default search action
44th SP 2023: San Francisco, CA, USA - Workshops
- 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023. IEEE 2023, ISBN 979-8-3503-1236-2
- Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim:
Evaluating Password Composition Policy and Password Meters of Popular Websites. 12-20 - Etienne Salimbeni, Nina Mainusch, Dario Pasquini:
Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning. 94-104 - Tomoya Matsumoto, Takayuki Miura, Naoto Yanai:
Membership Inference Attacks against Diffusion Models. 77-83 - Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:
Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. 371-383 - Romain Cayre, Damien Cauquil, Aurélien Francillon:
ESPwn32: Hacking with ESP32 System-on-Chips. 311-325 - Pottayil Harisanker Menon, Walt Woods:
Corpus-wide Analysis of Parser Behaviors via a Format Analysis Workbench. 209-218 - Ping-Lun Wang, Fraser Brown, Riad S. Wahby:
The ghost is the machine: Weird machines in transient execution. 264-272 - Marcus Botacin:
GPThreats-3: Is Automatic Malware Generation a Threat? 238-254 - Andreas D. Kellas, Alan Cao, Peter Goodman, Junfeng Yang:
Divergent Representations: When Compiler Optimizations Enable Exploitation. 337-348 - Sameed Ali, Sean W. Smith:
A Survey of Parser Differential Anti-Patterns. 105-116 - Jared Chandler, Adam Wick:
Research Report: Synthesizing Intrusion Detection System Test Data from Open-Source Attack Signatures. 198-208 - Prashant Anantharaman, Robert Lathrop, Rebecca Shapiro, Michael E. Locasto:
PolyDoc: Surveying PDF Files from the PolySwarm network. 117-134 - Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors. 21-28 - Kelly Kaoudis, Henrik Brodin, Evan Sultanik:
Automatically Detecting Variability Bugs Through Hybrid Control and Data Flow Analysis. 187-197 - Alireza Aghabagherloo, Rafa Gálvez, Davy Preuveneers, Bart Preneel:
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features. 38-44 - Alessandro Sorniotti, Michael Weissbacher, Anil Kurmus:
Go or No Go: Differential Fuzzing of Native and C Libraries. 349-363 - Jakub Pruzinec, Quynh Anh Nguyen:
Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models. 384-393 - Ben Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. 298-310 - Yuanzhe Wu, Grant Skipper, Ang Cui:
Cryo-Mechanical RAM Content Extraction Against Modern Embedded Systems. 273-284 - Alexander J. Ross, Bradley Reaves:
Towards Simultaneous Attacks on Multiple Cellular Networks. 394-405 - Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SafeFL: MPC-friendly Framework for Private and Robust Federated Learning. 69-76 - Giulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro:
ROPfuscator: Robust Obfuscation with ROP. 1-10 - Pietro Borrello, Catherine Easdon, Martin Schwarzl, Roland Czerny, Michael Schwarz:
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode. 285-297 - Florent Moriconi, Axel Ilmari Neergaard, Lucas Georget, Samuel Aubertin, Aurélien Francillon:
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems. 219-227 - Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. 84-93 - Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo:
Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study. 326-336 - Vincent Ulitzsch, Deniz Scholz, Dominik Christian Maier:
ASanity: On Bug Shadowing by Early ASan Exits. 364-370 - Ashish Kumar, Bill Harris, Gang Tan:
DISV: Domain Independent Semantic Validation of Data Files. 163-174 - Chakshu Gupta, Thijs van Ede, Andrea Continella:
HoneyKube: Designing and Deploying a Microservices-based Web Honeypot. 1-11 - Hadrien Barral, Georges-Axel Jaloyan, David Naccache:
Emoji shellcoding in RISC-V. 255-263 - Michael Robinson, Tate Altman, Denley Lam, Letitia W. Li:
Unsupervised clustering of file dialects according to monotonic decompositions of mixtures. 147-162 - Nathalie Baracaldo, Farhan Ahmed, Kevin Eykholt, Yi Zhou, Shriti Priya, Taesung Lee, Swanand Kadhe, Mike Tan, Sridevi Polavaram, Sterling Suggs, Yuyang Gao, David Slater:
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning Models. 45-56 - Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:
Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. 29-37 - Henrik Brodin, Marek Surovic, Evan Sultanik:
Blind Spots: Identifying Exploitable Program Inputs. 175-186 - Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:
On the Pitfalls of Security Evaluation of Robust Federated Learning. 57-68 - Yudi Yang, Weijie Huang, Kelly Kaoudis, Nathan Dautenhahn:
Whole-Program Privilege and Compartmentalization Analysis with the Object-Encapsulation Model. 1-12
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.