| 2022 | "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang |
| 2022 | A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert |
| 2022 | A Scalable and Dynamic ACL System for In-Network Defense. Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang |
| 2022 | A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood |
| 2022 | A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music. Anomadarshi Barua, Yonatan Gizachew Achamyeleh, Mohammad Abdullah Al Faruque |
| 2022 | AI/ML for Network Security: The Emperor has no Clothes. Arthur Selle Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, Lisandro Z. Granville |
| 2022 | AISec '22: 15th ACM Workshop on Artificial Intelligence and Security. Ambra Demontis, Xinyun Chen, Florian Tramèr |
| 2022 | AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security. Mark Yampolskiy, Moti Yung |
| 2022 | ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security. Chip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair |
| 2022 | ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran |
| 2022 | Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities. Yinxi Liu, Wei Meng |
| 2022 | Adversarial Correctness and Privacy for Probabilistic Data Structures. Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia |
| 2022 | Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats. Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn |
| 2022 | An Extensive Study of Residential Proxies in China. Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan |
| 2022 | AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang |
| 2022 | Are Attribute Inference Attacks Just Imputation? Bargav Jayaraman, David Evans |
| 2022 | Auditing Membership Leakages of Multi-Exit Networks. Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang |
| 2022 | Automatic Detection of Fake Key Attacks in Secure Messaging. Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons |
| 2022 | Automatic Detection of Speculative Execution Combinations. Xaver Fabian, Marco Guarnieri, Marco Patrignani |
| 2022 | Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou |
| 2022 | Behind the Scenes of RPKI. Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2022 | Blacktooth: Breaking through the Defense of Bluetooth in Silence. Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu |
| 2022 | Blazing Fast PSI from Improved OKVS and Subfield VOLE. Srinivasan Raghuraman, Peter Rindal |
| 2022 | Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. Yuan Lu, Zhenliang Lu, Qiang Tang |
| 2022 | Bullshark: DAG BFT Protocols Made Practical. Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias |
| 2022 | C2C: Fine-grained Configuration-driven System Call Filtering. Seyedhamed Ghavamnia, Tapti Palit, Michalis Polychronakis |
| 2022 | CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero |
| 2022 | CCSW '22: The 2022 Cloud Computing Security Workshop. Marten van Dijk, Francesco Regazzoni |
| 2022 | CERBERUS: Exploring Federated Prediction of Security Events. Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro |
| 2022 | CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang |
| 2022 | CINI MINIS: Domain Isolation for Fault and Combined Security. Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu |
| 2022 | CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy. Earlence Fernandes, Cristina Alcaraz |
| 2022 | Cache Refinement Type for Side-Channel Detection of Cryptographic Software. Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang |
| 2022 | Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce |
| 2022 | Caulk: Lookup Arguments in Sublinear Time. Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin |
| 2022 | Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing. Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic |
| 2022 | Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. Tamjid Al Rahat, Yu Feng, Yuan Tian |
| 2022 | Chaghri - A FHE-friendly Block Cipher. Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar |
| 2022 | Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks. Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai |
| 2022 | Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks. Golden G. Richard III, Tim Blazytko |
| 2022 | Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. Siyuan Tang, Xianghang Mi, Ying Li, Xiaofeng Wang, Kai Chen |
| 2022 | Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang |
| 2022 | ConsensusDay '22: ACM Workshop on Developments in Consensus. Jorge M. Soares, Dawn Song, Marko Vukolic |
| 2022 | Constant Latency in Sleepy Consensus. Atsuki Momose, Ling Ren |
| 2022 | Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. Yuqing Yang, Yue Zhang, Zhiqiang Lin |
| 2022 | DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk |
| 2022 | DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang |
| 2022 | DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. Floris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida |
| 2022 | DeFi '22: ACM CCS Workshop on Decentralized Finance and Security. Fan Zhang, Patrick McCorry |
| 2022 | Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. Chandra Thapa, Seyit Camtepe, Raj Gaire, Surya Nepal, Seung Ick Jang |
| 2022 | Demo - SPoKE: Secure Polling and Knowledge Exchange. Thomas Sandholm, Sayandev Mukherjee, Bernardo A. Huberman |
| 2022 | Demo: End-to-End Wireless Disruption of CCS EV Charging. Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic |
| 2022 | Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records. Xiangan Tian, Vlasis Koutsos, Lijia Wu, Yijian Wu, Dimitrios Papadopoulos |
| 2022 | Designing Hardware for Cryptography and Cryptography for Hardware. Srinivas Devadas, Simon Langowski, Nikola Samardzic, Sacha Servan-Schreiber, Daniel Sánchez |
| 2022 | Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems. Jie Lu, Haofeng Li, Chen Liu, Lian Li, Kun Cheng |
| 2022 | Detecting and Measuring Misconfigured Manifests in Android Apps. Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin |
| 2022 | Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model. Jacob Imola, Takao Murakami, Kamalika Chaudhuri |
| 2022 | DirtyCred: Escalating Privilege in Linux Kernel. Zhenpeng Lin, Yuhang Wu, Xinyu Xing |
| 2022 | Discovering IoT Physical Channel Vulnerabilities. Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang |
| 2022 | Distributed, Private, Sparse Histograms in the Two-Server Model. James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann |
| 2022 | Do Opt-Outs Really Opt Me Out? Duc Bui, Brian Tang, Kang G. Shin |
| 2022 | Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. Xian Wang, Shuang Hao |
| 2022 | DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim |
| 2022 | Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang |
| 2022 | EIFFeL: Ensuring Integrity for Federated Learning. Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten |
| 2022 | ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang |
| 2022 | EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang |
| 2022 | Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida |
| 2022 | Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. Dario Fiore, Ida Tucker |
| 2022 | Eluding Secure Aggregation in Federated Learning via Model Inconsistency. Dario Pasquini, Danilo Francati, Giuseppe Ateniese |
| 2022 | Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. Yulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, Yinhong Zhao |
| 2022 | Enforcing Fine-grained Constant-time Policies. Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya |
| 2022 | Enhanced Membership Inference Attacks against Machine Learning Models. Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri |
| 2022 | Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis |
| 2022 | Evocatio: Conjuring Bug Capabilities from a Single PoC. Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer |
| 2022 | Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection. Priyanka Dodia, Mashael AlSabah, Omar Alrawi, Tao Wang |
| 2022 | FABEO: Fast Attribute-Based Encryption with Optimal Security. Doreen Riepel, Hoeteck Wee |
| 2022 | Fast Fully Oblivious Compaction and Shuffling. Sajin Sasy, Aaron Johnson, Ian Goldberg |
| 2022 | Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. Anders P. K. Dalskov, Daniel Escudero, Ariel Nof |
| 2022 | FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs. Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow |
| 2022 | Feature Inference Attack on Shapley Values. Xinjian Luo, Yangfan Jiang, Xiaokui Xiao |
| 2022 | Federated Boosted Decision Trees with Differential Privacy. Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha |
| 2022 | FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. Jiangyi Deng, Yanjiao Chen, Wenyuan Xu |
| 2022 | Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart |
| 2022 | Finding MNEMON: Reviving Memories of Node Embeddings. Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini |
| 2022 | Foundations of Coin Mixing Services. Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan |
| 2022 | Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. Trung Tin Nguyen, Michael Backes, Ben Stock |
| 2022 | Frequency Estimation in the Shuffle Model with Almost a Single Message. Qiyao Luo, Yilei Wang, Ke Yi |
| 2022 | Frequency Throttling Side-Channel Attack. Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel |
| 2022 | GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi |
| 2022 | Graph Unlearning. Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang |
| 2022 | Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing. Junxian Shen, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu |
| 2022 | Group Property Inference Attacks Against Graph Neural Networks. Xiuling Wang, Wendy Hui Wang |
| 2022 | HammerScope: Observing DRAM Power Consumption Using Rowhammer. Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom |
| 2022 | Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson |
| 2022 | Harnessing Perceptual Adversarial Patches for Crowd Counting. Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao |
| 2022 | HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. Zhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang |
| 2022 | Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui |
| 2022 | Helping or Hindering?: How Browser Extensions Undermine Security. Shubham Agarwal |
| 2022 | Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan |
| 2022 | How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest |
| 2022 | HyperDbg: Reinventing Hardware-Assisted Debugging. Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz |
| 2022 | I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé |
| 2022 | Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. Ke Zhong, Yiping Ma, Sebastian Angel |
| 2022 | Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation. Zayd Hammoudeh, Daniel Lowd |
| 2022 | Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
| 2022 | InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution. Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang |
| 2022 | JIT-Picking: Differential Fuzzing of JavaScript Engines. Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz |
| 2022 | Kryvos: Publicly Tally-Hiding Verifiable E-Voting. Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt |
| 2022 | L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong |
| 2022 | LPGNet: Link Private Graph Networks for Node Classification. Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena |
| 2022 | Laconic Private Set-Intersection From Pairings. Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin |
| 2022 | Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption. Evgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas |
| 2022 | Leakage and Tamper Resilient Permutation-Based Cryptography. Christoph Dobraunig, Bart Mennink, Robert Primas |
| 2022 | LibAFL: A Framework to Build Modular and Reusable Fuzzers. Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti |
| 2022 | Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu |
| 2022 | LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo |
| 2022 | Low-Latency Hardware Private Circuits. David Knichel, Amir Moradi |
| 2022 | MC2: Rigorous and Efficient Directed Greybox Fuzzing. Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana |
| 2022 | META-BTS: Bootstrapping Precision Beyond the Limit. Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim |
| 2022 | MTD '22: 9th ACM Workshop on Moving Target Defense. Hamed Okhravi, Cliff Wang |
| 2022 | Matproofs: Maintainable Matrix Commitment with Efficient Aggregation. Jing Liu, Liang Feng Zhang |
| 2022 | Membership Inference Attacks and Generalization: A Causal Perspective. Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena |
| 2022 | Membership Inference Attacks by Exploiting Loss Trajectory. Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang |
| 2022 | MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. Zitai Chen, Sam L. Thomas, Flavio D. Garcia |
| 2022 | Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow |
| 2022 | Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth |
| 2022 | Minotaur: Multi-Resource Blockchain Consensus. Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang |
| 2022 | NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang |
| 2022 | NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu |
| 2022 | NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. Kamil Kluczniak |
| 2022 | NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler |
| 2022 | Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu |
| 2022 | On the (In)Security of Secure ROS2. Gelei Deng, Guowen Xu, Yuan Zhou, Tianwei Zhang, Yang Liu |
| 2022 | On the Adaptive Security of the Threshold BLS Signature Scheme. Renas Bacho, Julian Loss |
| 2022 | On the Privacy Risks of Cell-Based NAS Architectures. Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang |
| 2022 | On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. Akira Ito, Rei Ueno, Naofumi Homma |
| 2022 | Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu |
| 2022 | Overo: Sharing Private Audio Recordings. Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee |
| 2022 | P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu |
| 2022 | PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. Haibin Zhang, Sisi Duan |
| 2022 | PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang |
| 2022 | PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh |
| 2022 | PSI from Ring-OLE. Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky |
| 2022 | PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. Jun Zeng, Chuqi Zhang, Zhenkai Liang |
| 2022 | PentaGOD: Stepping beyond Traditional GOD with Five Parties. Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
| 2022 | Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu |
| 2022 | Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian |
| 2022 | Phishing URL Detection: A Network-based Approach Robust to Evasion. Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim |
| 2022 | Physical Hijacking Attacks against Object Trackers. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes |
| 2022 | Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun |
| 2022 | Poirot: Probabilistically Recommending Protections for the Android Framework. Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer |
| 2022 | Post Quantum Noise. Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber |
| 2022 | Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao |
| 2022 | Poster - Towards Authorship Obfuscation with Language Models. Rajvardhan Oak |
| 2022 | Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded Devices. Mohsen Salehi, Karthik Pattabiraman |
| 2022 | Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. Chuyen Nguyen, Caleb Morgan, Sudip Mittal |
| 2022 | Poster EveGAN: Using Generative Deep Learning for Cryptanalysis. Roger A. Hallman |
| 2022 | Poster MPClan: : Protocol Suite for Privacy-Conscious Computations. Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh |
| 2022 | Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System. Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman |
| 2022 | Poster: A Post-Quantum Oblivious PRF from Isogenies. Andrea Basso |
| 2022 | Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks. Mafalda Ferreira, Tiago Brito, José Fragoso Santos, Nuno Santos |
| 2022 | Poster: A WiFi Vision-based Approach to Person Re-identification. Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang |
| 2022 | Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification. Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon |
| 2022 | Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. Kiho Lee, Sanghak Oh, Hyoungshick Kim |
| 2022 | Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' Apps. Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek |
| 2022 | Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles. Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim |
| 2022 | Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta |
| 2022 | Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device Authentication. Xiaofeng Lu, Renyu Pang, Pietro Liò |
| 2022 | Poster: Clean-label Backdoor Attack on Graph Neural Networks. Jing Xu, Stjepan Picek |
| 2022 | Poster: Coded Broadcast for Scalable Leader-Based BFT Consensus. Ioannis Kaklamanis, Lei Yang, Mohammad Alizadeh |
| 2022 | Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement. Akshit Aggarwal, Srinibas Swain |
| 2022 | Poster: Cryptographic Inferences for Video Deep Neural Networks. Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong |
| 2022 | Poster: DNS in Routers Considered Harmful. Haya Schulmann, Michael Waidner |
| 2022 | Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction. Niusen Chen, Josh Dafoe, Bo Chen |
| 2022 | Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts. Levi Taiji Li, Mu Zhang |
| 2022 | Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri |
| 2022 | Poster: Efficient Three-Party Shuffling Using Precomputation. Andreas Brüggemann, Thomas Schneider, Ajith Suresh, Hossein Yalame |
| 2022 | Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution. Yibo Wang, Yuzhe Tang |
| 2022 | Poster: Fingerprint-Face Friction Based Earable Authentication. Zi Wang, Yilin Wang, Yingying Chen, Jie Yang |
| 2022 | Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger |
| 2022 | Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection. Kohei Doi, Takeshi Sugawara |
| 2022 | Poster: Insights into Global Deployment of RPKI Validation. Haya Schulmann, Niklas Vogel, Michael Waidner |
| 2022 | Poster: Investigating QUIC's Potential Impact on Censorship Circumvention. Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal |
| 2022 | Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software. Can Huang, Cheng Li, Jiashuo Liang, Xinhui Han |
| 2022 | Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection. Davide Sanvito, Giuseppe Siracusano, Roberto Gonzalez, Roberto Bifulco |
| 2022 | Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms. Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman |
| 2022 | Poster: Multi-Layer Threat Analysis of the Cloud. Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri |
| 2022 | Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving. Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen |
| 2022 | Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems. Lamya Alkhariji, Suparna De, Omer F. Rana, Charith Perera |
| 2022 | Poster: Patient Community - A Test Bed for Privacy Threat Analysis. Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder |
| 2022 | Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap |
| 2022 | Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh |
| 2022 | Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation. Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen |
| 2022 | Poster: RPKI Kill Switch. Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2022 | Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots. Shadi Sadeghpour, Natalija Vlajic |
| 2022 | Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules. Ruiguo Yang, Jiajin Cai, Xinhui Han |
| 2022 | Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. Elias Heftrig, Haya Schulmann, Michael Waidner |
| 2022 | Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications. Yunpeng Luo, Ziwen Wan, Qi Alfred Chen |
| 2022 | Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection. Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen |
| 2022 | Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit. Yibin Xu, Tijs Slaats, Boris Düdder |
| 2022 | Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos |
| 2022 | Poster: User-controlled System-level Encryption for all Applications. Tarun Kumar Yadav, Justin Hales, Kent E. Seamons |
| 2022 | Poster: Vogue: Faster Computation of Private Heavy Hitters. Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal |
| 2022 | Power Contracts: Provably Complete Power Leakage Models for Processors. Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas |
| 2022 | Practical Settlement Bounds for Proof-of-Work Blockchains. Peter Gazi, Ling Ren, Alexander Russell |
| 2022 | Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen |
| 2022 | Practical, Round-Optimal Lattice-Based Blind Signatures. Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav |
| 2022 | Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC. Alex Berke, Dan Calacci |
| 2022 | Private and Reliable Neural Network Inference. Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev |
| 2022 | Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022 Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi |
| 2022 | Proof-of-Possession for KEM Certificates using Verifiable Generation. Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha |
| 2022 | Protecting Critical Inter-Domain Communication through Flyover Reservations. Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig |
| 2022 | Proving UNSAT in Zero Knowledge. Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang |
| 2022 | QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye |
| 2022 | ROAST: Robust Asynchronous Schnorr Threshold Signatures. Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder |
| 2022 | Ready Raider One: Exploring the Misuse of Cloud Gaming Services. Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang |
| 2022 | RedShift: Transparent SNARKs from List Polynomial Commitments. Assimakis A. Kattis, Konstantin Panarin, Alexander Vlasov |
| 2022 | Reinforced Concrete: A Fast Hash Function for Verifiable Computation. Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch |
| 2022 | SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. Santiago Torres-Arias, Marcela S. Melara, Laurent Simon |
| 2022 | SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue |
| 2022 | SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan |
| 2022 | SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. Tianshuo Cong, Xinlei He, Yang Zhang |
| 2022 | STAR: Secret Sharing for Private Threshold Aggregation Reporting. Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi |
| 2022 | Second-Order Low-Randomness d + 1 Hardware Sharing of the AES. Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi |
| 2022 | Secret-Shared Joins with Multiplicity from Aggregation Trees. Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal |
| 2022 | Secure Auctions in the Presence of Rational Adversaries. Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar |
| 2022 | Secure Parallel Computation on Privately Partitioned Data and Applications. Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa |
| 2022 | Securing Reset Operations in NISQ Quantum Computers. Allen Mi, Shuwen Deng, Jakub Szefer |
| 2022 | Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum |
| 2022 | Server-Aided Continuous Group Key Agreement. Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk |
| 2022 | Sharp: Short Relaxed Range Proofs. Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle |
| 2022 | Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. Juanru Fang, Wei Dong, Ke Yi |
| 2022 | Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha |
| 2022 | Sigstore: Software Signing for Everybody. Zachary Newman, John Speed Meyers, Santiago Torres-Arias |
| 2022 | Sleepy Channels: Bi-directional Payment Channels without Watchtowers. Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei |
| 2022 | SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering. Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira |
| 2022 | SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities. Jaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee |
| 2022 | Squirrel: Efficient Synchronized Multi-Signatures from Lattices. Nils Fleischhacker, Mark Simkin, Zhenfei Zhang |
| 2022 | StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning. Yupei Liu, Jinyuan Jia, Hongbin Liu, Neil Zhenqiang Gong |
| 2022 | Strengthening Order Preserving Encryption with Differential Privacy. Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou |
| 2022 | StrongBox: A GPU TEE on Arm Endpoints. Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang |
| 2022 | Succinct Zero Knowledge for Floating Point Computations. Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang |
| 2022 | Succinct Zero-Knowledge Batch Proofs for Set Accumulators. Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh |
| 2022 | Sustainability is a Security Problem. Patrick Drew McDaniel |
| 2022 | SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin |
| 2022 | TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. Changhua Luo, Penghui Li, Wei Meng |
| 2022 | TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities. Wooseok Kang, Byoungho Son, Kihong Heo |
| 2022 | The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia |
| 2022 | The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell |
| 2022 | The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. Yusuke Naito, Yu Sasaki, Takeshi Sugawara, Kan Yasuda |
| 2022 | Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani |
| 2022 | Thora: Atomic and Privacy-Preserving Multi-Channel Updates. Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei |
| 2022 | Threshold Cryptography as a Service (in the Multiserver and YOSO Models). Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin |
| 2022 | TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals. Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, Jun Han |
| 2022 | Tidy: Symbolic Verification of Timed Cryptographic Protocols. Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina |
| 2022 | Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang |
| 2022 | Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets. Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini |
| 2022 | TurboPack: Honest Majority MPC with Constant Online Communication. Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song |
| 2022 | Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection. Paola de Perthuis, David Pointcheval |
| 2022 | Uncovering Intent based Leak of Sensitive Data in Android Framework. Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai |
| 2022 | Understanding IoT Security from a Market-Scale Perspective. Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni |
| 2022 | Understanding Real-world Threats to Deep Learning Models in Android Apps. Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng |
| 2022 | Understanding Security Issues in the NFT Ecosystem. Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna |
| 2022 | Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee |
| 2022 | Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker |
| 2022 | Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security. Calvin Abou Haidar, Benoît Libert, Alain Passelègue |
| 2022 | VOProof: Efficient zkSNARKs from Vector Oracle Compilers. Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shifeng Sun, Geng Wang, Dawu Gu |
| 2022 | VRust: Automated Vulnerability Detection for Solana Smart Contracts. Siwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang |
| 2022 | VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro |
| 2022 | Victory by KO: Attacking OpenPGP Using Key Overwriting. Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson |
| 2022 | Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang |
| 2022 | WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. Michael Brenner, Anamaria Costache, Kurt Rohloff |
| 2022 | WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. Edwin Yang, Qiuye He, Song Fang |
| 2022 | WPES '22: 21st Workshop on Privacy in the Electronic Society. Yuan Hong, Lingyu Wang |
| 2022 | Watch Out for Race Condition Attacks When Using Android External Storage. Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo |
| 2022 | Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration. Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero |
| 2022 | We Are the Experts, and We Are the Problem: The Security Advice Fiasco. Michelle L. Mazurek |
| 2022 | What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang |
| 2022 | When Evil Calls: Targeted Adversarial Voice over IP Network. Han Liu, Zhiyuan Yu, Mingming Zha, Xiaofeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang |
| 2022 | When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon |
| 2022 | When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. Yue Zhang, Zhiqiang Lin |
| 2022 | Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang |
| 2022 | Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It. Sílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman |
| 2022 | Zapper: Smart Contracts with Data and Identity Privacy. Samuel Steffen, Benjamin Bichsel, Martin T. Vechev |
| 2022 | i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Leemon Baird, Pratyay Mukherjee, Rohit Sinha |
| 2022 | pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han |
| 2022 | zkBridge: Trustless Cross-chain Bridges Made Practical. Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song |