| 2025 | 10th IEEE European Symposium on Security and Privacy, EuroS&P 2025, Venice, Italy, June 30 - July 4, 2025 |
| 2025 | A Formal Security Analysis of Hyperledger AnonCreds. Ashley Fraser, Steve Schneider |
| 2025 | A Systematic Study of Practical & Formal Privacy in the 5G AKMA Procedure. Ioana Boureanu, Stephan Wesemeyer, Fortunat Rajaona, Steve Schneider, Helen Treharne |
| 2025 | AceCov: Auxiliary Composite Edge Coverage for Fuzzing. Haruki Yoshida, Yuichi Sugiyama, Ryota Shioya |
| 2025 | Active Attribute Inference Against Well-Generalized Models In Federated Learning. Catarina Gomes, Ricardo Mendes, João P. Vilela |
| 2025 | All that Glitters is not Gold: Uncovering Exposed Industrial Control Systems and Honeypots in the Wild. Martin Mladenov, László Erdodi, Georgios Smaragdakis |
| 2025 | Attacking and Fixing the Android Protected Confirmation Protocol. Myrto Arapinis, Vincent Danos, Maïwenn Racouchot, David A. R. Robin, Thomas Zacharias |
| 2025 | Beneath the Surface: An Analysis of OEM Customizations on the Android TLS Protocol Stack. Vinuri Bandara, Stijn Pletinckx, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna, Juan Tapiador, Narseo Vallina-Rodriguez |
| 2025 | Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design. Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, Hong-Sheng Zhou |
| 2025 | CHARON: Polyglot Code Analysis for Detecting Vulnerabilities in Scripting Languages Native Extensions. Raoul Scholtes, Soheil Khodayari, Cristian-Alexandru Staicu, Giancarlo Pellegrino |
| 2025 | CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models. Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao |
| 2025 | CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2. Marco Casagrande, Daniele Antonioli |
| 2025 | Caiba: Multicast Source Authentication for CAN Through Reactive Bit Flipping. Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze |
| 2025 | Can You Hear Me? A First Study of VoIP Censorship Techniques in Saudi Arabia and the UAE. Friedemann Lipphardt, Anja Feldmann, Devashish Gosain |
| 2025 | Commitment Attacks on Ethereum's Reward Mechanism. Roozbeh Sarenche, Ertem Nusret Tas, Barnabé Monnot, Caspar Schwarz-Schilling, Bart Preneel |
| 2025 | CovFUZZ: Coverage-based fuzzer for 4G&5G protocols. Ilja Siros, Dave Singelée, Bart Preneel |
| 2025 | Cryptographic Commitments on Anonymizable Data. Xavier Bultel, Céline Chevalier, Charlène Jojon, Diandian Liu, Benjamin Nguyen |
| 2025 | Cybersquatting in Web3: The Case of NFT. Kai Ma, Ningyu He, Jintao Huang, Bosi Zhang, Ping Wu, Haoyu Wang |
| 2025 | Deep Unlearn: Benchmarking Machine Unlearning for Image Classification. Xavier F. Cadet, Anastasia Borovykh, Mohammad Malekzadeh, Sara Ahmadi-Abhari, Hamed Haddadi |
| 2025 | Demystifying the Perceptions Gap Between Designers and Practitioners in Two Security Standards. Shreyas Kumar, Evelyn Crowe, Guofei Gu |
| 2025 | Divide and Conquer: Introducing Partial Multi-Variant Execution. Jonas Vinck, Adriaan Jacobs, Alexios Voulimeneas, Stijn Volckaert |
| 2025 | Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution. Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis |
| 2025 | Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. Thomas Johansson, Mustafa Khairallah, Vu Nguyen |
| 2025 | Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks. Felix Klement, Alessandro Brighente, Anup Kiran Bhattacharjee, Stefano Cecconello, Fernando Kuipers, Georgios Smaragdakis, Mauro Conti, Stefan Katzenbeisser |
| 2025 | Enhancing Cybersecurity Awareness in Small and Medium Enterprises Through a User-Friendly Risk Assessment Tool. Miriam Curtin, Brian Sheehan, Melanie Gruben, Gillian O'Carroll, Hazel Murray |
| 2025 | Exploring the Design Space for Security Warnings in Immersive Environments. Andrea Mengascini, Rebecca Weil, Annabelle Walle, Jürgen Steimle, Giancarlo Pellegrino |
| 2025 | Harmless Backdoor-based Client-side Watermarking in Federated Learning. Kaijing Luo, Ka-Ho Chow |
| 2025 | Incentivizing Security Excellence in Cyber Liability Insurance. Shreyas Kumar, Paula deWitte, Guofei Gu |
| 2025 | Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications. Syed Mahbub Hafiz, Bahattin Yildiz, Marcos A. Simplício Jr., Thales B. Paiva, Henrique S. Ogawa, Gabrielle De Micheli, Eduardo Lopes Cominetti |
| 2025 | KubeKeeper: Protecting Kubernetes Secrets Against Excessive Permissions. Maryam Rostamipoor, AliAkbar Sadeghi, Michalis Polychronakis |
| 2025 | LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation. Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos |
| 2025 | Latte: Layered Attestation for Portable Enclaved Applications. Haoxuan Xu, Jia Xiang, Zhen Huang, Guoxing Chen, Yan Meng, Haojin Zhu |
| 2025 | LeapFrog: The Rowhammer Instruction Skip Attack. Andrew J. Adiletta, M. Caner Tol, Kemal Derya, Berk Sunar, Saad Islam |
| 2025 | LegoLog: A configurable transparency log. Vivian Fang, Emma Dauterman, Akshay Ravoor, Akshit Dewan, Raluca Ada Popa |
| 2025 | LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing. Elia Geretto, Andrea Jemmett, Cristiano Giuffrida, Herbert Bos |
| 2025 | MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning. Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach |
| 2025 | Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors. Truong Son Nguyen, Tancrède Lepoint, Ni Trieu |
| 2025 | Not in The Prophecies: Practical Attacks on Nostr. Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe |
| 2025 | O'MINE: A Novel Collaborative DDoS Detection Mechanism for Programmable Data-Planes. Enkeleda Bardhi, Chenxing Ji, Ali Imran, Muhammad Shahbaz, Riccardo Lazzeretti, Mauro Conti, Fernando Kuipers |
| 2025 | On the Lack of Robustness of Binary Function Similarity Systems. Gianluca Capozzi, Tong Tang, Jie Wan, Ziqi Yang, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Lorenzo Cavallaro, Leonardo Querzoni |
| 2025 | Pfuzzer: Practical, Sound, and Effective Multi-path Analysis of Environment-sensitive Malware with Coverage-guided Fuzzing. Nicola Bottura, Daniele Cono D'Elia, Leonardo Querzoni |
| 2025 | Port Forwarding Services Are Forwarding Security Risks. Haoyuan Wang, Yue Xue, Xuan Feng, Chao Zhou, Xianghang Mi |
| 2025 | PreFence: A Fine-Grained and Scheduling-Aware Defense Against Prefetching-Based Attacks. Till Schlüter, Nils Ole Tippenhauer |
| 2025 | Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging. Matej Bölcskei, Patrick Jattke, Johannes Wikner, Kaveh Razavi |
| 2025 | SPARK: Secure Privacy-Preserving Anonymous Swarm Attestation for In-Vehicle Networks. Wouter Hellemans, Nada El Kassem, Md Masoom Rabbani, Edlira Dushku, Liqun Chen, An Braeken, Bart Preneel, Nele Mentens |
| 2025 | Sandi: A System for Accountability. F. Betül Durak, Kim Laine, Simon Langowski, Radames Cruz Moreno |
| 2025 | Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions. Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp |
| 2025 | Sequentially Consistent Concurrent Encrypted Multimaps. Archita Agarwal, Zachary Espiritu |
| 2025 | Shaking up authenticated encryption. Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer |
| 2025 | SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet? Magdalena Steinböck, Jens Troost, Wilco Van Beijnum, Jan Seredynski, Herbert Bos, Martina Lindorfer, Andrea Continella |
| 2025 | SoK: No Goto, No Cry? The Fairy Tale of Flawless Control-Flow Structuring. Eva-Maria C. Behner, Steffen Enders, Elmar Padilla |
| 2025 | SoK: Security of EMV Contactless Payment Systems. Mahshid Mehr Nezhad, Feng Hao, Gregory Epiphaniou, Carsten Maple, Timur Yunusov |
| 2025 | SoK: Systematization and Benchmarking of Deepfake Detectors in a Unified Framework. Binh Minh Le, Jiwon Kim, Simon S. Woo, Kristen Moore, Alsharif Abuadbba, Shahroz Tariq |
| 2025 | TAPShield: Securing Trigger-Action Platforms against Strong Attackers. Mojtaba Moazen, Nicolae Paladi, Adnan Jamil Ahsan, Musard Balliu |
| 2025 | The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS. Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût |
| 2025 | The Danger of Packet Length Leakage: Off-path TCP/IP Hijacking Attacks Against Wireless and Mobile Networks. Guancheng Li, Minghao Zhang, Jianjun Chen, Ge Dai, Pinji Chen, Huiming Liu, Yang Yu, Haixin Duan, Zhiyun Qian |
| 2025 | They See Me Scooting - A Long-Term Real-World Data Analysis of Shared Micro-Mobility Services and their Privacy Leakage. Karina Elzer, Eric Jedermann, Stefanie Roos, Jens B. Schmitt |
| 2025 | WWXSS: Systematic Study, and Large-Scale Measurement of Cross-Site Scripting (XSS) in Web Workers Contexts. Dolière Francis Somé |
| 2025 | You Can't Trust Your Tag Neither: Privacy Leaks and Potential Legal Violations within the Google Tag Manager. Gilles Mertens, Nataliia Bielova, Vincent Roca, Cristiana Teixeira Santos |
| 2025 | Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data. Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Andrea Valori |
| 2025 | openIPE: An Extensible Memory Isolation Framework for Microcontrollers. Marton Bognar, Jo Van Bulck |