SPEAR-V: Secure and Practical Enclave Architecture for RISC-V
David Schrammel (Graz University of Technology, Austria), Moritz Waser (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Martin Unterguggenberger (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
Electromagnetic Signal Injection Attacks on Differential Signaling
Youqian Zhang (University of Oxford, UK), Kasper Rasmussen (University of Oxford, UK)
How Secure Are The Main Real-World Mix Networks — Case Studies To Explore Vulnerabilities And Usability
Kun Peng (Huawei Technology Ltd, Australia)
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
Mengdie Huang (Xidian University, China), Yi Xie (Xidian University, China), Xiaofeng Chen (Xidian University, China), Jin Li (Guangzhou University, China), Changyu Dong (Newcastle University, United Kingdom), Zheli Liu (Nankai University, China), Willy Susilo (University of Wollongong, Australia)
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark
Jiashuo Liang (Peking University, China), Ming Yuan (Tsinghua University, China), Zhanzhao Ding (Peking University, China), Siqi Ma (The University of New South Wales, Australia), Xinhui Han (Peking University, China), Chao Zhang (Tsinghua University, China)
SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing
Weiqi Wang (University of Technology Sydney, Australia), Chenhan Zhang (University of Technology Sydney, Australia), An Liu (Soochow University, China), Shui Yu (University of Technology Sydney, Australia)
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims
Aydin Abadi (University College London, UK), Steven J. Murdoch (University College London, UK)
SoK: Systematizing Attack Studies in Federated Learning – From Sparseness to Completeness
Geetanjli Sharma (La Trobe University and CSIRO’s Data61, Australia), M.A.P. Chamikara (La Trobe University and CSIRO’s Data61, Australia), Mohan Baruwal (La Trobe University and CSIRO’s Data61, Australia), Yi-Ping Phoebe Chen (La Trobe University and CSIRO’s Data61, Australia)
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns (RWTH Aachen University, Germany), Constantin Sander (RWTH Aachen University, Germany), Robin Decker (RWTH Aachen University, Germany), Klaus Wehrle (RWTH Aachen University, Germany)
BinWrap: Hybrid Protection against Native Node.js Add-ons
George Christou (FORTH-ICS, Greece), Grigoris Ntousakis (Brown University, USA), Eric Lahtinen (Aarno Labs, USA), Sotiris Ioannidis (TU Crete, Greece), Vasileios P. Kemerlis (Brown University, USA), Nikos Vasilakis (Brown University, USA)
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging
Martin Unterguggenberger (Graz University of Technology, Austria), David Schrammel (Graz University of Technology, Austria), Pascal Nasahl (Graz University of Technology, Austria), Robert Schilling (Graz University of Technology, Austria), Lukas Lamster (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
Going Haywire: False Friends in Federated Learning and How to Find Them
William Aiken (University of Ottawa, Canada), Paula Branco (University of Ottawa, Canada), Guy-Vincent Jourdan (University of Ottawa, Canada)
ShowTime: Amplifying Arbitrary CPU Timing Side Channels
Antoon Purnal (imec-COSIC, KU Leuven, Belgiun), Marton Bognar (imec-COSIC, KU Leuven, Belgiun), Frank Piessens (imec-COSIC, KU Leuven, Belgiun), Ingrid Verbauwhede (imec-COSIC, KU Leuven, Belgiun)
Data Privacy Examination against Semi-Supervised Learning
Jiadong Lou (University of Louisiana at Lafayette, USA), Xu Yuan (University of Louisiana at Lafayette, USA), Miao Pan (University of Houston, USA), Hao Wang (Louisiana State University, USA), Nianfeng Tzeng (University of Louisiana at Lafayette, USA)
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck
Chenhan Zhang (University of Technology Sydney, Australia), Weiqi Wang (University of Technology Sydney, Australia), James J.Q. Yu (Southern University of Science and Technology, China), Shui Yu (University of Technology Sydney, Australia)
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Muhammed F. Esgin (Monash University and CSIRO’s Data61, Australia), Oguzhan Ersoy (Radboud University and Delft University of Technology, Netherlands), Veronika Kuchta (Florida Atlantic University, USA), Julian Loss (CISPA Helmholtz Center for Information Security, Germany), Amin Sakzad (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Xiangwen Yang (Monash University, Australia), Raymond K. Zhao (CSIRO’s Data61, Australia)
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks
Mengyao Ma (The University of Queensland, Australia), Yanjun Zhang (University of Technology Sydney, Australia), Pathum Chamikara Mahawaga Arachchige (CSIRO’s Data61, Australia), Leo Yu Zhang (Griffith University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)
Investigating Users’ Understanding of Privacy Policies of Virtual Personal Assistant Applications
Baiqi Chen (The University of Queensland, Australia), Tingmin Wu (CSIRO’s Data61, Australia), Yanjun Zhang (Deakin University, Australia), Mohan Baruwal Chhetri (CSIRO’s Data61, Australia), Guangdong Bai (The University of Queensland, Australia)
QUDA: Query-Limited Data-Free Model Extraction
Zijun Lin (Nanyang Technological University, Singapore), Ke Xu (Huawei International), Chengfang Fang (Huawei International), Huadi Zheng (Huawei Technology), Jaheezuddin Aneez Ahmed (Nanyang Technological University, Singapore), Jie Shi (Huawei International)
IGA: An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity
Lili Yan (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Jingyi Cui (Tianjin University, China), Jian Liu (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Guangquan Xu (Tianjin Key Laboratory of Advanced Networking (TANK) and Tianjin University, China), Lidong Han (The Key Laboratory of Cryptography of Zhejiang Province and Hangzhou Normal University, China), Alireza Jolfaei (Flinders University, Australia), Xi Zheng (Macquarie University, Australia)
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay
Ali Zohaib (UMass Amherst, USA), Jade Sheffey (UMass Amherst, USA), Amir Houmansadr (UMass Amherst, USA)
Privacy-Preserving Record Linkage for Cardinality Counting
Nan Wu (Macquarie University and CSIRO’s Data61, Australia), Dinusha Vatsalan (Macquarie University, Australia), Mohamed Ali Kaafar (Macquarie University, Australia), Sanath Kumar Ramesh (Open Treatments Foundations, USA)
CacheFX: A Framework for Evaluating Cache Security
Daniel Genkin (Georgia Institute of Technology, USA), William Kosasih (University of Adelaide, Australia), Fangfei Liu (Intel Labs, Austria), Anna Trikalinou (Microsoft, USA), Thomas Unterluggauer (Intel Labs, Austria), Yuval Yarom (Ruhr University Bochum, Germany)
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators
Masked Language Model Based Textual Adversarial Example Detection
Xiaomei Zhang (Southwest University, China), Zhaoxi Zhang (Deakin University, Australia), Qi Zhong (Deakin University, Australia), Xufei Zheng (Southwest University, China), Yanjun Zhang (University of Technology Sydney, Australia), Shengshan Hu (Huazhong University of Science and Technology, China), Leo Yu Zhang (Griffith University, Australia)
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs
Mohamad Mansouri (EURECOM, France), Jun Xu (University of Utah, USA), Georgios Portokalidis (Stevens Institute of Technology, USA)
ThreadLock: Native Principal Isolation Through Memory Protection Keys
William Blair (Boston University, USA), William Robertson (Northeastern University, USA), Manuel Egele (Boston University, USA)
Secure Context Switching of Masked Software Implementations
Barbara Gigerl (Graz University of Technology, Austria), Robert Primas (Graz University of Technology, Austria), Stefan Mangard (Graz University of Technology, Austria)
Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses
Marco Abbadini (Università degli Studi di Bergamo, Italy), Dario Facchinetti (Università degli Studi di Bergamo, Italy), Gianluca Oldani (Università degli Studi di Bergamo, Italy), Matthew Rossi (Università degli Studi di Bergamo, Italy), Stefano Paraboschi (Università degli Studi di Bergamo, Italy)
Formalising Application-Driven Authentication and Access-Control based on Users’ Companion Devices
Chris Culnane (Castellate Consulting Ltd, UK), Ioana Boureanu (University of Surrey, UK), Jean Snyman (University of Surrey, UK), Steve Wesemeyer (University of Surrey, UK), Helen Treharne (University of Surrey, UK)
FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation
Lennart Braun (Aarhus University, Denmark), Moritz Huppert (TU Darmstadt, Germany), Nora Khayata (TU Darmstadt, Germany), Thomas Schneider (TU Darmstadt, Germany), Oleksandr Tkachenko (DFINITY Foundation, Switzerland)
Deepfake CAPTCHA: A Method for Preventing Fake Calls
A Trade-Off SVP-Solving Strategy based on a Sharper pnj-BKZ Simulator
Leizhang Wang (Xidian University, China), Yuntao Wang (Osaka University, Japan), Baocang Wang (Xidian University, China)
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaberating Flush Instructions and Timers on ARMv8-A
Jingquan Ge (Southern University of Science and Technology, China), Fengwei Zhang (Southern University of Science and Technology, China)
Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee (Korea Institute For Advanced Study, South Korea), Seonhong Min (Seoul National University, South Korea), Jinyeong Seo (Seoul National University, South Korea), Yongsoo Song (Seoul National University, South Korea)
Flag: A Framework for Lightweight Robust Secure Aggregation
Laasya Bangalore (Georgetown University, USA), Mohammad Hossein Faghihi Sereshgi (University of Rochester, USA), Carmit Hazay (Bar-Ilan University, Israel), Muthuramakrishnan Venkitasubramaniam (Georgetown University, USA)
SFITAG: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions
Jiwon Seo (Seoul National University, South Korea), Junseung You (Seoul National University, South Korea), Yungi Cho (Seoul National University, South Korea), Yeongpil Cho (Hanyang University, South Korea), Donghyun Kwon (Pusan National University, South Korea), Yunheung Paek (Seoul National University, South Korea)
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in ServiceWorkers Via postMessage
Yeomin Jeong (Korea University, South Korea), Woonghee Lee (Korea University, South Korea), Junbeom Hur (Korea University, South Korea)
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide
Pallavi Sivakumaran (Royal Holloway, University of London, UK), Chaoshun Zuo (Ohio State University, USA), Zhiqiang Lin (Ohio State University, USA), Jorge Blasco (Universidad Politécnica de Madrid, Spain)
A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems
Yumeng Zhang (The University of Adelaide, Australia), Max Ward (The University of Western Australia, Australia), Mingyu Guo (The University of Adelaide, Australia), Hung Nguyen (The University of Adelaide, Australia)
Implementing and Optimizing Matrix Triples with Homomorphic Encryption
Johannes Mono (Ruhr University Bochum, Germany), Tim Güneysu (Ruhr University Bochum, Germany)