30th CCS 2024: Salt Lake City, UT, USA

Refine list

showing all ?? records

Keynote Talks

Session 1-1: Verification, Secure Architectures, and Network Security

Session 1-2: HW & CPS: Microarchitectural Attacks and Side Channels

Session 1-3: ML and Security: Machine Learning for Security

Session 1-4: HW & CPS: (Micro)Architecture Security

Session 1-5: Privacy and Anonymity: Privacy in Federated ML

Session 1-6: Privacy and Anonymity: Differential Privacy I

Session 1-7: Blockchains, Authentication, and Distributed Systems

Session 2-1: Network Security: The Internet Infrastructure

Session 2-2: Web Security I

Session 2-3: ML and Security: Machine Learning Attacks

Session 2-4: Software Security: Fuzzing I

Session 2-5: Applied Crypto: MPC I

Session 2-6: Applied Crypto: Zero Knowledge Proofs I

Session 2-7: Blockchain & Distributed Systems: Blockchain Attacks

Session 3-1: Formal Methods and Programming Languages I

Session 3-2: ML and Security: Large Language Models

Session 3-3: ML and Security: Inference Attacks

Session 3-4: Software Security: Memory Safety and Error Detection

Session 3-5: Applied Crypto: Private Information Retrieval & Private Set operations

Session 3-6: Applied Crypto: Signatures, Proofs, Integrity Schemes

Session 3-7: Usability and Measurement: Measuring and Understanding Privacy

Session 4-1: Usability and Measurement: Attack Measurements

Session 4-2: HW & CPS: Attacks and Defenses in Smart Devices

Session 4-3: Privacy and Anonymity & Applied Crypto: Privacy and Systems

Session 4-4: HW & CPS: Security of Autonomous Vehicles

Session 4-5: Privacy and Anonymity: Differential Privacy II

Session 4-6: Privacy and Anonymity: Anonymous Communication

Session 5-1: Network Security: Wireless Networks

Session 5-2: Web Security II

Session 5-3: ML and Security: Generative Models

Session 5-4: Software Security: Embedded Systems and IoT Security

Session 5-5: Applied Crypto: Key management

Session 5-6: Applied Crypto: Homomorphic Encryption

Session 5-7: Blockchain and Distributed Systems: Distributed Ledger Scalability

Session 6-1: Usability and Measurement: Usable Security

Session 6-2: Formal Methods and Programming Languages II

Session 6-3: ML and Security: Federated Learning

Session 6-4: Software Security: Access Control and Data Protection

Session 6-5: Applied Crypto: MPC II

Session 6-6: Applied Crypto: Zero Knowledge Proofs II

Session 6-7: Blockchain and Distributed Systems: Privacy and Consensus

Session 7-1: Security of Cyber-physical Systems

Session 7-2: HW & CPS 5: Attacks in the Physical World

Session 7-3: HW & CPS: Security of Circuit Design and FPGAs

Session 7-4: Privacy and Anonymity: Membership Inference Attacks

Session 7-5: Privacy and Anonymity: Privacy Attacks Meet ML

Session 7-6: Privacy: Defenses and Attacks

Session 8-1: Network Security: Traffic Analysis and Exploits

Session 8-2: Software Security: Fuzzing II

Session 8-3: ML and Security: Protection Methods in Machine Learning

Session 8-4: Software Security: Program Analysis and Security Enhancement

Session 8-5: Applied Crypto: Crypto Applied to cloud computing and machine learning

Session 8-6: Applied Crypto: ZKPs, Private set operations, Digital Currencies

Session 8-7: Usability and Measurement: Phishing, Deepfakes, and Other Risks

Session 9-1: Applied Crypto: Integrity and Authentication

Session 9-2: ML and Security: Model Security

Session 9-3: ML and Security: Backdoors, Side Channel Attakcs, and Anomaly Detection in Machine Learning

Session 9-4: Software Security: Attacks and Defenses

Session 9-5: Applied Crypto: Advanced Encryption schemes and their applications

Session 9-6: Applied Crypto: Customized cryptographic solutions

Session 9-7: Usability and Measurement: AI Risks

Workshop Session I

Workshop Session II

Poster Session

Demonstration Session

Doctoral Symposium