default search action
29th CCS 2022: Los Angeles, CA, USA
- Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. ACM 2022, ISBN 978-1-4503-9450-5
Keynote Talks
- Srinivas Devadas, Simon Langowski, Nikola Samardzic, Sacha Servan-Schreiber, Daniel Sánchez:
Designing Hardware for Cryptography and Cryptography for Hardware. 1-4 - Michelle L. Mazurek:
We Are the Experts, and We Are the Problem: The Security Advice Fiasco. 7 - Patrick Drew McDaniel:
Sustainability is a Security Problem. 9-10
Full Papers
- Calvin Abou Haidar, Benoît Libert, Alain Passelègue:
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security. 11-22 - Shubham Agarwal:
Helping or Hindering?: How Browser Extensions Undermine Security. 23-37 - Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav:
Practical, Round-Optimal Lattice-Based Blind Signatures. 39-53 - Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu:
Blacktooth: Breaking through the Defense of Bluetooth in Silence. 55-68 - Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. 69-82 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya:
Enforcing Fine-grained Constant-time Policies. 83-96 - Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber:
Post Quantum Noise. 97-109 - Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin:
Laconic Private Set-Intersection From Pairings. 111-124 - Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida:
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. 125-138 - Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar:
Chaghri - A FHE-friendly Block Cipher. 139-150 - Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa:
Secure Parallel Computation on Privately Partitioned Data and Applications. 151-164 - Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:
Thora: Atomic and Privacy-Preserving Multi-Channel Updates. 165-178 - Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei:
Sleepy Channels: Bi-directional Payment Channels without Watchtowers. 179-192 - Renas Bacho, Julian Loss:
On the Adaptive Security of the Threshold BLS Signature Scheme. 193-207 - Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal:
Secret-Shared Joins with Multiplicity from Aggregation Trees. 209-222 - Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim:
META-BTS: Bootstrapping Precision Beyond the Limit. 223-234 - Leemon Baird, Pratyay Mukherjee, Rohit Sinha:
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? 235-248 - Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena:
Membership Inference Attacks and Generalization: A Causal Perspective. 249-262 - Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina:
Tidy: Symbolic Verification of Timed Cryptographic Protocols. 263-276 - Anomadarshi Barua, Yonatan Gizachew Achamyeleh, Mohammad Abdullah Al Faruque:
A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music. 277-291 - Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. 293-306 - James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:
Distributed, Private, Sparse Histograms in the Two-Server Model. 307-321 - Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). 323-336 - Alex Berke, Dan Calacci:
Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC. 337-349 - Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz:
JIT-Picking: Differential Fuzzing of JavaScript Engines. 351-364 - Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood:
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. 365-379 - Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas:
Power Contracts: Provably Complete Power Leakage Models for Processors. 381-395 - Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani:
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. 397-410 - Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson:
Victory by KO: Attacking OpenPGP Using Key Overwriting. 411-423 - Duc Bui, Brian Tang, Kang G. Shin:
Do Opt-Outs Really Opt Me Out? 425-439 - Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. 441-454 - Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. 455-469 - Sílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman:
Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It. 471-484 - Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. 485-498 - Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. 499-513 - Zitai Chen, Sam L. Thomas, Flavio D. Garcia:
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. 515-529 - Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
PSI from Ring-OLE. 531-545 - Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. 547-561 - Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira:
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering. 563-577 - Tianshuo Cong, Xinlei He, Yang Zhang:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. 579-593 - Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell:
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. 595-608 - Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle:
Sharp: Short Relaxed Range Proofs. 609-622 - Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye:
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. 623-637 - Siwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang:
VRust: Automated Vulnerability Detection for Solana Smart Contracts. 639-652 - Anders P. K. Dalskov, Daniel Escudero, Ariel Nof:
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. 653-666 - Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. 667-681 - Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi:
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. 683-696 - Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi:
STAR: Secret Sharing for Private Threshold Aggregation Reporting. 697-710 - Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. 711-723 - Paola de Perthuis, David Pointcheval:
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection. 725-737 - Gelei Deng, Guowen Xu, Yuan Zhou, Tianwei Zhang, Yang Liu:
On the (In)Security of Secure ROS2. 739-753 - Jiangyi Deng, Yanjiao Chen, Wenyuan Xu:
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. 755-767 - Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. 769-783 - Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. 785-799 - Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. 801-814 - Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi:
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES. 815-828 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. 829-841 - Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. 843-857 - Christoph Dobraunig, Bart Mennink, Robert Primas:
Leakage and Tamper Resilient Permutation-Based Cryptography. 859-873 - Priyanka Dodia, Mashael AlSabah, Omar Alrawi, Tao Wang:
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection. 875-889 - Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo:
Watch Out for Race Condition Attacks When Using Android External Storage. 891-904 - Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. 905-919 - Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang:
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. 921-935 - Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer:
Poirot: Probabilistically Recommending Protections for the Android Framework. 937-950 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
TurboPack: Honest Majority MPC with Constant Online Communication. 951-964 - Xaver Fabian, Marco Guarnieri, Marco Patrignani:
Automatic Detection of Speculative Execution Combinations. 965-978 - Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. 979-993 - Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu:
NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. 995-1008 - Juanru Fang, Wei Dong, Ke Yi:
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. 1009-1022 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
CINI MINIS: Domain Isolation for Fault and Combined Security. 1023-1036 - Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia:
Adversarial Correctness and Privacy for Probabilistic Data Structures. 1037-1050 - Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti:
LibAFL: A Framework to Build Modular and Reusable Fuzzers. 1051-1065 - Dario Fiore, Ida Tucker:
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. 1067-1080 - Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang:
Minotaur: Multi-Resource Blockchain Consensus. 1095-1108 - Nils Fleischhacker, Mark Simkin, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. 1109-1123 - Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn:
Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats. 1125-1139 - Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. 1141-1155 - Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. 1157-1171 - Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar:
Secure Auctions in the Presence of Rational Adversaries. 1173-1186 - Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang:
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. 1187-1201 - Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang:
Succinct Zero Knowledge for Floating Point Computations. 1203-1216 - Peter Gazi, Ling Ren, Alexander Russell:
Practical Settlement Bounds for Proof-of-Work Blockchains. 1217-1230 - Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui:
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. 1231-1242 - Seyedhamed Ghavamnia, Tapti Palit, Michalis Polychronakis:
C2C: Fine-grained Configuration-driven System Call Filtering. 1243-1257 - Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan:
Foundations of Coin Mixing Services. 1259-1273 - Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran:
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. 1275-1289 - Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero:
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration. 1291-1305 - Floris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida:
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. 1307-1322 - Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. 1323-1335 - Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha:
Proof-of-Possession for KEM Certificates using Verifiable Generation. 1337-1351 - Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. 1353-1366 - Zayd Hammoudeh, Daniel Lowd:
Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation. 1367-1381 - Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu:
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. 1383-1397 - Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest:
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. 1399-1412 - Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:
Behind the Scenes of RPKI. 1413-1426 - Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. 1427-1441 - Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt:
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. 1443-1457 - Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum:
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. 1459-1472 - Jaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee:
SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities. 1473-1487 - Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. 1489-1503 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:
Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model. 1505-1519 - Akira Ito, Rei Ueno, Naofumi Homma:
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. 1521-1535 - Arthur Selle Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, Lisandro Z. Granville:
AI/ML for Network Security: The Emperor has no Clothes. 1537-1551 - Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk:
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. 1553-1567 - Bargav Jayaraman, David Evans:
Are Attribute Inference Attacks Just Imputation? 1569-1582 - Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang:
Cache Refinement Type for Side-Channel Detection of Cryptographic Software. 1583-1597 - Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer:
Evocatio: Conjuring Bug Capabilities from a Single PoC. 1599-1613 - Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. 1615-1629 - Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin:
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. 1631-1645 - Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. 1647-1661 - Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev:
Private and Reliable Neural Network Inference. 1663-1677 - Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. 1679-1693 - Wooseok Kang, Byoungho Son, Kihong Heo:
TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities. 1695-1708 - Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz:
HyperDbg: Reinventing Hardware-Assisted Debugging. 1709-1723 - Assimakis A. Kattis, Konstantin Panarin, Alexander Vlasov:
RedShift: Transparent SNARKs from List Polynomial Commitments. 1725-1737 - Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh:
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. 1739-1752 - Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. 1753-1767 - Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim:
Phishing URL Detection: A Network-based Approach Robust to Evasion. 1769-1782 - Kamil Kluczniak:
NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. 1783-1797 - David Knichel, Amir Moradi:
Low-Latency Hardware Private Circuits. 1799-1812 - Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. 1813-1827 - Evgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas:
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption. 1829-1842 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
PentaGOD: Stepping beyond Traditional GOD with Five Parties. 1843-1856 - James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson:
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. 1857-1870 - Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic:
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing. 1871-1885 - Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. 1887-1900 - Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang:
PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. 1901-1915 - Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Auditing Membership Leakages of Multi-Exit Networks. 1917-1931 - Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee:
Overo: Sharing Private Audio Recordings. 1933-1946 - Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang:
InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution. 1947-1961 - Zhenpeng Lin, Yuhang Wu, Xinyu Xing:
DirtyCred: Escalating Privilege in Linux Kernel. 1963-1976 - Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel:
Frequency Throttling Side-Channel Attack. 1977-1991 - Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang:
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. 1993-2007 - Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. 2009-2023 - Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. 2025-2039 - Jing Liu, Liang Feng Zhang:
Matproofs: Maintainable Matrix Commitment with Efficient Aggregation. 2041-2054 - Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao:
Harnessing Perceptual Adversarial Patches for Crowd Counting. 2055-2069 - Yinxi Liu, Wei Meng:
Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities. 2071-2084 - Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang:
Membership Inference Attacks by Exploiting Loss Trajectory. 2085-2098 - Yulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, Yinhong Zhao:
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. 2099-2113 - Yupei Liu, Jinyuan Jia, Hongbin Liu, Neil Zhenqiang Gong:
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning. 2115-2128 - Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo:
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. 2129-2143 - Jie Lu, Haofeng Li, Chen Liu, Lian Li, Kun Cheng:
Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems. 2145-2158 - Yuan Lu, Zhenliang Lu, Qiang Tang:
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. 2159-2173 - Changhua Luo, Penghui Li, Wei Meng:
TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. 2175-2188 - Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang:
Proving UNSAT in Zero Knowledge. 2203-2217 - Qiyao Luo, Yilei Wang, Ke Yi:
Frequency Estimation in the Shuffle Model with Almost a Single Message. 2219-2232 - Xinjian Luo, Yangfan Jiang, Xiaokui Xiao:
Feature Inference Attack on Shapley Values. 2233-2247 - Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha:
Federated Boosted Decision Trees with Differential Privacy. 2249-2263 - Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. 2265-2278 - Allen Mi, Shuwen Deng, Jakub Szefer:
Securing Reset Operations in NISQ Quantum Computers. 2279-2293 - Atsuki Momose, Ling Ren:
Constant Latency in Sleepy Consensus. 2295-2308 - Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:
Physical Hijacking Attacks against Object Trackers. 2309-2322 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. 2323-2336 - Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
CERBERUS: Exploring Federated Prediction of Security Events. 2337-2351 - Zachary Newman, John Speed Meyers, Santiago Torres-Arias:
Sigstore: Software Signing for Everybody. 2353-2367 - Trung Tin Nguyen, Michael Backes, Ben Stock:
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. 2369-2383 - Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang:
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. 2385-2399 - ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. 2401-2414 - Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. 2415-2428 - Dario Pasquini, Danilo Francati, Giuseppe Ateniese:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. 2429-2443 - Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan:
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. 2445-2458 - Tamjid Al Rahat, Yu Feng, Yuan Tian:
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. 2459-2473 - Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, Jun Han:
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals. 2475-2489 - Doreen Riepel, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. 2491-2504 - Srinivasan Raghuraman, Peter Rindal:
Blazing Fast PSI from Improved OKVS and Subfield VOLE. 2505-2517 - Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou:
Strengthening Order Preserving Encryption with Differential Privacy. 2519-2533 - Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten:
EIFFeL: Ensuring Integrity for Federated Learning. 2535-2549 - Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder:
ROAST: Robust Asynchronous Schnorr Threshold Signatures. 2551-2564 - Sajin Sasy, Aaron Johnson, Ian Goldberg:
Fast Fully Oblivious Compaction and Shuffling. 2565-2579 - Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow:
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs. 2581-2594 - Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana:
MC2: Rigorous and Efficient Directed Greybox Fuzzing. 2595-2609 - Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. 2611-2625 - Junxian Shen, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu:
Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing. 2627-2641 - Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. 2643-2657 - Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang:
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. 2659-2673 - Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis:
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. 2675-2688 - Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han:
pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. 2689-2703 - Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias:
Bullshark: DAG BFT Protocols Made Practical. 2705-2718 - Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou:
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. 2719-2733 - Samuel Steffen, Benjamin Bichsel, Martin T. Vechev:
Zapper: Smart Contracts with Data and Identity Privacy. 2735-2749 - Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. 2751-2764 - Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler:
NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. 2765-2778 - Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini:
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets. 2779-2792 - Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro:
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. 2793-2807 - Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. 2809-2823 - Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen:
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. 2825-2839 - Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. 2841-2855 - Xian Wang, Shuang Hao:
Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. 2857-2870 - Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. 2871-2884 - Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang:
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. 2885-2899 - Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang:
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. 2901-2914 - Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. 2915-2929 - Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. 2931-2945 - Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun:
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. 2947-2960 - Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig:
Protecting Critical Inter-Domain Communication through Flyover Reservations. 2961-2974 - Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee:
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. 2975-2988 - Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. 2989-3002 - Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. 3003-3017 - Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. 3019-3032 - Edwin Yang, Qiuye He, Song Fang:
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. 3033-3047 - Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. 3049-3062 - Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. 3063-3077 - Yuqing Yang, Yue Zhang, Zhiqiang Lin:
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. 3079-3092 - Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri:
Enhanced Membership Inference Attacks against Machine Learning Models. 3093-3106 - Zhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang:
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. 3107-3120 - Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin:
Caulk: Lookup Arguments in Sublinear Time. 3121-3134 - Jun Zeng, Chuqi Zhang, Zhenkai Liang:
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. 3135-3149 - Haibin Zhang, Sisi Duan:
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. 3151-3164 - Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. 3165-3179 - Yue Zhang, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. 3181-3194 - Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shifeng Sun, Geng Wang, Dawu Gu:
VOProof: Efficient zkSNARKs from Vector Oracle Compilers. 3195-3208 - Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai:
Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks. 3209-3222 - Ke Zhong, Yiping Ma, Sebastian Angel:
Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. 3223-3237 - Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. 3239-3252 - Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu:
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. 3253-3267 - Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. 3269-3283 - Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian:
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. 3285-3299
Poster Presentations
- Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. 3315-3317 - Akshit Aggarwal, Srinibas Swain:
Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement. 3319-3321 - Lamya Alkhariji, Suparna De, Omer F. Rana, Charith Perera:
Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems. 3323-3325 - Andrea Basso:
Poster: A Post-Quantum Oblivious PRF from Isogenies. 3327-3329 - Andreas Brüggemann, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Poster: Efficient Three-Party Shuffling Using Precomputation. 3331-3333 - Niusen Chen, Josh Dafoe, Bo Chen:
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction. 3335-3337 - Kohei Doi, Takeshi Sugawara:
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection. 3339-3341 - Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek:
Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' Apps. 3343-3345 - Mafalda Ferreira, Tiago Brito, José Fragoso Santos, Nuno Santos:
Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks. 3347-3349 - Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh:
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. 3351-3353 - Roger A. Hallman:
Poster EveGAN: Using Generative Deep Learning for Cryptanalysis. 3355-3357 - Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman:
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System. 3359-3361 - Elias Heftrig, Haya Schulmann, Michael Waidner:
Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. 3363-3365 - Can Huang, Cheng Li, Jiashuo Liang, Xinhui Han:
Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software. 3367-3369 - Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Poster: Vogue: Faster Computation of Private Heavy Hitters. 3371-3373 - Ioannis Kaklamanis, Lei Yang, Mohammad Alizadeh:
Poster: Coded Broadcast for Scalable Leader-Based BFT Consensus. 3375-3377 - Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
Poster MPClan: : Protocol Suite for Privacy-Conscious Computations. 3379-3381 - Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder:
Poster: Patient Community - A Test Bed for Privacy Threat Analysis. 3383-3385 - Kiho Lee, Sanghak Oh, Hyoungshick Kim:
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. 3387-3389 - Levi Taiji Li, Mu Zhang:
Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts. 3391-3393 - Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong:
Poster: Cryptographic Inferences for Video Deep Neural Networks. 3395-3397 - Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? 3399-3401 - Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal:
Poster: Investigating QUIC's Potential Impact on Censorship Circumvention. 3403-3405 - Xiaofeng Lu, Renyu Pang, Pietro Liò:
Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device Authentication. 3407-3409 - Yunpeng Luo, Ziwen Wan, Qi Alfred Chen:
Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications. 3411-3413 - Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. 3415-3417 - Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri:
Poster: Multi-Layer Threat Analysis of the Cloud. 3419-3421 - Donika Mirdita, Haya Schulmann, Michael Waidner:
Poster: RPKI Kill Switch. 3423-3425 - Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:
Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. 3427-3429 - Chuyen Nguyen, Caleb Morgan, Sudip Mittal:
Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. 3431-3433 - Rajvardhan Oak:
Poster - Towards Authorship Obfuscation with Language Models. 3435-3437 - Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon:
Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification. 3439-3441 - Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Poster: A WiFi Vision-based Approach to Person Re-identification. 3443-3445 - Shadi Sadeghpour, Natalija Vlajic:
Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots. 3447-3449 - Mohsen Salehi, Karthik Pattabiraman:
Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded Devices. 3451-3453 - Davide Sanvito, Giuseppe Siracusano, Roberto Gonzalez, Roberto Bifulco:
Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection. 3455-3457 - Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen:
Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection. 3459-3461 - Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger:
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. 3463-3465 - Haya Schulmann, Niklas Vogel, Michael Waidner:
Poster: Insights into Global Deployment of RPKI Validation. 3467-3469 - Haya Schulmann, Michael Waidner:
Poster: DNS in Routers Considered Harmful. 3471-3473 - Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen:
Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation. 3475-3477 - Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen:
Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving. 3479-3481 - Yibo Wang, Yuzhe Tang:
Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution. 3483-3485 - Zi Wang, Yilin Wang, Yingying Chen, Jie Yang:
Poster: Fingerprint-Face Friction Based Earable Authentication. 3487-3489 - Jing Xu, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. 3491-3493 - Yibin Xu, Tijs Slaats, Boris Düdder:
Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit. 3495-3497 - Tarun Kumar Yadav, Justin Hales, Kent E. Seamons:
Poster: User-controlled System-level Encryption for all Applications. 3499-3501 - Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim:
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles. 3503-3505 - Ruiguo Yang, Jiajin Cai, Xinhui Han:
Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules. 3507-3509 - Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman:
Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms. 3511-3513
Demonstrations
- Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Demo: End-to-End Wireless Disruption of CCS EV Charging. 3515-3517 - Thomas Sandholm, Sayandev Mukherjee, Bernardo A. Huberman:
Demo - SPoKE: Secure Polling and Knowledge Exchange. 3519-3521 - Chandra Thapa, Seyit Camtepe, Raj Gaire, Surya Nepal, Seung Ick Jang:
Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. 3523-3525 - Xiangan Tian, Vlasis Koutsos, Lijia Wu, Yijian Wu, Dimitrios Papadopoulos:
Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records. 3527-3529
Pre Conference Workshop Summaries
- Michael Brenner, Anamaria Costache, Kurt Rohloff:
WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 3531-3532 - Earlence Fernandes, Cristina Alcaraz:
CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy. 3533-3534 - Yuan Hong, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. 3535-3537 - Hamed Okhravi, Cliff Wang:
MTD '22: 9th ACM Workshop on Moving Target Defense. 3539-3540 - Marten van Dijk, Francesco Regazzoni:
CCSW '22: The 2022 Cloud Computing Security Workshop. 3541-3542 - Jorge M. Soares, Dawn Song, Marko Vukolic:
ConsensusDay '22: ACM Workshop on Developments in Consensus. 3543-3544
Post Conference Workshop Summaries
- Chip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair:
ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security. 3545-3547 - Ambra Demontis, Xinyun Chen, Florian Tramèr:
AISec '22: 15th ACM Workshop on Artificial Intelligence and Security. 3549-3551 - Golden G. Richard III, Tim Blazytko:
Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks. 3553-3554 - Santiago Torres-Arias, Marcela S. Melara, Laurent Simon:
SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 3555-3556 - Mark Yampolskiy, Moti Yung:
AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security. 3557-3558 - Fan Zhang, Patrick McCorry:
DeFi '22: ACM CCS Workshop on Decentralized Finance and Security. 3559-3560
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.