Main Track
| Title | Authors | 
| Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles | Ding, Wenbo (University at Buffalo); Liao, Song (Clemson University); Cheng, Long (Clemson University); Zhao, Ziming (University at Buffalo); Guo, Keyan (University at Buffalo); Hu, Hongxin (University at Buffalo) | 
| Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles | Dafoe, Josh (Michigan Technological University); Singh, Harsh (Michigan Technological University); Chen, Niusen (Michigan Technological University); Chen, Bo (Michigan Technological University) | 
| mmFingerprint: A New Application Fingerprinting Technique via mmWave Sensing and Its Use in Rowhammer Detection | Liang, Sisheng (Clemson University); Li, Zhengxiong (University of Colorado Denver); Jiang, Chenxu (Clemson University); Guo, Linke (Clemson University); Zhang, Zhenkai (Clemson University) | 
| ADC-Bank: Detecting Acoustic Out-of-Band Signal Injection on Inertial Sensors | Zhang, Jianyi (Beijing Electronic Science and Technology Institute); Wang, Yuchen (Academy of Information and Communications Technology (CAICT)); Tu, Yazhou (University of Louisiana at Lafayette); Rampazzi, Sara (University of Florida); Lin, Zhiqiang (Ohio State University); Lee, Insup (UPenn); Hei, Xiali (University of Louisiana at Lafayette) | 
| Fingerprinting Encrypted Traffc of IoT Cloud Platform | Zheng, Bing (Xidian University); Wang, He (Xidian University) | 
| Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems | Amar, Michael (Ben Gurion University of the Negev); Navanesan, Lojenaa (University of Colombo); Sayakkara, Asanka Priyadarshana (University of Colombo); Oren, Yossi (Ben-Gurion University of the Negev) | 
Invited Track
| Title | Authors | 
| An Efficient and Smooth Path Planner Based on Hybrid A* Search and Frenet Frame | Wang, Pin-Wen (National Taiwan University); Tseng, Yi-Chi (National Taiwan University); Lin, Chung-Wei (National Taiwan University) | 
| Application of Large Language Models to DDoS Attack Detection | Guastalla, Michael (University of Southern California); Li, Yiyi (University of Southern California); Hekmati, Arvin (University of Southern California); Krishnamachari, Bhaskar (Univerisity of Southern California) | 
| Embracing Semi-Supervised Domain Adaptation for Federated Knowledge Transfer | Das, Madhureeta (Michigan Technological University); Liu, Zhen (Michigan Technological University); Chen, Xianhao (University of Hong Kong); Yuan, Xiaoyong (Michigan Technological University); Zhang, Lan (Michigan Technological University) | 
| Lightweight Reputation System for UAV Networks | Ogunbunmi, Simeon (Binghamton University); Hatmai, Mohsen (Binghamton University); Xu, Ronghua (Michigan Technological University); Chen, Yu (Binghamton University); Blasch, Erik (AFRL); Ardiles-Cruz, Erika (AFRL); Chen, Genshe (Intelligent Fusion Technology, Inc.) | 
| Resilient Range-only Cooperative Positioning of Multiple Smart Unmanned Aerial Systems | Bao, Yajie (Intelligent Fusion Technology, Inc.); Shen, Dan (Intelligent Fusion Technology, Inc.); Chen, Genshe (Intelligent Fusion Technology, Inc.); Pham, Khanh (Air Force Research Laboratory); Blasch, Erik (Air Force Office of Scientific Research) | 
| Securing the Future: Exploring Privacy Risks and Security Questions in Robotic Systems | Afroze, Diba (University of Louisiana at Lafayette); Tu, Yazhou (University of Louisiana at Lafayette); Hei, Xiali (University of Louisiana at Lafayette) | 
 
					