| 2023 | "Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor |
| 2023 | "I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. Collins W. Munyendo, Peter Mayer, Adam J. Aviv |
| 2023 | "Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl |
| 2023 | "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl |
| 2023 | A Generic Methodology for the Modular Verification of Security Protocol Implementations. Linard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller |
| 2023 | A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang |
| 2023 | A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow. Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel Henrique Nunes |
| 2023 | A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice |
| 2023 | A Thorough Evaluation of RAMBAM. Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi |
| 2023 | ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra. Antonio de la Piedra, Marloes Venema, Greg Alpár |
| 2023 | ADEM: An Authentic Digital EMblem. Felix Linker, David A. Basin |
| 2023 | AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, HyoJin Yoon, Jooyoung Lee |
| 2023 | AISec '23: 16th ACM Workshop on Artificial Intelligence and Security. Maura Pintor, Florian Simon Tramèr, Xinyun Chen |
| 2023 | ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. Gregory Blanc, Takeshi Takahashi, Zonghua Zhang |
| 2023 | ASHES '23: Workshop on Attacks and Solutions in Hardware Security. Lejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair |
| 2023 | ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. Alexander Bienstock, Paul Rösler, Yi Tang |
| 2023 | Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither |
| 2023 | Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu |
| 2023 | AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking. Changmin Lee, Sooel Son |
| 2023 | Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons. Renas Bacho, Julian Loss |
| 2023 | Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig |
| 2023 | Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules. Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin |
| 2023 | Amplification by Shuffling without Shuffling. Borja Balle, James Bell, Adrià Gascón |
| 2023 | Analyzing the Real-World Security of the Algorand Blockchain. Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin |
| 2023 | AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. Zhiyuan Yu, Shixuan Zhai, Ning Zhang |
| 2023 | Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen |
| 2023 | Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications. Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann |
| 2023 | Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song |
| 2023 | Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2023 | BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. Daniele Antonioli |
| 2023 | Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam |
| 2023 | Black Ostrich: Web Application Scanning with String Solvers. Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld |
| 2023 | Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation. Xiaochen Zhu, Vincent Y. F. Tan, Xiaokui Xiao |
| 2023 | Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge. Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira |
| 2023 | CCSW '23: Cloud Computing Security Workshop. Francesco Regazzoni, Apostolos P. Fournaris |
| 2023 | COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation. Benjamin Levy, Muhammad Ishaq, Benjamin Sherman, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas |
| 2023 | CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy. Magnus Almgren, Earlence Fernandes |
| 2023 | Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee |
| 2023 | Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik |
| 2023 | CheckMate: Automated Game-Theoretic Security Reasoning. Lea Salome Brugger, Laura Kovács, Anja Petkovic Komel, Sophie Rain, Michael Rawson |
| 2023 | Chipmunk: Better Synchronized Multi-Signatures from Lattices. Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang |
| 2023 | CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation. Jianjia Yu, Song Li, Junmin Zhu, Yinzhi Cao |
| 2023 | Combined Private Circuits - Combined Security Refurbished. Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert |
| 2023 | Compact Frequency Estimators in Adversarial Environments. Sam A. Markelon, Mia Filic, Thomas Shrimpton |
| 2023 | Comparse: Provably Secure Formats for Cryptographic Protocols. Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan |
| 2023 | Comprehension from Chaos: Towards Informed Consent for Private Computation. Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum |
| 2023 | Concentrated Geo-Privacy. Yuting Liang, Ke Yi |
| 2023 | Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters. Samuel Haney, Michael Shoemate, Grace Tian, Salil P. Vadhan, Andrew Vyrros, Vicki Xu, Wanrong Zhang |
| 2023 | Concurrent Security of Anonymous Credentials Light, Revisited. Julia Kastner, Julian Loss, Omar Renawi |
| 2023 | Control, Confidentiality, and the Right to be Forgotten. Aloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan |
| 2023 | CookieGraph: Understanding and Detecting First-Party Tracking Cookies. Shaoor Munir, Sandra Deepthy Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso |
| 2023 | CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati |
| 2023 | CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. Andrei Tonkikh, Pavel Ponomarev, Petr Kuznetsov, Yvonne-Anne Pignolet |
| 2023 | Cryptographically Enforced Memory Safety. Martin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, Stefan Mangard |
| 2023 | Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. Gibran Gómez, Kevin van Liebergen, Juan Caballero |
| 2023 | DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models. Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang |
| 2023 | DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun |
| 2023 | DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen |
| 2023 | DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. Yinxi Liu, Wei Meng |
| 2023 | DeFi '23: Workshop on Decentralized Finance and Security. Kaihua Qin, Fan Zhang |
| 2023 | Deciding Differential Privacy of Online Algorithms with Multiple Variables. Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan, Bishnu Bhusal |
| 2023 | Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures. Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher |
| 2023 | Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge |
| 2023 | Demo: Certified Robustness on Toolformer. Yue Xu, Wenjie Wang |
| 2023 | Demo: Data Minimization and Informed Consent in Administrative Forms. Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen |
| 2023 | Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning. Yuechun Gu, Sagar Sharma, Keke Chen |
| 2023 | Demystifying DeFi MEV Activities in Flashbots Bundle. Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen |
| 2023 | Detecting Violations of Differential Privacy for Quantum Algorithms. Ji Guan, Wang Fang, Mingyu Huang, Mingsheng Ying |
| 2023 | Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng |
| 2023 | Do Users Write More Insecure Code with AI Assistants? Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh |
| 2023 | Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. Yue Zhang, Yuqing Yang, Zhiqiang Lin |
| 2023 | ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone |
| 2023 | Efficient Multiparty Probabilistic Threshold Private Set Intersection. Feng-Hao Liu, En Zhang, Leiyong Qin |
| 2023 | Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang |
| 2023 | Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji |
| 2023 | Efficient Registration-Based Encryption. Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi |
| 2023 | Efficient Set Membership Encryption and Applications. Matthew Green, Abhishek Jain, Gijs Van Laer |
| 2023 | Enhancing OSS Patch Backporting with Semantics. Su Yang, Yang Xiao, Zhengzi Xu, Chengyi Sun, Chen Ji, Yuqing Zhang |
| 2023 | Evading Watermark based Detection of AI-Generated Content. Zhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong |
| 2023 | Evaluating the Security Posture of Real-World FIDO2 Deployments. Dhruv Kuchhal, Muhammad Saad, Adam Oest, Frank Li |
| 2023 | Experimenting with Zero-Knowledge Proofs of Training. Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang |
| 2023 | Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. Chuanqi Xu, Ferhat Erata, Jakub Szefer |
| 2023 | FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. Sisi Duan, Xin Wang, Haibin Zhang |
| 2023 | FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. Yiling He, Jian Lou, Zhan Qin, Kui Ren |
| 2023 | FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren |
| 2023 | FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede |
| 2023 | FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen |
| 2023 | Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. Peter Gazi, Aggelos Kiayias, Alexander Russell |
| 2023 | Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. Binbin Tu, Yu Chen, Qi Liu, Cong Zhang |
| 2023 | Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing. Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi |
| 2023 | FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer |
| 2023 | Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers. Dominik Trevor Noß, Lukas Knittel, Christian Mainka, Marcus Niemietz, Jörg Schwenk |
| 2023 | Fine-Grained Data-Centric Content Protection Policy for Web Applications. Zilun Wang, Wei Meng, Michael R. Lyu |
| 2023 | FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee |
| 2023 | Formal Analysis of Access Control Mechanism of 5G Core Network. Mujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain |
| 2023 | Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts. Sander Huyghebaert, Steven Keuchel, Coen De Roover, Dominique Devriese |
| 2023 | FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM. Gilad Asharov, Ilan Komargodski, Yehuda Michelson |
| 2023 | Fuzz on the Beach: Fuzzing Solana Smart Contracts. Sven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl |
| 2023 | Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares. Yi Zhou, Sydney Gibson, Sarah Cai, Menucha Winchell, Bryan Parno |
| 2023 | General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications. David Klein, Benny Rolle, Thomas Barber, Manuel Karl, Martin Johns |
| 2023 | Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning. Hanshen Xiao, Jun Wan, Srinivas Devadas |
| 2023 | Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li |
| 2023 | Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links. Chongzhou Fang, Ning Miao, Han Wang, Jiacheng Zhou, Tyler Sheaves, John Marty Emmert, Avesta Sasan, Houman Homayoun |
| 2023 | Greybox Fuzzing of Distributed Systems. Ruijie Meng, George Pîrlea, Abhik Roychoudhury, Ilya Sergey |
| 2023 | Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFs. Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry |
| 2023 | Group and Attack: Auditing Differential Privacy. Johan Lokna, Anouk Paradis, Dimitar I. Dimitrov, Martin T. Vechev |
| 2023 | HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan |
| 2023 | HELiKs: HE Linear Algebra Kernels for Secure Inference. Shashank Balla, Farinaz Koushanfar |
| 2023 | HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang |
| 2023 | Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis. Zhenghao Hu, Sangho Lee, Marcus Peinado |
| 2023 | Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé |
| 2023 | Hopper: Interpretative Fuzzing for Libraries. Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen |
| 2023 | How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang |
| 2023 | Improved Distributed RSA Key Generation Using the Miller-Rabin Test. Jakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi |
| 2023 | Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level. Yufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose |
| 2023 | In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems. Roman Beltiukov, Wenbo Guo, Arpit Gupta, Walter Willinger |
| 2023 | Interactive Proofs For Differentially Private Counting. Ari Biswas, Graham Cormode |
| 2023 | Interchain Timestamping for Mesh Security. Ertem Nusret Tas, Runchao Han, David Tse, Mingchao Yu |
| 2023 | IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer |
| 2023 | Is Modeling Access Control Worth It? David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen Phuoc Bao, Martín Ochoa |
| 2023 | Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications. Jeremy Rack, Cristian-Alexandru Staicu |
| 2023 | KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. Pansilu Pitigalaarachchi, Xuhua Ding, Haiqing Qiu, Haoxin Tu, Jiaqi Hong, Lingxiao Jiang |
| 2023 | Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels |
| 2023 | Large Language Models for Code: Security Hardening and Adversarial Testing. Jingxuan He, Martin T. Vechev |
| 2023 | Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler |
| 2023 | Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang |
| 2023 | LeakyOhm: Secret Bits Extraction using Impedance Analysis. Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik |
| 2023 | Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin |
| 2023 | LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind |
| 2023 | Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel |
| 2023 | Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum |
| 2023 | Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang |
| 2023 | Linear Communication in Malicious Majority MPC. S. Dov Gordon, Phi Hung Le, Daniel McVicker |
| 2023 | Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. Zhi Li, Weijie Liu, Xiaofeng Wang, Bin Yuan, Hongliang Tian, Hai Jin, Shoumeng Yan |
| 2023 | MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks. Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran |
| 2023 | MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. Torsten Krauß, Alexandra Dmitrienko |
| 2023 | MTD '23: 10th ACM Workshop on Moving Target Defense. Ning Zhang, Qi Li |
| 2023 | Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects. Tinhinane Medjkoune, Oana Goga, Juliette Senechal |
| 2023 | Measuring Website Password Creation Policies At Scale. Suood Alroomi, Frank Li |
| 2023 | MicPro: Microphone-based Voice Privacy Protection. Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu |
| 2023 | Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente |
| 2023 | Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia |
| 2023 | NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang |
| 2023 | On the Security of KZG Commitment for VSS. Atsuki Momose, Sourav Das, Ling Ren |
| 2023 | On the Security of Rate-limited Privacy Pass. Hien Chu, Khue Do, Lucjan Hanzlik |
| 2023 | Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici |
| 2023 | Ou: Automating the Parallelization of Zero-Knowledge Protocols. Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao |
| 2023 | PANIC: PAN-assisted Intra-process Memory Isolation on ARM. Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang |
| 2023 | PELTA - Shielding Multiparty-FHE against Malicious Adversaries. Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux |
| 2023 | PLAS: The 18th Workshop on Programming Languages and Analysis for Security. Fraser Brown, Klaus von Gleissenthall |
| 2023 | PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection. Shijia Li, Jiang Ming, Pengda Qiu, Qiyuan Chen, Lanqing Liu, Huaifeng Bao, Qiang Wang, Chunfu Jia |
| 2023 | Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz |
| 2023 | ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren |
| 2023 | Passive SSH Key Compromise via Lattices. Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger |
| 2023 | Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, Jun Luo |
| 2023 | Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su, Yu Jiang, Jiaguang Sun, Huizhong Li |
| 2023 | Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu |
| 2023 | PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies. Anhao Xiang, Weiping Pei, Chuan Yue |
| 2023 | Post Quantum Fuzzy Stealth Signatures and Applications. Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik |
| 2023 | Post-Quantum Multi-Recipient Public Key Encryption. Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe |
| 2023 | Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain. Wensheng Tian, Lei Zhang, Shuangxi Chen, Hu Wang, Xiao Luo |
| 2023 | Poster: Accountable Processing of Reported Street Problems. Roman Matzutt, Jan Pennekamp, Klaus Wehrle |
| 2023 | Poster: Attestor - Simple Proof-of-Storage-Time. Arup Mondal |
| 2023 | Poster: Backdoor Attack on Extreme Learning Machines. Behrad Tajalli, Gorka Abad, Stjepan Picek |
| 2023 | Poster: Boosting Adversarial Robustness by Adversarial Pre-training. Xiaoyun Xu, Stjepan Picek |
| 2023 | Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems. Johannes Lohmöller, Eduard Vlad, Markus Dahlmanns, Klaus Wehrle |
| 2023 | Poster: Circumventing the GFW with TLS Record Fragmentation. Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget |
| 2023 | Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing. Jihyeon Yu, Juhwan Kim, Yeohoon Yun, Joobeom Yun |
| 2023 | Poster: Computing the Persistent Homology of Encrypted Data. Dominic Gold, Koray Karabina, Francis C. Motta |
| 2023 | Poster: Control-Flow Integrity in Low-end Embedded Devices. Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik |
| 2023 | Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. Wyatt Sweat, Danfeng (Daphne) Yao |
| 2023 | Poster: Data Minimization by Construction for Trigger-Action Applications. Mohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld |
| 2023 | Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang |
| 2023 | Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu |
| 2023 | Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective. Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li |
| 2023 | Poster: Fooling XAI with Explanation-Aware Backdoors. Maximilian Noppel, Christian Wressnegger |
| 2023 | Poster: From Hashes to Ashes - A Comparison of Transcription Services. Rudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling |
| 2023 | Poster: Generating Experiences for Autonomous Network Defense. Andres Molina-Markham, Luis F. Robaina, Akash H. Trivedi, Derek G. Tsui, Ahmad Ridley |
| 2023 | Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers. Betül Askin Özdemir, Tim Beyne |
| 2023 | Poster: Longitudinal Analysis of DoS Attacks. Fabian Kaiser, Haya Schulmann, Michael Waidner |
| 2023 | Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem. David G. Balash, Mir Masood Ali, Monica Kodwani, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv |
| 2023 | Poster: Membership Inference Attacks via Contrastive Learning. Depeng Chen, Xiao Liu, Jie Cui, Hong Zhong |
| 2023 | Poster: Metadata-private Messaging without Coordination. Peipei Jiang, Qian Wang, Yihao Wu, Cong Wang |
| 2023 | Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description. Hattan Althebeiti, Brett Fazio, William Chen, David Mohaisen |
| 2023 | Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. Jing Xu, Stjepan Picek |
| 2023 | Poster: Panacea - Stateless and Non-Interactive Oblivious RAM. Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park |
| 2023 | Poster: Privacy Risks from Misconfigured Android Content Providers. Christopher Lenk, Johannes Kinder |
| 2023 | Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning. Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang |
| 2023 | Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning. Shae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi |
| 2023 | Poster: Secure and Differentially Private kth Ranked Element. Gowri R. Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider |
| 2023 | Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures. Mario Yaksetig, Alexander Havlin |
| 2023 | Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications. Simon Koch, Malte Wessels, David Klein, Martin Johns |
| 2023 | Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education. Jan-Philip van Acken, Joost F. Gadellaa, Slinger Jansen, Katsiaryna Labunets |
| 2023 | Poster: Towards Lightweight TEE-Assisted MPC. Wentao Dong, Cong Wang |
| 2023 | Poster: Towards Practical Brainwave-based User Authentication. Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe |
| 2023 | Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. Eric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray |
| 2023 | Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation. Gyungeun Yun, Kyungho Joo, Wonsuk Choi, Dong Hoon Lee |
| 2023 | Poster: Using CodeQL to Detect Malware in npm. Matías F. Gobbi, Johannes Kinder |
| 2023 | Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning. Ruei-Hau Hsu, Hsuan-Cheng Su, Yi-An Yu |
| 2023 | Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation. Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux |
| 2023 | Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation. Christian van Sloun, Klaus Wehrle |
| 2023 | Poster: WIP: Account ZK-Rollups from Sumcheck Arguments. Rex Fernando, Arnab Roy |
| 2023 | Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. Tejas Kannan, Nick Feamster, Henry Hoffmann |
| 2023 | Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen |
| 2023 | Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. Emiram Kablo, Patricia Arias Cabarcos |
| 2023 | Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023 Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda |
| 2023 | Profile-guided System Optimizations for Accelerated Greybox Fuzzing. Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu |
| 2023 | Protecting HRP UWB Ranging System Against Distance Reduction Attacks. Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, Wonsuk Choi |
| 2023 | Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks. Zongjie Li, Chaozheng Wang, Shuai Wang, Cuiyun Gao |
| 2023 | ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search. Enes Altinisik, Fatih Deniz, Hüsrev Taha Sencar |
| 2023 | Provably Unlinkable Smart Card-based Payments. Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov |
| 2023 | Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. Hanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo, Xiangqun Chen |
| 2023 | PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai |
| 2023 | Ramen: Souper Fast Three-Party Computation for RAM Programs. Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin |
| 2023 | Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification. Mohammad Ghasemisharif, Jason Polakis |
| 2023 | Realistic Website Fingerprinting By Augmenting Network Traces. Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr |
| 2023 | Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. Rachit Garg, George Lu, Brent Waters, David J. Wu |
| 2023 | Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. Tao Ni, Xiaokuan Zhang, Qingchuan Zhao |
| 2023 | Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. Alexandre Belling, Azam Soleimanian, Olivier Bégassat |
| 2023 | RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao |
| 2023 | Riggs: Decentralized Sealed-Bid Auctions. Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad S. Wahby, Joseph Bonneau, David Mazières |
| 2023 | SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. Marcela S. Melara, Santiago Torres-Arias, Laurent Simon |
| 2023 | SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. Xi Tan, Ziming Zhao |
| 2023 | SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. Zhiqiang Lin, Xiaojing Liao |
| 2023 | SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter |
| 2023 | Scalable Multiparty Garbling. Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk |
| 2023 | Secure Statistical Analysis on Multiple Datasets: Join and Group-By. Gilad Asharov, Koki Hamada, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida |
| 2023 | Secure and Timely GPU Execution in Cyber-physical Systems. Jinwen Wang, Yujie Wang, Ning Zhang |
| 2023 | Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. Chengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, Tianhao Wang |
| 2023 | Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. Chuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer |
| 2023 | Security Verification of Low-Trust Architectures. Qinhan Tan, Yonathan Fisseha, Shibo Chen, Lauren Biernacki, Jean-Baptiste Jeannin, Sharad Malik, Todd M. Austin |
| 2023 | Sharing Communities: The Good, the Bad, and the Ugly. Thomas Geras, Thomas Schreck |
| 2023 | Short Privacy-Preserving Proofs of Liabilities. Francesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro |
| 2023 | Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux. Elia Anzuoni, Tommaso Gagliardoni |
| 2023 | Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang |
| 2023 | Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting. Jaehyung Lee, Woosuk Lee |
| 2023 | SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu |
| 2023 | SpecVerilog: Adapting Information Flow Control for Secure Speculation. Drew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh |
| 2023 | Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri |
| 2023 | Speranza: Usable, Privacy-friendly Software Signing. Kelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen R. Sollins |
| 2023 | Splice: Efficiently Removing a User's Data from In-memory Application State. Xueyuan Han, James Mickens, Siddhartha Sen |
| 2023 | Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash |
| 2023 | Stealing the Decoding Algorithms of Language Models. Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr |
| 2023 | Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. Marc Fischlin |
| 2023 | Stolen Risks of Models with Security Properties. Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan |
| 2023 | SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, Xiangqun Chen |
| 2023 | SysPart: Automated Temporal System Call Filtering for Binaries. Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis |
| 2023 | SysXCHG: Refining Privilege with Adaptive System Call Filters. Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis |
| 2023 | SyzDirect: Directed Greybox Fuzzing for Linux Kernel. Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang |
| 2023 | Tainted Secure Multi-Execution to Restrict Attacker Influence. McKenna McCall, Abhishek Bichhawat, Limin Jia |
| 2023 | Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma |
| 2023 | Targeted Attack Synthesis for Smart Grid Vulnerability Analysis. Suman Maiti, Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey |
| 2023 | The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. Zihao Wang, Jiale Guan, Xiaofeng Wang, Wenhao Wang, Luyi Xing, Fares Fahad S. Alharbi |
| 2023 | The Effectiveness of Security Interventions on GitHub. Felix Fischer, Jonas Höbenreich, Jens Grossklags |
| 2023 | The Locality of Memory Checking. Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang |
| 2023 | Themis: Fast, Strong Order-Fairness in Byzantine Consensus. Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan |
| 2023 | Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren |
| 2023 | TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving. Yi Zhu, Chenglin Miao, Hongfei Xue, Zhengxiong Li, Yunnan Yu, Wenyao Xu, Lu Su, Chunming Qiao |
| 2023 | Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs). Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov |
| 2023 | Towards Practical Sleepy BFT. Dahlia Malkhi, Atsuki Momose, Ling Ren |
| 2023 | Transformer-based Model for Multi-tab Website Fingerprinting Attack. Zhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang |
| 2023 | Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma |
| 2023 | TrustBoost: Boosting Trust among Interoperable Blockchains. Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath |
| 2023 | TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan |
| 2023 | TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. Zhenkai Zhang, Tyler N. Allen, Fan Yao, Xing Gao, Rong Ge |
| 2023 | Turning Privacy-preserving Mechanisms against Federated Learning. Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek |
| 2023 | Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML. Ehud Aharoni, Nir Drucker, Hayim Shaul |
| 2023 | TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou |
| 2023 | TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma |
| 2023 | Uncle Maker: (Time)Stamping Out The Competition in Ethereum. Aviv Yaish, Gilad Stern, Aviv Zohar |
| 2023 | Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate |
| 2023 | Uncovering and Exploiting Hidden APIs in Mobile Super Apps. Chao Wang, Yue Zhang, Zhiqiang Lin |
| 2023 | Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang |
| 2023 | Understanding and Detecting Abused Image Hosting Modules as Malicious Services. Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang |
| 2023 | Unforgeability in Stochastic Gradient Descent. Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena |
| 2023 | Unhelpful Assumptions in Software Security Research. Ita Ryan, Utz Roedig, Klaas-Jan Stol |
| 2023 | Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks. Chulin Xie, Yunhui Long, Pin-Yu Chen, Qinbin Li, Sanmi Koyejo, Bo Li |
| 2023 | Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang |
| 2023 | Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues |
| 2023 | Verifiable Learning for Robust Tree Ensembles. Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza |
| 2023 | Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde |
| 2023 | Verifiable Verification in Cryptographic Protocols. Marc Fischlin, Felix Günther |
| 2023 | Vulnerability Intelligence Alignment via Masked Graph Attention Networks. Yue Qin, Yue Xiao, Xiaojing Liao |
| 2023 | WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Michael Brenner, Anamaria Costache, Kurt Rohloff |
| 2023 | WPES '23: 22nd Workshop on Privacy in the Electronic Society. Bart P. Knijnenburg, Panagiotis Papadimitratos |
| 2023 | Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. Sajin Sasy, Aaron Johnson, Ian Goldberg |
| 2023 | Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic |
| 2023 | When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. Yan He, Qiuye He, Song Fang, Yao Liu |
| 2023 | Whole-Program Control-Flow Path Attestation. Nikita Yadav, Vinod Ganapathy |
| 2023 | You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements. Florian Hantke, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock |
| 2023 | Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. Francesco Marchiori, Mauro Conti |
| 2023 | iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices. Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom |
| 2023 | martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. Qi Li, Zhuotao Liu, Qi Li, Ke Xu |