Domenic Forte, University of Florida
Johann Knechtel, New York University, Abu Dhabi
Urbi Chatterjee, Indian Institute of Technology Kanpur
Chandan Karfa, IIT Guwahati
Sayandeep Saha, IIT Bombay
| Author | Title |
|---|---|
| Sikhar Patranabis | Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies |
| Fabrianne Effendi and Anupam Chattopadhyay | Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering |
| Tarun Yadav and Manoj Kumar | ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON |
| Sameera K M, Abhinav M, Amal P. P., Abhiram T Babu, Abishek Raj K, Amal Tomichen, Anaina P, Vinod P, Rafidha Rehiman K. A. and Mauro Conti | DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning |
| Jonna Likith Sai, Souptik Majumder, Rohit Verma and Priyanka Bagade | Spatiotemporal Intrusion Detection Systems for IoT Networks |
| Upasana Mandal, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya and Debdeep Mukhopadhyay | "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting |
| Rupesh Raj Karn and Ozgur Sinanoglu | Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques |
| Subhadeep Banik and Francesco Regazzoni | Faster and more Energy-Efficient Equation Solvers over GF(2) |
| Author | Title |
|---|---|
| Yi Hao Puah, Anh Tu Ngo, Nandish Chattopadhyay and Anupam Chattopadhyay | BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks |
| Reeshav Chowdhury, Aman Kumar, Vaibhav Mohite and Ayantika Chatterjee | Transferability of Evasion Attacks Against FHE Encrypted Inference |
| Madhurima Das and Bodhisatwa Mazumdar | Security Analysis of ASCON Cipher under Persistent Faults |
| Harshit Tyagi and Divyashikha Sethia | P-MASFEP: security-enhanced PUF-based Mutual Authentication & Session key establishment using Fuzzy Extractor & PKI |
| Issa Baddour, Dip Sankar Banerjee and Somitra Kumar Sanadhya | SideLink: Exposing NVLink to Covert- and Side-Channel Attacks |
| Ashish Vishwakarma, Umesh Kashyap and Sk Subidh Ali | Adversarial Malware Detection |
| Author | Title |
|---|---|
| Navajit Singh Baban, Prithwish Basu Roy, Pauline John, Azhar Zam, Sukanta Bhattacharjee, Rafael Song, Ramesh Karri and Krishnendu Chakrabarty | Attacks and Countermeasures for Digital Microfluidic Biochips |
| Saltanat Firdous, Asutosh Brahma, Arjun Menon and Chester Rebeiro | CoPrIME: Complete Process Isolation using Memory Encryption |
| Samyuktha M, Pallavi Borkar and Chester Rebeiro | High Speed High Assurance implementations of Mutivariate Quadratic based Signatures |
| Rohith George Ninan and Kala S | FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels |
| Author | Title |
|---|---|
| David Johnston | Online Testing Entropy and Entropy Tests with a Two State Markov Model |
| Title |
|---|
| FlashFuzz: A Format-Aware Fuzzing Framework for COTS Devices |
| OMR : A comprehensive platform and suite of tools for malware research and analysis |
| Faults in Neural Network Models |