


default search action
44th SP 2023: San Francisco, CA, USA
- 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023. IEEE 2023, ISBN 978-1-6654-9336-9

- Johannes Willbold, Moritz Schloegel

, Manuel Vögele
, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi:
Space Odyssey: An Experimental Software Security Analysis of Satellites. 1-19 - Moses Ike, Kandy Phan, Keaton Sadoski

, Romuald Valme, Wenke Lee:
Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. 20-37 - Brian Singer, Amritanshu Pandey, Shimiao Li, Lujo Bauer, Craig Miller, Lawrence T. Pileggi

, Vyas Sekar:
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations. 38-55 - Endres Puschner

, Thorben Moos, Steffen Becker
, Christian Kison, Amir Moradi
, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. 56-74 - Kevin Choi, Aathira Manoj, Joseph Bonneau:

SoK: Distributed Randomness Beacons. 75-92 - Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:

WeRLman: To Tackle Whale (Transactions), Go Deep (RL). 93-110 - Muhammad Saad, David Mohaisen

:
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks. 111-125 - Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu:

Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. 126-145 - Matilda Backendal, Miro Haller, Kenneth G. Paterson:

MEGA: Malleable Encryption Goes Awry. 146-163 - Mathew Hogan, Yan Michalevsky, Saba Eskandarian:

DBREACH: Stealing from Databases Using Compression Side Channels. 182-198 - Quang Dao

, Jim Miller, Opal Wright, Paul Grubbs:
Weak Fiat-Shamir Attacks on Modern Proof Systems. 199-216 - Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith

:
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany. 217-233 - Shubham Jain

, Ana-Maria Cretu, Antoine Cully, Yves-Alexandre de Montjoye:
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. 234-252 - Sarah Scheffler

, Anunay Kulshrestha, Jonathan R. Mayer:
Public Verification for Private Hash Matching. 253-273 - Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers:

Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. 274-292 - Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang

, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. 293-310 - Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini:

Lambretta: Learning to Rank for Twitter Soft Moderation. 311-326 - Ahmed Salem, Giovanni Cherubin, David Evans

, Boris Köpf, Andrew Paverd
, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin:
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning. 327-345 - Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin:

Analyzing Leakage of Personally Identifiable Information in Language Models. 346-363 - Shahbaz Rezaei

, Zubair Shafiq, Xin Liu:
Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective. 364-381 - Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue

:
D-DAE: Defense-Penetrating Model Extraction Attacks. 382-399 - Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan R. Ullman:

SNAP: Efficient Extraction of Private Properties with Poisoning. 400-417 - Dario Pasquini

, Mathilde Raynal, Carmela Troncoso:
On the (In)security of Peer-to-Peer Decentralized Machine Learning. 418-436 - Muhammad Haris Mughees, Ling Ren:

Vectorized Batch Private Information Retrieval. 437-452 - Hidde Lycklama

, Lukas Burkhalter, Alexander Viand
, Nicolas Küchler, Anwar Hithnawi:
RoFL: Robustness of Secure Federated Learning. 453-476 - Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:

Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. 477-496 - Lucien K. L. Ng, Sherman S. M. Chow

:
SoK: Cryptographic Neural-Network Computation. 497-514 - Andreas Brüggemann

, Robin Hundt, Thomas Schneider, Ajith Suresh
, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations. 515-533 - Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu:

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. 534-551 - Sena Sahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank Li

:
Investigating the Password Policy Practices of Website Administrators. 552-569 - Collins W. Munyendo

, Yasemin Acar, Adam J. Aviv
:
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. 570-587 - Jeremiah Blocki

, Peiyuan Liu
:
Towards a Rigorous Statistical Analysis of Empirical Password Datasets. 606-625 - Peiyuan Liu

, Jeremiah Blocki, Wenjie Bai:
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models. 626-644 - Boya Wang, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso:

Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution. 645-663 - Maximilian Noppel

, Lukas Peter, Christian Wressnegger:
Disguising Attacks with Explanation-Aware Backdoors. 664-681 - Hong Zhu, Shengzhi Zhang

, Kai Chen:
AI-Guardian: Defeating Adversarial Attacks using Backdoors. 701-718 - Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi

, Lorenzo Cavallaro
, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. 719-736 - Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:

BayBFed: Bayesian Backdoor Defense for Federated Learning. 737-754 - Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. 755-772 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:

Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. 773-789 - Michael Rosenberg

, Jacob D. White
, Christina Garman, Ian Miers:
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure. 790-808 - Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park

:
Private Access Control for Function Secret Sharing. 809-828 - Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa

:
MPCAuth: Multi-factor Authentication for Distributed-trust Systems. 829-847 - Edward Chen

, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng:
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols. 848-863 - Emily Wenger

, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. 864-881 - Yueli Yan, Zhice Yang:

Spoofing Real-world Face Authentication Systems through Optical Synthesis. 882-898 - Shengwei An

, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang:
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. 899-916 - Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:

DepthFake: Spoofing 3D Face Authentication with a 2D Photo. 917-91373 - Xiaohan Zhang, Haoqi Ye, Ziqi Huang, Xiao Ye, Yinzhi Cao, Yuan Zhang, Min Yang:

Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective. 934-950 - Andre Kassis, Urs Hengartner:

Breaking Security-Critical Voice Authentication. 951-968 - Nate Mathews, James K. Holland

, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses. 969-986 - Xu Lin

, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis:
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. 987-1004 - Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:

Robust Multi-tab Website Fingerprinting Attacks in the Wild. 1005-1022 - Ryan Torok, Amit Levy

:
Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense. 1023-1040 - Soheil Khodayari

, Giancarlo Pellegrino:
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses. 1041-1058 - Mingqing Kang, Yichao Xu, Song Li

, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao:
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. 1059-1076 - Linard Arquint, Felix A. Wolf

, Joseph Lallemand, Ralf Sasse, Christoph Sprenger
, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. 1077-1093 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira

, Swarn Priya
, Peter Schwabe, Lucas Tabary-Maujean:
Typing High-Speed Cryptography against Spectre v1. 1094-1111 - Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies

:
Less is more: refinement proofs for probabilistic proofs. 1112-1129 - Joshua Gancher, Sydney Gibson, Pratap Singh

, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. 1130-1147 - Mike Graf

, Ralf Küsters, Daniel Rausch:
AUC: Accountable Universal Composability. 1148-1167 - Rafaël del Pino, Thomas Prest, Mélissa Rossi, Markku-Juhani O. Saarinen

:
High-Order Masking of Lattice Signatures in Quasilinear Time. 1168-1185 - Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss

:
Practical Timing Side-Channel Attacks on Memory Compression. 1186-1203 - Marcel Busch

, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, Mathias Payer:
TEEzz: Fuzzing Trusted Applications on COTS Android Devices. 1204-1219 - Hosein Yavarzadeh

, Mohammadkazem Taram, Shravan Narayan
, Deian Stefan, Dean M. Tullsen
:
Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. 1220-1237 - Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean M. Tullsen

:
Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. 1220-1237 - Sk Adnan Hassan, Zainab Aamir

, Dongyoon Lee
, James C. Davis
, Francisco Servant:
Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies. 1238-1255 - Kangjie Lu:

Practical Program Modularization with Type-Based Dependence Analysis. 1256-1270 - Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer:

WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. 1271-1288 - Linyi Li, Tao Xie, Bo Li:

SoK: Certified Robustness for Deep Neural Networks. 1289-1310 - Maurice Weber, Xiaojun Xu, Bojan Karlas, Ce Zhang, Bo Li:

RAB: Provable Robustness Against Backdoor Attacks. 1311-1328 - Chong Xiang

, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal:
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking. 1329-1347 - Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore

, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. 1348-1365 - Xiaoyu Cao, Jinyuan Jia, Zaixi Zhang, Neil Zhenqiang Gong:

FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information. 1366-1383 - Salijona Dyrmishi

, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. 1384-1400 - Zichen Gui

, Kenneth G. Paterson, Sikhar Patranabis:
Rethinking Searchable Symmetric Encryption. 1401-1418 - Erik-Oliver Blass, Florian Kerschbaum:

Private Collaborative Data Cleaning via Non-Equi PSI. 1419-1434 - Erik-Oliver Blass, Florian Kerschbaum:

Private Collaborative Data Cleaning via Non-Equi PSI. 1419-1434 - Andreas Hülsing, Mikhail A. Kudinov

, Eyal Ronen, Eylon Yogev:
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. 1435-1453 - Leemon Baird, Sanjam Garg

, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. 1454-1470 - Nina Bindel

, Cas Cremers, Mang Zhao:
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. 1471-1490 - Lucjan Hanzlik, Julian Loss, Benedikt Wagner:

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2. 1491-1508 - Piergiorgio Ladisa

, Henrik Plate, Matias Martinez, Olivier Barais
:
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. 1509-1526 - Marcel Fourné

, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar:
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. 1527-1544 - Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:

"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. 1545-1560 - Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao:

Continuous Intrusion: Characterizing the Security of Continuous Integration Services. 1561-1577 - Yacong Gu, Lingyun Ying, Yingyuan Pu

, Xiao Hu, Huajun Chai, Ruimin Wang, Xing Gao, Haixin Duan:
Investigating Package Related Security Threats in Software Registries. 1578-1595 - Zhichuang Sun, Ruimin Sun

, Changming Liu
, Amrita Roy Chowdhury, Long Lu, Somesh Jha:
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks. 1596-1612 - Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:

Deepfake Text Detection: Limitations and Opportunities. 1613-1630 - Yuxin Cao

, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. 1631-1648 - Ruijie Zhao, Xianwen Deng, Yanhao Wang, Zhicong Yan, Zhengguang Han, Libo Chen, Zhi Xue, Yijun Wang:

GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas. 1649-1666 - Wei Zong, Yang-Wai Chow

, Willy Susilo
, Kien Do
, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. 1667-1683 - Michele Marazzi

, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi:
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. 1684-1701 - Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss:

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. 1702-1718 - Koksal Mus, Yarkin Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar:

Jolt: Recovering TLS Signing Keys via Rowhammer Faults. 1719-1736 - Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein:

Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. 1737-1752 - Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:

Spectre Declassified: Reading from the Right Place at the Wrong Time. 1753-1770 - Kai Wang, Shilin Xiao

, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. 1771-1788 - Donghui Dai, Zhenlin An

, Lei Yang:
Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks. 1789-1806 - Rohith Reddy Vennam, Ish Kumar Jain

, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia:
mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array. 1807-1821 - Zizhi Jin

, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. 1822-1839 - Pengfei Hu

, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. 1840-1856 - Yan Long

, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. 1857-1874 - Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi:

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning. 1893-1907 - David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux:

Scalable and Privacy-Preserving Federated Principal Component Analysis. 1908-1925 - Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han:

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. 1926-1943 - Ce Feng

, Nuo Xu, Wujie Wen
, Parv Venkitasubramaniam, Caiwen Ding:
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering. 1944-1960 - Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa

:
ELSA: Secure Aggregation for Federated Learning with Malicious Actors. 1961-1979 - Stephanie de Smale, Rik van Dijk, Xander Bouwman

, Jeroen van der Ham, Michel van Eeten:
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. 1980-1996 - Kelsey R. Fulton

, Samantha Katcher, Kevin Song, Marshini Chetty, Michelle L. Mazurek, Chloé Messdaghi, Daniel Votipka:
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery. 1997-2014 - Dilara Keküllüoglu

, Yasemin Acar:
"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups. 2015-2031 - Zachary Kilhoffer, Kyrie Zhixuan Zhou, Firmiana Wang, Fahad Tamton, Yun Huang, Pilyoung Kim, Tom Yeh, Yang Wang:

"How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School. 2032 - Miranda Wei, Pardis Emami Naeini

, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. 2050-2067 - Jaron Mink

, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang:
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations. 2068-2085 - Gabriel Ryan, Abhishek Shah, Dongdong She, Suman Jana:

Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis. 2086-2103 - Dae R. Jeong, Byoungyoung Lee

, Insik Shin, Youngjin Kwon:
SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing. 2104-2121 - Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun

, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. 2122-2137 - Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:

AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. 2122-2137 - Lin Ma, Duoming Zhou

, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren:
When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. 2138-2154 - Jiawei Yin, Menghao Li, Yuekang Li

, Yong Yu, Boru Lin, Yanyan Zou, Yang Liu
, Wei Huo, Jingling Xue:
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing. 2155-2169 - Hanshen Xiao, Zihang Xiang

, Di Wang
, Srinivas Devadas:
A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction. 2170-2189 - Wei Dong

, Qiyao Luo
, Ke Yi:
Continual Observation under User-level Differential Privacy. 2190-2207 - Huiyu Fang

, Liquan Chen, Yali Liu, Yuan Gao:
Locally Differentially Private Frequency Estimation Based on Convolution Framework. 2208-2222 - Zhen Sun, Vitaly Shmatikov:

Telepath: A Minecraft-based Covert Communication System. 2223-2237 - Jinyang Ding

, Kejiang Chen
, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu:
Discop: Provably Secure Steganography in Practice Based on "Distribution Copies". 2238-2255 - Stefan Gast

, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza
, Markus Köstl, Daniel Gruss:
SQUIP: Exploiting the Scheduler Queue Contention Side Channel. 2256-2272 - Lukas Giner

, Stefan Steinegger, Antoon Purnal, Maria Eichlseder
, Thomas Unterluggauer, Stefan Mangard
, Daniel Gruss
:
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks. 2273-2287 - Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, Youngjoo Shin:

DevIOus: Device-Driven Side-Channel Attacks on the IOMMU. 2288-2305 - Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham:

DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. 2306-2320 - Lukas Gerlach, Daniel Weber, Ruiyi Zhang

, Michael Schwarz:
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs. 2321-2338 - Hammond Pearce

, Benjamin Tan, Baleegh Ahmad, Ramesh Karri
, Brendan Dolan-Gavitt:
Examining Zero-Shot Vulnerability Repair with Large Language Models. 2339-2356 - Hammond Pearce

, Benjamin Tan, Baleegh Ahmad, Ramesh Karri
, Brendan Dolan-Gavitt:
Examining Zero-Shot Vulnerability Repair with Large Language Models. 2339-2356 - Wenyu Zhu, Zhiyao Feng, Zihan Zhang, Jianjun Chen, Zhijian Ou, Min Yang, Chao Zhang:

Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning. 2357-2374 - James Patrick-Evans, Moritz Dannehl, Johannes Kinder:

XFL: Naming Functions in Binaries with Extreme Multi-label Learning. 2375-2390 - Yapeng Ye, Zhuo Zhang

, Qingkai Shi, Yousra Aafer, Xiangyu Zhang:
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. 2391-2408 - Shu Wang

, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. 2409-2426 - Xinyi Wang

, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Yang Liu
, Wei Huo:
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation. 2427-2443 - Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang

, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais:
SoK: Decentralized Finance (DeFi) Attacks. 2444-2461 - Xianrui Qin, Shimin Pan

, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu
, Tsz Hon Yuen
:
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. 2462-2480 - Ruomu Hou, Haifeng Yu:

Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains. 2481-2498 - Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:

Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. 2499-2516 - Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jia-Guang Sun:

Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model. 2517-2532 - Tianyu Zheng, Shang Gao, Yubo Song

, Bin Xiao:
Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols. 2533-2550 - Harm Griffioen, Christian Doerr:

Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms. 2551-2565 - Marzieh Bitaab, Haehyun Cho

, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. 2566-2583 - Chijin Zhou

, Lihua Guo, Yiwei Hou, Zhenya Ma, Quan Zhang, Mingzhe Wang, Zhe Liu, Yu Jiang:
Limits of I/O Based Ransomware Detection: An Imitation Based Attack. 2584-2601 - Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing:

From Grim Reality to Practical Solution: Malware Classification in Real-World Noise. 2602-2619 - Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink

, Noor Michael, Sneha Gaur, Adam Bates
, Wajih Ul Hassan:
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions. 2620-2638 - Eleni Gkiouzepi

, Athanasios Andreou
, Oana Goga, Patrick Loiseau:
Collaborative Ad Transparency: Promises and Limitations. 2639-2657 - Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:

Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. 2658-2675 - Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, WooChul Shim, Yong Ho Hwang:

UTopia: Automatic Generation of Fuzz Driver using Unit Tests. 2676-2692 - Changhua Luo, Wei Meng, Penghui Li:

SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration. 2693-2707 - Ru Ji, Meng Xu:

Finding Specification Blind Spots via Fuzz Testing. 2708-2725 - Sicong Cao

, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei:
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. 2726-2743 - Jannis Rautenstrauch

, Giancarlo Pellegrino, Ben Stock:
The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web. 2744-2760 - Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo

, Mauro Tempesta, Marco Squarcina, Matteo Maffei:
WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms. 2761-2779 - Duc Bui, Brian Tang, Kang G. Shin:

Detection of Inconsistencies in Privacy Practices of Browser Extensions. 2780-2798 - Ruihua Wang, Yihao Peng

, Yilun Sun, Xuancheng Zhang, Hai Wan, Xibin Zhao:
TeSec: Accurate Server-side Attack Investigation for Web Applications. 2799-2816 - Mafalda Ferreira

, Tiago Brito
, José Fragoso Santos
, Nuno Santos:
RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks. 2817-2834 - Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates

, Nathan Malkin, Michelle L. Mazurek:
Characterizing Everyday Misuse of Smart Home Devices. 2835-2849 - Jingjie Li, Kaiwen Sun, Brittany Skye Huff, Anna Marie Bierley, Younghyun Kim

, Florian Schaub, Kassem Fawaz:
"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit. 2850-2866 - Julie M. Haney, Susanne M. Furman:

User Perceptions and Experiences with Smart Home Updates. 2867-2884 - Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang:

Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments. 2885-2902 - Hao-Ping Hank Lee, Jacob Logas, Stephanie S. Yang, Zhouyu Li, Natã M. Barbosa, Yang Wang, Sauvik Das:

When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study. 2903-2920 - Atri Bhattacharyya, Florian Hofhammer

, Yuanlong Li
, Siddharth Gupta
, Andrés Sánchez, Babak Falsafi, Mathias Payer:
SecureCells: A Secure Compartmentalized Architecture. 2921-2939 - Evan Johnson, Evan Laufer, Zijie Zhao, Dan Gohman, Shravan Narayan

, Stefan Savage, Deian Stefan, Fraser Brown:
WaVe: a verifiably secure WebAssembly sandboxing runtime. 2940-2955 - Dinglan Peng, Congyu Liu, Tapti Palit

, Pedro Fonseca, Anjo Vahldiek-Oberwagner, Mona Vij:
μSwitch: Fast Kernel Context Isolation with Implicit Context Switches. 2956-2973 - Ravi Theja Gollapudi, Gokturk Yuksek, David Demicco

, Matthew Cole
, Gaurav Kothari, Rohit Kulkarni, Xin Zhang, Kanad Ghose
, Aravind Prakash, Zerksis Umrigar:
Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture. 2974-2989 - Arslan Khan, Dongyan Xu, Dave Jing Tian:

EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. 2990-3007 - Arslan Khan, Dongyan Xu, Dave Jing Tian:

Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. 3008-3025 - Habiba Farrukh, Muslum Ozgur Ozmen, Faik Kerem Örs

, Z. Berkay Celik:
One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. 3026-3042 - Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle L. Mazurek:

Optimistic Access Control for the Smart Home. 3043-3060 - Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois

, David R. Choffnes:
Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. 3061-3078 - Mohammad M. Ahmadpanah

, Daniel Hedin, Andrei Sabelfeld:
LazyTAP: On-Demand Data Minimization for Trigger-Action Applications. 3079-3097 - Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor:

Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices. 3098-3112 - Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li:

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. 3113-3128 - Erik C. Rye, Robert Beverly

:
IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation. 3129-3145 - Norbert Ludant, Pieter Robyns, Guevara Noubir:

From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers. 3146-3161 - Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:

Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. 3162-3177 - Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, Guofei Gu:

Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches. 3178-3192 - Andrew D. Loveless, Linh Thi Xuan Phan, Ronald G. Dreslinski, Baris Kasikci:

PCSPOOF: Compromising the Safety of Time-Triggered Ethernet. 3193-3208 - Imtiaz Karim

, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. 3209-3227 - Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer:

ViDeZZo: Dependency-aware Virtual Device Fuzzing. 3228-3245 - Yilun Wu, Tong Zhang

, Changhee Jung, Dongyoon Lee
:
DevFuzz: Automatic Device Model-Guided Device Driver Fuzzing. 3246-3261 - Yu Hao

, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, Ardalan Amiri Sani:
SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers. 3262-3278 - HyungSeok Han, JeongOh Kyea, Yonghwi Jin, Jinoh Kang, Brian Pak, Insu Yun:

QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries. 3279-312795 - Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, Yonghwi Kwon:

Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. 3296-3313 - Benjamin Fuller, Abigail Harrison

, Alexander Russell
:
Adaptive Risk-Limiting Comparison Audits. 3314-3331 - Richard Roberts, Julio Poveda, Raley Roberts, Dave Levin:

Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones. 3332-3336 - Jason Ceci, Jonah Stegman, Hassan Khan:

No Privacy in the Electronics Repair Industry. 3347-3364 - Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen:

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. 3365-3381 - Yi Wu

, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, Yingying Chen:
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. 3382-3398 - Tao Ni

, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu
, Xiapu Luo, Qingchuan Zhao
:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. 3399-3415 - Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu

, Wenyao Xu, Kui Ren:
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks. 3416-3431 - Yan Long

, Chen Yan, Shilin Xiao
, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. 3432-3449 - Ruxin Wang, Long Huang, Chen Wang:

Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance. 3450-3465 - Carolyn Guthoff, Simon Anell

, Johann Hainzinger, Adrian Dabrowski
, Katharina Krombholz:
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals. 588-605 - Martin R. Albrecht, Sofía Celi

, Benjamin Dowling
, Daniel Jones:
Practically-exploitable Cryptographic Vulnerabilities in Matrix. 164-181 - Rui Zhu, Di Tang, Siyuan Tang, Xiaofeng Wang, Haixu Tang:

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. 1-19

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














