https://www.usenix.org/conference/usenixsecurity25
August 13–15, 2025
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience https://www.usenix.org/conference/usenixsecurity25/presentation/su-yuan Yuan Su, Xi'an Jiaotong University; Yuan Lu, Institute of Software Chinese Academy of Sciences; Jiliang Li, Xi'an Jiaotong University; Yuyi Wang, CRRC Zhuzhou Institute; Chengyi Dong, Xi'an Jiaotong University; Qiang Tang, The University of Sydney
FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC https://www.usenix.org/conference/usenixsecurity25/presentation/su-zhengyuan Zhengyuan Su, Tsinghua University; Qi Pang, Simon Beyzerov, and Wenting Zheng, Carnegie Mellon University
MAESTRO: Multi-Party AES Using Lookup Tables https://www.usenix.org/conference/usenixsecurity25/presentation/morita Hiraku Morita, Aarhus University and University of Copenhagen; Erik Pohle, COSIC, KU Leuven; Kunihiko Sadakane, The University of Tokyo; Peter Scholl, Aarhus University; Kazunari Tozawa, The University of Tokyo; Daniel Tschudi, Concordium and Eastern Switzerland University of Applied Sciences (OST)
Efficient 2PC for Constant Round Secure Equality Testing and Comparison https://www.usenix.org/conference/usenixsecurity25/presentation/lu Tianpei Lu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Xin Kang, Xidian University; Bingsheng Zhang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security; Zhuo Ma, Xidian University; Xiaoyuan Zhang, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Yang Liu, Xidian University; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University
Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions https://www.usenix.org/conference/usenixsecurity25/presentation/dong-minglang Minglang Dong, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Yujie Bai and Yu Chen, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University
Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation https://www.usenix.org/conference/usenixsecurity25/presentation/liu-xuanming Xuanming Liu, Zhelei Zhou, and Yinghao Wang, Zhejiang University; Yanxin Pang, Tsinghua University; Jinye He, University of Virginia; Bingsheng Zhang and Xiaohu Yang, Zhejiang University; Jiaheng Zhang, National University of Singapore
zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference https://www.usenix.org/conference/usenixsecurity25/presentation/qu-zkgpt Wenjie Qu, National University of Singapore; Yijun Sun, Hong Kong University of Science and Technology; Xuanming Liu, Tao Lu, and Yanpei Guo, National University of Singapore; Kai Chen, Hong Kong University of Science and Technology; Jiaheng Zhang, National University of Singapore
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers https://www.usenix.org/conference/usenixsecurity25/presentation/hu-yuncong Yuncong Hu, Shanghai Jiao Tong University; Pratyush Mishra, University of Pennsylvania; Xiao Wang, Northwestern University; Jie Xie, Shanghai Jiao Tong University; Kang Yang, State Key Laboratory of Cryptology; Yu Yu, Shanghai Jiao Tong University and Shanghai Qi Zhi Institute; Yuwen Zhang, University of California, Berkeley
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice https://www.usenix.org/conference/usenixsecurity25/presentation/liang-sok Junkai Liang and Daqi Hu, Peking University; Pengfei Wu, Singapore Management University; Yunbo Yang, East China Normal University; Qingni Shen and Zhonghai Wu, Peking University
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup https://www.usenix.org/conference/usenixsecurity25/presentation/wang-nan Nan Wang, CSIRO's Data61, Australia; Qianhui Wang, University of Cambridge; Dongxi Liu, CSIRO's Data61, Australia; Muhammed F. Esgin, Monash University; Alsharif Abuadbba, CSIRO's Data61, Australia
PolySys: an Algebraic Leakage Attack Engine https://www.usenix.org/conference/usenixsecurity25/presentation/espiritu Zachary Espiritu, MongoDB Research; Seny Kamara, Brown University and MongoDB Research; Tarik Moataz, MongoDB Research; Andrew Park, Carnegie Mellon University and MongoDB Research
Distributional Private Information Retrieval https://www.usenix.org/conference/usenixsecurity25/presentation/lehmkuhl Ryan Lehmkuhl, Alexandra Henzinger, and Henry Corrigan-Gibbs, MIT
Practical Keyword Private Information Retrieval from Key-to-Index Mappings https://www.usenix.org/conference/usenixsecurity25/presentation/hao Meng Hao, School of Computing & Information Systems, Singapore Management University; Weiran Liu and Liqiang Peng, Alibaba Group; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Pengfei Wu, School of Computing & Information Systems, Singapore Management University; Lei Zhang, Alibaba Group; Hongwei Li, Peng Cheng Laboratory; Robert H. Deng, School of Computing & Information Systems, Singapore Management University
SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference https://www.usenix.org/conference/usenixsecurity25/presentation/guo-hao-seaf Hao Guo and Zhaoqian Liu, The Chinese University of Hong Kong, Shenzhen; Ximing Fu, Harbin Institute of Technology, Shenzhen; Pengcheng Laboratory; Key Laboratory of Cyberspace and Data Security, Ministry of Emergency Management; Zhusen Liu, Hangzhou Innovation Institute of Beihang University
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios https://www.usenix.org/conference/usenixsecurity25/presentation/tu Binbin Tu and Yujie Bai, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University; Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University; Yang Cao and Yu Chen, School of Cyber Science and Technology, Shandong University; Quan Cheng Laboratory; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention https://www.usenix.org/conference/usenixsecurity25/presentation/bormet Jan Bormet, Sebastian Faust, Hussien Othman, and Ziyan Qu, Technische Universität Darmstadt
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption https://www.usenix.org/conference/usenixsecurity25/presentation/choudhuri Arka Rai Choudhuri, Nexus; Sanjam Garg and Guru Vamsi Policharla, University of California, Berkeley; Mingyuan Wang, NYU Shanghai
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs https://www.usenix.org/conference/usenixsecurity25/presentation/guo-yanpei Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, and Jiaheng Zhang, National University of Singapore
Hobbit: Space-Efficient zkSNARK with Optimal Prover Time https://www.usenix.org/conference/usenixsecurity25/presentation/pappas Christodoulos Pappas and Dimitrios Papadopoulos, The Hong Kong University of Science and Technology
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization https://www.usenix.org/conference/usenixsecurity25/presentation/lafourcade Pascal Lafourcade and Dhekra Mahmoud, Université Clermont Auvergne, CNRS, Clermont Auvergne INP, Mines Saint-Etienne, LIMOS, 63000 Clermont-Ferrand, France; Sylvain Ruhault and Abdul Rahman Taleb, Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI), France
Improved Secure Two-party Computation from a Geometric Perspective https://www.usenix.org/conference/usenixsecurity25/presentation/guo-hao-improved Hao Guo, School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen; Liqiang Peng, Alibaba Group; Haiyang Xue, Singapore Management University; Li Peng and Weiran Liu, Alibaba Group; Zhe Liu, Zhejiang Lab; Lei Hu, Institute of Information Engineering, Chinese Academy of Sciences
Secure Caches for Compartmentalized Software https://www.usenix.org/conference/usenixsecurity25/presentation/arikan Kerem Arıkan, Huaxin Tang, Williams Zhang Cen, and Yu David Liu, Binghamton University; Nael Abu-Ghazaleh, University of California, Riverside; Dmitry Ponomarev, Binghamton University
zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks https://www.usenix.org/conference/usenixsecurity25/presentation/shih Maurice Shih, Michael Rosenberg, and Hari Kailad, University Of Maryland; Ian Miers, University of Maryland
A Formal Analysis of Apple's iMessage PQ3 Protocol https://www.usenix.org/conference/usenixsecurity25/presentation/linker Felix Linker, Ralf Sasse, and David Basin, ETH Zurich
Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict https://www.usenix.org/conference/usenixsecurity25/presentation/lin-zhengyao Zhengyao Lin, Michael McLoughlin, and Pratap Singh, Carnegie Mellon University; Rory Brennan-Jones, University of Rochester; Paul Hitchcox, Carnegie Mellon University; Joshua Gancher, Northeastern University; Bryan Parno, Carnegie Mellon University
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics https://www.usenix.org/conference/usenixsecurity25/presentation/chen-haobin Haobin Hiroki Chen and Hongbo Chen, Indiana University Bloomington; Mingshen Sun, Independent Researcher; Chenghong Wang, Indiana University Bloomington; XiaoFeng Wang, Nanyang Technological University
OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries https://www.usenix.org/conference/usenixsecurity25/presentation/singh Pratap Singh, Carnegie Mellon University; Joshua Gancher, Northeastern University; Bryan Parno, Carnegie Mellon University
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking https://www.usenix.org/conference/usenixsecurity25/presentation/ortega-perez Carolina Ortega Pérez and Alaa Daffalla, Cornell University; Thomas Ristenpart, Cornell Tech
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable https://www.usenix.org/conference/usenixsecurity25/presentation/hashimoto-blocklistable Keitaro Hashimoto, National Institute of Advanced Industrial Science and Technology (AIST); Shuichi Katsumata, National Institute of Advanced Industrial Science and Technology (AIST) and PQShield; Guillermo Pascual-Perez, Institute of Science and Technology Austria (ISTA)
How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol https://www.usenix.org/conference/usenixsecurity25/presentation/auerbach Benedikt Auerbach, PQShield; Yevgeniy Dodis and Daniel Jost, New York University; Shuichi Katsumata, PQShield and AIST; Rolfe Schmidt, Signal Messenger
S/MINE: Collecting and Analyzing S/MIME Certificates at Scale https://www.usenix.org/conference/usenixsecurity25/presentation/oendaroe Gurur Öndarö and Jonas Kaspereit, Münster University of Applied Sciences; Samson Umezulike, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Christoph Saatjohann, Münster University of Applied Sciences; Fabian Ising, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE; Sebastian Schinzel, Münster University of Applied Sciences, Fraunhofer SIT and National Research Center for Applied Cybersecurity ATHENE
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer https://www.usenix.org/conference/usenixsecurity25/presentation/liang-achilles Junkai Liang, Peking University; Zhi Zhang, The University of Western Australia; Xin Zhang and Qingni Shen, Peking University; Yansong Gao, The University of Western Australia; Xingliang Yuan, The University of Melbourne; Haiyang Xue and Pengfei Wu, Singapore Management University; Zhonghai Wu, Peking University
Bundled Authenticated Key Exchange: A Concrete Treatment of Signal's Handshake Protocol and Post-Quantum Security https://www.usenix.org/conference/usenixsecurity25/presentation/hashimoto-key-exchange Keitaro Hashimoto, National Institute of Advanced Industrial Science and Technology (AIST); Shuichi Katsumata, National Institute of Advanced Industrial Science and Technology (AIST) and PQShield; Thom Wiggers, PQShield
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures https://www.usenix.org/conference/usenixsecurity25/presentation/katsumata Shuichi Katsumata, PQShield & AIST; Guilhem Niot, PQShield & Univ Rennes, CNRS, IRISA; Ida Tucker and Thom Wiggers, PQShield
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling https://www.usenix.org/conference/usenixsecurity25/presentation/wang-yaofei Yaofei Wang, Hefei University of Technology; Gang Pei, Hefei University Of Technology; Kejiang Chen and Jinyang Ding, University of Science and Technology of China; Chao Pan, Weilong Pang, and Donghui Hu, Hefei University of Technology; Weiming Zhang, University of Science and Technology of China
A Framework for Designing Provably Secure Steganography https://www.usenix.org/conference/usenixsecurity25/presentation/liao Guorui Liao, Jinshuai Yang, Weizhi Shao, and Yongfeng Huang, Tsinghua University
Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV https://www.usenix.org/conference/usenixsecurity25/presentation/vos Jelle Vos, Delft University of Technology; Mauro Conti, University of Padua & Delft University of Technology; Zekeriya Erkin, Delft University of Technology
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity https://www.usenix.org/conference/usenixsecurity25/presentation/chang-yijia-encryption Yijia Chang, The Hong Kong University of Science and Technology; Songze Li, Southeast University
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell https://www.usenix.org/conference/usenixsecurity25/presentation/legiest Wouter Legiest and Jan-Pieter D'Anvers, COSIC, KU Leuven; Bojan Spasic and Nam-Luc Tran, Society for Worldwide Interbank Financial Telecommunication (Swift); Ingrid Verbauwhede, COSIC, KU Leuven
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption https://www.usenix.org/conference/usenixsecurity25/presentation/bian Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, and Yunhao Fu, Beihang University; Jiafeng Hua, Huawei Technology; Yi Chen and Bo Zhang, Beijing Academy of Blockchain and Edge Computing; Yier Jin, University of Science and Technology of China; Jin Dong, Beijing Academy of Blockchain and Edge Computing; Zhenyu Guan, Beihang University
Qelect: Lattice-based Single Secret Leader Election Made Practical https://www.usenix.org/conference/usenixsecurity25/presentation/wang-yunhao Yunhao Wang and Fan Zhang, Yale University
GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection https://www.usenix.org/conference/usenixsecurity25/presentation/mankali Lakshmi Likhitha Mankali and Mohammed Nabeel, Tandon School of Engineering, New York University; Faiq Raees, New York University; Michail Maniatakos, Ozgur Sinanoglu, and Johann Knechtel, New York University Abu Dhabi
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM https://www.usenix.org/conference/usenixsecurity25/presentation/zheng Leqian Zheng, City University of Hong Kong; Zheng Zhang, ByteDance Inc.; Wentao Dong, City University of Hong Kong; Yao Zhang and Ye Wu, ByteDance Inc.; Cong Wang, City University of Hong Kong
OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments https://www.usenix.org/conference/usenixsecurity25/presentation/mavrogiannakis Apostolos Mavrogiannakis, University of California, Santa Cruz; Xian Wang, The Hong Kong University of Science and Technology; Ioannis Demertzis, University of California, Santa Cruz; Dimitrios Papadopoulos, The Hong Kong University of Science and Technology; Minos Garofalakis, ATHENA Research Center and Technical University of Crete
Efficient Ranking, Order Statistics, and Sorting under CKKS https://www.usenix.org/conference/usenixsecurity25/presentation/mazzone Federico Mazzone, University of Twente; Maarten Everts, University of Twente and Linksight; Florian Hahn, University of Twente; Andreas Peter, Carl von Ossietzky Universität Oldenburg
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain https://www.usenix.org/conference/usenixsecurity25/presentation/he-zheyuan Zheyuan He, University of Electronic Science and Technology of China; Zihao Li, The Hong Kong Polytechnic University; Jiahao Luo, University of Electronic Science and Technology of China; Feng Luo, The Hong Kong Polytechnic University; Junhan Duan, Carnegie Mellon University; Jingwei Li and Shuwei Song, University of Electronic Science and Technology of China; Xiapu Luo, The Hong Kong Polytechnic University; Ting Chen and Xiaosong Zhang, University of Electronic Science and Technology of China
Blockchain Address Poisoning https://www.usenix.org/conference/usenixsecurity25/presentation/tsuchiya Taro Tsuchiya and Jin-Dong Dong, Carnegie Mellon University; Kyle Soska, Independent; Nicolas Christin, Carnegie Mellon University
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-mingfei Mingfei Zhang, Shandong University; Rujia Li, Tsinghua University; Xueqian Lu, Independent Reseacher; Sisi Duan, Tsinghua University
Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem https://www.usenix.org/conference/usenixsecurity25/presentation/ruaro Nicola Ruaro, Fabio Gritti, Dongyu Meng, and Robert McLaughlin, University of California, Santa Barbara; Ilya Grishchenko, University of Toronto; Christopher Kruegel and Giovanni Vigna, University of California, Santa Barbara
Voting-Bloc Entropy: A New Metric for DAO Decentralization https://www.usenix.org/conference/usenixsecurity25/presentation/fabrega-entropy Andres Fabrega, Cornell University; Amy Zhao, IC3; Jay Yu, Stanford University; James Austgen, Cornell Tech; Sarah Allen, IC3 and Flashbots; Kushal Babel, Cornell Tech and IC3; Mahimna Kelkar, Cornell Tech; Ari Juels, Cornell Tech and IC3
Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue https://www.usenix.org/conference/usenixsecurity25/presentation/heimbach Lioba Heimbach and Yann Vonlanthen, ETH Zurich; Juan Villacis, University of Bern; Lucianna Kiffer, IMDEA Networks; Roger Wattenhofer, ETH Zurich
Let's Move2EVM https://www.usenix.org/conference/usenixsecurity25/presentation/benetollo Lorenzo Benetollo, Ca' Foscari University of Venice, University of Camerino, and Christian Doppler Laboratory Blockchain Technologies for the Internet of Things; Andreas Lackner, TU Wien; Matteo Maffei and Markus Scherer, TU Wien and Christian Doppler Laboratory Blockchain Technologies for the Internet of Things
Ghost Clusters: Evaluating Attribution of Illicit Services through Cryptocurrency Tracing https://www.usenix.org/conference/usenixsecurity25/presentation/lubbertsen Kelvin Lubbertsen, Michel van Eeten, and Rolf van Wegberg, Delft University of Technology
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer https://www.usenix.org/conference/usenixsecurity25/presentation/ma-zuchao Zuchao Ma, Muhui Jiang, Feng Luo, and Xiapu Luo, The Hong Kong Polytechnic University; Yajin Zhou, Zhejiang University
CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts https://www.usenix.org/conference/usenixsecurity25/presentation/pan-yu Yu Pan and Wanjing Han, University of Utah; Yue Duan, Singapore Management University; Mu Zhang, University of Utah
On the Atomicity and Efficiency of Blockchain Payment Channels https://www.usenix.org/conference/usenixsecurity25/presentation/wu-di Di Wu, Shoupeng Ren, and Yuman Bai, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Lipeng He, University of Waterloo; Jian Liu, The State Key Laboratory of Blockchain and Data Security, Zhejiang University; Wu Wen, International Business School, Zhejiang University; Kui Ren and Chun Chen, The State Key Laboratory of Blockchain and Data Security, Zhejiang University
Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges https://www.usenix.org/conference/usenixsecurity25/presentation/xiao-danlei Danlei Xiao, Chuan Zhang, and Haotian Deng, Beijing Institute of Technology; Jinwen Liang, The Hong Kong Polytechnic University; Licheng Wang and Liehuang Zhu, Beijing Institute of Technology
Automated Soundness and Completeness Vetting of Polygon zkEVM https://www.usenix.org/conference/usenixsecurity25/presentation/peng-xinghao Xinghao Peng, The Hong Kong Polytechnic University; Zhiyuan Sun, The Hong Kong Polytechnic University and Southern University of Science and Technology; Kunsong Zhao, Zuchao Ma, Zihao Li, Jinan Jiang, and Xiapu Luo, The Hong Kong Polytechnic University; Yinqian Zhang, Southern University of Science and Technology
Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus https://www.usenix.org/conference/usenixsecurity25/presentation/li-rujia Rujia Li, Tsinghua University; Jingyuan Ding, Shandong University; Qin Wang, CSIRO Data61; Keting Jia, Tsinghua University; Haibin Zhang, Yangtze Delta Region Institute of Tsinghua University; Sisi Duan, Tsinghua University
Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-bosi Bosi Zhang, Huazhong University of Science and Technology; Ningyu He, The Hong Kong Polytechnic University; Xiaohui Hu, Kai Ma, and Haoyu Wang, Huazhong University of Science and Technology
Recover from Excessive Faults in Partially-Synchronous BFT SMR https://www.usenix.org/conference/usenixsecurity25/presentation/gong-tiantian Tiantian Gong and Gustavo Franco Camilo, Purdue University; Kartik Nayak, Duke University; Andrew Lewis-Pye, London School of Economics; Aniket Kate, Purdue University and Supra Research
TockOwl: Asynchronous Consensus with Fault and Network Adaptability https://www.usenix.org/conference/usenixsecurity25/presentation/li-minghang Minghang Li and Qianhong Wu, Beihang University; Zhipeng Wang, Imperial College London; Bo Qin, Renmin University of China; Bohang Wei, Hang Ruan, Shihong Xiong, and Zhenyang Ding, Beihang University
Thunderdome: Timelock-Free Rationally-Secure Virtual Channels https://www.usenix.org/conference/usenixsecurity25/presentation/avarikioti Zeta Avarikioti, TU Wien & Common Prefix; Yuheng Wang, TU Wien; Yuyi Wang, CRRC Zhuzhou Institute & Tengen Intelligence Institute