| 2026 | Information Security - 28th International Conference, ISC 2025, Seoul, South Korea, October 20-22, 2025, Proceedings Sang Kil Cha, Jeongeun Park |
| 2025 | A Graph-Based Approach to Alert Contextualisation in Security Operations Centres. Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov |
| 2025 | A Lot of Data and Added Complexity. How Does PQC Affect the Performance of My TLS Connection? Johanna Henrich, Nicolai Schmitt, Nouri Alnahawi, Andreas Heinemann |
| 2025 | A New Code-Based Formulation of the Fuzzy Vault Scheme. Sara Majbour, Morgan Barbier, Jean-Marie Le Bars |
| 2025 | Ali2Vul: Binary Vulnerability Dataset Expansion via Cross-Modal Alignment. Xinyu Bai, Yisen Wang, Jiajun Du, Chen Liang, Siyuan Liang, Zirui Jiang |
| 2025 | BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques. Chi Feng, Lei Fan |
| 2025 | BootMarker: UEFI Bootkit Defense via Control-Flow Verification. Jihoon Kwon, Junho Lee, Myeongyeol Lee, Hyuna Seo, Jinho Jung |
| 2025 | Comparative Evaluation of Lattices for Fuzzy Extractors and Fuzzy Signatures. Wataru Nakamura, Yusei Suzuki, Masakazu Fujio, Kenta Takahashi |
| 2025 | Conditional Attribute-Based PRE: Definition and Construction from LWE. Lisha Yao, Jian Weng, Pengfei Wu, Guofeng Tang, Guomin Yang, Haiyang Xue, Robert H. Deng |
| 2025 | CryptNyx: Password-Hardened Encryption with Strong Anonymity Guarantees. Tassos Dimitriou, Shahad Alshaher |
| 2025 | Efficient Dynamic Group Signatures with Forward Security. Amin Mohammadali, Riham AlTawy |
| 2025 | EvoFuzz: Enhancing State Space Exploration and Seed Prioritization in Stateful Protocol Fuzzing Using Evolutionary Game Theory. Chengdong Wang, Bo Yu, Lin Yang |
| 2025 | Exploring Backdoor Attacks in Federated Learning Under Parameter-Efficient Fine-Tuning. Xiaofei Huang, Xiaojie Zhu, Chi Chen |
| 2025 | GIR-Cache: Mitigating Conflict-Based Cache Side-Channel Attacks via Global Indirect Replacement. Hao Ma, Zhidong Wang, Da Xie, Ciyan Ouyang, Wei Song |
| 2025 | HGANN-Mal: A Hypergraph Attention Neural Network Approach for Android Malware Detection. Mohammad Reza Norouzian, Claudia M. Eckert |
| 2025 | HYPERSEC: An Extensible Hypervisor-Assisted Framework for Kernel Rootkit Detection. Lionel Hemmerlé, Guillaume Hiet, Frédéric Tronel, Pierre Wilke, Jean-Christophe Prévotet |
| 2025 | HoneySentry: A High-Fidelity Interactive IoT Honeypot for Advanced Threat Detection. Yanbing Shen, Hao Sun, Jiacheng Wang, Haitao Xu, Gang Liu, Fan Zhang |
| 2025 | Improving the Differential-Linear Attack with Applications to GIFT-COFB, GIFT-64 and HyENA. Zhongxin Zhang, Yincen Chen, Ling Song, Yin Lv |
| 2025 | Inference Attacks on Encrypted Online Voting via Traffic Analysis. Anastasiia Belousova, Francesco Marchiori, Mauro Conti |
| 2025 | Jakiro: A Cross-Modal Contrastive Learning Framework for Detecting Vulnerabilities in Smart Contracts. Zixuan Niu, Xiaofeng Li, He Zhao, Tong Zhou, Haotian Cheng |
| 2025 | Keyless Physical-Layer Cryptography. Senlin Liu, Dongshu Cai, Dongchi Han, Hongbo Liu, Xianhui Lu |
| 2025 | LastRings: Lattice-Based Scalable Threshold Ring Signatures. Sohyun Jeon, Calvin Abou Haidar, Mehdi Tibouchi |
| 2025 | MSPP-Net: Fine-Grained Image Privacy Identification via Multi-stage Semantic Perception. Yinglong Li, Bingyuan Chen, Qingyan Jiang, Tieming Chen |
| 2025 | SimSeq: A Robust TLS Traffic Classification Method. Jinghui Cheng, Fanping Zeng |
| 2025 | Simulation-Based Software Leakage Evaluation for the RISC-V Platform. Nicolai Schmitt, Jannik Zeitschner, Andreas Heinemann |
| 2025 | Spoofing Camera Source Attribution via PRNU Transfer Attacks on Physical and AI Generated Images. Shahriar Rahman Khan, Tariqul Islam, Raiful Hasan |
| 2025 | The Multi-user Security of GCM-SST and Further Enhancements. Yusuke Naito, Yu Sasaki, Takeshi Sugawara |
| 2025 | Towards Architecture-Independent Function Call Analysis for IoT Malware. Kensei Ma, Chansu Han, Akira Tanaka, Takeshi Takahashi, Jun'ichi Takeuchi |
| 2025 | Zero Trust Continuous Authentication Models and Automated Policy Formulation. Nikhill Vombatkere, Philip W. L. Fong |