Accepted Papers
Titles:
LLM4PDF: Semantic-Aware Malicious PDF Detection Using LLMs
Tan, Yule (Institute of Information Engineering, Chinese Academy of Sciences)
Yu, Min (Institute of Information Engineering, Chinese Academy of Sciences)
Li, Gengwang (Institute of Information Engineering, Chinese Academy of Sciences)
Chow, Kam Pui (University of Hong Kong)
Li, Min (Institute of Information Engineering, Chinese Academy of Sciences)
Jiang, Jianguo (Institute of Information Engineering, Chinese Academy of Sciences)
Huang, Weiqing (Institute of Information Engineering, Chinese Academy of Sciences)
On the Security of the RDHEI by Binary Symmetric Channel and Polar Code
Wang, Xuebin (Southwest Jiaotong University)
He, Honejie (Southwest Jiaotong University)
Chen, Fan (Southwest Jiaotong University)
Yang, Yaolin (Southwest Jiaotong University)
Automatic Recovery of Cryptowallets from Mnemonics Seed Phrases
Bhattarai, Abhishek (Florida International University)
Imery, Carlos (Florida International University)
Akkaya, Kemal (Florida International University)
An LLM-Driven Iterative Workflow for Ontological Mapping of Digital Forensic Artifacts
Kunwar, Kismat (University of New Haven)
Gunestas, Murat (University of New Haven)
An Enhanced Federated Machine Learning Approach for Decentralized Water Contamination Detection
Soni, Jayesh (Florida International University, USA)
Kumar, Raja (Florida International University)
Upadhyay, Himanshu (Florida International University)
Integration of NLP in Digital Forensics: A Pilot Study of Practitioner Perceptions on Chat Data Analysis Tools
Bardhan, Rajon (Augusta University)
Dorai, Gokila (Augusta University)
Griffith, Candace (Augusta University)
Ramasamy, Vijayalakshmi (Georgia Southern University)
Machine Learning Approach on detection of DDoS and Malware Attacks in Drone Communication Networks
Saripalli, Jyothsna (Florida International University)
MSMC-MobileNet: An Automated Multi-Scale and Multi-Contextual MobileNetv3 for Malware Detection Based on IoT
Javed, Sidra (Dalian University of Technology)
Wu, Guowei (Dalian University of Technology)
Javed, Hamza (Central South University)
Deepfake Forensics Adapter: A dual-stream network for generalizable deepfake detection
Liao, Jianfeng (Shenzhen Technology University)
Wei, Yichen (Shenzhen Technology University)
Chan, Raymond (Singapore Institute of Technology)
Wang, Shulan (Shenzhen Technology University)
Chow, Kam-Pui (University of Hong Kong)
Lam, Kwok-yan (Nanyang Technological University)
Automated Injury Severity Assessment Using Knowledge-Grounded Large Language Models
Zhang, Yuang (Nanyang Technological University)
Zhang, Fan (State Key Laboratory of Ocean Sensing Ocean College, Zhejiang University, China)
Xu, Lixiang (Public Security Bureau of Jiangsu Province, China)
Zhou, Shengbin (Public Security Bureau of Jiangsu Province, China)
Zhu, Tuanjie (Public Security Bureau of Jiangsu Province, China)
A Reward-driven Automated Webshell Malicious-code Generator for Red-teaming
Ding, Yizhong (Beijing Electronic Science and Technology Institute)
Wang, Zhiqiang (Beijing Electronic Science and Technology Institute)
Wang, Haoyu (Beijing Electronic Science and Technology Institute)
Li, Yanjun (Beijing Electronic Science and Technology Institute)
Temporal Sparse Black-Box Adversarial Attack on Deepfake Video Detection Models
Du, Fuqiang (Institute of Information Engineering, CAS)
Yu, Min (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Jiang, Jianguo (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Zhang, Yixin (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Liang, Yachao (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Na, Myung Hwan (Chonnam National University)
Huang, Weiqing (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Chances and Challenges of the Model Context Protocol in Digital Forensics and Incident Response
Hilgert, Jan-Niclas (Fraunhofer FKIE)
Jakobs, Carlo (Fraunhofer FKIE)
Külper, Michael (Fraunhofer FKIE)
Lambertz, Martin (Fraunhofer FKIE)
Mahr, Axel (Fraunhofer FKIE)
Padilla, Elmar (Fraunhofer FKIE)
Analyzing Digital Forensic Data Using Process Mining Techniques: A Case Study
Gendi, Mirai (University of Toronto)
Andritsos, Periklis (University of Toronto)
Automating Cloud Security and Forensics Through a Secure-by-Design GenAI Framework
Alharthi, Dalal (University of Arizona)
Garcia, Ivan Roberto Kawaminami (University of Arizona)
A Methodology for Event Log Generation from Unstructured Digital Forensics Data
Gendi, Mirai (University of Toronto)
Andritsos, Periklis (University of Toronto)
DepFieldGen: Research on Dependent Field Generation for secure ICS Protocols
song, zhanwei (IIE, Chinese Academy of Sciences, Beijing)
Fang, Dongliang (IIE, Chinese Academy of Sciences, Beijing)
Zheng, Yaowen (IIE, Chinese Academy of Sciences, Beijing)
Lv, Shichao (IIE, Chinese Academy of Sciences, Beijing)
Chen, Xin (IIE, Chinese Academy of Sciences, Beijing)
Si, Shuaizong (IIE, Chinese Academy of Sciences, Beijing)
Li, Zhi (IIE, Chinese Academy of Sciences, Beijing)
Sun, Limin (IIE, Chinese Academy of Sciences, Beijing)
A Malicious IoT Traffic Detection Method Based on Recursive Feature Addition Using Graph Neural Network
wang, zhiqiang (Beijing Electronic & Science Technology Academy)
Yuan, Shaowei (Beijing Electronic & Science Technology Academy)
Wang, Haoyu (Beijing Electronic & Science Technology Academy)
Zhang, Rui (Harbin Institute of Technology)
MFETD: Multimodal Feature Fusion for Encrypted Traffic Detection based on Transformer
wang, zhiqiang (Beijing Electronic & Science Technology Academy)
Liu, Ying (Beijing Electronic & Science Technology Academy)
Yuan, Shaowei (Beijing Electronic & Science Technology Academy)
Pang, Shufang (Beijing Electronic & Science Technology Academy)
Ju, Lei (Beijing Electronic & Science Technology Academy)
SolDataVul-LLaMA Dataset: a LLM-driven construction method and detection research of smart contract vulnerability dataset in data trading scenarios
Li, Wenjie (Inner Mongolia University of Technology)
Li, Leixiao (Inner Mongolia University of Technology)
Liu, Dongjiang (Inner Mongolia University of Technology)
Du, Jinze (Tianjin University of Technology)
Lin, Hao (Tianjin University of Technology)
Liu, Zhexu (Inner Mongolia University of Technology)
FAIR-MPC: Secure and Auditable SMPC for Anonymous Financial Collaboration
Bai, Tao (Huazhong University of Science and Technology)
Feng, Yuanqing (Huazhong University of Science and Technology)
Lu, Zhi (Huazhong University of Science and Technology)
Lu, Songfeng (Huazhong University of Science and Technology)
iOS Cookie Forensics with Autopsy Tool
Adila, Rida (Institut Teknologi Sepuluh Nopember)
Nusantara, Adetiya Bagus (Institut Teknologi Sepuluh Nopember)
Studiawan, Hudan (Institut Teknologi Sepuluh Nopember)
Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
LLM-Assisted Digital Forensic Investigations of Prompt Injection Attacks: Evidence Analysis and Representation
Chernyshev, Maxim (Deakin University)
Baig, Zubair (Deakin University)
Syed, Naeem (Deakin University)
Doss, Robin (Deakin University)
Shore, Malcolm (Deakin University)
FedHAP-MTD: Personalized Federated Malicious Traffic Detection Based on Hierarchical Updating and Adaptive Learning
Wang, Zhiqiang (Beijing Electronic & Science Technology Academy)
Liu, Ying (Beijing Electronic & Science Technology Academy)
Teng, Sen (Beijing Electronic & Science Technology Academy)
Ju, Lei (Beijing Electronic & Science Technology Academy)
MALDroid: An Explainable Android Malware Detection Framework Leveraging Temporal and Semantic Contextual Features
Wang, Zhiqiang (Beijing Electronic & Science Technology Academy)
Yuan, Sicheng (Beijing Electronic Science & Technology Institute)
Luo, Junlai (Beijing Electronic Science & Technology Institute)
Tian, Zhiang (Beijing Electronic Science & Technology Institute)
Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Franken, Boyd (University College Dublin)
Nguyen-Le, Hong-Hanh (University College Dublin)
Le-Khac, Nhien-An (University College Dublin)
AnchorMark: Real-World Anchor-Based Watermarking for Digital Content Authentication and Manipulation Detection
Liu, Xinyun (Michigan Technological University)
Xu, Ronghua (Michigan Technological University)
Chen, Yu (Binghamton University)
Memory-Recall-Based Watermarking for Data Misuse Detection in Large Language Models
Xu, Shensi (Nanjing University)
Wu, Shu (Nanjing University)
An encrypted traffic classification method based on Mamba and wavelet transform convolution
Chen, Guanxin (Xinjiang University)
Liu, Yipeng (Xinjiang University)
Yu, Lancan (Xinjiang University)
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers
Li, Wenhao (Universiti Sains Malaysia)
Manickam, Selvakumar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Chong, Yung-Wey (School of Computer Sciences, Universiti Sains Malaysia)
Karuppayah, Shankar (Cybersecurity Research Centre, Universiti Sains Malaysia)
ShellSight-LLM: Detecting Successful Webshell Intrusions via Optimized LLM
Wei, Jiadong (Computer Network Information Center, Chinese Academy of Sciences)
Wei, Jinxia (Computer Network Information Center, Chinese Academy of Sciences)
Wan, Wei (Computer Network Information Center, Chinese Academy of Sciences)
Fu, Hao (Computer Network Information Center, Chinese Academy of Sciences)
Lu, Yuhai (Computer Network Information Center, Chinese Academy of Sciences)
Long, Chun (Computer Network Information Center, Chinese Academy of Sciences)
Sun, Degang (Computer Network Information Center, Chinese Academy of Sciences)
HLSEn: High-level Semantic Awareness Pseudo-code Encoding for Binary Code Similarity Detection
Li, Yanlin (National University of Defense Technology)
Zhang, Lu (National University of Defense Technology)
Wang, Song (National University of Defense Technology)
Wang, Taiyan (National University of Defense Technology)
Yu, Lu (National University of Defense Technology)
Chen, Qiangpu (National University of Defense Technology)
Li, Yuwei (National University of Defense Technology)
Pan, Zulie (National University of Defense Technology)
Improving the forensic integrity of Mark-of-the-Web (MOTW) files
Mac Mahon-Maré, Chloé (University of Pretoria)
MuLImg-SCV: Multi-Label Vulnerability Classification of Smart Contracts Based on RGB Image
Liu, Nianlu (College of Software, Xinjiang University)
Zhang, Linlin (Network and Information Technology Center, Xinjiang University)
Li, Ke (College of Software, Xinjiang University)
Fang, Wenbo (Cyber Science and Engineering, Sichuan University)
Zhao, Kai (College of Computer Science and Technology, Xinjiang University)
Online Learning for Android Malware Detection under Concept-Drift
Sahin, Elif (University of North Carolina at Wilmington)
Karabacak, Bilge (University of North Carolina at Wilmington)
Bahsi, Hayretdin (Northern Arizona University)
ElSaid, AbdElRahman (University of North Carolina Wilmington)
LMBE: Unsupervised Detection of Lateral Movement via User Behavior Embedding
Chen, Yufan (Institute of Information Engineering, CAS)
Zhao, Changzhi (Institute of Information Engineering, CAS)
Cheng, Jie (State Grid Information & Telecommunication Group Co., Ltd.)
Li, Xiaomeng (State Grid Information & Telecommunication Group Co., Ltd.)
Li, Shuo (State Grid Tianjin Electric Power Company)
Han, Dongxu (Institute of Information Engineering, CAS)
Liu, Yuling (Institute of Information Engineering, CAS)
Lu, Zhigang (Institute of Information Engineering, CAS)
PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation
Li, Wenhao (Cybersecurity Research Centre, Universiti Sains Malaysia)
Manickam, Selvakumar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Chong, Yung-Wey (School of Computer Sciences, Universiti Sains Malaysia)
Karuppayah, Shankar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Threshold-driven: Reversible Adversarial Face Examples via Latent Diffusion Model
Guo, Yuan (Heilongjiang University)
Li, Haibo (Heilongjiang University)
Wei, Liansuo (Suqian University)
A Real-Time Face Swap Detection Model for Video Chatting Scams
Li, Xingyi (Sichuan University)
Weng, Yuetong (Sichuan University)
Zhang, Jiabei (Sichuan University)
Liu, Hangyu (Sichuan University)
Wang, Haizhou (Sichuan University)
The sample classification method accelerates the efficiency of robustness verification
Xia, Hantao (Anhui University)
Li, Xuejian (Anhui University)
AFLTrans: An Intelligent Generative Fuzz Testing Method for Binary Programs Based on Transformer
Cao, Guoyan (Northwestern Polytechnical University)
Xiong, Xiaobin (Key Laboratory of Cyberspace Security, Ministry of Education, China)