| 2024 | (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices. Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee, Hyoungshick Kim |
| 2024 | A Formal Analysis of Data Distribution Service Security. Binghan Wang, Hui Li, Jingjing Guan |
| 2024 | A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference. Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra |
| 2024 | ABBY: Automating leakage modelling for side-channel analysis. Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina |
| 2024 | AIMFuzz: Automated Function-Level In-Memory Fuzzing on Binaries. Taewook Kim, Seokhyun Hong, Yeongpil Cho |
| 2024 | ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations. Samuel Jaques, Hart Montgomery, Michael Lodder |
| 2024 | An Empirical Study of Consensus Protocols' DoS Resilience. Giacomo Giuliari, Alberto Sonnino, Marc Frei, Fabio Streun, Lefteris Kokoris-Kogias, Adrian Perrig |
| 2024 | An Investigation into Misuse of Java Security APIs by Large Language Models. Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar |
| 2024 | Auroch: Auction-Based Multipath Routing for Payment Channel Networks. Mohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan |
| 2024 | Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud? Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana |
| 2024 | Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites. Woonghee Lee, Junbeom Hur, Doowon Kim |
| 2024 | Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization. Tiziano Marinaro, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati |
| 2024 | Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI. Lukas Maar, Pascal Nasahl, Stefan Mangard |
| 2024 | BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary. Nozima Murodova, Hyungjoon Koo |
| 2024 | BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun |
| 2024 | BlindShuffler: Universal and Trustless Mixing for Confidential Transactions. Chenke Wang, Zhonghui Ge, Yu Long, Xian Xu, Shi-Feng Sun, Dawu Gu |
| 2024 | Building Your Own Trusted Execution Environments Using FPGA. Md. Armanuzzaman, Ahmad-Reza Sadeghi, Ziming Zhao |
| 2024 | Byzantine Fault-Tolerant Aggregate Signatures. Quentin Kniep, Roger Wattenhofer |
| 2024 | C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers. Ali Davanian, Michalis Faloutsos, Martina Lindorfer |
| 2024 | Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. Luke Harrison, Samiran Bag, Feng Hao |
| 2024 | CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang |
| 2024 | Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol. Maryna Veksler, Kemal Akkaya, A. Selcuk Uluagac |
| 2024 | Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach. Berend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich |
| 2024 | Cloud-Based Machine Learning Models as Covert Communication Channels. Torsten Krauß, Jasper Stang, Alexandra Dmitrienko |
| 2024 | Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform. Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu |
| 2024 | ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles. Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Ahmad Mohammad |
| 2024 | Cross-Language Differential Testing of JSON Parsers. Jonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck |
| 2024 | CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments. Fuyi Wang, Zekai Chen, Lei Pan, Leo Yu Zhang, Jianying Zhou |
| 2024 | Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries. Jenny Blessing, Michael A. Specter, Daniel J. Weitzner |
| 2024 | DISCO: Dynamic Searchable Encryption with Constant State. Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang |
| 2024 | DMTI: Accelerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging Extension. Andreas Hager-Clukas, Konrad Hohentanner |
| 2024 | Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments. Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen |
| 2024 | Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry. Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi |
| 2024 | Delegating FIDO Credentials Using Single-use ECDSA Signatures. Wei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta |
| 2024 | Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks. Pritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman |
| 2024 | ESem: To Harden Process Synchronization for Servers. Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu |
| 2024 | Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies. Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck |
| 2024 | Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem. Malte Breuer, Ulrike Meyer, Susanne Wetzel |
| 2024 | Efficient Unbalanced Quorum PSI from Homomorphic Encryption. Xinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun, Jingwei Hu |
| 2024 | Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption. Amir Sabbagh Molahosseini, Hans Vandierendonck |
| 2024 | Exposed by Default: A Security Analysis of Home Router Default Settings. Junjian Ye, Xavier de Carné de Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu, Wei Zhang |
| 2024 | External Attack-Surface of Modern Organizations. Nethanel Gelernter, Haya Schulmann, Michael Waidner |
| 2024 | FAKEPCD: Fake Point Cloud Detection via Source Attribution. Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang |
| 2024 | FakeX: A Framework for Detecting Fake Reviews of Browser Extensions. Eric Olsson, Benjamin Eriksson, Pablo Picazo-Sanchez, Lukas Andersson, Andrei Sabelfeld |
| 2024 | Federated Learning Security: From Dusk to Dawn. Alexandra Dmitrienko |
| 2024 | Formal Verification and Solutions for Estonian E-Voting. Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang |
| 2024 | From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions. Ritik Roongta, Rachel Greenstadt |
| 2024 | Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection. Shashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry |
| 2024 | Generic and Automated Drive-by GPU Cache Attacks from the Browser. Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss |
| 2024 | HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning. Bo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang, Fan Zhang |
| 2024 | Honest Majority Multiparty Computation over Rings with Constant Online Communication. Minghua Zhao |
| 2024 | ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels. Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel, Sergej Proskurin, Michalis Polychronakis, Vasileios P. Kemerlis |
| 2024 | Key Establishment for Secure Asymmetric Cross-Technology Communication. Wei Wang, Xin Liu, Zicheng Chi, Stuart Ray, Ting Zhu |
| 2024 | Kirin: Hitting the Internet with Distributed BGP Announcements. Lars Prehn, Pawel Foremski, Oliver Gasser |
| 2024 | LightPIR: Single-Server PIR via FHE without Gaussian Noise. Han Xia, Mingsheng Wang |
| 2024 | Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel |
| 2024 | MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning. Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu |
| 2024 | Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze |
| 2024 | Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler. Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere |
| 2024 | Mayhem: Targeted Corruption of Register and Stack Variables. Andrew J. Adiletta, M. Caner Tol, Yarkin Doröz, Berk Sunar |
| 2024 | Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann |
| 2024 | Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity. Kane Walter, Meisam Mohammady, Surya Nepal, Salil S. Kanhere |
| 2024 | Model Extraction Attacks Revisited. Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang |
| 2024 | Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models. Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan |
| 2024 | MultiTEE: Distributing Trusted Execution Environments. Simon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch, Vijayanand Nayani, Jan-Erik Ekberg |
| 2024 | Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication. Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo |
| 2024 | Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses. Kartik Ramkrishnan, Stephen McCamant, Antonia Zhai, Pen-Chung Yew |
| 2024 | OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon |
| 2024 | OPRFs from Isogenies: Designs and Analysis. Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger |
| 2024 | On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang |
| 2024 | On The Effect of Replacement Policies on The Security of Randomized Cache Architectures. Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu |
| 2024 | On the Role of Pre-trained Embeddings in Binary Code Analysis. Alwin Maier, Felix Weißberg, Konrad Rieck |
| 2024 | PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems. Linkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang |
| 2024 | PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge. Emrah Sariboz, Reza Tourani, Roopa Vishwanathan, Satyajayant Misra |
| 2024 | POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan |
| 2024 | POSTER: Defense against False Data Injection Attack in a Cyber-Physical System. Sushree Padhan, Ashok Kumar Turuk |
| 2024 | POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization. Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran |
| 2024 | POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors. Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran |
| 2024 | POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran |
| 2024 | POSTER: MalaQ - A Malware Against Quantum Computer. Siyi Wang, Alex Jin, Suman Deb, Tarun Dutta, Manas Mukherjee, Anupam Chattopadhyay |
| 2024 | POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts. Van Tong, Cuong Dao, Thep Dong, Hai Anh Tran, Duc Tran, Truong X. Tran |
| 2024 | POSTER: On the Feasibility of Inferring SGX Execution through PMU. Woomin Lee, Taehun Kim, Youngjoo Shin |
| 2024 | POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation. Somin Song, Ashish Kundu, Byungchul Tak |
| 2024 | POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks? Anand Agrawal, Rajib Ranjan Maiti |
| 2024 | Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. Mingyao Shao, Yuejun Liu, Yongbin Zhou |
| 2024 | Physical-Layer Public Key Encryption Through Massive MIMO. Senlin Liu, Tong Gao, Yijian Liu, Xianhui Lu |
| 2024 | Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning. Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran |
| 2024 | PowSpectre: Powering Up Speculation Attacks with TSX-based Replay. Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao |
| 2024 | Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud. Xiaowei Ge, Guanxiong Ha, Chunfu Jia, Zhen Su |
| 2024 | Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024 Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas |
| 2024 | Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy. Chaojie Lv, Xiaokui Xiao, Lan Zhang, Ting Yu |
| 2024 | Quantum-Safe Account Recovery for WebAuthn. Douglas Stebila, Spencer Wilson |
| 2024 | RACED: Routing in Payment Channel Networks Using Distributed Hash Tables. Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan |
| 2024 | REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography. Samuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy |
| 2024 | Ratel: MPC-extensions for Smart Contracts. Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller |
| 2024 | Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen |
| 2024 | Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains. Kanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka |
| 2024 | RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop. Chao Wang, Yue Zhang, Zhiqiang Lin |
| 2024 | SPRITE: Secure and Private Routing in Payment Channel Networks. Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra |
| 2024 | SRAM Imprinting for System Protection and Differentiation. Jubayer Mahmod, Matthew Hicks |
| 2024 | SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu |
| 2024 | Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs. Florian Frank, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong, Tolga Arul, Stefan Katzenbeisser |
| 2024 | Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research. Xiaofeng Wang |
| 2024 | Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. Zilin Shen, Imtiaz Karim, Elisa Bertino |
| 2024 | Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks. Oshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa, Vincent Bindschaedler, Subodha Charles |
| 2024 | Semantic Ranking for Automated Adversarial Technique Annotation in Security Text. Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov |
| 2024 | SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing. Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li |
| 2024 | SilentProof: Anonymous Authentication with Blockchain-Backed Offloading. Jamal Mosakheil, Kan Yang |
| 2024 | Single Round-trip Hierarchical ORAM via Succinct Indices. William L. Holland, Olga Ohrimenko, Anthony Wirth |
| 2024 | Skye: An Expanding PRF based Fast KDF and its Applications. Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel |
| 2024 | SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu |
| 2024 | SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness Estimation. Andre Esser, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini |
| 2024 | SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations. Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere |
| 2024 | SoK: Rowhammer on Commodity Operating Systems. Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang |
| 2024 | SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments. Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang |
| 2024 | SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing. Felix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck |
| 2024 | SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms. Mehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen |
| 2024 | SweetPAKE: Key exchange with decoy passwords. Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot |
| 2024 | Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8. Lorenz Hetterich, Markus Bauer, Michael Schwarz, Christian Rossow |
| 2024 | Sync-Millibottleneck Attack on Microservices Cloud Architecture. Xuhang Gu, Qingyang Wang, Qiben Yan, Jianshu Liu, Calton Pu |
| 2024 | SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer. Gwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, Mathias Payer |
| 2024 | TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs. Jonas Röckl, Nils Bernsdorf, Tilo Müller |
| 2024 | The Catcher in the Eye: Recognizing Users by their Blinks. Ryo Iijima, Tatsuya Takehisa, Tetsushi Ohki, Tatsuya Mori |
| 2024 | The SA4P Framework: Sensing and Actuation as a Privilege. Piet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik |
| 2024 | Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay |
| 2024 | Toward Practical Client-Side Encryption in Cloud Computing. Robert H. Deng |
| 2024 | Towards Robust Domain Generation Algorithm Classification. Arthur Drichel, Marc Meyer, Ulrike Meyer |
| 2024 | Towards Understanding and Improving Security-Relevant Web Application Logging. Merve Sahin, Noemi Daniele |
| 2024 | Transferable, Auditable and Anonymous Ticketing Protocol. Pascal Lafourcade, Dhekra Mahmoud, Gaël Marcadet, Charles Olivier-Anclin |
| 2024 | TriSAS: Toward Dependable Inter-SAS Coordination with Auditability. Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric William Burger, Luiz A. DaSilva, Wenjing Lou |
| 2024 | Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System. Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Atallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi |
| 2024 | Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware. Antonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, Simone Aonzo |
| 2024 | Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications. Guy Zyskind, Avishay Yanai, Alex Pentland |
| 2024 | Username Squatting on Online Social Networks: A Study on X. Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou |
| 2024 | VFCFinder: Pairing Security Advisories and Patches. Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves |
| 2024 | VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models. Thirasara Ariyarathna, Meisam Mohammady, Hye-Young Paik, Salil S. Kanhere |
| 2024 | WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks. Ethan Ferguson, Adam Wilson, Hoda Naghibijouybari |
| 2024 | What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications. Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert |
| 2024 | What is in the Chrome Web Store? Sheryl Hsu, Manda Tran, Aurore Fass |
| 2024 | WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting. Hyojin Kim, Minji Jo, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh |
| 2024 | Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact. Jannis Rautenstrauch, Ben Stock |
| 2024 | X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory. Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphaël Troncy |
| 2024 | zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim |
| 2024 | zkMatrix: Batched Short Proof for Committed Matrix Multiplication. Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu |