Accepted Papers
Titles:
LLM4PDF: Semantic-Aware Malicious PDF Detection Using LLMs
Tan, Yule (Institute of Information Engineering, Chinese Academy of Sciences)
Yu, Min (Institute of Information Engineering, Chinese Academy of Sciences)
Li, Gengwang (Institute of Information Engineering, Chinese Academy of Sciences)
Chow, Kam Pui (University of Hong Kong)
Li, Min (Institute of Information Engineering, Chinese Academy of Sciences)
Jiang, Jianguo (Institute of Information Engineering, Chinese Academy of Sciences)
Huang, Weiqing (Institute of Information Engineering, Chinese Academy of Sciences)
On the Security of the RDHEI by Binary Symmetric Channel and Polar Code
Wang, Xuebin (Southwest Jiaotong University)
He, Honejie (Southwest Jiaotong University)
Chen, Fan (Southwest Jiaotong University)
Yang, Yaolin (Southwest Jiaotong University)
Automatic Recovery of Cryptowallets from Mnemonics Seed Phrases
Bhattarai, Abhishek (Florida International University)
Imery, Carlos (Florida International University)
Akkaya, Kemal (Florida International University)
An LLM-Driven Iterative Workflow for Ontological Mapping of Digital Forensic Artifacts
Kunwar, Kismat (University of New Haven)
Gunestas, Murat (University of New Haven)
An Enhanced Federated Machine Learning Approach for Decentralized Water Contamination Detection
Soni, Jayesh (Florida International University, USA)
Kumar, Raja (Florida International University)
Upadhyay, Himanshu (Florida International University)
Integration of NLP in Digital Forensics: A Pilot Study of Practitioner Perceptions on Chat Data Analysis Tools
Bardhan, Rajon (Augusta University)
Dorai, Gokila (Augusta University)
Griffith, Candace (Augusta University)
Ramasamy, Vijayalakshmi (Georgia Southern University)
Machine Learning Approach on detection of DDoS and Malware Attacks in Drone Communication Networks
Saripalli, Jyothsna (Florida International University)
MSMC-MobileNet: An Automated Multi-Scale and Multi-Contextual MobileNetv3 for Malware Detection Based on IoT
Javed, Sidra (Dalian University of Technology)
Wu, Guowei (Dalian University of Technology)
Javed, Hamza (Central South University)
Deepfake Forensics Adapter: A dual-stream network for generalizable deepfake detection
Liao, Jianfeng (Shenzhen Technology University)
Wei, Yichen (Shenzhen Technology University)
Chan, Raymond (Singapore Institute of Technology)
Wang, Shulan (Shenzhen Technology University)
Chow, Kam-Pui (University of Hong Kong)
Lam, Kwok-yan (Nanyang Technological University)
Automated Injury Severity Assessment Using Knowledge-Grounded Large Language Models
Zhang, Yuang (Nanyang Technological University)
Zhang, Fan (State Key Laboratory of Ocean Sensing Ocean College, Zhejiang University, China)
Xu, Lixiang (Public Security Bureau of Jiangsu Province, China)
Zhou, Shengbin (Public Security Bureau of Jiangsu Province, China)
Zhu, Tuanjie (Public Security Bureau of Jiangsu Province, China)
A Reward-driven Automated Webshell Malicious-code Generator for Red-teaming
Ding, Yizhong (Beijing Electronic Science and Technology Institute)
Wang, Zhiqiang (Beijing Electronic Science and Technology Institute)
Wang, Haoyu (Beijing Electronic Science and Technology Institute)
Li, Yanjun (Beijing Electronic Science and Technology Institute)
Temporal Sparse Black-Box Adversarial Attack on Deepfake Video Detection Models
Du, Fuqiang (Institute of Information Engineering, CAS)
Yu, Min (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Jiang, Jianguo (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Zhang, Yixin (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Liang, Yachao (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Na, Myung Hwan (Chonnam National University)
Huang, Weiqing (Institute of Information Engineering, CAS and the School of Cyber Security, UCAS)
Chances and Challenges of the Model Context Protocol in Digital Forensics and Incident Response
Hilgert, Jan-Niclas (Fraunhofer FKIE)
Jakobs, Carlo (Fraunhofer FKIE)
Külper, Michael (Fraunhofer FKIE)
Lambertz, Martin (Fraunhofer FKIE)
Mahr, Axel (Fraunhofer FKIE)
Padilla, Elmar (Fraunhofer FKIE)
Analyzing Digital Forensic Data Using Process Mining Techniques: A Case Study
Gendi, Mirai (University of Toronto)
Andritsos, Periklis (University of Toronto)
Automating Cloud Security and Forensics Through a Secure-by-Design GenAI Framework
Alharthi, Dalal (University of Arizona)
Garcia, Ivan Roberto Kawaminami (University of Arizona)
A Methodology for Event Log Generation from Unstructured Digital Forensics Data
Gendi, Mirai (University of Toronto)
Andritsos, Periklis (University of Toronto)
DepFieldGen: Research on Dependent Field Generation for secure ICS Protocols
song, zhanwei (IIE, Chinese Academy of Sciences, Beijing)
Fang, Dongliang (IIE, Chinese Academy of Sciences, Beijing)
Zheng, Yaowen (IIE, Chinese Academy of Sciences, Beijing)
Lv, Shichao (IIE, Chinese Academy of Sciences, Beijing)
Chen, Xin (IIE, Chinese Academy of Sciences, Beijing)
Si, Shuaizong (IIE, Chinese Academy of Sciences, Beijing)
Li, Zhi (IIE, Chinese Academy of Sciences, Beijing)
Sun, Limin (IIE, Chinese Academy of Sciences, Beijing)
A Malicious IoT Traffic Detection Method Based on Recursive Feature Addition Using Graph Neural Network
wang, zhiqiang (Beijing Electronic & Science Technology Academy)
Yuan, Shaowei (Beijing Electronic & Science Technology Academy)
Wang, Haoyu (Beijing Electronic & Science Technology Academy)
Zhang, Rui (Harbin Institute of Technology)
MFETD: Multimodal Feature Fusion for Encrypted Traffic Detection based on Transformer
wang, zhiqiang (Beijing Electronic & Science Technology Academy)
Liu, Ying (Beijing Electronic & Science Technology Academy)
Yuan, Shaowei (Beijing Electronic & Science Technology Academy)
Pang, Shufang (Beijing Electronic & Science Technology Academy)
Ju, Lei (Beijing Electronic & Science Technology Academy)
SolDataVul-LLaMA Dataset: a LLM-driven construction method and detection research of smart contract vulnerability dataset in data trading scenarios
Li, Wenjie (Inner Mongolia University of Technology)
Li, Leixiao (Inner Mongolia University of Technology)
Liu, Dongjiang (Inner Mongolia University of Technology)
Du, Jinze (Tianjin University of Technology)
Lin, Hao (Tianjin University of Technology)
Liu, Zhexu (Inner Mongolia University of Technology)
FAIR-MPC: Secure and Auditable SMPC for Anonymous Financial Collaboration
Bai, Tao (Huazhong University of Science and Technology)
Feng, Yuanqing (Huazhong University of Science and Technology)
Lu, Zhi (Huazhong University of Science and Technology)
Lu, Songfeng (Huazhong University of Science and Technology)
iOS Cookie Forensics with Autopsy Tool
Adila, Rida (Institut Teknologi Sepuluh Nopember)
Nusantara, Adetiya Bagus (Institut Teknologi Sepuluh Nopember)
Studiawan, Hudan (Institut Teknologi Sepuluh Nopember)
Choo, Kim-Kwang Raymond (University of Texas at San Antonio)
LLM-Assisted Digital Forensic Investigations of Prompt Injection Attacks: Evidence Analysis and Representation
Chernyshev, Maxim (Deakin University)
Baig, Zubair (Deakin University)
Syed, Naeem (Deakin University)
Doss, Robin (Deakin University)
Shore, Malcolm (Deakin University)
FedHAP-MTD: Personalized Federated Malicious Traffic Detection Based on Hierarchical Updating and Adaptive Learning
Wang, Zhiqiang (Beijing Electronic & Science Technology Academy)
Liu, Ying (Beijing Electronic & Science Technology Academy)
Teng, Sen (Beijing Electronic & Science Technology Academy)
Ju, Lei (Beijing Electronic & Science Technology Academy)
MALDroid: An Explainable Android Malware Detection Framework Leveraging Temporal and Semantic Contextual Features
Wang, Zhiqiang (Beijing Electronic & Science Technology Academy)
Yuan, Sicheng (Beijing Electronic Science & Technology Institute)
Luo, Junlai (Beijing Electronic Science & Technology Institute)
Tian, Zhiang (Beijing Electronic Science & Technology Institute)
Blockchain-based vs. SQL Database Systems for Digital Twin Evidence Management: A Comparative Forensic Analysis
Franken, Boyd (University College Dublin)
Nguyen-Le, Hong-Hanh (University College Dublin)
Le-Khac, Nhien-An (University College Dublin)
AnchorMark: Real-World Anchor-Based Watermarking for Digital Content Authentication and Manipulation Detection
Liu, Xinyun (Michigan Technological University)
Xu, Ronghua (Michigan Technological University)
Chen, Yu (Binghamton University)
Memory-Recall-Based Watermarking for Data Misuse Detection in Large Language Models
Xu, Shensi (Nanjing University)
Wu, Shu (Nanjing University)
An encrypted traffic classification method based on Mamba and wavelet transform convolution
Chen, Guanxin (Xinjiang University)
Liu, Yipeng (Xinjiang University)
Yu, Lancan (Xinjiang University)
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers
Li, Wenhao (Universiti Sains Malaysia)
Manickam, Selvakumar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Chong, Yung-Wey (School of Computer Sciences, Universiti Sains Malaysia)
Karuppayah, Shankar (Cybersecurity Research Centre, Universiti Sains Malaysia)
ShellSight-LLM: Detecting Successful Webshell Intrusions via Optimized LLM
Wei, Jiadong (Computer Network Information Center, Chinese Academy of Sciences)
Wei, Jinxia (Computer Network Information Center, Chinese Academy of Sciences)
Wan, Wei (Computer Network Information Center, Chinese Academy of Sciences)
Fu, Hao (Computer Network Information Center, Chinese Academy of Sciences)
Lu, Yuhai (Computer Network Information Center, Chinese Academy of Sciences)
Long, Chun (Computer Network Information Center, Chinese Academy of Sciences)
Sun, Degang (Computer Network Information Center, Chinese Academy of Sciences)
HLSEn: High-level Semantic Awareness Pseudo-code Encoding for Binary Code Similarity Detection
Li, Yanlin (National University of Defense Technology)
Zhang, Lu (National University of Defense Technology)
Wang, Song (National University of Defense Technology)
Wang, Taiyan (National University of Defense Technology)
Yu, Lu (National University of Defense Technology)
Chen, Qiangpu (National University of Defense Technology)
Li, Yuwei (National University of Defense Technology)
Pan, Zulie (National University of Defense Technology)
Improving the forensic integrity of Mark-of-the-Web (MOTW) files
Mac Mahon-Maré, Chloé (University of Pretoria)
MuLImg-SCV: Multi-Label Vulnerability Classification of Smart Contracts Based on RGB Image
Liu, Nianlu (College of Software, Xinjiang University)
Zhang, Linlin (Network and Information Technology Center, Xinjiang University)
Li, Ke (College of Software, Xinjiang University)
Fang, Wenbo (Cyber Science and Engineering, Sichuan University)
Zhao, Kai (College of Computer Science and Technology, Xinjiang University)
Online Learning for Android Malware Detection under Concept-Drift
Sahin, Elif (University of North Carolina at Wilmington)
Karabacak, Bilge (University of North Carolina at Wilmington)
Bahsi, Hayretdin (Northern Arizona University)
ElSaid, AbdElRahman (University of North Carolina Wilmington)
LMBE: Unsupervised Detection of Lateral Movement via User Behavior Embedding
Chen, Yufan (Institute of Information Engineering, CAS)
Zhao, Changzhi (Institute of Information Engineering, CAS)
Cheng, Jie (State Grid Information & Telecommunication Group Co., Ltd.)
Li, Xiaomeng (State Grid Information & Telecommunication Group Co., Ltd.)
Li, Shuo (State Grid Tianjin Electric Power Company)
Han, Dongxu (Institute of Information Engineering, CAS)
Liu, Yuling (Institute of Information Engineering, CAS)
Lu, Zhigang (Institute of Information Engineering, CAS)
PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation
Li, Wenhao (Cybersecurity Research Centre, Universiti Sains Malaysia)
Manickam, Selvakumar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Chong, Yung-Wey (School of Computer Sciences, Universiti Sains Malaysia)
Karuppayah, Shankar (Cybersecurity Research Centre, Universiti Sains Malaysia)
Threshold-driven: Reversible Adversarial Face Examples via Latent Diffusion Model
Guo, Yuan (Heilongjiang University)
Li, Haibo (Heilongjiang University)
Wei, Liansuo (Suqian University)
A Real-Time Face Swap Detection Model for Video Chatting Scams
Li, Xingyi (Sichuan University)
Weng, Yuetong (Sichuan University)
Zhang, Jiabei (Sichuan University)
Liu, Hangyu (Sichuan University)
Wang, Haizhou (Sichuan University)
The sample classification method accelerates the efficiency of robustness verification
Xia, Hantao (Anhui University)
Li, Xuejian (Anhui University)
AFLTrans: An Intelligent Generative Fuzz Testing Method for Binary Programs Based on Transformer
Cao, Guoyan (Northwestern Polytechnical University)
Xiong, Xiaobin (Key Laboratory of Cyberspace Security, Ministry of Education, China)
APT-Agent: A Training-Free, Unsupervised, LLM-Based Multi-Agent Framework for Interpretable Advanced Persistent Threat Detection
Cui, Wenzhuo (Institute of Information Engineering, Chinese Academy of Sciences, China)
Hu, Yibing (Institute of Information Engineering, Chinese Academy of Sciences, China)
Liu, Zheng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Feng, Jingjing (Institute of Information Engineering, Chinese Academy of Sciences, China)
Zhang, Shuyi (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wen, Yu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Accelerating Criminal Investigations with TRACY
Rangappa, Pradeep (Idiap Research Institute, Switzerland)
Motlicek, Petr (Idiap Research Institute, Switzerland)
Sanchez-Cortes, Dairazalia (Idiap Research Institute, Switzerland)
Sanchez Lara, Alejandra (Idiap Research Institute, Switzerland)
Antonopoulou, Michaela (Performance Technologies, Athens, Greece)
Fourfouris, Ioannis (Performance Technologies, Athens, Greece)
Avgerinos, Nikos (Performance Technologies, Athens, Greece)
Tsangaris, Manolis (Performance Technologies, Athens, Greece)
SCOPE – Activity Recognition Using Temporally Dominant Topic Identification In Forensic Chat Analysis
Bardhan, Rajon (Augusta University, USA)
Dorai, Gokila (Augusta University, USA)
Agrawal, Gagan (University of Georgia, USA)
Farabi, Khan Mohammad Al (University of Georgia, USA)
Digital Forensic Investigation of Social Robots: Zenbo, Zenbo Jr., and Misty II as Case Studies
Seghid, Niyat Habtom (Zayed University, UAE)
Iqbal, Farkhund (Zayed University, UAE)
Kamoun, Faouzi (ESPRIT School of Engineering, Tunisia)
Al Breiki, Hamda (Zayed University, UAE)
What’s Next, Cloud? A Forensic Framework for Analyzing Self-Hosted Cloud Storage Solutions
Kulper, Michael (Fraunhofer FKIE, Germany)
Hilgert, Jan-Niclas (Fraunhofer FKIE, Germany)
Breitinger, Frank (Universitat Augsburg, Germany)
Lambertz, Martin (Fraunhofer FKIE, Germany)
Toward Structured Memory Forensics: A MITRE ATT&CK-Aligned Workflow for Malware Investigation
Rodriguez, Ricardo J. (University of Zaragoza, Spain)
Towards Regulated and Accountable Privacy-Preserving Retrieval for Digital Forensics: A Cryptographic Design Framework
Song, Jie (Institute of Information Engineering, CAS; Intelligent Policing Key Laboratory of Sichuan Province; University of Chinese Academy of Sciences, China)
Xu, Zhen (Institute of Information Engineering, CAS, China)
Zhang, Yan (Institute of Information Engineering, CAS; University of Chinese Academy of Sciences, China)
Miao, Hong (Intelligent Policing Key Laboratory of Sichuan Province, China)
WebHunter: An LLM-Agent with Exploit Planning and Tool Collaboration for Automated SQL Injection
Ren, Wenkai (Institute of Information Engineering, Chinese Academy of Sciences, China)
Hu, Die (Institute of Information Engineering, Chinese Academy of Sciences, China)
Kong, He (Institute of Information Engineering, Chinese Academy of Sciences, China)
E, Yuepeng (Institute of Information Engineering, Chinese Academy of Sciences, China)
Li, Liangxiong (Institute of Information Engineering, Chinese Academy of Sciences, China)
Wu, Bingzhen (Institute of Information Engineering, Chinese Academy of Sciences, China)
A ROSI-Based Framework with Zero Trust Architecture: Interdependent Risks and Cybersecurity Investment
Huang, Li (University at Albany, USA)
Cornell, Kimberly A. (University at Albany, USA)
Graph Neural Networks for Video Device Identification
Iyengar, Raghu Sesha (pi-labs, India)
Kumar, Vaibhav (National Forensic Sciences University, Gandhinagar, Gujarat, India)
Where the Money Is: Shadow AI Risks to Family Offices and the Wealth Management Sector
Nussbaum, Brian H. (University at Albany, USA)
Cornell, Kimberly A. (University at Albany, USA)
Resilient Satellite Cybersecurity: Integrating NIST and AI Governance
Cornell, Kimberly A. (University at Albany, USA)
Huang, Li (University at Albany, USA)
Securing Federated Learning: A Hybrid Defense Against Poison Injection Attacks in LLM
Makanahalli Annaiah, Ajay Kumara (University of North Carolina Wilmington, USA)
Riggan, Mikaela (University of North Carolina Wilmington, USA)
Detecting Container Escape Attacks via Graph Neural Networks on System Call Graphs
jing, xie (School of Cyber Security, University of Chinese Academy of Sciences)
jia, huang qing (School of Cyber Security, University of Chinese Academy of Sciences)
Fine-Tuning Large Language Models for Anomaly Detection in Distributed System Logs
Alvarez, Gabriel (Florida International University)
Gangwani, Pranav (Florida International University, USA)
Dwivedi, Guarav (Florida International University, USA)
Perez-Pons, Alexander (Florida International University, USA)
Upadhyay, Himanshu (Florida International University, USA)
Retrospective Analysis of Legal Documents Using Hybrid AI – A Preliminary Empirical Study of Historical Search Warrant Processing
Rahman, Md. Ashiqur (Augusta University)
Dorai, Gokila (Augusta University)
Kadri, Thomas E. (University of Georgia)
Thorley, Dane R. (Brigham Young University)
Meixner Jr., John B. (University of Georgia)
de Figueiredo, Miguel (University of Connecticut)
Agrawal, Gagan (University of Georgia)
Generative AI-Driven Anomaly Detection in Soil Electrical Conductivity Using Temporal Autoencoders
Etar, Aakarsh (Florida International University)
Soni, Jayesh (Florida International University, USA)
Upadhyay, Himanshu (Florida International University, USA)
Perez Pons, Alexander (Florida International University)
Comparative Study of Quantum and Classical Layers in Hybrid Quantum Neural Networks
Etar, Aakarsh (Florida International University)
Soni, Jayesh (Florida International University, USA)
Upadhyay, Himanshu (Florida International University, USA)
Perez Pons, Alexander (Florida International University)
Tripathi, Sarvapriya (Florida International University, USA)
Understanding Online Grooming Through LLMs: Stage Detection and Linguistic Patterns
Hamer, Sarah A. J. (The University of Tulsa)
Chua, Yi Ting (The University of Tulsa)
Pei, Weiping (The University of Tulsa)
Validation of IP Reputations Through Redirection of Unsolicited Network Traffic to an Interactive Honeynet
Edge, Eric (George Mason University)
Jones, James (George Mason University)
Laskey, Kathryn (George Mason University)
Evaluating the Impact of Honeynets on Malicious Activity in Home Network Environments
Edge, Eric (George Mason University)
Jones, James (George Mason University)
Laskey, Kathryn (George Mason University)
Privacy-Preserving k-Bitruss Community Query over Encrypted Bipartite Graphs
LIU, XIAOXIAN (University of New South Wales)
Chen, Chen (University of Wollongong)
Liu, Xueqiao (University of Wollongong)
Wang, Xiaoyang (University of New South Wales)
Revealing the Intents: Malware Protocol Semantic Inference using Large Language Models
Huang, Yuyao (Key Laboratory of Cyberspace Security, Ministry of Education, China)
Shu, Hui (Key Laboratory of Cyberspace Security, Ministry of Education, China)
Kang, Fei (Key Laboratory of Cyberspace Security, Ministry of Education, China)
MRES-S: Multi-scale Deep Learning Network for Hardware Trojan Detection
duan, xiaoyi (Beijing Electronic Science and Technology Institute)
Zhu, Shenghan (Beijing Electronic Science and Technology Institute)
li, Xiangrui (Beijing Electronic Science and Technology Institute)
Hu, Ronglei (Beijing Electronic Science and Technology Institute)
Xie, Bingqi (Beijing Electronic Science and Technology Institute)
Wen, Aohui (Beijing Electronic Science and Technology Institute)
Autoencoder-Based Intrusion Detection: A Hybrid Deep Learning Approach
Petrlic, Ronald (Nuremberg Institute of Technology)