CCS A*

288 papers

YearTitle / Authors
2022"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang
2022A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert
2022A Scalable and Dynamic ACL System for In-Network Defense.
Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang
2022A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello.
Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood
2022A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music.
Anomadarshi Barua, Yonatan Gizachew Achamyeleh, Mohammad Abdullah Al Faruque
2022AI/ML for Network Security: The Emperor has no Clothes.
Arthur Selle Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, Lisandro Z. Granville
2022AISec '22: 15th ACM Workshop on Artificial Intelligence and Security.
Ambra Demontis, Xinyun Chen, Florian Tramèr
2022AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security.
Mark Yampolskiy, Moti Yung
2022ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair
2022ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning.
Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran
2022Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities.
Yinxi Liu, Wei Meng
2022Adversarial Correctness and Privacy for Probabilistic Data Structures.
Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
2022Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats.
Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn
2022An Extensive Study of Residential Proxies in China.
Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan
2022AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication.
Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang
2022Are Attribute Inference Attacks Just Imputation?
Bargav Jayaraman, David Evans
2022Auditing Membership Leakages of Multi-Exit Networks.
Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
2022Automatic Detection of Fake Key Attacks in Secure Messaging.
Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons
2022Automatic Detection of Speculative Execution Combinations.
Xaver Fabian, Marco Guarnieri, Marco Patrignani
2022Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators.
Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou
2022Behind the Scenes of RPKI.
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner
2022Blacktooth: Breaking through the Defense of Bluetooth in Silence.
Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu
2022Blazing Fast PSI from Improved OKVS and Subfield VOLE.
Srinivasan Raghuraman, Peter Rindal
2022Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.
Yuan Lu, Zhenliang Lu, Qiang Tang
2022Bullshark: DAG BFT Protocols Made Practical.
Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias
2022C2C: Fine-grained Configuration-driven System Call Filtering.
Seyedhamed Ghavamnia, Tapti Palit, Michalis Polychronakis
2022CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero
2022CCSW '22: The 2022 Cloud Computing Security Workshop.
Marten van Dijk, Francesco Regazzoni
2022CERBERUS: Exploring Federated Prediction of Security Events.
Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro
2022CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang
2022CINI MINIS: Domain Isolation for Fault and Combined Security.
Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
2022CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy.
Earlence Fernandes, Cristina Alcaraz
2022Cache Refinement Type for Side-Channel Detection of Cryptographic Software.
Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang
2022Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement.
ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce
2022Caulk: Lookup Arguments in Sublinear Time.
Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin
2022Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing.
Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic
2022Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
Tamjid Al Rahat, Yu Feng, Yuan Tian
2022Chaghri - A FHE-friendly Block Cipher.
Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar
2022Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks.
Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai
2022Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
Golden G. Richard III, Tim Blazytko
2022Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam.
Siyuan Tang, Xianghang Mi, Ying Li, Xiaofeng Wang, Kai Chen
2022Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang
2022ConsensusDay '22: ACM Workshop on Developments in Consensus.
Jorge M. Soares, Dawn Song, Marko Vukolic
2022Constant Latency in Sleepy Consensus.
Atsuki Momose, Ling Ren
2022Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection.
Yuqing Yang, Yue Zhang, Zhiqiang Lin
2022DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On.
Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk
2022DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling.
Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang
2022DangZero: Efficient Use-After-Free Detection via Direct Page Table Access.
Floris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida
2022DeFi '22: ACM CCS Workshop on Decentralized Finance and Security.
Fan Zhang, Patrick McCorry
2022Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Chandra Thapa, Seyit Camtepe, Raj Gaire, Surya Nepal, Seung Ick Jang
2022Demo - SPoKE: Secure Polling and Knowledge Exchange.
Thomas Sandholm, Sayandev Mukherjee, Bernardo A. Huberman
2022Demo: End-to-End Wireless Disruption of CCS EV Charging.
Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic
2022Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records.
Xiangan Tian, Vlasis Koutsos, Lijia Wu, Yijian Wu, Dimitrios Papadopoulos
2022Designing Hardware for Cryptography and Cryptography for Hardware.
Srinivas Devadas, Simon Langowski, Nikola Samardzic, Sacha Servan-Schreiber, Daniel Sánchez
2022Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems.
Jie Lu, Haofeng Li, Chen Liu, Lian Li, Kun Cheng
2022Detecting and Measuring Misconfigured Manifests in Android Apps.
Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin
2022Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model.
Jacob Imola, Takao Murakami, Kamalika Chaudhuri
2022DirtyCred: Escalating Privilege in Linux Kernel.
Zhenpeng Lin, Yuhang Wu, Xinyu Xing
2022Discovering IoT Physical Channel Vulnerabilities.
Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang
2022Distributed, Private, Sparse Histograms in the Two-Server Model.
James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann
2022Do Opt-Outs Really Opt Me Out?
Duc Bui, Brian Tang, Kang G. Shin
2022Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee.
Xian Wang, Shuang Hao
2022DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing.
Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim
2022Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022EIFFeL: Ensuring Integrity for Federated Learning.
Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten
2022ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.
Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang
2022EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang
2022Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida
2022Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams.
Dario Fiore, Ida Tucker
2022Eluding Secure Aggregation in Federated Learning via Model Inconsistency.
Dario Pasquini, Danilo Francati, Giuseppe Ateniese
2022Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security.
Yulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, Yinhong Zhao
2022Enforcing Fine-grained Constant-time Policies.
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya
2022Enhanced Membership Inference Attacks against Machine Learning Models.
Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri
2022Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications.
Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis
2022Evocatio: Conjuring Bug Capabilities from a Single PoC.
Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer
2022Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection.
Priyanka Dodia, Mashael AlSabah, Omar Alrawi, Tao Wang
2022FABEO: Fast Attribute-Based Encryption with Optimal Security.
Doreen Riepel, Hoeteck Wee
2022Fast Fully Oblivious Compaction and Shuffling.
Sajin Sasy, Aaron Johnson, Ian Goldberg
2022Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority.
Anders P. K. Dalskov, Daniel Escudero, Ariel Nof
2022FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow
2022Feature Inference Attack on Shapley Values.
Xinjian Luo, Yangfan Jiang, Xiaokui Xiao
2022Federated Boosted Decision Trees with Differential Privacy.
Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha
2022FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Jiangyi Deng, Yanjiao Chen, Wenyuan Xu
2022Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs.
Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart
2022Finding MNEMON: Reviving Memories of Node Embeddings.
Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini
2022Foundations of Coin Mixing Services.
Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan
2022Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
Trung Tin Nguyen, Michael Backes, Ben Stock
2022Frequency Estimation in the Shuffle Model with Almost a Single Message.
Qiyao Luo, Yilei Wang, Ke Yi
2022Frequency Throttling Side-Channel Attack.
Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel
2022GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy.
Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2022Graph Unlearning.
Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
2022Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing.
Junxian Shen, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu
2022Group Property Inference Attacks Against Graph Neural Networks.
Xiuling Wang, Wendy Hui Wang
2022HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom
2022Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson
2022Harnessing Perceptual Adversarial Patches for Crowd Counting.
Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao
2022HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions.
Zhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang
2022Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud.
Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui
2022Helping or Hindering?: How Browser Extensions Undermine Security.
Shubham Agarwal
2022Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps.
Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan
2022How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum.
Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest
2022HyperDbg: Reinventing Hardware-Assisted Debugging.
Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz
2022I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé
2022Ibex: Privacy-preserving Ad Conversion Tracking and Bidding.
Ke Zhong, Yiping Ma, Sebastian Angel
2022Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation.
Zayd Hammoudeh, Daniel Lowd
2022Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One.
Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution.
Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang
2022JIT-Picking: Differential Fuzzing of JavaScript Engines.
Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz
2022Kryvos: Publicly Tally-Hiding Verifiable E-Voting.
Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt
2022L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response.
Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong
2022LPGNet: Link Private Graph Networks for Node Classification.
Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena
2022Laconic Private Set-Intersection From Pairings.
Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin
2022Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption.
Evgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas
2022Leakage and Tamper Resilient Permutation-Based Cryptography.
Christoph Dobraunig, Bart Mennink, Robert Primas
2022LibAFL: A Framework to Build Modular and Reusable Fuzzers.
Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti
2022Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu
2022LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo
2022Low-Latency Hardware Private Circuits.
David Knichel, Amir Moradi
2022MC2: Rigorous and Efficient Directed Greybox Fuzzing.
Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana
2022META-BTS: Bootstrapping Precision Beyond the Limit.
Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim
2022MTD '22: 9th ACM Workshop on Moving Target Defense.
Hamed Okhravi, Cliff Wang
2022Matproofs: Maintainable Matrix Commitment with Efficient Aggregation.
Jing Liu, Liang Feng Zhang
2022Membership Inference Attacks and Generalization: A Causal Perspective.
Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena
2022Membership Inference Attacks by Exploiting Loss Trajectory.
Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang
2022MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware.
Zitai Chen, Sam L. Thomas, Flavio D. Garcia
2022Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow
2022Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications.
Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth
2022Minotaur: Multi-Resource Blockchain Consensus.
Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
2022NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud.
Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang
2022NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms.
Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu
2022NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus.
Kamil Kluczniak
2022NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications.
Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler
2022Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs.
Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu
2022On the (In)Security of Secure ROS2.
Gelei Deng, Guowen Xu, Yuan Zhou, Tianwei Zhang, Yang Liu
2022On the Adaptive Security of the Threshold BLS Signature Scheme.
Renas Bacho, Julian Loss
2022On the Privacy Risks of Cell-Based NAS Architectures.
Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang
2022On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage.
Akira Ito, Rei Ueno, Naofumi Homma
2022Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models.
Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu
2022Overo: Sharing Private Audio Recordings.
Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee
2022P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu
2022PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement.
Haibin Zhang, Sisi Duan
2022PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication.
Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang
2022PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies.
Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh
2022PSI from Ring-OLE.
Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky
2022PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
Jun Zeng, Chuqi Zhang, Zhenkai Liang
2022PentaGOD: Stepping beyond Traditional GOD with Five Parties.
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2022Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu
2022Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT.
Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian
2022Phishing URL Detection: A Network-based Approach Robust to Evasion.
Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim
2022Physical Hijacking Attacks against Object Trackers.
Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes
2022Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun
2022Poirot: Probabilistically Recommending Protections for the Android Framework.
Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer
2022Post Quantum Noise.
Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber
2022Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models.
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
2022Poster - Towards Authorship Obfuscation with Language Models.
Rajvardhan Oak
2022Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded Devices.
Mohsen Salehi, Karthik Pattabiraman
2022Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models.
Chuyen Nguyen, Caleb Morgan, Sudip Mittal
2022Poster EveGAN: Using Generative Deep Learning for Cryptanalysis.
Roger A. Hallman
2022Poster MPClan: : Protocol Suite for Privacy-Conscious Computations.
Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh
2022Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System.
Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman
2022Poster: A Post-Quantum Oblivious PRF from Isogenies.
Andrea Basso
2022Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks.
Mafalda Ferreira, Tiago Brito, José Fragoso Santos, Nuno Santos
2022Poster: A WiFi Vision-based Approach to Person Re-identification.
Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang
2022Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification.
Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon
2022Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks.
Kiho Lee, Sanghak Oh, Hyoungshick Kim
2022Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' Apps.
Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek
2022Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim
2022Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets.
Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta
2022Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device Authentication.
Xiaofeng Lu, Renyu Pang, Pietro Liò
2022Poster: Clean-label Backdoor Attack on Graph Neural Networks.
Jing Xu, Stjepan Picek
2022Poster: Coded Broadcast for Scalable Leader-Based BFT Consensus.
Ioannis Kaklamanis, Lei Yang, Mohammad Alizadeh
2022Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement.
Akshit Aggarwal, Srinibas Swain
2022Poster: Cryptographic Inferences for Video Deep Neural Networks.
Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong
2022Poster: DNS in Routers Considered Harmful.
Haya Schulmann, Michael Waidner
2022Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction.
Niusen Chen, Josh Dafoe, Bo Chen
2022Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts.
Levi Taiji Li, Mu Zhang
2022Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri
2022Poster: Efficient Three-Party Shuffling Using Precomputation.
Andreas Brüggemann, Thomas Schneider, Ajith Suresh, Hossein Yalame
2022Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution.
Yibo Wang, Yuzhe Tang
2022Poster: Fingerprint-Face Friction Based Earable Authentication.
Zi Wang, Yilin Wang, Yingying Chen, Jie Yang
2022Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring.
Martin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger
2022Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection.
Kohei Doi, Takeshi Sugawara
2022Poster: Insights into Global Deployment of RPKI Validation.
Haya Schulmann, Niklas Vogel, Michael Waidner
2022Poster: Investigating QUIC's Potential Impact on Censorship Circumvention.
Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal
2022Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software.
Can Huang, Cheng Li, Jiashuo Liang, Xinhui Han
2022Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection.
Davide Sanvito, Giuseppe Siracusano, Roberto Gonzalez, Roberto Bifulco
2022Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms.
Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman
2022Poster: Multi-Layer Threat Analysis of the Cloud.
Salman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri
2022Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen
2022Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems.
Lamya Alkhariji, Suparna De, Omer F. Rana, Charith Perera
2022Poster: Patient Community - A Test Bed for Privacy Threat Analysis.
Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder
2022Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid.
Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap
2022Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
2022Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation.
Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen
2022Poster: RPKI Kill Switch.
Donika Mirdita, Haya Schulmann, Michael Waidner
2022Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots.
Shadi Sadeghpour, Natalija Vlajic
2022Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules.
Ruiguo Yang, Jiajin Cai, Xinhui Han
2022Poster: The Unintended Consequences of Algorithm Agility in DNSSEC.
Elias Heftrig, Haya Schulmann, Michael Waidner
2022Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications.
Yunpeng Luo, Ziwen Wan, Qi Alfred Chen
2022Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection.
Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen
2022Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit.
Yibin Xu, Tijs Slaats, Boris Düdder
2022Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos
2022Poster: User-controlled System-level Encryption for all Applications.
Tarun Kumar Yadav, Justin Hales, Kent E. Seamons
2022Poster: Vogue: Faster Computation of Private Heavy Hitters.
Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal
2022Power Contracts: Provably Complete Power Leakage Models for Processors.
Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas
2022Practical Settlement Bounds for Proof-of-Work Blockchains.
Peter Gazi, Ling Ren, Alexander Russell
2022Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen
2022Practical, Round-Optimal Lattice-Based Blind Signatures.
Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav
2022Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC.
Alex Berke, Dan Calacci
2022Private and Reliable Neural Network Inference.
Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev
2022Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022
Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi
2022Proof-of-Possession for KEM Certificates using Verifiable Generation.
Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha
2022Protecting Critical Inter-Domain Communication through Flyover Reservations.
Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig
2022Proving UNSAT in Zero Knowledge.
Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang
2022QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems.
Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye
2022ROAST: Robust Asynchronous Schnorr Threshold Signatures.
Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder
2022Ready Raider One: Exploring the Misuse of Cloud Gaming Services.
Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang
2022RedShift: Transparent SNARKs from List Polynomial Commitments.
Assimakis A. Kattis, Konstantin Panarin, Alexander Vlasov
2022Reinforced Concrete: A Fast Hash Function for Verifiable Computation.
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
2022SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Santiago Torres-Arias, Marcela S. Melara, Laurent Simon
2022SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue
2022SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan
2022SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.
Tianshuo Cong, Xinlei He, Yang Zhang
2022STAR: Secret Sharing for Private Threshold Aggregation Reporting.
Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi
2022Second-Order Low-Randomness d + 1 Hardware Sharing of the AES.
Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi
2022Secret-Shared Joins with Multiplicity from Aggregation Trees.
Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal
2022Secure Auctions in the Presence of Rational Adversaries.
Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar
2022Secure Parallel Computation on Privately Partitioned Data and Applications.
Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa
2022Securing Reset Operations in NISQ Quantum Computers.
Allen Mi, Shuwen Deng, Jakub Szefer
2022Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics.
Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum
2022Server-Aided Continuous Group Key Agreement.
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk
2022Sharp: Short Relaxed Range Proofs.
Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle
2022Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy.
Juanru Fang, Wei Dong, Ke Yi
2022Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto.
Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
2022Sigstore: Software Signing for Everybody.
Zachary Newman, John Speed Meyers, Santiago Torres-Arias
2022Sleepy Channels: Bi-directional Payment Channels without Watchtowers.
Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei
2022SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.
Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira
2022SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities.
Jaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee
2022Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
Nils Fleischhacker, Mark Simkin, Zhenfei Zhang
2022StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning.
Yupei Liu, Jinyuan Jia, Hongbin Liu, Neil Zhenqiang Gong
2022Strengthening Order Preserving Encryption with Differential Privacy.
Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou
2022StrongBox: A GPU TEE on Arm Endpoints.
Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang
2022Succinct Zero Knowledge for Floating Point Computations.
Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang
2022Succinct Zero-Knowledge Batch Proofs for Set Accumulators.
Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh
2022Sustainability is a Security Problem.
Patrick Drew McDaniel
2022SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings.
Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin
2022TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications.
Changhua Luo, Penghui Li, Wei Meng
2022TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities.
Wooseok Kang, Byoungho Son, Kihong Heo
2022The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia
2022The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols.
Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell
2022The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Yusuke Naito, Yu Sasaki, Takeshi Sugawara, Kan Yasuda
2022Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani
2022Thora: Atomic and Privacy-Preserving Multi-Channel Updates.
Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei
2022Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin
2022TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals.
Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, Jun Han
2022Tidy: Symbolic Verification of Timed Cryptographic Protocols.
Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina
2022Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications.
Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang
2022Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets.
Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini
2022TurboPack: Honest Majority MPC with Constant Online Communication.
Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song
2022Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection.
Paola de Perthuis, David Pointcheval
2022Uncovering Intent based Leak of Sensitive Data in Android Framework.
Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai
2022Understanding IoT Security from a Market-Scale Perspective.
Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni
2022Understanding Real-world Threats to Deep Learning Models in Android Apps.
Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng
2022Understanding Security Issues in the NFT Ecosystem.
Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna
2022Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee
2022Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker
2022Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security.
Calvin Abou Haidar, Benoît Libert, Alain Passelègue
2022VOProof: Efficient zkSNARKs from Vector Oracle Compilers.
Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shifeng Sun, Geng Wang, Dawu Gu
2022VRust: Automated Vulnerability Detection for Solana Smart Contracts.
Siwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang
2022VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro
2022Victory by KO: Attacking OpenPGP Using Key Overwriting.
Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson
2022Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls.
Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang
2022WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Michael Brenner, Anamaria Costache, Kurt Rohloff
2022WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis.
Edwin Yang, Qiuye He, Song Fang
2022WPES '22: 21st Workshop on Privacy in the Electronic Society.
Yuan Hong, Lingyu Wang
2022Watch Out for Race Condition Attacks When Using Android External Storage.
Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo
2022Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration.
Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero
2022We Are the Experts, and We Are the Problem: The Security Advice Fiasco.
Michelle L. Mazurek
2022What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.
Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang
2022When Evil Calls: Targeted Adversarial Voice over IP Network.
Han Liu, Zhiyuan Yu, Mingming Zha, Xiaofeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang
2022When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon
2022When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure.
Yue Zhang, Zhiqiang Lin
2022Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang
2022Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It.
Sílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman
2022Zapper: Smart Contracts with Data and Identity Privacy.
Samuel Steffen, Benjamin Bichsel, Martin T. Vechev
2022i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
Leemon Baird, Pratyay Mukherjee, Rohit Sinha
2022pMPL: A Robust Multi-Party Learning Framework with a Privileged Party.
Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han
2022zkBridge: Trustless Cross-chain Bridges Made Practical.
Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song