NDSS Symposium 2025 Accepted Papers

View the detailed program page to learn when each paper will be presented during the upcoming event.

Summer Cycle

A Key-Driven Framework for Identity-Preserving Face Anonymization

Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University),...

More Details

A Method to Facilitate Membership Inference Attacks in...

Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia)

More Details

A Systematic Evaluation of Novel and Existing Cache...

Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler...

More Details

AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight

Qi Xia (University of Texas at San Antonio), Qian Chen (University of Texas at...

More Details

An Empirical Study on Fingerprint API Misuse with...

Xin Zhang (Fudan University), Xiaohan Zhang (Fudan University), Zhichen Liu (Fudan University), Bo Zhao...

More Details

Automated Expansion of Privacy Data Taxonomy for Compliant...

Yue Qin (Indiana University Bloomington & Central University of Finance and Economics), Yue Xiao...

More Details

Be Careful of What You Embed: Demystifying OLE...

Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science...

More Details

Black-box Membership Inference Attacks against Fine-tuned Diffusion Models

Yan Pang (University of Virginia), Tianhao Wang (University of Virginia)

More Details

BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with...

Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota),...

More Details

BumbleBee: Secure Two-party Inference Framework for Large Transformers

Wen-jie Lu (Ant Group), Zhicong Huang (Ant Group), Zhen Gu (Alibaba Group), Jingyu Li...

More Details

Careful About What App Promotion Ads Recommend! Detecting...

Shang Ma (University of Notre Dame), Chaoran Chen (University of Notre Dame), Shao Yang...

More Details

Cascading Spy Sheets: Exploiting the Complexity of Modern...

Leon Trampert (CISPA Helmholtz Center for Information Security), Daniel Weber (CISPA Helmholtz Center for...

More Details

CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace...

Kaiyuan Zhang (Purdue University), Siyuan Cheng (Purdue University), Guangyu Shen (Purdue University), Bruno Ribeiro...

More Details

CHAOS: Exploiting Station Time Synchronization in 802.11 Networks

Sirus Shahini (University of Utah), Robert Ricci (University of Utah)

More Details

CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models

Rui Zeng (Zhejiang University), Xi Chen (Zhejiang University), Yuwen Pu (Zhejiang University), Xuhong Zhang...

More Details

Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack...

Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong...

More Details

Cross-Origin Web Attacks via HTTP/2 Server Push and...

Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun...

More Details

Delay-allowed Differentially Private Data Stream Release

Xiaochen Li (University of Virginia), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University), Chen...

More Details

Diffence: Fencing Membership Privacy With Diffusion Models

Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr...

More Details

Dissecting Payload-based Transaction Phishing on Ethereum

Zhuo Chen (Zhejiang University), Yufeng Hu (Zhejiang University), Bowen He (Zhejiang University), Dong Luo...

More Details

Duumviri: Detecting Trackers and Mixed Trackers with a...

He Shuang (University of Toronto), Lianying Zhao (Carleton University and University of Toronto), David...

More Details

ERW-Radar: An Adaptive Detection System against Evasive Ransomware...

Lingbo Zhao (Institute of Information Engineering,Chinese Academy of Sciences), Yuhui Zhang (Institute of Information...

More Details

EvoCrawl: Exploring Web Application Code and State using...

Xiangyu Guo (University of Toronto), Akshay Kawlay (University of Toronto), Eric Liu (University of...

More Details

Explanation as a Watermark: Towards Harmless and Multi-bit...

Shuo Shao (Zhejiang University), Yiming Li (Zhejiang University), Hongwei Yao (Zhejiang University), Yiling He...

More Details

Generating API Parameter Security Rules with LLM for...

Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...

More Details

Heimdall: Towards Risk-Aware Network Management Outsourcing

Yuejie Wang (Peking University), Qiutong Men (New York University), Yongting Chen (New York University...

More Details

Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing...

Anqi Tian (Institute of Software, Chinese Academy of Sciences; School of Computer Science and...

More Details

Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based...

Lingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI...

More Details

Kronos: A Secure and Generic Sharding Blockchain Consensus...

Yizhong Liu (Beihang University), Andi Liu (Beihang University), Yuan Lu (Institute of Software Chinese...

More Details

LeakLess: Selective Data Protection against Memory Leakage Attacks...

Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook...

More Details

Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless...

Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego),...

More Details

MALintent: Coverage Guided Intent Fuzzing Framework for Android

Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel...

More Details

Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding

Chunjiang Che (The Hong Kong University of Science and Technology (Guangzhou)), Songze Li (Southeast...

More Details

Mens Sana In Corpore Sano: Sound Firmware Corpora...

René Helmke (Fraunhofer FKIE), Elmar Padilla (Fraunhofer FKIE, Germany), Nils Aschenbruck (University of Osnabrück)

More Details

MineShark: Cryptomining Traffic Detection at Scale

Shaoke Xi (Zhejiang University), Tianyi Fu (Zhejiang University), Kai Bu (Zhejiang University), Chunling Yang...

More Details

Misdirection of Trust: Demystifying the Abuse of Dedicated...

Zhibo Zhang (Fudan University), Lei Zhang (Fudan University), Zhangyue Zhang (Fudan University), Geng Hong...

More Details

Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo...

Joonkyo Jung (Department of Computer Science, Yonsei University), Jisoo Jang (Department of Computer Science,...

More Details

MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK)...

Dongwei Xiao (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong...

More Details

Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size...

Ziqiang Wang (Southeast University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun...

More Details

On the Realism of LiDAR Spoofing Attacks against...

Takami Sato (University of California, Irvine), Ryo Suzuki (Keio University), Yuki Hayakawa (Keio University),...

More Details

Passive Inference Attacks on Split Learning via Adversarial...

Xiaochen Zhu (National University of Singapore & Massachusetts Institute of Technology), Xinjian Luo (National...

More Details

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR

Zizhi Jin (Zhejiang University), Qinhong Jiang (Zhejiang University), Xuancun Lu (Zhejiang University), Chen Yan...

More Details

PowerRadio: Manipulate Sensor Measurement via Power GND Radiation

Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang...

More Details

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell...

Jiangyi Deng (Zhejiang University), Xinfeng Li (Zhejiang University), Yanjiao Chen (Zhejiang University), Yijie Bai...

More Details

RadSee: See Your Handwriting Through Walls Using FMCW...

Shichen Zhang (Michigan State University), Qijun Wang (Michigan State University), Maolin Gan (Michigan State...

More Details

ReDAN: An Empirical Study on Remote DoS Attacks...

Xuewei Feng (Tsinghua University), Yuxiang Yang (Tsinghua University), Qi Li (Tsinghua University), Xingxiang Zhan...

More Details

Reinforcement Unlearning

Dayong Ye (University of Technology Sydney), Tianqing Zhu (City University of Macau), Congcong Zhu...

More Details

ReThink: Reveal the Threat of Electromagnetic Interference on...

Fengchen Yang (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Zihao Dan (Zhejiang University;...

More Details

Revisiting EM-based Estimation for Locally Differentially Private Protocols

Yutong Ye (Institute of software, Chinese Academy of Sciences & Zhongguancun Laboratory, Beijing, PR.China.),...

More Details

Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition:...

Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato...

More Details

Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon

Xuanji Meng (Tsinghua University), Xiao Sui (Shandong University), Zhaoxin Yang (Tsinghua University), Kang Rong...

More Details

SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone

Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University),...

More Details

Secret Spilling Drive: Leaking User Behavior through SSD...

Jonas Juffinger (Graz University of Technology), Fabian Rauscher (Graz University of Technology), Giuseppe La...

More Details

Secure IP Address Allocation at Cloud Scale

Eric Pauley (University of Wisconsin–Madison), Kyle Domico (University of Wisconsin–Madison), Blaine Hoak (University of...

More Details

Secure Transformer Inference Made Non-interactive

Jiawen Zhang (Zhejiang University), Xinpeng Yang (Zhejiang University), Lipeng He (University of Waterloo), Kejia...

More Details

Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum...

Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security,...

More Details

The (Un)usual Suspects – Studying Reasons for Lacking...

Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for...

More Details

The Midas Touch: Triggering the Capability of LLMs...

Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...

More Details

The Philosopher’s Stone: Trojaning Plugins of Large Language...

Tian Dong (Shanghai Jiao Tong University), Minhui Xue (CSIRO's Data61), Guoxing Chen (Shanghai Jiao...

More Details

The Power of Words: A Comprehensive Analysis of...

Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for...

More Details

The Skeleton Keys: A Large Scale Analysis of...

Yizhe Shi (Fudan University), Zhemin Yang (Fudan University), Kangwei Zhong (Fudan University), Guangliang Yang...

More Details

THEMIS: Regulating Textual Inversion for Personalized Concept Censorship

Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for...

More Details

Time-varying Bottleneck Links in LEO Satellite Networks: Identification,...

Yangtao Deng (Tsinghua University), Qian Wu (Tsinghua University), Zeqi Lai (Tsinghua University), Chenwei Gu...

More Details

Too Subtle to Notice: Investigating Executable Stack Issues...

Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)

More Details

TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning...

Chen Gong (University of Vriginia), Kecen Li (Chinese Academy of Sciences), Jin Yao (University...

More Details

Transparency or Information Overload? Evaluating Users’ Comprehension and...

Xiaoyuan Wu (Carnegie Mellon University), Lydia Hu (Carnegie Mellon University), Eric Zeng (Carnegie Mellon...

More Details

Tweezers: A Framework for Security Event Detection via...

Jian Cui (Indiana University), Hanna Kim (KAIST), Eugene Jang (S2W Inc.), Dayeon Yim (S2W...

More Details

type++: Prohibiting Type Confusion with Inline Type Information

Nicolas Badoux (EPFL), Flavio Toffalini (Ruhr-Universität Bochum, EPFL), Yuseok Jeon (UNIST), Mathias Payer (EPFL)

More Details

Understanding Data Importance in Machine Learning Attacks: Does...

Rui Wen (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for...

More Details

Understanding Miniapp Malware: Identification, Dissection, and Characterization

Yuqing Yang (The Ohio State University), Yue Zhang (Drexel University), Zhiqiang Lin (The Ohio...

More Details

VeriBin: Adaptive Verification of Patches at the Binary...

Hongwei Wu (Purdue University), Jianliang Wu (Simon Fraser University), Ruoyu Wu (Purdue University), Ayushi...

More Details

Wallbleed: A Memory Disclosure Vulnerability in the Great...

Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab),...

More Details

WAVEN: WebAssembly Memory Virtualization for Enclaves

Weili Wang (Southern University of Science and Technology), Honghan Ji (ByteDance Inc.), Peixuan He...

More Details

Welcome to Jurassic Park: A Comprehensive Study of...

Abdullah AlHamdan (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (CISPA Helmholtz Center for...

More Details

Fall Cycle

”Who is Trying to Access My Account?” Exploring...

Tongxin Wei (Nankai University), Ding Wang (Nankai University), Yutong Li (Nankai University), Yuehuan Wang...

More Details

“Where Are We On Cyber?” – A Qualitative...

Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse...

More Details

A Comprehensive Memory Safety Analysis of Bootloaders

Jianqiang Wang (CISPA Helmholtz Center for Information Security), Meng Wang (CISPA Helmholtz Center for...

More Details

A Formal Approach to Multi-Layered Privileges for Enclaves

Ganxiang Yang (Shanghai Jiao Tong University), Chenyang Liu (Shanghai Jiao Tong University), Zhen Huang...

More Details

A Large-Scale Measurement Study of the PROXY Protocol...

Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara),...

More Details

A Multifaceted Study on the Use of TLS...

Ka Fun Tang (The Chinese University of Hong Kong), Che Wei Tu (The Chinese...

More Details

A New PPML Paradigm for Quantized Models

Tianpei Lu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Bingsheng...

More Details

Alba: The Dawn of Scalable Bridges for Blockchains

Giulia Scaffino (TU Wien), Lukas Aumayr (TU Wien), Mahsa Bastankhah (Princeton University), Zeta Avarikioti...

More Details

All your (data)base are belong to us: Characterizing...

Kevin van Liebergen (IMDEA Software Institute), Gibran Gomez (IMDEA Software Institute), Srdjan Matic (IMDEA...

More Details

ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based...

Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song...

More Details

Attributing Open-Source Contributions is Critical but Difficult: A...

Jan-Ulrich Holtgrave (CISPA Helmholtz Center for Information Security), Kay Friedrich (CISPA Helmholtz Center for...

More Details

Automated Mass Malware Factory: The Convergence of Piggybacking...

Heng Li (Huazhong University of Science and Technology), Zhiyuan Yao (Huazhong University of Science...

More Details

Automatic Insecurity: Exploring Email Auto-configuration in the Wild

Shushang Wen (School of Cyber Science and Technology, University of Science and Technology of...

More Details

Automatic Library Fuzzing through API Relation Evolvement

Jiayi Lin (The University of Hong Kong), Qingyu Zhang (The University of Hong Kong),...

More Details

Balancing Privacy and Data Utilization: A Comparative Vignette...

Leona Lassak (Ruhr University Bochum), Hanna Püschel (TU Dortmund University), Oliver D. Reithmaier (Leibniz...

More Details

BARBIE: Robust Backdoor Detection Based on Latent Separability

Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma...

More Details

Beyond Classification: Inferring Function Names in Stripped Binaries...

Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin...

More Details

BinEnhance: An Enhancement Framework Based on External Environment...

Yongpan Wang (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese...

More Details

BitShield: Defending Against Bit-Flip Attacks on DNN Executables

Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong...

More Details

Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs...

Yonghao Zou (Beihang University and Peking University), Jia-Ju Bai (Beihang University), Zu-Ming Jiang (ETH...

More Details

Blindfold: Confidential Memory Management by Untrusted Operating System

Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University)

More Details

CASPR: Context-Aware Security Policy Recommendation

Lifang Xiao (Institute of Information Engineering, Chinese Academy of Sciences), Hanyu Wang (Institute of...

More Details

CCTAG: Configurable and Combinable Tagged Architecture

Zhanpeng Liu (Peking University), Yi Rong (Tsinghua University), Chenyang Li (Peking University), Wende Tan...

More Details

Characterizing the Impact of Audio Deepfakes in the...

Magdalena Pasternak (University of Florida), Kevin Warren (University of Florida), Daniel Olszewski (University of...

More Details

CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP

Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander...

More Details

Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers

Ruixuan Li (Choudhury), Chaithanya Naik Mude (University of Wisconsin-Madison), Sanjay Das (The University of...

More Details

Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams

Platon Kotzias (Norton Research Group, BforeAI), Michalis Pachilakis (Norton Research Group, Computer Science Department...

More Details

Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use...

Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The...

More Details

Defending Against Membership Inference Attacks on Iteratively Pruned...

Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong...

More Details

Density Boosts Everything: A One-stop Strategy for Improving...

Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore...

More Details

Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in...

Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich),...

More Details

Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged...

Christian van Sloun (RWTH Aachen University), Vincent Woeste (RWTH Aachen University), Konrad Wolsing (RWTH...

More Details

DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts...

Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed...

More Details

Distributed Function Secret Sharing and Applications

Pengzhi Xing (University of Electronic Science and Technology of China), Hongwei Li (University of...

More Details

DLBox: New Model Training Framework for Protecting Training...

Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung...

More Details

Do (Not) Follow the White Rabbit: Challenging the...

Soheil Khodayari (CISPA Helmholtz Center for Information Security), Kai Glauber (Saarland University), Giancarlo Pellegrino...

More Details

Do We Really Need to Design New Byzantine-robust...

Minghong Fang (University of Louisville), Seyedsina Nabavirazavi (Florida International University), Zhuqing Liu (University of...

More Details

DShield: Defending against Backdoor Attacks on Graph Neural...

Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National...

More Details

DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing

Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias...

More Details

EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices...

Hangtian Liu (Information Engineering University), Lei Zheng (Institute for Network Sciences and Cyberspace (INSC),...

More Details

Eclipse Attacks on Monero's Peer-to-Peer Network

Ruisheng Shi (Beijing University of Posts and Telecommunications), Zhiyuan Peng (Beijing University of Posts...

More Details

EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side...

Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang...

More Details

Enhancing Security in Third-Party Library Reuse – Comprehensive...

Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New...

More Details

Evaluating Machine Learning-Based IoT Device Identification Models for...

Eman Maali (Imperial College London), Omar Alrawi (Georgia Institute of Technology), Julie McCann (Imperial...

More Details

Exploring User Perceptions of Security Auditing in the...

Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania...

More Details

From Large to Mammoth: A Comparative Evaluation of...

Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)

More Details

FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2

Connor Glosner (Purdue University), Aravind Machiry (Purdue University)

More Details

GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of...

Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci...

More Details

GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization

Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science...

More Details

GhostShot: Manipulating the Image of CCD Cameras with...

Yanze Ren (Zhejiang University), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji...

More Details

HADES Attack: Understanding and Evaluating Manipulation Risks of...

Ruixuan Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University;Zhongguancun Laboratory), Yunyi...

More Details

Hidden and Lost Control: on Security Design Risks...

Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of...

More Details

Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code...

Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu...

More Details

I Know What You Asked: Prompt Leakage via...

Guanlong Wu (Southern University of Science and Technology), Zheng Zhang (ByteDance Inc.), Yao Zhang...

More Details

I know what you MEME! Understanding and Detecting...

Yong Zhuang (Wuhan University), Keyan Guo (University at Buffalo), Juan Wang (Wuhan University), Yiheng...

More Details

ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial...

Corban Villa (New York University Abu Dhabi), Constantine Doumanidis (New York University Abu Dhabi),...

More Details

Impact Tracing: Identifying the Culprit of Misinformation in...

Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen...

More Details

Interventional Root Cause Analysis of Failures in Multi-Sensor...

Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong),...

More Details

Iris: Dynamic Privacy Preserving Search in Authenticated Chord...

Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)

More Details

IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic...

Yuhao Wu (Washington University in St. Louis), Franziska Roesner (University of Washington), Tadayoshi Kohno...

More Details

JBomAudit: Assessing the Landscape, Compliance, and Security Implications...

Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong...

More Details

KernelSnitch: Side Channel-Attacks on Kernel Data Structures

Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer...

More Details

L-HAWK: A Controllable Physical Adversarial Patch Against a...

Taifeng Liu (Xidian University), Yang Liu (Xidian University), Zhuo Ma (Xidian University), Tong Yang...

More Details

LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm

Dazhuang Liu (Delft University of Technology), Yanqi Qiao (Delft University of Technology), Rui Wang...

More Details

LAMP: Lightweight Approaches for Latency Minimization in Mixnets...

Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (University of Michigan), Claudia Diaz (KU Leuven)

More Details

Lend Me Your Beam: Privacy Implications of Plaintext...

Rui Xiao (Zhejiang University), Xiankai Chen (Zhejiang University), Yinghui He (Nanyang Technological University), Jun...

More Details

LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic...

Fengchen Yang (Zhejiang University), Wenze Cui (Zhejiang University), Xinfeng Li (Zhejiang University), Chen Yan...

More Details

LLMPirate: LLMs for Black-box Hardware IP Piracy

Vasudev Gohil (Texas A&M University), Matthew DeLorenzo (Texas A&M University), Veera Vishwa Achuta Sai...

More Details

MingledPie: A Cluster Mingling Approach for Mitigating Preference...

Cheng Zhang (Hunan University), Yang Xu (Hunan University), Jianghao Tan (Hunan University), Jiajie An...

More Details

Mysticeti: Reaching the Latency Limits with Uncertified DAGs

Kushal Babel (Cornell Tech & IC3), Andrey Chursin (Mysten Labs), George Danezis (Mysten Labs...

More Details

NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js...

Darion Cassel (Carnegie Mellon University), Nuno Sabino (IST & CMU), Min-Chien Hsu (Carnegie Mellon...

More Details

Non-intrusive and Unconstrained Keystroke Inference in VR Platforms...

Tao Ni (City University of Hong Kong), Yuefeng Du (City University of Hong Kong),...

More Details

On Borrowed Time – Preventing Static Side-Channel Analysis

Robert Dumitru (Ruhr University Bochum and The University of Adelaide), Thorben Moos (UCLouvain), Andrew...

More Details

On the Robustness of LDP Protocols for Numerical...

Xiaoguang Li (Xidian University, Purdue University), Zitao Li (Alibaba Group (U.S.) Inc.), Ninghui Li...

More Details

Onion Franking: Abuse Reports for Mix-Based Private Messaging

Matthew Gregoire (University of North Carolina at Chapel Hill), Margaret Pierce (University of North...

More Details

Oreo: Protecting ASLR Against Microarchitectural Attacks

Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan...

More Details

PBP: Post-training Backdoor Purification for Malware Classifiers

Dung Thuy Nguyen (Vanderbilt University), Ngoc N. Tran (Vanderbilt University), Taylor T. Johnson (Vanderbilt...

More Details

PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy...

Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of...

More Details

Power-Related Side-Channel Attacks using the Android Sensor Framework

Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar...

More Details

PQConnect: Automated Post-Quantum End-to-End Tunnels

Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica), Tanja Lange (Eindhoven...

More Details

Privacy-Preserving Data Deduplication for Enhancing Federated Learning of...

Aydin Abadi (Newcastle University), Vishnu Asutosh Dasu (Pennsylvania State University), Sumanta Sarkar (University of...

More Details

Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing

Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam...

More Details

PropertyGPT: LLM-driven Formal Verification of Smart Contracts through...

Ye Liu (Singapore Management University), Yue Xue (MetaTrust Labs), Daoyuan Wu (The Hong Kong...

More Details

Provably Unlearnable Data Examples

Derui Wang (CSIRO's Data61), Minhui Xue (CSIRO's Data61), Bo Li (The University of Chicago),...

More Details

ProvGuard: Detecting SDN Control Policy Manipulation via Contextual...

Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang...

More Details

QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing

Matteo Marini (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Mathias...

More Details

RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with...

Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr...

More Details

RContainer: A Secure Container Architecture through Extending ARM...

Qihang Zhou (Institute of Information Engineering,Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information...

More Details

Recurrent Private Set Intersection for Unbalanced Databases with...

Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)

More Details

Rediscovering Method Confusion in Proposed Security Fixes for...

Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz...

More Details

Repurposing Neural Networks for Efficient Cryptographic Computation

Xin Jin (The Ohio State University), Shiqing Ma (University of Massachusetts Amherst), Zhiqiang Lin...

More Details

Rethinking Trust in Forge-Based Git Security

Aditya Sirish A Yelgundhalli (New York University), Patrick Zielinski (New York University), Reza Curtmola...

More Details

Retrofitting XoM for Stripped Binaries without Embedded Data...

Chenke Luo (Wuhan University), Jiang Ming (Tulane University), Mengfei Xie (Wuhan University), Guojun Peng...

More Details

Revealing the Black Box of Device Search Engine:...

Mengying Wu (Fudan University), Geng Hong (Fudan University), Jinsong Chen (Fudan University), Qi Liu...

More Details

Revisiting Concept Drift in Windows Malware Detection: Adaptation...

Adrian Shuai Li (Purdue University), Arun Iyengar (Intelligent Data Management and Analytics, LLC), Ashish...

More Details

Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared...

Wentao Dong (City University of Hong Kong), Peipei Jiang (Wuhan University; City University of...

More Details

SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks...

Phillip Rieger (Technical University of Darmstadt), Alessandro Pegoraro (Technical University of Darmstadt), Kavita Kumari...

More Details

Safety Misalignment Against Large Language Models

Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong Kong University of...

More Details

Scale-MIA: A Scalable Model Inversion Attack against Secure...

Shanghao Shi (Virginia Tech), Ning Wang (University of South Florida), Yang Xiao (University of...

More Details

SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website...

Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State University), Zhuoer Lyu (Arizona State...

More Details

ScopeVerif: Analyzing the Security of Android’s Scoped Storage...

Zeyu Lei (Purdue University), Güliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z....

More Details

Secure Data Analytics in Apache Spark with Fine-grained...

Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State...

More Details

Securing BGP ASAP: ASPA and other Post-ROV Defenses

Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of...

More Details

SHAFT: Secure, Handy, Accurate and Fast Transformer Inference

Andes Y. L. Kei (Chinese University of Hong Kong), Sherman S. M. Chow (Chinese...

More Details

Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities...

Fangming Gu (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of...

More Details

SIGuard: Guarding Secure Inference with Post Data Privacy

Xinqian Wang (RMIT University), Xiaoning Liu (RMIT University), Shangqi Lai (CSIRO Data61), Xun Yi...

More Details

Siniel: Distributed Privacy-Preserving zkSNARK

Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia...

More Details

SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data...

Sian Kim (Ewha Womans University), Seyed Mohammad Mehdi Mirnajafizadeh (Wayne State University), Bara Kim...

More Details

SKILLPoV: Towards Accessible and Effective Privacy Notice for...

Jingwen Yan (Clemson University), Song Liao (Texas Tech University), Mohammed Aldeen (Clemson University), Luyi...

More Details

SongBsAb: A Dual Prevention Approach against Singing Voice...

Guangke Chen (Pengcheng Laboratory), Yedi Zhang (National University of Singapore), Fu Song (Key Laboratory...

More Details

Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces

Philipp Mackensen (Ruhr University Bochum), Paul Staat (Max Planck Institute for Security and Privacy),...

More Details

Speak Up, I’m Listening: Extracting Speech from Zero-Permission...

Derin Cayir (Florida International University), Reham Mohamed Aburas (American University of Sharjah), Riccardo Lazzeretti...

More Details

Starshields for iOS: Navigating the Security Cosmos in...

Jiska Classen (Hasso Plattner Institute, University of Potsdam), Alexander Heinrich (TU Darmstadt, Germany), Fabian...

More Details

Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux...

Hang Zhang (Indiana University Bloomington), Jangha Kim (The Affiliated Institute of ETRI, ROK), Chuhong...

More Details

The Discriminative Power of Cross-layer RTTs in Fingerprinting...

Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of...

More Details

The Forking Way: When TEEs Meet Consensus

Annika Wilde (Ruhr University Bochum), Tim Niklas Gruel (Ruhr University Bochum), Claudio Soriente (NEC...

More Details

The Guardians of Name Street: Studying the Defensive...

Boladji Vinny Adjibi (Georgia Tech), Athanasios Avgetidis (Georgia Tech), Manos Antonakakis (Georgia Tech), Michael...

More Details

The Kids Are All Right: Investigating the Susceptibility...

Elijah Bouma-Sims (Carnegie Mellon University), Lily Klucinec (Carnegie Mellon University), Mandy Lanyon (Carnegie Mellon...

More Details

The Road to Trust: Building Enclaves within Confidential...

Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke...

More Details

TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory...

Martin Unterguggenberger (Graz University of Technology), Lukas Lamster (Graz University of Technology), David Schrammel...

More Details

Towards Understanding Unsafe Video Generation

Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz...

More Details

Translating C To Rust: Lessons from a User...

Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li...

More Details

Truman: Constructing Device Behavior Models from OS Drivers...

Zheyu Ma (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; EPFL; JCSS, Tsinghua...

More Details

Try to Poison My Deep Learning Data? Nowhere...

Yansong Gao (The University of Western Australia), Huaibing Peng (Nanjing University of Science and...

More Details

TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks

Matteo Leonelli (CISPA Helmholtz Center for Information Security), Addison Crump (CISPA Helmholtz Center for...

More Details

TZ-DATASHIELD: Automated Data Protection for Embedded Systems via...

Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas),...

More Details

UI-CTX: Understanding UI Behaviors with Code Contexts for...

Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of...

More Details

Uncovering the iceberg from the tip: Generating API...

Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...

More Details

Unleashing the Power of Generative Model in Recovering...

Xiangzhe Xu (Purdue University), Zhuo Zhang (Purdue University), Zian Su (Purdue University), Ziyang Huang...

More Details

URVFL: Undetectable Data Reconstruction Attack on Vertical Federated...

Duanyi Yao (Hong Kong University of Science and Technology), Songze Li (Southeast University), Xueluan...

More Details

VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional...

Kavita Kumari (Technical University of Darmstadt), Maryam Abbasihafshejani (University of Texas at San Antonio),...

More Details

Vulnerability, Where Art Thou? An Investigation of Vulnerability...

Daniel Klischies (Ruhr University Bochum), Philipp Mackensen (Ruhr University Bochum), Veelasha Moonsamy (Ruhr University...

More Details

VulShield: Protecting Vulnerable Code Before Deploying Patches

Yuan Li (Zhongguancun Laboratory & Tsinghua University), Chao Zhang (Tsinghua University & JCSS &...

More Details

Was This You? Investigating the Design Considerations for...

Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li...

More Details

What’s Done Is Not What’s Claimed: Detecting and...

Chang Yue, Kai Chen, Zhixiu Guo (Institute of Information Engineering, Chinese Academy of Sciences,...

More Details

You Can Rand but You Can't Hide: A...

Inon Kaplan (Independent researcher), Ron even (Independent researcher), Amit Klein (The Hebrew University of...

More Details

YuraScanner: Leveraging LLMs for Task-driven Web App Scanning

Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for...

More Details