| A boostershot for transferable physically realizable adversarial examples | Willem Verheyen, Sander Joos, Tim Van hamme, Davy Preuveneers, Wouter Joosen |
| A practical methodology for ML-Based EM Side Channel Disassemblers | Cesar Arguello, Hunter Searle, Sara Rampazzi, Kevin Butler |
| Detecting Network Anomalies from Small Traffic Samples using Graph Neural Network | Aviv Yehezkel, Eyal Elyashiv |
| Exploiting Timing Side-Channel Leaks in Web Applications that Tell on Themselves | Vik Vanderlinden, Tom Van Goethem, Wouter Joosen, Mathy Vanhoef |
| How Attackers Determine the Ransom in Ransomware Attacks | Tom Meurs, Marianne Junger, Abhishta Abhishta |
| One of a Kind: Correlating Robustness to Adversarial Examples and Face Uniqueness | Giuseppe Garofalo, Tim Van hamme, Davy Preuveneers, Wouter Joosen |
| Pillars of Sand: The current state of Datasets in the field of Network Intrusion Detection | Gints Engelen, Robert Flood, Lisa Liu-Thorrold, Vera Rimmer, Henry Clausen, David Aspinall, Wouter Joosen |
| Systematic Elicitation of Common Security Design Flaws | Stef Verreydt, Laurens Sion, Koen Yskout, Wouter Joosen |
| TESTABLE: Testability-driven security and privacy testing for Web Applications | Luca Compagna, Giancarlo Pellegrino, Davide Balzarotti, Martin Johns, Ángel Cuevas, Battista Biggio, Leyla Bilge, Fabian Yamaguchi, Matteo Meucci |
| The Beauty and the Beast (40 years of process algebra and cybersecurity) | Silvia De Francisci, Gabriele Costa, Rocco De Nicola |
| The impact of data sampling in the anonymization pipeline | Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| The impact of public data during de-anonymization: a case study | Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| Towards Cyber Resilience of Cyber-Physical Systems using Tiny Twins | Fereidoun Moradi, Sara Abbaspour Asadollah, Marjan Sirjani |