Ravi
2025ShiftPIR: An Efficient PIR System with Gravity Shifting from Client to Server.
Zihan Wang, Lutan Zhao, Ming Luo, Zhiwei Wang, Haoqi He, Wenzhe Lv, Xuan Ding, Dan Meng, Rui Hou
2025Silent Threshold Traitor Tracing & Enhancing Mempool Privacy.
Anirban Chakrabarti, Monosij Maitra, Arup Mondal, Kushaz Sehgal
2025Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes.
Bruno Kreyssig, Sabine Houy, Timothée Riom, Alexandre Bartel
2025SlicedPIR: Offloading Heavyweight Work with NTT.
Jonathan Weiss, Yossi Gilad
2025Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
Wei Qiao, Yebo Feng, Teng Li, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu
2025Split Unlearning.
Yanna Jiang, Guangsheng Yu, Qin Wang, Xu Wang, Baihe Ma, Caijun Sun, Wei Ni, Ren Ping Liu
2025Styled to Steal: The Overlooked Attack Surface in Email Clients.
Leon Trampert, Daniel Weber, Christian Rossow, Michael Schwarz
2025Subversion-resilient Key-exchange in the Post-quantum World.
Kévin Duverger, Pierre-Alain Fouque, Charlie Jacomme, Guilhem Niot, Cristina Onete
2025Surpassing the Word Size Limitation of TFHE with Noise Calibration.
Takumi Nishimura, Kazunari Tozawa, Kunihiko Sadakane
2025Swallow: A Transfer-Robust Website Fingerprinting Attack via Consistent Feature Learning.
Meng Shen, Jinhe Wu, Junyu Ai, Qi Li, Chenchen Ren, Ke Xu, Liehuang Zhu
2025SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
Elizabeth C. Crites, Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh
2025Sylva: Tailoring Personalized Adversarial Defense in Pre-trained Models via Collaborative Fine-tuning.
Tianyu Qi, Lei Xue, Yufeng Zhan, Xiaobo Ma
2025Synthesis of Sound and Precise Leakage Contracts for Open-Source RISC-V Processors.
Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri
2025Systematic Assessment of Tabular Data Synthesis.
Yuntao Du, Ninghui Li
2025SyzParam: Incorporating Runtime Parameters into Kernel Driver Fuzzing.
Yue Sun, Yan Kang, Chenggang Wu, Kangjie Lu, Jiming Wang, Xingwei Li, Yuhao Hu, Jikai Ren, Yuanming Lai, Mengyao Xie, Zhe Wang
2025SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution.
Yu Hao, Juefei Pu, Xingyu Li, Zhiyun Qian, Ardalan Amiri Sani
2025TEMPEST-LoRa: Cross-Technology Covert Communication.
Xieyang Sun, Yuanqing Zheng, Wei Xi, Zuhao Chen, Zhizhen Chen, Han Hao, Zhiping Jiang, Sheng Zhong
2025THOR: Secure Transformer Inference with Homomorphic Encryption.
Jungho Moon, Dongwoo Yoo, Xiaoqian Jiang, Miran Kim
2025TensorShield: Safeguarding On-Device Inference by Shielding Critical DNN Tensors with TEE.
Tong Sun, Bowen Jiang, Hailong Lin, Borui Li, Yixiao Teng, Yi Gao, Wei Dong
2025The 20th Workshop on Programming Languages and Analysis for Security (PLAS 2025).
Abhishek Bichhawat, Jana Hofmann
2025The Challenges and Opportunities with Cybersecurity Regulations: A Case Study of the US Electric Power Sector.
Sena Sahin, Burak Sahin, Robin Berthier, Kate Davis, Saman A. Zonouz, Frank Li
2025The Importance of Being Discrete: Measuring the Impact of Discretization in End-to-End Differentially Private Synthetic Data.
Georgi Ganev, Meenatchi Sundaram Muthu Selva Annamalai, Sofiane Mahiou, Emiliano De Cristofaro
2025The OCH Authenticated Encryption Scheme.
Sanketh Menda, Mihir Bellare, Viet Tung Hoang, Julia Len, Thomas Ristenpart
2025The Odyssey of robots.txt Governance: Measuring Convention Implications of Web Bots in Large Language Model Services.
Jian Cui, Mingming Zha, Xiaofeng Wang, Xiaojing Liao
2025The Phantom Menace in Crypto-Based PET-Hardened Deep Learning Models: Invisible Configuration-Induced Attacks.
Yiteng Peng, Dongwei Xiao, Zhibo Liu, Zhenlan Ji, Daoyuan Wu, Shuai Wang, Juergen Rahmel
2025The Power to Never Be Wrong: Evasions and Anachronistic Attacks Against Web Archives.
Robin Kirchner, Chris Tsoukaladelis, Martin Johns, Nick Nikiforakis
2025Threat from Windshield: Vehicle Windows as Involuntary Attack Sources on Automotive Voice Assistants.
Penghao Wang, Shuo Huai, Yetong Cao, Chao Liu, Jun Luo
2025Threshold ECDSA in Two Rounds.
Yingjie Lyu, Zengpeng Li, Hong-Sheng Zhou, Xudong Deng
2025Tide: An Efficient Kernel-level Isolation Execution Environment on AArch64 via Dynamically Adjusting Output Address Size.
Shiyang Zhang, Chenggang Wu, Chengxuan Hou, Jinglin Lv, Yinqian Zhang, Qianyu Guo, Yuanming Lai, Mengyao Xie, Yan Kang, Zhe Wang
2025Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction Fee.
Shan Wang, Ming Yang, Yu Liu, Yue Zhang, Shuaiqing Zhang, Zhen Ling, Jiannong Cao, Xinwen Fu
2025Timing Attacks on Differential Privacy are Practical.
Zachary Ratliff, Nicolás Berrios, James Mickens
2025Toss: Garbled PIR from Table-Only Stacking.
Lucien K. L. Ng, Vladimir Kolesnikov
2025Towards Backdoor Stealthiness in Model Parameter Space.
Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Stjepan Picek
2025Towards Explainable and Effective Anti-Money Laundering for Cryptocurrency.
Qishuang Fu
2025Towards Explainable and Robust Deepfake Detection and Attribution: Enhancing Multimedia Forensics for the Next Generation of Synthetic Media.
Raphael Antonius Frick
2025Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous Driving.
Yan Zhang, Zihao Liu, Yi Zhu, Chenglin Miao
2025Towards Solving Real-world Problems of Post-quantum Cryptography.
Suparna Kundu
2025Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2.
Louis Tremblay Thibault, Michael Walter
2025Towards a Formal Foundation for Blockchain ZK Rollups.
Stefanos Chaliasos, Denis Firsov, Benjamin Livshits
2025Training Robust Classifiers for Classifying Encrypted Traffic under Dynamic Network Conditions.
Yuqi Qing, Qilei Yin, Xinhao Deng, Xiaoli Zhang, Peiyang Li, Zhuotao Liu, Kun Sun, Ke Xu, Qi Li
2025Training with Only 1.0 ‰ Samples: Malicious Traffic Detection via Cross-Modality Feature Fusion.
Chuanpu Fu, Qi Li, Elisa Bertino, Ke Xu
2025Trout: Two-Round Threshold ECDSA from Class Groups.
Hila Dahari-Garbian, Ariel Nof, Luke Parker
2025Turning Uncertainty into Efficiency: Toward Practical, Quantum-Resistant Verifiable Privacy Tools.
Jie Xu
2025Uncovering Hidden Paths in 5G: Exploiting Protocol Tunneling and Network Boundary Bridging.
Altaf Shaik, Robert Jaschek, Jean-Pierre Seifert
2025Unmask Tampering: Efficient Document Tampering Localization under Recapturing Attacks with Real Distortion Knowledge.
Changsheng Chen, Wenyu Chen, Yinyin Lin, Bin Li, Jiwu Huang
2025UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images.
Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang
2025Updatable aPAKE: Security Against Bulk Precomputation Attacks.
Dennis Dayanikli, Anja Lehmann
2025Validating Interior Gateway Routing Protocols via Equivalent Topology Synthesis.
Bing Shui, Yufan Zhou, Jielun Wu, Baowen Xu, Qingkai Shi
2025Velox: Scalable Fair Asynchronous MPC from Lightweight Cryptography.
Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Daniel Pöllmann, Yifan Song
2025VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier.
David Oygenblik, Abhinav Vemulapalli, Animesh Agrawal, Debopam Sanyal, Alexey Tumanov, Brendan Saltaformaggio
2025WAHC 2025: 13th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.
Flávio Bergamaschi, Yuriy Polyakov, Kurt Rohloff
2025WATCH '25: First Workshop on Analytics, Telemetry, and Cybersecurity for HPCC.
Massimo Cafaro, Eric Chan-Tin, Jerry Chou, Jinoh Kim
2025WPC: Weight Plaintext Compression for CNN Inference based on RNS-CKKS.
Guiming Shi, Yuchen Wei, Shengyu Fan, Xianglong Deng, Liang Kong, Xianbin Li, Jingwei Cai, Shuwen Deng, Mingzhe Zhang, Kaisheng Ma
2025WPES '25: 24th Workshop on Privacy in the Electronic Society.
Jianying Zhou
2025Walking The Last Mile: Studying Decompiler Output Correction in Practice.
Joshua Wiedemeier, Simon Klancher, Joel Flores, Max Zheng, Jaehyun Park, Sang Kil Cha, Kangkook Jee
2025Wanilla: Sound Noninterference Analysis for WebAssembly.
Markus Scherer, Jeppe Fredsgaard Blaabjerg, Alexander Sjösten, Matteo Maffei
2025What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System.
Johnny So, Michael Ferdman, Nick Nikiforakis
2025What Lurks Within? Concept Auditing for Shared Diffusion Models at Scale.
Xiaoyong (Brian) Yuan, Xiaolong Ma, Linke Guo, Lan Zhang
2025What's Pulling the Strings? Evaluating Integrity and Attribution in AI Training and Inference through Concept Shift.
Jiamin Chang, Haoyang Li, Hammond Pearce, Ruoxi Sun, Bo Li, Minhui Xue
2025WhisperTest: A Voice-Control-based Library for iOS UI Automation.
Zahra Moti, Tom Janssen-Groesbeek, Steven Monteiro, Andrea Continella, Gunes Acar
2025Windows plays Jenga: Uncovering Design Weaknesses in Windows File System Security.
Dong-uk Kim, Junyoung Park, Sanghak Oh, Hyoungshick Kim, Insu Yun
2025WireTap: Breaking Server SGX via DRAM Bus Interposition.
Alexander Seto, Oytun Kuday Duran, Samy Amer, Jalen Chuang, Stephan van Schaik, Daniel Genkin, Christina Garman
2025You Can't Steal Nothing: Mitigating Prompt Leakages in LLMs via System Vectors.
Bochuan Cao, Changjiang Li, Yuanpu Cao, Yameng Ge, Ting Wang, Jinghui Chen
2025YouthSafe: A Youth-Centric Safety Benchmark and Safeguard Model for Large Language Models.
Yaman Yu, Yiren Liu, Yuqi Zhang, Yun Huang, Yang Wang
2025ZVDetector: State-Guided Vulnerability Detection System for Zigbee Devices.
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Jiaqi Bai
2025Zero-Knowledge AI Inference with High Precision.
Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo, Thang Hoang
2025free5GC '25: The 1st free5GC World Forum.
Jyh-Cheng Chen, K. K. Ramakrishnan
2025mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order.
Suparna Kundu, Quinten Norga, Angshuman Karmakar, Uttam Kumar Ojha, Anindya Ganguly, Ingrid Verbauwhede