Abstract is missing.
- Scheduled Execution-Based Binary Indirect Call Targets RefinementYangyang Shi, Linan Tian, Liwei Chen, Yanqi Yang, Gang Shi. 3-23 [doi]
- Companion Apps or Backdoors? On the Security of Automotive Companion AppsPrashanthi Mallojula, FengJun Li, Xiaojiang Du, Bo Luo. 24-44 [doi]
- A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground ForumsMichal Tereszkowski-Kaminski, Santanu Kumar Dash 0001, Guillermo Suarez-Tangil. 45-66 [doi]
- Predicting Code Vulnerability Types via Heterogeneous GNN LearningYu Luo, Weifeng Xu, Dianxiang Xu. 67-87 [doi]
- WASMixer: Binary Obfuscation for WebAssemblyShangtong Cao, Ningyu He, Yao Guo 0001, Haoyu Wang 0001. 88-109 [doi]
- BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State MachinesPyeongju Ahn, Yeonseok Jang, Seunghoon Woo, Heejo Lee. 110-129 [doi]
- TGRop: Top Gun of Return-Oriented Programming AutomationNanyu Zhong, Yueqi Chen, Yanyan Zou, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao 0004, Menghao Li, Binghong Liu, Wei Huo. 130-152 [doi]
- Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure CodeJean-Loup Hatchikian-Houdot, Pierre Wilke, Frédéric Besson, Guillaume Hiet. 153-173 [doi]
- SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function SummariesXinrong Liu, He Wang, Meng Xu, Yuqing Zhang. 174-193 [doi]
- Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation FlowQirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu, Rui Chang. 194-214 [doi]
- Fully Homomorphic Training and Inference on Binary Decision Tree and Random ForestHojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, YounHo Lee. 217-237 [doi]
- Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from LatticesFeixiang Zhao, Huaxiong Wang, Jian Weng 0001. 238-258 [doi]
- Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse ScenarioZhiwei Li, Jun Xu, Yanli Zou, Lei Hu. 259-278 [doi]
- Secure Keyless Multi-party Storage SchemePascal Lafourcade 0001, Lola-Baie Mallordy, Charles Olivier-Anclin, Léo Robert. 279-298 [doi]
- tt LLRing: Logarithmic Linkable Ring Signatures with Transparent SetupXiangyu Hui, Sid Chi-Kin Chau. 299-319 [doi]
- In Search of Partitioning Oracle Attacks Against TLS Session TicketsMaximilian Radoy, Sven Hebrok, Juraj Somorovsky. 320-340 [doi]
- Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based BlockchainsHuseyin Gokay, Foteini Baldimtsi, Giuseppe Ateniese. 341-361 [doi]
- PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and VariantsSeoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik. 362-382 [doi]
- Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set IntersectionJiuheng Su, Zhili Chen, Haifeng Qian, Junqing Gong 0001. 383-402 [doi]
- LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHEJunping Wan, Danjie Li, Junbin Fang, Zoe L. Jiang. 403-423 [doi]
- File-Injection Attacks on Searchable Encryption, Based on Binomial StructuresTjard Langhout, Huanhuan Chen, Kaitai Liang. 424-443 [doi]