


default search action
45th SP 2024: San Francisco, CA, USA
- IEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024. IEEE 2024, ISBN 979-8-3503-3130-1

- Aleksandr Nahapetyan

, Sathvik Prasad, Kevin Childs, Adam Oest, Yeganeh Ladwig, Alexandros Kapravelos
, Bradley Reaves:
On SMS Phishing Tactics and Infrastructure. 1-16 - Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà

, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu
, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. 17-35 - Sayak Saha Roy

, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh:
From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models. 36-54 - Joel Frank, Franziska Herbert, Jonas Ricker

, Lea Schönherr
, Thorsten Eisenhofer, Asja Fischer
, Markus Dürmuth
, Thorsten Holz:
A Representative Study on Human Detection of Artificially Generated Media Across Countries. 55-73 - Xiangtao Meng

, Li Wang, Shanqing Guo, Lei Ju, Qingchuan Zhao
:
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. 74-90 - Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath

:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. 91-109 - William Kong, Andrés Muñoz Medina, Mónica Ribero, Umar Syed:

DP-Auditorium: A Large-Scale Library for Auditing Differential Privacy. 110-126 - Palak Jain, Adam Smith, Connor Wagaman:

Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation. 127-145 - Zachary Espiritu

, Marilyn George, Seny Kamara, Lucy Qin:
Synq: Public Policy Analytics Over Encrypted Data. 146-165 - Soheil Khodayari

, Thomas Barber
, Giancarlo Pellegrino:
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web. 166-184 - Qi Wang

, Jianjun Chen, Zheyu Jiang, Run Guo, Ximeng Liu, Chao Zhang, Haixin Duan:
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls. 185-202 - David Klein, Martin Johns:

Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials. 203-221 - Penghui Li, Wei Meng, Mingxue Zhang, Chenlin Wang, Changhua Luo:

Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis. 222-238 - Enze Wang

, Jianjun Chen, Wei Xie
, Chuhan Wang
, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang:
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications. 239-257 - Saiid El Hajj Chehade, Sandra Siby

, Carmela Troncoso:
SINBAD: Saliency-informed detection of breakage caused by ad blocking. 258-276 - Hoang Dai Nguyen, Karthika Subramani, Bhupendra Acharya, Roberto Perdisci, Phani Vadrevu

:
C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks. 277-295 - Feng Xiao, Zhongfu Su, Guangliang Yang, Wenke Lee:

Jasmine: Scale up JavaScript Static Security Analysis with Computation-based Semantic Explanation. 296-311 - Luis E. Salazar

, Sebastián R. Castro, Juan Lozano, Keerthi Koneru, Emmanuele Zambon, Bing Huang, Ross Baldick, Marina Krotofil, Alonso Rojas, Alvaro A. Cárdenas
:
A Tale of Two Industroyers: It was the Season of Darkness. 312-330 - Jennifer Sheldon, Weidong Zhu

, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi:
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. 331-349 - Irina Ford, Ananta Soneji, Faris Bugra Kokulu, Jayakrishna Vadayath

, Zion Leonahenahe Basque, Gaurav Vipat, Adam Doupé, Ruoyu Wang, Gail-Joon Ahn, Tiffany Bao, Yan Shoshitaishvili:
"Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them. 350-368 - Jack West, Lea Thiemt, Shimaa Ahmed, Maggie Bartig, Kassem Fawaz, Suman Banerjee:

A Picture is Worth 500 Labels: A Case Study of Demographic Disparities in Local Machine Learning Models for Instagram and TikTok. 369-387 - Zilong Lin

, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. 388-406 - Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr:

Poisoning Web-Scale Training Datasets is Practical. 407-425 - David Koisser, Richard Mitev, Marco Chilese, Ahmad-Reza Sadeghi:

Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users. 426-444 - Wei Liu, Yuanjie Li, Hewu Li, Yimei Chen, Yufeng Wang, Jingyi Lan, Jianping Wu, Qian Wu, Jun Liu, Zeqi Lai:

The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations. 445-464 - Jelle Vos, Mauro Conti

, Zekeriya Erkin
:
SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model. 465-483 - Xingyu Xie, Yifei Li

, Wei Zhang, Tuowei Wang, Shizhen Xu, Jun Zhu, Yifan Song:
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols. 484-502 - Andreas Brüggemann, Oliver Schick, Thomas Schneider

, Ajith Suresh
, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. 503-522 - Radhika Garg, Kang Yang, Jonathan Katz, Xiao Wang:

Scalable Mixed-Mode MPC. 523-541 - Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul

, Divya Ravi:
Asterisk: Super-fast MPC with a Friend. 542-560 - Wenhao Zhang

, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. 561-577 - Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang:

MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. 578-596 - Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:

Orca: FSS-based Secure Training and Inference with GPUs. 597-616 - Mindy Tran, Collins W. Munyendo

, Harshini Sri Ramulu, Rachel Gonzalez Rodriguez, Luisa Ball Schnell, Cora Sula, Lucy Simko, Yasemin Acar:
Security, Privacy, and Data-sharing Trade-offs When Moving to the United States: Insights from a Qualitative Study. 617-634 - Rosanna Bellini

, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. 635-654 - Kasra Edalatnejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso:

Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution. 655-672 - Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan A. Hutson, Ada Lerner:

SoK: Technical Implementation and Human Impact of Internet Privacy Regulations. 673-696 - Franziska Herbert, Steffen Becker

, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth
, Yixin Zou
, M. Angela Sasse:
Digital Security - A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups. 697-716 - Anh V. Vu, Alice Hutchings, Ross J. Anderson:

No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment. 717-734 - Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang:

Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. 735-751 - Karen Sowon, Edith Luhanga

, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania. 752-769 - Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:

You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. 770-787 - Nishant Vishwamitra

, Keyan Guo
, Farhan Tajwar Romit
, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. 788-806 - Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao:

Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. 807-825 - Zhuo Zhang

, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
On Large Language Models' Resilience to Coercive Interrogation. 826-844 - Hongwei Yao, Jian Lou, Zhan Qin

, Kui Ren:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. 845-861 - Saad Ullah

, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini:
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks. 862-880 - Jincheng Wang, Le Yu, Xiapu Luo:

LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. 881-896 - Yuchen Yang, Bo Hui, Haolin Yuan, Neil Gong, Yinzhi Cao:

SneakyPrompt: Jailbreaking Text-to-image Generative Models. 897-912 - Yun Lu, Malik Magdon-Ismail, Yu Wei

, Vassilis Zikas
:
Eureka: A General Framework for Black-box Differential Privacy Estimators. 913-931 - Narges Ashena, Oana Inel, Badrie L. Persaud, Abraham Bernstein:

Casual Users and Rational Choices within Differential Privacy. 932-950 - Tim Kutta, Önder Askin, Martin Dunsche:

Lower Bounds for Rényi Differential Privacy in a Black-Box Setting. 951-971 - Kai Zhang, Yanjun Zhang, Ruoxi Sun, Pei-Wei Tsai

, Muneeb Ul Hassan, Xin Yuan, Minhui Xue, Jinjun Chen:
Bounded and Unbiased Composite Differential Privacy. 972-990 - Nicolas Küchler, Emanuel Opel, Hidde Lycklama

, Alexander Viand
, Anwar Hithnawi:
Cohere: Managing Differential Privacy in Large Scale Systems. 991-1008 - Shuya Feng, Meisam Mohammady, Han Wang, Xiaochen Li, Zhan Qin

, Yuan Hong
:
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming. 1009-1027 - Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan:

Budget Recycling Differential Privacy. 1028-1046 - Priyanka Nanayakkara, Hyeok Kim, Yifan Wu

, Ali Sarvghad, Narges Mahyar, Gerome Miklau, Jessica Hullman:
Measure-Observe-Remeasure: An Interactive Paradigm for Differentially-Private Exploratory Analysis. 1047-1064 - Sabrina Amft, Sandra Höltervennhoff, Rebecca Panskus, Karola Marky, Sascha Fahl:

Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. 1065-1082 - Alfusainey Jallow, Michael Schilling, Michael Backes, Sven Bugiel:

Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security. 1083-1101 - Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson:

Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. 1102-1121 - Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans

, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. 1122-1140 - Sanghak Oh, Kiho Lee, Seonhye Park, Doowon Kim

, Hyoungshick Kim:
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models. 1141-1159 - Taylor R. Schorlemmer, Kelechi G. Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Ishgair, Saurabh Bagchi, Santiago Torres-Arias, James C. Davis

:
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors. 1160-1178 - Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu

, Haixin Duan, Xing Gao:
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services. 1179-1197 - Sandra Rivera Pérez, Michel van Eeten, Carlos Hernandez Gañán:

Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors. 1198-1216 - Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin

:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. 1217-1235 - Mahmoud Nazzal

, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. 1236-1254 - Andrew Yuan, Alina Oprea, Cheng Tan:

Dropout Attacks. 1255-1269 - Jie Wan

, Jianhao Fu
, Lijin Wang, Ziqi Yang:
BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild. 1270-1286 - Joshua C. Zhao, Atul Sharma, Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Salman Avestimehr, Saurabh Bagchi:

Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation. 1287-1305 - Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:

Test-Time Poisoning Attacks Against Test-Time Adaptation Models. 1306-1324 - Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:

Attacking Byzantine Robust Aggregation in High Dimensions. 1325-1344 - Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif:

CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers. 1345-1364 - Dario Pasquini

, Giuseppe Ateniese
, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. 1365-1384 - Jaehan Kim, Minkyoo Song, Minjae Seo, Youngjin Jin, Seungwon Shin:

PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph. 1385-1404 - Dario Pasquini

, Danilo Francati
, Giuseppe Ateniese
, Evgenios M. Kornaropoulos
:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. 1405-1423 - Fei Duan, Ding Wang, Chunfu Jia:

A Security Analysis of Honey Vaults. 1424-1442 - Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai

, David Evans
:
Combing for Credentials: Active Pattern Extraction from Smart Reply. 1443-1461 - Joyanta Debnath, Christa Jenkins

, Yuteng Sun
, Sze Yiu Chau, Omar Chowdhury:
ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation. 1462-1480 - Max Ammann

, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. 1481-1499 - Jannis Rautenstrauch

, Metodi Mitkov, Thomas Helbrecht, Lorenz Hetterich, Ben Stock:
To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape. 1500-1516 - Zahra Moti, Asuman Senol, Hamid Bostani

, Frederik J. Zuiderveen Borgesius, Veelasha Moonsamy, Arunesh Mathur, Gunes Acar
:
Targeted and Troublesome: Tracking and Advertising on Children's Websites. 1517-1535 - Jiaxun Cao, Abhinaya S. B., Anupam Das, Pardis Emami Naeini:

Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality. 1554-1572 - Chris Tsoukaladelis, Brian Kondracki, Niranjan Balasubramanian, Nick Nikiforakis:

The Times They Are A-Changin': Characterizing Post-Publication Changes to Online News. 1573-1589 - Yash Vekaria, Rishab Nithyanand, Zubair Shafiq:

The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain. 1590-1608 - Hans W. A. Hanley

, Deepak Kumar, Zakir Durumeric
:
Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale. 1609-1627 - Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu

, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. 1628-1645 - Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:

FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. 1646-1664 - Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:

Understanding and Benchmarking the Commonality of Adversarial Examples. 1665-1683 - Sunpill Kim

, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, Jae Hong Seo
:
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems. 1684-1702 - Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang

, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. 1703-1721 - Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu:

Transferable Multimodal Attack on Vision-Language Pre-training Models. 1722-1740 - Junrui Liu, Ian Kretz, Hanzhi Liu, Bryan Tan

, Jonathan Wang, Yi Sun, Luke Pearson, Anders Miltner, Isil Dillig, Yu Feng
:
Certifying Zero-Knowledge Circuits with Refinement Types. 1741-1759 - Ruihan Wang, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

:
Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser. 1760-1776 - Tianyi Liu

, Tiancheng Xie, Jiaheng Zhang, Dawn Song, Yupeng Zhang:
Pianist: Scalable zkRollups via Fully Distributed Zero-Knowledge Proofs. 1777-1793 - Miguel Isabel, Clara Rodríguez-Núñez, Albert Rubio:

Scalable Verification of Zero-Knowledge Protocols. 1794-1812 - Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue

, Lichun Li:
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. 1813-1831 - Nan Wang, Sid Chi-Kin Chau

, Dongxi Liu:
SwiftRange: A Short and Efficient Zero-Knowledge Range Argument For Confidential Transactions and More. 1832-1848 - Heqing Huang, Peisen Yao, Hung-Chun Chiu, Yiyuan Guo, Charles Zhang:

Titan : Efficient Multi-target Directed Greybox Fuzzing. 1849-1864 - Younggi Park, Hwiwon Lee, Jinho Jung, Hyungjoon Koo, Huy Kang Kim:

Benzene: A Practical Root Cause Analysis System with an Under-Constrained State Mutation. 1865-1883 - Yujian Zhang

, Yaokun Liu, Jinyu Xu, Yanhao Wang:
Predecessor-aware Directed Greybox Fuzzing. 1884-1900 - Yuwei Liu

, Yanhao Wang, Xiangkun Jia, Zheng Zhang, Purui Su:
AFGen: Whole-Function Fuzzing for Applications and Libraries. 1901-1919 - Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao:

Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices. 1920-1938 - Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Ming Gu, Qing Liao, Yu Jiang:

Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay. 1939-1955 - Heqing Huang, Anshunkang Zhou, Mathias Payer, Charles Zhang:

Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference. 1956-1973 - Moritz Schloegel

, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump
, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench
, Thorsten Holz:
SoK: Prudent Evaluation Practices for Fuzzing. 1974-1993 - Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:

MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic. 1994-2012 - Mohammad Naseri, Yufei Han, Emiliano De Cristofaro:

BadVFL: Backdoor Attacks in Vertical Federated Learning. 2013-2028 - Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang:

Distribution Preserving Backdoor Attack in Self-supervised Learning. 2029-2047 - Xiaoxing Mo

, Yechao Zhang, Leo Yu Zhang, Wei Luo
, Nan Sun
, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. 2048-2066 - Kunbei Cai, Md Hafizul Islam Chowdhuryy

, Zhenkai Zhang, Fan Yao
:
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories. 2067-2085 - Chen Gong

, Zhou Yang, Yunpeng Bai, Junda He, Jieke Shi, Kecen Li, Arunesh Sinha, Bowen Xu, Xinwen Hou, David Lo
, Tianhao Wang:
Baffle: Hiding Backdoors in Offline Reinforcement Learning Datasets. 2086-2104 - Kaiyuan Zhang

, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An
, Anuran Makur, Shiqing Ma, Xiangyu Zhang:
Exploring the Orthogonality and Linearity of Backdoor Attacks. 2105-2123 - Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. 2124-2141 - Ankit Kumar, Max von Hippel, Panagiotis Manolios, Cristina Nita-Rotaru:

Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers. 2142-2160 - Jannik Albrecht, Sébastien Andreina

, Frederik Armknecht, Ghassan Karame, Giorgia Azzurra Marson, Julian Willingmann:
Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security. 2161-2179 - Zheyuan He, Zihao Li

, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. 2180-2197 - Wuqi Zhang, Zhuo Zhang

, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. 2198-2216 - Sally Junsong Wang, Kexin Pei, Junfeng Yang:

SmartInv: Multimodal Learning for Smart Contract Invariant Inference. 2217-2235 - Mingxuan Yao, Runze Zhang, Haichuan Xu, Shih-Huan Chou, Varun Chowdhary Paturi, Amit Kumar Sikder, Brendan Saltaformaggio:

Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud. 2236-2254 - Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:

Towards Smart Contract Fuzzing on GPUs. 2255-2272 - Christoph Sendner

, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko:
Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts. 2273-2290 - Takayuki Sasaki, Takaya Noma, Yudai Morii, Toshiya Shimura, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:

Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network. 2291-2309 - Qinying Wang, Boyu Chang

, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. 2310-2387 - Hyungsub Kim, Rwitam Bandyopadhyay, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Yongdae Kim, Dongyan Xu:

A Systematic Study of Physical Sensor Attack Hardness. 2328-2347 - Pengfei Jing, Zhiqiang Cai, Yingjie Cao

, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. 2348-2365 - Xingli Zhang, Yazhou Tu, Yan Long

, Liqun Shan, Mohamed A Elsaadani, Kevin Fu, Zhiqiang Lin, Xiali Hei:
From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover. 2366-2384 - Bin Yuan, Zhanxiang Song, Yan Jia

, Zhenyu Lu, Deqing Zou, Hai Jin, Luyi Xing:
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations. 2385-2403 - Doguhan Yeke, Muhammad Ibrahim, Güliz Seray Tuncay

, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik:
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables. 2404-2421 - Ben Nassi, Etay Iluz, Or Hai Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:

Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras. 2422-2440 - Maximilian Noppel

, Christian Wressnegger:
SoK: Explainable Machine Learning in Adversarial Environments. 2441-2459 - Asim Waheed, Vasisht Duddu, N. Asokan:

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings. 2460-2477 - Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu:

Revisiting Black-box Ownership Verification for Graph Neural Networks. 2478-2496 - Zihan Wang

, Zhongkui Ma
, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai
:
CORELOCKER: Neuron-level Usage Control. 2497-2514 - Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang

, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. 2515-2533 - Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. 2534-2552 - Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:

Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. 2553-2571 - Ehsanul Kabir, Zeyu Song, Md. Rafi Ur Rashid, Shagufta Mehnaz:

FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks. 2572-2590 - Cas Cremers, Mang Zhao:

Secure Messaging with Strong Compromise Resilience, Temporal Privacy, and Immediate Decryption. 2591-2609 - Armin Namavari, Barry Wang, Sanketh Menda, Ben Nassi, Nirvan Tyagi, James Grimmelmann, Amy X. Zhang, Thomas Ristenpart:

Private Hierarchical Governance for Encrypted Messaging. 2610-2629 - Yuelin Liu, Huangxun Chen, Zhice Yang:

Enforcing End-to-end Security for Remote Conference Applications. 2630-2647 - Andrés Fábrega, Carolina Ortega Pérez, Armin Namavari, Ben Nassi, Rachit Agarwal, Thomas Ristenpart:

Injection Attacks Against End-to-End Encrypted Applications. 2648-2665 - Martin R. Albrecht, Benjamin Dowling, Daniel Jones:

Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core. 2666-1685 - Cas Cremers, Eyal Ronen, Mang Zhao:

Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. 2686-2704 - Zachary Ratliff, Wittmann Goh, Abe Wieland, James Mickens, Ryan Williams:

Holepunch: Fast, Secure File Deletion with Crash Consistency. 2705-2721 - Sandeep Kiran Pinjala, Bogdan Carbunar, Anrin Chakraborti, Radu Sion

:
INVISILINE: Invisible Plausibly-Deniable Storage. 2722-2739 - Zhe Qu, Rui Duan, Xiao Han, Shangqing Zhao, Yao Liu, Zhuo Lu:

Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information. 2740-2758 - Zhambyl Shaikhanov, Sherif Badran

, Hichem Guerboukha
, Josep Miquel Jornet, Daniel M. Mittleman, Edward W. Knightly:
MetaFly: Wireless Backhaul Interception via Aerial Wavefront Manipulation. 2759-2774 - Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. 2775-2793 - Xiliang Luo, Cem Kalkanli, Hao Zhou, Pengcheng Zhan, Moche Cohen:

Secure Ranging with IEEE 802.15.4z HRP UWB. 2794-2811 - Jun Luo, Hangcheng Cao, Hongbo Jiang, Yanbing Yang, Zhe Chen:

MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption. 2812-2830 - Erik C. Rye, Dave Levin:

Surveilling the Masses with Wi-Fi-Based Positioning Systems. 2831-2846 - Jianliang Wu

, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. 2847-228066 - Hadi Givehchian, Nishant Bhaskar

, Alexander Redding, Han Zhao, Aaron Schulman, Dinesh Bharadia:
Practical Obfuscation of BLE Physical-Layer Fingerprints on Mobile Devices. 2867-2885 - Andrew C. Cullen, Paul Montague, Shijie Liu

, Sarah M. Erfani, Benjamin I. P. Rubinstein:
It's Simplex! Disaggregating Measures to Improve Certified Robustness. 2886-2900 - Alec F. Diallo

, Paul Patras:
Sabre: Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstruction. 2901-2919 - Xinyu Zhang, Hanbin Hong, Yuan Hong

, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. 2920-2938 - Yanting Wang, Wei Zou, Jinyuan Jia:

FCert: Certifiably Robust Few-Shot Classification in the Era of Foundation Models. 2939-2957 - Yuni Lai, Yulin Zhu

, Bailin Pan, Kai Zhou
:
Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks. 2958-2976 - Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:

LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. 2977-2995 - Vasisht Duddu, Sebastian Szyller

, N. Asokan:
SoK: Unintended Interactions among Machine Learning Defenses and Risks. 2996-3014 - Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan

, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. 3015-3033 - Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:

hinTS: Threshold Signatures with Silent Setup. 3034-3052 - Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:

Threshold ECDSA in Three Rounds. 3053-3071 - Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:

Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. 3072-3090 - Sarabjeet Singh, Shreyas Singh, Sumanth Gudaparthi, Xiong Fan, Rajeev Balasubramonian:

Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference. 3091-3108 - Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang

, Robert H. Deng
:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. 3109-3127 - Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden

, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. 3128-3146 - Jianning Zhang, Ming Su, Xiaoguang Liu, Gang Wang:

Springproofs: Efficient Inner Product Arguments for Vectors of Arbitrary Length. 3147-3164 - Simon Jeanteur, Laura Kovács, Matteo Maffei, Michael Rawson:

CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model. 3165-3183 - Jean-Luc Watson, Tess Despres, Alvin Tan, Shishir G. Patil, Prabal Dutta, Raluca Ada Popa:

Nebula: A Privacy-First Platform for Data Backhaul. 3184-3202 - Ceren Kocaogullar, Daniel Hugenroth, Martin Kleppmann

, Alastair R. Beresford:
Pudding: Private User Discovery in Anonymity Networks. 3203-3220 - Zhongtang Luo

, Adithya Bhat, Kartik Nayak, Aniket Kate:
Attacking and Improving the Tor Directory Protocol. 3221-3237 - Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:

Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. 3238-3256 - Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:

Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. 3257-3275 - Youngsik Yoon, Jinhwan Nam, Hyojeong Yun, Jaeho Lee, Dongwoo Kim, Jungseul Ok:

Few-shot Unlearning. 3276-3292 - Yukui Luo, Adnan Siraj Rakin, Deliang Fan, Xiaolin Xu:

DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA. 3293-3310 - Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Surya Nepal:

DeepTheft: Stealing DNN Model Architectures through Power Side Channel. 3311-3326 - Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen:

No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML. 3327-3345 - Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi:

One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices. 3346-3364 - Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan

, Hai Jin:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. 3365-3384 - Xingshuo Han, Yutong Wu, Qingjie Zhang, Yuan Zhou, Yuan Xu, Han Qiu, Guowen Xu, Tianwei Zhang:

Backdooring Multimodal Learning. 3385-3403 - Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni:

Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites. 3404-3422 - Rosario Giustolisi, Maryam Sheikhi Garjan, Carsten Schürmann:

Thwarting Last-Minute Voter Coercion. 3423-3439 - Henri Devillez, Olivier Pereira, Thomas Peters, Quentin Yang:

Can we cast a ballot as intended and be receipt free? 3440-3457 - Karola Marky, Nina Gerber

, Henry John Krumb, Mohamed Khamis
, Max Mühlhäuser:
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting. 3458-3477 - Louis-Henri Merino, Alaleh Azhir, Haoqian Zhang, Simone Colombo, Bernhard Tellenbach, Vero Estrada-Galiñanes

, Bryan Ford:
E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting. 3478-3496 - Patrick Tser Jern Kon

, Aniket Gattani, Dhiraj Saharia, Tianyu Cao, Diogo Barradas, Ang Chen, Micah Sherr
, Benjamin E. Ujcich
:
NetShuffle: Circumventing Censorship with Shuffle Proxies at the Edge. 3497-3514 - Akul Goyal, Gang Wang, Adam Bates

:
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. 3515-3532 - Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. 3533-3551 - Mati Ur Rehman, Hadi Ahmadi, Wajih Ul Hassan:

Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning. 3552-3570 - R. Sekar, Hanke Kimm, Rohit Aich:

eAudit: A Fast, Scalable and Deployable Audit Data Collection System. 3571-3589 - Jiacen Xu, Xiaokui Shu, Zhou Li

:
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics. 3590-3608 - Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz

, David Ott:
DrSec: Flexible Distributed Representations for Efficient Endpoint Security. 3609-3624 - Daniel Schlette

, Philip Empl
, Marco Caselli
, Thomas Schreck
, Günther Pernul:
Do You Play It by the Books? A Study on Incident Response Playbooks and Influencing Factors. 3625-3643 - Joseph Khoury

, Dorde Klisura, Hadi Zanddizari, Gonzalo De La Torre Parra, Peyman Najafirad, Elias Bou-Harb:
Jbeil: Temporal Graph-Based Inductive Learning to Infer Lateral Movement in Evolving Enterprise Networks. 3644-3660 - Lukas Gerlach, Simon Schwarz, Nicolas Faroß

, Michael Schwarz:
Efficient and Generic Microarchitectural Hash-Function Recovery. 3661-3678 - Cristiano Rodrigues

, Daniel Oliveira, Sandro Pinto:
BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect. 3679-3696 - Hans Winderix

, Marton Bognar
, Job Noorman, Lesly-Ann Daniel
, Frank Piessens:
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs. 3697-3715 - Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:

GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. 3716-3734 - Sushant Dinesh, Madhusudan Parthasarathy, Christopher W. Fletcher:

ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks. 3735-3753 - Tom Kessous, Niv Gilboa:

Prune+PlumTree - Finding Eviction Sets at Scale. 3754-3772 - Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida

:
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation. 3773-3788 - Xinming Wei

, Jiaxi Zhang, Guojie Luo:
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity. 3789-3804 - Muoi Tran, Theo von Arx, Laurent Vanbever:

Routing Attacks on Cryptocurrency Mining Pools. 3805-3821 - Lucjan Hanzlik, Julian Loss, Sri Aravinda Krishnan Thyagarajan

, Benedikt Wagner:
Sweep-UC: Swapping Coins Privately. 3822-3839 - André Augusto

, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono:
SoK: Security and Privacy of Blockchain Interoperability. 3840-3865 - Lioba Heimbach

, Vabuk Pahari, Eric Schertenleib:
Non-Atomic Arbitrage in Decentralized Finance. 3866-3884 - Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse:

Optimal Flexible Consensus and its Application to Ethereum. 3885-3903 - Yue Guo, Harish Karthikeyan, Antigoni Polychroniadou, Chaddy Huussin:

PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments. 3904-3922 - Rui Xi, Zehua Wang, Karthik Pattabiraman:

POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance. 3923-3942 - Zhe Ye, Ujval Misra, Jiajun Cheng, Wenyang Zhou, Dawn Song:

Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution. 3943-3960 - Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:

Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. 3961-3978 - Amit Seal Ami

, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. 3979-3997 - Qian Sang, Yanhao Wang, Yuwei Liu, Xiangkun Jia, Tiffany Bao, Purui Su:

AirTaint: Making Dynamic Taint Analysis Faster and Easier. 3998-4014 - Zhengyu Liu

, Kecheng An, Yinzhi Cao:
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences. 4015-4033 - Jiasheng Jiang

, Jingzheng Wu, Xiang Ling, Tianyue Luo, Sheng Qu, Yanjun Wu:
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns. 4034-4052 - Jiun Min, Dongyeon Yu, Seongyun Jeong, Dokyung Song

, Yuseok Jeon:
ERASan: Efficient Rust Address Sanitizer. 4053-4068 - Kuntal Kumar Pal, Ati Priya Bajaj, Pratyay Banerjee, Audrey Dutcher, Mutsumi Nakamura, Zion Leonahenahe Basque, Himanshu Gupta, Saurabh Arjun Sawant, Ujjwala Anantheswaran, Yan Shoshitaishvili, Adam Doupé, Chitta Baral, Ruoyu Wang:

"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. 4069-4087 - Borui Yang

, Wei Li, Liyao Xiang, Bo Li:
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations. 4088-4106 - Jubayer Mahmod, Matthew Hicks:

UnTrustZone: Systematic Accelerated Aging to Expose On-chip Secrets. 4107-4124 - Ivan Puddu, Moritz Schneider, Daniele Lain, Stefano Boschetto, Srdjan Capkun:

On (the Lack of) Code Confidentiality in Trusted Execution Environments. 4125-4142 - Stephan van Schaik

, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman:
SoK: SGX.Fail: How Stuff Gets eXposed. 4143-4162 - Fritz Alder, Lesly-Ann Daniel

, David F. Oswald
, Frank Piessens, Jo Van Bulck
:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. 4163-4181 - Jan Wichelmann, Anja Rabich, Anna Pätschke, Thomas Eisenbarth

:
Obelix: Mitigating Side-Channels Through Dynamic Obfuscation. 4182-4199 - Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:

Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. 4200-4219 - Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde

:
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP. 4220-4238 - Floris Gorter, Taddeus Kroes, Herbert Bos

, Cristiano Giuffrida
:
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags. 4239-4257 - Xiang Li

, Yunqian Luo, Mingyu Gao:
Bulkor: Enabling Bulk Loading for Path ORAM. 4258-4276 - Nicholas Ngai, Ioannis Demertzis

, Javad Ghareh Chamani, Dimitrios Papadopoulos:
Distributed & Scalable Oblivious Sorting and Shuffling. 4277-4295 - Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi

:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. 4296-4314 - Jian Liu, Jingyu Li, Di Wu, Kui Ren:

PIRANA: Faster Multi-query PIR via Constant-weight Codes. 4315-4330 - Andrew Park, Trevor Leong, Francisco Maturana, Wenting Zheng, K. V. Rashmi:

Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage. 4331-4347 - Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate:

More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR. 4348-4366 - Zeyu Liu, Eran Tromer

, Yunhao Wang:
Group Oblivious Message Retrieval. 4367-4385 - Daniel Schadt, Christoph Coijanovic

, Christiane Weis, Thorsten Strufe:
PolySphinx: Extending the Sphinx Mix Format With Better Multicast Support. 4386-4404 - Florian Hantke, Sebastian Roth

, Rafael Mrowczynski, Christine Utz, Ben Stock:
Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research. 4405-4423 - Huancheng Zhou, Guofei Gu:

Cerberus: Enabling Efficient and Effective In-Network Monitoring on Programmable Switches. 4424-4439 - Soo-Jin Moon, Milind Srivastava, Yves Bieri, Ruben Martins, Vyas Sekar:

Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments. 4440-4458 - Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang

, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. 4459-4477 - Xiang Li, Dashuai Wu

, Haixin Duan, Qi Li:
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. 4478-4496 - Yepeng Pan, Christian Rossow:

TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake. 4497-4515 - Tillson Galloway, Kleanthis Karakolios, Zane Ma

, Roberto Perdisci, Angelos Keromytis, Manos Antonakakis:
Practical Attacks Against DNS Reputation Systems. 4516-4534 - Chris Misa, Ramakrishnan Durairajan, Arpit Gupta, Reza Rejaie, Walter Willinger:

Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches. 4535-4553 - William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang:

Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization. 4554-4572 - Md. Sadun Haq, Thien Duc Nguyen, Ali Saman Tosun, Franziska Vollmer, Turgay Korkmaz, Ahmad-Reza Sadeghi:

SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms. 4573-4590 - Philipp Beer, Marco Squarcina, Lorenzo Veronese, Martina Lindorfer:

Tabbed Out: Subverting the Android Custom Tab Security Model. 4591-4609 - Osama Bajaber, Bo Ji, Peng Gao:

P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF. 4610-4628 - Sönke Huster, Matthias Hollick

, Jiska Classen:
To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices. 4629-4645 - Yiru Xu, Hao Sun

, Jianzhong Liu, Yuheng Shen, Yu Jiang:
Saturn: Host-Gadget Synergistic USB Driver Fuzzing. 4646-4660 - Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian:

SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing. 4661-4677 - Cheng Gongye

, Yukui Luo, Xiaolin Xu, Yunsi Fei:
Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration. 4678-4695 - Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David A. Forsyth, Bo Li, Dawn Song:

SoK: Privacy-Preserving Data Synthesis. 4696-4713 - Zihang Xiang

, Tianhao Wang, Di Wang
:
Preserving Node-level Privacy in Graph Neural Networks. 4714-4732 - Robin Staab, Nikola Jovanovic, Mislav Balunovic, Martin T. Vechev:

From Principle to Practice: Vertical Data Minimization for Machine Learning. 4733-4752 - Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider

:
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. 4753-4771 - Chamara Sandeepa, Bartlomiej Siniarski

, Shen Wang, Madhusanka Liyanage
:
SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks. 4772-4790 - Han Liu, Yuhao Wu, Zhiyuan Yu

, Ning Zhang:
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack. 4791-4809 - Qiao Zhang, Tao Xiang, Chunsheng Xin, Hongyi Wu:

From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning. 4810-4827 - Yangfan Jiang, Xinjian Luo, Yuncheng Wu, Xiaokui Xiao, Beng Chin Ooi:

Protecting Label Distribution in Cross-Silo Federated Learning. 4828-4847

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














