JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript |
S. Sarker, A. Nahapetyan, A. Das, A. Kapravelos |
Optimizing label-only membership inference attacks by global relative decision boundary distances |
J. Xu, C. Yu, J. Hu, C. Tan |
The Formal Verification of Aptos Coin |
K. Chen, J. luo, L. Loh, X. Wang, Z. Zhang |
Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm |
S. Narisada, S. Uemura, H. Okada, H. Furue, Y. Aikawa, K. Fukushima |
TIDL-IDS: A Time-series Imaging and deep learning-based IDS for Connected Autonomous Vehicles |
Z. Xia, L. Huang, J. Tan |
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128 |
Y. Liu, Z. Xiang, S. Zhang, X. Zeng |
Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing |
S. Mamarasulov, Y. Li, C. Wang |
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles |
S. Kaneko, P. Lafourcade, L. Mallordy, D. Miyahara, M. Puys, K. Sakiyama |
ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination |
A. Zawia, M. Hasan |
Security Analysis of CMAC in the Multi-user Model |
X. Zhang, Y. Shen, L. Wang |
(Best Paper Award) Anonymous, Timed and Revocable Proxy Signatures |
G. Almashaqbeh, A. Nitulescu |
Property Guided Secure Configuration Space Search |
Y. Li, K. Hou, Y. He, Y. Chen, H. Zhou |
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV |
Y. Xu, G. Zhu, H. Wang, L. Wang |
Deep LLL on Module lattices |
Y. Zhou, M. Wang, H. Cao |
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations |
C. Gouert, M. Ugurbil, D. Mouris, M. de Vega, N. Tsoutsos |
Automated Generation of Behavioral Signatures for Malicious Web Campaigns |
S. Sarker, W. Melicher, O. Starov, A. Das, A. Kapravelos |
Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys |
R. Anand, S. Ghosh, T. Isobe, R. Shiba |
(Best Paper Award) We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts |
D. Köhler, W. Pünter, C. Meinel |
Multi-way High-throughput Implementation of Kyber |
X. Yu, J. Zhang, J. Huang, D. Chen, L. Zhou |
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys |
S. Düzlü, P. Struck |
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method |
S. Sun, P. Sharma, K. Nwodo, A. Stavrou, H. Wang |
Robust Multiparty Computation from Threshold Encryption Based on RLWE |
A. Urban, M. Rambaud |
A faster variant of CGL hash function via efficient backtracking checks |
S. Inoue, Y. Aikawa, T. Takagi |
MVDetector: Malicious vehicles detection under Sybil attacks in VANETs |
Y. Wei, W. Qi, Z. Li, Y. Han, Y. Lai |
Adversarial analysis of software composition analysis tools |
E. Ivanova, N. Stakhanova, B. Sistany |
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling |
C. Liao, R. Wang, Y. Li, J. Chen, Y. Li, Z. Pan |
News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals |
A. Mandal, C. Arisoy, N. Saxena |
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model |
Y. Song, J. Yuan |
A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability |
J. Meng, Y. Wang, L. Lei, C. Kou, P. Wang |
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation |
A. Zawia, M. Hasan |
Risk of Text Backdoor Attacks under Dataset Distillation |
K. Zhang, Y. Song, S. Xu, P. Li, R. Qian, P. Han, L. Xu |
Efficient Blind Rotation in FHEW using Refined Decomposition and NTT |
Y. Liu, Z. Li, R. Wang, X. Lu, K. Wang |
Emulating Android Device Drivers via Borrowed Execution Context |
A. Le Blanc, I. Pustogarov |