UWA Logo ECU Logo
31st Australasian Conference on Information Security and Privacy
6 - 9 July 2026, Perth, Australia

ACISP 2026

Accepted Papers


Round 1 Submissions

1
Analyzing Forgery Security of LeMac: Tight Bounds and Impact of Padding

Taichi Nagoya, Takuro Shiraya, Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Ryoma Ito, and Takanori Isobe

2
Automated Tool for Finding Practical Collisions on SPN-based Hash Functions

Keita Toyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Kodai Taiyama, and Takanori Isobe

3
CogSpy: Cognition-Driven PIN Inference against Layout-Randomized Soft Keyboards

Chiyu Zhou, Zijian Wan, and Wei Wang

4
Compact All-but-τ Vector Commitments for MPC-in-the-Head Signatures

Lingqing Zhao and Liping Wang

5
Cryptanalytic Extraction of Convolutional Neural Networks

Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, and Wei Wang

6
Detection and Interpretation of Malicious Network Traffic via a novel 8-Channel Image Representation

Zhiqiang Wang, Junlai Luo, Sen Teng, and Sicheng Yuan

7
Efficient Identity-Based Matchmaking Encryption with Enhanced Privacy and Chosen-Ciphertext Security

Qinyi Li, Hao Qin, and Xavier Boyen

8
Efficient Zero Knowledge Proofs for Committed Symmetric Boolean Functions From VOLE-in-the-Head

Ying Ouyang, Zuming Liu, Deng Tang, and Yanhong Xu

9
Enhancing Backdoor Persistence under Uncontrolled Federated Clients: A Bidirectional Adversarial and Redundant Embedding Framework

Lin Wei, Zitao Lyu, Lei Shi, Chengming Liu, and Huijuan Lian

10
Improved Tightly Secure (ID-based) Signatures in the AGM

Yanzibo Zhou, Fuchun Guo, Willy Susilo, and Nan Li

11
Information-Theoretic Privacy for Long-Term Share Storage on Noisy Media

Elmo Huang, Huaxiong Wang, and Kwok Yan Lam

12
Meet-LWE with Hints: Solving Ternary LWE with Information Leakage

Jinzheng Cao, Rongmao Chen, Haodong Jiang, and Qingfeng Cheng

13
Missing the Link? Enhancing the Security of Digital Car Keys With Secure Session Linking and Hardware Trust

Christian Plappert and Daniel Trick

14
Multi-Authority Attribute-Based Anonymous Credentials with Public Traceability and Revocation

Meng Sun, Mingmei Zheng, Junzuo Lai, Chi Wu, and Xiaohan Mo

15
Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models

Haoyun Yang, Ronghong Huang, Yong Fang, Beizeng Zhang, Junpu Guo, Zhanyu Wu, and Xianghang Mi

16
Prompt to Pwn: Automated Exploit Generation for Smart Contracts

Zeke Xiao, Qin Wang, Yuekang Li, and Shiping Chen

17
RC-MDNet: Risk-Controlled Malicious Domain Detection for Open-World Network Security

Yuning Jing

18
Retention-Consistent Concept Unlearning for Diffusion Models

Laiqiao Qin, Tianqing Zhu, Linlin Wang, and Wanlei Zhou

19
Robust Encrypted Video Identification in the Mixed-Segment Era: A Retrieval-Augmented Approach

Jia Yee Tan, Yiqiao Zhou, and Liu Xutong

20
Secure Sealed-bidding Networks via Conditional Time-aware Access Authorization

Qi Liu, Peng Jiang, Yimin Liu, Zhen Zhao, and Liehuang Zhu

21
ServiceChain: A Verifiable Cloud Service Framework for Resource-Constrained Blockchain Nodes

Lin Zhang, Shaowen Yao, Jiayuan Lv, Huajian Yu, and Hongxing Xu

22
Shielding MCP Tool: A Secure Execution Framework using TEE and Automated Trimming

Ruidong Han, Chengyan Ma, Ye Liu, Yuqing Niu, and David Lo

23
ST-Mamba: Spatio-temporal Feature-Based Encrypted Traffic Analysis Using Mamba Network

Jiangwen Zhu, Mingrui Fan, Ruohan Cao, Jinxin Zuo, and Yueming Lu

24
The Dark Side of Upgrades: Uncovering Insecurity in Smart Contract Upgrades

Dingding Wang, Jianting He, Siwei Wu, Yajin Zhou, Lei Wu, and Cong Wang

25
TIDE: Making Task-Agnostic Backdoors Harder to Erase in Pre-trained Language Models

Yan Meng, Zhigang Lu, Bing Li, Anan Du, and Shuchao Pang

26
Towards Public Tracing: Collaborative Traceable Secret Sharing

Pousali Dey, Rittwik Hajra, Subha Kar, and Soumit Pal

27
Transparent Fully Batchable Polynomial Commitment with Application to Scalable VSS

Xiangyu Kong, Min Zhang, and Yu Chen