| 2024 | A Fly on the Wall - Exploiting Acoustic Side-Channels in Differential Pressure Sensors. Yonatan Gizachew Achamyeleh, Mohamad Habib Fakih, Gabriel Garcia, Anomadarshi Barua, Mohammad Abdullah Al Faruque |
| 2024 | A Longitudinal Analysis of Corporate Data Portability Practices Across Industries. Emmanuel Syrmoudis, Stefan A. Mager, Jens Grossklags |
| 2024 | A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events. Leon Kersten, Santiago Darré, Tom Mulders, Emmanuele Zambon, Marco Caselli, Chris Snijders, Luca Allodi |
| 2024 | Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha |
| 2024 | AirBugCatcher: Automated Wireless Reproduction of IoT Bugs. Guoqiang Hua, Matheus E. Garbelini, Sudipta Chattopadhyay |
| 2024 | Annual Computer Security Applications Conference, ACSAC 2024, Honolulu, HI, USA, December 9-13, 2024 |
| 2024 | Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic |
| 2024 | Assessing UAV Sensor Spoofing: More Than A GNSS Problem. Bailey Srimoungchanh, J. Garrett Morris, Drew Davidson |
| 2024 | Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. Yagiz Yilmaz, Orçun Çetin, Omer Said Ozturk, Emre Ekmekcioglu, Budi Arief, Julio C. Hernandez-Castro |
| 2024 | BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser |
| 2024 | BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability. Muhammad Ahsan, Eunice Pak, Kate Jackson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski, Irfan Ahmed |
| 2024 | BlueScream: Screaming Channels on Bluetooth Low Energy. Pierre Ayoub, Romain Cayre, Aurélien Francillon, Clémentine Maurice |
| 2024 | Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions. Mengya Zhang, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin |
| 2024 | CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis. Fei Zhang, Zhe Li, Yahang Hu, Yaohua Wang |
| 2024 | CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments. Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji |
| 2024 | ConProv: A Container-Aware Provenance System for Attack Investigation. Qiqing Deng, Yanqiang Zhang, Zhen Xu, Qian Tan, Yan Zhang |
| 2024 | Confidential Computing with Heterogeneous Devices at Cloud-Scale. Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri |
| 2024 | CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis. Xiangxin Guo, Shijie Jia, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji |
| 2024 | CubeVisor: A Multi-realm Architecture Design for Running VM with ARM CCA. Jiayun Chen, Qihang Zhou, Xiaolong Yan, Nan Jiang, Xiaoqi Jia, Weijuan Zhang |
| 2024 | DEEPCAPA: Identifying Malicious Capabilities in Windows Malware. Saastha Vasan, Hojjat Aghakhani, Stefano Ortolani, Roman Vasilenko, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| 2024 | Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks. Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan |
| 2024 | Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang |
| 2024 | Enhancing Database Encryption: Adaptive Measures for Digital Assets Against LLMs-Based Reverse Engineering. Kerou Zhou, Jiakang Qiu, Yuehua Wang, Xiaojun Ye |
| 2024 | Eunomia: A Real-time Privacy Compliance Firewall for Alexa Skills. Javaria Ahmad, Fengjun Li, Razvan Beuran, Bo Luo |
| 2024 | Evil from Within: Machine Learning Backdoors Through Dormant Hardware Trojans. Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar |
| 2024 | Exploring Inherent Backdoors in Deep Learning Models. Guanhong Tao, Siyuan Cheng, Zhenting Wang, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang |
| 2024 | FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs. Basanta Chaulagain, Kyu Hyung Lee |
| 2024 | FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation. Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame |
| 2024 | Faking deduplication to prevent timing side-channel attacks on memory deduplication. Jens Lindemann |
| 2024 | FedCAP: Robust Federated Learning via Customized Aggregation and Personalization. Youpeng Li, Xinda Wang, Fuxun Yu, Lichao Sun, Wenbin Zhang, Xuyu Wang |
| 2024 | FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free. Yijia Fang, Bingyu Li, Jiale Xiao, Bo Qin, Zhijintong Zhang, Qianhong Wu |
| 2024 | Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations. Konstantinos Solomos, Nick Nikiforakis, Jason Polakis |
| 2024 | Hypervisor Dissociative Execution: Programming Guests for Monitoring, Management, and Security. Andrew Fasano, Zak Estrada, Tim Leek, William K. Robertson |
| 2024 | I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques. Anna Crowder, Daniel Olszewski, Patrick Traynor, Kevin R. B. Butler |
| 2024 | I'll Be There for You! Perpetual Availability in the A André Rösti, Stijn Volckaert, Michael Franz, Alexios Voulimeneas |
| 2024 | IoC Stalker: Early detection of Indicators of Compromise. Mariella Mischinger, Sergio Pastrana, Guillermo Suarez-Tangil |
| 2024 | Janus: Enhancing Asynchronous Common Subset with Trusted Hardware. Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu |
| 2024 | Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality. Yanduo Fu, Ding Wang |
| 2024 | Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs. Yeji Park, Hyunsu Cho, Dong Hoon Lee, Wonsuk Choi |
| 2024 | Lightweight Secure Aggregation for Personalized Federated Learning with Backdoor Resistance. Tingyu Fan, Xiaojun Chen, Ye Dong, Xudong Chen, Yuexin Xuan, Weizhan Jing |
| 2024 | Link Inference Attacks in Vertical Federated Graph Learning. Oualid Zari, Chuan Xu, Javier Parra-Arnau, Ayse Ünsal, Melek Önen |
| 2024 | Madeline: Continuous and Low-cost Monitoring with Graph-free Representations to Combat Cyber Threats. Wenjia Song, Hailun Ding, Na Meng, Peng Gao, Danfeng Yao |
| 2024 | Manifest Problems: Analyzing Code Transparency for Android Application Bundles. Florian Draschbacher, Lukas Maar |
| 2024 | Model-Manipulation Attacks Against Black-Box Explanations. Achyut Hegde, Maximilian Noppel, Christian Wressnegger |
| 2024 | Moiré Injection Attack (MIA) : Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign. Qi Xia, Qian Chen |
| 2024 | No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks. Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz |
| 2024 | Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models. Changtian Song, Dongdong Zhao, Jianwen Xiang |
| 2024 | On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe |
| 2024 | Passwords To-Go: Investigating Multifaceted Challenges for Password Managers in the Android Ecosystem. Nicolas Huaman, Marten Oltrogge, Sabrina Klivan, Yannick Evers, Sascha Fahl |
| 2024 | Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory. Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes, Jonathan Petit |
| 2024 | Practical Light Clients for Committee-Based Blockchains. Frederik Armknecht, Ghassan Karame, Malcom Mohamed, Christiane Weis |
| 2024 | Privacy-Preserving Verifiable Neural Network Inference Service. Arman Riasi, Jorge Guajardo, Thang Hoang |
| 2024 | R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries. Yongming Fan, Priyam Biswas, Christina Garman |
| 2024 | R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction. Zhiyuan Zhang, Zhenzhi Lai, Udaya Parampalli |
| 2024 | R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android. Simone Zerbini, Samuele Doria, Primal Wijesekera, Serge Egelman, Eleonora Losiouk |
| 2024 | R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage. Jochen Schäfer, Frederik Armknecht, Youzhe Heng |
| 2024 | R+R: Security Vulnerability Dataset Quality Is Critical. Anurag Swarnim Yadav, Joseph N. Wilson |
| 2024 | R+R: Towards Reliable and Generalizable Differentially Private Machine Learning. Wenxuan Bao, Vincent Bindschaedler |
| 2024 | R+R: Understanding Hyperparameter Effects in DP-SGD. Felix Morsbach, Jan Reubold, Thorsten Strufe |
| 2024 | Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks. Sirui Shen, Chenglu Jin |
| 2024 | Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications. Brian Kondracki, Michael Ferdman, Nick Nikiforakis |
| 2024 | Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments. Ildi Alla, Selma Yahia, Valeria Loscrì, Hossien B. Eldeeb |
| 2024 | RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments. Junmo Lee, Seongjun Kim, Sanghyeon Park, Soo-Mook Moon |
| 2024 | Rust for Linux: Understanding the Security Impact of Rust in the Linux Kernel. Zhaofeng Li, Vikram Narayanan, Xiangdong Chen, Jerry Zhang, Anton Burtsev |
| 2024 | SECURE: Benchmarking Large Language Models for Cybersecurity. Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Benjamin A. Blakely, Nidhi Rastogi |
| 2024 | SECvma: Virtualization-based Linux Kernel Protection for Arm. Teh Beng Yen, Joey Li, Shih-Wei Li |
| 2024 | Securing PUFs via a Predictive Adversarial Machine Learning System by Modeling of Attackers. Mieszko Ferens, Edlira Dushku, Shreyas Srinivasa, Sokol Kosta |
| 2024 | SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware. Si Liao, Huangxun Chen, Zhice Yang |
| 2024 | Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software. Konstantinos Kleftogiorgos, Patrick Zielinski, Shan Huang, Jun Xu, Georgios Portokalidis |
| 2024 | Single Sign-On Privacy: We Still Know What You Did Last Summer. Maximilian Westers, Andreas Mayer, Louis Jannett |
| 2024 | SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation. Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes |
| 2024 | Stealing Watermarks of Large Language Models via Mixed Integer Programming. Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan |
| 2024 | T-Edge: Trusted Heterogeneous Edge Computing. Jiamin Shen, Yao Chen, Weng-Fai Wong, Ee-Chien Chang |
| 2024 | TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini |
| 2024 | TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference. Yizhou Feng, Qiao Zhang, Yifei Cai, Hongyi Wu, Chunsheng Xin |
| 2024 | TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems. Adam Caulfield, Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes |
| 2024 | Towards a Taxonomy of Challenges in Security Control Implementation. Md. Rayhanur Rahman, Brandon Wroblewski, Mahzabin Tamanna, Imranur Rahman, Andrew Anufryienak, Laurie A. Williams |
| 2024 | VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs. Yunbo Wang, Cong Sun, Qiaosen Liu, Bingnan Su, Zongxu Zhang, Michael Norris, Gang Tan, Jianfeng Ma |
| 2024 | VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections. Geovani Benita, Leonardo Sestrem, Matheus E. Garbelini, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan |
| 2024 | Verifying Loot-box Probability Without Source-code Disclosure. Jing-Jie Wang, An-Jie Li, Ting-Yu Fang, Hsu-Chun Hsiao |
| 2024 | ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer. Shihua Sun, Kenechukwu Nwodo, Shridatt Sugrim, Angelos Stavrou, Haining Wang |
| 2024 | Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments. Yousif Dafalla, Dalton A. Brucker-Hahn, Drew Davidson, Alexandru G. Bardas |
| 2024 | WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home. Yihui Yan, Zhice Yang |
| 2024 | You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations. Dongwon Shin, Suyoung Lee, Sanghyun Hong, Sooel Son |