Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation Somin Song (Cisco Research); Ashish Kundu (Cisco Ressearch); Byungchul Tak (Kyungpook National University) |
Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets Jongkil Jay Jeong, Robin Doss, Lu-xing Yang, Mohamed Abdelrazek, Zoe Wang, Ashish Nanda (Deakin University, Australia); Praveen Gauravaram, Keerthivasan Viswanathan (TCS Australia) |
Brave: Byzantine-Resilient and Privacy-Preserving Peer-toPeer Federated Learning Zhangchen Xu, Fengqing Jiang, Luyao Niu (University of Washington); Jinyuan Jia (Pennsylvania State University); Radha Poovendran (University of Washington) |
Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj (University of Washington); Bhaskar Ramasubramanian (Western Washington University); Radha Poovendran (University of Washington) |
Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors Dinuka Sahabandu (University of Washington); Xiaojun Xu (University of Illinois at UrbanaChampaign); Arezoo Rajabi, Luyao Niu (University of Washington); Bhaskar Ramasubramanian (Western Washington University); Bo Li (UIUC); Radha Poovendran (University of Washington) |
Defense against False Data Injection Attack in a Cyber-Physical System Sushree Padhan, Ashok Kumar Turuk (National Institute of Technology Rourkela) |
MalaQ – A Malware Against Quantum Computer Siyi Wang (Nanyang Technological University); Alex Jin (National University of Singapore); Suman Deb (Nanyang Technological University); Tarun Dutta, Manas Mukherjee (National University of Singapore); Anupam Chattopadhyay (Nanyang Technological University) |
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications Fengqing Jiang, Zhangchen Xu, Luyao Niu (University of Washington); Boxin Wang (Nvidia); Jinyuan Jia (Penn State); Bo Li (University of Chicago); Radha Poovendran (University of Washington) |
On the Feasibility of Inferring SGX Execution through PMU Woomin Lee, Taehun Kim, Youngjoo Shin (Korea University) |
Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts Van Tong (Hanoi University of Science and Technology); Cuong Dao (Hanoi University of Civil Engineering); Thep Dong, Hai Anh Tran, Duc Tran (Hanoi University of Science and Technology); Truong X. Tran (The Pennsylvania State University) |
iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks? Anand Agrawal, Rajib Ranjan Maiti (BITS Pilani, Hyderabad Campus) |