default search action
30th CCS 2024: Salt Lake City, UT, USA
- Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3
Keynote Talks
- Dan Boneh:
Cryptography and Computer Security: A View From the Year 2100. 1 - Gene Tsudik:
Staving off the IoT Armageddon. 2-3
Session 1-1: Verification, Secure Architectures, and Network Security
- Felix A. Wolf, Peter Müller:
Verifiable Security Policies for Distributed Systems. 4-18 - Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors. 19-33 - Qiyuan Zhao, George Pîrlea, Karolina Grzeszkiewicz, Seth Gilbert, Ilya Sergey:
Compositional Verification of Composite Byzantine Protocols. 34-48 - Jens Frieß, Donika Mirdita, Haya Schulmann, Michael Waidner:
Byzantine-Secure Relying Party for Resilient RPKI. 49-63
Session 1-2: HW & CPS: Microarchitectural Attacks and Side Channels
- Hyerean Jang, Taehun Kim, Youngjoo Shin:
SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon. 64-78 - Luca Wilke, Florian Sieck, Thomas Eisenbarth:
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX. 79-93 - Fabian Rauscher, Daniel Gruss:
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs. 94-108 - Gal Horowitz, Eyal Ronen, Yuval Yarom:
Spec-o-Scope: Cache Probing at Cache Speed. 109-123
Session 1-3: ML and Security: Machine Learning for Security
- Keane Lucas, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. 124-138 - Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, Shouling Ji:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. 139-152 - Tianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures. 153-167 - Andy Zhou, Xiaojun Xu, Ramesh Raghunathan, Alok Lal, Xinze Guan, Bin Yu, Bo Li:
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data. 168-182
Session 1-4: HW & CPS: (Micro)Architecture Security
- Stavros Volos, Cédric Fournet, Jana Hofmann, Boris Köpf, Oleksii Oleksenko:
Principled Microarchitectural Isolation on Cloud CPUs. 183-197 - Yongho Song, Byeongsu Woo, Youngkwang Han, Brent ByungHoon Kang:
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software. 198-212 - Katharina Ceesay-Seitz, Flavien Solt, Kaveh Razavi:
μCFI: Formal Verification of Microarchitectural Control-flow Integrity. 213-227 - Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. 228-242
Session 1-5: Privacy and Anonymity: Privacy in Federated ML
- Shuangqing Xu, Yifeng Zheng, Zhongyun Hua:
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. 243-257 - Bokang Zhang, Yanglin Zhang, Zhikun Zhang, Jinglan Yang, Lingying Huang, Junfeng Wu:
S2NeRF: Privacy-preserving Training Framework for NeRF. 258-272 - Johannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi:
$DPM: $ Clustering Sensitive Data through Separation. 273-287 - Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi:
S-BDT: Distributed Differentially Private Boosted Decision Trees. 288-302
Session 1-6: Privacy and Anonymity: Differential Privacy I
- Junxu Liu, Jian Lou, Li Xiong, Jinfei Liu, Xiaofeng Meng:
Cross-silo Federated Learning with Record-level Personalized Differential Privacy. 303-317 - Yucheng Fu, Tianhao Wang:
Benchmarking Secure Sampling Protocols for Differential Privacy. 318-332 - Yuting Liang, Ke Yi:
Smooth Sensitivity for Geo-Privacy. 333-347 - Jacob Imola, Amrita Roy Chowdhury, Kamalika Chaudhuri:
Metric Differential Privacy at the User-Level via the Earth-Mover's Distance. 348-362
Session 1-7: Blockchains, Authentication, and Distributed Systems
- Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse:
Nakamoto Consensus under Bounded Processing Capacity. 363-377 - Sarisht Wadhwa, Luca Zanolini, Aditya Asgaonkar, Francesco D'Amato, Chengrui Fang, Fan Zhang, Kartik Nayak:
Data Independent Order Policy Enforcement: Limitations and Solutions. 378-392 - Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar:
Securing Lightning Channels against Rational Miners. 393-407 - Deepak Maram, Mahimna Kelkar, Ittay Eyal:
Interactive Multi-Credential Authentication. 408-422
Session 2-1: Network Security: The Internet Infrastructure
- Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. 423-436 - Abhishek Bhaskar, Paul Pearce:
Understanding Routing-Induced Censorship Changes Globally. 437-451 - Yuejia Liang, Jianjun Chen, Run Guo, Kaiwen Shen, Hui Jiang, Man Hou, Yue Yu, Haixin Duan:
Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild. 452-466 - Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Chuhan Wang, Jianwei Zhuge, Haixin Duan:
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors. 467-481 - Xiaofan Li, Yacong Gu, Chu Qiao, Zhenkai Zhang, Daiping Liu, Lingyun Ying, Haixin Duan, Xing Gao:
Toward Understanding the Security of Plugins in Continuous Integration Services. 482-496 - Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner:
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. 497-510
Session 2-2: Web Security I
- Penghui Li, Mingxue Zhang:
FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache. 511-524 - Zidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan:
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs. 525-539 - Ronghai Yang, Xianbo Wang, Kaixuan Luo, Xin Lei, Ke Li, Jiayuan Xin, Wing Cheong Lau:
SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks. 540-554 - Kailun Yan, Xiaokuan Zhang, Wenrui Diao:
Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication. 555-569 - Changhua Luo, Penghui Li, Wei Meng, Chao Zhang:
Test Suites Guided Vulnerability Validation for Node.js Applications. 570-584 - Zhiyong Guo, Mingqing Kang, V. N. Venkatakrishnan, Rigel Gjomemo, Yinzhi Cao:
ReactAppScan: Mining React Application Vulnerabilities via Component Graph. 585-599
Session 2-3: ML and Security: Machine Learning Attacks
- Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong:
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence. 600-614 - Jonathan Knauer, Phillip Rieger, Hossein Fereidooni, Ahmad-Reza Sadeghi:
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning. 615-629 - Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. 630-644 - Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. 645-659 - Jiawen Shi, Zenghui Yuan, Yinuo Liu, Yue Huang, Pan Zhou, Lichao Sun, Neil Zhenqiang Gong:
Optimization-based Prompt Injection Attack to LLM-as-a-Judge. 660-674 - Yifan Lu, Wenxuan Li, Mi Zhang, Xudong Pan, Min Yang:
Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data. 675-689
Session 2-4: Software Security: Fuzzing I
- Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz:
DarthShader: Fuzzing WebGPU Shader Translators & Compilers. 690-704 - Kelin Wang, Mengda Chen, Liang He, Purui Su, Yan Cai, Jiongyi Chen, Bin Zhang, Chao Feng, Chaojing Tang:
OSmart: Whitebox Program Option Fuzzing. 705-719 - Ruijie Meng, Gregory J. Duck, Abhik Roychoudhury:
Program Environment Fuzzing. 720-734 - Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao:
ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model. 735-749 - Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz:
No Peer, no Cry: Network Application Fuzzing via Fault Injection. 750-764 - Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana:
FOX: Coverage-guided Fuzzing as Online Stochastic Control. 765-779
Session 2-5: Applied Crypto: MPC I
- Ruiyang Li, Yiteng Sun, Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang:
Leakage-Resilient Circuit Garbling. 780-794 - Shuaishuai Li, Cong Zhang, Dongdai Lin:
Secure Multiparty Computation with Lazy Sharing. 795-809 - Zhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, Wenguang Chen:
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits. 810-824 - Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song:
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z2k Without Ring Extensions. 825-839 - Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk:
Secret Sharing with Snitching. 840-853 - Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. 854-868
Session 2-6: Applied Crypto: Zero Knowledge Proofs I
- Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk:
Dora: A Simple Approach to Zero-Knowledge for RAM Programs. 869-883 - Chaya Ganesh, Vineet Nair, Ashish Sharma:
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs. 884-898 - Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. 899-913 - Mingxun Zhou, Giulia Fanti, Elaine Shi:
Conan: Distributed Proofs of Compliance for Anonymous Data Collection. 914-928 - Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra:
Hekaton: Horizontally-Scalable zkSNARKs Via Proof Aggregation. 929-940 - Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis:
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity. 941-955
Session 2-7: Blockchain & Distributed Systems: Blockchain Attacks
- Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang:
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. 956-970 - Zihao Li, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen:
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup. 971-985 - Shixuan Guan, Kai Li:
Characterizing Ethereum Address Poisoning Attack. 986-1000 - Hongbo Wen, Hanzhi Liu, Jiaxin Song, Yanju Chen, Wenbo Guo, Yu Feng:
FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols. 1001-1015 - Feng Luo, Huangkun Lin, Zihao Li, Xiapu Luo, Ruijie Luo, Zheyuan He, Shuwei Song, Ting Chen, Wenxuan Luo:
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models. 1016-1030 - Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias:
Blockchain Bribing Attacks and the Efficacy of Counterincentives. 1031-1045
Session 3-1: Formal Methods and Programming Languages I
- Cas Cremers, Alexander Dax, Niklas Medinger:
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols. 1046-1060 - Jérémy Thibault, Roberto Blanco, Dongjae Lee, Sven Argo, Arthur Azevedo de Amorim, Aïna Linn Georges, Catalin Hritcu, Andrew Tolmach:
SECOMP: Formally Secure Compilation of Compartmentalized C Programs. 1061-1075 - Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom:
Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures. 1076-1090 - Davide Davoli, Martin Avanzini, Tamara Rezk:
On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead). 1091-1105 - Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes:
The Privacy-Utility Trade-off in the Topics API. 1106-1120 - Stella Lau, Thomas Bourgeat, Clément Pit-Claudel, Adam Chlipala:
Specification and Verification of Strong Timing Isolation of Hardware Enclaves. 1121-1135
Session 3-2: ML and Security: Large Language Models
- Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. 1136-1150 - Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. 1151-1165 - Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. 1166-1180 - Peiran Wang, Qiyu Li, Longxuan Yu, Ziyao Wang, Ang Li, Haojian Jin:
Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based Policies. 1181-1195 - Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu:
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. 1196-1210 - Wenxin Ding, Cathy Y. Li, Shawn Shan, Ben Y. Zhao, Hai-Tao Zheng:
Understanding Implosion in Text-to-Image Generative Models. 1211-1225
Session 3-3: ML and Security: Inference Attacks
- Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. 1226-1240 - Jie Zhu, Jirong Zha, Ding Li, Leye Wang:
A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability. 1241-1255 - Qiankun Zhang, Di Yuan, Boyu Zhang, Bin Yuan, Bingqian Du:
Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense. 1256-1270 - Michael Aerni, Jie Zhang, Florian Tramèr:
Evaluations of Machine Learning Privacy Defenses are Misleading. 1271-1284 - Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, Zhikun Zhang, Xiaofeng Wang, Haixu Tang:
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. 1285-1299 - Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter:
A General Framework for Data-Use Auditing of ML Models. 1300-1314
Session 3-4: Software Security: Memory Safety and Error Detection
- Shuangpeng Bai, Zhechang Zhang, Hong Hu:
CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel. 1315-1329 - Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects. 1330-1344 - Marius Momeu, Simon Schnückel, Kai Angnis, Michalis Polychronakis, Vasileios P. Kemerlis:
Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys. 1345-1359 - Lorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, Mario Polino:
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations. 1360-1374 - Ruizhe Wang, Meng Xu, N. Asokan:
SeMalloc: Semantics-Informed Memory Allocator. 1375-1389 - Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Christophe de Dinechin, Pau-Chen Cheng, Hani Jamjoom:
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers. 1390-1404
Session 3-5: Applied Crypto: Private Information Retrieval & Private Set operations
- Ming Luo, Feng-Hao Liu, Han Wang:
Faster FHE-Based Single-Server Private Information Retrieval. 1405-1419 - Ling Ren, Muhammad Haris Mughees, I Sun:
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets. 1420-1433 - Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang:
Unbalanced Private Set Union with Reduced Computation and Communication. 1434-1447 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles. 1448-1462 - Alexander Burton, Samir Jordan Menon, David J. Wu:
Respire: High-Rate PIR for Databases with Small Records. 1463-1477 - Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang:
Actively Secure Private Set Intersection in the Client-Server Setting. 1478-1492
Session 3-6: Applied Crypto: Signatures, Proofs, Integrity Schemes
- Nikhil Vanjani, Pratik Soni, Sri Aravinda Krishnan Thyagarajan:
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments. 1493-1507 - Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss:
Blind Multisignatures for Anonymous Tokens with Decentralized Issuance. 1508-1522 - Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders:
Practical Post-Quantum Signatures for Privacy. 1523-1537 - Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac:
Reckle Trees: Updatable Merkle Batch Proofs with Applications. 1538-1551 - Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg:
Provable Security for PKI Schemes. 1552-1566 - Brian Koziel, S. Dov Gordon, Craig Gentry:
Fast Two-party Threshold ECDSA with Proactive Security. 1567-1580
Session 3-7: Usability and Measurement: Measuring and Understanding Privacy
- Shuai Li, Zhemin Yang, Yuhong Nan, Shutian Yu, Qirui Zhu, Min Yang:
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps. 1581-1595 - Georgi Ganev, Kai Xu, Emiliano De Cristofaro:
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility. 1596-1610 - Wentao Guo, Aditya Kishore, Adam J. Aviv, Michelle L. Mazurek:
A Qualitative Analysis of Practical De-Identification Guides. 1611-1625 - Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. 1626-1640 - Yue Xiao, Chaoqi Zhang, Yue Qin, Fares Fahad S. Alharbi, Luyi Xing, Xiaojing Liao:
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines. 1641-1655 - Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan:
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices. 1656-1670
Session 4-1: Usability and Measurement: Attack Measurements
- Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang:
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. 1671-1685 - Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena:
Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators. 1686-1700 - Jeffrey Knockel, Mona Wang, Zoë Reichert:
The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols. 1701-1715 - Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen:
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. 1716-1730
Session 4-2: HW & CPS: Attacks and Defenses in Smart Devices
- Hanqiu Wang, Zihao Zhan, Haoqi Shan, Siqi Dai, Maximillian Panoff, Shuo Wang:
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices. 1731-1745 - Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. 1746-1760 - Yue Zhang, Zhen Ling, Michael Cash, Qiguang Zhang, Christopher Morales-Gonzalez, Qun Zhou Sun, Xinwen Fu:
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing. 1761-1775 - Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma:
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz. 1776-1790
Session 4-3: Privacy and Anonymity & Applied Crypto: Privacy and Systems
- Yueshen Li, Jianli Jin, Kirill Levchenko:
CAPSID: A Private Session ID System for Small UAVs. 1791-1805 - Yihui Yan, Zhice Yang:
MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data Breach. 1806-1818 - Erik Anderson, Melissa Chase, F. Betül Durak, Kim Laine, Chenkai Weng:
Precio: Private Aggregate Measurement via Oblivious Shuffling. 1819-1833 - Hanshen Xiao, G. Edward Suh, Srinivas Devadas:
Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption. 1834-1848
Session 4-4: HW & CPS: Security of Autonomous Vehicles
- Pritam Dash, Ethan Chan, Karthik Pattabiraman:
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks. 1849-1863 - Xingshuo Han, Haozhao Wang, Kangqiao Zhao, Gelei Deng, Yuan Xu, Hangcheng Liu, Han Qiu, Tianwei Zhang:
VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice. 1864-1878 - Yuan Xu, Gelei Deng, Xingshuo Han, Guanlin Li, Han Qiu, Tianwei Zhang:
PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency. 1879-1893 - Zhaozhou Tang, Khaled Serag, Saman A. Zonouz, Z. Berkay Celik, Dongyan Xu, Raheem Beyah:
ERACAN: Defending Against an Emerging CAN Threat Model. 1894-1908
Session 4-5: Privacy and Anonymity: Differential Privacy II
- Jiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko:
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget. 1909-1923 - Nada Lahjouji, Sameera Ghayyur, Xi He, Sharad Mehrotra:
ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support. 1924-1938 - Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. 1939-1953 - Naoise Holohan, Stefano Braghin, Mohamed Suliman:
Securing Floating-Point Arithmetic for Noise Addition. 1954-1966
Session 4-6: Privacy and Anonymity: Anonymous Communication
- Elkana Tovey, Jonathan Weiss, Yossi Gilad:
Distributed PIR: Scaling Private Messaging via the Users' Machines. 1967-1981 - Ellis Fenske, Aaron Johnson:
Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols. 1982-1996 - Xinhao Deng, Qi Li, Ke Xu:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. 1997-2011 - Yanxue Jia, Varun Madathil, Aniket Kate:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. 2012-2026
Session 5-1: Network Security: Wireless Networks
- Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, Kevin R. B. Butler:
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. 2027-2041 - David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro:
Jäger: Automated Telephone Call Traceback. 2042-2056 - Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain:
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. 2057-2071 - Xin'an Zhou, Qing Deng, Juefei Pu, Keyu Man, Zhiyun Qian, Srikanth V. Krishnamurthy:
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks. 2072-2086 - Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. 2087-2101 - Syed Md. Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Dong, Omar Chowdhury, Syed Rafiul Hussain:
State Machine Mutation-based Testing Framework for Wireless Communication Protocols. 2102-2116
Session 5-2: Web Security II
- Shubham Agarwal, Aurore Fass, Ben Stock:
Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions. 2117-2131 - Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, XiaoFeng Wang:
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. 2132-2146 - Giovane C. M. Moura, Thomas Daniels, Maarten Bosteels, Sebastian Castro, Moritz Müller, Thymen Wabeke, Thijs van Den Hout, Maciej Korczynski, Georgios Smaragdakis:
Characterizing and Mitigating Phishing Attacks at ccTLD Scale. 2147-2161 - Andrea Mengascini, Ryan Aurelio, Giancarlo Pellegrino:
The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective. 2162-2176 - Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking Tracking JavaScript at the Function Granularity. 2177-2191 - Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. 2192-2206
Session 5-3: ML and Security: Generative Models
- Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. 2207-2221 - Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, Inho Kim, Woongjae Lee, Kihun Hong, Souhwan Jung:
Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices. 2222-2235 - Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo:
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. 2236-2250 - Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang:
MGTBench: Benchmarking Machine-Generated Text Detection. 2251-2265 - Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). 2266-2280 - Shu Wang, Kun Sun, Yan Zhai:
Dye4AI: Assuring Data Boundary on Generative AI Services. 2281-2295
Session 5-4: Software Security: Embedded Systems and IoT Security
- Ayushi Sharma, Shashank Sharma, Sai Ritvik Tanksalkar, Santiago Torres-Arias, Aravind Machiry:
Rust for Embedded Systems: Current State and Open Problems. 2296-2310 - Wenqiang Li, Haohuang Wen, Zhiqiang Lin:
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer. 2311-2325 - Shenao Wang, Feng Dong, Hangfeng Yang, Jingheng Xu, Haoyu Wang:
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments. 2326-2340 - Kaizheng Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo, Xinwen Fu:
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices. 2341-2354 - Abdullah Qasem, Mourad Debbabi, Andrei Soeanu:
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware. 2355-2369 - Mohsen Salehi, Karthik Pattabiraman:
AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices. 2370-2384
Session 5-5: Applied Crypto: Key management
- Felix Günther, Douglas Stebila, Shannon Veitch:
Obfuscated Key Exchange. 2385-2399 - Céline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb:
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users. 2400-2414 - Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels:
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. 2415-2429 - Julius Hermelink, Kai-Chun Ning, Richard Petri, Emanuele Strieder:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 2430-2444 - Sebastian H. Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann:
Password-Protected Key Retrieval with(out) HSM Protection. 2445-2459 - F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay:
Non-Transferable Anonymous Tokens by Secret Binding. 2460-2474
Session 5-6: Applied Crypto: Homomorphic Encryption
- Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing:
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation. 2475-2489 - Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang:
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference. 2490-2504 - Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto:
Attacks Against the IND-CPAD Security of Exact FHE Schemes. 2505-2519 - Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption. 2520-2534 - Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 2535-2546 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap:
New Secret Keys for Enhanced Performance in (T)FHE. 2547-2561
Session 5-7: Blockchain and Distributed Systems: Distributed Ledger Scalability
- Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. 2562-2576 - Zhiyuan Sun, Zihao Li, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou, Yinqian Zhang:
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back. 2577-2590 - Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. 2591-2605 - Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang:
Sui Lutris: A Blockchain Combining Broadcast and Consensus. 2606-2620 - Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. 2621-2635 - Hanwen Feng, Tiancheng Mai, Qiang Tang:
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing. 2636-2650
Session 6-1: Usability and Measurement: Usable Security
- Philip Klostermeyer, Sabrina Amft, Sandra Höltervennhoff, Alexander Krause, Niklas Busch, Sascha Fahl:
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development. 2651-2665 - Jonas Hielscher, Markus Schöps, Jens Opdenbusch, Felix Reichmann, Marco Gutfleisch, Karola Marky, Simon Parkin:
Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises. 2666-2680 - Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv:
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion. 2681-2695 - Kevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin R. B. Butler, Carrie Gates, Patrick Traynor:
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors. 2696-2710 - Ece Gumusel, Yue Xiao, Yue Qin, Jiaxin Qin, Xiaojing Liao:
Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting. 2711-2725 - Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. 2726-2740
Session 6-2: Formal Methods and Programming Languages II
- Kevin Morio, Robert Künnemann:
SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols. 2741-2755 - Adwait Godbole, Yatin A. Manerkar, Sanjit A. Seshia:
SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security. 2756-2770 - Miguel Ambrona, Pooya Farshim, Patrick Harasser:
Block Ciphers in Idealized Models: Automated Proofs and New Security Results. 2771-2785 - Freek Verbeek, Nico Naus, Binoy Ravindran:
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly. 2786-2798 - Jana Hofmann, Cédric Fournet, Boris Köpf, Stavros Volos:
Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring. 2799-2813 - David Baelde, Adrien Koutsos, Justine Sauvage:
Foundations for Cryptographic Reductions in CCSA Logics. 2814-2828
Session 6-3: ML and Security: Federated Learning
- Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang:
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. 2829-2843 - Yufei Zhou, Peijia Zheng, Xiaochun Cao, Jiwu Huang:
Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning. 2844-2858 - Kunal Talwar, Shan Wang, Audra McMillan, Vitaly Feldman, Pansy Bansal, Bailey Basile, Áine Cahill, Yi Sheng Chan, Mike Chatzidakis, Junye Chen, Oliver R. A. Chick, Mona Chitnis, Suman Ganta, Yusuf Goren, Filip Granqvist, Kristine Guo, Frederic Jacobs, Omid Javidbakht, Albert Liu, Richard Low, Dan Mascenik, Steve Myers, David Park, Wonhee Park, Gianni Parsa, Tommy Pauly, Christian Priebe, Rehan Rishi, Guy N. Rothblum, Congzheng Song, Linmao Song, Karl Tarbe, Sebastian Vogt, Shundong Zhou, Vojta Jina, Michael Scaria, Luke Winstrom:
Samplable Anonymous Aggregation for Private Federated Data Analysis. 2859-2873 - Minghong Fang, Zifan Zhang, Hairi, Prashant Khanduri, Jia Liu, Songtao Lu, Yuchen Liu, Neil Gong:
Byzantine-Robust Decentralized Federated Learning. 2874-2888 - Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang:
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation. 2889-2903 - Guanzhong Chen, Zhenghan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu:
Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack. 2904-2918
Session 6-4: Software Security: Access Control and Data Protection
- Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, Byoungyoung Lee:
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. 2919-2933 - Yongheng Huang, Chenghang Shi, Jie Lu, Haofeng Li, Haining Meng, Lian Li:
Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications. 2934-2948 - Tamjid Al Rahat, Yu Feng, Yuan Tian:
AuthSaber: Automated Safety Verification of OpenID Connect Programs. 2949-2962 - Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, Shuang Hao, Haojin Zhu:
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications. 2963-2977 - Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia, Qianhong Wu:
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. 2978-2992 - Hajeong Lim, Jaeyoon Kim, Hojoon Lee:
uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem. 2993-3007
Session 6-5: Applied Crypto: MPC II
- Nuttapong Attrapadung, Kota Isayama, Kunihiko Sadakane, Kazunari Tozawa:
Secure Parallel Computation with Oblivious State Transitions. 3008-3022 - Amit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Mahimna Kelkar, Yiping Ma:
Secure Sorting and Selection via Function Secret Sharing. 3023-3037 - Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso:
Helium: Scalable MPC among Lightweight Participants and under Churn. 3038-3052 - Nikolaos Makriyannis, Oren Yomtov, Arik Galansky:
Practical Key-Extraction Attacks in Leading MPC Wallets. 3053-3064 - Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo:
Efficient Secret Sharing for Large-Scale Applications. 3065-3079 - Ananya Appan, David Heath, Ling Ren:
Oblivious Single Access Machines - A New Model for Oblivious Computation. 3080-3094
Session 6-6: Applied Crypto: Zero Knowledge Proofs II
- Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. 3095-3109 - Christodoulos Pappas, Dimitrios Papadopoulos:
Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees. 3110-3124 - Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer:
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy. 3125-3137 - Antonio Faonio, Dario Fiore, Luigi Russo:
Real-World Universal zkSNARKs are Non-Malleable. 3138-3151 - Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang:
A Succinct Range Proof for Polynomial-based Vector Commitment. 3152-3166 - Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao:
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices. 3167-3181
Session 6-7: Blockchain and Distributed Systems: Privacy and Consensus
- Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang:
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. 3182-3196 - Josh Beal, Ben Fisch:
Derecho: Privacy Pools with Proof-Carrying Disclosures. 3197-3211 - Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic:
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. 3212-3226 - Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. 3227-3241 - Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup:
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. 3242-3256 - Marwa Mouallem, Ittay Eyal:
Asynchronous Authentication. 3257-3271
Session 7-1: Security of Cyber-physical Systems
- Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang:
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. 3272-3286 - Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, Bo Luo:
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. 3287-3301 - Yue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin, Yu Liu, Huadi Zhu, Ming Li:
GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations. 3302-3316 - Haoyu Xiao, Yuan Zhang, Minghang Shen, Chaoyang Lin, Can Zhang, Shengli Liu, Min Yang:
Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware. 3317-3331
Session 7-2: HW & CPS 5: Attacks in the Physical World
- Chenghan Jiang, Jinjiang Yang, Xinyi Li, Qi Li, Xinyu Zhang, Ju Ren:
RISiren: Wireless Sensing System Attacks via Metasurface. 3332-3345 - Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li:
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. 3346-3360 - Penghao Wang, Jingzhi Hu, Chao Liu, Jun Luo:
RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection. 3361-3375 - Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, Zhuo Su:
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips. 3376-3390
Session 7-3: HW & CPS: Security of Circuit Design and FPGAs
- Simon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel E. Holcomb, Christof Paar:
Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse Engineering. 3391-3405 - Zhenda Zhang, Svetla Petkova-Nikova, Ventzislav Nikov:
Glitch-Stopping Circuits: Hardware Secure Masking without Registers. 3406-3420 - Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy:
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms. 3421-3435 - Jianfeng Wang, Huazhong Yang, Shuwen Deng, Xueqing Li:
CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses. 3436-3450
Session 7-4: Privacy and Anonymity: Membership Inference Attacks
- Bozhidar Stevanoski, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems. 3451-3465 - Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley A. Malin, Ye Wang:
Analyzing Inference Privacy Risks Through Gradients In Machine Learning. 3466-3480 - Rui Wen, Zheng Li, Michael Backes, Yang Zhang:
Membership Inference Attacks Against In-Context Learning. 3481-3495 - Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang:
SeqMIA: Sequential-Metric Based Membership Inference Attack. 3496-3510
Session 7-5: Privacy and Anonymity: Privacy Attacks Meet ML
- Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong:
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps. 3511-3524 - Xinguo Feng, Zhongkui Ma, Zihan Wang, Eu Joe Chegne, Mengyao Ma, Alsharif Abuadbba, Guangdong Bai:
Uncovering Gradient Inversion Risks in Practical Language Model Training. 3525-3539 - Shiming Wang, Liyao Xiang, Bowei Cheng, Zhe Ji, Tianran Sun, Xinbing Wang:
Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power. 3540-3554 - Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. 3555-3569
Session 7-6: Privacy: Defenses and Attacks
- Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong:
TabularMark: Watermarking Tabular Datasets for Machine Learning. 3570-3584 - Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. 3585-3599 - Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao:
PLeak: Prompt Leaking Attacks against Large Language Model Applications. 3600-3614 - Zachary Ratliff, Salil Vadhan:
A Framework for Differential Privacy Against Timing Attacks. 3615-3629
Session 8-1: Network Security: Traffic Analysis and Exploits
- Ben Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich:
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking. 3630-3644 - Zhe Ren, Xinghua Li, Yinbin Miao, Mengyao Zhu, Shunjie Yuan, Robert H. Deng:
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks. 3645-3658 - Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. 3659-3673 - Ryan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah:
Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network Data. 3674-3688 - Jiayi Jiang, Xiyuan Zhang, Chengcheng Wan, Haoyi Chen, Haiying Sun, Ting Su:
BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering. 3689-3703 - Mingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. 3704-3718
Session 8-2: Software Security: Fuzzing II
- Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao:
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. 3719-3733 - Haoran Xu, Zhiyuan Jiang, Yongjun Wang, Shuhui Fan, Shenglin Xu, Peidai Xie, Shaojing Fu, Mathias Payer:
Fuzzing JavaScript Engines with a Graph-based IR. 3734-3748 - Jiaxun Zhu, Minghao Lin, Tingting Yin, Zechao Cai, Yu Wang, Rui Chang, Wenbo Shen:
CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon. 3749-3762 - Jianzhong Liu, Yuheng Shen, Yiru Xu, Yu Jiang:
Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing. 3763-3777 - Yutong Zhou, Fan Yang, Zirui Song, Ke Zhang, Jiongyi Chen, Kehuan Zhang:
LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPT. 3778-3792 - Yunlong Lyu, Yuxuan Xie, Peng Chen, Hao Chen:
Prompt Fuzzing for Fuzz Driver Generation. 3793-3807
Session 8-3: ML and Security: Protection Methods in Machine Learning
- Yijie Bai, Zhongming Ma, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu:
Alchemy: Data-Free Adversarial Training. 3808-3822 - Zijin Lin, Yue Zhao, Kai Chen, Jinwen He:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. 3823-3837 - Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang:
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions. 3838-3852 - Zhiyuan Yu, Ao Li, Ruoyao Wen, Yijia Chen, Ning Zhang:
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning. 3853-3867 - Eugene Bagdasarian, Ren Yi, Sahra Ghalebikesabi, Peter Kairouz, Marco Gruteser, Sewoong Oh, Borja Balle, Daniel Ramage:
AirGapAgent: Protecting Privacy-Conscious Conversational Agents. 3868-3882 - Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren:
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. 3883-3897
Session 8-4: Software Security: Program Analysis and Security Enhancement
- Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang:
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. 3898-3912 - Neophytos Christou, Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis:
Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies. 3913-3927 - Chaoyuan Peng, Muhui Jiang, Lei Wu, Yajin Zhou:
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing. 3928-3942 - Yingquan Zhao, Zan Wang, Junjie Chen, Ruifeng Fu, Yanzhou Lu, Tianchang Gao, Haojie Ye:
Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing. 3943-3957 - Kaifeng Huang, Chenhao Lu, Yiheng Cao, Bihuan Chen, Xin Peng:
VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching. 3958-3972 - Dongjia Zhang, Andrea Fioraldi, Davide Balzarotti:
On Understanding and Forecasting Fuzzers Performance with Static Analysis. 3973-3987
Session 8-5: Applied Crypto: Crypto Applied to cloud computing and machine learning
- Jonas Hofmann, Kien Tuong Truong:
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem. 3988-4001 - Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang:
Scalable Equi-Join Queries over Encrypted Database. 4002-4016 - Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Graphiti: Secure Graph Computation Made More Scalable. 4017-4031 - Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. 4032-4046 - Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. 4047-4061 - Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar:
Secure Vickrey Auctions with Rational Parties. 4062-4076
Session 8-6: Applied Crypto: ZKPs, Private set operations, Digital Currencies
- Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh:
Batching-Efficient RAM using Updatable Lookup Arguments. 4077-4091 - Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers. 4092-4106 - Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 4107-4121 - Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova:
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model. 4122-4136 - Ying Gao, Yuanchao Luo, Longxin Wang, Xiang Liu, Lin Qi, Wei Wang, Mengmeng Zhou:
Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing. 4137-4151 - Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland:
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies. 4152-4166
Session 8-7: Usability and Measurement: Phishing, Deepfakes, and Other Risks
- Katharina Schiller, Florian Adamsky, Christian Eichenmüller, Matthias Reimert, Zinaida Benenson:
Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob". 4167-4181 - Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun:
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. 4182-4196 - Kevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, Kevin R. B. Butler:
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications. 4197-4211 - Yue Zhang, Melih Sirlanci, Ruoyu Wang, Zhiqiang Lin:
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study. 4212-4225 - Sébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji:
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers. 4226-4240 - Yuqi Hu, Suood Alroomi, Sena Sahin, Frank Li:
Unmasking the Security and Usability of Password Masking. 4241-4255
Session 9-1: Applied Crypto: Integrity and Authentication
- Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan:
Batch Range Proof: How to Make Threshold ECDSA More Efficient. 4256-4270 - Victor Youdom Kemmoe, Anna Lysyanskaya:
RSA-Based Dynamic Accumulator without Hashing into Primes. 4271-4285 - Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan:
Non-interactive VSS using Class Groups and Application to DKG. 4286-4300 - Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. 4301-4315 - Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos:
Zero-Knowledge Proofs of Training for Deep Neural Networks. 4316-4330 - Xiangyang Zhang, Yaobin Shen, Lei Wang:
Multi-User Security of CCM Authenticated Encryption Mode. 4331-4345
Session 9-2: ML and Security: Model Security
- Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su:
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels. 4346-4360 - Jae Hyung Ju, Jaiyoung Park, Jongmin Kim, Minsik Kang, Donghwan Kim, Jung Hee Cheon, Jung Ho Ahn:
NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE Bootstrapping. 4361-4375 - Guopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao:
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization. 4376-4390 - Wonhee Cho, Guillaume Hanrot, Taeseong Kim, Minje Park, Damien Stehlé:
Fast and Accurate Homomorphic Softmax Evaluation. 4391-4404 - Haochen Sun, Jason Li, Hongyang Zhang:
zkLLM: Zero Knowledge Proofs for Large Language Models. 4405-4419 - Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu:
AITIA: Efficient Secure Computation of Bivariate Causal Discovery. 4420-4434
Session 9-3: ML and Security: Backdoors, Side Channel Attakcs, and Anomaly Detection in Machine Learning
- Nazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin, Zhishan Guo, Nazanin Rahnavard:
Fisher Information guided Purification against Backdoor Attacks. 4435-4449 - Jinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian:
BadMerging: Backdoor Attacks Against Model Merging. 4450-4464 - Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott:
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense. 4465-4479 - Eugene Bagdasarian, Vitaly Shmatikov:
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines. 4480-4494 - Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, Shuai Wang:
DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables. 4495-4508 - Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu:
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. 4509-4523
Session 9-4: Software Security: Attacks and Defenses
- Hao Xiang, Zehui Cheng, Jinku Li, Jianfeng Ma, Kangjie Lu:
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness. 4524-4538 - Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. 4539-4553 - Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, Xiangyu Zhang:
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries. 4554-4568 - Samuel Mergendahl, Stephen Fickas, Boyana Norris, Richard Skowyra:
Manipulative Interference Attacks. 4569-4583 - YongGang Li, ShunRong Jiang, Yu Bao, Pengpeng Chen, Yong Zhou, Yeh-Ching Chung:
Isolate and Detect the Untrusted Driver with a Virtual Box. 4584-4597 - Dmitrii Kuvaiskii, Dimitrios Stavrakakis, Kailun Qin, Cedric Xing, Pramod Bhatotia, Mona Vij:
Gramine-TDX: A Lightweight OS Kernel for Confidential VMs. 4598-4612
Session 9-5: Applied Crypto: Advanced Encryption schemes and their applications
- Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. 4613-4627 - Doreen Riepel, Marloes Venema, Tanya Verma:
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. 4628-4642 - Mohammad Hassan Ameri, Jeremiah Blocki:
Conditional Encryption with Applications to Secure Personalized Password Typo Correction. 4643-4657 - Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu:
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. 4658-4672 - Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta:
Securely Training Decision Trees Efficiently. 4673-4687 - Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. 4688-4702
Session 9-6: Applied Crypto: Customized cryptographic solutions
- Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk:
Pulsar: Secure Steganography for Diffusion Models. 4703-4717 - Emanuele Di Giandomenico, Yong Li, Sven Schäge:
Protoss: Protocol for Tight Optimal Symmetric Security. 4718-4731 - Christian Badertscher, Fabio Banfi, Jesus Diaz:
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging. 4732-4746 - Daniel Collins, Doreen Riepel, Si An Oliver Tran:
On the Tight Security of the Double Ratchet. 4747-4761 - Marc Fischlin, Olga Sanina:
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. 4762-4776 - Evangelia Anna Markatou, Roberto Tamassia:
Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs. 4777-4791
Session 9-7: Usability and Measurement: AI Risks
- Xinyao Ma, Chaoqi Zhang, Huadi Zhu, L. Jean Camp, Ming Li, Xiaojing Liao:
Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks. 4792-4806 - Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. 4807-4821 - Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Hai-Tao Zheng, Ben Y. Zhao:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? 4822-4836 - Yixin Wu, Yun Shen, Michael Backes, Yang Zhang:
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. 4837-4851 - Zeyang Sha, Yicong Tan, Mingjie Li, Michael Backes, Yang Zhang:
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models. 4852-4866
Workshop Session I
- William Yurcik, Gregory Pluta, Toan Luong, Luis Garcia:
HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare. 4882-4883 - Neil Gong, Qi Li, Xiaoli Zhang:
AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. 4884-4885 - Zhiqiang Lin, Luyi Xing:
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps. 4886-4887 - Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Minhui Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan:
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis. 4888-4889 - Erman Ayday, Jaideep Vaidya:
WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES). 4893 - Ruimin Sun, Mu Zhang:
RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security. 4894-4895 - Lesly-Ann Daniel, Vineet Rajani:
The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024). 4896-4897
Workshop Session II
- Ryan Craven, Matthew S. Mickelson:
FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software Transformation. 4898-4899 - Apostolos P. Fournaris, Paolo Palmieri:
CCSW 2024 - Cloud Computing Security Workshop. 4900 - Sebastian Schrittwieser, Michele Ianni:
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. 4901-4902 - Kassem Fawaz, Magnus Almgren:
CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy. 4903-4904 - Maura Pintor, Matthew Jagielski, Xinyun Chen:
AISec '24: 17th ACM Workshop on Artificial Intelligence and Security. 4905-4906 - Liyi Zhou, Kaihua Qin:
DeFi '24: Workshop on Decentralized Finance and Security. 4907-4908 - Lejla Batina, Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer:
ASHES '24: Workshop on Attacks and Solutions in Hardware Security. 4909-4910 - Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
AutonomousCyber '24 - Workshop on Autonomous Cybersecurity. 4911-4913 - Mario Fritz, Christoph Krauß, Hans-Joachim Hof:
CSCS '24 - Cyber Security in CarS Workshop. 4914-4916 - Santiago Torres-Arias, Marcela S. Melara:
SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 4917-4918
Poster Session
- Zander Chown, Aarathi Prasad:
Poster: Privacy Norms for Fertility Data in the Roe v. Wade era. 4919-4921 - Louis Cattepoel, Donika Mirdita, Haya Schulmann, Michael Waidner:
Poster: Kill Krill or Proxy RPKI. 4922-4924 - Kevin Nsieyanji Tchokodeu, Haya Schulmann, Gil Sobol, Michael Waidner:
Poster: Security of Login Interfaces in Modern Organizations. 4925-4927 - Yuchen Ji, Ting Dai, Yutian Tang, Jingzhu He:
Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications? 4928-4930 - Thomas Szymkowiak, Endrit Isufi, Markku-Juhani O. Saarinen:
Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions. 4931-4933 - Wenhao Li, Duohe Ma, Zhaoxuan Li, Huaifeng Bao, Shuai Wang, Huamin Jin, Xiao-Yu Zhang:
Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector. 4934-4936 - Oliver Jacobsen, Haya Schulmann:
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly. 4937-4939 - Di Xue, Gang Zhao, Zhongqi Fan, Wei Li, Yahong Xu, Zhen Liu, Yin Liu, Zhongliang Yuan:
Poster: An Exploration of Large Language Models in Malicious Source Code Detection. 4940-4942 - Tomasz Hyla, Natalia Wawrzyniak:
Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code. 4943-4945 - Tong Xin, Ying He, Efpraxia D. Zamani, Cunjin Luo:
Poster: Cyber Security Economics Model (CYSEM). 4946-4948 - Yuni Lai, Kai Zhou:
Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNs. 4949-4951 - Alex Berke, Tobin South, Robert Mahari, Kent Larson, Alex Pentland:
Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax Disclosures. 4952-4954 - Keiichi Ochiai, Masayuki Terada:
Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration. 4955-4957 - Yuan Chang, Chun-Chia Huang, Tatsuya Mori, Hsu-Chun Hsiao:
Poster: YFuzz: Data-Driven Fuzzing. 4958-4960 - Elisa Zhang, Shiyu Sun, Yunlong Xing, Kun Sun:
Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model. 4961-4963 - Seyed Mohammad Hadi Mirsadeghi:
Poster: In-switch Defense against DNS Amplification DDoS Attacks. 4964-4966 - Bo Chen, Caleb Rother, Josh Dafoe:
Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices. 4967-4969 - Yizhi Li, Jiang Li, Jiahao Cao, Renjie Xie, Yangyang Wang, Mingwei Xu:
Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training. 4970-4972 - Nico Naus, Freek Verbeek, Sagar Atla, Binoy Ravindran:
Poster: Formally Verified Binary Lifting to P-Code. 4973-4975 - Gabriele Digregorio, Roberto Alessandro Bertolini, Francesco Panebianco, Mario Polino:
Poster: libdebug, Build Your Own Debugger for a Better (Hello) World. 4976-4978 - Qiaoran Meng, Nay Oo, Yuning Jiang, Hoon Wei Lim, Biplab Sikdar:
Poster: M2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping. 4979-4981 - Andrew J. Kaizer, Will Naciri, Swapneel Sheth:
Poster: Synchronization Concerns of DNS Integrations. 4982-4984 - Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho:
Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical Study. 4985-4987 - Sachin Shukla, Omid Mirzaei:
Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection. 4988-4990 - Jasmine Vang, Matthew Revelle:
Poster: Formalizing Cognitive Biases for Cybersecurity Defenses. 4991-4993 - Huan Bui, Harper Lienerth, Chenglong Fu, Meera Sridhar:
Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models. 4994-4996 - Joel Osher, James K. Holland, Nicholas Hopper:
Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting. 4997-4999 - Seok Min Hong, Beom Heyn Kim, Mohammad Mannan:
Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks. 5000-5002 - Christian Mouchet, Sylvain Chatel, Lea Nürnberger, Wouter Lueks:
Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption. 5003-5005 - Jheng-Jia Huang, Guan-Yu Chen, Nai-Wei Lo:
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key. 5006-5008 - Arnaldo Sgueglia, Rocco Addabbo, Andrea Di Sorbo, Stanislav Dashevskyi, Daniel Ricardo dos Santos, Corrado Aaron Visaggio:
Poster: A Multi-step Approach for Classification of Malware Samples. 5009-5011 - Jiawen Diao, Shengmin Zhao, Jianguo Xie, Rongna Xie, Guozhen Shi:
Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection. 5012-5014 - Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Poster: From Fort to Foe: The Threat of RCE in RPKI. 5015-5017 - Shubham Malaviya, Manish Shukla, Saurabh Anand, Sachin Lodha:
Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks. 5018-5020 - Abdul Haddi Amjad, Muhammad Ali Gulzar:
Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web? 5021-5023 - Wanpeng Li, Yuejun Guo:
Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models. 5024-5026 - Peter Chen, Guannan Liu, Haining Wang:
Poster: Acoustic Side-Channel Attack on Robot Vacuums. 5027-5029 - Jielun Wu, Qingkai Shi:
Poster: Protecting Source Code Privacy When Hunting Bugs. 5030-5032 - Faqi Zhao, Duohe Ma, Wenhao Li, Feng Liu, Wen Wang:
Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation. 5033-5035 - Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi:
Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling. 5036-5038 - Abdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy:
Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi. 5039-5041 - Sevval Simsek, Zhenpeng Shi, Howell Xia, David Sastre Medina, David Starobinski:
Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database. 5042-5044 - Sin Tai Liu, Jiayuan Yu, Jacob Steeves:
Poster: Solving the Free-rider Problem in Bittensor. 5045-5047 - Zhaoxiang Liu, Ning Luo, Samuel Judson, Raj Gautam Dutta, Xiaolong Guo, Mark Santolucito:
Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users. 5048-5050 - Jelena Mirkovic, David M. Balenson, Brian Kocoloski, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Alba Regalado, David R. Choffnes, Daniel J. Dubois, Luis Garcia:
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE). 5051-5053 - Donghoon Kim, Andrew Booth, Euijin Choo, Doosung Hwang:
Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor. 5054-5056 - Yvo Desmedt, Alireza Kavousi, Aydin Abadi:
Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations. 5057-5059 - Weimin Fu, Yifang Zhao, Yier Jin, Xiaolong Guo:
Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience. 5060-5062 - Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang, Feng Liu:
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. 5063-5065 - Manish Shukla, Shubham Malaviya, Sachin Lodha:
Poster: Context-Based Effective Password Detection in Plaintext. 5066-5068 - Pankaj Dayama, Vinayaka Pandit, Sikhar Patranabis, Abhishek Singh, Nitin Singh:
Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms. 5069-5071
Demonstration Session
- Zhaoxuan Li, Ziming Zhao, Wenhao Li, Rui Zhang, Rui Xue, Siqi Lu, Fan Zhang:
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution. 5072-5074 - Yuechun Gu, Jiajie He, Keke Chen:
Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation. 5075-5077 - Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. 5078-5080 - Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila:
Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches. 5081-5083 - Xianglan Huang, Qiang Zhou, Liangmin Wang, Weiqi Yu, Wenjin Wang, Shi Shen:
Demo: An End-to-End Anonymous Traffic Analysis System. 5084-5086
Doctoral Symposium
- Gabriela Ciocarlie, Xinming Ou:
ACM CCS 2024 Doctoral Symposium. 5087-5088 - Theodoros Trochatos:
Trusted Execution Environments for Quantum Computers. 5089-5091 - Adam Caulfield:
Towards Secure Runtime Auditing of Remote Embedded System Software. 5092-5094 - Nathan Reitinger:
Understanding and Addressing Online Tracking: Online Privacy's Regulatory Turn. 5095-5097 - Zitao Chen:
Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning Models. 5098-5100 - Mingming Chen:
Evolving Network Security in the Era of Network Programmability. 5101-5103 - Pansilu Pitigalaarachchi:
Symbolic Execution for Dynamic Kernel Analysis. 5104-5106 - Hyeongmin Choe:
Toward Practical Threshold FHE: Low Communication, Computation and Interaction. 5107-5109 - Jiayuan Ye:
Privacy Analyses in Machine Learning. 5110-5112 - Sayanton V. Dibbo:
Novel Privacy Attacks and Defenses Against Neural Networks. 5113-5115 - Weidong Zhu:
Leveraging Storage Semantics to Enhance Data Security and Privacy. 5116-5118 - Efrén López-Morales:
Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence Methods. 5119-5121 - Jialun Zhang:
Language-based Sandboxing. 5122-5124 - Bhavish Raj Gopal:
Privacy-Preserving Graph Analysis. 5125-5127 - Zhiyuan Yu:
Towards Proactive Protection against Unauthorized Speech Synthesis. 5128-5130
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.