Accepted Papers

Note: failing to make proper registration to a paper will bring risk to its final proceedings and programme.

  1. Jules Maire (Sorbonne Université) and Damien Vergnaud (Sorbonne Université): "Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head"
  2. Zhichun Lu (Cryptape Co. Ltd) and Ren Zhang (Cryptape Co. Ltd. and Nervos): "When is Slower Block Propagation More Profitable for Large Miners?"
  3. Yunlong Mao (Nanjing University), Zexi Xin (Nanjing University), Zhenyu Li (University of California San Diego), Jue Hong (Baidu), Qingyou Yang (Baidu) and Sheng Zhong (Nanjing University): "Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks"
  4. Md Nazmul Hoq (Concordia University), Jia Wei Yao (Concordia University), Suryadipta Majumdar (Concordia University), Luis Suárez (Ericsson Security Research), Lingyu Wang (Concordia University), Makan Pourzandi (Ericsson Security Research), Amine Boukhtouta (Ericsson Security Research) and Mourad Debbabi (Concordia University): "Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring"
  5. Karthikeyan Bhargavan (INRIA Paris), Abhishek Bichhawat (IIT Gandhinagar), Pedram Hosseyni (University of Stuttgart), Ralf Küsters (University of Stuttgart), Klaas Pruiksma (University of Stuttgart), Guido Schmitz (Royal Holloway, University of London), Clara Waldmann (University of Stuttgart) and Tim Würtele (University of Stuttgart): "Layered Symbolic Security Analysis in DY*"
  6. Laura Hetz (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt) and Christian Weinert (Royal Holloway, University of London): "Scaling Mobile Private Contact Discovery to Billions of Users"
  7. Muaz Ali (University of Arizona), Muhammad Muzammil (Stony Brook University), Faraz Karim (Georgia Institute of Technology), Ayesha Naeem (Boston University), Rukhshan Haroon (Tufts University), Muhammad Haris (LUMS), Huzaifa Nadeem (University of Pittsburgh), Waseem Sabir (LUMS), Fahad Shaon (Data Security Technologies), Fareed Zaffar (LUMS), Vinod Yegneswaran (SRI International), Ashish Gehani (SRI International) and Sazzadur Rahaman (University of Arizona): "A Tale of Reduction, Security and Correctness: Evaluating Program Debloating Paradigms and Their Compositions"
  8. Daniel Weber (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Ruiyi Zhang (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security): "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks"
  9. Amit Cohen (Tel Aviv University) and Mahmood Sharif (Tel Aviv University): "Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition"
  10. Ofir Cohen (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel), Ron Bitton (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel), Asaf Shabtai (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel) and Rami Puzis (Software and Information Systems Engineering and Cyber@BGU, Ben-Gurion University of the Negev, Beer-Sheva, Israel): "ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment"
  11. Ziyi Zhou (Shanghai Jiao Tong University), Xuangan Xiao (Shanghai Jiao Tong University), Tianxiao Hou (Shanghai Jiao Tong University), Yikun Hu (Shanghai Jiao Tong University) and Dawu Gu (Shanghai Jiao Tong University): "On the (In)Feasibility of Manufacturer-provided Remote Attestation Frameworks in Android"
  12. Xavier Boyen (QUT) and Qinyi Li (Griffith University): "Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations"
  13. Maria Rigaki (Czech Tecnical University in Prague) and Sebastián García (Stratosphere Lab, AIC Group, Department of Computer Science, Czech Technical University): "The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning"
  14. Zhe Chen (Singapore Management University), Haiqing Qiu (Singapore Management University) and Xuhua Ding (SMU): "DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised IoT Devices"
  15. Younghan Lee (Seoul National University), Yungi Cho (Seoul National University), Woorim Han (Seoul National University), Ho Bae (Ewha Woman’s University) and Yunheung Paek (Seoul National University): "FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models"
  16. Bipin Paudel (Kansas State University) and George Amariucai (Kansas State University): "Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models"
  17. Jakub Klemsa (EURECOM), Yavuz Akın (EURECOM) and Melek Önen (EURECOM): "A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth"
  18. Lorenz Hüther (University of Bremen), Karsten Sohr (University of Bremen), Bernhard J. Berger (Hamburg University of Technology), Hendrik Rothe (Team Neusta GmbH) and Stefan Edelkamp (Czech Technical University in Prague): "Machine Learning for SAST: A Lightweight and Adaptable Approach"
  19. Lukas Gerlach (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Robert Pietsch (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security): "A Large-Scale Rowhammer Reproduction Study Using the Blacksmith Fuzzer"
  20. Gowri R Chandran (Technical University of Darmstadt), Raine Nieminen (Technical University of Darmstadt), Thomas Schneider (Technical University of Darmstadt) and Ajith Suresh (Technology Innovation Institute, Abu Dhabi): "PrivMail: A Privacy-Preserving Framework for Secure Emails"
  21. Zhiyuan An (School of Computer Science and Engineering, Sun Yat-sen University), Haibo Tian (School of Computer Science and Engineering, Sun Yat-sen University), Chao Chen (School of Computer Science and Engineering, Sun Yat-sen University) and Fangguo Zhang (School of Computer Science and Engineering, Sun Yat-sen University): "Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience"
  22. Weicheng Wang (Purdue University), Hyunwoo Lee (Korea Institute of Energy Technology), Yan Huang (Indiana University Bloomington), Elisa Bertino (Purdue University) and Ninghui Li (Purdue University): "Towards Efficient Privacy-Preserving Deep Packet Inspection"
  23. Daniel Weber (CISPA Helmholtz Center for Information Security), Fabian Thomas (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Ruiyi Zhang (CISPA Helmholtz Center for Information Security) and Michael Schwarz (CISPA Helmholtz Center for Information Security): "Reviving Meltdown 3a"
  24. Reyhaneh Rabbaninejad (Tampere university), Behzad Abdolmaleki (Max Planck Institute for Security and Privacy), Giulio Malavolta (Max Planck Institute for Security and Privacy), Antonis Michalas (Tampere University) and Amir Nabizadeh (Independent Researcher): "stoRNA: Stateless Transparent Proofs of Storage-time"
  25. Shang Song (National University of Defense Technology), Lin Liu (National University of Defense Technology), Rongmao Chen (National University of Defense Technology), Wei Peng (National University of Defense Technology) and Yi Wang (National University of Defense Technology): "Secure Approximate Nearest Neighbor Search with Locality-sensitive Hashing"
  26. Tianyu Li (Delft University of Technology), Li Xu (Delft University of Technology), Zekeriya Erkin (Delft University of Technology) and Reginald Lagendijk (Delft University of Technology): "Trajectory Hiding and Sharing for Supply Chains with Differential Privacy"
  27. Mohamed Suliman (Trinity College Dublin, The University of Dublin) and Douglas Leith (Trinity College Dublin, The University of Dublin): "Two Models are Better than One: Federated Learning Is Not Private For Google GBoard Next Word Prediction"
  28. Christoph Coijanovic (KIT), Christiane Weis (NEC Laboratories Europe) and Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and CeTI, TU Dresden): "Panini: Anonymous Anycast and an Instantiation"
  29. Tristan Claverie (ANSSI, IRISA, CNRS, Univ. Rennes, INSA de Rennes,), Gildas Avoine (INSA de Rennes, Univ. Rennes, IRISA, CNRS), Stéphanie Delaune (Univ. Rennes, CNRS, IRISA) and José Lopes Esteves (ANSSI): "Tamarin-based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks"
  30. Vik Vanderlinden (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven) and Mathy Vanhoef (imec-DistriNet, KU Leuven): "Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers"
  31. Radu Anghel (Delft University of Technology), Swaathi Vetrivel (Delft University of Technology), Elsa Turcios Rodriguez (Delft University of Technology), Kaichi Sameshima (Yokohama National University), Daisuke Makita (Yokohama National University/National Institute of Information and Communications Technology), Katsunari Yoshioka (Yokohama National University), Carlos Gañán (Delft University of Technology) and Yury Zhauniarovich (Delft University of Technology): "Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks"
  32. Yukimasa Sugizaki (NEC Corporation), Hikaru Tsuchida (NEC Corporation), Takuya Hayashi (NEC Corporation), Koji Nuida (Kyushu University), Akira Nakashima (Kyushu University), Toshiyuki Isshiki (NEC Corporation) and Kengo Mori (NEC Corporation): "Threshold Fully Homomorphic Encryption over the Torus"
  33. Mengfei Ren (University of Texas at Arlington), Haotian Zhang (University of Texas at Arlington), Xiaolei Ren (University of Texas at Arlington), Jiang Ming (Tulane University) and Yu Lei (University of Texas at Arlington): "Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference"
  34. Shirin Kalantari (KU Leuven), Pieter Philippaerts (KU Leuven), Yana Dimova (KU Leuven), Danny Hughes (KU Leuven), Wouter Joosen (KU Leuven) and Bart De Decker (KU Leuven): "A User-centric Approach to API Delegations: Enforcing Privacy Policies on OAuth Delegation"
  35. Xi Yu (Shanghai Jiao Tong University), Liyao Xiang (Shanghai Jiao Tong University), Shiming Wang (Shanghai Jiao Tong University) and Chengnian Long (Shanghai Jiao Tong University): "Privacy-Preserving Split Learning via Pareto Optimal Search"
  36. Qi Wang (Heilongjiang University), Haodong Huang (Heilongjiang University), Juyan Li (Heilongjiang University) and Qi Yuan (Qiqihar university): "Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation"
  37. Aysajan Abidin (imec-COSIC KU Leuven), Erik Pohle (imec-COSIC, KU Leuven) and Bart Preneel (imec-COSIC, KU Leuven): "Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC"
  38. Guy Farrelly (University of Adelaide), Paul Quirk (DSTG), Salil S Kanhere (UNSW), Seyit Camtepe (CSIRO Data61) and Damith C. Ranasinghe (University of Adelaide): "SPLITS: Split Input-to-State Mapping for Effective Firmware Fuzzing"
  39. Sowoong Kim (UNIST), Myeonggyun Han (UNIST) and Woongki Baek (UNIST): "MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack"
  40. Minkyu Kim (National Security Research Institute) and Hyung Tae Lee (Chung-Ang University): "Code-Based Secret Handshake Scheme, Revisited"
  41. Luca Degani (University of Trento), Majid Salehi (imec-Distrinet, Nokia Bell Labs), Fabio Martinelli (Istituto di Informatica e Telematica - Consiglio Nazionale delle Ricerche) and Bruno Crispo (University of Trento): "µIPS: Software-Based Intrusion Prevention for Bare-metal Embedded Systems"
  42. Charalambos Mitropoulos (Technical University of Crete), Thodoris Sotiropoulos (ETH Zurich), Sotiris Ioannidis (Technical University of Crete) and Dimitris Mitropoulos (National and Kapodistrian University of Athens): "Syntax-Aware Mutation for Testing the Solidity Compiler"
  43. Feng Li (Xidian University), Jianfeng Ma (Xidian University), Yinbin Miao (Xidian University), Pengfei Wu (National University of Singapore) and Xiangfu Song (National University of Singapore): "Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage"
  44. Dennis Dayanikli (Hasso-Plattner-Institute, University of Potsdam) and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam): "Password-Based Credentials with Security against Server Compromise"
  45. Tingting Rao (Huazhong University of Science and Technology), Yixin Su (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science and Technology), Yubo Zheng (Huazhong University of Science and Technology), Wei Wang (Huazhong University of Science and Technology) and Hai Jin (Huazhong University of Science and Technology): "You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults"
  46. Wei Lin (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of Information Engineering, Chinese Academy of Sciences), Jiawei Yin (Institute of Information Engineering, Chinese Academy of Sciences), Xiangyu Zuo (Institute of Information Engineering, Chinese Academy of Sciences), Rongqing Wang (Institute of Information Engineering, Chinese Academy of Sciences) and Xiaorui Gong (Institute of Information Engineering, Chinese Academy of Sciences): "FSmell: Recognizing Inline Function in Binary Code"
  47. Marcel Tiepelt (Karlsruher Institut für Technologie), Edward Eaton (National Research Council Canada) and Douglas Stebila (University of Waterloo): "Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements"
  48. Jules Maire (Sorbonne Université) and Damien Vergnaud (Sorbonne Université): "Commitments and Efficient Zero-Knowledge Proofs from the Subset Sum Problems"
  49. Torsten Krauß (University of Würzburg), Raphael Götz (University of Würzburg) and Alexandra Dmitrienko (University of Würzburg): "Security of NVMe Offloaded Data in Large-Scale Machine Learning"
  50. Pouriya Zarbafian (University of Sydney) and Vincent Gramoli (University of Sydney).: "Aion: Secure Transaction Ordering using TEEs"
  51. Jehyun Lee (Trustwave), Zhe Xin (National University of Singapore), Melanie Pei See Ng (National University of Singapore), Kanav Sabharwal (National University of Singapore), Giovanni Apruzzese (University of Liechtenstein) and Dinil Mon Divakaran (Acronis Research): "Attacking logo-based phishing website detectors with adversarial perturbations"
  52. Lin Li (Swinburne University of Technology), Chao Chen (RMIT University), Lei Pan (Deakin University), Yonghang Tai (Yunnan Normal University), Jun Zhang (Swinburne University of Technology) and Yang Xiang (Swinburne University of Technology): "Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication"
  53. Carmen Wabartha (University of Stuttgart), Julian Liedtke (University of Stuttgart), Nicolas Huber (University of Stuttgart), Daniel Rausch (University of Stuttgart) and Ralf Küsters (University of Stuttgart): "Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations"
  54. Ravi Anand (University of Hyogo, Kobe, Japan), Subhadeep Banik (Universita della Svizzera Italiana, Lugano, Switzerland), Andrea Caforio (Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland), Kazuhide Fukushima (KDDI Research, Inc., Saitama, Japan), Takanori Isobe (University of Hyogo, Kobe, Japan), Shisaku Kiyomoto (KDDI Research, Inc., Saitama, Japan), Fukang Liu (University of Hyogo, Kobe, Japan), Yuto Nakano (KDDI Research, Inc., Saitama, Japan), Kosei Sakamoto (University of Hyogo, Kobe, Japan) and Nobuyuki Takeuchi (University of Hyogo, Kobe, Japan): "An Ultra-High Throughput AES-based Authenticated Encryption Scheme for 6G: Design and Implementation"
  55. Javier Rando (ETH Zurich and New York University), Briland Hitaj (SRI International) and Fernando Perez-Cruz (ETH Zurich and Swiss Data Science Center): "PassGPT: Password Modeling and (Guided) Generation with Large Language Models"
  56. Heitor Uchoa (University of Twente), Vipul Arora (Riscure B.V.), Dennis Vermoen (Riscure B.V.), Marco Ottavi (University of Twente) and Nikolaos Alachiotis (University of Twente): "Exploring genomic sequence alignment for improving side-channel analysis"
  57. Daniel Galán (ETH Zurich), Víctor García (Universitat Politècnica de València), Santiago Escobar (Universitat Politècnica de València), Catherine Meadows (NRL) and Jose Meseguer (University of Illinois at Urbana-Champaign): "Protocol Dialects as Formal Patterns"
  58. Lin Zhu (Huazhong University of Science and Technology), Qiang-Sheng Hua (Huazhong University of Science and Technology), Yi Chen (Huazhong University of Science and Technology) and Hai Jin (Huazhong University of Science and Technology): "Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption"
  59. Wenqing Liu (Florida State University) and An-I Andy Wang (Florida State University): "LFuzz: Exploiting Locality-enabled Techniques for File-system Fuzzing"
  60. Lukas Seidel (QwietAI), Sedick David Baker Effendi (Stellenbosch University), Xavier Pinho (QwietAI), Konrad Rieck (TU Berlin), Brink van der Merwe (Stellenbosch University) and Fabian Yamaguchi (QwietAI): "Learning Type Inference for Enhanced Dataflow Analysis"
  61. Katharina Boudgoust (Aarhus University) and Akira Takahashi (University of Edinburgh): "Sequential Half-Aggregation of Lattice-Based Signatures"
  62. Florian Helmschmidt (University of Stuttgart), Pedram Hosseyni (University of Stuttgart), Ralf Küsters (University of Stuttgart), Klaas Pruiksma (University of Stuttgart), Clara Waldmann (University of Stuttgart) and Tim Würtele (University of Stuttgart): "The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard"
  63. Iness Ben Guirat (KU Leuven), Claudia Diaz (KU Leuven), Karim Eldefrawy (SRI) and Hadas Zeilberger (Yale): "Mixnet Traffic Analysis by Adversaries with Partial Visibility"
  64. Jonas Bushart (CISPA Helmholtz Center for Information Security) and Christian Rossow (CISPA Helmholtz Center for Information Security): "ResolFuzz: Differential Fuzzing of DNS Resolvers"
  65. Anup Kiran Bhattacharjee (TU Delft), Stefano Cecconello (TU Delft), Fernando Kuipers (TU Delft) and Georgios Smaragdakis (TU Delft): "Fingerprinting of Cellular Infrastructure based on Broadcast Information"
  66. Ghada Arfaoui (Orange), Thibaut Jacques (Orange / XLIM, University of Limoges), Marc-Antoine Lacoste (Orange), Cristina Onete (XLIM, University of Limoges) and Leo Robert (XLIM, University of Limoges): "Towards a Privacy-preserving Attestation for Virtualized Networks"
  67. Hubert Kario (Red Hat Inc.): "Everlasting ROBOT: the Marvin Attack"
  68. Yuejun Guo (Luxembourg Institute of Science and Technology), Qiang Hu (University of Luxembourg), Qiang Tang (Luxembourg Institute of Science and Technology) and Yves Le Traon (University of Luxembourg): "An Empirical Study of the Imbalance Issue in Software Vulnerability Detection"
  69. Xin Li (School of Computer Science and Technology, Huazhong University of Science and Technology), Hong Zhu (School of Computer Science and Technology, Huazhong University of Science and Technology), Zhiqiang Zhang (School of Computer Science and Technology, Huazhong University of Science and Technology) and Meiyi Xie (School of Computer Science and Technology, Huazhong University of Science and Technology): "Item-Oriented Personalized LDP for Discrete Distribution Estimation"
  70. Luca Arnaboldi (University of Birmingham), David Aspinall (University of Edinburgh), Christina Kolb (University of Edinburgh) and Sasa Radomirovic (University of Surrey): "Tactics for Account Access Graphs"
  71. Yajun Teng (Institute of Information Engineering), Wei Wang (Institute of Information Engineering), Jun Shao (Zhejiang Gongshang University), Huiqing Wan (Institute of Information Engineering), Heqing Huang (Institute of Information Engineering), Yong Liu (Qi An Xin Technology Group Inc.) and Jingqiang Lin (University of Science and Technology of China): "Curveball+: Exploring Curveball-like Vulnerabilities of Implicit Certificates Validation"
  72. Selasi Kwashie (CSIRO Data61), Wei Kang (CSIRO Data61), Sandeep Santhosh Kumar (CSIRO Data61), Geoff Jarrad (CSIRO Data61), Seyit Camtepe (CSIRO Data61) and Surya Nepal (CSIRO Data61): "Acumen: Analysing the Impact of Organisational Change on Users’ Access Entitlements"
  73. Piotr Białczak (CERT Polska-NASK - National Research Institute/Warsaw University of Technology) and Wojciech Mazurczyk (Institute of Computer Science, Warsaw University of Technology): "Malware classification using Open Set Recognition and HTTP protocol requests"
  74. Constantin Catalin Dragan (University of Surrey), François Dupressoir (University of Bristol), Kristian Gjøsteen (Norwegian University of Science and Technology), Thomas Haines (Australian National University), Peter B. Rønne (CNRS, LORIA, Université de Lorraine) and Morten Rotvold Solberg (Norwegian University of Science and Technology): "Machine-Checked Proofs of Accountability: How to sElect who is to Blame"
  75. Sungwook Kim (Department of Information Security, Seoul Women’s University), Seongju Kim (Zkrypto Inc.), Yurim Shin (Hanyang University), Sunmi Kim (Hanyang University), Jihye Kim (KOOKMIN UNIVERSITY) and Hyunok Oh (Hanyang University): "Efficient Transparent Polynomial Commitments for zk-SNARKs"
  76. Efehan Guner (Koc University) and M. Emre Gursoy (Koc University): "Learning Markov Chain Models from Sequential Data under Local Differential Privacy"
  77. Jianhuan Wang (The Hong Kong Polytechnic University), Jichen Li (Peking University), Zecheng Li (The Hong Kong Polytechnic University), Xiaotie Deng (Peking University) and Bin Xiao (The Hong Kong Polytechnic University): "n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi"
  78. Ivan De Oliveira Nunes (Rochester Institute of Technology), Peter Rindal (Visa Research) and Maliheh Shirvanian (Netflix): "Oblivious Extractors and Improved Security in Biometric-based Authentication Systems"
  79. Ehud Aharoni (Machine-Learning group HRL IBM), Moran Baruch (IBM Research), Pradip Bose (IBM), Alper Buyuktosunoglu (IBM), Nir Drucker (IBM Research - Israel), Subhankar Pal (IBM Research), Tomer Pelleg (IBM Research), Kanthi Sarpatwar (IBM), Hayim Shaul (IBM Research - Israel), Omri Soceanu (IBM) and Roman Vaculín (IBM): "Efficient Pruning for Machine Learning under Homomorphic Encryption"
  80. Yifan Xia (Zhejiang University), Ping He (Zhejiang University), Xuhong Zhang (Zhejiang University), Peiyu Liu (Zhejiang University), Shouling Ji (Zhejiang University) and Wenhai Wang (Zhejiang University): "Static Semantics Reconstruction for JavaScript-WebAssembly Multilingual Malware Detection"
  81. Edoardo Di Paolo (Sapienza University of Rome), Enrico Bassetti (Sapienza University of Rome) and Angelo Spognardi (Dipartimento di Informatica, Sapienza Università di Roma): "A New Model for Testing IPv6 Fragment Handling"
  82. Ivo Maffei (University of Oxford) and Bill Roscoe (University of Oxford): "Optimally-Fair Multi-Party Exchange without Trusted Parties"
  83. Shaoyu Li (Virginia Polytechnic Institute and State University), Shanghao Shi (Virginia Polytechnic Institute and State University), Yang Xiao (University of Kentucky), Chaoyu Zhang (Virginia Polytechnic Institute and State University), Y. Thomas Hou (Virginia Polytechnic Institute and State University) and Wenjing Lou (Virginia Polytechnic Institute and State University): "Bijack: Breaking Bitcoin Network with TCP Vulnerabilities"
  84. Matthieu Meeus (Imperial College London), Florent Guepin (Imperial College London), Ana-Maria Cretu (Imperial College London) and Yves-Alexandre de Montjoye (Imperial College London): "Achilles’ Heels: vulnerable record identification in synthetic data publishing"
  85. Tae Min Ahn (Korea University, School of Cybersecurity), Kang Hoon Lee (Korea University, School of Cybersecurity), Joon Soo Yoo (Korea University, School of Cybersecurity) and Ji Won Yoon (Korea University, School of Cybersecurity): "Cheap and Fast Iterative Matrix Inverse in Encrypted Domain"
  86. Konrad Wolsing (Fraunhofer FKIE / RWTH Aachen University), Dominik Kus (RWTH Aachen University), Eric Wagner (Fraunhofer FKIE / RWTH Aachen University), Jan Pennekamp (RWTH Aachen University), Klaus Wehrle (RWTH Aachen University) and Martin Henze (RWTH Aachen University / Fraunhofer FKIE): "One IDS is not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection"
  87. François Hublet (ETH Zürich), David Basin (ETH Zürich) and Srdjan Krstic (ETH Zürich): "Enforcing the GDPR"
  88. Sohyun Jeon (Ewha Womans University), Hyang-Sook Lee (Ewha Womans University) and Jeongeun Park (KU Leuven): "Practical Randomized Lattice Gadget Decomposition With Application to FHE"
  89. Bowen Xu (Institute of Information Engineering,Chinese Academy of Sciences), Shijie Jia (Institute of Information Engineering,Chinese Academy of Sciences), Jingqiang Lin (School of Cyber Security, University of Science and Technology of China), Fangyu Zheng (Institute of Information Engineering,Chinese Academy of Sciences), Yuan Ma (Institute of Information Engineering,Chinese Academy of Sciences), Limin Liu (Institute of Information Engineering,Chinese Academy of Sciences), Xiaozhuo Gu (Institute of Information Engineering,Chinese Academy of Sciences) and Li Song (Institute of Information Engineering,Chinese Academy of Sciences): "The Achilles Heel of JWT: Key Management Vulnerability Detection in JWT Applications"
  90. Théophile Brézot (Cosmian), Paola de Perthuis (DIENS, École Normale Supérieure, CNRS, Inria, PSL University, Paris, France, and Cosmian, Paris, France.) and David Pointcheval (CNRS/ENS/INRIA): "Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE"
  91. Quang Cao (RMIT University), Hong Yen Tran (RMIT University), Son Hoang Dau (RMIT University), Xun Yi (RMIT University), Emanuele Viterbo (Monash University), Chen Feng (The University of British Columbia, Okanagan Campus), Yu-Chih Huang (National Yang Ming Chiao Tung University), Jingge Zhu (The University of Melbourne), Stanislav Kruglik (Nanyang Technological University) and Han Mao Kiah (Nanyang Technological University): "Committed Private Information Retrieval"
  92. You Lyu (Shanghai Jiao Tong University) and Shengli Liu (Shanghai Jiao Tong University): "Two-Message Authenticated Key Exchange from Public-Key Encryption"
  93. Rui Sun (State Key Laboratory for Novel Software Technology, Nanjing University), Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University), Zicheng Wang (State Key Laboratory for Novel Software Technology, Nanjing University) and Qingkai Zeng (State Key Laboratory for Novel Software Technology, Nanjing University): "AttnCall: Refining Indirect Call Targets in Binaries with Attention"