Main Track
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical Systems | Shahriar, Md Hasan (Florida International University); Rahman, Mohammad Ashiqur (Florida International University); Haque, Nur Imtiazul (Florida International Univeristy); Chowdhury, Badrul (University of North Carolina at Charlotte); Whisenant, Steven G (Duke Energy) |
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users’ Behaviors | Fukushi, Naoki (NTT Secure Platform Laboratories); Koide, Takashi (NTT Secure Platform Laboratories); Chiba, Daiki (NTT Secure Platform Laboratories); Nakano, Hiroki (NTT Secure Platform Laboratories); Akiyama, Mitsuaki (NTT Secure Platform Laboratories) |
Horus: A Security Assessment Framework for Android Crypto Wallets | Uddin, Md Shahab (Concordia); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia Univeristy) |
Compromised through Compression | Van Aubel, Pol (Radboud University); Poll, Erik (Radboud University Nijmegen) |
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery | Karl, Ryan (University of Notre Dame); Takeshita, Jonathan (University of Notre Dame); Jung, Taeho (University of Notre Dame) |
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations | Karl, Ryan (University of Notre Dame); Takeshita, Jonathan (University of Notre Dame); Mohammed, Al-Amin (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame) |
ToFi: An Algorithm to Defend against Byzantine Attacks in Federated Learning | Xia, Qi (College of William and Mary); Tao, Zeyi (College of William and Mary); Li, Qun (College of William and Mary) |
Provably Secure Contact Tracing with Conditional Private Set Intersection | Takeshita, Jonathan (University of Notre Dame); Karl, Ryan (University of Notre Dame); Mohammed, Alamin (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame) |
A Forensic Tool to Acquire Radio Signals using Software Defined Radio | Azhar, Hannan (Canterbury Christ Church University); Abadia, German (Canterbury Christ Church University) |
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management | Najafi, Pejman (Hasso Plattner Institute, University of Potsdam); Cheng, Feng (Hasso Plattner Institute, University of Potsdam, Germany); Meinel, Christoph (Hasso Plattner Institute, University of Potsdam, Germany) |
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits | Shi, Shangcheng (The Chinese University of Hong Kong); Wang, Xianbo (The Chinese University of Hong Kong); Zeng, Kyle (Arizona State University & The Chinese University of Hong Kong); Yang, Ronghai (Sangfor Technology Inc & The Chinese University of Hong Kong); Lau, Wing Cheong (The Chinese University of Hong Kong) |
Local Model Privacy-preserving Study for Federated Learning | Pan, Kaiyun (East China Normal University); He, Daojing (East China Normal University); Xu, Chuan (Inria Sophia Antipolis) |
CROCUS: An objective approach for SDN controllers security assessment | Silva, Carlos (University of Coimbra); Sousa, Bruno (University of Coimbra); Vilela, Joao (University of Porto) |
Anonymous Short Communications over Social Networks | Buccafurri, Francesco (DIIES Dept.- University of Reggio Calabria); De Angelis, Vincenzo (DIIES Dept.- University of Reggio Calabria); Idone, Maria Francesca (DIIES Dept.- University of Reggio Calabria); Labrini, Cecilia (DIIES Dept.- University of Reggio Calabria) |
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks | Amich, Abderrahmen (University of Michigan, Dearborn); Eshete, Birhanu (University of Michigan, Dearborn) |
An Extensive Security Analysis on Ethereum Smart Contracts | Mohammadreza Ashouri (St. Pölten University of Applied Science) |
MPD: Moving Target Defense through Communication Protocol Dialects | Mei, Yongsheng (The George Washington University); Gogineni, Kailash (The George Washington University); Lan, Tian (The George Washington University); Venkataramani, Guru (The George Washington University) |
A Distributed Ledger for Non-Attributable Cyber Threat Intelligence Exchange | Huff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas) |
Towards Automated Assessment of Vulnerability Exposures in Security Operations | Huff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas) |
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting | Wei, Renzheng (Institute of Information Engineering, Chinese Academy of Sciences); Cai, Lijun (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences); Meng, Dan (Institute of Information Engineering, Chinese Academy of Sciences) |
Smartphone Location Spoofing Attack in Wireless Networks | Hu, Chengbin (University of South Florida); Liu, Yao (University of South Florida); Lu, Zhuo (University of South Florida); Zhao, Shangqing (University of South Florida); Han, Xiao (University of South Flordia); Xiong, Junjie (University of South Florida) |
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks | Panchenko, Andriy (Brandenburg University of Technology); Mitseva, Asya (Brandenburg University of Technology); Ziemann, Torsten (Brandenburg University of Technology); Hering, Till (RWTH Aachen University) |
SemFlow: Accurate Semantic Identification from Low-Level System Data | Kavousi, Mohammad (Northwestern University); Yang, Runqing (Zhejiang University); Ma, Shiqing (Rutgers University); Chen, Yan (Northwestern University) |
Origin Attribution of RSA Public Keys | Branca, Enrico (Department of Computer Science, University of Saskatchewan); Abazari, Farzaneh (Department of Computer Science, University of Saskatchewan); Stakhanova, Natalia (Department of Computer Science, University of Saskatchewan); Rivera Carranza, Ronald (Department of Computer Science, University of Saskatchewan) |
Understanding ε for Differential Privacy in Differencing Attack Scenarios | Ashena, Narges (University of Zurich); Dell’Aglio, Daniele (Aalborg University, University of Zurich); Bernstein, Abraham (University of Zurich) |
Controlling network traffic microstructures for machine-learning model probing | Clausen, Henry (University of Edinburgh); Aspinall, David (University of Edinburgh); Flood, Robert (University of Edinburgh) |
TESLAC: Accelerating Lattice-based Cryptography with AI Accelerator | Wan, Lipeng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China / School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China / Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China); Zheng, Fangyu (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China); Lin, Jingqiang (University of Science and Technology of China) |
Leakuidator: Leaky resource attacks and countermeasures | Zaheri, Mojtaba (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology) |
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps | Liu, Yin (Virginia Tech); Cruz, Breno (Virginia Tech); Tilevich, Eli (Virginia Tech) |
Facilitating Parallel Fuzzing withMutually-exclusive Task Distribution | Wang, Yifan (Stevens Institute of Technology); Zhang, Yuchen (Stevens Institute of Technology); Pang, Chengbin (Nanjing Uniserity); Li, Peng (ByteDance); Triandopoulos, Nikolaos (Stevens Institute of Technology); Xu, Jun (Stevens Institute of Technology) |
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google | Leith, Douglas (Trinity College Dublin) |
Repeatable Experimentation for Cybersecurity Moving Target Defense | Acosta, Jaime Cesar (DEVCOM Army Research Laboratory); Clarke, Luisana (University of Texas at El Paso); Medina, Stephanie (University of Texas at El Paso); Akbar, Monika (University of Texas at El Paso); Hossain, Mahmud Shahriar (University of Texas at El Paso); Free-Nelson, Frederica (DEVCOM Army Research Laboratory) |
Flowrider: Fast On-Demand Key Provisioning for CloudNetworks | Paladi, Nicolae (Lund University); Tiloca, Marco (RISE Research Institutes of Sweden – RISE Cybersecurity); Nikbakht Bideh, Pegah (Lund University); Hell, Martin (Lund University) |
XHunter: Understanding XXE Vulnerability via Automatic Analysis | Wang, Zhenhua (NUDT); Xie, Wei (NUDT); Tao, Jing (NUDT); Wang, Baosheng (NUDT); Tang, Yong (NUDT); Wang, Enze (NUDT) |
Jabbic lookups: a backend telemetry-based system for malware triage | Bordeanu, Octavian Ciprian (University College London); Shen, Yun (NortonLifelock); Davies, Toby (University College London); Stringhini, Gianluca (Boston University) |
Research of CPA Attack Methods based on Ant Colony Algorithm | duan, xiaoyi (Beijing Electronic Science and Technology Institute); Li, You (Beijing Electronic Science and Technology Institute); Tong, Jianmin (Beijing Electronic Science and Technology Institute); Li, Xiuying (Beijing Electronic Science and Technology Institute); He, Siman (Hunan national secrecy science and technology evaluation centre); Zhang, Peishu (Beijing Electronic Science and Technology Institute) |
Late Track
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces | Wei, Yuheng (Shanghai Jiaotong University); zou, futai (shanghai jiao tong university) |
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System | li, zhangtan (Chinese Academy of Sciences); Cheng, Liang (Chinese Academy of Sciences); Zhang, Yang (Chinese Academy of Sciences); Li, Zhen (The Shenzhen Commercial Cipher Industry Association); Feng, Dengguo (Chinese Academy of Sciences) |
System-Wide Security for Offline Payment Terminals | Ivanov, Nikolay (Michigan State University); Yan, Qiben (Michigan State University) |
Understanding the Security of Deepfake Detection | Cao, Xiaoyu (Duke University); Gong, Neil (Duke University) |
Fine-grained Intra-domain Bandwidth Allocation against DDoS Attack | Xie, Lijia (Beihang University); Zhang, Xiao (Beihang University); Shi, Yiming (Beihang University); Xiao, Xin (Beihang University); Zheng, Zhiming (Beihang University) |
Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy | Sivakumaran, Pallavi (Royal Holloway University of London); Blasco, Jorge (Royal Holloway University of London) |
TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest | zhao, panpan (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); gou, gaopeng (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); liu, chang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); guan, yangyang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); cui, mingxin (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); xiong, gang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;) |
Using NetFlow to measure the impact of deploying DNS-based blacklists | Andersen, Martin Fejrskov (Telenor Denmark); Pedersen, Jens Myrup (Aalborg University); Vasilomanolakis, Emmanouil (Aalborg University) |
A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysis | Xiaojie, Xu (Sichuan university); Jian, Dong (Third Research Institute of Ministry of Public Security); Zhengyu, Liu (Sichuan University); Jin, Yang (Sichuan University); Bin, Wang (Southwest Jiaotong University); Zhaoyuan, Wang (Southwest Jiaotong University) |
PhD and Poster Tracks
Encouraging the adoption of Post-Quantum Hybrid Key Exchange in Network Security | Giron, Alexandre Augusto (Federal University of Santa Catarina (UFSC) / Federal University of Technology – Parana (UTFPR), Brazil) |
Poisoning Attack for Inter-agent Transfer Learning | Cheng, Zelei (Purdue University) |
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection | Ouyang, Linshu (Institute of Information Engineering, Chinese Academy of Sciences); Zhang, Yongzheng (Institute of Information Engineering, Chinese Academy of Sciences) |
Quantitative and Qualitative Investigations into Trusted Execution Environments | Karl, Ryan (University of Notre Dame) |
PQC-SC workshop
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors | Sanal, Pakize (Florida Atlantic University); Karagoz, Emrah (Florida Atlantic University); Seo, Hwajeong (Hansung University); Azarderakhsh, Reza (Florida Atlantic University); Mozaffari-Kermani, Mehran (University of South Florida) |
Compressed SIKE Round 3 on ARM Cortex-M4 | Anastasova, Mila (Florida Atlantic University); Bisheh-Niasar, Mojtaba (Florida Atlantic University); Azarderakhsh, Reza (Florida Atlantic University); Mozaffari Kermani, Mehran (University of South Florida) |
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based Cryptosystem | Perriello, Simone (Politecnico di Milano); Barenghi, Alessandro (Politecnico di Milano); Pelosi, Gerardo (Politecnico di Milano) |
An Efficient Post-Quantum PKE from RLWR with Simple Security Proof | Abla, Parhat (Institute of Information Engineering,CAS) |
Hardware Deployment of Hybrid PQC: SIKE+ECDH | Azarderakhsh, Reza (PQSecure Technologies); Koziel, Brian (PQSecure Technologies); El Khatib, Rami (PQSecure Technologies); Langenberg, Brandon (PQSecure Technologies) |