• Multi-source Anomaly Detection For Microservice Systems
    Ni Wang, Zhengxin Li, Jingchen Yang, Junfeng Zhao (Inner Mongolia University)
  • CCE: A Cloud-based SIEM Correlation Engine Built on Serverless Functions
    Adriano Serckumecka, Ibéria Medeiros, Alysson Bessani (FCUL-LASIGE)
  • Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time
    Xufeng Zhang, Baohan Huang (Beijing Institute of Technology); Sisi Duan (Tsinghua University); Haibin Zhang (Yangtze Delta Region Institute of Tsinghua University, Zhejiang)
  • Bias in Attachment Strategy Evaluations for the Lightning Network: Analysis and Revised Findings
    Asma Almosa, Leonardo Aniello, Boojoong Kang (University of Southampton)
  • Partition-Tolerant Distributed Cryptographic Key Management
    Mathias Björkqvist, Frank Bosman, Thomas Quillinan, Ruth Dommerholt-Scholten, Valeriu-Daniel Stanciu (Thales Netherlands)
  • EVA-S2PLoR: Decentralized Secure 2-party Logistic Regression with A Subtly Hadamard Product Protocol
    Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu (Beihang University)
  • Securing Consensus from Long-Range Attacks through Collaboration
    Junchao Chen (University of California, Davis); Suyash Gupta (University of Oregon); Alberto Sonnino (MystenLabs & University College London); Lefteris Kokoris-Kogias (MystenLabs); Mohammad Sadoghi (University of California, Davis)
  • WINK:A Semi-honest Secure Multi-party Computation Framework with Efficient Comparison Protocol
    Yuanqing feng, Tao Bai, Zhi Lu, Junjun Wu, Xueming Tang, Songfeng Lu (Huazhong University of Science and Technology)
  • CloudHeal: A Lightweight Online Learning Based Self-Healing Framework for Cloud-Native Systems
    JunQuan Yi, Zilong He, Wanqi Yang, Pengfei Chen (School of Computer Science and Engineering, Sun Yat-sen University)
  • Nip it in the Bud: Unsupervised KPI Incipient Fault Detection via Dynamic Latent Feature Ensembling
    Yanwen Wang, Wenda Tang, Jie Wu (China Telecom Cloud Computing Research Institute)
  • RCS: A High-Success-Rate and Privacy-Preserving Payment Channel Network Routing Protocol Wenjing Li, Chen Tian, Yuan Zhang, Sheng Zhong (State Key Laboratory for Novel Software Technology, Nanjing University)
  • B+AVL trees: towards data structures for robust and efficient blockchain state synchronization Michele Cattaneo, Eliã Batista, Fernando Pedone (Universita della Svizzera italiana (USI))
  • FedMI: Reliable and Privacy-Aware Vertical Federated Learning for Anomaly Detection in Distributed Edge Systems
    Yuzhe Zhang, Zirui Zhuang, Qi Qi, Haifeng Sun, Shaoxiong Zhu, Xiaoyuan Fu, Jingyu Wang (Beijing University of Posts and Telecommunications)
  • Backdoor Defense in Federated Learning via Multi-Perspective Resilient Aggregation
    Jiahao Wang, Hongyun Cai, Lijing Gao, Fengyu Li (School of Cyber Security and Computer, Hebei University)
  • Towards Stress Testing the Internet Inter-Domain Routing System `in Silico’ with Domino Elham Ehsani Moghadam (ETH Zurich); Fabian E. Bustamante (Northwestern University); Adrian Perrig (ETH Zurich); Walter Willinger (NIKSUN, Inc.)
  • Privacy-Preserving Blockchain-enabled Vertical Federated Learning with Data Auditing
    Benyu Li (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences); Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); He Wang (Institute of Information Engineering, Chinese Academy of Sciences)
  • ENSI: Efficient Non-Interactive Secure Inference for Large Language Models
    Zhiyu He, Maojing Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu (National University of Defense Technology)
  • Cheetah: Pipelined BFT Consensus Protocol with High Throughput and Low Latency
    Tianyang Li, Jin Wu, Jian Dong (Harbin Institute of Technology)
  • LEA: Label Enumeration Attack in Vertical Federated Learning
    Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu (National University of Defense Technology)
  • Efficient Fair Ordering Protocol with 2-hop Receiver Fairness
    Jingfan Yu, Sisi Duan, Zhixuan Fang (Tsinghua University)
  • Hard Shell, Reliable Core: Improving Resilience in Replicated Systems with Selective Hybridization
    Laura Lawniczak, Tobias Distler (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
  • RootScan: Unveiling Microservice Anomalies through Fine-Grained, Interpretable Root Cause Analysis
    Chaoyi li (The School of Information and Communication Engineering, Hainan University); Chunyang Ye, Hui Zhou (The School of Computer Science and Technology, Hainan University)
  • MVMonT: Securing Confidential Deployments with Attestable Multi-Variant Monitoring
    Kailun Qin, Dawu Gu (Shanghai Jiao Tong University)
  • Fusing Multimodal Binary Code Representations for Enhanced Similarity Detection
    Taiyan Wang, Ruipeng Wang, Yu Chen, Lu Yu, Zulie Pan, Min Zhang (National University of Defense Technology)
  • Game-Theoretic Optimization for Coalition-Based Intrusion Detection with Multi-Source Adaptive Dispatching
    Yingchun Yang, Zhongkai Ding (Nan Jing university of Science and Technology); Songjie Wei (Nanjing University Of Science And Technology)
  • zkMarket: Ensuring Fairness and Privacy in Decentralized Data Exchange
    Seongho Park (Hanyang University); Seungwoo Kim (Kookmin University); Semin Han, Kyeongtae Lee (Hanyang University); Jihye Kim (Kookmin University); Hyunok Oh (Hanyang University)
  • Performance Evaluation of Brokerless Messaging Libraries
    Lorenzo La Corte, Syed Aftab Rashid, Andrei-Marian Dan (Hitachi Energy Research)
  • Goose: Optimistic Search in the IPFS Network
    Rafael Sequeira, Pedro Camponês, Pedro Costa, João Leitão (Nova University Lisbon)
  • Unveiling Evolving Threats: A Data Analysis for Next-Generation Honeypot Development
    Ziyang Wang, Shichao Lv (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;); Haining Wang (Virginia Tech); Jianzhou You (Sangfor Technologies Inc.); Shuoyang Liu, Tianwei Yuan, Xiao Lu, Limin Sun (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
  • Diverse Database Replication Based on Snapshot Isolation – Performance Implications of Improved Dependability
    Vladimir Stankovic, Peter Popov (City St George’s, University of London)
  • SecretScout: Effective Hard-coded Secrets Detection in CI Configuration Files
    Chu Qiao (University of Delaware); Yacong Gu (Tsinghua University); Xiaofan Li, Xing Gao (University of Delaware)
  • On Designing High-Performance Distributed Shared Memory Systems with RDMA
    Amanda Baran, Roberto Palmieri (Lehigh University)
  • Robust Fingerprinting of Graphs with FinG
    Odysseas Drosis (EPFL); Jade Garcia Bourrée (Univ Rennes, Inria, CNRS, IRISA); Anne-Marie Kermarrec, Othmane Safsafi (EPFL); Erwan Le Merrer (Univ Rennes, Inria, CNRS, IRISA)
  • ASLM-Shard: Efficient Account Shuffling Based on Lightweight Migration in Sharded Blockchain
    Shaojie Liu, Huazhong Liu, Jihong Ding, Xiaoxue Yin (Hainan University); Yonggu Wang (Zhejiang University of Technology); Lixin Gan (Jiangxi Science and Technology Normal University)
  • Harmonia: Enhancing Liveness in Two-Phase HotStuff without Sacrificing Core Properties Tianyang Li, Jin Wu, Songyan Ji, Jian Dong (Harbin Institute of Technology)