| JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript | S. Sarker, A. Nahapetyan, A. Das, A. Kapravelos | 
| Optimizing label-only membership inference attacks by global relative decision boundary distances | J. Xu, C. Yu, J. Hu, C. Tan | 
| The Formal Verification of Aptos Coin | K. Chen, J. luo, L. Loh, X. Wang, Z. Zhang | 
| Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm | S. Narisada, S. Uemura, H. Okada, H. Furue, Y. Aikawa, K. Fukushima | 
| TIDL-IDS: A Time-series Imaging and deep learning-based IDS for Connected Autonomous Vehicles | Z. Xia, L. Huang, J. Tan | 
| MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128 | Y. Liu, Z. Xiang, S. Zhang, X. Zeng | 
| Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing | S. Mamarasulov, Y. Li, C. Wang | 
| Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles | S. Kaneko, P. Lafourcade, L. Mallordy, D. Miyahara, M. Puys, K. Sakiyama | 
| ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination | A. Zawia, M. Hasan | 
| Security Analysis of CMAC in the Multi-user Model | X. Zhang, Y. Shen, L. Wang | 
| (Best Paper Award) Anonymous, Timed and Revocable Proxy Signatures | G. Almashaqbeh, A. Nitulescu | 
| Property Guided Secure Configuration Space Search | Y. Li, K. Hou, Y. He, Y. Chen, H. Zhou | 
| Large-Plaintext Functional Bootstrapping with Small Parameters for BGV | Y. Xu, G. Zhu, H. Wang, L. Wang | 
| Deep LLL on Module lattices | Y. Zhou, M. Wang, H. Cao | 
| Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations | C. Gouert, M. Ugurbil, D. Mouris, M. de Vega, N. Tsoutsos | 
| Automated Generation of Behavioral Signatures for Malicious Web Campaigns | S. Sarker, W. Melicher, O. Starov, A. Das, A. Kapravelos | 
| Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys | R. Anand, S. Ghosh, T. Isobe, R. Shiba | 
| (Best Paper Award) We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts | D. Köhler, W. Pünter, C. Meinel | 
| Multi-way High-throughput Implementation of Kyber | X. Yu, J. Zhang, J. Huang, D. Chen, L. Zhou | 
| The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys | S. Düzlü, P. Struck | 
| FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method | S. Sun, P. Sharma, K. Nwodo, A. Stavrou, H. Wang | 
| Robust Multiparty Computation from Threshold Encryption Based on RLWE | A. Urban, M. Rambaud | 
| A faster variant of CGL hash function via efficient backtracking checks | S. Inoue, Y. Aikawa, T. Takagi | 
| MVDetector: Malicious vehicles detection under Sybil attacks in VANETs | Y. Wei, W. Qi, Z. Li, Y. Han, Y. Lai | 
| Adversarial analysis of software composition analysis tools | E. Ivanova, N. Stakhanova, B. Sistany | 
| SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling | C. Liao, R. Wang, Y. Li, J. Chen, Y. Li, Z. Pan | 
| News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals | A. Mandal, C. Arisoy, N. Saxena | 
| Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model | Y. Song, J. Yuan | 
| A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability | J. Meng, Y. Wang, L. Lei, C. Kou, P. Wang | 
| Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation | A. Zawia, M. Hasan | 
| Risk of Text Backdoor Attacks under Dataset Distillation | K. Zhang, Y. Song, S. Xu, P. Li, R. Qian, P. Han, L. Xu | 
| Efficient Blind Rotation in FHEW using Refined Decomposition and NTT | Y. Liu, Z. Li, R. Wang, X. Lu, K. Wang | 
| Emulating Android Device Drivers via Borrowed Execution Context | A. Le Blanc, I. Pustogarov |