Accepted Papers
A List of Papers Accepted to the Academic Research Track
Long Papers:
1. Localhost Detour from Public to Private Networks
Yehuda Afek, Bremler Bremler-Barr, Dor Israeli and Alon Noy
2. Generating One-Hot Maps under Encryption
Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha and Hayim Shaul
3. Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO
George Vershinin, Asaf Cohen and Omer Gurewitz
4. New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic
Stan Korzilius and Berry Schoenmakers
5. A new interpretation for the GHASH authenticator of AES-GCM
Shay Gueron
6. Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu and Xiao Wang
7. Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation
Madhurima Mukhopadhyay and Palash Sarkar
8. Building blocks for LSTM homomorphic evaluation with TFHE
Daphné Trama, Aymen Boudguiga, Renaud Sirdey and Pierre-Emmanuel Clet
9. The use of Performance-Counters to perform side-channel attacks
Ron Segev and Avi Mandelson
10. How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs Madhav Nair, Rajat Sadhukhan and Debdeep Mukhopadhyay
11. Efficient Extended GCD and Class Groups from Secure Integer Arithmetic
Toon Segers and Berry Schoenmakers
12. CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks
Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati and Stefano Zanero
13. HAMLET: A Transformer Based Approach for Money Laundering Detection
Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero
14. Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks
Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero
15. Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks
Rajnish Kumar and Shlomi Arnon
16. On adaptively secure prefix encryption under LWE
Giorgos Zirdelis
17. Midgame Attacks and Defense Against Them
Donghoon Chang and Moti Yung
18. On Distributed Randomness Generation in Blockchains
Ilan Komargodski and Yoav Tamir
19. Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel Deborah Novick and Mark Last
20. Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks
Jiayi Tan and Dipti K. Sarmah
21. SigML: Supervised Log Anomaly with Fully Homomorphic Encryption
Devharsh Trivedi, Aymen Boudguiga and Nikos Triandopoulos