| 2023 | #DM-Me: Susceptibility to Direct Messaging-Based Scams. Raj Vardhan, Alok Chandrawal, Phakpoom Chinprutthiwong, Yangyong Zhang, Guofei Gu |
| 2023 | A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage. Yeomin Jeong, Woonghee Lee, Junbeom Hur |
| 2023 | A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao |
| 2023 | A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems. Yumeng Zhang, Max Ward, Mingyu Guo, Hung Nguyen |
| 2023 | A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. Leizhang Wang, Yuntao Wang, Baocang Wang |
| 2023 | A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing. HyunJin Kim, JinYeong Bak, Kyunghyun Cho, Hyungjoon Koo |
| 2023 | AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation. Alexander Küchler, Leon Wenning, Florian Wendland |
| 2023 | An End-to-End Analysis of Covid-Themed Scams in the Wild. Behzad Ousat, Mohammad Ali Tofighi, Amin Kharraz |
| 2023 | An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks. Matthew Rogers, Kasper Rasmussen |
| 2023 | Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis. Sirus Shahini, Mu Zhang, Mathias Payer, Robert Ricci |
| 2023 | BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. Weiqi Wang, Zhiyi Tian, Chenhan Zhang, An Liu, Shui Yu |
| 2023 | Benchmarking the Benchmarks. Marc Miltenberger, Steven Arzt, Philipp Holzinger, Julius Näumann |
| 2023 | BinWrap: Hybrid Protection against Native Node.js Add-ons. George Christou, Grigoris Ntousakis, Eric Lahtinen, Sotiris Ioannidis, Vasileios P. Kemerlis, Nikos Vasilakis |
| 2023 | Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf |
| 2023 | Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo |
| 2023 | CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu |
| 2023 | CacheFX: A Framework for Evaluating Cache Security. Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom |
| 2023 | Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses. Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
| 2023 | Communication-Efficient Inner Product Private Join and Compute with Cardinality. Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida |
| 2023 | CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications. Florian Draschbacher, Johannes Feichtner |
| 2023 | DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao |
| 2023 | Data Privacy Examination against Semi-Supervised Learning. Jiadong Lou, Xu Yuan, Miao Pan, Hao Wang, Nian-Feng Tzeng |
| 2023 | Deepfake CAPTCHA: A Method for Preventing Fake Calls. Lior Yasur, Guy Frankovits, Fred Matanel Grabovski, Yisroel Mirsky |
| 2023 | Democratizing election verification: new methods for addressing an ancient attacker model. Vanessa Teague |
| 2023 | Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators. Yangyong Zhang, Raj Vardhan, Phakpoom Chinprutthiwong, Guofei Gu |
| 2023 | EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei |
| 2023 | Electromagnetic Signal Injection Attacks on Differential Signaling. Youqian Zhang, Kasper Rasmussen |
| 2023 | Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. Mohamad Mansouri, Jun Xu, Georgios Portokalidis |
| 2023 | Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO. Guy Farrelly, Michael Chesser, Damith C. Ranasinghe |
| 2023 | Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck. Chenhan Zhang, Weiqi Wang, James J. Q. Yu, Shui Yu |
| 2023 | FLAIR: Defense against Model Poisoning Attack in Federated Learning. Atul Sharma, Wei Chen, Joshua C. Zhao, Qiang Qiu, Saurabh Bagchi, Somali Chaterji |
| 2023 | FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko |
| 2023 | Faster TFHE Bootstrapping with Block Binary Keys. Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song |
| 2023 | Flag: A Framework for Lightweight Robust Secure Aggregation. Laasya Bangalore, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
| 2023 | FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A. Jingquan Ge, Fengwei Zhang |
| 2023 | Formal Methods for Payment Protocols. David A. Basin |
| 2023 | Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. Chris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne |
| 2023 | Going Haywire: False Friends in Federated Learning and How to Find Them. William Aiken, Paula Branco, Guy-Vincent Jourdan |
| 2023 | How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. Kun Peng |
| 2023 | IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. Lili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng |
| 2023 | IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar |
| 2023 | Implementing and Optimizing Matrix Triples with Homomorphic Encryption. Johannes Mono, Tim Güneysu |
| 2023 | Invasion of location privacy using online map services and smartphone sensors. Hyunsoo Kim, Youngbae Jeon, Ji Won Yoon |
| 2023 | Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. Ali Zohaib, Jade Sheffey, Amir Houmansadr |
| 2023 | Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications. Baiqi Chen, Tingmin Wu, Yanjun Zhang, Mohan Baruwal Chhetri, Guangdong Bai |
| 2023 | Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks. Zitao Chen, Pritam Dash, Karthik Pattabiraman |
| 2023 | LDL: A Defense for Label-Based Membership Inference Attacks. Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran |
| 2023 | LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai |
| 2023 | MASCARA : Systematically Generating Memorable And Secure Passphrases. Avirup Mukherjee, Kousshik Murali, Shivam Kumar Jha, Niloy Ganguly, Rahul Chatterjee, Mainack Mondal |
| 2023 | Masked Language Model Based Textual Adversarial Example Detection. Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang |
| 2023 | Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang |
| 2023 | Model Stealing Attacks and Defenses: Where Are We Now? N. Asokan |
| 2023 | Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging. Martin Unterguggenberger, David Schrammel, Pascal Nasahl, Robert Schilling, Lukas Lamster, Stefan Mangard |
| 2023 | On the Cryptographic Fragility of the Telegram Ecosystem. Theo von Arx, Kenneth G. Paterson |
| 2023 | Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters |
| 2023 | POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran |
| 2023 | POSTER: A Cyberspace Study of the Russia-Ukraine War. Gursimran Singh, Hrishikesh B. Acharya |
| 2023 | POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems. Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh |
| 2023 | POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. Abdullahi Chowdhury, Hung Nguyen, Debi Ashenden, Ganna Pogrebna |
| 2023 | POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes. Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
| 2023 | POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. Zhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen |
| 2023 | POSTER: On searching information leakage of Python model execution to detect adversarial examples. Cheng-Yao Guo, Fang Yu |
| 2023 | POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting. Yiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne |
| 2023 | POSTER: Security Logs Graph Analytics for Industry Network System. Qiaoran Meng, Nay Oo, Hoon Wei Lim, Biplab Sikdar |
| 2023 | POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim |
| 2023 | PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. Yongha Son, Jinhyuck Jeong |
| 2023 | Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. Aydin Abadi, Steven J. Murdoch |
| 2023 | Privacy-Preserving Record Linkage for Cardinality Counting. Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh |
| 2023 | Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023 Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik |
| 2023 | QUDA: Query-Limited Data-Free Model Extraction. Zijun Lin, Ke Xu, Chengfang Fang, Huadi Zheng, Aneez Ahmed Jaheezuddin, Jie Shi |
| 2023 | RaceBench: A Triggerable and Observable Concurrency Bug Benchmark. Jiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han, Chao Zhang |
| 2023 | RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense. Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu |
| 2023 | Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. Wenyuan Xu |
| 2023 | SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. Oleg Schell, Marcel Kneib |
| 2023 | SPEAR-V: Secure and Practical Enclave Architecture for RISC-V. David Schrammel, Moritz Waser, Lukas Lamster, Martin Unterguggenberger, Stefan Mangard |
| 2023 | Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact. Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle |
| 2023 | Secure Context Switching of Masked Software Implementations. Barbara Gigerl, Robert Primas, Stefan Mangard |
| 2023 | Secure and Efficient Mobile DNN Using Trusted Execution Environments. Bin Hu, Yan Wang, Jerry Cheng, Tianming Zhao, Yucheng Xie, Xiaonan Guo, Yingying Chen |
| 2023 | Securing Container-based Clouds with Syscall-aware Scheduling. Michael V. Le, Salman Ahmed, Dan Williams, Hani Jamjoom |
| 2023 | Security Properties of Virtual Remotes and SPOOKing their violations. Joshua David Oetting Majors, Edgardo Barsallo Yi, Amiya Maji, Darren Wu, Saurabh Bagchi, Aravind Machiry |
| 2023 | Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions. Jiwon Seo, Junseung You, Yungi Cho, Yeongpil Cho, Donghyun Kwon, Yunheung Paek |
| 2023 | ShowTime: Amplifying Arbitrary CPU Timing Side Channels. Antoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede |
| 2023 | SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness. Geetanjli Sharma, M. A. P. Chamikara, Mohan Baruwal Chhetri, Yi-Ping Phoebe Chen |
| 2023 | Stairway To Rainbow. Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel |
| 2023 | Symbolic modelling of remote attestation protocols for device and app integrity on Android. Abdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald |
| 2023 | T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks |
| 2023 | ThreadLock: Native Principal Isolation Through Memory Protection Keys. William Blair, William K. Robertson, Manuel Egele |
| 2023 | Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco |
| 2023 | ZEKRA: Zero-Knowledge Control-Flow Attestation. Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi |