AsiaCCS A

144 papers

YearTitle / Authors
2024(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices.
Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee, Hyoungshick Kim
2024A Formal Analysis of Data Distribution Service Security.
Binghan Wang, Hui Li, Jingjing Guan
2024A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference.
Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra
2024ABBY: Automating leakage modelling for side-channel analysis.
Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina
2024AIMFuzz: Automated Function-Level In-Memory Fuzzing on Binaries.
Taewook Kim, Seokhyun Hong, Yeongpil Cho
2024ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations.
Samuel Jaques, Hart Montgomery, Michael Lodder
2024An Empirical Study of Consensus Protocols' DoS Resilience.
Giacomo Giuliari, Alberto Sonnino, Marc Frei, Fabio Streun, Lefteris Kokoris-Kogias, Adrian Perrig
2024An Investigation into Misuse of Java Security APIs by Large Language Models.
Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar
2024Auroch: Auction-Based Multipath Routing for Payment Channel Networks.
Mohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan
2024Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud?
Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana
2024Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
Woonghee Lee, Junbeom Hur, Doowon Kim
2024Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization.
Tiziano Marinaro, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati
2024Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI.
Lukas Maar, Pascal Nasahl, Stefan Mangard
2024BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary.
Nozima Murodova, Hyungjoon Koo
2024BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun
2024BlindShuffler: Universal and Trustless Mixing for Confidential Transactions.
Chenke Wang, Zhonghui Ge, Yu Long, Xian Xu, Shi-Feng Sun, Dawu Gu
2024Building Your Own Trusted Execution Environments Using FPGA.
Md. Armanuzzaman, Ahmad-Reza Sadeghi, Ziming Zhao
2024Byzantine Fault-Tolerant Aggregate Signatures.
Quentin Kniep, Roger Wattenhofer
2024C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers.
Ali Davanian, Michalis Faloutsos, Martina Lindorfer
2024Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities.
Luke Harrison, Samiran Bag, Feng Hao
2024CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification.
Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang
2024Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol.
Maryna Veksler, Kemal Akkaya, A. Selcuk Uluagac
2024Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach.
Berend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich
2024Cloud-Based Machine Learning Models as Covert Communication Channels.
Torsten Krauß, Jasper Stang, Alexandra Dmitrienko
2024Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu
2024ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles.
Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Ahmad Mohammad
2024Cross-Language Differential Testing of JSON Parsers.
Jonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck
2024CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Fuyi Wang, Zekai Chen, Lei Pan, Leo Yu Zhang, Jianying Zhou
2024Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries.
Jenny Blessing, Michael A. Specter, Daniel J. Weitzner
2024DISCO: Dynamic Searchable Encryption with Constant State.
Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang
2024DMTI: Accelerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging Extension.
Andreas Hager-Clukas, Konrad Hohentanner
2024Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments.
Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen
2024Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi
2024Delegating FIDO Credentials Using Single-use ECDSA Signatures.
Wei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta
2024Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks.
Pritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman
2024ESem: To Harden Process Synchronization for Servers.
Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu
2024Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies.
Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck
2024Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem.
Malte Breuer, Ulrike Meyer, Susanne Wetzel
2024Efficient Unbalanced Quorum PSI from Homomorphic Encryption.
Xinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun, Jingwei Hu
2024Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption.
Amir Sabbagh Molahosseini, Hans Vandierendonck
2024Exposed by Default: A Security Analysis of Home Router Default Settings.
Junjian Ye, Xavier de Carné de Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu, Wei Zhang
2024External Attack-Surface of Modern Organizations.
Nethanel Gelernter, Haya Schulmann, Michael Waidner
2024FAKEPCD: Fake Point Cloud Detection via Source Attribution.
Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang
2024FakeX: A Framework for Detecting Fake Reviews of Browser Extensions.
Eric Olsson, Benjamin Eriksson, Pablo Picazo-Sanchez, Lukas Andersson, Andrei Sabelfeld
2024Federated Learning Security: From Dusk to Dawn.
Alexandra Dmitrienko
2024Formal Verification and Solutions for Estonian E-Voting.
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2024From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions.
Ritik Roongta, Rachel Greenstadt
2024Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection.
Shashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry
2024Generic and Automated Drive-by GPU Cache Attacks from the Browser.
Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss
2024HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning.
Bo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang, Fan Zhang
2024Honest Majority Multiparty Computation over Rings with Constant Online Communication.
Minghua Zhao
2024ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels.
Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel, Sergej Proskurin, Michalis Polychronakis, Vasileios P. Kemerlis
2024Key Establishment for Secure Asymmetric Cross-Technology Communication.
Wei Wang, Xin Liu, Zicheng Chi, Stuart Ray, Ting Zhu
2024Kirin: Hitting the Internet with Distributed BGP Announcements.
Lars Prehn, Pawel Foremski, Oliver Gasser
2024LightPIR: Single-Server PIR via FHE without Gaussian Noise.
Han Xia, Mingsheng Wang
2024Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION.
Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel
2024MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning.
Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu
2024Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication.
Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze
2024Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler.
Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere
2024Mayhem: Targeted Corruption of Register and Stack Variables.
Andrew J. Adiletta, M. Caner Tol, Yarkin Doröz, Berk Sunar
2024Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage.
Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann
2024Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity.
Kane Walter, Meisam Mohammady, Surya Nepal, Salil S. Kanhere
2024Model Extraction Attacks Revisited.
Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang
2024Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models.
Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan
2024MultiTEE: Distributing Trusted Execution Environments.
Simon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch, Vijayanand Nayani, Jan-Erik Ekberg
2024Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication.
Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo
2024Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses.
Kartik Ramkrishnan, Stephen McCamant, Antonia Zhai, Pen-Chung Yew
2024OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers.
Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon
2024OPRFs from Isogenies: Designs and Analysis.
Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger
2024On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang
2024On The Effect of Replacement Policies on The Security of Randomized Cache Architectures.
Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu
2024On the Role of Pre-trained Embeddings in Binary Code Analysis.
Alwin Maier, Felix Weißberg, Konrad Rieck
2024PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems.
Linkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang
2024PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge.
Emrah Sariboz, Reza Tourani, Roopa Vishwanathan, Satyajayant Misra
2024POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets.
Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan
2024POSTER: Defense against False Data Injection Attack in a Cyber-Physical System.
Sushree Padhan, Ashok Kumar Turuk
2024POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran
2024POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran
2024POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran
2024POSTER: MalaQ - A Malware Against Quantum Computer.
Siyi Wang, Alex Jin, Suman Deb, Tarun Dutta, Manas Mukherjee, Anupam Chattopadhyay
2024POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts.
Van Tong, Cuong Dao, Thep Dong, Hai Anh Tran, Duc Tran, Truong X. Tran
2024POSTER: On the Feasibility of Inferring SGX Execution through PMU.
Woomin Lee, Taehun Kim, Youngjoo Shin
2024POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation.
Somin Song, Ashish Kundu, Byungchul Tak
2024POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
Anand Agrawal, Rajib Ranjan Maiti
2024Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond.
Mingyao Shao, Yuejun Liu, Yongbin Zhou
2024Physical-Layer Public Key Encryption Through Massive MIMO.
Senlin Liu, Tong Gao, Yijian Liu, Xianhui Lu
2024Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran
2024PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao
2024Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud.
Xiaowei Ge, Guanxiong Ha, Chunfu Jia, Zhen Su
2024Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024
Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas
2024Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy.
Chaojie Lv, Xiaokui Xiao, Lan Zhang, Ting Yu
2024Quantum-Safe Account Recovery for WebAuthn.
Douglas Stebila, Spencer Wilson
2024RACED: Routing in Payment Channel Networks Using Distributed Hash Tables.
Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan
2024REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography.
Samuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy
2024Ratel: MPC-extensions for Smart Contracts.
Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller
2024Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen
2024Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains.
Kanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka
2024RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop.
Chao Wang, Yue Zhang, Zhiqiang Lin
2024SPRITE: Secure and Private Routing in Payment Channel Networks.
Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra
2024SRAM Imprinting for System Protection and Differentiation.
Jubayer Mahmod, Matthew Hicks
2024SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu
2024Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs.
Florian Frank, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong, Tolga Arul, Stefan Katzenbeisser
2024Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research.
Xiaofeng Wang
2024Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode.
Zilin Shen, Imtiaz Karim, Elisa Bertino
2024Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks.
Oshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa, Vincent Bindschaedler, Subodha Charles
2024Semantic Ranking for Automated Adversarial Technique Annotation in Security Text.
Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov
2024SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing.
Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li
2024SilentProof: Anonymous Authentication with Blockchain-Backed Offloading.
Jamal Mosakheil, Kan Yang
2024Single Round-trip Hierarchical ORAM via Succinct Indices.
William L. Holland, Olga Ohrimenko, Anthony Wirth
2024Skye: An Expanding PRF based Fast KDF and its Applications.
Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel
2024SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu
2024SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness Estimation.
Andre Esser, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini
2024SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere
2024SoK: Rowhammer on Commodity Operating Systems.
Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang
2024SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments.
Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang
2024SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing.
Felix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck
2024SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms.
Mehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen
2024SweetPAKE: Key exchange with decoy passwords.
Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot
2024Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8.
Lorenz Hetterich, Markus Bauer, Michael Schwarz, Christian Rossow
2024Sync-Millibottleneck Attack on Microservices Cloud Architecture.
Xuhang Gu, Qingyang Wang, Qiben Yan, Jianshu Liu, Calton Pu
2024SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer.
Gwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, Mathias Payer
2024TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs.
Jonas Röckl, Nils Bernsdorf, Tilo Müller
2024The Catcher in the Eye: Recognizing Users by their Blinks.
Ryo Iijima, Tatsuya Takehisa, Tetsushi Ohki, Tatsuya Mori
2024The SA4P Framework: Sensing and Actuation as a Privilege.
Piet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik
2024Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy.
Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay
2024Toward Practical Client-Side Encryption in Cloud Computing.
Robert H. Deng
2024Towards Robust Domain Generation Algorithm Classification.
Arthur Drichel, Marc Meyer, Ulrike Meyer
2024Towards Understanding and Improving Security-Relevant Web Application Logging.
Merve Sahin, Noemi Daniele
2024Transferable, Auditable and Anonymous Ticketing Protocol.
Pascal Lafourcade, Dhekra Mahmoud, Gaël Marcadet, Charles Olivier-Anclin
2024TriSAS: Toward Dependable Inter-SAS Coordination with Auditability.
Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric William Burger, Luiz A. DaSilva, Wenjing Lou
2024Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi
2024Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware.
Antonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, Simone Aonzo
2024Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications.
Guy Zyskind, Avishay Yanai, Alex Pentland
2024Username Squatting on Online Social Networks: A Study on X.
Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou
2024VFCFinder: Pairing Security Advisories and Patches.
Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves
2024VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models.
Thirasara Ariyarathna, Meisam Mohammady, Hye-Young Paik, Salil S. Kanhere
2024WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks.
Ethan Ferguson, Adam Wilson, Hoda Naghibijouybari
2024What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications.
Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert
2024What is in the Chrome Web Store?
Sheryl Hsu, Manda Tran, Aurore Fass
2024WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting.
Hyojin Kim, Minji Jo, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh
2024Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact.
Jannis Rautenstrauch, Ben Stock
2024X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory.
Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphaël Troncy
2024zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain.
Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim
2024zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu