CCS A*

293 papers

YearTitle / Authors
2023"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences.
Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor
2023"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers.
Collins W. Munyendo, Peter Mayer, Adam J. Aviv
2023"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.
Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl
2023"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments.
Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl
2023A Generic Methodology for the Modular Verification of Security Protocol Implementations.
Linard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller
2023A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang
2023A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow.
Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel Henrique Nunes
2023A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries.
Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice
2023A Thorough Evaluation of RAMBAM.
Daniel Lammers, Amir Moradi, Nicolai Müller, Aein Rezaei Shahmirzadi
2023ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra.
Antonio de la Piedra, Marloes Venema, Greg Alpár
2023ADEM: An Authentic Digital EMblem.
Felix Linker, David A. Basin
2023AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, HyoJin Yoon, Jooyoung Lee
2023AISec '23: 16th ACM Workshop on Artificial Intelligence and Security.
Maura Pintor, Florian Simon Tramèr, Xinyun Chen
2023ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Gregory Blanc, Takeshi Takahashi, Zonghua Zhang
2023ASHES '23: Workshop on Attacks and Solutions in Hardware Security.
Lejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair
2023ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet.
Alexander Bienstock, Paul Rösler, Yi Tang
2023Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus.
Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither
2023Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs.
Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu
2023AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking.
Changmin Lee, Sooel Son
2023Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons.
Renas Bacho, Julian Loss
2023Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig
2023Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Mathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin
2023Amplification by Shuffling without Shuffling.
Borja Balle, James Bell, Adrià Gascón
2023Analyzing the Real-World Security of the Algorand Blockchain.
Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin
2023AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis.
Zhiyuan Yu, Shixuan Zhai, Ning Zhang
2023Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen
2023Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications.
Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann
2023Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition.
Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song
2023Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham
2023BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses.
Daniele Antonioli
2023Batchman and Robin: Batched and Non-batched Branching for Interactive ZK.
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2023Black Ostrich: Web Application Scanning with String Solvers.
Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld
2023Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation.
Xiaochen Zhu, Vincent Y. F. Tan, Xiaokui Xiao
2023Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge.
Samuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu, Rafail Ostrovsky, Vitor Pereira
2023CCSW '23: Cloud Computing Security Workshop.
Francesco Regazzoni, Apostolos P. Fournaris
2023COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation.
Benjamin Levy, Muhammad Ishaq, Benjamin Sherman, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas
2023CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy.
Magnus Almgren, Earlence Fernandes
2023Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures.
Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee
2023Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence.
Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik
2023CheckMate: Automated Game-Theoretic Security Reasoning.
Lea Salome Brugger, Laura Kovács, Anja Petkovic Komel, Sophie Rain, Michael Rawson
2023Chipmunk: Better Synchronized Multi-Signatures from Lattices.
Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang
2023CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation.
Jianjia Yu, Song Li, Junmin Zhu, Yinzhi Cao
2023Combined Private Circuits - Combined Security Refurbished.
Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert
2023Compact Frequency Estimators in Adversarial Environments.
Sam A. Markelon, Mia Filic, Thomas Shrimpton
2023Comparse: Provably Secure Formats for Cryptographic Protocols.
Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2023Comprehension from Chaos: Towards Informed Consent for Private Computation.
Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum
2023Concentrated Geo-Privacy.
Yuting Liang, Ke Yi
2023Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters.
Samuel Haney, Michael Shoemate, Grace Tian, Salil P. Vadhan, Andrew Vyrros, Vicki Xu, Wanrong Zhang
2023Concurrent Security of Anonymous Credentials Light, Revisited.
Julia Kastner, Julian Loss, Omar Renawi
2023Control, Confidentiality, and the Right to be Forgotten.
Aloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan
2023CookieGraph: Understanding and Detecting First-Party Tracking Cookies.
Shaoor Munir, Sandra Deepthy Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso
2023CryptoBap: A Binary Analysis Platform for Cryptographic Protocols.
Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati
2023CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts.
Andrei Tonkikh, Pavel Ponomarev, Petr Kuznetsov, Yvonne-Anne Pignolet
2023Cryptographically Enforced Memory Safety.
Martin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, Stefan Mangard
2023Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage.
Gibran Gómez, Kevin van Liebergen, Juan Caballero
2023DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models.
Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang
2023DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun
2023DPMLBench: Holistic Evaluation of Differentially Private Machine Learning.
Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen
2023DSFuzz: Detecting Deep State Bugs with Dependent State Exploration.
Yinxi Liu, Wei Meng
2023DeFi '23: Workshop on Decentralized Finance and Security.
Kaihua Qin, Fan Zhang
2023Deciding Differential Privacy of Online Algorithms with Multiple Variables.
Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan, Bishnu Bhusal
2023Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures.
Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher
2023Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge
2023Demo: Certified Robustness on Toolformer.
Yue Xu, Wenjie Wang
2023Demo: Data Minimization and Informed Consent in Administrative Forms.
Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen
2023Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning.
Yuechun Gu, Sagar Sharma, Keke Chen
2023Demystifying DeFi MEV Activities in Flashbots Bundle.
Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen
2023Detecting Violations of Differential Privacy for Quantum Algorithms.
Ji Guan, Wang Fang, Mingyu Huang, Mingsheng Ying
2023Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng
2023Do Users Write More Insecure Code with AI Assistants?
Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh
2023Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs.
Yue Zhang, Yuqing Yang, Zhiqiang Lin
2023ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency.
Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone
2023Efficient Multiparty Probabilistic Threshold Private Set Intersection.
Feng-Hao Liu, En Zhang, Leiyong Qin
2023Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang
2023Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji
2023Efficient Registration-Based Encryption.
Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi
2023Efficient Set Membership Encryption and Applications.
Matthew Green, Abhishek Jain, Gijs Van Laer
2023Enhancing OSS Patch Backporting with Semantics.
Su Yang, Yang Xiao, Zhengzi Xu, Chengyi Sun, Chen Ji, Yuqing Zhang
2023Evading Watermark based Detection of AI-Generated Content.
Zhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong
2023Evaluating the Security Posture of Real-World FIDO2 Deployments.
Dhruv Kuchhal, Muhammad Saad, Adam Oest, Frank Li
2023Experimenting with Zero-Knowledge Proofs of Training.
Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang
2023Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers.
Chuanqi Xu, Ferhat Erata, Jakub Szefer
2023FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time.
Sisi Duan, Xin Wang, Haibin Zhang
2023FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Yiling He, Jian Lou, Zhan Qin, Kui Ren
2023FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Liu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren
2023FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption.
Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede
2023FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
2023Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
Peter Gazi, Aggelos Kiayias, Alexander Russell
2023Fast Unbalanced Private Set Union from Fully Homomorphic Encryption.
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
2023Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing.
Diego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi
2023FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer
2023Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers.
Dominik Trevor Noß, Lukas Knittel, Christian Mainka, Marcus Niemietz, Jörg Schwenk
2023Fine-Grained Data-Centric Content Protection Policy for Web Applications.
Zilun Wang, Wei Meng, Michael R. Lyu
2023FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains.
Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee
2023Formal Analysis of Access Control Mechanism of 5G Core Network.
Mujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain
2023Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts.
Sander Huyghebaert, Steven Keuchel, Coen De Roover, Dominique Devriese
2023FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM.
Gilad Asharov, Ilan Komargodski, Yehuda Michelson
2023Fuzz on the Beach: Fuzzing Solana Smart Contracts.
Sven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl
2023Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares.
Yi Zhou, Sydney Gibson, Sarah Cai, Menucha Winchell, Bryan Parno
2023General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications.
David Klein, Benny Rolle, Thomas Barber, Manuel Karl, Martin Johns
2023Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning.
Hanshen Xiao, Jun Wan, Srinivas Devadas
2023Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing.
Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li
2023Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links.
Chongzhou Fang, Ning Miao, Han Wang, Jiacheng Zhou, Tyler Sheaves, John Marty Emmert, Avesta Sasan, Houman Homayoun
2023Greybox Fuzzing of Distributed Systems.
Ruijie Meng, George Pîrlea, Abhik Roychoudhury, Ilya Sergey
2023Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFs.
Kyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry
2023Group and Attack: Auditing Differential Privacy.
Johan Lokna, Anouk Paradis, Dimitar I. Dimitrov, Martin T. Vechev
2023HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption.
Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan
2023HELiKs: HE Linear Algebra Kernels for Secure Inference.
Shashank Balla, Farinaz Koushanfar
2023HODOR: Shrinking Attack Surface on Node.js via System Call Limitation.
Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang
2023Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis.
Zhenghao Hu, Sangho Lee, Marcus Peinado
2023Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption.
Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé
2023Hopper: Interpretative Fuzzing for Libraries.
Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen
2023How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang
2023Improved Distributed RSA Key Generation Using the Miller-Rabin Test.
Jakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi
2023Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level.
Yufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose
2023In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems.
Roman Beltiukov, Wenbo Guo, Arpit Gupta, Walter Willinger
2023Interactive Proofs For Differentially Private Counting.
Ari Biswas, Graham Cormode
2023Interchain Timestamping for Mesh Security.
Ertem Nusret Tas, Runchao Han, David Tse, Mingchao Yu
2023IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis.
David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer
2023Is Modeling Access Control Worth It?
David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen Phuoc Bao, Martín Ochoa
2023Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications.
Jeremy Rack, Cristian-Alexandru Staicu
2023KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis.
Pansilu Pitigalaarachchi, Xuhua Ding, Haiqing Qiu, Haoxin Tu, Jiaqi Hong, Lingxiao Jiang
2023Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning.
Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels
2023Large Language Models for Code: Security Hardening and Adversarial Testing.
Jingxuan He, Martin T. Vechev
2023Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal.
Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler
2023Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, Cong Wang
2023LeakyOhm: Secret Bits Extraction using Impedance Analysis.
Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik
2023Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin
2023LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures.
Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind
2023Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.
Amit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva, Bart Preneel
2023Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption.
Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum
2023Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang
2023Linear Communication in Malicious Majority MPC.
S. Dov Gordon, Phi Hung Le, Daniel McVicker
2023Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
Zhi Li, Weijie Liu, Xiaofeng Wang, Bin Yuan, Hongliang Tian, Hai Jin, Shoumeng Yan
2023MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks.
Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran
2023MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
Torsten Krauß, Alexandra Dmitrienko
2023MTD '23: 10th ACM Workshop on Moving Target Defense.
Ning Zhang, Qi Li
2023Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects.
Tinhinane Medjkoune, Oana Goga, Juliette Senechal
2023Measuring Website Password Creation Policies At Scale.
Suood Alroomi, Frank Li
2023MicPro: Microphone-based Voice Privacy Protection.
Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu
2023Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing.
David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente
2023Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information.
Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia
2023NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang
2023On the Security of KZG Commitment for VSS.
Atsuki Momose, Sourav Das, Ling Ren
2023On the Security of Rate-limited Privacy Pass.
Hien Chu, Khue Do, Lucjan Hanzlik
2023Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici
2023Ou: Automating the Parallelization of Zero-Knowledge Protocols.
Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao
2023PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang
2023PELTA - Shielding Multiparty-FHE against Malicious Adversaries.
Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2023PLAS: The 18th Workshop on Programming Languages and Analysis for Security.
Fraser Brown, Klaus von Gleissenthall
2023PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
Shijia Li, Jiang Ming, Pengda Qiu, Qiyuan Chen, Lanqing Liu, Huaifeng Bao, Qiang Wang, Chunfu Jia
2023Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz
2023ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path.
Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren
2023Passive SSH Key Compromise via Lattices.
Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger
2023Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping.
Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, Jun Luo
2023Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos.
Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su, Yu Jiang, Jiaguang Sun, Huizhong Li
2023Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu
2023PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies.
Anhao Xiang, Weiping Pei, Chuan Yue
2023Post Quantum Fuzzy Stealth Signatures and Applications.
Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
2023Post-Quantum Multi-Recipient Public Key Encryption.
Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe
2023Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain.
Wensheng Tian, Lei Zhang, Shuangxi Chen, Hu Wang, Xiao Luo
2023Poster: Accountable Processing of Reported Street Problems.
Roman Matzutt, Jan Pennekamp, Klaus Wehrle
2023Poster: Attestor - Simple Proof-of-Storage-Time.
Arup Mondal
2023Poster: Backdoor Attack on Extreme Learning Machines.
Behrad Tajalli, Gorka Abad, Stjepan Picek
2023Poster: Boosting Adversarial Robustness by Adversarial Pre-training.
Xiaoyun Xu, Stjepan Picek
2023Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems.
Johannes Lohmöller, Eduard Vlad, Markus Dahlmanns, Klaus Wehrle
2023Poster: Circumventing the GFW with TLS Record Fragmentation.
Niklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget
2023Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing.
Jihyeon Yu, Juhwan Kim, Yeohoon Yun, Joobeom Yun
2023Poster: Computing the Persistent Homology of Encrypted Data.
Dominic Gold, Koray Karabina, Francis C. Motta
2023Poster: Control-Flow Integrity in Low-end Embedded Devices.
Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik
2023Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling.
Wyatt Sweat, Danfeng (Daphne) Yao
2023Poster: Data Minimization by Construction for Trigger-Action Applications.
Mohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld
2023Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang
2023Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption.
Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu
2023Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li
2023Poster: Fooling XAI with Explanation-Aware Backdoors.
Maximilian Noppel, Christian Wressnegger
2023Poster: From Hashes to Ashes - A Comparison of Transcription Services.
Rudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling
2023Poster: Generating Experiences for Autonomous Network Defense.
Andres Molina-Markham, Luis F. Robaina, Akash H. Trivedi, Derek G. Tsui, Ahmad Ridley
2023Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers.
Betül Askin Özdemir, Tim Beyne
2023Poster: Longitudinal Analysis of DoS Attacks.
Fabian Kaiser, Haya Schulmann, Michael Waidner
2023Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem.
David G. Balash, Mir Masood Ali, Monica Kodwani, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv
2023Poster: Membership Inference Attacks via Contrastive Learning.
Depeng Chen, Xiao Liu, Jie Cui, Hong Zhong
2023Poster: Metadata-private Messaging without Coordination.
Peipei Jiang, Qian Wang, Yihao Wu, Cong Wang
2023Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description.
Hattan Althebeiti, Brett Fazio, William Chen, David Mohaisen
2023Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks.
Jing Xu, Stjepan Picek
2023Poster: Panacea - Stateless and Non-Interactive Oblivious RAM.
Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park
2023Poster: Privacy Risks from Misconfigured Android Content Providers.
Christopher Lenk, Johannes Kinder
2023Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang
2023Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning.
Shae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi
2023Poster: Secure and Differentially Private kth Ranked Element.
Gowri R. Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider
2023Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures.
Mario Yaksetig, Alexander Havlin
2023Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications.
Simon Koch, Malte Wessels, David Klein, Martin Johns
2023Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education.
Jan-Philip van Acken, Joost F. Gadellaa, Slinger Jansen, Katsiaryna Labunets
2023Poster: Towards Lightweight TEE-Assisted MPC.
Wentao Dong, Cong Wang
2023Poster: Towards Practical Brainwave-based User Authentication.
Matin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe
2023Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails.
Eric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray
2023Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
Gyungeun Yun, Kyungho Joo, Wonsuk Choi, Dong Hoon Lee
2023Poster: Using CodeQL to Detect Malware in npm.
Matías F. Gobbi, Johannes Kinder
2023Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning.
Ruei-Hau Hsu, Hsuan-Cheng Su, Yi-An Yu
2023Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2023Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation.
Christian van Sloun, Klaus Wehrle
2023Poster: WIP: Account ZK-Rollups from Sumcheck Arguments.
Rex Fernando, Arnab Roy
2023Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions.
Tejas Kannan, Nick Feamster, Henry Hoffmann
2023Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO.
Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen
2023Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use.
Emiram Kablo, Patricia Arias Cabarcos
2023Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023
Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda
2023Profile-guided System Optimizations for Accelerated Greybox Fuzzing.
Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu
2023Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, Wonsuk Choi
2023Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks.
Zongjie Li, Chaozheng Wang, Shuai Wang, Cuiyun Gao
2023ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search.
Enes Altinisik, Fatih Deniz, Hüsrev Taha Sencar
2023Provably Unlinkable Smart Card-based Payments.
Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov
2023Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Hanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo, Xiangqun Chen
2023PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing.
Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai
2023Ramen: Souper Fast Three-Party Computation for RAM Programs.
Lennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin
2023Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification.
Mohammad Ghasemisharif, Jason Polakis
2023Realistic Website Fingerprinting By Augmenting Network Traces.
Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr
2023Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory.
Rachit Garg, George Lu, Brent Waters, David J. Wu
2023Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel.
Tao Ni, Xiaokuan Zhang, Qingchuan Zhao
2023Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification.
Alexandre Belling, Azam Soleimanian, Olivier Bégassat
2023RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
Kyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao
2023Riggs: Decentralized Sealed-Bid Auctions.
Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad S. Wahby, Joseph Bonneau, David Mazières
2023SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Marcela S. Melara, Santiago Torres-Arias, Laurent Simon
2023SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems.
Xi Tan, Ziming Zhao
2023SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps.
Zhiqiang Lin, Xiaojing Liao
2023SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets.
Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter
2023Scalable Multiparty Garbling.
Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk
2023Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Gilad Asharov, Koki Hamada, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida
2023Secure and Timely GPU Execution in Cyber-physical Systems.
Jinwen Wang, Yujie Wang, Ning Zhang
2023Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy.
Chengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, Tianhao Wang
2023Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks.
Chuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer
2023Security Verification of Low-Trust Architectures.
Qinhan Tan, Yonathan Fisseha, Shibo Chen, Lauren Biernacki, Jean-Baptiste Jeannin, Sharad Malik, Todd M. Austin
2023Sharing Communities: The Good, the Bad, and the Ugly.
Thomas Geras, Thomas Schreck
2023Short Privacy-Preserving Proofs of Liabilities.
Francesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro
2023Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux.
Elia Anzuoni, Tommaso Gagliardoni
2023Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang
2023Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting.
Jaehyung Lee, Woosuk Lee
2023SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu
2023SpecVerilog: Adapting Information Flow Control for Secure Speculation.
Drew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh
2023Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts.
Zilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke, Marco Guarnieri
2023Speranza: Usable, Privacy-friendly Software Signing.
Kelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen R. Sollins
2023Splice: Efficiently Removing a User's Data from In-memory Application State.
Xueyuan Han, James Mickens, Siddhartha Sen
2023Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash
2023Stealing the Decoding Algorithms of Language Models.
Ali Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr
2023Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3.
Marc Fischlin
2023Stolen Risks of Models with Security Properties.
Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan
2023SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, Xiangqun Chen
2023SysPart: Automated Temporal System Call Filtering for Binaries.
Vidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis
2023SysXCHG: Refining Privilege with Adaptive System Call Filters.
Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis
2023SyzDirect: Directed Greybox Fuzzing for Linux Kernel.
Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang
2023Tainted Secure Multi-Execution to Restrict Attacker Influence.
McKenna McCall, Abhishek Bichhawat, Limin Jia
2023Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma
2023Targeted Attack Synthesis for Smart Grid Vulnerability Analysis.
Suman Maiti, Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey
2023The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Zihao Wang, Jiale Guan, Xiaofeng Wang, Wenhao Wang, Luyi Xing, Fares Fahad S. Alharbi
2023The Effectiveness of Security Interventions on GitHub.
Felix Fischer, Jonas Höbenreich, Jens Grossklags
2023The Locality of Memory Checking.
Weijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang
2023Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan
2023Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold.
Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren
2023TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving.
Yi Zhu, Chenglin Miao, Hongfei Xue, Zhengxiong Li, Yunnan Yu, Wenyao Xu, Lu Su, Chunming Qiao
2023Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs).
Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov
2023Towards Practical Sleepy BFT.
Dahlia Malkhi, Atsuki Momose, Ling Ren
2023Transformer-based Model for Multi-tab Website Fingerprinting Attack.
Zhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang
2023Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma
2023TrustBoost: Boosting Trust among Interoperable Blockchains.
Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath
2023TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan
2023TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Zhenkai Zhang, Tyler N. Allen, Fan Yao, Xing Gao, Rong Ge
2023Turning Privacy-preserving Mechanisms against Federated Learning.
Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek
2023Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML.
Ehud Aharoni, Nir Drucker, Hayim Shaul
2023TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum.
Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou
2023TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Ziyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma
2023Uncle Maker: (Time)Stamping Out The Competition in Ethereum.
Aviv Yaish, Gilad Stern, Aviv Zohar
2023Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate
2023Uncovering and Exploiting Hidden APIs in Mobile Super Apps.
Chao Wang, Yue Zhang, Zhiqiang Lin
2023Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang
2023Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang
2023Unforgeability in Stochastic Gradient Descent.
Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena
2023Unhelpful Assumptions in Software Security Research.
Ita Ryan, Utz Roedig, Klaas-Jan Stol
2023Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks.
Chulin Xie, Yunhui Long, Pin-Yu Chen, Qinbin Li, Sanmi Koyejo, Bo Li
2023Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang
2023Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge.
Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues
2023Verifiable Learning for Robust Tree Ensembles.
Stefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza
2023Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde
2023Verifiable Verification in Cryptographic Protocols.
Marc Fischlin, Felix Günther
2023Vulnerability Intelligence Alignment via Masked Graph Attention Networks.
Yue Qin, Yue Xiao, Xiaojing Liao
2023WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.
Michael Brenner, Anamaria Costache, Kurt Rohloff
2023WPES '23: 22nd Workshop on Privacy in the Electronic Society.
Bart P. Knijnenburg, Panagiotis Papadimitratos
2023Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks.
Sajin Sasy, Aaron Johnson, Ian Goldberg
2023Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting.
Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic
2023When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription.
Yan He, Qiuye He, Song Fang, Yao Liu
2023Whole-Program Control-Flow Path Attestation.
Nikita Yadav, Vinod Ganapathy
2023You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements.
Florian Hantke, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock
2023Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication.
Francesco Marchiori, Mauro Conti
2023iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices.
Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom
2023martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Qi Li, Zhuotao Liu, Qi Li, Ke Xu