Accepted Papers
A List of Papers Accepted to the Academic Research Track
Long Papers:
1. Localhost Detour from Public to Private Networks
Yehuda Afek, Bremler Bremler-Barr, Dor Israeli and Alon Noy
​
2. Generating One-Hot Maps under Encryption
Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha and Hayim Shaul
​
3. Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO
George Vershinin, Asaf Cohen and Omer Gurewitz
​
4. New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic
Stan Korzilius and Berry Schoenmakers
​
5. A new interpretation for the GHASH authenticator of AES-GCM
Shay Gueron
​
6. Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu and Xiao Wang
​
7. Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay and Palash Sarkar​
​
8. Building blocks for LSTM homomorphic evaluation with TFHE
Daphné Trama, Aymen Boudguiga, Renaud Sirdey and Pierre-Emmanuel Clet
​
9. The use of Performance-Counters to perform side-channel attacks
Ron Segev and Avi Mandelson
​
10. How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs Madhav Nair, Rajat Sadhukhan and Debdeep Mukhopadhyay
​
11. Efficient Extended GCD and Class Groups from Secure Integer Arithmetic
Toon Segers and Berry Schoenmakers
​
12. CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati and Stefano Zanero
​
13. HAMLET: A Transformer Based Approach for Money Laundering Detection
Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero
​
14. Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks
Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero
​
15. Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks
Rajnish Kumar and Shlomi Arnon
​
16. On adaptively secure prefix encryption under LWE
Giorgos Zirdelis
​
17. Midgame Attacks and Defense Against Them
Donghoon Chang and Moti Yung
​
18. On Distributed Randomness Generation in Blockchains
Ilan Komargodski and Yoav Tamir
​
19. Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel Deborah Novick and Mark Last
​
20. Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
Jiayi Tan and Dipti K. Sarmah
​
21. SigML: Supervised Log Anomaly with Fully Homomorphic Encryption
Devharsh Trivedi, Aymen Boudguiga and Nikos Triandopoulos