Cycle1 accepted papers

SoK: A Taxonomy of Attacks and Defenses in Split Learning

Aqsa Shabbir (Bilkent University), Halil Ibrahim Kanpak (Koç University), Alptekin Küpçü (Koç University), Sinem Sav (Bilkent University)

Efficient Post-Quantum EPID Signatures From VOLE-in-the-Head

Zuming Liu (Shanghai Jiao Tong University), Deng Tang (Shanghai Jiao Tong University), Yanhong Xu (Shanghai Jiao Tong University)

From Sands to Mansions: Actionable, Customizable, and Causality-Preserving Cyberattack Emulation with LLM-powered Symbolic Planning

Lingzhi Wang (Northwestern University), Zhenyuan LI (Zhejiang University), Yi Jiang (Zhejiang University), Zhengkai Wang (Zhejiang University), Xiangmin Shen (Hofstra University), Wei Ruan (Zhejiang University), Yan Chen (Northwestern University)

Improving Correlation Power Analysis on Masked CRYSTALS-Kyber with Lattice Attack

Yen-Ting Kuo (The University of Tokyo), Atsushi Takayasu (The University of Tokyo)

ChatIoT: Large Language Model-based Security Assistant for Internet of Things with RAG

Ye Dong (National University of Singapore), Yan Lin Aung (University of Derby), Sudipta Chattopadhyay (University of Missouri, Kansas City (UMKC)), Jianying Zhou (Singapore University of Technology and Design)

Protecting Quantum Circuits Through Compiler - Resistant Obfuscation

Pradyun P (Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore), Amal Raj (Singapore Institute of Technology, Singapore), Vivek Balachandran (Singapore Institute of Technology, Singapore)

Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions

Alberto Maria Mongardini (Department of Computer Science, Sapienza University of Rome), Daniele Friolo (Sapienza University of Rome), Giuseppe Ateniese (George Mason University)

Topology-Hiding Path Validation for Large-Scale Quantum Key Distribution Networks

Stephan Krenn (AIT Austrian Institute of Technology), Omid Mir (AIT Austrian Institute Of Technology), Thomas Lorünser (AIT Austrian Institute of Technology), Sebastian Ramacher (AIT Austrian Institute of Technology), Florian Wohner (AIT Austrian Institute of Technology)

How to kickstart Fsmt with Short Authentication Strings and Out-Of-Band Communication

Wasilij Beskorovajnov (FZI Research Center for Information Technology), Jörn Müller-Quade (Karlsruhe Institute of Technology (KIT))

SoK: Benchmark Datasets for Evaluating AI Safety — Gaps Between Guidelines and Practice

Nami Ashizawa (NTT), Osamu Saisho (NTT)

TAPIR: A Two-Server Authenticated PIR Scheme with Preprocessing

Francesca Falzon (ETH Zurich), Laura Hetz (ETH Zurich), Annamira O’Toole (ETH Zurich, EPFL)

Firmware Transparency: Strengthening Security Guarantees Against Bootloader-Targeting Attacks

Mario Lins (Johannes Kepler University Linz), René Mayrhofer (Johannes Kepler University Linz), David Zeuthen (Google)

FedFDP: Fairness-Aware Federated Learning with Differential Privacy

Xinpeng Ling (East China Normal University), Jie Fu (Stevens Institute of Technology), Huifa Li (East China Normal University), Tong Cheng (East China Normal University), Kuncan Wang (Nanyang Technological University), Zhili Chen (East China Normal University)

Policy-Based Access Tokens: Privacy-Preserving Verification for Digital Identity

Daniel Gardham (University of Surrey), Kiran Pun (University of Surrey), Nick Frymann (University of Surrey)

Towards Privacy-Preserving Federated Learning using Hybrid Homomorphic Encryption

Ivan Costa (GECAD), Pedro Correia (FEUP), Ivone Amorim (ISEP), Eva Maia (GECAD), Isabel Praça (ISEP)

Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM

Yusuke Naito (Mitsubishi Electric Corporation), Yu Sasaki (NTT Social Informatics Laboratories, NIST Associate), Takeshi Sugawara (The University of Electro-Communications)

SoK: Outsourced Private Set Intersection

Sophie Hawkes (Royal Holloway, University of London), Christian Weinert (Royal Holloway, University of London)

FlexProofs: A Vector Commitment with Flexible Linear Time for Computing All Proofs

Jing Liu (ShanghaiTech University), Liang Feng Zhang (ShanghaiTech University)

OptiBridge: A Trustless, Cost-Efficient Bridge Between the Lightning Network and Ethereum

Mohsen Minaei (Visa Research), Duc Le (Visa Research), Pedro Moreno-Sanchez (IMDEA Software Institute, MPI-SP)

Deception by Design: A Configurable Platform for Flexible Cyber Deception Strategy Testing and Evaluation

Sukwha Kyung (Arizona State University), Souradip Nath (Arizona State University), Jaejong Baek (Arizona State University), Gail-Joon Ahn (Arizona State University)

$2B Lessons: Brigade as a Defense Against Real-World DeFi Bridge Exploits

Pascal Winkler (University of Duisburg-Essen), Jens-Rene Giesen (University of Duisburg-Essen), Oussama Draissi (University of Duisburg-Essen), Federico Badaloni (Max Planck Institute for Security and Privacy), Sebastian Holler (Max Planck Institute for Security and Privacy), Clara Schneidewind (MPI-SP), Lucas Davi (University of Duisburg-Essen)

PrivSpike: A Privacy-Preserving Inference Framework for Deep Spiking Neural Networks using Homomorphic Encryption

Nges Brian Njungle (Arizona State University), Eric Jahns (Arizona State University), Milan Stojkov (Faculty of Technical Sciences, University of Novi Sad), Michel Kinsy (Arizona State University)

X-CHAIN: Enhancing Electronic Supply Chain Security with 3D X-ray Inspection and Blockchain Integration

Tishya Sarma Sarkar (Indian Institute of Technology Kharagpur), Chandan Kumar (Indian Institute of Technology Kharagpur), Abhishek Chakraborty (Indian Institute of Technology Kharagpur), Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)

Faster signature verification with 3-dimensional decomposition

Vojtech Suchanek (Masaryk University), Marek Sýs (Masaryk University), Lukasz Chmielewski (Masaryk University)

RESPEC-CFA: Representation-Aware Speculative Control Flow Attestation

Liam Tyler (University of Zurich), Adam Caulfield (University of Waterloo), Ivan De Oliveira Nunes (University of Zurich)

Practice-Oriented Instances of Deterministic LPN

Carlos Cid (Simula UiB and Okinawa Institute of Science and Technology), Alex Davidson (LASIGE, Faculdade de Ciencias, Universidade de Lisboa), Atharva Phanse (Simula UiB)

The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes

Gorjan Alagic (University of Maryland and NIST), Fahran Bajaj (University of Maryland), Aybars Kocoglu (University of Maryland, College Park)