22nd Annual International Conference on Privacy, Security, and Trust (PST2025)
Technically Co-sponsored by IEEE Computer Society
26-28 August 2025 - Fredericton, Canada (Hybrid)


List of Accepted Papers

Accepted Regular Papers

# Authors Title
2Jukka Ruohonen, Krzysztof Sierszecki, Mubashrah SaddiqaA Static Analysis of Popular C Packages in Linux
7Maryam Tanha, Winston Zhao, Aaron Hunter, Ashkan JangodazUsing Counterfactuals for Explainable Android Malware Detection
15Le Wang, Sonal Allana, Xiaowei Sun, Liang Xue, Xiaodong Lin, Rozita Dara, Pulei XiongA Model-Agnostic Framework for Privacy Risk Assessment of Machine Learning Models
16Havva Alizadeh Noughabi, Fattane Zarrinkalam, Abbas Yazdinejad, Ali DehghantanhaTrollSleuth: Behavioral and Linguistic Fingerprinting of State-Sponsored Trolls
36Hanzheng Dai, Yuanliang Li, Jun Yan, Zhibo ZhangRefPentester: A Knowledge-Informed Self-Reflective Penetration Testing Framework based on Large Language Models
40Md Shopon, Marina GavrilovaCONTEXT-AWARE LOCATION DE-IDENTIFICATION USING DENOISING DIFFUSION
50Kittiphop Phalakarn, Ryuya HayashiCHOO-PIR: Hint-Based Private Information Retrieval with Commodity Servers
57Islam Monir, Gabriel GhinitaPer-Attribute Privacy in Large Language Models Using Matrix-Variate Gaussian Mechanism
64Mahdi Abrishami, Kwasi Boakye-Boateng, Hossein Shokouhinejad, Emmanuel Dana Buedi, Kishore Sreedharan, Shabnam Saderi OskoueiRF-RADS: A Robust Framework for Risk Assessment in Digital Substations
74Md. Shamim Towhid, Shahrear Iqbal, Euclides Neto, Nashid Shahriar, Scott Buffett, Madeena Sultana, Adrian TaylorCyber Threat Mitigation with Knowledge-Infused Reinforcement Learning and LLM-Guided Policies
76Huzaifa Patel, David Barrera, Anil SomayajiHoudini: Benchmarking Container Security Confinement
78Syed Tehjeebuzzaman, Mustafa Siam-Ur-Rafique, Ashikur Rahman, Abderrahmane Leshob, Raqeebir RabOn Feature Selection for Botnet Detection using Adaptive Exploration in Binary Particle Swarm Optimization Algorithm
80Pulei Xiong, Saeedeh Lohrasbi, Prini Kotian, Scott BuffettG-STAR: A Threat Modeling Framework for General-Purpose AI Systems
82Jimmy Dani, Kalyan Nakka, Nitesh SaxenaA Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers
87Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh SaxenaEncryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird
88Victor Yisa, Rita OrjiFrom Birthday Cheers to Privacy Fears: Unraveling the Paradox of Social Media Celebrations in Nigeria
93Chaitanya Dhananjay Jadhav, Chang Liu, Jun ZhaoLegal Retrieval Augmented Generation with Structured Retrieval and Iterative Refinement
94Oluwole Adewusi, Wallace Msagusa, Jean Pierre Imanirumva, Okemawo Obadofin, Jema NdibwileBeyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa
99Haoyun Zhu, Takuya Suzuki, Hayato YamanaPrivate Function Evaluation using CKKS-based Homomorphic Encrypted LookUp Tables
104Eric Brigham, Nicholas HopperNo Safety in Numbers: Traffic Analysis of Sealed-Sender Groups in Signal
107Man-Ying Chen, Tao Ban, Shin-Ming Cheng, Takeshi TakahashiTOM-Net: Few-Shot IoT Malware Classification via Open-Set Aware Transductive Meta-Learning
109Ghazal Rahmanian, Pooria MadaniEvaluating Efficient Patch-Based Backdoor Attacks in Satellite Image Classification Systems
111Muaan Ur Rehman, Hayretdin Bahsi, Rajesh KalakotiExploring the Impact of Feature Selection on Non-Stationary Intrusion Detection Models in IoT Networks
112Arshpreet Singh, Mohamad Sadegh Sangari, Atefeh MashatanAnalysis of User-Generated Content to Unfold Privacy Concerns with CBDCs
114Sidra Anwar, Jonathan AndersonEmpirical Evaluation and Reclassification of Cryptographic Algorithms for Energy-Efficient Secure Communication in Medical IoT Devices
117Hugo Rocha De Alba, Esma Aïmeur, Mohamed Loutis, Khulud AlqahtaniDEDALUS & ICARUS: Image Privacy Classification Systems with Risk Oriented Explanations
119Hiba Guerrouache, Menat Allah Fadoua Slama, Yacine Challal, Karima BenatchbaGPU-Optimized Piecewise Linear Activations for Efficient and Secure Neural Networks
120Tia Pope, Ahmad PatooghyProbing AlphaFold's Input Attack Surface via Red-Teaming
124Nicholas Chivaran, Jianbing NiLAID: Lightweight AI-Generated Image Detection in Spatial and Spectral Domains
125Israt Jui, Amirali Salehi-Abari, Julie ThorpeShort Training Techniques to Enhance Usability of System-Assigned PINs
129Vinh Quach, Ram Dantu, Sirisha Talapuru, Apurba Pokharel, Shakila ZamanStateless Decentralized Authentication Using Segmented ZKPs for Microservices Architectures
130Aghoghomena Akasukpe, Tomi Adeyemi, Pooria Madani, Li Yang, Miguel Vargas MartinA Per-Bag Suspicion-Based Bagging Strategy for Fighting Poisoning Attacks in Classification
131Padmavathi IyerAn Integer Programming Formulation for Access Control Optimization Problems
132Mina Erfan, Paula Branco, Guy-Vincent JourdanComparing Macro and Micro Approaches for Detecting Phishing Where It Spreads
136Maraz Mia, Mir Mehedi Ahsan Pritom, Tariqul Islam, Shouhuai XuCharacterizing Event-themed Malicious Web Campaigns: A Case Study on War-Themed Websites
139Vinh Quach, Ram Dantu, Sirisha Talapuru, Indravadan Patel, Alexis BlackwellVerify All: Establish Bidirectional and Provable Trustworthiness in Microservices Architecture
145Thilina Pathirana, Ruxandra F. OlimidSecret Sharing in 5G-MEC: Applicability for joint Security and Dependability
149Ahmed Reda Aldysty, Nour Moustafa, Erandi LakshikaTFVDFuzzer: Transformer-based Fuzzing Framework for Vulnerability Detection in Modbus Protocol
151Atsuko Miyaji, Tomoshi Yagishita, Yuki HyohdohPrivacy-Preserving Image Learning Across Trust Boundaries
153Pooja Pathare, Garima BajwaEnhancing Visual Speaker Authentication using Dynamic Lip Movement and Meta-Learning
154Oluwasola Mary AdedayoDatabase Systems Examination and Digital Forensics Tool: the Progress and Limitations
156Hafijul Hoque Chowdhury, Riad Ahmed Anonto, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab HossainIdentifying and Addressing User-level Security Concerns in Smart Homes Using “Smaller” LLMs

Accepted Short Papers

# Authors Title
10Dakota Staples, Hung Cao, Saqib Hakak, Paul CookMultilingual Phishing Email Detection Using Lightweight Federated Learning
24Sonal Allana, Rozita DaraPrivacy Preservation with Noise in Explainable AI
37Arbaaz Dharmavaram, Farrukh Bin Rashid, Saqib HakakFactCellar: An Evidence-based Dataset for Automated Fact-Checking
38Lily Dey, Md Shopon, Marina L GavrilovaAn Intelligent Framework for Deceptive Review Detection Using Advanced Trust Vector Modeling
45Zhuliang Jia, Rongxing Lu, Mohammad Mamun, Suprio RayAn Efficient and Privacy-Preserving AdaBoost Federated Learning Framework for AiP System
46Suzana Moreno, Alessandro Aldini, Seigneur Jean-Marc, Paul-Antonie BisgambigliaDynamic Decentralized Social Trust for Financial Inclusion with Regulatory Compliance
48Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Hiroaki Inoue, Takeshi Takahashi, Sajjad DadkhahFragmentFool: Fragment-based Adversarial Perturbation for Graph Neural Network-based Vulnerability Detection
53Matthew Comb, Andrew MartinToward a Lexicon for Privacy, Security, and Trust: Analysing Digital Identity in Media using NLP
60Farhin Farhad Riya, Shahinul Hoque, Yingyuan Yang, Jinyuan Sun, Olivera KotevskaBalancing Trade-offs: Adaptive Differential Privacy in Interpretable Machine Learning Models
61Mahsa Tavasoli, Abdolhossein Sarrafzadeh, Ali Karimoddini, Milad Khaleghi, Tienake Phuapaiboon, Amauri Goines, Aiden Harris, Jason GriffithTrust-Aware Federated Defense Against Data Poisoning in ML-Driven IDS For CAVs
65Bing Hu, Yixin Li, Asma Bahamyirou, Helen ChenSynQP: A Framework and Metrics for Evaluating the Quality and Privacy Risk of Synthetic Data
68Brian Goncalves, Arash Mahari, Atefeh Mashatan, Reza Arani, Marthe KassoufQuantum Computing Threats to Management and Operational Safeguards of IEC 62351
71Eeshan Walia, Sohini Pillay, Christopher Yoeurng, Dongfeng Fang, Shengjie XuTemporal-Spatial Feature Modification Attacks Against Machine Learning-Based Network Intrusion Detection Systems
75Chris Tchassem, Yendoubé Kombate, Pierre-Martin TardifExploring Clustering Algorithms for Anomaly Detection in Electric Vehicle Charging Stations Infrastructure using OCPP
79Divya Bansal, Sabrina Dhalla, Jaspal Kaur SainiA Dynamic, Context-Aware Trust Model for Distributed Computing Environments
86Mahdi Firoozjaei, Yaser Baseri, Qing TanDNS Profiler: Quantifying User Browsing Risk from DNS Traffic Patterns
103Bara Nazzal, James Cordy, Manar AlalfiA Modeling and Static Analysis Approach for the Verification of Privacy and Safety Properties in Kotlin Android Apps
116David Mohren, Minh Tien Truong, Brett Kelly, Kenneth KentComparing Client- & Server-Side AEAD Encryption in Software-Defined Storage Systems
121Neda Moghadam, Christopher Neal, Sara Imene.Boucetta, Frederic Cuppens, Nora Boulahia-CuppensSemantic and Graph-Based Unsupervised Learning for Insider Threat Detection Using User Activity Sequences
122Sk Mahtab Uddin, Saqib Hakak, Miguel GarzónDetecting Ransomware Before It Bites: A Hybrid Model Approach for Early Ransomware Detection
133Yunik Tamrakar, Ritwik Banerjee, Ethan Myers, Lorenzo De Carli, Indrakshi RayHarnessing Language Models to Analyze Android App Permission Fidelity
140Brian Kim, Yang Cao, K. Suzanne BarberA Longitudinal Look at GDPR Compliance
144Renjith Eettickal Chacko, Garima BajwaDetecting Deepfakes using Temporal Consistency of Facial Expression Transitions
148Asmita Biswas, Barsha Mitra, Iqbal Gondal, Qiang FuSecuring Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control
155Adegboola David Adelabu, Yan Yan, Wenjing Zhang, Sampa Rauti, Ville Leppänen, Zuhaibuddin Bhutto, Wenjun LinAssessing Privacy Practices on Ontario Municipal Websites
157Takwa Rhaimi, Hamed Aghayarzadeh, Rakesh Podder, Indrakshi RayFormal Specification and Verification of Protection in Transit (PIT) Protocol Using UPPAAL
158Jason Simental, Elmaddin Azizli, Mahmoud Abdelgawad, Indrakshi RaySecuring Android Inter-Process Communication (IPC) Using NGAC

Important Dates

Paper Submission:
April 4, 2025
April 30, 2025

Acceptance Notification:
June 1, 2025

Camera-Ready:
July 1, 2025
Author Registration:
July 1, 2025
Early-Bird Registration Ends:
August 1, 2025
Conference Date:
August 26-28, 2025