Regular Papers

Title Authors
A Decentralized Mnemonic Backup System Thierry Sans, David Ziming Liu and Kevin Oh
A New Class of Trapdoor Verifiable Delay Functions Ahmed M. Zawia and M. Anwar Hasan
A Privacy-aware Reconfigurable Secure-Software Updating Framework for IoT Devices Prosanta Gope
A Survey on Identity-based Blind Signature Mirko Koscina, Pascal Lafourcade, Gael Marcadet, Charles Olivier-Anclin and Léo Robert
A Taxonomy and Gap-analysis in Digital Privacy Education Sumit Paul and David Knox
Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks Daniel Fraunholz, Dominik Brunke, Lorenz Dumanski and Hartmut Koenig
CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter Muhammad Mohzary, Khalid Almalki, Baek-Young Choi and Sejun Song
Data-driven Evaluation of Intrusion Detectors : a Methodological Framework Solayman Ayoubi, Gregory Blanc, Houda Jmila, Sébastien Tixeuil and Thomas Silverston
Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts Sahar Salimpour, Farhad Kerama, Jorge Pe ̃na Queralta and Tomi Westerlund
Defense Models for Data Recovery in Industrial Control Systems Alvi Jawad and Jason Jaskolka
Differentially Private Friends Recommendation Kamalkumar Macwan, Abdessamad Imine, Michael Rusinowitch
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES Martin Brisfors, Michail Moraitis and Elena Dubrova
Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts Puneet Gill, Indrani Ray, Alireza Lotfi Takami and Mahesh Tripunitara
If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes Anthony Tam, Furkan Alaca and David Barrera
Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms Olivier de Casanove and Florence Sedes
Money Transfer on Transaction Signature-based Ledger Momoko Shiraishi and Hitoshi Aida
Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier and David Pointcheval
Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher Amirhossein Ebrahimi Moghaddam, Francesco Regazzoni and Paolo Palmieri
Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords Konrad-Felix Krentz and Thiemo Voigt
SCADA Radio Blackbox Reverse Engineering Jean-Benoit Larouche, Sébastien Roy, Marc Frappier, Pierre-Martin Tardif and Frédéric Mailhot
Security Analysis of Improved EDHOC Protocol Baptiste Cottier and David Pointcheval
Toward Secure Homomorphic Evaluation of Block-Cipher-Based Hash Functions Adda Akram Bendoukha, Oana Stan, Renaud Sirdey, Quero Nicolas and Luciano Freitas
Towards a Maturity Model for Crypto-Agility Assessment Julian Hohm, Andreas Heinemann and Alexander Wiesmaier
Towards Characterizing IoT Software Update Practices Conner Bradley and David Barrera
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic Omar Tahmi, Chamseddine Talhi and Yacine Challal
Underwater Confidential Communications in JANUS Yannick Beaupré, Michel Barbeau and Stéphane Blouin
Where is The Python Interpreter? Guillaume Bonfante and Anuyan Ithayakumar (University of Lorraine)

Short Papers

Title Authors
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection Pavlo Burda, Luca Allodi and Nicola Zannone
Deep-Learning-Based Vulnerability Detection in Binary Executables Andreas Schaad and Dominik Binder
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal and Atiya Hai


IRT SystemX