| Accelerating Performance of Bilinear Map Cryptography using FPGA |
Andrei Ouatu, Gabriel Ghinita and Razvan Rughinis |
| Exploiting Update Leakage in Searchable Symmetric Encryption |
Jacob Haltiwanger and Thang Hoang |
| The Avg-Act Swap and Plaintext Overflow Detection in Fully Homomorphic Operations Over Deep Circuits |
Ihyun Nam |
| CoCoT: Collaborative Contact Tracing |
Trevor Kann, Lujo Bauer and Robert Cunningham |
| Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation |
Alessandro Baccarini, Marina Blanton and Shaofeng Zou |
| Crypto’Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning |
Zelma Aubin Birba, Marc-Olivier Killijian, Sébastien Gambs and Sofiane Azogagh |
| Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design Files |
Aleksandr Dolgavin, Mark Yampolskiy and Moti Yung |
| From Theory to Comprehension: A Comparative Study of Differential Privacy and k-Anonymity |
Saskia Nuñez von Voigt, Luise Mehner and Florian Tschorsch |
| Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning |
Naveen Kumar K, Krishna Mohan C and Aravind Machiry |
| Coherent Multi-Table Data Synthesis for Tabular and Time-Series Data with GANs |
Clement Elliker, Emeric Tonnelier and Aymen Shabou |
| Re-pseudonymization strategies for smart-meter are not robust to deep learning-based profiling attacks |
Ana-Maria Cretu, Miruna Rusu and Yves-Alexandre de Montjoye |
| Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response |
Matta Varun, Shuya Feng, Han Wang, Shamik Sural and Yuan Hong |
| (Dataset/Tool) Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data Types |
Mariana Cunha, Guilherme Duarte, Ricardo Andrade, Ricardo Mendes and João P. Vilela |
| WikiPhish: A Diverse Wikipedia-Based Dataset for Phishing Website Detection |
Gabriel Loiseau, Valentin Lefils, Maxime Meyer and Damien Riquet |
| CrashTalk: Automated Generation of Precise, Human Readable, Descriptions of Software Security Bugs |
Kedrian James, Kevin Valakuzhy, Kevin Snow and Fabian Monrose |
| TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis |
Kiavash Satvat, Rigel Gjomemo and Vn Venkatakrishnan |
| AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning |
Kento Hasegawa, Seira Hidano and Kazuhide Fukushima |
| Privacy Preserving Biometric Authentication |
Marina Blanton and Dennis Murphy |
| Remote Registration of Multiple Authenticators |
Yongqi Wang, Thalia Laing, José Moreira and Mark D. Ryan |
| SLIM-View: Sampling and Private Publishing of Multidimensional Databases |
Ala Eddine Laouir and Abdessamad Imine |
| Mining Domain-Based Policies |
Si Zhang and Philip W.L. Fong |
| Risky Cohabitation: Understanding and Addressing Over-privilege Risks of Commodity Application Virtualization Platforms in Android |
Shou-Ching Hsiao, Shih-Wei Li and Hsu-Chun Hsiao |
| FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices |
Jinghui Liao, Niusen Chen, Lichen Xia, Bo Chen and Weisong Shi |
| Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal |
Mashari Alatawi and Nitesh Saxena |
| (Dataset/Tool) Smishing Dataset I: Phishing SMS Dataset from Smishtank.com |
Daniel Timko and Muhammad Lutfor Rahman |
| A Unified Time Series Analytics based Intrusion Detection Framework for CAN BUS Attacks |
Maisha Maliha and Shameek Bhattacharjee |
| CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters |
Mahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour and Makan Pourzandi |
| Process-Aware Intrusion Detection in MQTT Networks |
Philip Empl, Fabian Böhm and Günther Pernul |
| Estimating the Runtime and Global Network Traffic of SMPC Protocols |
Andreas Klinger, Vincent Ehrmanntraut and Ulrike Meyer |
| Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for “Dead-Drop" Deployments |
Luke Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler and Thomas Shrimpton |
| Investigating TLS Version Downgrade in Enterprise Software |
Ka Fun Tang, Ka Lok Wu and Sze Yiu Chau |
| Examining Cryptography and Randomness Failures in Open-Source Cellular Cores |
K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin Butler, William Enck and Patrick Traynor |
| Nothing Personal: Understanding the Theft, Spread, and Use of Personally Identifiable Information in the Financial Ecosystem |
Mehrnoosh Zaeifi, Faezeh Kalantari, Adam Oest, Zhibo Sun, Gail-Joon Ahn, Yan Shoshitaishvili, Tiffany Bao, Ruoyu Wang and Adam Doupe |