default search action
45th SP 2024: San Francisco, CA, USA
- IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024. IEEE 2024, ISBN 979-8-3503-3130-1
- Aleksandr Nahapetyan, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos, Bradley Reaves:
On SMS Phishing Tactics and Infrastructure. 1-16 - Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. 17-35 - Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh:
From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models. 36-54 - Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. 55-73 - Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. 74-90 - Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. 91-109 - William Kong, Andrés Muñoz Medina, Mónica Ribero, Umar Syed:
DP-Auditorium: A Large-Scale Library for Auditing Differential Privacy. 110-126 - Palak Jain, Adam D. Smith, Connor Wagaman:
Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. 127-145 - Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin:
Synq: Public Policy Analytics Over Encrypted Data. 146-165 - Soheil Khodayari, Thomas Barber, Giancarlo Pellegrino:
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web. 166-184 - Qi Wang, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan:
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls. 185-202 - David Klein, Martin Johns:
Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials. 203-221 - Penghui Li, Wei Meng, Mingxue Zhang, Chenlin Wang, Changhua Luo:
Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis. 222-238 - Enze Wang, Jianjun Chen, Wei Xie, Chuhan Wang, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang:
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications. 239-257 - Saiid El Hajj Chehade, Sandra Siby, Carmela Troncoso:
SINBAD: Saliency-informed detection of breakage caused by ad blocking. 258-276 - Hoang Dai Nguyen, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, Phani Vadrevu:
C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks. 277-295 - Feng Xiao, Zhongfu Su, Guangliang Yang, Wenke Lee:
Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation. 296-311 - Luis E. Salazar, Sebastián R. Castro, Juan Lozano, Keerthi Koneru, Emmanuele Zambon, Bing Huang, Ross Baldick, Marina Krotofil, Alonso Rojas, Alvaro A. Cárdenas:
A Tale of Two Industroyers: It was the Season of Darkness. 312-330 - Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. 331-349 - Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili:
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. 350-368 - Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee:
A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok. 369-387 - Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. 388-406 - Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr:
Poisoning Web-Scale Training Datasets is Practical. 407-425 - David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi:
Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. 426-444 - Wei Liu, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai:
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations. 445-464 - Jelle Vos, Mauro Conti, Zekeriya Erkin:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. 465-483 - Xingyu Xie, Yifei Li, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song:
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols. 484-502 - Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. 503-522 - Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang:
Scalable Mixed-Mode MPC. 523-541 - Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
Asterisk: Super-fast MPC with a Friend. 542-560 - Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. 561-577 - Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang:
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. 578-596 - Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training and Inference with GPUs. 597-616 - Mindy Tran, Collins W. Munyendo, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, Yasemin Acar:
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. 617-634 - Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. 635-654 - Kasra Edalatnejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso:
Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution. 655-672 - Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan A. Hutson, Ada Lerner:
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations. 673-696 - Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. 697-716 - Anh V. Vu, Alice Hutchings, Ross J. Anderson:
No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. 717-734 - Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang:
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. 735-751 - Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania. 752-769 - Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. 770-787 - Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. 788-806 - Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. 807-825 - Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
On Large Language Models' Resilience to Coercive Interrogation. 826-844 - Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. 845-861 - Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini:
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks. 862-880 - Jincheng Wang, Le Yu, Xiapu Luo:
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. 881-896 - Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao:
SneakyPrompt: Jailbreaking Text-to-image Generative Models. 897-912 - Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas:
Eureka: A General Framework for Black-box Differential Privacy Estimators. 913-931 - Narges Ashena, Oana Inel, Badrie L. Persaud, Abraham Bernstein:
Casual Users and Rational Choices within Differential Privacy. 932-950 - Tim Kutta, Önder Askin, Martin Dunsche:
Lower Bounds for Rényi Differential Privacy in a Black-Box Setting. 951-971 - Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen:
Bounded and Unbiased Composite Differential Privacy. 972-990 - Nicolas Küchler, Emanuel Opel, Hidde Lycklama, Alexander Viand, Anwar Hithnawi:
Cohere: Managing Differential Privacy in Large Scale Systems. 991-1008 - Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin, Yuan Hong:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. 1009-1027 - Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan:
Budget Recycling Differential Privacy. 1028-1046 - Priyanka Nanayakkara, Hyeok Kim, Yifan Wu, Ali Sarvghad, Narges Mahyar, Gerome Miklau, Jessica Hullman:
Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis. 1047-1064 - Sabrina Amft, Sandra Höltervennhoff, Rebecca Panskus, Karola Marky, Sascha Fahl:
Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. 1065-1082 - Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel:
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security. 1083-1101 - Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson:
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. 1102-1121 - Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. 1122-1140 - Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. 1141-1159 - Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, James C. Davis:
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors. 1160-1178 - Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao:
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services. 1179-1197 - Sandra Rivera Pérez, Michel van Eeten, Carlos Hernandez Gañán:
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors. 1198-1216 - Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. 1217-1235 - Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. 1236-1254 - Andrew Yuan, Alina Oprea, Cheng Tan:
Dropout Attacks. 1255-1269 - Jie Wan, Jianhao Fu, Lijin Wang, Ziqi Yang:
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild. 1270-1286 - Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi:
Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation. 1287-1305 - Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. 1306-1324 - Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:
Attacking Byzantine Robust Aggregation in High Dimensions. 1325-1344 - Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif:
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers. 1345-1364 - Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. 1365-1384 - Jaehan Kim, Minkyoo Song, Minjae Seo, Youngjin Jin, Seungwon Shin:
PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph. 1385-1404 - Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. 1405-1423 - Fei Duan, Ding Wang, Chunfu Jia:
A Security Analysis of Honey Vaults. 1424-1442 - Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans:
Combing for Credentials: Active Pattern Extraction from Smart Reply. 1443-1461 - Joyanta Debnath, Christa Jenkins, Yuteng Sun, Sze Yiu Chau, Omar Chowdhury:
ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation. 1462-1480 - Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. 1481-1499 - Jannis Rautenstrauch, Metodi Mitkov, Thomas Helbrecht, Lorenz Hetterich, Ben Stock:
To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape. 1500-1516 - Zahra Moti, Asuman Senol, Hamid Bostani, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar:
Targeted and Troublesome: Tracking and Advertising on Children's Websites. 1517-1535 - Jiaxun Cao, Abhinaya S. B., Anupam Das, Pardis Emami Naeini:
Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality. 1554-1572 - Chris Tsoukaladelis, Brian Kondracki, Niranjan Balasubramanian, Nick Nikiforakis:
The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News. 1573-1589 - Yash Vekaria, Rishab Nithyanand, Zubair Shafiq:
The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain. 1590-1608 - Hans W. A. Hanley, Deepak Kumar, Zakir Durumeric:
Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale. 1609-1627 - Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. 1628-1645 - Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. 1646-1664 - Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:
Understanding and Benchmarking the Commonality of Adversarial Examples. 1665-1683 - Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, Jae Hong Seo:
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems. 1684-1702 - Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. 1703-1721 - Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu:
Transferable Multimodal Attack on Vision-Language Pre-training Models. 1722-1740 - Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng:
Certifying Zero-Knowledge Circuits with Refinement Types. 1741-1759 - Ruihan Wang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser. 1760-1776 - Tianyi Liu, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang:
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. 1777-1793 - Miguel Isabel, Clara Rodríguez-Núñez, Albert Rubio:
Scalable Verification of Zero-Knowledge Protocols. 1794-1812 - Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. 1813-1831 - Nan Wang, Sid Chi-Kin Chau, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. 1832-1848 - Heqing Huang, Peisen Yao, Hung-Chun Chiu, Yiyuan Guo, Charles Zhang:
Titan : Efficient Multi-target Directed Greybox Fuzzing. 1849-1864 - Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim:
Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. 1865-1883 - Yujian Zhang, Yaokun Liu, Jinyu Xu, Yanhao Wang:
Predecessor-aware Directed Greybox Fuzzing. 1884-1900 - Yuwei Liu, Yanhao Wang, Xiangkun Jia, Zheng Zhang, Purui Su:
AFGen: Whole-Function Fuzzing for Applications and Libraries. 1901-1919 - Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao:
Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices. 1920-1938 - Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Ming Gu, Qing Liao, Yu Jiang:
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay. 1939-1955 - Heqing Huang, Anshunkang Zhou, Mathias Payer, Charles Zhang:
Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference. 1956-1973 - Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz:
SoK: Prudent Evaluation Practices for Fuzzing. 1974-1993 - Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic. 1994-2012 - Mohammad Naseri, Yufei Han, Emiliano De Cristofaro:
BadVFL: Backdoor Attacks in Vertical Federated Learning. 2013-2028 - Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang:
Distribution Preserving Backdoor Attack in Self-supervised Learning. 2029-2047 - Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. 2048-2066 - Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories. 2067-2085 - Chen Gong, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Kecen Li, Arunesh Sinha, Bowen Xu, Xinwen Hou, David Lo, Tianhao Wang:
Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets. 2086-2104 - Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang:
Exploring the Orthogonality and Linearity of Backdoor Attacks. 2105-2123 - Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. 2124-2141 - Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:
Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. 2142-2160 - Jannik Albrecht, Sébastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Azzurra Marson, Julian Willingmann:
Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security. 2161-2179 - Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. 2180-2197 - Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. 2198-2216 - Sally Junsong Wang, Kexin Pei, Junfeng Yang:
SmartInv: Multimodal Learning for Smart Contract Invariant Inference. 2217-2235 - Mingxuan Yao, Runze Zhang, Haichuan Xu, Shih-Huan Chou, Varun Chowdhary Paturi, Amit Kumar Sikder, Brendan Saltaformaggio:
Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud. 2236-2254 - Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. 2255-2272 - Christoph Sendner, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko:
Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts. 2273-2290 - Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network. 2291-2309 - Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. 2310-2387 - Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:
A Systematic Study of Physical Sensor Attack Hardness. 2328-2347 - Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. 2348-2365 - Xingli Zhang, Yazhou Tu, Yan Long, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei:
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover. 2366-2384 - Bin Yuan, Zhanxiang Song, Yan Jia, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. 2385-2403 - Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik:
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. 2404-2421 - Ben Nassi, Etay Iluz, Or Hai Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras. 2422-2440 - Maximilian Noppel, Christian Wressnegger:
SoK: Explainable Machine Learning in Adversarial Environments. 2441-2459 - Asim Waheed, Vasisht Duddu, N. Asokan:
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. 2460-2477 - Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu:
Revisiting Black-box Ownership Verification for Graph Neural Networks. 2478-2496 - Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai:
CORELOCKER: Neuron-level Usage Control. 2497-2514 - Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. 2515-2533 - Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. 2534-2552 - Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. 2553-2571 - Ehsanul Kabir, Zeyu Song, Md. Rafi Ur Rashid, Shagufta Mehnaz:
FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks. 2572-2590 - Cas Cremers, Mang Zhao:
Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption. 2591-2609 - Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:
Private Hierarchical Governance for Encrypted Messaging. 2610-2629 - Yuelin Liu, Huangxun Chen, Zhice Yang:
Enforcing End-to-end Security for Remote Conference Applications. 2630-2647 - Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart:
Injection Attacks Against End-to-End Encrypted Applications. 2648-2665 - Martin R. Albrecht, Benjamin Dowling, Daniel Jones:
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core. 2666-1685 - Cas Cremers, Eyal Ronen, Mang Zhao:
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. 2686-2704 - Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams:
Holepunch: Fast, Secure File Deletion with Crash Consistency. 2705-2721 - Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion:
INVISILINE: Invisible Plausibly-Deniable Storage. 2722-2739 - Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu:
Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information. 2740-2758 - Zhambyl Shaikhanov, Sherif Badran, Hichem Guerboukha, Josep Miquel Jornet, Daniel M. Mittleman, Edward W. Knightly:
MetaFly: Wireless Backhaul Interception via Aerial Wavefront Manipulation. 2759-2774 - Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. 2775-2793 - Xiliang Luo, Cem Kalkanli, Hao Zhou, Pengcheng Zhan, Moche Cohen:
Secure Ranging with IEEE 802.15.4z HRP UWB. 2794-2811 - Jun Luo, Hangcheng Cao, Hongbo Jiang, Yanbing Yang, Zhe Chen:
MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption. 2812-2830 - Erik C. Rye, Dave Levin:
Surveilling the Masses with Wi-Fi-Based Positioning Systems. 2831-2846 - Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. 2847-228066 - Hadi Givehchian, Nishant Bhaskar, Alexander Redding, Han Zhao, Aaron Schulman, Dinesh Bharadia:
Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices. 2867-2885 - Andrew C. Cullen, Paul Montague, Shijie Liu, Sarah M. Erfani, Benjamin I. P. Rubinstein:
It's Simplex! Disaggregating Measures to Improve Certified Robustness. 2886-2900 - Alec F. Diallo, Paul Patras:
Sabre: Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstruction. 2901-2919 - Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. 2920-2938 - Yanting Wang, Wei Zou, Jinyuan Jia:
FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models. 2939-2957 - Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou:
Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks. 2958-2976 - Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. 2977-2995 - Vasisht Duddu, Sebastian Szyller, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. 2996-3014 - Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. 3015-3033 - Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. 3034-3052 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA in Three Rounds. 3053-3071 - Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. 3072-3090 - Sarabjeet Singh, Shreyas Singh, Sumanth Gudaparthi, Xiong Fan, Rajeev Balasubramonian:
Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference. 3091-3108 - Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. 3109-3127 - Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. 3128-3146 - Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang:
Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. 3147-3164 - Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:
CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. 3165-3183 - Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa:
Nebula: A Privacy-First Platform for Data Backhaul. 3184-3202 - Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann, Alastair R. Beresford:
Pudding: Private User Discovery in Anonymity Networks. 3203-3220 - Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate:
Attacking and Improving the Tor Directory Protocol. 3221-3237 - Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. 3238-3256 - Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. 3257-3275 - Youngsik Yoon, Jinhwan Nam, Hyojeong Yun, Jaeho Lee, Dongwoo Kim, Jungseul Ok:
Few-shot Unlearning. 3276-3292 - Yukui Luo, Adnan Siraj Rakin, Deliang Fan, Xiaolin Xu:
DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA. 3293-3310 - Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:
DeepTheft: Stealing DNN Model Architectures through Power Side Channel. 3311-3326 - Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen:
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML. 3327-3345 - Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. 3346-3364 - Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. 3365-3384 - Xingshuo Han, Yutong Wu, Qingjie Zhang, Yuan Zhou, Yuan Xu, Han Qiu, Guowen Xu, Tianwei Zhang:
Backdooring Multimodal Learning. 3385-3403 - Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni:
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites. 3404-3422 - Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schürmann:
Thwarting Last-Minute Voter Coercion. 3423-3439 - Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang:
Can we cast a ballot as intended and be receipt free? 3440-3457 - Karola Marky, Nina Gerber, Henry John Krumb, Mohamed Khamis, Max Mühlhäuser:
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting. 3458-3477 - Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Galiñanes, Bryan Ford:
E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting. 3478-3496 - Patrick Tser Jern Kon, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr, Benjamin E. Ujcich:
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge. 3497-3514 - Akul Goyal, Gang Wang, Adam Bates:
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. 3515-3532 - Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. 3533-3551 - Mati Ur Rehman, Hadi Ahmadi, Wajih Ul Hassan:
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning. 3552-3570 - R. Sekar, Hanke Kimm, Rohit Aich:
eAudit: A Fast, Scalable and Deployable Audit Data Collection System. 3571-3589 - Jiacen Xu, Xiaokui Shu, Zhou Li:
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics. 3590-3608 - Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz, David Ott:
DrSec: Flexible Distributed Representations for Efficient Endpoint Security. 3609-3624 - Daniel Schlette, Philip Empl, Marco Caselli, Thomas Schreck, Günther Pernul:
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. 3625-3643 - Joseph Khoury, Dorde Klisura, Hadi Zanddizari, Gonzalo De La Torre Parra, Peyman Najafirad, Elias Bou-Harb:
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks. 3644-3660 - Lukas Gerlach, Simon Schwarz, Nicolas Faroß, Michael Schwarz:
Efficient and Generic Microarchitectural Hash-Function Recovery. 3661-3678 - Cristiano Rodrigues, Daniel Oliveira, Sandro Pinto:
BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect. 3679-3696 - Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens:
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. 3697-3715 - Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. 3716-3734 - Sushant Dinesh, Madhusudan Parthasarathy, Christopher W. Fletcher:
ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks. 3735-3753 - Tom Kessous, Niv Gilboa:
Prune+PlumTree - Finding Eviction Sets at Scale. 3754-3772 - Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida:
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. 3773-3788 - Xinming Wei, Jiaxi Zhang, Guojie Luo:
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity. 3789-3804 - Muoi Tran, Theo von Arx, Laurent Vanbever:
Routing Attacks on Cryptocurrency Mining Pools. 3805-3821 - Lucjan Hanzlik, Julian Loss, Sri Aravinda Krishnan Thyagarajan, Benedikt Wagner:
Sweep-UC: Swapping Coins Privately. 3822-3839 - André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono:
SoK: Security and Privacy of Blockchain Interoperability. 3840-3865 - Lioba Heimbach, Vabuk Pahari, Eric Schertenleib:
Non-Atomic Arbitrage in Decentralized Finance. 3866-3884 - Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse:
Optimal Flexible Consensus and its Application to Ethereum. 3885-3903 - Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin:
PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments. 3904-3922 - Rui Xi, Zehua Wang, Karthik Pattabiraman:
POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance. 3923-3942 - Zhe Ye, Ujval Misra, Jiajun Cheng, Wenyang Zhou, Dawn Song:
Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution. 3943-3960 - Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. 3961-3978 - Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. 3979-3997 - Qian Sang, Yanhao Wang, Yuwei Liu, Xiangkun Jia, Tiffany Bao, Purui Su:
AirTaint: Making Dynamic Taint Analysis Faster and Easier. 3998-4014 - Zhengyu Liu, Kecheng An, Yinzhi Cao:
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences. 4015-4033 - Jiasheng Jiang, Jingzheng Wu, Xiang Ling, Tianyue Luo, Sheng Qu, Yanjun Wu:
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns. 4034-4052 - Jiun Min, Dongyeon Yu, Seongyun Jeong, Dokyung Song, Yuseok Jeon:
ERASan: Efficient Rust Address Sanitizer. 4053-4068 - Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang:
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. 4069-4087 - Borui Yang, Wei Li, Liyao Xiang, Bo Li:
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations. 4088-4106 - Jubayer Mahmod, Matthew Hicks:
UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets. 4107-4124 - Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:
On (the Lack of) Code Confidentiality in Trusted Execution Environments. 4125-4142 - Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman:
SoK: SGX.Fail: How Stuff Gets eXposed. 4143-4162 - Fritz Alder, Lesly-Ann Daniel, David F. Oswald, Frank Piessens, Jo Van Bulck:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. 4163-4181 - Jan Wichelmann, Anja Rabich, Anna Pätschke, Thomas Eisenbarth:
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation. 4182-4199 - Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. 4200-4219 - Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde:
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP. 4220-4238 - Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida:
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. 4239-4257 - Xiang Li, Yunqian Luo, Mingyu Gao:
Bulkor: Enabling Bulk Loading for Path ORAM. 4258-4276 - Nicholas Ngai, Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos:
Distributed & Scalable Oblivious Sorting and Shuffling. 4277-4295 - Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. 4296-4314 - Jian Liu, Jingyu Li, Di Wu, Kui Ren:
PIRANA: Faster Multi-query PIR via Constant-weight Codes. 4315-4330 - Andrew Park, Trevor Leong, Francisco Maturana, Wenting Zheng, K. V. Rashmi:
Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage. 4331-4347 - Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate:
More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR. 4348-4366 - Zeyu Liu, Eran Tromer, Yunhao Wang:
Group Oblivious Message Retrieval. 4367-4385 - Daniel Schadt, Christoph Coijanovic, Christiane Weis, Thorsten Strufe:
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support. 4386-4404 - Florian Hantke, Sebastian Roth, Rafael Mrowczynski, Christine Utz, Ben Stock:
Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research. 4405-4423 - Huancheng Zhou, Guofei Gu:
Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches. 4424-4439 - Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar:
Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments. 4440-4458 - Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. 4459-4477 - Xiang Li, Dashuai Wu, Haixin Duan, Qi Li:
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. 4478-4496 - Yepeng Pan, Christian Rossow:
TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. 4497-4515 - Tillson Galloway, Kleanthis Karakolios, Zane Ma, Roberto Perdisci, Angelos Keromytis, Manos Antonakakis:
Practical Attacks Against DNS Reputation Systems. 4516-4534 - Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, Reza Rejaie, Walter Willinger:
Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches. 4535-4553 - William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang:
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization. 4554-4572 - Md. Sadun Haq, Thien Duc Nguyen, Ali Saman Tosun, Franziska Vollmer, Turgay Korkmaz, Ahmad-Reza Sadeghi:
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms. 4573-4590 - Philipp Beer, Marco Squarcina, Lorenzo Veronese, Martina Lindorfer:
Tabbed Out: Subverting the Android Custom Tab Security Model. 4591-4609 - Osama Bajaber, Bo Ji, Peng Gao:
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF. 4610-4628 - Sönke Huster, Matthias Hollick, Jiska Classen:
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices. 4629-4645 - Yiru Xu, Hao Sun, Jianzhong Liu, Yuheng Shen, Yu Jiang:
Saturn: Host-Gadget Synergistic USB Driver Fuzzing. 4646-4660 - Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian:
SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing. 4661-4677 - Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration. 4678-4695 - Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David A. Forsyth, Bo Li, Dawn Song:
SoK: Privacy-Preserving Data Synthesis. 4696-4713 - Zihang Xiang, Tianhao Wang, Di Wang:
Preserving Node-level Privacy in Graph Neural Networks. 4714-4732 - Robin Staab, Nikola Jovanovic, Mislav Balunovic, Martin T. Vechev:
From Principle to Practice: Vertical Data Minimization for Machine Learning. 4733-4752 - Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider:
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. 4753-4771 - Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage:
SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks. 4772-4790 - Han Liu, Yuhao Wu, Zhiyuan Yu, Ning Zhang:
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack. 4791-4809 - Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu:
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning. 4810-4827 - Yangfan Jiang, Xinjian Luo, Yuncheng Wu, Xiaokui Xiao, Beng Chin Ooi:
Protecting Label Distribution in Cross-Silo Federated Learning. 4828-4847
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.