The list of accepted papers for the upcoming NDSS 2025 security conference has been put online, you can find it here . In total I counted 211 papers which were accepted.

As a recovering academic (who is working in the industry now), I still tend to check the list of all papers for the major security conferences. In particular I’m looking for the ones that are either potentially relevant for my current work, or the ones which could be of potential interest to me. Anything related to automotive security, fooling sensors, or connected things fall in the former category, while anything related to privacy, censorship, forensics or network security in general tick the latter category. However, printing/storing/processing that webpage is a pain - sure, keywords and abstract help in understanding the paper, but not if everything is in one seemingly endless single HTML file which is alphabetically sorted. All I want are the title, and the authors, for each paper.

Y U NO TITLE AND AUTHORS

So, in a frency of rage, I converted it all to markdown, and removed all clutter. I also randomized the order, because reading the nth paper starting with similar naming can drive you nuts. Feel free to downloading the list here , do with it whatever you want.

No Title Authors
1 MALintent: Coverage Guided Intent Fuzzing Framework for Android Ammar Askar, Fabian Fleischer (Georgia Institute of Technology); Christopher Kruegel, Giovanni Vigna (University of California, Santa Barbara); Taesoo Kim (Georgia Institute of Technology)
2 Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang (Fudan University)
3 A Formal Approach to Multi-Layered Privileges for Enclaves Ganxiang Yang, Chenyang Liu, Zhen Huang, Guoxing Chen, Hongfei Fu, Yuanyuan Zhang, Haojin Zhu (Shanghai Jiao Tong University)
4 MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers Dongwei Xiao, Zhibo Liu, Yiteng Peng, Shuai Wang (The Hong Kong University of Science and Technology)
5 Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding Jian Cui (Indiana University); Hanna Kim (KAIST); Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung (S2W Inc.); Seungwon Shin (KAIST); Xiaojing Liao (Indiana University)
6 SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns Marzieh Bitaab, Alireza Karimi, Zhuoer Lyu (Arizona State University); Adam Oest, Dhruv Kuchhal (Amazon); Muhammad Saad (X); Gail-Joon Ahn, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé (Arizona State University)
7 On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks Xiaoguang Li (Xidian University, Purdue University); Zitao Li (Alibaba Group (U.S.) Inc.); Ninghui Li (Purdue University); Wenhai Sun (Purdue University, West Lafayette, USA)
8 WAVEN: WebAssembly Memory Virtualization for Enclaves Weili Wang (Southern University of Science and Technology); Honghan Ji, Peixuan He, Yao Zhang, Ye Wu (ByteDance Inc.); Yinqian Zhang (Southern University of Science and Technology)
9 Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction Shanghao Shi (Virginia Tech); Ning Wang (University of South Florida); Yang Xiao (University of Kentucky); Chaoyu Zhang, Yi Shi (Virginia Tech); Y. Thomas Hou, Wenjing Lou (Virginia Polytechnic Institute and State University)
10 On Borrowed Time – Preventing Static Side-Channel Analysis Robert Dumitru (Ruhr University Bochum and The University of Adelaide); Thorben Moos (UCLouvain); Andrew Wabnitz (Defence Science and Technology Group); Yuval Yarom (Ruhr University Bochum)
11 Translating C To Rust: Lessons from a User Study Ruishi Li, Bo Wang, Tianyu Li, Prateek Saxena (National University of Singapore); Ashish Kundu (Cisco Research)
12 Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams Platon Kotzias (Norton Research Group, BforeAI); Michalis Pachilakis (Norton Research Group, Computer Science Department University of Crete); Javier Aldana Iuit (Norton Research Group); Juan Caballero (IMDEA Software Institute); Iskander Sanchez-Rola, Leyla Bilge (Norton Research Group)
13 KernelSnitch: Side Channel-Attacks on Kernel Data Structures Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard (Graz University of Technology)
14 Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems Shuguang Wang, Qian Zhou (City University of Hong Kong); Kui Wu (University of Victoria); Jinghuai Deng, Dapeng Wu (City University of Hong Kong); Wei-Bin Lee (Information Security Center, Hon Hai Research Institute); Jianping Wang (City University of Hong Kong)
15 GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative Gadgets Qi Ling (Purdue University); Yujun Liang, Yi Ren (Tsinghua University); Baris Kasikci (University of Washington and Google); Shuwen Deng (Tsinghua University)
16 Diffence: Fencing Membership Privacy With Diffusion Models Yuefeng Peng, Ali Naseh, Amir Houmansadr (UMass Amherst)
17 The Power of Words: A Comprehensive Analysis of Rationales and Their Effects on Users’ Permission Decisions Yusra Elbitar (CISPA Helmholtz Center for Information Security and Saarland University); Alexander Hart, Sven Bugiel (CISPA Helmholtz Center for Information Security)
18 SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi (Technical University of Darmstadt)
19 The (Un)usual Suspects – Studying Reasons for Lacking Updates in WordPress Maria Hellenthal, Lena Gotsche, Rafael Mrowczynski (CISPA Helmholtz Center for Information Security); Sarah Kugel (Saarland University); Michael Schilling, Ben Stock (CISPA Helmholtz Center for Information Security)
20 The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams Elijah Bouma-Sims, Lily Klucinec, Mandy Lanyon, Julie Downs, Lorrie Faith Cranor (Carnegie Mellon University)
21 Uncovering the iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis Miaoqian Lin, Kai Chen, Yi Yang, Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
22 Oreo: Protecting ASLR Against Microarchitectural Attacks Shixin Song, Joseph Zhang, Mengjia Yan (Massachusetts Institute of Technology)
23 Was This You? Investigating the Design Considerations for Suspicious Login Notifications Sena Sahin, Burak Sahin, Frank Li (Georgia Institute of Technology)
24 A Method to Facilitate Membership Inference Attacks in Deep Learning Models Zitao Chen, Karthik Pattabiraman (University of British Columbia)
25 Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel Tao Ni, Yuefeng Du, Qingchuan Zhao, Cong Wang (City University of Hong Kong)
26 BitShield: Defending Against Bit-Flip Attacks on DNN Executables Yanzuo Chen, Yuanyuan Yuan, Zhibo Liu (The Hong Kong University of Science and Technology); Sihang Hu, Tianxiang Li (Huawei Technologies); Shuai Wang (The Hong Kong University of Science and Technology)
27 ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs Ziwen Liu (Beihang University); Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang University); Jun Zeng (National University of Singapore); Jiawei Li (Beihang University; National University of Singapore); Qixiao Lin (Beihang University); Jiahao Liu (National University of Singapore); Jianwei Zhuge (Tsinghua University; Zhongguancun Laboratory); Zhenkai Liang (National University of Singapore)
28 Secure IP Address Allocation at Cloud Scale Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin (University of Wisconsin–Madison); Engin Kirda (Northeastern University); Patrick McDaniel (University of Wisconsin–Madison)
29 Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Rui Wen, Michael Backes, Yang Zhang (CISPA Helmholtz Center for Information Security)
30 Secure Transformer Inference Made Non-interactive Jiawen Zhang, Xinpeng Yang (Zhejiang University); Lipeng He (University of Waterloo); Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang (Zhejiang University)
31 Lend Me Your Beam: Privacy Implications of Plaintext Beamforming Feedback in WiFi Rui Xiao, Xiankai Chen (Zhejiang University); Yinghui He (Nanyang Technological University); Jun Han (KAIST); Jinsong Han (Zhejiang University)
32 Be Careful of What You Embed: Demystifying OLE Vulnerabilities Yunpeng Tian, Feng Dong, Haoyi Liu (Huazhong University of Science and Technology); Meng Xu (University of Waterloo); Zhiniang Peng (Huazhong University of Science and Technology and Sangfor Technologies Inc.); Zesen Ye (Sangfor Technologies Inc.); Shenghui Li (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University); Haoyu Wang (Huazhong University of Science and Technology)
33 Mysticeti: Reaching the Latency Limits with Uncertified DAGs Kushal Babel (Cornell Tech & IC3); Andrey Chursin (Mysten Labs); George Danezis (Mysten Labs & University College London (UCL)); Anastasios Kichidis (Mysten Labs); Lefteris Kokoris-Kogias (Mysten Labs & IST Austria); Arun Koshy (Mysten Labs); Alberto Sonnino (Mysten Labs & University College London (UCL)); Mingwei Tian (Mysten Labs)
34 Revisiting EM-based Estimation for Locally Differentially Private Protocols Yutong Ye (Institute of software, Chinese Academy of Sciences & Zhongguancun Laboratory, Beijing, PR.China.); Tianhao Wang (University of Virginia); Min Zhang, Dengguo Feng (Institute of Software, Chinese Academy of Sciences)
35 UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications Jiawei Li (Beihang University & National University of Singapore); Jiahao Liu (National University of Singapore); Jian Mao (Beihang University); Jun Zeng, Zhenkai Liang (National University of Singapore)
36 An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps Xin Zhang, Xiaohan Zhang, Zhichen Liu, Bo Zhao, Zhemin Yang, Min Yang (Fudan University)
37 Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen (Chongqing University); Guomin Yang (Singapore Management University); Chuan Ma (Chongqing University); Robert H. Deng (Singapore Management University)
38 Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection Lingzhi Wang, Xiangmin Shen, Weijian Li (Northwestern University); Zhenyuan LI (Zhejiang University); R. Sekar (Stony Brook University); Han Liu, Yan Chen (Northwestern University)
39 Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers Navnil (Choudhury); Chaithanya Naik Mude (University of Wisconsin-Madison); Sanjay Das (The University of Texas at Dallas); Preetham Chandra Tikkireddi (University of Wisconsin-Madison); Swamit Tannu (University of Wisconsin, Madison); Kanad Basu (University of Texas at Dallas)
40 Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security Jan-Ulrich Holtgrave, Kay Friedrich, Fabian Fischer (CISPA Helmholtz Center for Information Security); Nicolas Huaman (Leibniz University Hannover); Niklas Busch, Jan H. Klemmer (CISPA Helmholtz Center for Information Security); Marcel Fourné (Paderborn University); Oliver Wiese (CISPA Helmholtz Center for Information Security); Dominik Wermke (North Carolina State University); Sascha Fahl (CISPA Helmholtz Center for Information Security)
41 Speak Up, I’m Listening: Extracting Speech from Zero-Permission VR Sensors Derin Cayir (Florida International University); Reham Mohamed Aburas (American University of Sharjah); Riccardo Lazzeretti (Sapienza University of Rome); Marco Angelini (Link Campus University of Rome); Abbas Acar (Florida International University); Mauro Conti (University of Padua); Z. Berkay Celik (Purdue University); Selcuk Uluagac (Florida International University)
42 Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu (Fudan University); Shujun Tang (QI-ANXIN Technology Research Institute; Tsinghua University); Youhao Li (QI-ANXIN Technology Research Institute); Baojun Liu (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Min Yang (Fudan University)
43 JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs Yue Xiao, Dhilung Kirat, Douglas Lee Schales, Jiyong Jang (IBM Research); Luyi Xing (Indiana University Bloomington); Xiaojing Liao (Indiana University)
44 Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning Yonghao Zou (Beihang University and Peking University); Jia-Ju Bai (Beihang University); Zu-Ming Jiang (ETH Zurich); Ming Zhao (Arizona State University); Diyu Zhou (Peking University)
45 Do (Not) Follow the White Rabbit: Challenging the Myth of Harmless Open Redirection Soheil Khodayari (CISPA Helmholtz Center for Information Security); Kai Glauber (Saarland University); Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
46 Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon Xuanji Meng (Tsinghua University); Xiao Sui (Shandong University); Zhaoxin Yang (Tsinghua University); Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan (Blockchain Platform Division, Ant Group); Sisi Duan (Tsinghua University)
47 Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach Christian van Sloun, Vincent Woeste (RWTH Aachen University); Konrad Wolsing (RWTH Aachen University & Fraunhofer FKIE); Jan Pennekamp, Klaus Wehrle (RWTH Aachen University)
48 Retrofitting XoM for Stripped Binaries without Embedded Data Relocation Chenke Luo (Wuhan University); Jiang Ming (Tulane University); Mengfei Xie, Guojun Peng, Jianming Fu (Wuhan University)
49 Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples Adrian Shuai Li (Purdue University); Arun Iyengar (Intelligent Data Management and Analytics, LLC); Ashish Kundu (Cisco Research); Elisa Bertino (Purdue University)
50 VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis Kavita Kumari (Technical University of Darmstadt); Maryam Abbasihafshejani (University of Texas at San Antonio); Alessandro Pegoraro, Phillip Rieger, Kamyar Arshi (Technical University of Darmstadt); Murtuza Jadliwala (University of Texas at San Antonio); Ahmad-Reza Sadeghi (Technical University of Darmstadt)
51 YuraScanner: Leveraging LLMs for Task-driven Web App Scanning Aleksei Stafeev, Tim Recktenwald, Gianluca De Stefano, Soheil Khodayari, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
52 BumbleBee: Secure Two-party Inference Framework for Large Transformers Wen-jie Lu, Zhicong Huang (Ant Group); Zhen Gu (Alibaba Group); Jingyu Li (Ant Group and The State Key Laboratory of Blockchain and Data Security, Zhejiang University); Jian Liu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University); Cheng Hong (Ant Group); Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University); Tao Wei, WenGuang Chen (Ant Group)
53 The Philosopher’s Stone: Trojaning Plugins of Large Language Models Tian Dong (Shanghai Jiao Tong University, China); Minhui Xue (CSIRO’s Data61, Australia); Guoxing Chen (Shanghai Jiao Tong University, China); Rayne Holland (CSIRO’s Data61, Australia); Yan Meng (Shanghai Jiao Tong University, China); Shaofeng Li (Southeast University, China); Zhen Liu, Haojin Zhu (Shanghai Jiao Tong University, China)
54 ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems Corban Villa, Constantine Doumanidis, Hithem Lamri (New York University Abu Dhabi); Prashant Hari Narayan Rajput (InterSystems); Michail Maniatakos (New York University Abu Dhabi)
55 Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang (Purdue University)
56 EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side Channel Wenhao Li, Jiahao Wang, Guoming Zhang, Yanni Yang, Riccardo Spolaor, Xiuzhen Cheng, Pengfei Hu (Shandong University)
57 Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces Philipp Mackensen (Ruhr University Bochum); Paul Staat (Max Planck Institute for Security and Privacy); Stefan Roth, Aydin Sezgin (Ruhr University Bochum); Christof Paar (Max Planck Institute for Security and Privacy); Veelasha Moonsamy (Ruhr University Bochum)
58 TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption Martin Unterguggenberger, Lukas Lamster, David Schrammel (Graz University of Technology); Martin Schwarzl (Cloudflare, Inc.); Stefan Mangard (Graz University of Technology)
59 What’s Done Is Not What’s Claimed: Detecting and Interpreting Inconsistencies in App Behaviors Chang Yue, Kai Chen, Zhixiu Guo (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jun Dai, Xiaoyan Sun (Department of Computer Science, Worcester Polytechnic Institute); Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
60 Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz (CISPA Helmholtz Center for Information Security)
61 Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures Yangtao Deng (Tsinghua University); Qian Wu, Zeqi Lai (Tsinghua University and Zhongguancun Laboratory); Chenwei Gu (Tsinghua University); Hewu Li, Yuanjie Li, Jun Liu (Tsinghua University and Zhongguancun Laboratory)
62 LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
63 Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic Tyler Tucker, Nathaniel Bennett (University of Florida); Martin Kotuliak, Simon Erni (ETH Zurich); Srdjan Capkun (ETH Zuerich); Kevin Butler, Patrick Traynor (University of Florida)
64 Transparency or Information Overload? Evaluating Users’ Comprehension and Perceptions of the iOS App Privacy Report Xiaoyuan Wu, Lydia Hu, Eric Zeng, Hana Habib, Lujo Bauer (Carnegie Mellon University)
65 EvoCrawl: Exploring Web Application Code and State using Evolutionary Search Xiangyu Guo, Akshay Kawlay, Eric Liu, David Lie (University of Toronto)
66 Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution Byeongwook Kim, Jaewon Hur (Seoul National University); Adil Ahmad (Arizona State University); Byoungyoung Lee (Seoul National University)
67 SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills Jingwen Yan (Clemson University); Song Liao (Texas Tech University); Mohammed Aldeen (Clemson University); Luyi Xing (Indiana University Bloomington); Danfeng (Daphne) Yao (Virginia Tech); Long Cheng (Clemson University)
68 Secret Spilling Drive: Leaking User Behavior through SSD Contention Jonas Juffinger, Fabian Rauscher (Graz University of Technology); Giuseppe La Manna (Amazon); Daniel Gruss (Graz University of Technology)
69 TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization Zelun Kong, Minkyung Park (University of Texas at Dallas); Le Guan (University of Georgia); Ning Zhang (Washington University in St. Louis); Chung Hwan Kim (University of Texas at Dallas)
70 Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector He Shuang (University of Toronto); Lianying Zhao (Carleton University); David Lie (University of Toronto)
71 LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms Maryam Rostamipoor (Stony Brook University); Seyedhamed Ghavamnia (University of Connecticut); Michalis Polychronakis (Stony Brook University)
72 Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren (Zhejiang University)
73 Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! Yansong Gao (The University of Western Australia); Huaibing Peng (Nanjing University of Science and Technology); Hua Ma (CSIRO’s Data61); Zhi Zhang (The University of Western Australia); Shuo Wang (Shanghai Jiao Tong University); Rayne Holland (CSIRO’s Data61); Anmin Fu (Nanjing University of Science and Technology); Jason (Minhui) Xue (CSIRO’s Data61); Derek Abbott (The University of Adelaide, Australia)
74 All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks Kevin van Liebergen, Gibran Gomez, Srdjan Matic, Juan Caballero (IMDEA Software Institute)
75 Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs Linxi Jiang, Xin Jin, Zhiqiang Lin (The Ohio State University)
76 Rethinking Trust in Forge-Based Git Security Aditya Sirish A Yelgundhalli, Patrick Zielinski (New York University); Reza Curtmola (New Jersey Institute of Technology); Justin Cappos (New York University)
77 A Key-Driven Framework for Identity-Preserving Face Anonymization Miaomiao Wang (School of Communication and Information Engineering, Shanghai University, China); Guang Hua (Infocomm Technology Cluster, Singapore Institute of Technology, Singapore); Sheng Li (School of Computer Science, Fudan University, China); Guorui Feng (School of Communication and Information Engineering, Shanghai University, China)
78 Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research René Helmke (Fraunhofer FKIE); Elmar Padilla (Fraunhofer FKIE, Germany); Nils Aschenbruck (University of Osnabrück)
79 QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing Matteo Marini, Daniele Cono D’Elia (Sapienza University of Rome); Mathias Payer (EPFL); Leonardo Querzoni (Sapienza University of Rome)
80 RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation Dzung Pham, Shreyas Kulkarni, Amir Houmansadr (University of Massachusetts Amherst)
81 Towards Understanding Unsafe Video Generation Yan Pang (University of Virginia); Aiping Xiong (Penn State University); Yang Zhang (CISPA Helmholtz Center for Information Security); Tianhao Wang (University of Virginia)
82 LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis (Delft University of Technology)
83 Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange Pinji Chen (Tsinghua University); Jianjun Chen (Tsinghua University and Zhongguancun Laboratory); Mingming Zhang (Zhongguancun Laboratory); Qi Wang, Yiming Zhang, Mingwei Xu, Haixin Duan (Tsinghua University)
84 Blindfold: Confidential Memory Management by Untrusted Operating System Caihua Li, Seung-seob Lee, Lin Zhong (Yale University)
85 URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning Duanyi Yao (Hong Kong University of Science and Technology); Songze Li (Southeast University); Xueluan Gong (Wuhan University); Sizai Hou (Hong Kong University of Science and Technology); Gaoning Pan (Hangzhou Dianzi University)
86 Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington); Yichen Liu (Indiana University Bloomington); Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington); Emma Delph (Indiana University Bloomington); Xiaojiang Du (Stevens Institute of Technology); Qixu Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Luyi Xing (Indiana University Bloomington)
87 DLBox: New Model Training Framework for Protecting Training Data Jaewon Hur (Seoul National University); Juheon Yi (Nokia Bell Labs, Cambridge, UK); Cheolwoo Myung, Sangyun Kim, Youngki Lee, Byoungyoung Lee (Seoul National University)
88 The Guardians of Name Street: Studying the Defensive Registration Practices of the Fortune 500 Boladji Vinny Adjibi, Athanasios Avgetidis, Manos Antonakakis, Michael Bailey, Fabian Monrose (Georgia Tech)
89 BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota); Zicheng Wang (State Key Laboratory for Novel Software Technology, Nanjing University); Weiheng Bai (University of Minnesota); Qingkai Zeng (State Key Laboratory for Novel Software Technology, Nanjing University); Kangjie Lu (University of Minnesota)
90 CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Sirus Shahini, Robert Ricci (University of Utah)
91 FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2 Connor Everett Glosner, Aravind Machiry (Purdue University)
92 Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets Daniel Klischies, Philipp Mackensen, Veelasha Moonsamy (Ruhr University Bochum)
93 ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis Lingbo Zhao, Yuhui Zhang, Zhilu Wang, Fengkai Yuan, Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)
94 The Road to Trust: Building Enclaves within Confidential VMs Wenhao Wang, Linke Song, Benshan Mei (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS); Shuang Liu (Ant Group); Shijun Zhao (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS); Shoumeng Yan (Ant Group); XiaoFeng Wang (Indiana University Bloomington); Dan Meng (Institute of Information Engineering, CAS); Rui Hou (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS)
95 Exploring User Perceptions of Security Auditing in the Web3 Ecosystem Molly Zhuangtong Huang, Rui Jiang (University of Macau); Tanusree Sharma (Pennsylvania State University); Kanye Ye Wang (University of Macau)
96 CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji (Zhejiang University)
97 Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification Yue Qin (Indiana University Bloomington & Central University of Finance and Economics); Yue Xiao (Indiana University Bloomington & IBM Research); Xiaojing Liao (Indiana University Bloomington)
98 Generating API Parameter Security Rules with LLM for API Misuse Detection Jinghua Liu, Yi Yang, Kai Chen, Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
99 Safety Misalignment Against Large Language Models Yichen Gong, Delong Ran (Tsinghua University); Xinlei He (Hong Kong University of Science and Technology (Guangzhou)); Tianshuo Cong, Anyu Wang, Xiaoyun Wang (Tsinghua University)
100 Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems Jung-Woo Chang, Ke Sun, Nasimeh Heydaribeni (University of California, San Diego); Seira Hidano (KDDI Research, Inc.); Xinyu Zhang, Farinaz Koushanfar (University of California, San Diego)
101 THEMIS: Regulating Textual Inversion for Personalized Concept Censorship Yutong Wu (Nanyang Technological University); Jie Zhang (Centre for Frontier AI Research, Agency for Science, Technology and Research (A*STAR), Singapore); Florian Kerschbaum (University of Waterloo); Tianwei Zhang (Nanyang Technological University)
102 Onion Franking: Abuse Reports for Mix-Based Private Messaging Matthew Gregoire, Margaret Pierce, Saba Eskandarian (University of North Carolina at Chapel Hill)
103 SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers Guangke Chen (Pengcheng Laboratory); Yedi Zhang (National University of Singapore); Fu Song (Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Science; Nanjing Institute of Software Technology); Ting Wang (Stony Brook University); Xiaoning Du (Monash University); Yang Liu (Nanyang Technological University)
104 Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse Runze Zhang, Mingxuan Yao, Haichuan Xu, Omar Alrawi (Georgia Institute of Technology); Jeman Park (Kyung Hee University); Brendan Saltaformaggio (Georgia Institute of Technology)
105 PowerRadio: Manipulate Sensor Measurement via Power GND Radiation Yan Jiang, Xiaoyu Ji, Yancheng Jiang, Kai Wang (Zhejiang University); Chenren Xu (Peking University); Wenyuan Xu (Zhejiang University)
106 NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities Darion Cassel (Carnegie Mellon University); Nuno Sabino (IST & CMU); Min-Chien Hsu, Ruben Martins, Limin Jia (Carnegie Mellon University)
107 AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight Qi Xia, Qian Chen (University of Texas at San Antonio)
108 IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems Yuhao Wu (Washington University in St. Louis); Franziska Roesner, Tadayoshi Kohno (University of Washington); Ning Zhang, Umar Iqbal (Washington University in St. Louis)
109 A Systematic Evaluation of Novel and Existing Cache Side Channels Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss (Graz University of Technology)
110 CCTAG: Configurable and Combinable Tagged Architecture Zhanpeng Liu (Peking University); Yi Rong (Tsinghua University); Chenyang Li (Peking University); Wende Tan (Tsinghua University); Yuan Li (Zhongguancun Laboratory); Xinhui Han (Peking University); Songtao Yang (Zhongguancun Laboratory); Chao Zhang (Tsinghua University)
111 HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists Ruixuan Li, Chaoyi Lu (Tsinghua University); Baojun Liu (Tsinghua University;Zhongguancun Laboratory); Yunyi Zhang (Tsinghua University); Geng Hong (Fudan University); Haixin Duan (Tsinghua University;Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd); Min Yang (Fudan University); Jun Shao (Zhejiang Gongshang University)
112 EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis Hangtian Liu (Information Engineering University); Lei Zheng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University); Shuitao Gan (Laboratory for Advanced Computing and Intelligence Engineering); Chao Zhang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University); Zicong Gao (Information Engineering University); Hongqi Zhang (Henan Key Laboratory of Information Security); Yishun Zeng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University); Zhiyuan Jiang (National University of Defense Technology); Jiahai Yang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University)
113 Siniel: Distributed Privacy-Preserving zkSNARK Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University); Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd); Kailun Wang (Beijing Jiaotong University); Xiaoguo Li (College of Computer Science, Chongqing University); Jianfei Sun (School of Computing and Information Systems, Singapore Management University); Jiachen Shen, Xiaolei Dong, Zhenfu Cao (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University); Guomin Yang, Robert H. Deng (School of Computing and Information Systems, Singapore Management University)
114 Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States Joonkyo Jung, Jisoo Jang, Yonsei University, Yongwan Jo (Department of Computer Science, Yonsei University); Jonas Vinck (DistriNet, KU Leuven); Alexios Voulimeneas (CYS, TU Delft); Stijn Volckaert (DistriNet, KU Leuven); Dokyung Song (Department of Computer Science, Yonsei University)
115 ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments Myungsuk Moon, Minhee Kim, Joonkyo Jung, Dokyung Song (Yonsei University)
116 Automatic Insecurity: Exploring Email Auto-configuration in the Wild Shushang Wen (School of Cyber Science and Technology, University of Science and Technology of China); Yiming Zhang (Tsinghua University); Yuxiang Shen (School of Cyber Science and Technology, University of Science and Technology of China); Bingyu Li (School of Cyber Science and Technology, Beihang University); Haixin Duan (Tsinghua University; Zhongguancun Laboratory); Jingqiang Lin (School of Cyber Science and Technology, University of Science and Technology of China)
117 Automatic Library Fuzzing through API Relation Evolvement Jiayi Lin, Qingyu Zhang, Junzhe Li, Chenxin Sun (The University of Hong Kong); Hao Zhou (The Hong Kong Polytechnic University); Changhua Luo, Chenxiong Qian (The University of Hong Kong)
118 Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab), Jade Sheffey (UMass Amherst), David Fifield (None), Amir Houmansadr (UMass Amherst), Elson Wedwards (None), Eric Wustrow (University of Colorado Boulder)
119 Delay-allowed Differentially Private Data Stream Release Xiaochen Li (University of Virginia); Zhan Qin, Kui Ren (Zhejiang University); Chen Gong (University of Virginia); Shuya Feng, Yuan Hong (University of Connecticut); Tianhao Wang (University of Virginia)
120 SHAFT: Secure, Handy, Accurate and Fast Transformer Inference Andes Y. L. Kei, Sherman S. M. Chow (Chinese University of Hong Kong)
121 PBP: Post-training Backdoor Purification for Malware Classifiers Dung Thuy Nguyen, Ngoc N. Tran, Taylor Johnson, Kevin Leach (Vanderbilt University)
122 A New PPML Paradigm for Quantized Models Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren (The State Key Laboratory of Blockchain and Data Security, Zhejiang University)
123 Dissecting Payload-based Transaction Phishing on Ethereum Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou (Zhejiang University)
124 Starshields for iOS: Navigating the Security Cosmos in Satellite Communication Jiska Classen (Hasso Plattner Institute, University of Potsdam); Alexander Heinrich, Fabian Portner, Felix Rohrbach, Matthias Hollick (TU Darmstadt, Germany)
125 Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant Simulated Audio Magdalena Pasternak, Kevin Warren, Daniel Olszewski, Susan Nittrouer, Patrick Traynor, Kevin Butler (University of Florida)
126 Repurposing Neural Networks for Efficient Cryptographic Computation Xin Jin (The Ohio State University); Shiqing Ma (University of Massachusetts Amherst); Zhiqiang Lin (The Ohio State University)
127 Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo (University of California, Irvine); Kaidi Xu (Drexel University); Qi Alfred Chen (University of California, Irvine)
128 RadSee: See Your Handwriting Through Walls Using FMCW Radar Shichen Zhang, Qijun Wang, Maolin Gan, Zhichao Cao, Huacheng Zeng (Michigan State University)
129 SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data Plane Sian Kim (Ewha Womans University); Seyed Mohammad Mehdi Mirnajafizadeh (Wayne State University); Bara Kim (Korea University); Rhongho Jang (Wayne State University); DaeHun Nyang (Ewha Womans University)
130 Passive Inference Attacks on Split Learning via Adversarial Regularization Xiaochen Zhu (National University of Singapore and Massachusetts Institute of Technology); Xinjian Luo (National University of Singapore and Mohamed bin Zayed University of Artificial Intelligence); Yuncheng Wu (Renmin University of China); Yangfan Jiang, Xiaokui Xiao, Beng Chin Ooi (National University of Singapore)
131 Distributed Function Secret Sharing and Applications Pengzhi Xing, Hongwei Li (University of Electronic Science and Technology of China); Meng Hao (Singapore Management University); Hanxiao Chen, Jia Hu, Dongxiao Liu (University of Electronic Science and Technology of China)
132 TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents Chen Gong (University of Vriginia); Kecen Li (Institute of Automation, Chinese Academy of Sciences); Jin Yao, Tianhao Wang (University of Virginia)
133 Who is Trying to Access My Account?” Exploring User Perceptions and Reactions to Risk-based Authentication Notifications Tongxin Wei, Ding Wang, Yutong Li, Yuehuan Wang (Nankai University)
134 I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving Guanlong Wu (Southern University of Science and Technology); Zheng Zhang (ByteDance Inc.); Jianyu Niu, Weili Wang (Southern University of Science and Technolog); Yao Zhang, Ye Wu (ByteDance Inc.); Yinqian Zhang (Southern University of Science and Technology (SUSTech))
135 Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation Christopher Ellis (The Ohio State University); Yue Zhang (Drexel University); Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin (The Ohio State University)
136 From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection Jie Lin, David Mohaisen (University of Central Florida)
137 Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph Shang Ma, Chaoran Chen (University of Notre Dame); Shao Yang (Case Western Reserve University); Shifu Hou, Toby Jia-Jun Li (University of Notre Dame); Xusheng Xiao (Arizona State University); Tao Xie (Peking University); Yanfang (Fanny) Ye (University of Notre Dame)
138 VulShield: Protecting Vulnerable Code Before Deploying Patches Yuan Li (Zhongguancun Laboratory & Tsinghua University); Chao Zhang (Tsinghua University & JCSS & Zhongguancun Laboratory); Jinhao Zhu (UC Berkeley); Penghui Li (Zhongguancun Laboratory); Chenyang Li (Peking University); Songtao Yang (Zhongguancun Laboratory); Wende Tan (Tsinghua University)
139 Do We Really Need to Design New Byzantine-robust Aggregation Rules? Minghong Fang (University of Louisville); Seyedsina Nabavirazavi (Florida International University); Zhuqing Liu (University of North Texas); Wei Sun (Wichita State University); Sundararaja Iyengar (Florida International University); Haibo Yang (Rochester Institute of Technology)
140 The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps Yizhe Shi, Zhemin Yang, Kangwei Zhong, Guangliang Yang, Yifan Yang, Xiaohan Zhang, Min Yang (Fudan University)
141 Reinforcement Unlearning Dayong Ye (University of Technology Sydney); Tianqing Zhu, Congcong Zhu (City University of Macau); Derui Wang (CSIRO’s Data61); Kun Gao (University of Technology Sydney); Zewei Shi (CSIRO’s Data61); Sheng Shen (Torrens University Australia); Wanlei Zhou (City University of Macau); Minhui Xue (CSIRO’s Data61)
142 Heimdall: Towards Risk-Aware Network Management Outsourcing Yuejie Wang (Peking University); Qiutong Men (New York University); Yongting Chen, Jiajin Liu (New York University Shanghai); Gengyu Chen (Carnegie Mellon University); Ying Zhang (Meta); Guyue Liu (Peking University); Vyas Sekar (Carnegie Mellon University)
143 RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives Qihang Zhou (Institute of Information Engineering,Chinese Academy of Sciences); Wenzhuo Cao (Institute of Information Engineering,Chinese Academy of Sciences;School of Cyberspace Security, University of Chinese Academy of Sciences); Xiaoqi Jia (Institute of Information Engineering,Chinese Academy of Sciences); Peng Liu (The Pennsylvania State University, USA); Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston University, USA); Jiayun Chen, Shaowen Xu (Institute of Information Engineering,Chinese Academy of Sciences;School of Cyberspace Security, University of Chinese Academy of Sciences); Zhenyu Song (Institute of Information Engineering, Chinese Academy of Science)
144 Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth Maximilian von Tschirschnitz, Ludwig Peuckert, Moritz Buhl, Jens Grossklags (Technical University of Munich)
145 MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL Cheng Zhang, Yang Xu, Jianghao Tan, Jiajie An, Wenqiang Jin (Hunan University)
146 DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More Sofia Celi (Brave Software); Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa); Joe Rowell (Information Security Group, Royal Holloway, University of London); Gonçalo Pestana (Hashmatter); Hamed Haddadi (Imperial College London & Brave Software)
147 SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University); Fengwei Zhang (Southern University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University); Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences); Xuhua Ding (Singapore Management University); Zhenkai Liang (National University of Singapore); Shoumeng Yan, Tao Wei, Zhengyu He (Ant Group)
148 Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems Hengkai Ye, Hong Hu (The Pennsylvania State University)
149 The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic Diwen Xue, Robert Stanley, Piyush Kumar, Roya Ensafi (University of Michigan)
150 LLMPirate: LLMs for Black-box Hardware IP Piracy Vasudev Gohil, Matthew DeLorenzo, Veera Vishwa Achuta Sai Venkat Nallam, Joey See, JV Rajendran (Texas A&M University)
151 type++: Prohibiting Type Confusion with Inline Type Information Nicolas Badoux (EPFL); Flavio Toffalini (Ruhr-Universitat Bochum and EPFL); Yuseok Jeon (UNIST); Mathias Payer (EPFL)
152 ScopeVerif: Analyzing the Security of Android’s Scoped Storage via Differential Analysis Zeyu Lei (Purdue University); Güliz Seray Tuncay (Google); Beatrice Carissa Williem, Z. Berkay Celik, Antonio Bianchi (Purdue University)
153 Understanding the Miniapp Malware: Identification, Dissection, and Characterization Yuqing Yang (The Ohio State University); Yue Zhang (Drexel University); Zhiqiang Lin (The Ohio State University)
154 Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan (The Hong Kong University of Science and Technology); Sihang Hu, Tianxiang Li (Huawei Technologies); Shuai Wang (The Hong Kong University of Science and Technology)
155 Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel Hang Zhang (Indiana University Bloomington); Jangha Kim (The Affiliated Institute of ETRI, ROK); Chuhong Yuan (Georgia Institute of Technology); Zhiyun Qian (University of California, Riverside); Taesoo Kim (Georgia Institute of Technology)
156 GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization Haotian Zhu, Shuchao Pang (Nanjing University of Science and Technology); Zhigang Lu (Western Sydney University); Yongbin Zhou (Nanjing University of Science and Technology); Minhui Xue (CSIRO’s Data61)
157 Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle Wentao DONG (City University of Hong Kong); Peipei Jiang (Wuhan University; City University of Hong Kong); Huayi Duan (ETH Zurich); Cong Wang (City University of Hong Kong); Lingchen Zhao, Qian Wang (Wuhan University)
158 PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation Ye Liu (Singapore Management University); Yue Xue (MetaTrust Labs); Daoyuan Wu (The Hong Kong University of Science and Technology); Yuqiang Sun, Yi Li (Nanyang Technological University); Miaolei Shi (MetaTrust Labs); Yang Liu (Nanyang Technological University)
159 Provably Unlearnable Data Examples Derui Wang, Minhui Xue (CSIRO’s Data61); Bo Li (The University of Chicago); Seyit Camtepe, Liming Zhu (CSIRO’s Data61)
160 Balancing Privacy and Data Utilization: A Comparative Vignette Study on User Acceptance of Data Trustees in Germany and the US Leona Lassak (Ruhr University Bochum); Hanna Püschel (TU Dortmund University); Oliver D. Reithmaier (Leibniz University Hannover); Tobias Gostomzyk (TU Dortmund University); Markus Dürmuth (Leibniz University Hannover)
161 Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks Angeliki Aktypi, Kasper Rasmussen (University of Oxford)
162 BARBIE: Robust Backdoor Detection Based on Latent Separability Hanlei Zhang, Yijie Bai, Yanjiao Chen, Zhongming Ma, Wenyuan Xu (Zhejiang University)
163 PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
164 Alba: The Dawn of Scalable Bridges for Blockchains Giulia Scaffino, Lukas Aumayr (TU Wien); Mahsa Bastankhah (Princeton University); Zeta Avarikioti, Matteo Maffei (TU Wien)
165 Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks Jing Shang, Jian Wang, Kailun Wang, Jiqiang Liu (Beijing Jiaotong University); Nan Jiang (Beijing University of Technology); Md Armanuzzaman, Ziming Zhao (Northeastern University)
166 SIGuard: Guarding Secure Inference with Post Data Privacy Xinqian Wang, Xiaoning Liu (RMIT University); Shangqi Lai (CSIRO Data61); Xun Yi (RMIT University); Xingliang Yuan (University of Melbourne)
167 PQConnect: — Automated Post-Quantum End-to-End Tunnels Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica); Tanja Lange (Eindhoven University of Technology and Academia Sinica); Jonathan Levin (Academia Sinica and Eindhoven University of Technology); Bo-Yin Yang (Academia Sinica)
168 Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding Chunjiang Che (The Hong Kong University of Science and Technology (Guangzhou)); Songze Li (Southeast University); Xuechao Wang (The Hong Kong University of Science and Technology (Guangzhou))
169 MineShark: Cryptomining Traffic Detection at Scale Shaoke Xi, Tianyi Fu, Kai Bu, Chunling Yang, Zhihua Chang, Wenzhi Chen, Zhou Ma (Zhejiang University); Chongjie Chen, Yongsheng Shen (HANG ZHOU CITY BRAIN CO., LTD); Kui Ren (Zhejiang University)
170 The Forking Way: When TEEs Meet Consensus Annika Wilde, Tim Niklas Gruel (Ruhr University Bochum); Claudio Soriente (NEC Laboratories Europe); Ghassan Karame (Ruhr University Bochum)
171 PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy Comprehension Andrick Adhikari, Sanchari Das, Rinku Dewri (University of Denver)
172 GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
173 Black-box Membership Inference Attacks against Fine-tuned Diffusion Models Yan Pang, Tianhao Wang (University of Virginia)
174 TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks Matteo Leonelli, Addison Crump, Meng Wang, Florian Bauckholt, Keno Hassler, Ali Abbasi, Thorsten Holz (CISPA Helmholtz Center for Information Security)
175 Sheep’s Clothing, Wolf’s Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote IPC Fangming Gu, Qingli Guo (Institute of Information Engineering, Chinese Academy of Sciences); Jie Lu (Institute of Computing Technology, Chinese Academy of Sciences); Qinghe Xie, Beibei Zhao (Institute of Information Engineering, Chinese Academy of Sciences); Kangjie Lu (University of Minnesota); Hong Li, Xiaorui Gong (Institute of information engineering, Chinese Academy of Sciences)
176 CASPR: Context-Aware Security Policy Recommendation Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng (Institute of Information Engineering, Chinese Academy of Sciences)
177 Securing BGP ASAP: ASPA and other Post-ROV Defenses Justin Furuness, Cameron Morris, Reynaldo Morillo, Arvind Kasiliya, Bing Wang, Amir Herzberg (University of Connecticut)
178 Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Heqing Huang (Institute of Information Engineering, Chinese Academy of Sciences); Xiaoqi Jia, Yuanbo Xie (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Jiahao Cao (Institute for Network Sciences and Cyberspace, Tsinghua University)
179 ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks Xuewei Feng, Yuxiang Yang, Qi Li (Tsinghua University); Xingxiang Zhan (Zhongguancun Lab); Kun Sun (George Mason University); Ziqiang Wang, Ao Wang (Southeast University); Ganqiu Du (China Software Testing Center); Ke Xu (Tsinghua University)
180 L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target Taifeng Liu, Yang Liu, Zhuo Ma (Xidian University); Tong Yang (Peking University); Xinjing Liu, Teng Li, Jianfeng Ma (Xidian University)
181 Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead Yizhong Liu, Andi Liu (Beihang University); Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhuocheng Pan (Beihang University); Yinuo Li (Xi’an Jiaotong University); Jianwei Liu, Song Bian (Beihang University); Mauro Conti (University of Padua)
182 ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory)
183 Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack Ziqiang Wang (Southeast University); Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Yuxiang Yang (Tsinghua University); Mengyuan Li (University of Toronto); Ganqiu Du (China Software Testing Center); Ke Xu, Jianping Wu (Tsinghua University)
184 RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai (Zhejiang University); Haiqin Weng, Yan Liu, Tao Wei (Ant Group); Wenyuan Xu (Zhejiang University)
185 CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP Stefan Gast, Hannes Weissteiner (Graz University of Technology); Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany and Fraunhofer Austria, Vienna, Austria); Daniel Gruss (Graz University of Technology)
186 CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Bruno Ribeiro, Shengwei An (Purdue University); Pin-Yu Chen (IBM Research); Xiangyu Zhang, Ninghui Li (Purdue University)
187 Eclipse Attacks on Monero’s Peer-to-Peer Network Ruisheng Shi, Zhiyuan Peng, Lina Lan, Yulian Ge (Beijing University of Posts and Telecommunications); Peng Liu (Penn State University); Qin Wang (CSIRO Data61); Juan Wang (Wuhan University)
188 DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning Hao Yu (National University of Defense Technology); Chuan Ma (Chongqing University); Xinhang Wan, Jun Wang (National University of Defense Technology); Tao Xiang (Chongqing University); Meng Shen (Beijing Institute of Technology, Beijing, China); Xinwang Liu (National University of Defense Technology)
189 Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications Eman Maali (Imperial College London); Omar Alrawi (Georgia Institute of Technology); Julie McCann (Imperial College London)
190 “Where Are We On Cyber?” – A Qualitative Study On Boards’ Cybersecurity Risk Decision Making Jens Christian Opdenbusch, Jonas Hielscher (Ruhr University Bochum); Angela Sasse (Ruhr University Bochum, University College London)
191 I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models Yong Zhuang (Wuhan University); Keyan Guo (University at Buffalo); Yiheng Jing, Juan Wang, Xiaoyang Xu, Wenzhe Yi, Mengda Yang (Wuhan University); Hongxin Hu, Hongxin Hu (University at Buffalo)
192 Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing Ruyi Ding, Tong Zhou, Lili Su, A. Adam Ding, Xiaolin Xu, Yunsi Fei (Northeastern University)
193 A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications Stijn Pletinckx, Christopher Kruegel, Giovanni Vigna (University of California, Santa Barbara)
194 Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models Aydin Abadi (Newcastle University); Vishnu Asutosh Dasu (Pennsylvania State University); Sumanta Sarkar (University of Warwick)
195 Enhancing Security in Third-Party Library Reuse – Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis Shangzhi Xu, Jialiang Dong (The University of New South Wales); Weiting Cai (Delft University of Technology); Juanru Li (Feiyu Tech); Arash Shaghaghi, Nan Sun, Siqi Ma (The University of New South Wales)
196 Automated Malware Assembly Line: Uniting Piggybacking and Adversarial Example in Android Malware Generation Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
197 Power-Related Side-Channel Attacks using the Android Sensor Framework Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard (Graz University of Technology)
198 Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE Eduardo Chielle, Michail Maniatakos (New York University Abu Dhabi)
199 Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors Jianwen Tian (Academy of Military Sciences); Wei Kong (Zhejiang Sci-Tech University); Debin Gao (Singapore Management University); Tong Wang, Taotao Gu (Academy of Military Sciences); Kefan Qiu (Beijing Institute of Technology); Zhi Wang (Nankai University); Xiaohui Kuang (Academy of Military Sciences)
200 Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments Anqi Tian (Institute of Software, Chinese Academy of Sciences and School of Computer Science and Technology, University of Chinese Academy of Sciences); Peifang Ni (Institute of Software, Chinese Academy of Sciences and Zhongguancun Laboratory, Beijing, P.R.China); Yingzi Gao (Institute of Software, Chinese Academy of Sciences and School of Computer Science and Technology, University of Chinese Academy of Sciences); Jing Xu (Institute of Software, Chinese Academy of Sciences and Zhongguancun Laboratory, Beijing, P.R.China)
201 LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations Mahdi Rahimi (KU Leuven); Piyush Kumar Sharma (University of Michigan); Claudia Diaz (KU Leuven)
202 You Can Rand but You Can’t Hide: A Holistic Security Analysis of Google Fuchsia’s (and gVisor’s) Network Stack Amit Klein (Hebrew University of Jerusalem); Inon Kaplan, Ron Even (Independent researcher)
203 Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices Zheyu Ma (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; EPFL; JCSS, Tsinghua University (INSC) – Science City (Guangzhou) Digital Technology Group Co., Ltd.); Qiang Liu (EPFL); Zheming Li (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; JCSS, Tsinghua University (INSC) – Science City (Guangzhou) Digital Technology Group Co., Ltd.); Tingting Yin (Zhongguancun Laboratory); Wende Tan (Department of Computer Science and Technology, Tsinghua University); Chao Zhang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; Zhongguancun Laboratory; JCSS, Tsinghua University (INSC) – Science City (Guangzhou) Digital Technology Group Co., Ltd.); Mathias Payer (EPFL)
204 VeriBin: Adaptive Verification of Patches at the Binary Level Hongwei Wu (Purdue University); Jianliang Wu (Simon Fraser University); Ruoyu Wu, Ayushi Sharma, Aravind Machiry, Antonio Bianchi (Purdue University)
205 Welcome to Jurassic Park: A Comprehensive Study of Security Risks in Deno and its Ecosystem Abdullah AlHamdan, Cristian-Alexandru Staicu (CISPA Helmholtz Center for Information Security)
206 BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search Yonpan Wang, Hong Li (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Xiaojie Zhu (King Abdullah University of Science and Technology, Thuwal, Saudi Arabia); Siyuan Li, Chaopeng Dong (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China); Shouguo Yang (Zhongguancun Laboratory, Beijing, China); Kangyuan Qin (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China)
207 DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing Liam Wachter, Julian Gremminger (EPFL); Christian Wressnegger (Karlsruhe Institute of Technology (KIT)); Mathias Payer, Flavio Toffalini (EPFL)
208 A Multifaceted Study on the Use of TLS and Auto-detect in Email Ecosystems Ka Fun Tang, Sui Ling Mak, Che Wei Tu, Sze Yiu Chau (The Chinese University of Hong Kong)
209 On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance Takami Sato (University of California, Irvine, Department of Computer Science); Ryo Suzuki, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Ryo Yoshida (Keio University, Department of Electronics and Electrical Engineering); Qi Alfred Chen (University of California, Irvine, Department of Computer Science); Kentaro Yoshioka (Keio University, Department of Electronics and Electrical Engineering)
210 The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection Yi Yang, Jinghua Liu, Kai Chen, Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
211 A Comprehensive Memory Safety Analysis of Bootloaders Jianqiang Wang, Meng Wang (CISPA Helmholtz Center for Information Security); Qinying Wang (Zhejiang University); Nils Langius (Leibniz Universität Hannover); Li Shi (ETH Zurich); Ali Abbasi, Thorsten Holz (CISPA Helmholtz Center for Information Security)