UWA Logo ECU Logo
31st Australasian Conference on Information Security and Privacy
6 - 9 July 2026, Perth, Australia

ACISP 2026

Accepted Papers


Round 1 Submissions

1
Analyzing Forgery Security of LeMac: Tight Bounds and Impact of Padding

Taichi Nagoya, Takuro Shiraya, Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Ryoma Ito, and Takanori Isobe

2
Automated Tool for Finding Practical Collisions on SPN-based Hash Functions

Keita Toyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Kodai Taiyama, and Takanori Isobe

3
CogSpy: Cognition-Driven PIN Inference against Layout-Randomized Soft Keyboards

Chiyu Zhou, Zijian Wan, and Wei Wang

4
Compact All-but-τ Vector Commitments for MPC-in-the-Head Signatures

Lingqing Zhao and Liping Wang

5
Cryptanalytic Extraction of Convolutional Neural Networks

Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, and Wei Wang

6
Detection and Interpretation of Malicious Network Traffic via a novel 8-Channel Image Representation

Zhiqiang Wang, Junlai Luo, Sen Teng, and Sicheng Yuan

7
Efficient Identity-Based Matchmaking Encryption with Enhanced Privacy and Chosen-Ciphertext Security

Qinyi Li, Hao Qin, and Xavier Boyen

8
Efficient Zero Knowledge Proofs for Committed Symmetric Boolean Functions From VOLE-in-the-Head

Ying Ouyang, Zuming Liu, Deng Tang, and Yanhong Xu

9
Enhancing Backdoor Persistence under Uncontrolled Federated Clients: A Bidirectional Adversarial and Redundant Embedding Framework

Lin Wei, Zitao Lyu, Lei Shi, Chengming Liu, and Huijuan Lian

10
Improved Tightly Secure (ID-based) Signatures in the AGM

Yanzibo Zhou, Fuchun Guo, Willy Susilo, and Nan Li

11
Information-Theoretic Privacy for Long-Term Share Storage on Noisy Media

Elmo Huang, Huaxiong Wang, and Kwok Yan Lam

12
Meet-LWE with Hints: Solving Ternary LWE with Information Leakage

Jinzheng Cao, Rongmao Chen, Haodong Jiang, and Qingfeng Cheng

13
Missing the Link? Enhancing the Security of Digital Car Keys With Secure Session Linking and Hardware Trust

Christian Plappert and Daniel Trick

14
Multi-Authority Attribute-Based Anonymous Credentials with Public Traceability and Revocation

Meng Sun, Mingmei Zheng, Junzuo Lai, Chi Wu, and Xiaohan Mo

15
Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models

Haoyun Yang, Ronghong Huang, Yong Fang, Beizeng Zhang, Junpu Guo, Zhanyu Wu, and Xianghang Mi

16
Prompt to Pwn: Automated Exploit Generation for Smart Contracts

Zeke Xiao, Qin Wang, Yuekang Li, and Shiping Chen

17
RC-MDNet: Risk-Controlled Malicious Domain Detection for Open-World Network Security

Yuning Jing

18
Retention-Consistent Concept Unlearning for Diffusion Models

Laiqiao Qin, Tianqing Zhu, Linlin Wang, and Wanlei Zhou

19
Robust Encrypted Video Identification in the Mixed-Segment Era: A Retrieval-Augmented Approach

Jia Yee Tan, Yiqiao Zhou, and Liu Xutong

20
Secure Sealed-bidding Networks via Conditional Time-aware Access Authorization

Qi Liu, Peng Jiang, Yimin Liu, Zhen Zhao, and Liehuang Zhu

21
ServiceChain: A Verifiable Cloud Service Framework for Resource-Constrained Blockchain Nodes

Lin Zhang, Shaowen Yao, Jiayuan Lv, Huajian Yu, and Hongxing Xu

22
Shielding MCP Tool: A Secure Execution Framework using TEE and Automated Trimming

Ruidong Han, Chengyan Ma, Ye Liu, Yuqing Niu, and David Lo

23
ST-Mamba: Spatio-temporal Feature-Based Encrypted Traffic Analysis Using Mamba Network

Jiangwen Zhu, Mingrui Fan, Ruohan Cao, Jinxin Zuo, and Yueming Lu

24
The Dark Side of Upgrades: Uncovering Insecurity in Smart Contract Upgrades

Dingding Wang, Jianting He, Siwei Wu, Yajin Zhou, Lei Wu, and Cong Wang

25
TIDE: Making Task-Agnostic Backdoors Harder to Erase in Pre-trained Language Models

Yan Meng, Zhigang Lu, Bing Li, Anan Du, and Shuchao Pang

26
Towards Public Tracing: Collaborative Traceable Secret Sharing

Pousali Dey, Rittwik Hajra, Subha Kar, and Soumit Pal

27
Transparent Fully Batchable Polynomial Commitment with Application to Scalable VSS

Xiangyu Kong, Min Zhang, and Yu Chen


Round 2 Submissions

28
A Taxonomy-Driven Case Study of Australian Web Resources Against Technology-Facilitated Abuse

Dipankar Srirag, Xiaolin Cen, Rahat Masood and Aditya Joshi

29
Adversarial-Example Agnostic Detection in Network Intrusion Detection Systems

Jing Li, Wei Zong, Yang-Wai Chow and Willy Susilo

30
Attribute-Based Encryption for Circuits and Inner-Product Predicate Encryption from Middle-Product LWE

Takumi Nishimura and Atsushi Takayasu

31
Autonomous Adversary: Red-Teaming in the age of LLM

Mohammad Mamun, Mohamed Hatem, Sherif Saad and Scott Buffett

32
Backdoor Risks in Personalized Federated Learning under Practical Constraints

Yiming He, Qing Ye, Xinhong Hei and Yichuan Wang

33
Batch-Puncturing Circuit CP-ABE (and More) from Lattices

Yongkang Lang, Fangguo Zhang, Jianghong Wei, Xinyi Huang and Xiaofeng Chen

34
Beyond the U-Method: Automating the Search for UID-Based Contradictions with Constraint Programming

Jinpeng Liu and Ling Sun

35
Contact Tracing with Location Privacy Protection

Xun Yi, Xiaoning Liu, Kwok-Yan Lam and Elisa Bertino

36
CSC: Turning the Adversary’s Poison against Itself

Yuchen Shi, Xin Guo, Huajie Chen, Tianqing Zhu, Bo Liu and Wanlei Zhou

37
Data Exfiltration over Browsers

Naseer Ahmad Noor, Masahiro Ishii and Keisuke Tanaka

38
Efficient Additive Randomized Encodings for String Oblivious Transfer: A Core Primitive for General Functions

Masaya Yoshimura, Kyoichi Asano, Yugo Kasashima, Mitsugu Iwamoto and Yohei Watanabe

39
Empirical Analysis of Misdirected Payment Risks from Name Collisions in Blockchain Naming Services

Soichiro Kobayashi, Daiki Ito, Takuya Watanabe, Yuta Takata, Hiroshi Kumagai and Masaki Kamizono

40
Ensuring Incentive Compatibility in an Enhanced All-Pay Auction Model for User Recruitment

Hai Liu, Nana Zhou, Maoze Tian, Ying Tang and Jianfeng Ma

41
Evaluating SAT Accelerations for Cryptanalytic Trail Search - Low-Parallelism Portfolio Parallelism and A Comparison of Matsui-Based Methods

Tenglong Yuan, Bingqing Li and Ling Sun

42
Fast Updatable Message Authentication Codes and Signatures with Public Tokens

Marc Fischlin and Saçıak Gözde

43
Fine-Grained Weighted Access Control with Keyword Search and Malicious User Tracing for Cloud-Based mHealth Systems

Jiannan Wei, Zhipeng Zhai, Mingxin Lu and Xuansong Li

44
Forward-Secure Tag-Inverse Puncturable Identity-Based Encryption

Dongmei Yang, Yang Ba, Xuexian Hu and Jianghong Wei

45
Harnessing Large Language Models for Real-Time Cyber Threat Detection and Response: A Comprehensive Survey

Xiaoyu Li, Nan Sun and Jiaojiao Jiang

46
HetAKE: Heterogeneous Authenticated Key Exchange for Post-Quantum Migration

Xianhui Lu, Yao Cheng, Jingnan He, Haiyang Xue and Yamin Liu

47
Knowledge Graph–Augmented Reasoning for Robust Multi-Modal Document Attack Detection

Teng Li, Shengkai Zhang, Jia Tian, Yebo Feng, Li Yan, Zhuo Ma and Jianfeng Ma

48
Lattice-based Ring Verifiable Random Functions

Jie Xu, Muhammed F. Esgin and Ron Steinfeld

49
Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping

San Ling, Benjamin Hong Meng Tan, Huaxiong Wang and Allen Siwei Yang

50
LockMeld: A Privacy-Preserving Cross-Chain Protocol for Confidential, Account-Based Blockchains

Hanqing Huang, Chenke Wang, Yu Long, Xian Xu and Dawu Gu

51
Lost in the Pages: WebAssembly Code Recovery through SEV-SNP’s Exposed Address Space

Markus Berthilsson and Christian Gehrmann

52
LRC-DPoR: Efficient Data Integrity Auditing with Local Repair and Dynamic Updates

Yumei Li, Willy Susilo, Fuchun Guo and Yudi Zhang

53
MelShield: Robust Mel-Domain Audio Watermarking for Provenance Attribution of AI Generated Synthesized Speech

Yutong Jin, Qi Li, Lingshuang Liu and Jianbing Ni

54
OblivSage: Oblivious Graph Sampling for Privacy-Preserving GNN

Zhibo Xu, Yiming Qin, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Tsz Hon Yuen, Joseph Liu and Xingliang Yuan

55
Password Protected Universal Thresholdizer

Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini and Willy Susilo

56
PhishCascade: Confidence-Gated Multi-Agent Phishing Detection

Hongju Li

57
Pixel-Depth Prototypical Knowledge Consolidation Network for Deepfake Detection

Ahmed Asiri, Weiqi Wang, Zhiyi Tian, Xiaoyu Ding, Luoyu Chen and Shui Yu

58
Related-key Secure Blockwise Universal Permutations and Non-linear SPNs

Yuxiang Wang and Chun Guo

59
RoS-ETA: Defeating Availability Poisoning via the Physical Rate Paradox

Chaoqiang Fu, Daofeng Li, Guoxiong Huang and Wanjing Lu

60
Round-Optimal Threshold Blind Signature from Lattices

Haoqi Zhang, Qinyi Li, Leo Yu Zhang and Hui Tian

61
Scrutinising Parametric Distance Verification in Unlearning: A Coupling Perspective

Jingming Dai, Lulu Xue, Jintian Ji, Yanjun Zhang, Shengshan Hu and Leo Yu Zhang

62
Seeing Data Rights: Understanding of Pictograms and Color Cues for Privacy and Complex Data Practices

Kira Mennerich, Mia Catharina Chrambach, Maya Laura Gohres, Omed Abed, Patrick-Benjamin Bök and Matteo Große-Kampmann

63
ShellMamba: Anomaly Detection of Shell Command Sequences

Qiwei Zong, Yongqiang Dong, Shishun Zhu and Xingshen Wei

64
SoK: Telemetry-Aware Runtime Assurance for Always-On On-Device Intrusion Detection

Nuonan Ouyang, Adrian Shatte, Zhigang Lu, Chao Chen and Wei Xiang

65
SoK: The Cryptanalysis of SHA-3 Standard

Hailun Yan, Anze Sun, Jiahao Wang and Zheng Li

66
SpecGate: Spectral Decomposition and LOF-Gated Aggregation for Defending Against Backdoor Attacks in Federated Learning

Wenxiu Wu, Haiyong Bao, Menghong Guan, Jiaan Jiang, Hong-Ning Dai and Cheng Huang

67
ST-Attention-XAI: Intrinsic Spatio-Temporal Explainability for IoT Intrusion Detection via Attention Analysis

Nimesha Dilini, Nan Sun, Yuantian Miao and Nour Moustafa

68
Threshold FHE with Short Decryption Shares without a Semi-trusted Server

Hiroki Okada and Tsuyoshi Takagi

69
Understanding the Security of Cloud Storage Services: A Case Study and UC-Secure Design

Pengfei Wu, Yuxian Li, Lisha Yao, Xiaoguo Li, Guomin Yang, Tao Xiang and Robert H. Deng

70
Verifiable Anomaly and Similarity Detection Using Matrix Profile in Private Time-series

Xavier Bultel, Charlène Jojon, Benjamin Nguyen and Haoying Zhang


Industry Track

1
6Digger: An IPv6 Target Generation Algorithm Based on Address Pattern Mining

Hongtao Zhang, Luyang Li, Liancheng Zhang, Shunlong Hao, Haojie Zhu, Ce Sun and Yangxiang Zhou

2
BRACE: Risk-Driven Dynamic Threshold Authorization for Cross-Chain Bridges

Zhongyuan Yuan, Qi Xia, Jianbin Gao and Hu Xia

3
Breaking and Fixing Spoed

Yan Jia, Peng Wang, Lei Hu, Gang Liu, Tingting Guo and Shuping Mao

4
CP-SpartanDL: An Efficient CP-zkSNARK in The Discrete Log Setting

Xuangang Yan, Zibo Zhou and Zongyang Zhang

5
Decentralized Biometric Authentication via Threshold-Based Key Derivation

Haoze Cheng, Hui Cui and James Boorman

6
Efficient Homomorphic String Search via TFHE

Shintaro Narisada, Hiroki Okada, Takashi Nishide and Kazuhide Fukushima

7
FedSOAR: Robust Federated Learning via Dual-Metric Graph Topology and Directional Alignment

Yanyu Tong, Changrui Zheng, Wenye Xing and Jiageng Chen

8
Hiding the Heartbeat: $\mathcal{O}(1)$ Privacy-Preserving Proof of Aliveness for Critical IoT

Harishma Boyapally and Jianying Zhou

9
Physics-Informed Residual Learning for Channel-Robust LoRa Radio Frequency Fingerprinting

Elisée Toe, Laurent Ferrier and Fehmi Jaafar

10
Privacy Risk Assessment Framework for Information System

Raisa Islam and Dongwan Shin

11
SGX-QKMS: Remotely Attested Key Relaying in Quantum Key Distribution Networks

Krišjānis Petručeņa, Sergejs Kozlovičs, Juris Vīksna, Elīna Kalniņa, Edgars Celms, Edgars Rencis, Rihards Balodis and Ināra Opmane

12
SoK: A Comprehensive Security Analysis of Jailbreak Resilience in GPT and DeepSeek Models

Xiaodong Wu, Xiangman Li, Qi Li, Lingshuang Liu and Jianbing Ni

13
$\Sigma$-Orchestra: A Harmonized Lattice-based $\Sigma$-Protocol for Polynomial Relations with Exact $\ell_2$-Soundness

Lizhen Zhang, Shang Gao and Bin Xiao

14
The Related Key Boomerang Attack on ChaCha Permutation Function

Nasratullah Ghafoori and Atsuko Miyaji