Multi-source Anomaly Detection For Microservice Systems Ni Wang, Zhengxin Li, Jingchen Yang, Junfeng Zhao (Inner Mongolia University)
CCE: A Cloud-based SIEM Correlation Engine Built on Serverless Functions Adriano Serckumecka, Ibéria Medeiros, Alysson Bessani (FCUL-LASIGE)
Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time Xufeng Zhang, Baohan Huang (Beijing Institute of Technology); Sisi Duan (Tsinghua University); Haibin Zhang (Yangtze Delta Region Institute of Tsinghua University, Zhejiang)
Bias in Attachment Strategy Evaluations for the Lightning Network: Analysis and Revised Findings Asma Almosa, Leonardo Aniello, Boojoong Kang (University of Southampton)
Partition-Tolerant Distributed Cryptographic Key Management Mathias Björkqvist, Frank Bosman, Thomas Quillinan, Ruth Dommerholt-Scholten, Valeriu-Daniel Stanciu (Thales Netherlands)
Securing Consensus from Long-Range Attacks through Collaboration Junchao Chen (University of California, Davis); Suyash Gupta (University of Oregon); Alberto Sonnino (MystenLabs & University College London); Lefteris Kokoris-Kogias (MystenLabs); Mohammad Sadoghi (University of California, Davis)
WINK:A Semi-honest Secure Multi-party Computation Framework with Efficient Comparison Protocol Yuanqing feng, Tao Bai, Zhi Lu, Junjun Wu, Xueming Tang, Songfeng Lu (Huazhong University of Science and Technology)
CloudHeal: A Lightweight Online Learning Based Self-Healing Framework for Cloud-Native Systems JunQuan Yi, Zilong He, Wanqi Yang, Pengfei Chen (School of Computer Science and Engineering, Sun Yat-sen University)
Nip it in the Bud: Unsupervised KPI Incipient Fault Detection via Dynamic Latent Feature Ensembling Yanwen Wang, Wenda Tang, Jie Wu (China Telecom Cloud Computing Research Institute)
RCS: A High-Success-Rate and Privacy-Preserving Payment Channel Network Routing Protocol Wenjing Li, Chen Tian, Yuan Zhang, Sheng Zhong (State Key Laboratory for Novel Software Technology, Nanjing University)
B+AVL trees: towards data structures for robust and efficient blockchain state synchronization Michele Cattaneo, Eliã Batista, Fernando Pedone (Universita della Svizzera italiana (USI))
FedMI: Reliable and Privacy-Aware Vertical Federated Learning for Anomaly Detection in Distributed Edge Systems Yuzhe Zhang, Zirui Zhuang, Qi Qi, Haifeng Sun, Shaoxiong Zhu, Xiaoyuan Fu, Jingyu Wang (Beijing University of Posts and Telecommunications)
Backdoor Defense in Federated Learning via Multi-Perspective Resilient Aggregation Jiahao Wang, Hongyun Cai, Lijing Gao, Fengyu Li (School of Cyber Security and Computer, Hebei University)
Towards Stress Testing the Internet Inter-Domain Routing System `in Silico’ with Domino Elham Ehsani Moghadam (ETH Zurich); Fabian E. Bustamante (Northwestern University); Adrian Perrig (ETH Zurich); Walter Willinger (NIKSUN, Inc.)
Privacy-Preserving Blockchain-enabled Vertical Federated Learning with Data Auditing Benyu Li (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences); Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); He Wang (Institute of Information Engineering, Chinese Academy of Sciences)
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models Zhiyu He, Maojing Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu (National University of Defense Technology)
Cheetah: Pipelined BFT Consensus Protocol with High Throughput and Low Latency Tianyang Li, Jin Wu, Jian Dong (Harbin Institute of Technology)
LEA: Label Enumeration Attack in Vertical Federated Learning Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu (National University of Defense Technology)
Efficient Fair Ordering Protocol with 2-hop Receiver Fairness Jingfan Yu, Sisi Duan, Zhixuan Fang (Tsinghua University)
Hard Shell, Reliable Core: Improving Resilience in Replicated Systems with Selective Hybridization Laura Lawniczak, Tobias Distler (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))
RootScan: Unveiling Microservice Anomalies through Fine-Grained, Interpretable Root CauseAnalysis Chaoyi li (The School of Information and Communication Engineering, Hainan University); Chunyang Ye, Hui Zhou (The School of Computer Science and Technology, Hainan University)
Fusing Multimodal Binary Code Representations for Enhanced Similarity Detection Taiyan Wang, Ruipeng Wang, Yu Chen, Lu Yu, Zulie Pan, Min Zhang (National University of Defense Technology)
Game-Theoretic Optimization for Coalition-Based Intrusion Detection with Multi-Source AdaptiveDispatching Yingchun Yang, Zhongkai Ding (Nan Jing university of Science and Technology); Songjie Wei (Nanjing University Of Science And Technology)
zkMarket: Ensuring Fairness and Privacy in Decentralized Data Exchange Seongho Park (Hanyang University); Seungwoo Kim (Kookmin University); Semin Han, Kyeongtae Lee (Hanyang University); Jihye Kim (Kookmin University); Hyunok Oh (Hanyang University)
Performance Evaluation of Brokerless Messaging Libraries Lorenzo La Corte, Syed Aftab Rashid, Andrei-Marian Dan (Hitachi Energy Research)
Goose: Optimistic Search in the IPFS Network Rafael Sequeira, Pedro Camponês, Pedro Costa, João Leitão (Nova University Lisbon)
Unveiling Evolving Threats: A Data Analysis for Next-Generation Honeypot Development Ziyang Wang, Shichao Lv (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China;); Haining Wang (Virginia Tech); Jianzhou You (Sangfor Technologies Inc.); Shuoyang Liu, Tianwei Yuan, Xiao Lu, Limin Sun (Institute of Information Engineering, CAS, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)
Diverse Database Replication Based on Snapshot Isolation – Performance Implications of Improved Dependability Vladimir Stankovic, Peter Popov (City St George’s, University of London)
SecretScout: Effective Hard-coded Secrets Detection in CI Configuration Files Chu Qiao (University of Delaware); Yacong Gu (Tsinghua University); Xiaofan Li, Xing Gao (University of Delaware)
On Designing High-Performance Distributed Shared Memory Systems with RDMA Amanda Baran, Roberto Palmieri (Lehigh University)
Robust Fingerprinting of Graphs with FinG Odysseas Drosis (EPFL); Jade Garcia Bourrée (Univ Rennes, Inria, CNRS, IRISA); Anne-Marie Kermarrec, Othmane Safsafi (EPFL); Erwan Le Merrer (Univ Rennes, Inria, CNRS, IRISA)
ASLM-Shard: Efficient Account Shuffling Based on Lightweight Migration in Sharded Blockchain Shaojie Liu, Huazhong Liu, Jihong Ding, Xiaoxue Yin (Hainan University); Yonggu Wang (Zhejiang University of Technology); Lixin Gan (Jiangxi Science and Technology Normal University)
Harmonia: Enhancing Liveness in Two-Phase HotStuff without Sacrificing Core Properties Tianyang Li, Jin Wu, Songyan Ji, Jian Dong (Harbin Institute of Technology)