Accepted Papers in the first round

The following papers have been accepted in the first round:

Not So Secure TSC

Jonas Juffinger (Graz University of Technology)
Sudheendra Raghav Neela (Graz University of Technology)
Daniel Gruss (Graz University of Technology)

Homomorphic WiSARDs: Efficient Weightless Neural Network training over encrypted data

Leonardo Neumann (UNICAMP)
Antonio Guimarães (IMDEA Software Institute)
Diego F. Aranha (Aarhus University)
Edson Borin (UNICAMP)

CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations

Denis Donadel (University of Padua)
Kavya Balasubramanian (University of Washington)
Bhaskar Ramasubramanian (Western Washington University)
Mauro Conti (University of Padua)
Radha Poovendran (University of Washington)

Privately Compute the Item with Maximal Weight Sum in Set Intersection

Hongyuan Cai (Tsinghua University)
Xiaodong Wang (Tsinghua University)
Zijie Lu (Beijing Institute of Mathematical Sciences and Applications)
Bei Liang (Beijing Institute of Mathematical Sciences and Applications)

Oblivious suffix sorting: A multi-party computation scheme for secure and efficient suffix sorting

Kota Isayama (SMBC Nikko Securities Inc.)
Koki Jimbo (Tokyo University of Science)
Naohiro Okamoto (The University of Tokyo)
Kunihiko Sadakane (The University of Tokyo)
Kazunari Tozawa (The University of Tokyo)

Optimal Communication Unbalanced Private Set Union

Alexis Galan (Université Grenoble Alpes)
Jean-Guillaume Dumas (Université Grenoble Alpes)
Aude Maignan (Université Grenoble Alpes)
Bruno Grenet (Université Grenoble Alpes)
Daniel S. Roche (United States Naval Academy)

Security Analysis of Forward Secure Log Sealing in Journald

Astrid Ottenhues (Karlsruhe Institute of Technology)
Felix Dörre (Karlsruhe Institute of Technology)

Generic Security of GCM-SST

Akiko Inoue (NEC)
Ashwin Jha (Ruhr-Universität Bochum)
Bart Mennink (Radboud University Nijmegen)
Kazuhiko Minematsu (NEC)

G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels

Britney Bourassa (University of North Carolina at Chapel Hill)
Yan Michalevsky (Spacecoin.xyz)
Saba Eskandarian (University of North Carolina at Chapel Hill)

Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing

Enrico Bassetti (TU Delft)
Edoardo Di Paolo (Sapienza Universita di Roma)
Francesco Drago (University of Padua)
Mauro Conti (University of Padua & Delft University of Technology)
Angelo Spognardi (Sapienza Universita di Roma)

HCC: A Language-Independent Hardening Contract Compiler for Smart Contracts

Jens-Rene Giesen (University of Duisburg-Essen)
Sebastien Andreina (NEC Laboratories Europe)
Michael Rodler (Amazon Web Services)
Ghassan Karame (Ruhr University Bochum)
Lucas Davi (University of Duisburg-Essen)

SEBioID: Secure and Efficient Biometric Identification with Two-Party
Computation

Fuyi Wang (Deakin University)
Jinzhi Ouyang (Xiamen University)
Leo Yu Zhang (Griffith University)
Lei Pan (Deakin University)
Shengshan Hu (Huazhong University of Science and Technology)
Robin Doss (Deakin University)
Jianying Zhou (Singapore University of Technology and Design)

SoK: Continuous User Authentication Beyond Error Rates: Reviewing General System Properties

Florian Dehling (Justus Liebig University Giessen)
Sebastian Kawelke (L3montree Cybersecurity)
Luigi Lo Iacono (Justus Liebig University Giessen)

Negative Results on Information-theoretic Additive Randomized Encodings

Keitaro Hiwatashi (National Institute of Advanced Industrial Science and Technology (AIST))

TAU: Trust via Asynchronous Updates for Satellite Network Resiliency

Quincy Bayer (University of Pittsburgh)
Robert Esswein (University of Pittsburgh)
Samuel Mergendahl (MIT Lincoln Laboratory)
Jonathan Ruffley (Naval Nuclear Laboratory)
Mai Abdelhakim (University of Pittsburgh)
Robert K Cunningham (University of Pittsburgh)

Double Auction Meets Blockchain: Consensus from Scored Bid-Assignment

Xiangyu Su (Institute of Science Tokyo)
Xavier Defago (Institute of Science Tokyo)
Mario Larangeira (Institute of Science Tokyo, Input Output Global)
Kazuyuki Mori (Mitsubishi Electric Corporation)
Takuya Oda (Institute of Science Tokyo, The University of Kitakyushu)
Yasumasa Tamura (Institute of Science Tokyo, Hokkaido University)
Keisuke Tanaka (Institute of Science Tokyo)

Spilling-Cascade: an Optimal PKE Combiner for KEM Hybridization

Guirec Lebrun (Ecole Normale Supérieure – PSL, ANSSI)
Céline Chevalier (Université Panthéon-Assas, Ecole Normale Supérieure – PSL)
Ange Martinelli (ANSSI)

Distributed Asynchronous Remote Key Generation

Hugo Nartz (Forschungsinstitut CODE @ Universität der Bundeswehr München)
Mark Manulis (Universität der Bundeswehr München)

Two-party ECDSA with JavaCard-based smartcards

Antonin Dufka (Masaryk University)
Peeter Laud (Cybernetica AS)
Petr Svenda (Masaryk University)

Share&Shrink: Efficient and Delegatable MPC in one Broadcast then Asynchrony

Antoine Urban (Telecom Paris, Institut polytechnique de Paris)
Matthieu Rambaud (Telecom Paris, Institut Polytechnique Paris)

Registered Matchmaking Encryption

Danilo Francati (Royal Holloway, University of London)
Valeria Huang (Sapienza University of Rome)
Daniele Venturi (Sapienza University of Rome)

Sum-Preserving Encryption: Improved Bounds and Constructions for Long Vectors

Sarah Miracle (University of St. Thomas)
Scott Yilek (University of St. Thomas)

OCEAN: Open-World Contrastive Authorship Identification

Felix Mächtle (Universität zu Lübeck)
Jan-Niclas Serr (Universität zu Lübeck)
Nils Loose (Universität zu Lübeck)
Jonas Sander (Universität zu Lübeck)
Thomas Eisenbarth (Universität zu Lübeck)

The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach

Giacomo Benedetti (University of Genoa)
Serena Cofano (IMT School for Advanced Studies Lucca & University of Genoa)
Alessandro Brighente (University of Padua)
Mauro Conti (University of Padua & Delft University of Technology)

PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks

Mahdi Rahimi (KU Leuven)

LaserGuider: A Laser Based Physical Backdoor Attack against Deep Neural Networks

Yongjie Xu (ShanghaiTech University)
Guangke Chen (Pengcheng Laboratory)
Fu Song (Chinese Academy of Sciences & Nanjing Institute of Software Technology)
Yuqi Chen (ShanghaiTech University)

Delayed-Input Multi-Party Computation

Michele Ciampi (The University of Edinburgh)
Jure Sternad (Aarhus University)
Yu Xia (The University of Edinburgh)

Algebraic Zero Knowledge Contingent Payment

Javier Gomez-Martinez (IMDEA Software Institute, Universidad Politécnica de Madrid)
Dimitrios Vasilopoulos (Independent Researcher)
Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research)
Dario Fiore (IMDEA Software Institute)

Decompose and conquer: ZVP attacks on GLV curves

Vojtech Suchanek (Masaryk University)
Vladimir Sedlacek (Rutgers University)
Marek Sys (Masaryk University)

Anonymous Authenticated Key Exchange

Jose Ignacio Escribano Pablos (GuardedBox)
Maria Isabel González Vasco (Universidad Carlos III de Madrid)
Ángel Luis Pérez del Pozo (Universidad Rey Juan Carlos)
Claudio Soriente (NEC Laboratories Europe)

Wolf in Sheep’s Clothing: Understanding and Detecting Mobile Cloaking in Blackhat SEO

Yan Li (Tsinghua University)
Zhenrui Zhang (Tsinghua University)
Zhiyu Lang (Tsinghua University)
Xiang Li (Nankai University)
Jia Zhang (Tsinghua University)
Donghong Sun (Tsinghua University)