| "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | "I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | "These results must be false": A usability evaluation of constant-time analysis tools |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | A Flushing Attack on the DNS Cache |   |   |   | 📦 Artifacts: 1, 
            
                2
 📄 Appendix
 
 | 
  
    
      | A Formal Analysis of SCTP: Attack Synthesis and Patch Verification |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Adversarial Illusions in Multi-Modal Embeddings |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation |   |   |  | 📦 Artifacts: 1, 
            
                2
 📄 Appendix
 
 | 
  
    
      | Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Argus: All your (PHP) Injection-sinks are belong to us. |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Automated Large-Scale Analysis of Cookie Notice Compliance |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | BUDAlloc: Defeating Use-After-Free Bugs by Decoupling Virtual Address Management from Kernel |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | BeeBox: Hardening BPF against Transient Execution Attacks |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Bending microarchitectural weird machines towards practicality |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | CAMP: Compiler and Allocator-based Heap Memory Protection |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | CO3: Concolic Co-execution for Firmware |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | CacheWarp: Software-based Fault Injection using Selective State Reset |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Cascade: CPU Fuzzing via Intricate Program Generation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning 🏆 Distinguished Artifact Award
 
 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Closed-Form Bounds for DP-SGD against Record-level Inference |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Diffie-Hellman Picture Show: Key Exchange Stories from Commercial VoWiFi Deployments |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | EL3XIR: Fuzzing COTS Secure Monitors |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Endokernel: A Thread Safe Monitor for Lightweight Subprocess Isolation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Enhancing Network Attack Detection with Distributed and In-Network Data Collection System |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | False Claims against Model Ownership Resolution |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Formal Security Analysis of Widevine through the W3C EME Standard |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | GlobalConfusion: TrustZone Trusted Application 0-Days by Design |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Holding Secrets Accountable: Auditing Privacy-Preserving Machine Learning |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | How does Endpoint Detection use the MITRE ATT&CK Framework? |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Inference of Error Specifications and Bug Detection Using Structural Similarities |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Invisibility Cloak: Proactive Defense Against Visual Game Cheating |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Logic Gone Astray: A Security Analysis Framework for the Control Plane Protocols of 5G Basebands |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | MOAT: Towards Safe BPF Kernel Extension |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | MUSES: Efficient Multi-User Searchable Encrypted Database |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Malla: Demystifying Real-world Large Language Model Integrated Malicious Services |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Max Attestation Matters: Making Honest Parties Lose Their Incentives in Ethereum PoS |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | MetaSafe: Compiling for Protecting Smart Pointer Metadata to Ensure Safe Rust Integrity |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Near-Optimal Constrained Padding for Object Retrievals with Dependencies |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | NetShaper: A Differentially Private Network Side-Channel Mitigation System |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS) |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PIXELMOD: Improving Soft Moderation of Visual Misleading Information on Twitter |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PURE: Payments with UWB RElay-protection |   |   |  | 📦 Artifacts: 1, 
            
                2, 
            
                3
 📄 Appendix
 
 | 
  
    
      | PURL: Safe and Effective Sanitization of Link Decoration |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Pandawan: Quantifying Progress in Linux-based Firmware Rehosting |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing 🏆 Distinguished Artifact Award
 
 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Practical Data-Only Attack Generation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | PrivImage: Differentially Private Synthetic Image Generation using Diffusion Models with Semantic-Aware Pretraining |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Query Recovery from Easy to Hard: Jigsaw Attack against SSE |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SIMurai: Slicing Through the Complexity of SIM Card Security Research |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SPF Beyond the Standard: Management and Operational Challenges in Practice and Practical Recommendations |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SSRF vs. Developers: A Study of SSRF-Defenses in PHP Applications |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching 🏆 Distinguished Artifact Award
 
 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SeaK: Rethinking the Design of a Secure Allocator for OS Kernel |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Secure Account Recovery for a Privacy-Preserving Web Service |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SoK: Security of Programmable Logic Controllers |   |  |  | 📦 Artifacts: 1, 
            
                2
 📄 Appendix
 
 | 
  
    
      | SoK: State of the Krawlers - Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Current Deepfake Media Datasets |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Spider-Scents: Grey-box Database-aware Web Scanning for Stored XSS |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | SpotProxy: Rediscovering the Cloud for Censorship Circumvention |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Stateful Least Privilege Authorization for the Cloud |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation 🏆 Distinguished Artifact Award
 
 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Toward Unbiased Multiple-Target Fuzzing with Path Diversity |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Towards Privacy-Preserving Social-Media SDKs on Android |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Towards an Effective Method of ReDoS Detection for Non-backtracking Engines |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Trust Me If You Can - How Usable Is Trusted Types In Practice? |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Unveiling IoT Security in Reality: A Firmware-Centric Journey |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Web Platform Threats: Automated Detection of Web Security Issues With WPT |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | What Was Your Prompt? A Remote Keylogging Attack on AI Assistants |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | When Threads Meet Interrupts: Effective Static Detection of Interrupt-Based Deadlocks in Linux |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality |   |  |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | YPIR: High-Throughput Single-Server PIR with Silent Preprocessing |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks 🏆 Distinguished Artifact Award
 
 |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities |   |   |  | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge |   |   |   | 📦 Artifact 📄 Appendix
 
 | 
  
    
      | d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases |   |   |   | 📦 Artifact 📄 Appendix
 
 |