Accepted as regular papers

1. QUOKKA: Faster Secure Neural Network Inference with Early-Exit Technology, by Daphnee Chabal, Dolly Sapra, Cees de Laat and Zoltan Mann.

2. Watch Out for the Lifespan: Evaluating Backdoor Attacks Against Federated Model Adaptation, by Bastien Vuillod, Pierre-Alain Moellic and Jean-Max Dutertre.

3. Eliciting metrics and evaluating cyber resilience of a capability in the context of a multilayer enterprise architecture, by Francis Wanko Naa, Nora Boulahia-Cuppens and Frederic Cuppens.

4. Vexed by VEX Tools: Consistency Evaluation of Container Vulnerability Scanners, by Yekatierina Churakova, Mathias Ekstedt and Larissa Schmid.

5. ForensicChain: Blockchain-based Secure Digital Forensic Investigations, by Petr Dzurenda, Minh Tran, Mubashar Iqbal, Sara Ricci, Vaclav Stupka, Raimundas Matulevicius and Lukas Malina.

6. Socio-Technical Friction: An Emergent Grounded Theory of DevSecOps Challenges, by Francesco Ferazza and Konstantinos Mersinas.

7. Scalable privacy-preserving database queries with FHE and PEKS, by Nicolas Quero, Renaud Sirdey, Aymen Boudguiga, David Pointcheval, Quentin Sinh and Nadir Karam.

8. Real-Time Insider Threat Hunting Based on Dynamic Risk Indicators, by N'Famoussa Kounon Nanamou, Neda Baghalizadeh-Moghadam, Kéren A Saint-Hilaire, Thibault Leblanc, Nora Cuppens, Frédéric Cuppens and Anis Bkakria.

9. WildCode: An Empirical Analysis of Code Generated by ChatGPT, by Kobra Khanmohammadi, Pooria Roy, Raphael Khoury, Abdelwahab Hamou-Lhadj and Wilfried Patrick Konan.

10. Towards a formal verification of the Bao Hypervisor, by Alberto Tacchella, Jurij Mihelič, David Cerdeira, José Martins, Sandro Pinto, Bruno Crispo and Marco Roveri.

11. VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning, by Muhammed Tahir Akdeniz, Zeynep Yesilkaya, Ibrahim Enes Kose, Ismail Ulas Unal and Sevil Sen.

12. Deep Learning-Driven Energy Auditing for Smart Grid Cyberattack Detection, by Alexandre Dohin, Karim Zkik, Omar Mawloud and Abdellah Akilal.

13. Towards adoption of private distributed ledgers for capital markets, by Yeoh Wei Zhu, Shaltiel Eloul, Yash Satsangi, Imran Bashir and Sudhir Upadhyay.

14. Finding Software Supply Chain Attack Paths with Logical Attack Graphs, by Luis Soeiro, Thomas Robert and Stefano Zacchiroli.

15. Towards Automated Botnet Threat Intelligence with Knowledge-Guided Large Language Models, by Bassirou Badiane, Valerie Viet Triem Tong and Yufei Han.

16. A Fairness-Aware Strategy for B5G Physical-layer Security Leveraging Reconfigurable Intelligent Surfaces, by Alex Pierron, Michel Barbeau, Luca De Cicco, Jose Manuel Rubio Hernan and Joaquin Garcia-Alfaro.

17. Binary and Multiclass Cyberattack Classification on GeNIS Dataset, by Miguel Silva, Daniela Pinto, João Vitorino, Eva Maia, Isabel Praça, Ivone Amorim and Maria Viamonte.

18. Optimizing Resilience in IT Architectures: A Multi-Objective Ontology-Based Approach,  by Babacar Mbaye and Mohamed Mejri.

19. APADV – Anonymous Proactive Distance Vector Routing in Connectivity-Restricted Environments, by Lucas Schrass, Yu Shen and Stefanie Roos.

20. Secure-by-Design Architectures for Cooperative Intelligent Transport Systems: A Standards-Aligned Approach, by Tanja Pavleska, Giovanni Paolo Sellitto, Helder Aranha and Massimiliano Masi.

21. Sender-Efficient Identity-Based Encryption with Reduced Server Trust in the Key Curator Model, by Yuan Liang, Giovanni Di Crescenzo and Haining Wang.

22. A secure lightweight system based on device-to-device communication for objects sharing in local communities, by Andrea Fulgence Ndreveloarisoa, Frédéric Guidec and Mawloud Omar.

23. Counterfeit Coin Problem Can Be Extended to Secure Multiparty Computation, by Shohei Kaneko, Yang Li, Kazuo Sakiyama and Daiki Miyahara.

24. A Grammar-Driven Approach to Model and Detect APT Attack Sequences, by Antoine Rebstock, Yann Busnel and Romaric Ludinard.

25. An Improved Paillier-Based Reversible Watermarking Scheme for 3D Models with Reduced Complexity, by Pierre Mahieux, Mouhamadou Bamba Sakho, Gouenou Coatrieux and Reda Bellafqira.

26. Revisiting Network Traffic Analysis: Compatible network flows for ML models, by João Vitorino, Daniela Pinto, Eva Maia, Ivone Amorim and Isabel Praça.

27. Interdependent Privacy in Smart Homes: Hunting for Bystanders in Privacy Policies, by Shuaishuai Liu, Gergely Acs and Gergely Biczók.

28. Automatic Attack Script Generation: a MDA Approach, by Quentin Goux and Nadira Lammari.

29. From provable models to provable implementations: translating Alice & Bob security protocols to F*, by Rémi Garcia, Paolo Modesti and Leo Freitas.

30. Predicting IoT Security Vulnerabilities from Device Specifications, by Arslane Fawzi Halilou and Natalia Stakhanova.

31. Systematic Security Context Weighting for Trust Algorithms via AI/ML Model Performance Analysis, by Seán Óg Murphy, Utz Roedig and Cormac Sreenan.

32. Towards A Pragmatic Selection Of Self-Sovereign Identity Security Measures: Exploiting Mitre Att&ck Graph And Multi-criteria Optimization, by Pierre Saha Fobougong, Mohamed Mejri and Kamel Adi.

33. Mining Reliable ABAC Policies: A Specificity and Confidence-Aware Extension of Rhapsody, by Ludjina Benoit, Rim Ben Salem, Nora Boulahia-Cuppens and Frédéric Cuppens.

34. Consumer Zero Trust: Towards a Principled Adaptation of Zero Trust for Consumer Networks, by Matthew Bush, Dave McKay and Atefeh Mashatan.

35. Causal Graph Modeling of Network Traffic for Early Cyberattack Prediction, by Hocine Attoumi, Etienne Gael Tajeuna and Mohand Said Allili.

36. Privacy-Preserving Federated Learning for IoT Intrusion Detection in 6G Networks, by Jan Ariel Ocampo, Lejla Islami and Mina Alishahi.

37. StrawHat: Private Non-Interactive Gradient Boosting Decision Tree Evaluation Based on Homomorphic Encryption, by El Hadji Mamadou Dia, Walid Arabi, Anis Bkakria and Reda Yaich.

38. Practical Evaluation of the Crypto-Agility Maturity Model, by Leonie Wolf, Samson Umezulike, Gurur Öndarö, Sebastian Schinzel and Fabian Ising.

Accepted as short papers

1. Energy Consumption of TLS, Searchable Encryption and Fully Homomorphic Encryption, by Marc Damie, Mihai Pop and Merijn Posthuma.

2. Verifiability of Unlearning Schemes Through Local Explanation, by Saba Kasrelou, Samuel Pierre and Ranwa Al-Mallah.

3. COBRA-Z: Collaborative Blockchain Risk Assessment for Zero Trust Architecture, by Barbara Carminati, Elena Ferrari, Christian Rondanini, Azhar Muhammad Shahid and Luca Clementi.

4. Scaling Blockchains with zk-Rollups: State of the Art and Implementation, by Remi Barbier, Francoise Sailhan, Alexandre Reiffers-Masson and Loic Machado.

5. An Embarrassingly Parallel Cryptanalysis of EC(H)MQV, by Augustin P. Sarr.

6. Anomaly-Aware Aggregation for Robust Peer-to-Peer Machine Learning, by Myria Bouhaddi, Feriel Sadoun and Kamel Adi.

7. Defending Model Inversion Attack Using an Improved Filter-Based Approach, by Ananta Raha, Junaeid Ahmed, Md Shohrab Hossain and Suryadipta Majumdar.

8. Dynamic Multilayer Information System Cartography for Cybersecurity, Compliance and Industrial Governance: The CARTOGRAPHIT Framework, by Florence Sèdes and Brice Chellet.