default search action
44th SP 2023: San Francisco, CA, USA
- 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023. IEEE 2023, ISBN 978-1-6654-9336-9
- Johannes Willbold, Moritz Schloegel, Manuel Vögele, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi:
Space Odyssey: An Experimental Software Security Analysis of Satellites. 1-19 - Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee:
Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. 20-37 - Brian Singer, Amritanshu Pandey, Shimiao Li, Lujo Bauer, Craig Miller, Lawrence T. Pileggi, Vyas Sekar:
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations. 38-55 - Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar:
Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. 56-74 - Kevin Choi, Aathira Manoj, Joseph Bonneau:
SoK: Distributed Randomness Beacons. 75-92 - Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar:
WeRLman: To Tackle Whale (Transactions), Go Deep (RL). 93-110 - Muhammad Saad, David Mohaisen:
Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks. 111-125 - Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu:
Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. 126-145 - Matilda Backendal, Miro Haller, Kenneth G. Paterson:
MEGA: Malleable Encryption Goes Awry. 146-163 - Mathew Hogan, Yan Michalevsky, Saba Eskandarian:
DBREACH: Stealing from Databases Using Compression Side Channels. 182-198 - Quang Dao, Jim Miller, Opal Wright, Paul Grubbs:
Weak Fiat-Shamir Attacks on Modern Proof Systems. 199-216 - Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith:
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany. 217-233 - Shubham Jain, Ana-Maria Cretu, Antoine Cully, Yves-Alexandre de Montjoye:
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. 234-252 - Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer:
Public Verification for Private Hash Matching. 253-273 - Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers:
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. 274-292 - Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. 293-310 - Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini:
Lambretta: Learning to Rank for Twitter Soft Moderation. 311-326 - Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella Béguelin:
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning. 327-345 - Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella Béguelin:
Analyzing Leakage of Personally Identifiable Information in Language Models. 346-363 - Shahbaz Rezaei, Zubair Shafiq, Xin Liu:
Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective. 364-381 - Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue:
D-DAE: Defense-Penetrating Model Extraction Attacks. 382-399 - Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan R. Ullman:
SNAP: Efficient Extraction of Private Properties with Poisoning. 400-417 - Dario Pasquini, Mathilde Raynal, Carmela Troncoso:
On the (In)security of Peer-to-Peer Decentralized Machine Learning. 418-436 - Muhammad Haris Mughees, Ling Ren:
Vectorized Batch Private Information Retrieval. 437-452 - Hidde Lycklama, Lukas Burkhalter, Alexander Viand, Nicolas Küchler, Anwar Hithnawi:
RoFL: Robustness of Secure Federated Learning. 453-476 - Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin:
Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. 477-496 - Lucien K. L. Ng, Sherman S. M. Chow:
SoK: Cryptographic Neural-Network Computation. 497-514 - Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations. 515-533 - Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu:
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. 534-551 - Sena Sahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank Li:
Investigating the Password Policy Practices of Website Administrators. 552-569 - Collins W. Munyendo, Yasemin Acar, Adam J. Aviv:
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. 570-587 - Jeremiah Blocki, Peiyuan Liu:
Towards a Rigorous Statistical Analysis of Empirical Password Datasets. 606-625 - Peiyuan Liu, Jeremiah Blocki, Wenjie Bai:
Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models. 626-644 - Boya Wang, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso:
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution. 645-663 - Maximilian Noppel, Lukas Peter, Christian Wressnegger:
Disguising Attacks with Explanation-Aware Backdoors. 664-681 - Hong Zhu, Shengzhi Zhang, Kai Chen:
AI-Guardian: Defeating Adversarial Attacks using Backdoors. 701-718 - Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. 719-736 - Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
BayBFed: Bayesian Backdoor Defense for Federated Learning. 737-754 - Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. 755-772 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. 773-789 - Michael Rosenberg, Jacob D. White, Christina Garman, Ian Miers:
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure. 790-808 - Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park:
Private Access Control for Function Secret Sharing. 809-828 - Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa:
MPCAuth: Multi-factor Authentication for Distributed-trust Systems. 829-847 - Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng:
Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols. 848-863 - Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. 864-881 - Yueli Yan, Zhice Yang:
Spoofing Real-world Face Authentication Systems through Optical Synthesis. 882-898 - Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang:
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. 899-916 - Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:
DepthFake: Spoofing 3D Face Authentication with a 2D Photo. 917-91373 - Xiaohan Zhang, Haoqi Ye, Ziqi Huang, Xiao Ye, Yinzhi Cao, Yuan Zhang, Min Yang:
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective. 934-950 - Andre Kassis, Urs Hengartner:
Breaking Security-Critical Voice Authentication. 951-968 - Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses. 969-986 - Xu Lin, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis:
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. 987-1004 - Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Robust Multi-tab Website Fingerprinting Attacks in the Wild. 1005-1022 - Ryan Torok, Amit Levy:
Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense. 1023-1040 - Soheil Khodayari, Giancarlo Pellegrino:
It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses. 1041-1058 - Mingqing Kang, Yichao Xu, Song Li, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao:
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. 1059-1076 - Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. 1077-1093 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean:
Typing High-Speed Cryptography against Spectre v1. 1094-1111 - Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies:
Less is more: refinement proofs for probabilistic proofs. 1112-1129 - Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. 1130-1147 - Mike Graf, Ralf Küsters, Daniel Rausch:
AUC: Accountable Universal Composability. 1148-1167 - Rafaël del Pino, Thomas Prest, Mélissa Rossi, Markku-Juhani O. Saarinen:
High-Order Masking of Lattice Signatures in Quasilinear Time. 1168-1185 - Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss:
Practical Timing Side-Channel Attacks on Memory Compression. 1186-1203 - Marcel Busch, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, Mathias Payer:
TEEzz: Fuzzing Trusted Applications on COTS Android Devices. 1204-1219 - Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean M. Tullsen:
Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. 1220-1237 - Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean M. Tullsen:
Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. 1220-1237 - Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant:
Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies. 1238-1255 - Kangjie Lu:
Practical Program Modularization with Type-Based Dependence Analysis. 1256-1270 - Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer:
WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. 1271-1288 - Linyi Li, Tao Xie, Bo Li:
SoK: Certified Robustness for Deep Neural Networks. 1289-1310 - Maurice Weber, Xiaojun Xu, Bojan Karlas, Ce Zhang, Bo Li:
RAB: Provable Robustness Against Backdoor Attacks. 1311-1328 - Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal:
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking. 1329-1347 - Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. 1348-1365 - Xiaoyu Cao, Jinyuan Jia, Zaixi Zhang, Neil Zhenqiang Gong:
FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information. 1366-1383 - Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. 1384-1400 - Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis:
Rethinking Searchable Symmetric Encryption. 1401-1418 - Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. 1419-1434 - Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. 1419-1434 - Andreas Hülsing, Mikhail A. Kudinov, Eyal Ronen, Eylon Yogev:
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. 1435-1453 - Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. 1454-1470 - Nina Bindel, Cas Cremers, Mang Zhao:
FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. 1471-1490 - Lucjan Hanzlik, Julian Loss, Benedikt Wagner:
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2. 1491-1508 - Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais:
SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. 1509-1526 - Marcel Fourné, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar:
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. 1527-1544 - Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl:
"Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. 1545-1560 - Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao:
Continuous Intrusion: Characterizing the Security of Continuous Integration Services. 1561-1577 - Yacong Gu, Lingyun Ying, Yingyuan Pu, Xiao Hu, Huajun Chai, Ruimin Wang, Xing Gao, Haixin Duan:
Investigating Package Related Security Threats in Software Registries. 1578-1595 - Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha:
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks. 1596-1612 - Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:
Deepfake Text Detection: Limitations and Opportunities. 1613-1630 - Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. 1631-1648 - Ruijie Zhao, Xianwen Deng, Yanhao Wang, Zhicong Yan, Zhengguang Han, Libo Chen, Zhi Xue, Yijun Wang:
GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas. 1649-1666 - Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. 1667-1683 - Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi:
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. 1684-1701 - Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss:
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. 1702-1718 - Koksal Mus, Yarkin Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar:
Jolt: Recovering TLS Signing Keys via Rowhammer Faults. 1719-1736 - Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein:
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. 1737-1752 - Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. 1753-1770 - Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. 1771-1788 - Donghui Dai, Zhenlin An, Lei Yang:
Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks. 1789-1806 - Rohith Reddy Vennam, Ish Kumar Jain, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia:
mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array. 1807-1821 - Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. 1822-1839 - Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. 1840-1856 - Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu:
Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. 1857-1874 - Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi:
3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning. 1893-1907 - David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux:
Scalable and Privacy-Preserving Federated Principal Component Analysis. 1908-1925 - Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han:
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. 1926-1943 - Ce Feng, Nuo Xu, Wujie Wen, Parv Venkitasubramaniam, Caiwen Ding:
Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering. 1944-1960 - Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa:
ELSA: Secure Aggregation for Federated Learning with Malicious Actors. 1961-1979 - Stephanie de Smale, Rik van Dijk, Xander Bouwman, Jeroen van der Ham, Michel van Eeten:
No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. 1980-1996 - Kelsey R. Fulton, Samantha Katcher, Kevin Song, Marshini Chetty, Michelle L. Mazurek, Chloé Messdaghi, Daniel Votipka:
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery. 1997-2014 - Dilara Keküllüoglu, Yasemin Acar:
"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups. 2015-2031 - Zachary Kilhoffer, Zhixuan Zhou, Firmiana Wang, Fahad Tamton, Yun Huang, Pilyoung Kim, Tom Yeh, Yang Wang:
"How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School. 2032 - Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. 2050-2067