Accepted papers

Main Track

iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-physical SystemsShahriar, Md Hasan (Florida International University); Rahman, Mohammad Ashiqur (Florida International University); Haque, Nur Imtiazul (Florida International Univeristy); Chowdhury, Badrul (University of North Carolina at Charlotte); Whisenant, Steven G (Duke Energy)
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users’ BehaviorsFukushi, Naoki  (NTT Secure Platform Laboratories); Koide, Takashi (NTT Secure Platform Laboratories); Chiba, Daiki (NTT Secure Platform Laboratories); Nakano, Hiroki (NTT Secure Platform Laboratories); Akiyama, Mitsuaki (NTT Secure Platform Laboratories)
Horus: A Security Assessment Framework for Android Crypto WalletsUddin, Md Shahab (Concordia); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia Univeristy)
Compromised through CompressionVan Aubel, Pol (Radboud University); Poll, Erik (Radboud University Nijmegen)
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault RecoveryKarl, Ryan  (University of Notre Dame); Takeshita, Jonathan (University of Notre Dame); Jung, Taeho (University of Notre Dame)
Cryptonomial: A Framework for Private Time-Series Polynomial CalculationsKarl, Ryan (University of Notre Dame); Takeshita, Jonathan   (University of Notre Dame); Mohammed, Al-Amin  (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame)
ToFi: An Algorithm to Defend against Byzantine Attacks in Federated LearningXia, Qi (College of William and Mary); Tao, Zeyi (College of William and Mary); Li, Qun   (College of William and Mary)
Provably Secure Contact Tracing with Conditional Private Set IntersectionTakeshita, Jonathan (University of Notre Dame); Karl, Ryan (University of Notre Dame); Mohammed, Alamin (University of Notre Dame); Striegel, Aaron (University of Notre Dame); Jung, Taeho (University of Notre Dame)
A Forensic Tool to Acquire Radio Signals using Software Defined Radio Azhar, Hannan (Canterbury Christ Church University); Abadia, German (Canterbury Christ Church University)
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event ManagementNajafi, Pejman (Hasso Plattner Institute, University of Potsdam); Cheng, Feng (Hasso Plattner Institute, University of Potsdam, Germany); Meinel, Christoph (Hasso Plattner Institute, University of Potsdam, Germany)
An Empirical Study on Mobile Payment Credential Leaks and Their ExploitsShi, Shangcheng (The Chinese University of Hong Kong); Wang, Xianbo (The Chinese University of Hong Kong); Zeng, Kyle   (Arizona State University & The Chinese University of Hong Kong); Yang, Ronghai (Sangfor Technology Inc & The Chinese University of Hong Kong); Lau, Wing Cheong   (The Chinese University of Hong Kong)
Local Model Privacy-preserving Study for Federated LearningPan, Kaiyun (East China Normal University); He, Daojing (East China Normal University); Xu, Chuan (Inria Sophia Antipolis)
CROCUS: An objective approach for SDN controllers security assessmentSilva, Carlos (University of Coimbra); Sousa, Bruno (University of Coimbra); Vilela, Joao   (University of Porto)
Anonymous Short Communications over Social NetworksBuccafurri, Francesco (DIIES Dept.- University of Reggio Calabria); De Angelis, Vincenzo   (DIIES Dept.- University of Reggio Calabria); Idone, Maria Francesca (DIIES Dept.- University of Reggio Calabria); Labrini, Cecilia (DIIES Dept.- University of Reggio Calabria)
Explanation-Guided Diagnosis of Machine Learning Evasion AttacksAmich, Abderrahmen (University of Michigan, Dearborn); Eshete, Birhanu (University of Michigan, Dearborn)
An Extensive Security Analysis on Ethereum Smart ContractsMohammadreza Ashouri (St. Pölten University of Applied Science)
MPD: Moving Target Defense through Communication Protocol DialectsMei, Yongsheng (The George Washington University); Gogineni, Kailash (The George Washington University); Lan, Tian (The George Washington University); Venkataramani, Guru   (The George Washington University)
A Distributed Ledger for Non-Attributable Cyber Threat Intelligence ExchangeHuff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas)
Towards Automated Assessment of Vulnerability Exposures in Security OperationsHuff, Philip (University of Arkansas); Li, Qinghua (University of Arkansas)
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat HuntingWei, Renzheng (Institute of Information Engineering, Chinese Academy of Sciences); Cai, Lijun   (Institute of Information Engineering, Chinese Academy of Sciences); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences); Meng, Dan   (Institute of Information Engineering, Chinese Academy of Sciences)
Smartphone Location Spoofing Attack in Wireless NetworksHu, Chengbin (University of South Florida); Liu, Yao (University of South Florida); Lu, Zhuo   (University of South Florida); Zhao, Shangqing (University of South Florida); Han, Xiao   (University of South Flordia); Xiong, Junjie   (University of South Florida)
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy NetworksPanchenko, Andriy (Brandenburg University of Technology); Mitseva, Asya (Brandenburg University of Technology); Ziemann, Torsten (Brandenburg University of Technology); Hering, Till (RWTH Aachen University)
SemFlow: Accurate Semantic Identification from Low-Level System DataKavousi, Mohammad (Northwestern University); Yang, Runqing (Zhejiang University); Ma, Shiqing (Rutgers University); Chen, Yan (Northwestern University)
Origin Attribution of RSA Public KeysBranca, Enrico (Department of Computer Science, University of Saskatchewan); Abazari, Farzaneh (Department of Computer Science, University of Saskatchewan); Stakhanova, Natalia   (Department of Computer Science, University of Saskatchewan); Rivera Carranza, Ronald   (Department of Computer Science, University of Saskatchewan)
Understanding ε for Differential Privacy in Differencing Attack ScenariosAshena, Narges (University of Zurich); Dell’Aglio, Daniele (Aalborg University, University of Zurich); Bernstein, Abraham (University of Zurich)
Controlling network traffic microstructures for machine-learning model probingClausen, Henry (University of Edinburgh); Aspinall, David (University of Edinburgh); Flood, Robert (University of Edinburgh)
TESLAC: Accelerating Lattice-based Cryptography with AI AcceleratorWan, Lipeng (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China / School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China / Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China); Zheng, Fangyu   (State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China); Lin, Jingqiang   (University of Science and Technology of China)
Leakuidator: Leaky resource attacks and countermeasuresZaheri, Mojtaba (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology)
HTPD: Secure and Flexible Message-Based Communication for Mobile AppsLiu, Yin (Virginia Tech); Cruz, Breno (Virginia Tech); Tilevich, Eli (Virginia Tech)
Facilitating Parallel Fuzzing withMutually-exclusive Task DistributionWang, Yifan (Stevens Institute of Technology); Zhang, Yuchen (Stevens Institute of Technology); Pang, Chengbin   (Nanjing Uniserity); Li, Peng (ByteDance); Triandopoulos, Nikolaos (Stevens Institute of Technology); Xu, Jun (Stevens Institute of Technology)
Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And GoogleLeith, Douglas (Trinity College Dublin)
Repeatable Experimentation for Cybersecurity Moving Target DefenseAcosta, Jaime Cesar (DEVCOM Army Research Laboratory); Clarke, Luisana (University of Texas at El Paso); Medina, Stephanie (University of Texas at El Paso); Akbar, Monika (University of Texas at El Paso); Hossain, Mahmud Shahriar  (University of Texas at El Paso); Free-Nelson, Frederica   (DEVCOM Army Research Laboratory)
Flowrider: Fast On-Demand Key Provisioning for CloudNetworksPaladi, Nicolae (Lund University); Tiloca, Marco (RISE Research Institutes of Sweden – RISE Cybersecurity); Nikbakht Bideh, Pegah (Lund University); Hell, Martin   (Lund University)
XHunter: Understanding XXE Vulnerability via Automatic AnalysisWang, Zhenhua (NUDT); Xie, Wei (NUDT); Tao, Jing (NUDT); Wang, Baosheng (NUDT); Tang, Yong (NUDT); Wang, Enze (NUDT)
Jabbic lookups: a backend telemetry-based system for malware triageBordeanu, Octavian Ciprian  (University College London); Shen, Yun (NortonLifelock); Davies, Toby (University College London); Stringhini, Gianluca (Boston University)
Research of CPA Attack Methods based on  Ant Colony Algorithmduan, xiaoyi  (Beijing Electronic Science and Technology Institute); Li, You (Beijing Electronic Science and Technology Institute); Tong, Jianmin   (Beijing Electronic Science and Technology Institute); Li, Xiuying  (Beijing Electronic Science and Technology Institute); He, Siman   (Hunan national secrecy science and technology evaluation centre); Zhang, Peishu (Beijing Electronic Science and Technology Institute)

Late Track

Automatic Generation of Malware Threat Intelligence from Unstructured Malware TracesWei, Yuheng (Shanghai Jiaotong University); zou, futai (shanghai jiao tong university)
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical Systemli, zhangtan (Chinese Academy of Sciences); Cheng, Liang (Chinese Academy of Sciences); Zhang, Yang (Chinese Academy of Sciences); Li, Zhen (The Shenzhen Commercial Cipher Industry Association); Feng, Dengguo (Chinese Academy of Sciences)
System-Wide Security for Offline Payment TerminalsIvanov, Nikolay (Michigan State University); Yan, Qiben (Michigan State University)
Understanding the Security of Deepfake DetectionCao, Xiaoyu (Duke University); Gong, Neil (Duke University)
Fine-grained Intra-domain Bandwidth Allocation against DDoS AttackXie, Lijia (Beihang University); Zhang, Xiao (Beihang University); Shi, Yiming (Beihang University); Xiao, Xin (Beihang University); Zheng, Zhiming (Beihang University)
Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low EnergySivakumaran, Pallavi (Royal Holloway University of London); Blasco, Jorge (Royal Holloway University of London)
TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forestzhao, panpan (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); gou, gaopeng (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); liu, chang (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); guan, yangyang   (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); cui, mingxin   (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;); xiong, gang   (Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences;)
Using NetFlow to measure the impact of deploying DNS-based blacklistsAndersen, Martin Fejrskov (Telenor Denmark); Pedersen, Jens Myrup (Aalborg University); Vasilomanolakis, Emmanouil  (Aalborg University)
A Sybil detection method in OSN based on DistilBERT and Double-SN-LSTM for text analysisXiaojie, Xu (Sichuan university); Jian, Dong (Third Research Institute of Ministry of Public Security); Zhengyu, Liu   (Sichuan University); Jin, Yang (Sichuan University); Bin, Wang   (Southwest Jiaotong University); Zhaoyuan, Wang (Southwest Jiaotong University)

PhD and Poster Tracks

Encouraging the adoption of Post-Quantum Hybrid Key Exchange in Network SecurityGiron, Alexandre Augusto (Federal University of Santa Catarina (UFSC) / Federal University of Technology – Parana (UTFPR), Brazil)
Poisoning Attack for Inter-agent Transfer LearningCheng, Zelei (Purdue University)
Phishing Web Page Detection with Semi-Supervised Deep Anomaly DetectionOuyang, Linshu (Institute of Information Engineering, Chinese Academy of Sciences); Zhang, Yongzheng (Institute of Information Engineering, Chinese Academy of Sciences)
Quantitative and Qualitative Investigations into Trusted Execution EnvironmentsKarl, Ryan (University of Notre Dame)


PQC-SC workshop
Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A ProcessorsSanal, Pakize (Florida Atlantic University); Karagoz, Emrah (Florida Atlantic University); Seo, Hwajeong (Hansung University); Azarderakhsh, Reza   (Florida Atlantic University); Mozaffari-Kermani, Mehran (University of South Florida)
Compressed SIKE Round 3 on ARM Cortex-M4Anastasova, Mila (Florida Atlantic University); Bisheh-Niasar, Mojtaba   (Florida Atlantic University); Azarderakhsh, Reza (Florida Atlantic University); Mozaffari Kermani, Mehran (University of South Florida)
A Quantum Circuit to Speed-up the Cryptanalysis of Code-based CryptosystemPerriello, Simone (Politecnico di Milano); Barenghi, Alessandro   (Politecnico di Milano); Pelosi, Gerardo (Politecnico di Milano)
An Efficient Post-Quantum PKE from RLWR with Simple Security ProofAbla, Parhat (Institute of Information Engineering,CAS)
Hardware Deployment of Hybrid PQC: SIKE+ECDHAzarderakhsh, Reza (PQSecure Technologies); Koziel, Brian (PQSecure Technologies); El Khatib, Rami (PQSecure Technologies); Langenberg, Brandon   (PQSecure Technologies)