History
PST 2024, AustraliaPST 2023, Denmark
PST 2022, Canada
PST 2021, New Zealand
PST 2019, Canada
PST 2018, UK
PST 2017, Canada
PST 2016, New Zealand
PST 2015, Turkey
PST 2014, Canada
PST 2013, Catalonia
PST 2012, France
PST 2011, Canada
PST 2010, Canada
PST 2009, Canada
PST 2008, Canada
PST 2007, Canada
PST 2006, Canada
PST 2005, Canada
PST 2004, Canada
List of Accepted Papers
Accepted Regular Papers
# | Authors | Title |
---|---|---|
2 | Jukka Ruohonen, Krzysztof Sierszecki, Mubashrah Saddiqa | A Static Analysis of Popular C Packages in Linux |
7 | Maryam Tanha, Winston Zhao, Aaron Hunter, Ashkan Jangodaz | Using Counterfactuals for Explainable Android Malware Detection |
15 | Le Wang, Sonal Allana, Xiaowei Sun, Liang Xue, Xiaodong Lin, Rozita Dara, Pulei Xiong | A Model-Agnostic Framework for Privacy Risk Assessment of Machine Learning Models |
16 | Havva Alizadeh Noughabi, Fattane Zarrinkalam, Abbas Yazdinejad, Ali Dehghantanha | TrollSleuth: Behavioral and Linguistic Fingerprinting of State-Sponsored Trolls |
36 | Hanzheng Dai, Yuanliang Li, Jun Yan, Zhibo Zhang | RefPentester: A Knowledge-Informed Self-Reflective Penetration Testing Framework based on Large Language Models |
40 | Md Shopon, Marina Gavrilova | CONTEXT-AWARE LOCATION DE-IDENTIFICATION USING DENOISING DIFFUSION |
50 | Kittiphop Phalakarn, Ryuya Hayashi | CHOO-PIR: Hint-Based Private Information Retrieval with Commodity Servers |
57 | Islam Monir, Gabriel Ghinita | Per-Attribute Privacy in Large Language Models Using Matrix-Variate Gaussian Mechanism |
64 | Mahdi Abrishami, Kwasi Boakye-Boateng, Hossein Shokouhinejad, Emmanuel Dana Buedi, Kishore Sreedharan, Shabnam Saderi Oskouei | RF-RADS: A Robust Framework for Risk Assessment in Digital Substations |
74 | Md. Shamim Towhid, Shahrear Iqbal, Euclides Neto, Nashid Shahriar, Scott Buffett, Madeena Sultana, Adrian Taylor | Cyber Threat Mitigation with Knowledge-Infused Reinforcement Learning and LLM-Guided Policies |
76 | Huzaifa Patel, David Barrera, Anil Somayaji | Houdini: Benchmarking Container Security Confinement |
78 | Syed Tehjeebuzzaman, Mustafa Siam-Ur-Rafique, Ashikur Rahman, Abderrahmane Leshob, Raqeebir Rab | On Feature Selection for Botnet Detection using Adaptive Exploration in Binary Particle Swarm Optimization Algorithm |
80 | Pulei Xiong, Saeedeh Lohrasbi, Prini Kotian, Scott Buffett | G-STAR: A Threat Modeling Framework for General-Purpose AI Systems |
82 | Jimmy Dani, Kalyan Nakka, Nitesh Saxena | A Machine Learning-Based Framework for Assessing Cryptographic Indistinguishability of Lightweight Block Ciphers |
87 | Md Imanul Huq, Ahmed Tanvir Mahdad, Nitesh Saxena | Encryption Struggles Persist: When Tech-Savvy Students Face Challenges with PGP in Thunderbird |
88 | Victor Yisa, Rita Orji | From Birthday Cheers to Privacy Fears: Unraveling the Paradox of Social Media Celebrations in Nigeria |
93 | Chaitanya Dhananjay Jadhav, Chang Liu, Jun Zhao | Legal Retrieval Augmented Generation with Structured Retrieval and Iterative Refinement |
94 | Oluwole Adewusi, Wallace Msagusa, Jean Pierre Imanirumva, Okemawo Obadofin, Jema Ndibwile | Beyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa |
99 | Haoyun Zhu, Takuya Suzuki, Hayato Yamana | Private Function Evaluation using CKKS-based Homomorphic Encrypted LookUp Tables |
104 | Eric Brigham, Nicholas Hopper | No Safety in Numbers: Traffic Analysis of Sealed-Sender Groups in Signal |
107 | Man-Ying Chen, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi | TOM-Net: Few-Shot IoT Malware Classification via Open-Set Aware Transductive Meta-Learning |
109 | Ghazal Rahmanian, Pooria Madani | Evaluating Efficient Patch-Based Backdoor Attacks in Satellite Image Classification Systems |
111 | Muaan Ur Rehman, Hayretdin Bahsi, Rajesh Kalakoti | Exploring the Impact of Feature Selection on Non-Stationary Intrusion Detection Models in IoT Networks |
112 | Arshpreet Singh, Mohamad Sadegh Sangari, Atefeh Mashatan | Analysis of User-Generated Content to Unfold Privacy Concerns with CBDCs |
114 | Sidra Anwar, Jonathan Anderson | Empirical Evaluation and Reclassification of Cryptographic Algorithms for Energy-Efficient Secure Communication in Medical IoT Devices |
117 | Hugo Rocha De Alba, Esma Aïmeur, Mohamed Loutis, Khulud Alqahtani | DEDALUS & ICARUS: Image Privacy Classification Systems with Risk Oriented Explanations |
119 | Hiba Guerrouache, Menat Allah Fadoua Slama, Yacine Challal, Karima Benatchba | GPU-Optimized Piecewise Linear Activations for Efficient and Secure Neural Networks |
120 | Tia Pope, Ahmad Patooghy | Probing AlphaFold's Input Attack Surface via Red-Teaming |
124 | Nicholas Chivaran, Jianbing Ni | LAID: Lightweight AI-Generated Image Detection in Spatial and Spectral Domains |
125 | Israt Jui, Amirali Salehi-Abari, Julie Thorpe | Short Training Techniques to Enhance Usability of System-Assigned PINs |
129 | Vinh Quach, Ram Dantu, Sirisha Talapuru, Apurba Pokharel, Shakila Zaman | Stateless Decentralized Authentication Using Segmented ZKPs for Microservices Architectures |
130 | Aghoghomena Akasukpe, Tomi Adeyemi, Pooria Madani, Li Yang, Miguel Vargas Martin | A Per-Bag Suspicion-Based Bagging Strategy for Fighting Poisoning Attacks in Classification |
131 | Padmavathi Iyer | An Integer Programming Formulation for Access Control Optimization Problems |
132 | Mina Erfan, Paula Branco, Guy-Vincent Jourdan | Comparing Macro and Micro Approaches for Detecting Phishing Where It Spreads |
136 | Maraz Mia, Mir Mehedi Ahsan Pritom, Tariqul Islam, Shouhuai Xu | Characterizing Event-themed Malicious Web Campaigns: A Case Study on War-Themed Websites |
139 | Vinh Quach, Ram Dantu, Sirisha Talapuru, Indravadan Patel, Alexis Blackwell | Verify All: Establish Bidirectional and Provable Trustworthiness in Microservices Architecture |
145 | Thilina Pathirana, Ruxandra F. Olimid | Secret Sharing in 5G-MEC: Applicability for joint Security and Dependability |
149 | Ahmed Reda Aldysty, Nour Moustafa, Erandi Lakshika | TFVDFuzzer: Transformer-based Fuzzing Framework for Vulnerability Detection in Modbus Protocol |
151 | Atsuko Miyaji, Tomoshi Yagishita, Yuki Hyohdoh | Privacy-Preserving Image Learning Across Trust Boundaries |
153 | Pooja Pathare, Garima Bajwa | Enhancing Visual Speaker Authentication using Dynamic Lip Movement and Meta-Learning |
154 | Oluwasola Mary Adedayo | Database Systems Examination and Digital Forensics Tool: the Progress and Limitations |
156 | Hafijul Hoque Chowdhury, Riad Ahmed Anonto, Sourov Jajodia, Suryadipta Majumdar, Md. Shohrab Hossain | Identifying and Addressing User-level Security Concerns in Smart Homes Using “Smaller” LLMs |
Accepted Short Papers
# | Authors | Title |
---|---|---|
10 | Dakota Staples, Hung Cao, Saqib Hakak, Paul Cook | Multilingual Phishing Email Detection Using Lightweight Federated Learning |
24 | Sonal Allana, Rozita Dara | Privacy Preservation with Noise in Explainable AI |
37 | Arbaaz Dharmavaram, Farrukh Bin Rashid, Saqib Hakak | FactCellar: An Evidence-based Dataset for Automated Fact-Checking |
38 | Lily Dey, Md Shopon, Marina L Gavrilova | An Intelligent Framework for Deceptive Review Detection Using Advanced Trust Vector Modeling |
45 | Zhuliang Jia, Rongxing Lu, Mohammad Mamun, Suprio Ray | An Efficient and Privacy-Preserving AdaBoost Federated Learning Framework for AiP System |
46 | Suzana Moreno, Alessandro Aldini, Seigneur Jean-Marc, Paul-Antonie Bisgambiglia | Dynamic Decentralized Social Trust for Financial Inclusion with Regulatory Compliance |
48 | Muhammad Fakhrur Rozi, Tao Ban, Seiichi Ozawa, Hiroaki Inoue, Takeshi Takahashi, Sajjad Dadkhah | FragmentFool: Fragment-based Adversarial Perturbation for Graph Neural Network-based Vulnerability Detection |
53 | Matthew Comb, Andrew Martin | Toward a Lexicon for Privacy, Security, and Trust: Analysing Digital Identity in Media using NLP |
60 | Farhin Farhad Riya, Shahinul Hoque, Yingyuan Yang, Jinyuan Sun, Olivera Kotevska | Balancing Trade-offs: Adaptive Differential Privacy in Interpretable Machine Learning Models |
61 | Mahsa Tavasoli, Abdolhossein Sarrafzadeh, Ali Karimoddini, Milad Khaleghi, Tienake Phuapaiboon, Amauri Goines, Aiden Harris, Jason Griffith | Trust-Aware Federated Defense Against Data Poisoning in ML-Driven IDS For CAVs |
65 | Bing Hu, Yixin Li, Asma Bahamyirou, Helen Chen | SynQP: A Framework and Metrics for Evaluating the Quality and Privacy Risk of Synthetic Data |
68 | Brian Goncalves, Arash Mahari, Atefeh Mashatan, Reza Arani, Marthe Kassouf | Quantum Computing Threats to Management and Operational Safeguards of IEC 62351 |
71 | Eeshan Walia, Sohini Pillay, Christopher Yoeurng, Dongfeng Fang, Shengjie Xu | Temporal-Spatial Feature Modification Attacks Against Machine Learning-Based Network Intrusion Detection Systems |
75 | Chris Tchassem, Yendoubé Kombate, Pierre-Martin Tardif | Exploring Clustering Algorithms for Anomaly Detection in Electric Vehicle Charging Stations Infrastructure using OCPP |
79 | Divya Bansal, Sabrina Dhalla, Jaspal Kaur Saini | A Dynamic, Context-Aware Trust Model for Distributed Computing Environments |
86 | Mahdi Firoozjaei, Yaser Baseri, Qing Tan | DNS Profiler: Quantifying User Browsing Risk from DNS Traffic Patterns |
103 | Bara Nazzal, James Cordy, Manar Alalfi | A Modeling and Static Analysis Approach for the Verification of Privacy and Safety Properties in Kotlin Android Apps |
116 | David Mohren, Minh Tien Truong, Brett Kelly, Kenneth Kent | Comparing Client- & Server-Side AEAD Encryption in Software-Defined Storage Systems |
121 | Neda Moghadam, Christopher Neal, Sara Imene.Boucetta, Frederic Cuppens, Nora Boulahia-Cuppens | Semantic and Graph-Based Unsupervised Learning for Insider Threat Detection Using User Activity Sequences |
122 | Sk Mahtab Uddin, Saqib Hakak, Miguel Garzón | Detecting Ransomware Before It Bites: A Hybrid Model Approach for Early Ransomware Detection |
133 | Yunik Tamrakar, Ritwik Banerjee, Ethan Myers, Lorenzo De Carli, Indrakshi Ray | Harnessing Language Models to Analyze Android App Permission Fidelity |
140 | Brian Kim, Yang Cao, K. Suzanne Barber | A Longitudinal Look at GDPR Compliance |
144 | Renjith Eettickal Chacko, Garima Bajwa | Detecting Deepfakes using Temporal Consistency of Facial Expression Transitions |
148 | Asmita Biswas, Barsha Mitra, Iqbal Gondal, Qiang Fu | Securing Multi-Domain Systems: Intelligent ABAC Policy Learning for Cross-Domain Access Control |
155 | Adegboola David Adelabu, Yan Yan, Wenjing Zhang, Sampa Rauti, Ville Leppänen, Zuhaibuddin Bhutto, Wenjun Lin | Assessing Privacy Practices on Ontario Municipal Websites |
157 | Takwa Rhaimi, Hamed Aghayarzadeh, Rakesh Podder, Indrakshi Ray | Formal Specification and Verification of Protection in Transit (PIT) Protocol Using UPPAAL |
158 | Jason Simental, Elmaddin Azizli, Mahmoud Abdelgawad, Indrakshi Ray | Securing Android Inter-Process Communication (IPC) Using NGAC |
Important Dates
Paper Submission:April 30, 2025
Acceptance Notification:
June 1, 2025
Camera-Ready:
July 1, 2025
Author Registration:
July 1, 2025
Early-Bird Registration Ends:
August 1, 2025
Conference Date:
August 26-28, 2025