Accepted papers

Main Track

TitleAuthors
CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge GraphHuang, Yue (Sichuan University); Guo, Yongyan (Sichuan university); Huang, Cheng (Sichuan University)
Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph FeaturesLiu, ZhanPeng (Peking University); Han, XinHui (Peking University)
VRC-GraphNet: A Graph Neural Network-based Reasoning Framework for Attacking Visual Reasoning CaptchasXu, Botao (Sichuan University); Wang, Haizhou (Sichuan University)
Street Rep: A Privacy-Preserving Reputation Aggregation SystemHauser, Christophe (University of Southern California); Nilizadeh, Shirin (University of Texas, Arlington); Shoshitaishvili, Yan (Arizona State University); Trieu, Ni (Arizona State University); ravi, srivatsan (University of Southern California); Kruegel, Christopher (University of California, Santa Barbara, USA); Vigna, Giovanni (University of California, Santa Barbara, USA)
CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on FuzzingWang, Yuxuan (Tsinghua University); Li, Yishen (Tsinghua University); Zhuge, Jianwei (Tsinghua University)
Analyzing Implementation based SSL/TLS Vulnerabilities with Binary Semantics AnalysisWang, Li (Fontbonne University); Yang, Yi (Northeastern Illinois University); Alavalapati, Goutham Reddy (Fontbonne University)
Byzantine Protocols with Asymptotically Optimal Communication ComplexityLYU, HANZHENG (UBC); Xie, Shaokang (Southern University of Science and Technology); Niu, Jianyu (Southern University of Science and Technology); Feng, Chen (UBC)
VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detectionChen, Jinfu (School of Computer Science and Communication Engineering, Jiangsu University); Feng, Qiaowei (School of Computer Science and Communication Engineering, Jiangsu University); Cai, Saihua (School of Computer Science and Communication Engineering, Jiangsu University); Shi, Dengzhou (School of Computer Science and Communication Engineering, Jiangsu University); Towey, Dave (School of Computer Science, University of Nottingham Ningbo China); Chen, Yuhao (School of Computer Science and Communication Engineering, Jiangsu University); Wang, Dongjie (School of Computer Science and Communication Engineering, Jiangsu University)
Visibility of Scan Traffic Trends in Sparsely Populated DarknetsMizutani, Kodai (Kyoto University); Kotani, Daisuke (Kyoto University); Okabe, Yasuo (Kyoto University)
An Efficient Private Information Retrieval Protocol Based on TFHETian, Haibo (SUN YAT-SEN UNIVERSITY); Lin, Yini (SUN YAT-SEN UNIVERSITY)
Optimizing Lightweight Intermittent Message Authentication for Programmable Logic ControllerYang, Jiaqi (Southwest University); Chia, Jun Xian (Singapore University of Technology and Design); Ba, Xijie (Southwest University); Zhou, Jianying (Singapore University of Technology and Design); Yang, Zheng (Southwest University)
Ransomware as a Service: Demystifying Android Ransomware GeneratorsTu, Can (Huazhong University of Science and Technology); Wang, Liu (Beijing University of Posts and Telecommunications); Xu, Yang (China Mobile Information Security Center); Zhao, Yiping (Beijing University of Posts and Telecommunications); Xu, Haitao (Zhejiang University); Wang, Haoyu (Huazhong University of Science and Technology)
Split Without a Leak: Reducing Privacy Leakage in Split LearningNguyen, Khoa (Tampere University); Khan, Tanveer (Tampere University); Michalas, Antonis (Tampere University)
A Stable Fine-grained Webpage Fingerprinting: Aiming at the Unstable Realistic NetworkLiu, Songtao (Southeast University); Wu, Hua (Southeast University); Luo, Hao (Southeast University); Cheng, Guang (Southeast University); Hu, Xiaoyan (Southeast University)
Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CSLin, Xi (Institute of Information Engineering, University of Chinese Academy of Sciences); Xia, Han (Institute of Information Engineering, University of Chinese Academy of Sciences); Li, Yongqiang (Institute of Information Engineering); Wang, Mengsheng (Institute of Information Engineering)
Practical Privacy-Preserving Community Detection in Decentralized Weighted NetworksHan, Tingxuan (Nanjing University, China); Tong, Wei (Nanjing University, China); Niu, Jiacheng (Nanjing University, China); Zhong, Sheng (Nanjing University, China)
Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom FilterRuan, Ou (Hubei University of Technology); Ai, Chaohao (Hubei University of Technology); Yan, Changwang (Hubei University of Technology)
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network InferenceNguyen, Khanh (University of Wollongong); Hoang Duong, Dung (University of Wollongong); Chow, Yang-Wai (University of Wollongong); Susilo, Willy (University of Wollongong)
An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle DensityPeng, Hao (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Zhang, Ruirui (Changsha University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
Password Cracking by Exploiting User Group InformationZhou, Beibei (East China Normal University); He, Daojing (East China Normal University); Zhu, Sencun (Pennsylvania State University); Zhu, ShanShan (Harbin Institute of Technology, Shenzhen); Chan, Sammy (City University of Hong Kong); Yang, Xiao (East China Normal Unversity)
mShield: Protect In-process Sensitive Data Against Vulnerable Third-Party Librarieszhang, yunming (University of Science and Technology of China); cai, quanwei (Beijing Zitiao Network Technology Co., Ltd); li, houqiang (University of Science and Technology of China); lin, jingqiang (University of Science and Technology of China); wang, wei (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences)
Invisibility Spell:Adversarial Patch Attack Against Object DetectorsZhang, Jianyi (Beijing Electronic Science and Technology Institute); Guan, Ronglin (Beijing Electronic Science and Technology Institute); Li, Xiuying (Beijing Electronic Science and Technology Institute); Zhao, Zhangchi (Beijing Electronic Science and Technology Institute); Sun, Zezheng (Beijing Electronic Science and Technology Institute)
Unsupervised and Adaptive Tor Website FingerprintingZhang, Guoqiang (Tsinghua University); Cao, Jiahao (Tsinghua University); Xu, Mingwei (Tsinghua University); Deng, Xinhao (Tsinghua University)
PPEC: Privacy-Preserving and Cost-Effective Incremental Density Peak Clustering Scheme for Profit-Driven CloudsLu, RuiHeng (university of electronic science and technology of china); Huang, Dabin (university of electronic science and technology of china); Wang, Xiaofen (university of electronic science and technology of china); Yang, Haomiao (university of electronic science and technology of china)
Enhancing Cross-Device Security with Fine-Grained Permission ControlHu, Han (Tsinghua Shenzhen International Graduate School); Wang, Daibin (Huawei Technologies Co., Ltd); Hong, Tailiang (Huawei Technologies Co., Ltd); Zhang, Sheng (Tsinghua Shenzhen International Graduate School)
Efficient and Scalable Multi-Party Privacy-Preserving k-NN ClassificationLi, Xinglei (East China Normal University); Qian, Haifeng (East China Normal University)
Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDSRusch, Neea (Augusta University); Jodeiri Akbarfam, Asma (Augusta University); Maleki, Hoda (Augusta University); Agrawal, Gagan (Augusta University); Dorai, Gokila (Augusta University)
Unsupervised Multi-Criteria Adversarial Detection in Deep Image RetrievalXiao, Yanru (Old Dominion University); Wang, Cong (Zhejiang University); Gao, Xing (University of Delaware)
Securing Web Inputs using Parallel Session AttachmentsYang, Ziqi (Zhejiang University); Xu, Ruite (Zhejiang University); Wu, Shikun (Zhejiang University); Mao, Jian (Beihang University); Liang, Zhenkai (National University of Singapore)
Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart HomeGuo, Minglei (Tsinghua University); Xiao, Zhenghang (Hunan University); Liu, Xin (Lanzhou University); Zhuge, Jianwei (Tsinghua University)
VET: Autonomous Vehicular Credential Verification using Trajectory and Motion VectorsOguchi, Ebuka (University of Nebraska-Lincoln); Ghose, Nirnimesh (University of Nebraska-Lincoln)
CUFT: Cuflow-based Approach with Multi-headed Attention Mechanism for Encrypted Traffic ClassificationZong, Xin (School of Cyber Science and Engineering, Wuhan University); Luo, Min (School of Cyber Science and Engineering, Wuhan University); Peng, Cong (School of Cyber Science and Engineering, Wuhan University); He, Debiao (School of Cyber Science and Engineering, Wuhan University)
PDFIET: PDF Malicious Indicators Extraction Technique through Optimized Symbolic ExecutionEnzhou, Song (National Digital Switching System Engineering Technological R&D Center); Tao, Hu (National Digital Switching System Engineering Technological R&D Center); Peng, Yi (National Digital Switching System Engineering Technological R&D Center); Wenbo, Wang (National Digital Switching System Engineering Technological R&D Center)
Optimization of Functional Bootstraps with Large LUT and Packing Key SwitchingLiu, Keyi (Nanjing University of Science and Technology); Xu, Chungen (Nanjing university of science and technology); Dou, Bennian (Nanjing University of Science and Technology); Xu, Lei (Nanjing University of Science and Technology)
Anonymous Key Issuing Protocol with Certified Identities in Identity-based EncryptionYang, Yanqing (Nanjing University of Aeronautics and Astronautics); Wang, Jian (Nanjing University of Aeronautics and Astronautics)
Meta Perturbation Generation Network for Text-based CAPTCHAWu, Zhuoting (Guangdong University of Technology, Guangzhou, China); Guo, Zhiwei (Guangdong University of Technology, Guangzhou, China); You, Jiuxiang (Guangdong University of Technology, Guangzhou, China); Yang, Zhenguo (Guangdong University of Technology, Guangzhou, China); Li, Qing (The Hong Kong Polytechnic University, Hong Kong, China); Liu, Wenyin (Guangdong University of Technology, Guangzhou, China)
Demystifying Blockchain Scalability: Sibling Chains with Minimal InterleavingMa, Jiangfeng (ECNU); Zhang, Xuetao (ECNU); li, xiangxue (ecnu)
DNN Architecture Attacks via Network and Power Side ChannelsDai, Yuanjun (Case Western Reserve University); Guo, Qingzhe (Case Western Reserve University); Wang, An (Case Western Reserve University)
The Security Analysis of ROS2 CommunicationYang, Shuo (MoE Engineering Research Center for Software/Hardware Co-design Technology and Application, ECNU); Li, Hongru (Shanghai Trusted Industry Internet Software Collaborative Innovation Center, ECNU); Guo, Jian (National Trusted Embedded Software Engineering Technology Research Center, ECNU)
Do Backdoors Assist Membership Inference Attacks?Goto, Yumeki (Osaka University); Ashizawa, Nami (NTT); Shibahara, Toshiki (NTT); Yanai, Naoto (Osaka University)
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural NetworksLiu, Renyang (School of Information Science and Engineering, Yunnan University); Zhou, Wei (Engineering Research Center of Cyberspace, Yunnan University); Zhang, Jinhong (School of Software and Engineering and the Engineering Research Center of Cyberspace, Yunnan University); Liu, Xiaoyuan (University of Electronic Science and Technology of China); Si, Peiyuan (School of Computer Science and Engineering, Nanyang Technological University); Li, Haoran (School of Software and Engineering and the Engineering Research Center of Cyberspace, Yunnan University)
An Authentication Algorithm for Sets of Spatial Data ObjectsLi, Wenhao (Chongqing University); Wang, Chengliang (Chongqing University); Hu, Xiaobing (Chongqing University); Zhou, Hongwen (Chongqing Planning and Natural Resources Information Center); Zeng, Hang (Chongqing Planning and Natural Resources Information Center); Wang, Yanai (Chongqing BI Academy)

Late Track

TitleAuthors
A Game Theoretical Analysis of Distributed Denial-of-Service Defense IncentiveZhang, Mingwei (University of Oregon); Li, Jun (University of Oregon); Wu, Jiabin (University of Oregon); Reiher, Peter (University of California, Los Angeles)
Enabling Fast Settlement in Atomic Cross-Chain SwapsZhuo, Feng (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Song, Zhaoxiong (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China); Jia, Linpeng (Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China); Zhang, Hanwen (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Li, Zhongcheng (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Sun, Yi (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China)
Learning AI coding style for software plagiarism detectionAmbati, Sri Haritha (University of Saskatchewan); Stakhanova, Natalia (University of Saskatchewan); Branca, Enrico (Department of Computer Science, University of Saskatchewan)
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of MillionsShi, Lumin (University of Oregon); Li, Jun (University of Oregon); Sisodia, Devkishen (University of Oregon); Zhang, Mingwei (University of Oregon); Dainotti, Alberto (Georgia Tech); Reiher, Peter (UCLA)
Understanding and Measuring Inter-Process Code Injection in Windows MalwareStarink, Jerre (University of Twente); Huisman, Marieke (University of Twente); Peter, Andreas (University of Twente); Continella, Andrea (University of Twente)
POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access ControlDubasi, Yatish (University of Arkansas); Li, Qinghua (University of Arkansas); Luu, Khoa (University of Arkansas)
MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic IdentificationFan, Zuwei (Institute of Information Engineering); Zhang, Shunliang (Institute of Information Engineering.CAS)
Efficient Zero Knowledge for Regular LanguageRaymond, Michael (Hofstra University); Evers, Gillian (Hofstra University); Ponti, Jan (Hofstra University); Krishnan, Diya (Ramanujan Homeschool Academy); Fu, Xiang (Hofstra University)
Certificateless Aggregate Signature Without Trapdoor for Cloud StorageDong, Yingjie (university of electronic science and technology of china); Liao, Yongjian (university of electronic science and technology of china); Zhang, Zhishuo (university of electronic science and technology of china); Huang, Wen (Sichuan University)

Workshop Track

TitleAuthors
Lightweight Intrusion Detection for IoT Systems using Artificial Neural NetworksSaleh, Radhwan A. A. (King Fahd University of Petroleum and Minerals (KFUPM)); Al-Awami, Louai (King Fahd University of Petroleum and Minerals (KFUPM)); Ghaleb, Mustafa (King Fahd University of Petroluem and Minerals (KFUPM)); Abudaqa, Anas A. (King Fahd University for Petroluem and Minerals (KFUPM))