Accepted Paper (2nd)

Title

Authors

SPEAR-V: Secure and Practical Enclave Architecture for RISC-V

David Schrammel (Graz University of Technology, Austria), Moritz Waser (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Martin Unterguggenberger (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

Electromagnetic Signal Injection Attacks on Differential Signaling

Youqian Zhang (University of Oxford, UK), Kasper Rasmussen (University of Oxford, UK)

How Secure Are The Main Real-World Mix Networks — Case Studies To Explore Vulnerabilities And Usability

Kun Peng (Huawei Technology Ltd, Australia)

Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup

Mengdie Huang (Xidian University, China), Yi Xie (Xidian University, China), Xiaofeng Chen (Xidian University, China), Jin Li (Guangzhou University, China), Changyu Dong (Newcastle University, United Kingdom), Zheli Liu (Nankai University, China), Willy Susilo (University of Wollongong, Australia)

RaceBench: A Triggerable and Observable Concurrency Bug Benchmark

Jiashuo Liang (Peking University, China), Ming Yuan (Tsinghua University, China), Zhanzhao Ding (Peking University, China), Siqi Ma (The University of New South Wales, Australia), Xinhui Han (Peking University, China), Chao Zhang (Tsinghua University, China)

SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks

Oleg Schell (Robert Bosch GmbH, Germany), Marcel Kneib (Robert Bosch GmbH, Germany)

BFU: Bayesian Federated Unlearning with Parameter Self-Sharing

Weiqi Wang (University of Technology Sydney, Australia), Chenhan Zhang (University of Technology Sydney, Australia), An Liu (Soochow University, China), Shui Yu (University of Technology Sydney, Australia)

Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims

Aydin Abadi (University College London, UK), Steven J. Murdoch (University College London, UK)

SoK: Systematizing Attack Studies in Federated Learning – From Sparseness to Completeness

Geetanjli Sharma (La Trobe University and CSIRO’s Data61, Australia), M.A.P. Chamikara (La Trobe University and CSIRO’s Data61, Australia), Mohan Baruwal (La Trobe University and CSIRO’s Data61, Australia), Yi-Ping Phoebe Chen (La Trobe University and CSIRO’s Data61, Australia)

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

Markus Dahlmanns (RWTH Aachen University, Germany), Constantin Sander (RWTH Aachen University, Germany), Robin Decker (RWTH Aachen University, Germany), Klaus Wehrle (RWTH Aachen University, Germany)

BinWrap: Hybrid Protection against Native Node.js Add-ons

George Christou (FORTH-ICS, Greece), Grigoris Ntousakis (Brown University, USA), Eric Lahtinen (Aarno Labs, USA), Sotiris Ioannidis (TU Crete, Greece), Vasileios P. Kemerlis (Brown University, USA), Nikos Vasilakis (Brown University, USA)

Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging

Martin Unterguggenberger (Graz University of Technology, Austria), David Schrammel (Graz University of Technology, Austria), Pascal Nasahl (Graz University of Technology, Austria), Robert Schilling (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

Going Haywire: False Friends in Federated Learning and How to Find Them

William Aiken (University of Ottawa, Canada), Paula Branco (University of Ottawa, Canada), Guy-Vincent Jourdan (University of Ottawa, Canada)

ShowTime: Amplifying Arbitrary CPU Timing Side Channels

Antoon Purnal (imec-COSIC, KU Leuven, Belgiun), Marton Bognar (imec-COSIC, KU Leuven, Belgiun), Frank Piessens (imec-COSIC, KU Leuven, Belgiun), Ingrid Verbauwhede (imec-COSIC, KU Leuven, Belgiun)

Data Privacy Examination against Semi-Supervised Learning

Jiadong Lou (University of Louisiana at Lafayette, USA), Xu Yuan (University of Louisiana at Lafayette, USA), Miao Pan (University of Houston, USA), Hao Wang (Louisiana State University, USA), Nianfeng Tzeng (University of Louisiana at Lafayette, USA)

Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck

Chenhan Zhang (University of Technology Sydney, Australia), Weiqi Wang (University of Technology Sydney, Australia), James J.Q. Yu (Southern University of Science and Technology, China), Shui Yu (University of Technology Sydney, Australia)

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum

Muhammed F. Esgin (Monash University and CSIRO’s Data61, Australia), Oguzhan Ersoy (Radboud University and Delft University of Technology, Netherlands), Veronika Kuchta (Florida Atlantic University, USA), Julian Loss (CISPA Helmholtz Center for Information Security, Germany), Amin Sakzad (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Xiangwen Yang (Monash University, Australia), Raymond K. Zhao (CSIRO’s Data61, Australia)

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks

Mengyao Ma (The University of Queensland, Australia), Yanjun Zhang (University of Technology Sydney, Australia), Pathum Chamikara Mahawaga Arachchige (CSIRO’s Data61, Australia), Leo Yu Zhang (Griffith University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)

Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications

Baiqi Chen (The University of Queensland, Australia), Tingmin Wu (CSIRO’s Data61, Australia), Yanjun Zhang (Deakin University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)

QUDA: Query-Limited Data-Free Model Extraction

Zijun Lin (Nanyang Technological University, Singapore), Ke Xu (Huawei International), Chengfang Fang (Huawei International), Huadi Zheng (Huawei Technology), Jaheezuddin Aneez Ahmed (Nanyang Technological University, Singapore), Jie Shi (Huawei International)

IGA: An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity

Lili Yan (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Jingyi Cui (Tianjin University, China), Jian Liu (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Guangquan Xu (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Lidong Han (The Key Laboratory of Cryptography of Zhejiang Province and Hangzhou Normal University, China), Alireza Jolfaei (Flinders University, Australia), Xi Zheng (Macquarie University, Australia)

Investigating Traffic Analysis Attacks on Apple iCloud Private Relay

Ali Zohaib (UMass Amherst, USA), Jade Sheffey (UMass Amherst, USA), Amir Houmansadr (UMass Amherst, USA)

Privacy-Preserving Record Linkage for Cardinality Counting

Nan Wu (Macquarie University and CSIRO’s Data61, Australia), Dinusha Vatsalan (Macquarie University, Australia), Mohamed Ali Kaafar (Macquarie University, Australia), Sanath Kumar Ramesh (Open Treatments Foundations, USA)

CacheFX: A Framework for Evaluating Cache Security

Daniel Genkin (Georgia Institute of Technology, USA), William Kosasih (University of Adelaide, Australia), Fangfei Liu (Intel Labs, Austria), Anna Trikalinou (Microsoft, USA), Thomas Unterluggauer (Intel Labs, Austria), Yuval Yarom (Ruhr University Bochum, Germany)

Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators

Yangyong Zhang (Texas A&M University, USA), Raj Vardhan (Texas A&M University, USA), Phakpoom Chinprutthiwong (Sisaket Rajabhat University, Thailand), Guofei Gu (Texas A&M University, USA)

Masked Language Model Based Textual Adversarial Example Detection

Xiaomei Zhang (Southwest University, China), Zhaoxi Zhang (Deakin University, Australia), Qi Zhong (Deakin University, Australia), Xufei Zheng (Southwest University, China), Yanjun Zhang (University of Technology Sydney, Australia), Shengshan Hu (Huazhong University of Science and Technology, China), Leo Yu Zhang (Griffith University, Australia)

Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs

Mohamad Mansouri (EURECOM, France), Jun Xu (University of Utah, USA), Georgios Portokalidis (Stevens Institute of Technology, USA)

ThreadLock: Native Principal Isolation Through Memory Protection Keys

William Blair (Boston University, USA), William Robertson (Northeastern University, USA), Manuel Egele (Boston University, USA)

Secure Context Switching of Masked Software Implementations

Barbara Gigerl (Graz University of Technology, Austria), Robert Primas (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)

Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses

Marco Abbadini (Università degli Studi di Bergamo, Italy), Dario Facchinetti (Università degli Studi di Bergamo, Italy), Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)

Formalising Application-Driven Authentication and Access-Control based on Users’ Companion Devices

Chris Culnane (Castellate Consulting Ltd, UK), Ioana Boureanu (University of Surrey, UK), Jean Snyman (University of Surrey, UK), Steve Wesemeyer (University of Surrey, UK), Helen Treharne (University of Surrey, UK)

FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation

Lennart Braun (Aarhus University, Denmark), Moritz Huppert (TU Darmstadt, Germany), Nora Khayata (TU Darmstadt, Germany), Thomas Schneider (TU Darmstadt, Germany), Oleksandr Tkachenko (DFINITY Foundation, Switzerland)

Deepfake CAPTCHA: A Method for Preventing Fake Calls

Lior Yasur (Ben-Gurion University, Israel), Guy Frankovits (Ben-Gurion University, Israel), Freddie Grabovski (Ben-Gurion University, Israel), Yisroel Mirsky (Ben-Gurion University, Israel)

A Trade-Off SVP-Solving Strategy based on a Sharper pnj-BKZ Simulator

Leizhang Wang (Xidian University, China), Yuntao Wang (Osaka University, Japan), Baocang Wang (Xidian University, China)

FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaberating Flush Instructions and Timers on ARMv8-A

Jingquan Ge (Southern University of Science and Technology, China), Fengwei Zhang (Southern University of Science and Technology, China)

Faster TFHE Bootstrapping with Block Binary Keys

Changmin Lee (Korea Institute For Advanced Study, South Korea), Seonhong Min (Seoul National University, South Korea), Jinyeong Seo (Seoul National University, South Korea), Yongsoo Song (Seoul National University, South Korea)

Flag: A Framework for Lightweight Robust Secure Aggregation

Laasya Bangalore (Georgetown University, USA), Mohammad Hossein Faghihi Sereshgi (University of Rochester, USA), Carmit Hazay (Bar-Ilan University, Israel), Muthuramakrishnan Venkitasubramaniam (Georgetown University, USA)

SFITAG: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions

Jiwon Seo (Seoul National University, South Korea), Junseung You (Seoul National University, South Korea), Yungi Cho (Seoul National University, South Korea), Yeongpil Cho (Hanyang University, South Korea), Donghyun Kwon (Pusan National University, South Korea), Yunheung Paek (Seoul National University, South Korea)

A Honey postMessage, but a Heart of Gall: Exploiting Push Service in ServiceWorkers Via postMessage

Yeomin Jeong (Korea University, South Korea), Woonghee Lee (Korea University, South Korea), Junbeom Hur (Korea University, South Korea)

Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide

Pallavi Sivakumaran (Royal Holloway, University of London, UK), Chaoshun Zuo (Ohio State University, USA), Zhiqiang Lin (Ohio State University, USA), Jorge Blasco (Universidad Politécnica de Madrid, Spain)

A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems

Yumeng Zhang (The University of Adelaide, Australia), Max Ward (The University of Western Australia, Australia), Mingyu Guo (The University of Adelaide, Australia), Hung Nguyen (The University of Adelaide, Australia)

Implementing and Optimizing Matrix Triples with Homomorphic Encryption

Johannes Mono (Ruhr University Bochum, Germany), Tim Güneysu  (Ruhr University Bochum, Germany)