| 2023 | A First Look at Toxicity Injection Attacks on Open-domain Chatbots. Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath |
| 2023 | A Tagging Solution to Discover IoT Devices in Apartments. Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian |
| 2023 | ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning. Bo Cui, Tianyu Mei |
| 2023 | ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu |
| 2023 | An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker |
| 2023 | Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023 |
| 2023 | Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems. Marina Moore, Trishank Karthik Kuppusamy, Justin Cappos |
| 2023 | Attack of the Knights: Non Uniform Cache Side Channel Attack. Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Eun Jung Kim, Chia-Che Tsai, Abdullah Muzahid |
| 2023 | Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. Richard August See, Maximilian Gehring, Mathias Fischer, Shankar Karuppayah |
| 2023 | Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. Yufan Chen, Arjun Arunasalam, Z. Berkay Celik |
| 2023 | Continuous Authentication Using Human-Induced Electric Potential. Srinivasan Murali, Wenqiang Jin, Vighnesh Sivaraman, Huadi Zhu, Tianxi Ji, Pan Li, Ming Li |
| 2023 | Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors. Jafar Pourbemany, Ye Zhu |
| 2023 | DOPE: DOmain Protection Enforcement with PKS. Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard |
| 2023 | DeepContract: Controllable Authorization of Deep Learning Models. Xirong Zhuang, Lan Zhang, Chen Tang, Huiqi Liu, Bin Wang, Yan Zheng, Bo Ren |
| 2023 | DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal |
| 2023 | DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection. Son Seonghun, Debopriya Roy Dipta, Berk Gülmezoglu |
| 2023 | Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials. DaeGeun Yoon, Taejoong Chung, Yongdae Kim |
| 2023 | Detecting Weak Keys in Manufacturing Certificates: A Case Study. Andrew Chi, Brandon Enright, David A. McGrew |
| 2023 | Detection of Anomalies in Electric Vehicle Charging Sessions. Dustin Kern, Christoph Krauß, Matthias Hollick |
| 2023 | Differentially Private Resource Allocation. Joann Qiongna Chen, Tianhao Wang, Zhikun Zhang, Yang Zhang, Somesh Jha, Zhou Li |
| 2023 | Domain and Website Attribution beyond WHOIS. Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge |
| 2023 | Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. Zeyu Deng, Long Huang, Chen Wang |
| 2023 | FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. Buse G. A. Tekgul, N. Asokan |
| 2023 | FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi |
| 2023 | FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks. Ayesha S. Dina, A. B. Siddique, D. Manivannan |
| 2023 | FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification. Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac |
| 2023 | From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino |
| 2023 | Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks. Yizhe Zhang, Hongying Dong, Alastair Nottingham, Molly Buchanan, Donald E. Brown, Yixin Sun |
| 2023 | Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen |
| 2023 | Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones. Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro |
| 2023 | Link Membership Inference Attacks against Unsupervised Graph Representation Learning. Xiuling Wang, Wendy Hui Wang |
| 2023 | Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, Yamin Xie |
| 2023 | Mitigating Membership Inference Attacks via Weighted Smoothing. Mingtian Tan, Xiaofei Xie, Jun Sun, Tianhao Wang |
| 2023 | Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello |
| 2023 | No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde |
| 2023 | OAuth 2.0 Redirect URI Validation Falls Short, Literally. Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda |
| 2023 | On the Detection of Image-Scaling Attacks in Machine Learning. Erwin Quiring, Andreas Müller, Konrad Rieck |
| 2023 | On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI. Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais |
| 2023 | PAVUDI: Patch-based Vulnerability Discovery using Machine Learning. Tom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck |
| 2023 | PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior. Dazhi Zhan, Wei Bai, Xin Liu, Yue Hu, Lei Zhang, Shize Guo, Zhisong Pan |
| 2023 | PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba |
| 2023 | Poisoning Network Flow Classifiers. Giorgio Severi, Simona Boboila, Alina Oprea, John T. Holodnak, Kendra Kratkiewicz, Jason Matterer |
| 2023 | Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. Andrew Chi, Blake Anderson, Michael K. Reiter |
| 2023 | Protecting Your Voice from Speech Synthesis Attacks. Zihao Liu, Yan Zhang, Chenglin Miao |
| 2023 | RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis. Fabian Franzen, Andreas Chris Wilhelmer, Jens Grossklags |
| 2023 | Remote Attestation with Constrained Disclosure. Michael Eckel, Dominik Roy George, Björn Grohmann, Christoph Krauß |
| 2023 | Remote attestation of confidential VMs using ephemeral vTPMs. Vikram Narayanan, Cláudio Carvalho, Angelo Ruocco, Gheorghe Almási, James Bottomley, Mengmei Ye, Tobin Feldman-Fitzthum, Daniele Buono, Hubertus Franke, Anton Burtsev |
| 2023 | Scamdog Millionaire: Detecting E-commerce Scams in the Wild. Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge |
| 2023 | SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou |
| 2023 | SealClub: Computer-aided Paper Document Authentication. Martín Ochoa, Hernán Vanegas, Jorge Toro-Pozo, David A. Basin |
| 2023 | Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse. Fabing Li, Xiang Li, Mingyu Gao |
| 2023 | Secure Softmax/Sigmoid for Machine-learning Computation. Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin |
| 2023 | Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles. Christian Plappert, Andreas Fuchs |
| 2023 | Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles. Christian Plappert, Andreas Fuchs |
| 2023 | TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing |
| 2023 | The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time. Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri |
| 2023 | The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms. Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu |
| 2023 | Triereme: Speeding up hybrid fuzzing through efficient query scheduling. Elia Geretto, Julius Hohnerlein, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall |
| 2023 | Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi |
| 2023 | When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild. Alberto Carboneri, Mohammad Ghasemisharif, Soroush Karami, Jason Polakis |