Accepted papers


KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Bonan Ruan, National University of Singapore; Jiahao Liu, National University of Singapore; Chuqi Zhang, National University of Singapore; Zhenkai Liang, National University of Singapore;

What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments
Marcus Botacin, Texas A&M University;

Cross-Regional Malware Detection via Model Distilling and Federated Learning
Marcus Botacin, Texas A&M University; Heitor Gomes, Victoria University of Wellington;

Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems
Mengya Zhang, The Ohio State University; Xiaokuan Zhang, George Mason University; Yinqian Zhang, Southern University of Science and Technology; Zhiqiang Lin, The Ohio State University;

Context-Aware Anomaly Detection Using Vehicle Dynamics
Chun-Yu Chen, The University of Michigan; Kang G. Shin, The University of Michigan; Soodeh Dadras, Ford Motor Company;

Deception-Resistant Stochastic Manufacturing for Automated Production Lines
Zeyu Yang, Zhejiang University; Hongyi Pu, Zhejiang University; Liang He, University of Colorado Denver; Chengtao Yao, Zhejiang University; Jianying Zhou, Singapore University of Technology and Design; Peng Cheng, Zhejiang University; Jiming Chen, Zhejiang University;

Honeyquest: Rapidly Measuring the Enticingness of Cyber Deception Techniques with Code-based Questionnaires
Mario Kahlhofer, Dynatrace Research, Johannes Kepler University Linz; Stefan Achleitner, Dynatrace Research; Stefan Rass, Johannes Kepler University Linz, LIT Secure and Correct Systems Lab; René Mayrhofer, Johannes Kepler University Linz;

Catch You Cause I Can: Busting Rogue Base Stations using CellGuard and the Apple Cell Location Database
Lukas Arnold, TU Darmstadt, Secure Mobile Networking Lab; Matthias Hollick, TU Darmstadt, Secure Mobile Networking Lab; Jiska Classen, Hasso Plattner Institute;

Large-Scale Security Analysis of Real-World Backend Deployments Speaking IoT-Focused Protocols
Carlotta Tagliaro, TU Wien; Martina Komsic, TU Wien; Andrea Continella, University of Twente; Kevin Borgolte, Ruhr University Bochum; Martina Lindorfer, TU Wien;

A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces
Mabon Ninan, University of Cincinnati; Evan Nimmo, University of Cincinnati; Shane Reilly, University of Cincinnati; Channing Smith, College of Charleston; Wenhai Sun, Purdue University West Lafayette; Boyang Wang, University of Cincinnati; John M. Emmert, University of Cincinnati;

Mateen: Adaptive Ensemble Learning for Network Anomaly Detection
Fahad Alotaibi, Imperial College London; Sergio Maffeis, Imperial College London;

Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation
Franco Terranova, Université de Lorraine, CNRS, Inria, LORIA; Abdelkader Lahmadi, Université de Lorraine, CNRS, Inria, LORIA; Isabelle Chrisment, Université de Lorraine, CNRS, Inria, LORIA;

The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat Intelligence
Thomas Geras, HM Munich University of Applied Sciences; Thomas Schreck, HM Munich University of Applied Sciences;

Gudifu: Guided Differential Fuzzing for HTTP Request Parsing Discrepancies
Bahruz Jabiyev, Dartmouth College; Anthony Gavazzi, Northeastern University; Kaan Onarlioglu, Akamai Technologies; Engin Kirda, Northeastern University;

Breaking Privacy in Model-Heterogeneous Federated Learning
Atharva Haldankar, Virginia Tech; Arman Riasi, Virginia Tech; Hoang-Dung Nguyen, Virginia Tech; Tran Phuong, University of Arkansas at Little Rock; Thang Hoang, Virginia Tech;

KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs
Peizhuo Lv, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences; Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences; Jiachen Zhou, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences;

VeriFence: Lightweight and Precise Spectre Defenses for Untrusted Linux Kernel Extensions
Luis Gerhorst, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU); Henriette Herzog, Ruhr-Universität Bochum (RUB); Peter Wägemann, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU); Maximilian Ott, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU); Rüdiger Kapitza, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU); Timo Hönig, Ruhr-Universität Bochum (RUB);

Tango: Extracting Higher-Order Feedback through State Inference
Ahmad Hazimeh, EPFL; Duo Xu, EPFL; Qiang Liu, EPFL; Yan Wang, Huawei; Mathias Payer, EPFL;

ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files
Aakanksha Saha, TU Wien; Jorge Blasco, Universidad Politécnica de Madrid; Lorenzo Cavallaro, University College London; Martina Lindorfer, TU Wien;

Understanding Web Fingerprinting with a Protocol-Centric Approach
Bogdan Cebere, CISPA Helmholtz Center for Information Security; Christian Rossow, CISPA Helmholtz Center for Information Security;

Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter
Mohammad Hammas Saeed, Boston University; Shiza Ali, Boston University; Pujan Paudel, Boston University; Jeremy Blackburn, Binghamton University; Gianluca Stringhini, Boston University;

How to Train your Antivirus: RL-based Hardening through the Problem Space
Ilias Tsingenopoulos, imec-DistriNet, KU Leuven; Jacopo Cortellazzi, King's College London; Branislav Bosansky, Gen Digital; Simone Aonzo, EURECOM; Davy Preuveneers, KU Leuven; Wouter Joosen, KU Leuven; Fabio Pierazzi, King's College London; Lorenzo Cavallaro, University College London;

Down to earth! Guidelines for DGA-based Malware Detection
Bogdan Cebere, CISPA Helmholtz Center for Information Security; Jonathan Lasse Bennet Flueren, CISPA Helmholtz Center for Information Security; Silvia Sebastián, CISPA Helmholtz Center for Information Security; Daniel Plohmann, Fraunhofer FKIE; Christian Rossow, CISPA Helmholtz Center for Information Security;

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning
Jianing Wang, National University of Singapore; Shanqing Guo, Shandong University; Wenrui Diao, Shandong University; Yue Liu, Southeast University; Haixin Duan, Tsinghua University; Yichen Liu, Indiana University Bloomington; Zhenkai Liang, National University of Singapore;

Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods
Gang Yan, UC Merced; Hao Wang, Stevens Institute of Technology; Xu Yuan, University of Delaware; Jian Li, Stony Brook University;

Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior
Anyuan Sang, Xidian University; Yuchen Wang, Xidian University; Li Yang, Xidian University, Shaanxi Key Laboratory of Network and System Security; Junbo Jia, Xidian University; Lu Zhou, Xidian University;

Replay-resistant Disk Fingerprinting via Unintentional Electromagnetic Emanations
Wenfan Song, Zhejiang University; Jianwei Liu, School of Cyber Science and Technology, Zhejiang University; Yajie Liu, Zhejiang University; Jinsong Han, Zhejiang University;

Encrypted Endpoints: Defending Online Services from Illegitimate Bot Automation
August See, Universität Hamburg; Kevin Röbert, Universität Hamburg; Mathias Fischer, Universität Hamburg;

Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times
Ziyi Huang, Nankai University; Ding Wang, Nankai University; Yunkai Zou, Nankai University;

Integrating Static Analyses for High-Precision Control-Flow Integrity
Florian Kasten, Fraunhofer AISEC; Philipp Zieris, Fraunhofer AISEC; Julian Horsch, Fraunhofer AISEC;

Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware
Carlos Novo, INESC TEC, HASLab and DCC FCUP; Sofia Romeiro, INESC-ID / Instituto Superior Técnico, Universidade de Lisboa; Bernardo Portela, INESC TEC, HASLab and DCC FCUP; Diogo Barradas, University of Waterloo; Nuno Santos, INESC-ID / Instituto Superior Técnico, Universidade de Lisboa;

AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images
Jonas Ricker, Ruhr University Bochum; Dennis Assenmacher, GESIS - Leibniz Institute for the Social Sciences; Thorsten Holz, CISPA Helmholtz Center for Information Security; Asja Fischer, Ruhr University Bochum; Erwin Quiring, Ruhr University Bochum, International Computer Science Institute Berkeley;

BluePrint: Automatic Malware Signature Generation for Internet Scanning
Kevin Stevens, Georgia Institute of Technology; Mert Erdemir, Georgia Institute of Technology; Hang Zhang, Indiana University Bloomington; Taesoo Kim, Georgia Institute of Technology; Paul Pearce, Georgia Institute of Technology;

Fixing Insecure Cellular System Information Broadcasts For Good
Alexander J. Ross, North Carolina State University; Bradley Reaves, North Carolina State University; Yomna Nasser, Google; Gil Cukierman, Google; Roger Piqueras Jover, Google;

Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure
Udesh Kumarasinghe, Purdue University; Mohamed Nabeel, Palo Alto Networks; Ravindu De Silva, SCoRe Lab; Charitha Elvitigala, SCoRe Lab;

From Victims to Defenders: An Exploration of the \\Phishing Attack Reporting Ecosystem
Zhibo Sun, Drexel University; Faris Bugra Kokulu, Arizona State University; Penghui Zhang, Arizona State University; Adam Oest, PayPal; Gianluca Stringhini, Boston University; Tiffany Bao, Arizona State University; Ruoyu Wang, Arizona State University; Yan Shoshitaishvili, Arizona State University; Adam Doupé, Arizona State University; Gail-Joon Ahn, Arizona State University;

A Comprehensive, Automated Security Analysis of the Uptane Automotive Over-the-Air Update Framework
Robert Lorch, The University of Iowa; Daniel Larraz, The University of Iowa; Cesare Tinelli, The University of Iowa; Omar Chowdhury, Stony Brook University;

Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing
Eric Wang, THU; Larry Xu, PTLAB;

AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection
Hongbin Sun, Zhongguancun Laboratory; Su Wang, Zhongguancun Laboratory; Zhiliang Wang, Zhongguancun Laboratory; Zheyu Jiang, Tsinghua University; Dongqi Han, Beijing University of Posts and Telecommunications; Jiahai Yang, Zhongguancun Laboratory;

You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence
Tommaso Paladini, Politecnico di Milano; Lara Ferro, Politecnico di Milano; Mario Polino, Politecnico di Milano; Stefano Zanero, Politecnico di Milano; Michele Carminati, Politecnico di Milano;

Hidden Web Caches Discovery
Matteo Golinelli, University of Trento; Bruno Crispo, University of Trento;

No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge
Franka Schuster, Brandenburg University of Technology Cottbus-Senftenberg; Hartmut König, Brandenburg University of Technology Cottbus-Senftenberg;

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing
Tai Yue, Academy of Mitary Science, Southern University of Science and Technology; Yibo Jin, Southern University of Science and Technology; Fengwei Zhang, Southern University of Science and Technology (SUSTech); Zhenyu Ning, Hunan University; Pengfei Wang, National University of Defense Technology; Xu Zhou, National University of Defense Technology; Kai Lu, National University of Defense Technology;

Organized by


polyu

Sponsors


Diamond

KAUST