default search action
30th CCS 2023: Copenhagen, Denmark
- Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023
Session 1: Cryptography for Anonymity
- Alexander Bienstock, Paul Rösler, Yi Tang:
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. 1-15 - Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 16-29 - Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. 30-44 - Julia Kastner, Julian Loss, Omar Renawi:
Concurrent Security of Anonymous Credentials Light, Revisited. 45-59
Session 2: Machine Learning Applications I
- Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. 60-74 - Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen:
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. 75-89 - Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. 90-104 - Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. 105-119
Session 3: Attacks & Threats
- Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. 120-134 - Aviv Yaish, Gilad Stern, Aviv Zohar:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. 135-149 - Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. 150-164 - Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. 165-179
Session 4: Usable Privacy
- Tinhinane Medjkoune, Oana Goga, Juliette Senechal:
Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects. 180-194 - Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz:
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. 195-209 - Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: Towards Informed Consent for Private Computation. 210-224 - Emiram Kablo, Patricia Arias Cabarcos:
Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. 225-238
Session 5: Side-Channels
- Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, Jun Luo:
Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. 239-252 - Tao Ni, Xiaokuan Zhang, Qingchuan Zhao:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. 253-267 - Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 268-280 - Zihao Wang, Jiale Guan, XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Alharbi:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. 281-295
Session 6: Cryptography & DNS
- Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. 296-310 - Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. 311-325 - Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. 326-340 - Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. 341-355
Session 7: Digital Signatures
- Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 356-370 - Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik:
Post Quantum Fuzzy Stealth Signatures and Applications. 371-385 - Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. 386-400 - Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. 401-415
Session 8: Machine Learning Applications II
- Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. 416-430 - Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. 431-445 - Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. 446-459 - Zhiyuan Yu, Shixuan Zhai, Ning Zhang:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. 460-474
Session 9: Consensus Protocols
- Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. 475-489 - Dahlia Malkhi, Atsuki Momose, Ling Ren:
Towards Practical Sleepy BFT. 490-503 - Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 504-518 - Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 519-533
Session 10: Language-Based Security
- Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 534-548 - Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld:
Black Ostrich: Web Application Scanning with String Solvers. 549-563 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
Comparse: Provably Secure Formats for Cryptographic Protocols. 564-578
Session 11: Quantum & Space
- Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. 579-593 - Chuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. 594-607 - Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. 608-621 - Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, Wonsuk Choi:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. 622-635
Session 12: IoT: Attacks, Vulnerabilities, & Everything
- Daniele Antonioli:
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. 636-650 - Yan He, Qiuye He, Song Fang, Yao Liu:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. 651-665 - Mujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain:
Formal Analysis of Access Control Mechanism of 5G Core Network. 666-680 - David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer:
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. 681-695
Session 13: Homomorphic Encryption I
- Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé:
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. 696-710 - Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 711-725 - Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 726-740 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede:
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. 741-755
Session 14: Machine Learning Attacks I
- Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. 756-770 - Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia:
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. 771-785 - Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. 786-800 - Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. 801-814
Session 15: Cryptographic Constructs & Models
- Sisi Duan, Xin Wang, Haibin Zhang:
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. 815-829 - Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. 830-844 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. 845-858 - Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind:
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. 859-873
Session 16: Defenses
- Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee:
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. 874-888 - Martin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, Stefan Mangard:
Cryptographically Enforced Memory Safety. 889-903 - Hanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo, Xiangqun Chen:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. 904-918 - Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. 919-933
Session 17: Secure Hardware
- Qinhan Tan, Yonathan Fisseha, Shibo Chen, Lauren Biernacki, Jean-Baptiste Jeannin, Sharad Malik, Todd M. Austin:
Security Verification of Low-Trust Architectures. 945-959 - Zhenkai Zhang, Tyler N. Allen, Fan Yao, Xing Gao, Rong Ge:
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. 960-974 - Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. 975-989 - Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. 990-1004
Session 18: Traffic Analysis
- Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. 1005-1019 - Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. 1020-1034 - Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Traces. 1035-1049 - Zhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang:
Transformer-based Model for Multi-tab Website Fingerprinting Attack. 1050-1064
Session 19: Advanced Public Key Encryption
- Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi:
Efficient Registration-Based Encryption. 1065-1079 - Matthew Green, Abhishek Jain, Gijs Van Laer:
Efficient Set Membership Encryption and Applications. 1080-1092 - Rachit Garg, George Lu, Brent Waters, David J. Wu:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. 1093-1107 - Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. 1108-1122
Session 20: Machine Learning Attacks II
- Tejas Kannan, Nick Feamster, Henry Hoffmann:
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. 1123-1137 - Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena:
Unforgeability in Stochastic Gradient Descent. 1138-1152 - Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. 1153-1167 - Zhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong:
Evading Watermark based Detection of AI-Generated Content. 1168-1181
Session 21: Defenses & Smart Contract Security
- Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su, Yu Jiang, Jiaguang Sun, Huizhong Li:
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. 1182-1196 - Sven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl:
Fuzz on the Beach: Fuzzing Solana Smart Contracts. 1197-1211 - Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. 1212-1226 - Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. 1227-1241
Session 22: Fuzzing I
- Yinxi Liu, Wei Meng:
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. 1242-1256 - Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. 1257-1271 - Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. 1272-1286 - Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. 1287-1301
Session 23: IoT & Embedded Security
- Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. 1302-1316 - Yi Zhu, Chenglin Miao, Hongfei Xue, Zhengxiong Li, Yunnan Yu, Wenyao Xu, Lu Su, Chunming Qiao:
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving. 1317-1331 - Xi Tan, Ziming Zhao:
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. 1332-1346 - Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. 1347-1361
Session 24: Formal Analysis of Cryptographic Protocols
- Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. 1362-1376 - Linard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller:
A Generic Methodology for the Modular Verification of Security Protocol Implementations. 1377-1391 - Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov:
Provably Unlinkable Smart Card-based Payments. 1392-1406 - Lea Salome Brugger, Laura Kovács, Anja Petkovic Komel, Sophie Rain, Michael Rawson:
CheckMate: Automated Game-Theoretic Security Reasoning. 1407-1421
Session 25: Zero Knowledge Proofs
- Alexandre Belling, Azam Soleimanian, Olivier Bégassat:
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. 1422-1436 - David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. 1437-1451 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. 1452-1466 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 1467-1481
Session 26: Federated Learning
- Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. 1482-1495 - Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. 1496-1510 - Chulin Xie, Yunhui Long, Pin-Yu Chen, Qinbin Li, Sanmi Koyejo, Bo Li:
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks. 1511-1525 - Torsten Krauß, Alexandra Dmitrienko:
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. 1526-1540
Session 27: Interoperability & 2nd Layer Solutions
- Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. 1541-1555 - Andrei Tonkikh, Pavel Ponomarev, Petr Kuznetsov, Yvonne-Anne Pignolet:
CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. 1556-1570 - Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. 1571-1584 - Ertem Nusret Tas, Runchao Han, David Tse, Mingchao Yu:
Interchain Timestamping for Mesh Security. 1585-1599
Session 28: Fuzzing II
- Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen:
Hopper: Interpretative Fuzzing for Libraries. 1600-1614 - Ruijie Meng, George Pîrlea, Abhik Roychoudhury, Ilya Sergey:
Greybox Fuzzing of Distributed Systems. 1615-1629 - Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang:
SyzDirect: Directed Greybox Fuzzing for Linux Kernel. 1630-1644 - Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. 1645-1659
Session 29: Cryptography & Side-Channels
- Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. 1660-1674 - Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. 1675-1689 - Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice:
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. 1690-1704 - Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi:
A Thorough Evaluation of RAMBAM. 1705-1717
Session 30: Information Flow & Differential Privacy
- Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel Henrique Nunes:
A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow. 1718-1731 - McKenna McCall, Abhishek Bichhawat, Limin Jia:
Tainted Secure Multi-Execution to Restrict Attacker Influence. 1732-1745 - Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications. 1746-1760 - Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan, Bishnu Bhusal:
Deciding Differential Privacy of Online Algorithms with Multiple Variables. 1761-1775
Session 31: Cryptography for Blockchains
- Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee:
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. 1776-1790 - Renas Bacho, Julian Loss:
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons. 1791-1804 - Francesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro:
Short Privacy-Preserving Proofs of Liabilities. 1805-1819 - Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang:
The Locality of Memory Checking. 1820-1834
Session 32: Language Models & Verification
- Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr:
Stealing the Decoding Algorithms of Language Models. 1835-1849 - Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza:
Verifiable Learning for Robust Tree Ensembles. 1850-1864 - Jingxuan He, Martin T. Vechev:
Large Language Models for Code: Security Hardening and Adversarial Testing. 1865-1879 - Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang:
Experimenting with Zero-Knowledge Proofs of Training. 1880-1894
Session 33: Differential Privacy
- Johan Lokna, Anouk Paradis, Dimitar I. Dimitrov, Martin T. Vechev:
Group and Attack: Auditing Differential Privacy. 1905-1918 - Ari Biswas, Graham Cormode:
Interactive Proofs For Differentially Private Counting. 1919-1933 - Yuting Liang, Ke Yi:
Concentrated Geo-Privacy. 1934-1948 - Samuel Haney, Michael Shoemate, Grace Tian, Salil P. Vadhan, Andrew Vyrros, Vicki Xu, Wanrong Zhang:
Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters. 1949-1963
Session 34: Kernel & System Calls
- Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis:
SysXCHG: Refining Privilege with Adaptive System Call Filters. 1964-1978 - Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis:
SysPart: Automated Temporal System Call Filtering for Binaries. 1979-1993 - Zhenghao Hu, Sangho Lee, Marcus Peinado:
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis. 1994-2008 - Pansilu Pitigalaarachchi, Xuhua Ding, Haiqing Qiu, Haoxin Tu, Jiaqi Hong, Lingxiao Jiang:
KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. 2009-2023
Session 35: Speculative Execution & Information Flow
- Chongzhou Fang, Ning Miao, Han Wang, Jiacheng Zhou, Tyler Sheaves, John Marty Emmert, Avesta Sasan, Houman Homayoun:
Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links. 2024-2037 - Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices. 2038-2052 - Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher:
Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures. 2053-2067 - Drew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh:
SpecVerilog: Adapting Information Flow Control for Secure Speculation. 2068-2082
Session 36: Verified Cryptographic Implementations
- Sander Huyghebaert, Steven Keuchel, Coen De Roover, Dominique Devriese:
Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts. 2083-2097 - Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira:
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge. 2098-2112 - Yi Zhou, Sydney Gibson, Sarah Cai, Menucha Winchell, Bryan Parno:
Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares. 2113-2127 - Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. 2128-2142
Session 37: Multiparty Computation I
- Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry:
Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFs. 2143-2157 - Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk:
Scalable Multiparty Garbling. 2158-2172 - S. Dov Gordon, Phi Hung Le, Daniel McVicker:
Linear Communication in Malicious Majority MPC. 2173-2187 - Feng-Hao Liu, En Zhang, Leiyong Qin:
Efficient Multiparty Probabilistic Threshold Private Set Intersection. 2188-2201
Session 38: Network Security
- Yue Qin, Yue Xiao, Xiaojing Liao:
Vulnerability Intelligence Alignment via Masked Graph Attention Networks. 2202-2216 - Roman Beltiukov, Wenbo Guo, Arpit Gupta, Walter Willinger:
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems. 2217-2231 - Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran:
MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks. 2232-2246 - Enes Altinisik, Fatih Deniz, Hüsrev Taha Sencar:
ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search. 2247-2261
Session 39: Privacy in Computation
- Chengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, Tianhao Wang:
Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. 2262-2276 - Ji Guan, Wang Fang, Mingyu Huang, Mingsheng Ying:
Detecting Violations of Differential Privacy for Quantum Algorithms. 2277-2291 - Borja Balle, James Bell, Adrià Gascón:
Amplification by Shuffling without Shuffling. 2292-2305 - Shashank Balla, Farinaz Koushanfar:
HELiKs: HE Linear Algebra Kernels for Secure Inference. 2306-2320
Session 40: Medley
- Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. 2321-2335 - Zongjie Li, Chaozheng Wang, Shuai Wang, Cuiyun Gao:
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks. 2336-2350 - Jaehyung Lee, Woosuk Lee:
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting. 2351-2365 - Su Yang, Yang Xiao, Zhengzi Xu, Chengyi Sun, Chen Ji, Yuqing Zhang:
Enhancing OSS Patch Backporting with Semantics. 2366-2380
Session 41: Measuring Security Deployments
- Dhruv Kuchhal, Muhammad Saad, Adam Oest, Frank Li:
Evaluating the Security Posture of Real-World FIDO2 Deployments. 2381-2395 - Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. 2396-2410 - Yue Zhang, Yuqing Yang, Zhiqiang Lin:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. 2411-2425 - Felix Fischer, Jonas Höbenreich, Jens Grossklags:
The Effectiveness of Security Interventions on GitHub. 2426-2440
Session 42: Attacking the Web
- Jianjia Yu, Song Li, Junmin Zhu, Yinzhi Cao:
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation. 2441-2455 - Dominik Trevor Noß, Lukas Knittel, Christian Mainka, Marcus Niemietz, Jörg Schwenk:
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers. 2456-2470 - Chao Wang, Yue Zhang, Zhiqiang Lin:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. 2471-2485 - Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. 2486-2500
Session 43: Multiparty Computation II
- Jakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi:
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. 2501-2515 - Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov:
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs). 2516-2530 - Benjamin Levy, Muhammad Ishaq, Benjamin Sherman, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas:
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation. 2531-2545 - Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel:
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. 2546-2560
Session 44: Machine Learning, Cryptography, & Cyber-Physical Systems
- Atsuki Momose, Sourav Das, Ling Ren:
On the Security of KZG Commitment for VSS. 2561-2575 - Suman Maiti, Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey:
Targeted Attack Synthesis for Smart Grid Vulnerability Analysis. 2576-2590 - Jinwen Wang, Yujie Wang, Ning Zhang:
Secure and Timely GPU Execution in Cyber-physical Systems. 2591-2605 - Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. 2606-2620
Session 45: Privacy in Machine Learning
- Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. 2621-2635 - Hanshen Xiao, Jun Wan, Srinivas Devadas:
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning. 2636-2650 - Xiaochen Zhu, Vincent Y. F. Tan, Xiaokui Xiao:
Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation. 2651-2664 - Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. 2665-2679
Session 46: Program Analysis & Instrumentation
- Nikita Yadav, Vinod Ganapathy:
Whole-Program Control-Flow Path Attestation. 2680-2694 - Yufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose:
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level. 2695-2709 - Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, Xiangqun Chen:
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. 2710-2724 - Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma:
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. 2725-2739
Session 47: Security Professionals
- Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. 2740-2754 - Thomas Geras, Thomas Schreck:
Sharing Communities: The Good, the Bad, and the Ugly. 2755-2769 - Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin:
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules. 2770-2784 - Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh:
Do Users Write More Insecure Code with AI Assistants? 2785-2799
Session 48: Defending the Web
- Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. 2800-2814 - Felix Linker, David A. Basin:
ADEM: An Authentic Digital EMblem. 2815-2829 - David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen Phuoc Bao, Martín Ochoa:
Is Modeling Access Control Worth It? 2830-2844 - Zilun Wang, Wei Meng, Michael R. Lyu:
Fine-Grained Data-Centric Content Protection Policy for Web Applications. 2845-2859
Session 49: Cryptographic Protocols
- Hien Chu, Khue Do, Lucjan Hanzlik:
On the Security of Rate-limited Privacy Pass. 2871-2885 - Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger:
Passive SSH Key Compromise via Lattices. 2886-2900 - Marc Fischlin:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. 2901-2914 - Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 2915-2929
Session 50: Homomorphic Encryption II
- Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. 2930-2944 - Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum:
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. 2945-2958 - Binbin Tu, Yu Chen, Qi Liu, Cong Zhang:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. 2959-2973 - Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. 2974-2988
Session 51: Privacy in Systems
- Xueyuan Han, James Mickens, Siddhartha Sen:
Splice: Efficiently Removing a User's Data from In-memory Application State. 2989-3002 - Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. 3003-3017 - Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues:
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. 3018-3032 - Elia Anzuoni, Tommaso Gagliardoni:
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux. 3033-3047
Session 52: Attacks & Malware
- Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma:
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. 3048-3062 - Zhi Li, Weijie Liu, XiaoFeng Wang, Bin Yuan, Hongliang Tian, Hai Jin, Shoumeng Yan:
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. 3063-3077 - Shijia Li, Jiang Ming, Pengda Qiu, Qiyuan Chen, Lanqing Liu, Huaifeng Bao, Qiang Wang, Chunfu Jia:
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection. 3078-3092 - Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. 3093-3107
Session 53: Usable Authentication
- Suood Alroomi, Frank Li:
Measuring Website Password Creation Policies At Scale. 3108-3122 - Collins W. Munyendo, Peter Mayer, Adam J. Aviv:
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. 3123-3137 - Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl:
"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. 3138-3152 - Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. 3153-3167
Session 54: Measuring the Web
- Florian Hantke, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock:
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements. 3168-3182 - Gibran Gómez, Kevin van Liebergen, Juan Caballero:
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. 3183-3197 - Jeremy Rack, Cristian-Alexandru Staicu:
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications. 3198-3212 - Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang:
Understanding and Detecting Abused Image Hosting Modules as Malicious Services. 3213-3227
Session 55: Security of Cryptographic Protocols & Implementations
- Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi:
Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing. 3228-3238 - Marc Fischlin, Felix Günther:
Verifiable Verification in Cryptographic Protocols. 3239-3253 - Sam A. Markelon, Mia Filic, Thomas Shrimpton:
Compact Frequency Estimators in Adversarial Environments. 3254-3268 - Antonio de la Piedra, Marloes Venema, Greg Alpár:
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra. 3269-3283
Session 56: Oblivious Algorithms & Data Structures
- Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin:
Ramen: Souper Fast Three-Party Computation for RAM Programs. 3284-3297 - Gilad Asharov, Koki Hamada, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida:
Secure Statistical Analysis on Multiple Datasets: Join and Group-By. 3298-3312 - Gilad Asharov, Ilan Komargodski, Yehuda Michelson:
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM. 3313-3327 - Sajin Sasy, Aaron Johnson, Ian Goldberg:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. 3328-3342
Session 57: Privacy in the Digital World
- David Klein, Benny Rolle, Thomas Barber, Manuel Karl, Martin Johns:
General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications. 3343-3357 - Aloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan:
Control, Confidentiality, and the Right to be Forgotten. 3358-3372 - Anhao Xiang, Weiping Pei, Chuan Yue:
PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies. 3373-3387 - Kelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen R. Sollins:
Speranza: Usable, Privacy-friendly Software Signing. 3388-3402
Session 58: Measuring Machine Learning & Software Security
- Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. 3403-3417 - Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang:
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models. 3418-3432 - Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor:
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. 3433-3459 - Ita Ryan, Utz Roedig, Klaas-Jan Stol:
Unhelpful Assumptions in Software Security Research. 3460-3474
Session 59: Tracking the Web
- Mohammad Ghasemisharif, Jason Polakis:
Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification. 3475-3489 - Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:
CookieGraph: Understanding and Detecting First-Party Tracking Cookies. 3490-3504 - Changmin Lee, Sooel Son:
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking. 3505-3518
Session 60: Poster Session
- Matías F. Gobbi, Johannes Kinder:
Poster: Using CodeQL to Detect Malware in npm. 3519-3521 - Mohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld:
Poster: Data Minimization by Construction for Trigger-Action Applications. 3522-3524 - Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation. 3525-3527 - Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget:
Poster: Circumventing the GFW with TLS Record Fragmentation. 3528-3530 - Andres Molina-Markham, Luis F. Robaina, Akash H. Trivedi, Derek G. Tsui, Ahmad Ridley:
Poster: Generating Experiences for Autonomous Network Defense. 3531-3533 - Rudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling:
Poster: From Hashes to Ashes - A Comparison of Transcription Services. 3534-3536 - Hattan Althebeiti, Brett Fazio, William Chen, David Mohaisen:
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description. 3537-3539 - Xiaoyun Xu, Stjepan Picek:
Poster: Boosting Adversarial Robustness by Adversarial Pre-training. 3540-3542 - Christian van Sloun, Klaus Wehrle:
Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation. 3543-3545 - Dominic Gold, Koray Karabina, Francis C. Motta:
Poster: Computing the Persistent Homology of Encrypted Data. 3546-3548 - Arup Mondal:
Poster: Attestor - Simple Proof-of-Storage-Time. 3549-3551 - Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning. 3552-3554 - Depeng Chen, Xiao Liu, Jie Cui, Hong Zhong:
Poster: Membership Inference Attacks via Contrastive Learning. 3555-3557 - Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li:
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective. 3558-3560 - Shae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi:
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning. 3561-3563 - Jihyeon Yu, Juhwan Kim, Yeohoon Yun, Joobeom Yun:
Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing. 3564-3566 - Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu:
Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. 3567-3569 - Jing Xu, Stjepan Picek:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. 3570-3572 - Fabian Kaiser, Haya Schulmann, Michael Waidner:
Poster: Longitudinal Analysis of DoS Attacks. 3573-3575 - Simon Koch, Malte Wessels, David Klein, Martin Johns:
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications. 3576-3578 - Christopher Lenk, Johannes Kinder:
Poster: Privacy Risks from Misconfigured Android Content Providers. 3579-3581 - Johannes Lohmöller, Eduard Vlad, Markus Dahlmanns, Klaus Wehrle:
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems. 3582-3584 - Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park:
Poster: Panacea - Stateless and Non-Interactive Oblivious RAM. 3585-3587 - Behrad Tajalli, Gorka Abad, Stjepan Picek:
Poster: Backdoor Attack on Extreme Learning Machines. 3588-3590 - Roman Matzutt, Jan Pennekamp, Klaus Wehrle:
Poster: Accountable Processing of Reported Street Problems. 3591-3593 - Rex Fernando, Arnab Roy:
Poster: WIP: Account ZK-Rollups from Sumcheck Arguments. 3594-3596 - Mario Yaksetig, Alexander Havlin:
Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures. 3597-3599 - David G. Balash, Mir Masood Ali, Monica Kodwani, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv:
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem. 3600-3602 - Eric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray:
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. 3603-3605 - Wyatt Sweat, Danfeng (Daphne) Yao:
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. 3606-3608 - Wentao Dong, Cong Wang:
Poster: Towards Lightweight TEE-Assisted MPC. 3609-3611 - Maximilian Noppel, Christian Wressnegger:
Poster: Fooling XAI with Explanation-Aware Backdoors. 3612-3614 - Peipei Jiang, Qian Wang, Yihao Wu, Cong Wang:
Poster: Metadata-private Messaging without Coordination. 3615-3617 - Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik:
Poster: Control-Flow Integrity in Low-end Embedded Devices. 3618-3620 - Betül Askin Özdemir, Tim Beyne:
Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers. 3621-3623 - Gowri R. Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider:
Poster: Secure and Differentially Private kth Ranked Element. 3624-3626 - Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe:
Poster: Towards Practical Brainwave-based User Authentication. 3627-3629 - Wensheng Tian, Lei Zhang, Shuangxi Chen, Hu Wang, Xiao Luo:
Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain. 3630-3632 - Jan-Philip van Acken, Joost F. Gadellaa, Slinger Jansen, Katsiaryna Labunets:
Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education. 3633-3635 - Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang:
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. 3636-3638 - Gyungeun Yun, Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation. 3639-3641 - Ruei-Hau Hsu, Hsuan-Cheng Su, Yi-An Yu:
Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning. 3642-3644
Session 61: Workshops
- Bart P. Knijnenburg, Panagiotis Papadimitratos:
WPES '23: 22nd Workshop on Privacy in the Electronic Society. 3645-3647 - Magnus Almgren, Earlence Fernandes:
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy. 3648-3650 - Michael Brenner, Anamaria Costache, Kurt Rohloff:
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. 3651-3652 - Ning Zhang, Qi Li:
MTD '23: 10th ACM Workshop on Moving Target Defense. 3653-3654 - Zhiqiang Lin, Xiaojing Liao:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. 3655-3656 - Francesco Regazzoni, Apostolos P. Fournaris:
CCSW '23: Cloud Computing Security Workshop. 3657-3658 - Fraser Brown, Klaus von Gleissenthall:
PLAS: The 18th Workshop on Programming Languages and Analysis for Security. 3659 - Kaihua Qin, Fan Zhang:
DeFi '23: Workshop on Decentralized Finance and Security. 3660-3661 - Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. 3662-3663 - Lejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. 3664-3665 - Maura Pintor, Florian Simon Tramèr, Xinyun Chen:
AISec '23: 16th ACM Workshop on Artificial Intelligence and Security. 3666-3668 - Ehud Aharoni, Nir Drucker, Hayim Shaul:
Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML. 3669-3670 - Marcela S. Melara, Santiago Torres-Arias, Laurent Simon:
SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 3671-3672
Session 62: Demos
- Yue Xu, Wenjie Wang:
Demo: Certified Robustness on Toolformer. 3673-3675 - Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen:
Demo: Data Minimization and Informed Consent in Administrative Forms. 3676-3678 - Yuechun Gu, Sagar Sharma, Keke Chen:
Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning. 3679-3681
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.