Accepted Papers

JSHint: Revealing API Usage to Improve Detection of Malicious JavaScript S. Sarker, A. Nahapetyan, A. Das, A. Kapravelos
Optimizing label-only membership inference attacks by global relative decision boundary distances J. Xu, C. Yu, J. Hu, C. Tan
The Formal Verification of Aptos Coin K. Chen, J. luo, L. Loh, X. Wang, Z. Zhang
Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm S. Narisada, S. Uemura, H. Okada, H. Furue, Y. Aikawa, K. Fukushima
TIDL-IDS: A Time-series Imaging and deep learning-based IDS for Connected Autonomous Vehicles Z. Xia, L. Huang, J. Tan
MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128 Y. Liu, Z. Xiang, S. Zhang, X. Zeng
Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing S. Mamarasulov, Y. Li, C. Wang
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles S. Kaneko, P. Lafourcade, L. Mallordy, D. Miyahara, M. Puys, K. Sakiyama
ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination A. Zawia, M. Hasan
Security Analysis of CMAC in the Multi-user Model X. Zhang, Y. Shen, L. Wang
(Best Paper Award) Anonymous, Timed and Revocable Proxy Signatures G. Almashaqbeh, A. Nitulescu
Property Guided Secure Configuration Space Search Y. Li, K. Hou, Y. He, Y. Chen, H. Zhou
Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Y. Xu, G. Zhu, H. Wang, L. Wang
Deep LLL on Module lattices Y. Zhou, M. Wang, H. Cao
Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations C. Gouert, M. Ugurbil, D. Mouris, M. de Vega, N. Tsoutsos
Automated Generation of Behavioral Signatures for Malicious Web Campaigns S. Sarker, W. Melicher, O. Starov, A. Das, A. Kapravelos
Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys R. Anand, S. Ghosh, T. Isobe, R. Shiba
(Best Paper Award) We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts D. Köhler, W. Pünter, C. Meinel
Multi-way High-throughput Implementation of Kyber X. Yu, J. Zhang, J. Huang, D. Chen, L. Zhou
The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys S. Düzlü, P. Struck
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method S. Sun, P. Sharma, K. Nwodo, A. Stavrou, H. Wang
Robust Multiparty Computation from Threshold Encryption Based on RLWE A. Urban, M. Rambaud
A faster variant of CGL hash function via efficient backtracking checks S. Inoue, Y. Aikawa, T. Takagi
MVDetector: Malicious vehicles detection under Sybil attacks in VANETs Y. Wei, W. Qi, Z. Li, Y. Han, Y. Lai
Adversarial analysis of software composition analysis tools E. Ivanova, N. Stakhanova, B. Sistany
SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling C. Liao, R. Wang, Y. Li, J. Chen, Y. Li, Z. Pan
News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals A. Mandal, C. Arisoy, N. Saxena
Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model Y. Song, J. Yuan
A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability J. Meng, Y. Wang, L. Lei, C. Kou, P. Wang
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation A. Zawia, M. Hasan
Risk of Text Backdoor Attacks under Dataset Distillation K. Zhang, Y. Song, S. Xu, P. Li, R. Qian, P. Han, L. Xu
Efficient Blind Rotation in FHEW using Refined Decomposition and NTT Y. Liu, Z. Li, R. Wang, X. Lu, K. Wang
Emulating Android Device Drivers via Borrowed Execution Context A. Le Blanc, I. Pustogarov