Accepted Papers

Paper ID Paper Title Authors
3 Andromeda: Enabling Secure Enclaves For The Android Ecosystem Dimitris Deyannis (FORTH-ICS, Greece), Dimitris Karnikis (FORTH-ICS, Greece), Giorgos Vasiliadis (FORTH-ICS, Greece) and Sotiris Ioannidis (Technical University of Crete, Greece)
9 FEX – A feature extractor for real-time IDS Andreas Schaad (University of Applied Sciences Offenburg, Germany) and Dominik Binder (University of Applied Sciences Offenburg, Germany)
11 Word-Map: Using Community Detection Algorithm to Detect AGDs Futai Zou (Shanghai JiaoTong University, China), Qianying Shen (Shanghai JiaoTong University, China) and Yuzong Hu (Shanghai JiaoTong University, China)
14 DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning Georgia Tsaloli (Chalmers University of Technology, Sweden), Bei Liang (Beijing Institute of Mathematical Sciences and Applications, China), Carlo Brunetta (Chalmers University of Technology, Sweden), Gustavo Banegas (Inria and École polytechnique, France) and Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden)
15 Transparency order of (n,m)-functions — its further characterization and applications Yu Zhou (Science and Technology on Communication Security Laboratory, China), Yongzhuang Wei (Guilin University of Electronic Technology, China), Hailong Zhang (Chinese Academy of Sciences, China), Luyang Li (Xian University of Post and Telecommunications, China), Enes Pasalic (University of Primorska, Slovenia) and Wenling Wu (Chinese Academy of Sciences, China)
28 Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher Jiqiang Lu (Beihang University, China) and Jingyu Li (Beihang University, China)
30 Voxstructor: Voice Reconstruction from Voiceprint Panpan Lu (Xidian University, China), Qi Li (University of Guelph, Canada), Hui Zhu (Xidian University, China), Giuliano Sovernigo (University of Guelph, Canada) and Xiaodong Lin (University of Guelph, Canada)
35 Randomized Component Based Secure Secret Reconstruction in Insecure Networks Xinyan Wang (University of Science and Technology of China, China) and Fuyou Miao (University of Science and Technology of China, China)
43 DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection Hao Sun (Dalian University of Technology, China), Yanjun Tong (Dalian University of Technology, China), Jing Zhao (Dalian University of Technology, China) and Zhaoquan Gu (Guangzhou University, China)
49 Targeted Universal Adversarial Perturbations for Automatic Speech Recognition Wei Zong (University of Wollongong, Australia), Yang-Wai Chow (University of Wollongong, Australia), Willy Susilo (University of Wollongong, Australia), Santu Rana (Deakin University, Australia) and Svetha Venkatesh (Deakin University, Australia)
50 A Novel Behavioural Screenlogger Detection System Hugo Sbaï (University of Oxford, UK), Jassim Happa (Royal Holloway, University of London, UK) and Michael Goldsmith (University of Oxford, UK)
52 Layering Quantum-Resistance into Classical Digital Signature Algorithms Teik Guan Tan (Singapore University of Technology and Design, Singapore) and Jianying Zhou (Singapore University of Technology and Design, Singapore)
54 TridentShell: A Covert and Scalable Backdoor Injection Xiaobo Yu (Guilin University of Electronic Technology, China), Weizhi Meng (Technical University of Denmark, Denmark), Lei Zhao (Wuhan University, China) and Yining Liu (Guilin University of Electronic Technology, China)
62 Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks Shichang Sun (Nanjing University of Aeronautics and Astronautics, China), Haoqi Wang (Nanjing University of Aeronautics and Astronautics, China), Mingfu Xue (Nanjing University of Aeronautics and Astronautics, China), Yushu Zhang (Nanjing University of Aeronautics and Astronautics, China), Jian Wang (Nanjing University of Aeronautics and Astronautics, China) and Weiqiang Liu (Nanjing University of Aeronautics and Astronautics, China)
71 Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification Rikima Mitsuhashi (The University of Tokyo, Japan), Akihiro Satoh (Kyushu Institute of Technology, Japan), Yong Jin (Tokyo Institute of Technology, Japan), Katsuyoshi Iida (Hokkaido University, Japan), Takahiro Shinagawa (The University of Tokyo, Japan) and Yoshiaki Takai (Hokkaido University, Japan)
73 Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy Seyed Ali Akhavani (Northeastern University, US), Jordan Jueckstock (North Carolina State University, US), Junhua Su (North Carolina State University, US), Alexandros Kapravelos (North Carolina State University, US), Engin Kirda (Northeastern University, US) and Long Lu (Northeastern University, US)
78 Bigdata-facilitated Two-party Authenticated Key Exchange for IoT Bowen Liu (Luxembourg Institute of Science and Technology, Luxembourg), Qiang Tang (Luxembourg Institute of Science and Technology, Luxembourg) and Jianying Zhou (Singapore University of Technology and Design, Singapore)
81 Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits Meryem Cherkaoui-Semmouni (Mohammed V University in Rabat, Morocco), Abderrahmane Nitaj (University of Caen Normandy, France), Willy Susilo (University of Wollongong, Australia) and Joseph Tonien (University of Wollongong, Australia)
83 Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic Mohammad Reza Norouzian (Technical University of Munich, Germany), Peng Xu (Technical University of Munich, Germany), Claudia Eckert (Technical University of Munich, Germany) and Apostolis Zarras (Delft University of Technology , Netherlands)
84 A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data Sara Jafarbeiki (Monash University, CSIRO Data 61, Australia), Amin Sakzad (Monash University, Australia), Shabnam Kasra Kermanshahi (RMIT, Australia), Ron Steinfeld (Monash University, Australia), Raj Gaire (CSIRO Data 61, Australia) and Shangqi Lai (Monash University, Australia)
86 Integer LWE with Non-Subgaussian Error and Related Attacks Tianyu Wang (Chinese Academy of Sciences, China), Yuejun Liu (Nanjing University of Science and Technology, China), Jun Xu (Chinese Academy of Sciences, China), Lei Hu (Chinese Academy of Sciences, China), Yang Tao (Chinese Academy of Sciences, China) and Yongbin Zhou (Nanjing University of Science and Technology, China