Lisbon, July 6 - 10, 2026
11th IEEE European Symposium on Security and Privacy
| Cross-Host Lateral Movement Attacks Detection with QUIC-Aware Dynamic Information Flow Tracking | Kokthay Poeng (University of Namur), Laurent Schumacher (University of Namur) |
| The Unbearable Randomness of Fuzzing | Dongjia Zhang (EURECOM), Romain Malmain (EURECOM), Andrea Oliveri (EURECOM), Davide Balzarotti (EURECOM), Aurélien Francillon (EURECOM) |
| High Impedance: Analysis of Publicly Disclosed Vulnerabilities in FPGA IP Cores | Imtiaj A. Chowdhury (Vrije Universiteit Amsterdam), Eric Ackermann (CISPA), Sven Bugiel (CISPA) |
| Practical Attacks on Session Messenger and Oxen Blockchain | Tingfeng Yu (Australian National University), Thomas Haines (Australian National University) |
| All You Need is Trust: A Longitudinal Analysis of Italy's OpenID Federation Journey | Tobias Hilbig (Munich University of Applied Sciences), Erwin Kupris (Munich University of Applied Sciences), Thomas Schreck (Munich University of Applied Sciences) |
| SoK: Honeypots & LLMs, More Than the Sum of Their Parts? | Robert A. Bridges (AI Sweden), Thomas R. Mitchell (Volvo Group), Mauricio Muñoz (AI Sweden), Ted Henriksson (AI Sweden) |
| The Clone Strikes Back: Efficient Vulnerable Code Detection in Custom Android-based Systems | Esteban Luques (Florida International University), Carlo Mazzocca (University of Salerno), Guliz Seray Tuncay (Google), Selcuk Uluagac (Florida International University) |
| PHASE: Passive Human Activity Simulation Evaluation | Steven Lamp (University of Virginia), Jason D. Hiser (University of Virginia), Anh Nguyen-Tuong (University of Virginia), Jack W. Davidson (University of Virginia) |
| Dealing with Digital Risks: Advice provided to Children by Peers, Parents, and Teachers | Alexander Löbel (RWTH Aachen University), Andreas Klinger (RWTH Aachen University), Frederic Salmen (RWTH Aachen University), Clemens Bönnen (RWTH Aachen University), Ulrike Meyer (RWTH Aachen University) |
| Automated Stealthy Wear-Out Attack on Digital Twins With Deep Reinforcement Learning | Joshua Haworth (University of Sheffield), Aryan Pasikhani (University of Sheffield), George Pavlides (University of Sheffield), Prosanta Gope (University of Sheffield), John Clark (University of Sheffield) |
| Formal Security Analysis of Swedish BankID | Qinghua Wang (Kristianstad University) |
| Aggressive, Imperceptible, or Both: Architecture-Aware Hybrid Byzantines in Federated Learning | Emre Ozfatura (Sabanci University), Kerem Ozfatura (Koc University), Baturalp Büyükates (University of Birmingham), Mert Çoşkuner (Sabanci University), Alptekin Küpçü (Koc University), Deniz Gündüz (Imperial College London) |
| One Space To Match Them All: Template Inversion and Impersonation under Realistic Post-Breach Conditions | willem verheyen (KU Leuven, Distrinet), Tim Van hamme (KU Leuven, Distrinet), Davy Preuveneers (KU Leuven, Distrinet), Wouter Joosen (KU Leuven, Distrinet) |
| Attacking the First-Principle: A Black-Box Query-Free Targeted Mimicry Attack on Binary Function Classifiers | Jean-Yves Marion (Université de Lorraine), Gabriel Sauger (Université de Lorraine), Sazzadur Rahaman (University of Arizona), Victor Matrat (Université de Lorraine), Vincent Tourneur (Université de Lorraine), Muaz Ali (University of Arizona) |
| SCRIBE: Practical Static Binary Patching via Binary-Aware Recompilation of Decompiled Code | Han Dai (Purdue University), Soumyakant Priyadarshan (Purdue University), Abdullah Imran (Purdue University), Ruoyu “Fish” Wang (Arizona State University), Antonio Bianchi (Purdue University) |
| Abusing Cloud Services to Establish Covert Channels in Secure Enterprise Environments | Kotaiba Alachkar (TU Delft), Eduardo Barbaro (TU Delft), Cristiano Giuffrida (VU Amsterdam), Michel Van Eeten (TU Delft), Yury Zhauniarovich (TU Delft) |
| SCOUT-CT: Sound Constant-Time Outcome with Uncertainty Tracking using multi-taint analysis | Damien Maier (HES-SO / EPFL), Jean-François Pasche (HES-SO), Maxim Golay (HES-SO / EPFL), Alexandre Duc (HES-SO), Damien Maier (HEIG-VD) |
| PROF: Protected Order Flow in a Profit-Seeking World | Kushal Babel (Cornell Tech & Category Labs), Nerla Jean-Louis (UIUC & IC3), Yan Ji (Cornell Tech & IC3), Ujval Misra (UC Berkeley & IC3), Mahimna Kelkar (Cornell Tech & IC3), Kosala Yapa Mudiyanselage (Fidelity Center for Applied Technology), Andrew Miller (UIUC & IC3), Ari Juels (Cornell Tech & IC3) |
| Implementing and Evaluating the Usability of Reliable Voter Complaints in E2E Verifiable Remote Electronic Voting | Tobias Hilt (Karlsruhe Institute for Technology), Christian Mack (Karlsruhe Institute for Technology), Philipp Matheis (Karlsruhe Institute for Technology), Benjamin Berens (Karlsruhe Institute for Technology), Tobias Länge (Karlsruhe Institute for Technology), Rolf Haenni (Bern University of Applied Sciences), Reto E. Koenig (Bern University of Applied Sciences), Philipp Locher (Bern University of Applied Sciences), Melanie Volkamer (Karlsruhe Institute for Technology) |
| SecDTD: Dynamic Token Drop for Secure Transformers Inference | Yifei Cai (Iowa State University), Zhuoran Li (University of Arizona), Yizhou Feng (Old Dominion University), Qiao Zhang (Shandong University), Hongyi Wu (University of Arizona), Danella Zhao (University of Arizona), Chunsheng Xin (Iowa State University), Yifei Cai (Old Dominion University) |
| SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training | Yuange Li (Rutgers University), Xiong Fan (Cysic, Inc.) |
| Composable Isolation as a Foundation to Manage Trust in the Cloud | Adrien Ghosn (Microsoft Azure Research), Charly Castes (EPFL), Neelu Shivprakash Kalani (EPFL), Yuchen Qian (EPFL), Marios Kogias (Imperial College London), Edouard Bugnion (EPFL) |
| Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones | Felix Oberhansl (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Marc Schink (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Nisha Jacob Kabakci (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Michael Gruber (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Dominik Klein (German Federal Office for Information Security (BSI)), Sven Freud (German Federal Office for Information Security (BSI)), Tobias Damm (German Federal Office for Information Security (BSI)), Michael Hartmeier (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Ivan Gavrilan (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Silvan Streit (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Jonas Stappenbeck (Fraunhofer Institute for Applied and Integrated Security (AISEC)), Andreas Seelos Zankl (Fraunhofer Institute for Applied and Integrated Security (AISEC)) |
| Measuring Healthcare Data Leaks and Security Flaws at Internet Scale | Nico Brüggemann (Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE), Lukas Schmidt (FH Münster University of Applied Sciences), Marius Brockhoff (FH Münster University of Applied Sciences), Marvin Dölzer (Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE), Fabian Ising (Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE), Christoph Saatjohann (FH Münster University of Applied Sciences), Sebastian Schinzel (FH Münster University of Applied Sciences, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE) |
| Match&Mend: Minimally Invasive Local Reassembly for Patching N-day Vulnerabilities in ARM Binaries | Sebastian Jänich (LMU Munich), Merlin Sievers (LMU Munich), Johannes Kinder (LMU Munich) |
| "Security vs. Interoperability" Arguments: An Analytical Framework | Daji Landis (New York University), Elettra Bietti (Northeastern University), Sunoo Park (New York University) |
| Security of NIST SP800-90A Hash-based DRBGs in the Seedless Model | Woohyuk Chung (Korea Advanced Institute of Science and Technology (KAIST)), Seongha Hwang (Korea Advanced Institute of Science and Technology (KAIST)), Byeonghak Lee (Samsung SDS), Seongkwang Kim (Samsung SDS), Jooyoung Lee (Korea Advanced Institute of Science and Technology (KAIST)) |
| VerIFI: Formal Verification of Microarchitectural Information-Flow Integrity | Katharina Ceesay-Seitz (ETH Zurich), Flavien Solt (UC Berkeley), Mengyuan Yin (ETH Zurich), Kaveh Razavi (ETH Zurich) |
| Privacy at your Fingertips: Enabling Rapid Client-Side Operations in Fully Homomorphic Encryption | Aikata Aikata (Graz University of Technology), Florian Krieger (Graz University of Technology), Sujoy Sinha Roy (Graz University of Technology) |
| SourceFabric: Consistent and Scalable Security Policies for Git Repositories | Aditya Sirish A Yelgundhalli (Bloomberg, New York University), Patrick Zielinski (New York University), Marcela S. Melara (Intel Corporation), Dennis Roellke (Bloomberg), Reza Curtmola (New Jersey Institute of Technology), Justin Cappos (New York University) |
| SoK: A Systematic Review of Integration and Reproducibility of Fuzzing Research into AFL++ | Nico Schiller (CISPA Helmholtz Center for Information Security), Nils Bars (CISPA Helmholtz Center for Information Security), Moritz Schloegel (CISPA Helmholtz Center for Information Security), Thorsten Holz (Max Planck Institute for Security and Privacy) |
| Secrets Best Not Shared: DNS Privacy Enhancements for the Constrained IoT | Martine Sophie Lenders (TU Dresden), Thomas C. Schmidt (HAW Hamburg), Matthias Wählisch (TU Dresden & Barkhausen Institut Dresden) |
| DNS Trap: Unveiling Reactive DNS Monitoring via Stimulated Network Emissions | Aaron Faulkenberry (Georgia Tech), Athanasios Avgetidis (Georgia Tech), Omar Alrawi (Georgia Tech), Zane Ma (Oregon State University), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Tech) |
| SoK: The Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices | Nikolai Puch (Fraunhofer AISEC, Technical University of Munich), Maximilian Pursche (Technical University of Munich), Sebastian Peters (Fraunhofer AISEC, Technical University of Munich), Michael P. Heinl (Technical University of Munich, Fraunhofer AISEC, Munich University of Applied Sciences HM) |
| Revisiting Privacy Leakage in Machine Unlearning: Membership Inference Beyond the Forgotten Set | Jie Fu (Stevens Institute of Technology), Nima Naderloui (University of Connecticut), Da Zhong (Meta Inc.), Yuan Hong (University of Connecticut), Wendy Hui Wang (Stevens Institute of Technology) |
| SandVenture: Escaping JavaScript Sandboxes with Objective-driven Input Generation | Mingi Jung (Ulsan National Institute of Science and Technology (UNIST)), Hyeon Heo (Korea Advanced Institute of Science and Technology (KAIST)), Seongil Wi (Ulsan National Institute of Science and Technology (UNIST)) |
| KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs | Xin Fan Guo (Imperial College London & University College London), Xinran Zheng (University College London), Albert Merono Penuela (King's College London), Lorenzo Cavallaro (University College London), Sergio Maffeis (Imperial College London), Fabio Pierazzi (University College London), Xin Fan Guo (Imperial College London) |
| Security-by-Design for LLM-Based Code Generation: Leveraging Internal Representations for Concept-Driven Steering Mechanisms | Maximilian Wendlinger (Fraunhofer AISEC), Daniel Kowatsch (Fraunhofer AISEC), Konstantin Böttinger (Fraunhofer AISEC), Philip Sperl (Fraunhofer AISEC) |
| GRAAL: GRAph-based Analysis of Logs for Advanced AI-based Intrusion Detection Systems | Fanny Dijoud (Inria, Univ. Rennes, IRISA), Michel Hurfin (Inria, Univ. Rennes, IRISA), Pierre-François Gimenez (Inria, Univ. Rennes, IRISA), Frédéric Majorczyk (DGA-MI, Univ. Rennes, IRISA), Barbara Pilastre (DGA-MI) |
| Remove the blind Spot - The Cybersecurity Incident Response Taxonomy of Influence Factors | Thomas Biege (FH Münster University of Applied Sciences), Marius Brockhoff (FH Münster University of Applied Sciences), Jonas Kaspereit (FH Münster University of Applied Sciences), Fabian Ising (Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE), Lea Gröber (ICSI - International Computer Science Institute), Sebastian Schinzel (FH Münster University of Applied Sciences, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE), Lea Gröber (International Computer Science Institute) |
| NewTool: Efficient Inference of Network Protocols using Similarity Digest Clustering and Multiple Sequence Algorithms | Pablo Ruiz-Lezcano (Universidad de Zaragoza), Daniel Uroz (Universidad de Zaragoza), Ricardo J. Rodríguez (Universidad of Zaragoza) |
| SoK: Cybersecurity Assessment of Humanoid Ecosystem | Priyanka Surve (Ben Gurion University of the Negev), Asaf Shabtai (Ben Gurion University of the Negev), Yuval Elovici (Ben Gurion University of the Negev) |
| Bandwidth Efficient Partial Authorized PSI | Tjitske Ollie Koster (TU Delft), Francesca Falzon (ETH Zurich), Evangelia Anna Markatou (TU Delft) |
| Persistent BitTorrent Trackers | Francois Xavier Wicht (University of Bern), Zhengwei Tong (Duke University), Shunfan Zhou (Phala Network), Hang Yin (Phala Network), Aviv Yaish (Yale University, IC3), Andrew Miller (UIUC & IC3) |
| Decentralized Reliability Estimation for Low-Latency Mixnets | Claudia Diaz (Nym Technologies SA and KU Leuven), Harry Halpin (Nym Technologies SA), Aggelos Kiayias (University of Edinburgh and IOG) |
| Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain | Yash Vekaria (University of California, Davis), Rishab Nithyanand (University of Iowa), Zubair Shafiq (University of California, Davis) |
| Investigating Developers’ Usage and Perception of Trusted Execution Environment Features in Android | Abdullah Imran (Purdue University), Güliz Seray Tuncay (Google), René Mayrhofer (Google Inc.), Antonio Bianchi (Purdue University) |
| ARVO: Atlas of Reproducible Vulnerabilities for Open-Source Software | Xiang Mei (Arizona State University), Jordi Del Castillo (New York University), Pulkit Singh Singaria (Arizona State University), Haoran Xi (New York University), Abdelouahab (Habs) Benchikh (Arizona State University), Tiffany Bao (Arizona State University), Ruoyu Wang (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupé (Arizona State University), Hammond Pearce (University of New South Wales), Brendan Dolan-Gavitt (New York University) |
| Adaptor Multi-Signatures: Definition, Applications, and Construction from Cryptographic Group Actions | Xuan Thanh Khuc (Institute of Cybersecurity and Cryptology, University of Wollongong, Australia), Willy Susilo (Institute of Cybersecurity and Cryptology, University of Wollongong, Australia), Dung Hoang Duong (Institute of Cybersecurity and Cryptology, University of Wollongong, Australia), Yannan Li (Institute of Cybersecurity and Cryptology, University of Wollongong, Australia), Partha Sarathi Roy (Institute of Cybersecurity and Cryptology, University of Wollongong, Australia), Kazuhide Fukushima (Advanced Technology Laboratories, KDDI Research, Inc., Japan), Shinsaku Kiyomoto (Advanced Technology Laboratories, KDDI Research, Inc., Japan) |
| Auditing Fairness-Privacy Trade-offs: Subpopulation-Level Effects of Fairness-Enhancing Algorithms | Umid Suleymanov (Virginia Polytechnic Institute and State University), Ilhama Novruzova (ADA University), Khalid Mammadov (University of Potsdam), Natavan Hasanova (University of Passau), Murat Kantarcioglu (Virginia Polytechnic Institute and State University) |
| GDBR: Label Recovery Attack Against Partial Gradient Encryption in Federated Learning | Rui Zhang (The University of Hong Kong), Ka-Ho Chow (The University of Hong Kong) |
| StreamCFI: Streamed Per-Input Control-Flow Integrity | Konstantinos Kleftogiorgos (Stevens Institute of Technology), Cristiano Giuffrida (VU Amsterdam), Georgios Portokalidis (IMDEA Software Institute) |
| BiSON: Billion-Scale Oblivious Nearest-Neighbor Search in Milliseconds | Rohan Ravi (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Sankha Das (Georgia Institute of Technology), Divya Gupta (Microsoft Research India) |
| Federated Matrix Factorization under Local Differential Privacy via Directional Noise | Nawfal ABBASSI SABER (University Mohammed VI Polytechnic), Loubna Mekouar (University Mohammed VI Polytechnic), Youssef Iraqi (University Mohammed VI Polytechnic) |
| A Critical Look at Accelerometer-Based Driver Fingerprinting: Between Deceptive Physics, Sensor Mingling and Weak Multiclass Assumptions | Bogdan Groza (Universitatea Politehnica Timisoara), Emilia Caragea (Universitatea Politehnica Timisoara), Adriana Berdich (Universitatea Politehnica Timisoara), Camil Jichici (Universitatea Politehnica Timisoara) |
| The Coding Limits of Robust Watermarking for Generative Models | Danilo Francati (Sapienza University of Rome), Yevin Nikhel Goonatilake (George Mason University), Shubham Vivek Pawar (Royal Holloway University of London), Daniele Venturi (Sapienza University of Rome), Giuseppe Ateniese (George Mason University) |
| Honest Users Make Honest Mistakes: A Framework for Analysing eID Protocols | Ole Martin Edstrøm (Norwegian University of Science and Technology), Kristian Gjøsteen (Norwegian University of Science and Technology), Hans Heum (Norwegian University of Science and Technology), Sjouke Mauw (University of Luxembourg), Felix Stutz (University of Luxembourg), Hans Heum (Simula UiB) |
| Formal Foundations of Trigger-Based Watermarking | Stefano Calzavara (Università Ca' Foscari Venezia), Lorenzo Cazzaro (University of Luxembourg), Claudio Lucchese (Università Ca' Foscari Venezia), Salvatore Orlando (Università Ca' Foscari Venezia) |
| From Beats to Breaches: How Offensive AI Infers Sensitive User Information from Playlists | Stefano Cecconello (University of Padua), Mauro Conti (University of Padua, Örebro University), Luca Pajola (Spritz Matters), Luca Pasa (University of Padua), Pier Paolo Tricomi (University of Padua) |
| Unidentifiable Identifier: Attacking Bluetooth Applications with Duplicated UUIDs | Siyu Shen (The Chinese University of Hong Kong), Yi Chen (The University of Hong Kong), Fenghao Xu (Southeast University), Shuaike Dong (Ant Group), Wenrui Diao (Shandong University), Di Tang (Sun Yat-Sen University), Kehuan Zhang (The Chinese University of Hong Kong) |
| THEMIS: Context-Aware Grey-box Fuzzing for WordPress Plugins | Matteo Leonelli (CISPA Helmholtz Center for Information Security), David Jannis Dewes (Saarland University), Thorsten Holz (Max Planck Institute for Security and Privacy) |
| SoK: The Cyber Attack Surface of Unmanned Vehicles (UxVs) | Alessandro Cantelli-Forti (CNIT-RaSS), Hosam Alamleh (Department of CS, University of North Carolina Wilmington) |
| Understanding the state of IoT-specific vulnerabilities via CVE characterization with LLIoT | Tina Rezaei (University of Twente), Suzan Bayhan (University of Twente), Andrea Continella (University of Twente), Jeroen van der Ham-de Vos (University of Twente), Roland van Rijswijk-Deij (University of Twente) |
| SoK: A Defense-Oriented Evaluation of Software Supply Chain Security | Eman Abu Ishgair (Purdue University), Juanita Gomez (University of California, Santa Cruz), Marcela S. Melara (Intel Corporation), Alvaro Cardenas (University of California, Santa Cruz), Santiago Torres-Arias (Purdue University) |
| Verifying Account Ecosystems with Graph Transformations | Freya Murphy (University of Surrey), Sasa Radomirovic (Heriot-Watt University) |
| Quantifying Memory Cells Vulnerability for DRAM Security | Hu Zilong (National University of Singapore), Fei Hongming (National University of Singapore), Prosanta Gope (University of Sheffield), Jack Miskelly (Queen's University), Owen Millwood (Wiznet, Germany), Biplab Sikdar (National University of Singapore) |
| Covert Attacks on Machine Learning Training in Passively Secure MPC | Rahul Rachuri (Visa Research), Matthew Jagielski (Anthropic), Peter Scholl (Aarhus University), Daniel Escudero (TACEO) |
| CAEC: Confidential, Attestable, and Efficient Inter‑CVM Communication with Arm CCA | Sina Abdollahi (Imperial College London), Amir Al Sadi (Imperial College London), Marios Kogias (Imperial College London), David Kotz (Dartmouth College), Hamed Haddadi (Imperial College London) |
| Agility for Steganalysis: Dealing with Distribution Drift in JPEG File Structures | Matěj Zorek (Czech Technical University in Prague), Tomáš Pevný (Czech Technical University in Prague), Rainer Böhme (University of Innsbruck) |
| Rethinking Human Biometric Security Under Behavioral Copy and Robot Replay | Zeyu Deng (Southern Methodist University), Zhen Meng (University of Glasgow), Long Huang (Southern Methodist University), Yichi Zhang (University of Glasgow), Jingwei Zhang (Southern Methodist University), Chen Wang (Southern Methodist University), Emma Li (University of Glasgow), Philip G. Zhao (University of Manchester) |
| Helltrap: Transforming physical machines into UEFI rootkit trap | Darius Suciu (Private Machines Inc.), Jake Christensen (Private Machines Inc.), Radu Sion (Private Machines Inc.) |
| I can't recognize (yet): Delayed Rendering to Defeat Visual Phishing Detectors | Ying Yuan (Sapienza University of Rome), Cristiano Alex Rado (University of Padua), Giovanni Apruzzese (University of Liechtenstein), Mauro Conti (University of Padua, Italy & Örebro University, Sweden), Luigi Vincenzo Mancini (Sapienza University of Rome) |
| Re-Key-Free, Risky-Free: Adaptable Model Usage Control | Zihan Wang (The University of Queensland and CSIRO's Data61), Zhongkui Ma (The University of Queensland), Xinguo Feng (The University of Queensland), Chuan Yan (The University of Queensland), Dongge Liu (Google), Ruoxi Sun (CSIRO's Data61), Derui Wang (CSIRO's Data61), Jason (Minhui) Xue (CSIRO's Data61 and Responsible AI Research (RAIR) Centre, Adelaide University), Guangdong Bai (City University of Hong Kong), Guangdong Bai (The University of Queensland) |
| ANARKey: A New Approach to (Socially) Recover Keys | Aniket Kate (Purdue University / Supra Research), Pratyay Mukherjee (Hashgraph), Hamza Saleem (Supra Research), Pratik Sarkar (Supra Research), Bhaskar Roberts (UC Berkeley) |
| The Invisible Ink of the Android Malware World: A Longitudinal Study on the Usage of Covert Communication Channels | Zeya Umayya (IIIT Delhi, India), Manan Aggarwal (IIIT Delhi, India), Manan Chugh (IIIT Delhi, India), Mann Nariya (IIIT Delhi, India), Yogesh Kaushik (IIIT Delhi, India), Sambuddho Chakravarty (IIIT Delhi, India) |
| SoK: The Next Frontier in AV Security: Systematizing Perception Attacks and the Emerging Threat of Multi-Sensor Fusion | Shahriar Rahman Khan (Kent State University), Tariqul Islam (University of Maryland Baltimore County), Raiful Hasan (Kent State University) |
| UEFI Memory Forensics: A Framework for UEFI Threat Analysis | Kalanit Suzan Segal (Ben Gurion University of the Negev), Hadar Cochavi Gorelik (Ben Gurion University of the Negev), Oleg Brodt (Ben Gurion University of the Negev), Yuval Elbahar (Ben Gurion University of the Negev), Yuval Elovici (Ben Gurion University of the Negev), Asaf Shabtai (Ben Gurion University of the Negev) |
| Towards Deployable VCFI: An Analysis and Optimization of VTable Control-Flow Integrity | Pinghai YUAN (Anhui Normal University), Hao JIANG (Anhui Normal University), Zhixiang LU (Anhui Normal University), Fulong CHEN (Anhui Normal University), Zhenjiang QIAN (Suzhou University of Technology) |
| Certificateless Key Exchange in QROM: Group-Action-based Construction and Performance | Li Duan (Huawei Technologies Duesseldorf GmbH), Yong Li (Huawei Technologies Duesseldorf GmbH), Joao Sobral (Huawei Technologies Duesseldorf GmbH) |
| ADVISE: Adversarial Invisible Steganography for Event-data | Aaditya Khant (The University of Texas at San Antonio), Raveen Wijewickrama (The University of Texas at San Antonio), Murtuza Jadliwala (The University of Texas at San Antonio) |
| It’s Not You, It’s Me: Reevaluating the Relationship between Concolic Execution and Fuzzing | Lukas Dresel (UC Santa Barbara), Stijn Pletinckx (UC Santa Barbara), Fabio Gritti (UC Santa Barbara), Mathias Payer (EPFL), Giovanni Vigna (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara) |
| ViNET: Connecting the Unconnected using Video over LTE | Manav Mittal (IIIT-Delhi), Yogesh Kaushik (IIIT-Delhi), Anirudh S Kumar (IIIT-Delhi), Mukulika Maity (IIIT-Delhi), Sambuddho (IIIT-Delhi) |