Title |
Authors |
Artifact Badges |
DOI |
Tracking and Transparency Mechanisms in the HbbTV Ecosystem |
Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences) |
|
10.5281/zenodo.15076439 |
Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory |
Konstantinos Kanellopoulos (ETH Zürich); Nisa Bostanci, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati (ETH Zürich); Onur Mutlu (ETH Zurich) |
|
10.5281/zenodo.15116851 |
LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection |
Ke He (University of Canterbury); Dan Dongseong Kim (The University of Queensland); Muhammad Rizwan Asghar (University of Surrey) |
|
10.5281/zenodo.15066515 |
Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches |
Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (University of Wisconsin-Madison); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln) |
|
10.6084/m9.figshare.28636109 |
A Human Study of Automatically Generated Decompiler Annotations |
Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University) |
|
10.6084/m9.figshare.28696898 |
ammBoost: State Growth Control for AMMs |
Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut) |
|
10.5281/zenodo.15065330 |
ReCraft: Split, Merge, and Membership Change of Raft Protocol |
Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University) |
|
10.5281/zenodo.15059499 |
Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit |
Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security) |
|
10.5281/zenodo.14276533 |
ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems |
Md Raihan Ahmed, Jainta Paul, Levi Taiji Li (University of Utah); Luis Garcia (University of Utah Kahlert School of Computing); Mu Zhang (University of Utah) |
|
10.5281/zenodo.15109706 |
GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses |
Pierrick Philippe (University of Rennes, CNRS, IRISA); Mohamed Sabt, Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA) |
|
10.5281/zenodo.15072003 |
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes |
Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland) |
|
10.5281/zenodo.14260284 |
IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics |
Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica); Ping-Ting Liu, Bo-Wei Lin (Department of Computer Science, National Yang Ming Chiao Tung University); Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica) |
|
10.6084/m9.figshare.27886677 |
Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers |
Qihang Peng (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Deliang Chang (QI-ANXIN Technology Research Institute); Jia Zhang (Tsinghua University; Zhongguancun Laboratory); Baojun Liu (Tsinghua University); Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute) |
|
10.6084/m9.figshare.28942571
|
Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement |
Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney) |
|
10.5281/zenodo.15077424 |
An Analysis of Malicious Packages in Open-Source Software in the Wild |
Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University) |
|
10.5281/zenodo.15086580 |
ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers |
Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (The University of Manchester); Timothy Jones (University of Cambridge) |
|
10.5281/zenodo.15080018 |
Detecting Code Vulnerabilities using LLMs |
Yinghao Zhang, Djimon Jayasundera, Larry Huynh (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia) |
|
10.5281/zenodo.15108502 |
MalTAG: Encrypted Malware Traffic Detection via Graph Based Flow Interaction Mining |
Renjie Li (University of Chinese Academy of Sciences China, Institute of Information Engineering, Chinese Academy of Sciences); Zhou Zhou (Institute of Information Engineering, Chinese Academy of Sciences); Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences China, Institute of Information Engineering, Chinese Academy of Sciences); Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences) |
|
10.5281/zenodo.15081214 |
Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture |
Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University) |
|
10.6084/m9.figshare.28665482 |
QUIC-Aware Load Balancing: Attacks and Mitigations |
Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg) |
|
10.5281/zenodo.15078306 |
RAVAGE: Robotic Autonomous VehiclesÕ Attack Generation Engine |
Pritam Dash, Karthik Pattabiraman (University of British Columbia) |
|
10.5281/zenodo.15073830 |
MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution |
Moein Ghaniyoun (The Ohio State University); Kristin Barber (Google); Yinqian Zhang (Southern University of Science and Technology); Radu Teodorescu (The Ohio State University) |
|
10.5281/zenodo.15116052 |
Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains |
Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia) |
|
10.5281/zenodo.15112728 |
On Security Vulnerabilities in Transportation IoT Devices |
Jason Yih (College of Computer, Mathematical, and Natural Sciences; University of Maryland, College Park, MD); Katerina Goseva-Popstojanova (Lane Department of Computer Science and Electrical Engineering; West Virginia University, Morgantown, WV); Michel Cukier (Department of Mechanical Engineering, University of Maryland, College Park, MD) |
|
10.5281/zenodo.15115540 |
Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System |
Cheng Chen (Louisiana State University); Grant Xiao (University of Virginia); Daehyun Lee, Lishan Yang (George Mason University); Evgenia Smirni (William & Mary); Homa Alemzadeh (University of Virginia); Xugui Zhou (Louisiana State University) |
|
10.6084/m9.figshare.28691090 |
Zero-Interference Containers: a Framework for Orchestrating Mixed-Criticality Applications |
Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy) |
|
10.5281/zenodo.15081498 |
ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation |
Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University) |
|
10.5281/zenodo.15089944 |
ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data |
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia) |
|
10.6084/m9.figshare.28655300 |
Automatically Generating Rules of Malicious Software Packages via Large Language Model |
XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University) |
|
10.5281/zenodo.15113130 |