| 2024 | "Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors. Kevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin R. B. Butler, Carrie Gates, Patrick Traynor |
| 2024 | "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang |
| 2024 | "I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications. Kevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, Kevin R. B. Butler |
| 2024 | "Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion. Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv |
| 2024 | $DPM: $ Clustering Sensitive Data through Separation. Johannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi |
| 2024 | A Causal Explainable Guardrails for Large Language Models. Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren |
| 2024 | A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, Bo Luo |
| 2024 | A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu |
| 2024 | A Framework for Differential Privacy Against Timing Attacks. Zachary Ratliff, Salil P. Vadhan |
| 2024 | A General Framework for Data-Use Auditing of ML Models. Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter |
| 2024 | A Qualitative Analysis of Practical De-Identification Guides. Wentao Guo, Aditya Kishore, Adam J. Aviv, Michelle L. Mazurek |
| 2024 | A Succinct Range Proof for Polynomial-based Vector Commitment. Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang |
| 2024 | A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability. Jie Zhu, Jirong Zha, Ding Li, Leye Wang |
| 2024 | AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. Neil Gong, Qi Li, Xiaoli Zhang |
| 2024 | ACM CCS 2024 Doctoral Symposium. Gabriela F. Ciocarlie, Xinming Ou |
| 2024 | AISec '24: 17th ACM Workshop on Artificial Intelligence and Security. Maura Pintor, Matthew Jagielski, Xinyun Chen |
| 2024 | AITIA: Efficient Secure Computation of Bivariate Causal Discovery. Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu |
| 2024 | ASHES '24: Workshop on Attacks and Solutions in Hardware Security. Lejla Batina, Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer |
| 2024 | Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware. Haoyu Xiao, Yuan Zhang, Minghang Shen, Chaoyang Lin, Can Zhang, Shengli Liu, Min Yang |
| 2024 | Actively Secure Private Set Intersection in the Client-Server Setting. Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang |
| 2024 | AirGapAgent: Protecting Privacy-Conscious Conversational Agents. Eugene Bagdasarian, Ren Yi, Sahra Ghalebikesabi, Peter Kairouz, Marco Gruteser, Sewoong Oh, Borja Balle, Daniel Ramage |
| 2024 | Alchemy: Data-Free Adversarial Training. Yijie Bai, Zhongming Ma, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu |
| 2024 | Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi |
| 2024 | Analyzing Inference Privacy Risks Through Gradients In Machine Learning. Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley A. Malin, Ye Wang |
| 2024 | ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan |
| 2024 | Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps. Shuai Li, Zhemin Yang, Yuhong Nan, Shutian Yu, Qirui Zhu, Min Yang |
| 2024 | Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic |
| 2024 | Asynchronous Authentication. Marwa Mouallem, Ittay Eyal |
| 2024 | Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup |
| 2024 | Atomic and Fair Data Exchange via Blockchain. Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko |
| 2024 | Attacks Against the IND-CPA Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto |
| 2024 | AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices. Mohsen Salehi, Karthik Pattabiraman |
| 2024 | AutonomousCyber '24 - Workshop on Autonomous Cybersecurity. Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou |
| 2024 | BadMerging: Backdoor Attacks Against Model Merging. Jinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian |
| 2024 | BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer. Wenqiang Li, Haohuang Wen, Zhiqiang Lin |
| 2024 | Batch Range Proof: How to Make Threshold ECDSA More Efficient. Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan |
| 2024 | Batching-Efficient RAM using Updatable Lookup Arguments. Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh |
| 2024 | Benchmarking Secure Sampling Protocols for Differential Privacy. Yucheng Fu, Tianhao Wang |
| 2024 | Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions. Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang |
| 2024 | BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering. Jiayi Jiang, Xiyuan Zhang, Chengcheng Wan, Haoyi Chen, Haiying Sun, Ting Su |
| 2024 | Blind Multisignatures for Anonymous Tokens with Decentralized Issuance. Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss |
| 2024 | Blind and Low-Vision Individuals' Detection of Audio Deepfakes. Filipo Sharevski, Aziz Zeidieh, Jennifer Vander Loop, Peter Jachim |
| 2024 | Block Ciphers in Idealized Models: Automated Proofs and New Security Results. Miguel Ambrona, Pooya Farshim, Patrick Harasser |
| 2024 | Blockchain Bribing Attacks and the Efficacy of Counterincentives. Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias |
| 2024 | Blocking Tracking JavaScript at the Function Granularity. Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar |
| 2024 | BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li |
| 2024 | Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness. Hao Xiang, Zehui Cheng, Jinku Li, Jianfeng Ma, Kangjie Lu |
| 2024 | Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators. Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena |
| 2024 | Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols. Ellis Fenske, Aaron Johnson |
| 2024 | Byzantine-Robust Decentralized Federated Learning. Minghong Fang, Zifan Zhang, Hairi, Prashant Khanduri, Jia Liu, Songtao Lu, Yuchen Liu, Neil Gong |
| 2024 | Byzantine-Secure Relying Party for Resilient RPKI. Jens Frieß, Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2024 | CAPSID: A Private Session ID System for Small UAVs. Yueshen Li, Jianli Jin, Kirill Levchenko |
| 2024 | CCSW 2024 - Cloud Computing Security Workshop. Apostolos P. Fournaris, Paolo Palmieri |
| 2024 | CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy. Kassem Fawaz, Magnus Almgren |
| 2024 | CSCS '24 - Cyber Security in CarS Workshop. Mario Fritz, Christoph Krauß, Hans-Joachim Hof |
| 2024 | Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. Sofía Celi, Alex Davidson |
| 2024 | Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. Shuangqing Xu, Yifeng Zheng, Zhongyun Hua |
| 2024 | CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments. Shenao Wang, Feng Dong, Hangfeng Yang, Jingheng Xu, Haoyu Wang |
| 2024 | Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning Models. Zitao Chen |
| 2024 | Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence. Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong |
| 2024 | Characterizing Ethereum Address Poisoning Attack. Shixuan Guan, Kai Li |
| 2024 | Characterizing and Mitigating Phishing Attacks at ccTLD Scale. Giovane C. M. Moura, Thomas Daniels, Maarten Bosteels, Sebastian Castro, Moritz Müller, Thymen Wabeke, Thijs van Den Hout, Maciej Korczynski, Georgios Smaragdakis |
| 2024 | CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. Sebastian Schrittwieser, Michele Ianni |
| 2024 | CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses. Jianfeng Wang, Huazhong Yang, Shuwen Deng, Xueqing Li |
| 2024 | CoGNN: Towards Secure and Efficient Collaborative Graph Learning. Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu |
| 2024 | Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing. Yue Zhang, Zhen Ling, Michael Cash, Qiguang Zhang, Christopher Morales-Gonzalez, Qun Zhou Sun, Xinwen Fu |
| 2024 | Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels |
| 2024 | Compositional Verification of Composite Byzantine Protocols. Qiyuan Zhao, George Pîrlea, Karolina Grzeszkiewicz, Seth Gilbert, Ilya Sergey |
| 2024 | Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model. Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova |
| 2024 | Conan: Distributed Proofs of Compliance for Anonymous Data Collection. Mingxun Zhou, Giulia Fanti, Elaine Shi |
| 2024 | Conditional Encryption with Applications to Secure Personalized Password Typo Correction. Mohammad Hassan Ameri, Jeremiah Blocki |
| 2024 | Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun |
| 2024 | CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel. Shuangpeng Bai, Zhechang Zhang, Hong Hu |
| 2024 | Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs. Fabian Rauscher, Daniel Gruss |
| 2024 | Cross-silo Federated Learning with Record-level Personalized Differential Privacy. Junxu Liu, Jian Lou, Li Xiong, Jinfei Liu, Xiaofeng Meng |
| 2024 | CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon. Jiaxun Zhu, Minghao Lin, Tingting Yin, Zechao Cai, Yu Wang, Rui Chang, Wenbo Shen |
| 2024 | Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers. Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Christophe de Dinechin, Pau-Chen Cheng, Hani Jamjoom |
| 2024 | Cryptography and Computer Security: A View From the Year 2100. Dan Boneh |
| 2024 | Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu |
| 2024 | Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power. Shiming Wang, Liyao Xiang, Bowei Cheng, Zhe Ji, Tianran Sun, Xinbing Wang |
| 2024 | DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation. Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing |
| 2024 | DarthShader: Fuzzing WebGPU Shader Translators & Compilers. Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz |
| 2024 | Data Independent Order Policy Enforcement: Limitations and Solutions. Sarisht Wadhwa, Luca Zanolini, Aditya Asgaonkar, Francesco D'Amato, Chengrui Fang, Fan Zhang, Kartik Nayak |
| 2024 | Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong |
| 2024 | DeFi '24: Workshop on Decentralized Finance and Security. Liyi Zhou, Kaihua Qin |
| 2024 | DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables. Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, Shuai Wang |
| 2024 | Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers. Sébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji |
| 2024 | Demo: An End-to-End Anonymous Traffic Analysis System. Xianglan Huang, Qiang Zhou, Liangmin Wang, Weiqi Yu, Wenjin Wang, Shi Shen |
| 2024 | Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution. Zhaoxuan Li, Ziming Zhao, Wenhao Li, Rui Zhang, Rui Xue, Siqi Lu, Fan Zhang |
| 2024 | Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation. Yuechun Gu, Jiajie He, Keke Chen |
| 2024 | Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen |
| 2024 | Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches. Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila |
| 2024 | Demystifying RCE Vulnerabilities in LLM-Integrated Apps. Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen |
| 2024 | Derecho: Privacy Pools with Proof-Carrying Disclosures. Josh Beal, Ben Fisch |
| 2024 | Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications. Yongheng Huang, Chenghang Shi, Jie Lu, Haofeng Li, Haining Meng, Lian Li |
| 2024 | Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. Chuanpu Fu, Qi Li, Meng Shen, Ke Xu |
| 2024 | Direct Range Proofs for Paillier Cryptosystem and Their Applications. Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu |
| 2024 | Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang |
| 2024 | Distributed PIR: Scaling Private Messaging via the Users' Machines. Elkana Tovey, Jonathan Weiss, Yossi Gilad |
| 2024 | Dora: A Simple Approach to Zero-Knowledge for RAM Programs. Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk |
| 2024 | DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back. Zhiyuan Sun, Zihao Li, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou, Yinqian Zhang |
| 2024 | Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs. Chaya Ganesh, Vineet Nair, Ashish Sharma |
| 2024 | Dye4AI: Assuring Data Boundary on Generative AI Services. Shu Wang, Kun Sun, Yan Zhai |
| 2024 | ERACAN: Defending Against an Emerging CAN Threat Model. Zhaozhou Tang, Khaled Serag, Saman A. Zonouz, Z. Berkay Celik, Dongyan Xu, Raheem Beyah |
| 2024 | ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren |
| 2024 | Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies. Neophytos Christou, Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis |
| 2024 | Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing. Ying Gao, Yuanchao Luo, Longxin Wang, Xiang Liu, Lin Qi, Wei Wang, Mengmeng Zhou |
| 2024 | Efficient Secret Sharing for Large-Scale Applications. Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo |
| 2024 | Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget. Jiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko |
| 2024 | Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob". Katharina Schiller, Florian Adamsky, Christian Eichenmüller, Matthias Reimert, Zinaida Benenson |
| 2024 | End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem. Jonas Hofmann, Kien Tuong Truong |
| 2024 | Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization. Guopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao |
| 2024 | Evaluations of Machine Learning Privacy Defenses are Misleading. Michael Aerni, Jie Zhang, Florian Tramèr |
| 2024 | Evolving Network Security in the Era of Network Programmability. Mingming Chen |
| 2024 | Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking. Ben Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich |
| 2024 | FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis |
| 2024 | FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software Transformation. Ryan Craven, Matthew S. Mickelson |
| 2024 | FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols. Hongbo Wen, Hanzhi Liu, Jiaxin Song, Yanju Chen, Wenbo Guo, Yu Feng |
| 2024 | FOX: Coverage-guided Fuzzing as Online Stochastic Control. Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana |
| 2024 | Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. Marc Fischlin, Olga Sanina |
| 2024 | Fast Two-party Threshold ECDSA with Proactive Security. Brian Koziel, S. Dov Gordon, Craig Gentry |
| 2024 | Fast and Accurate Homomorphic Softmax Evaluation. Wonhee Cho, Guillaume Hanrot, Taeseong Kim, Minje Park, Damien Stehlé |
| 2024 | Faster FHE-Based Single-Server Private Information Retrieval. Ming Luo, Feng-Hao Liu, Han Wang |
| 2024 | Fisher Information guided Purification against Backdoor Attacks. Nazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin, Zhishan Guo, Nazanin Rahnavard |
| 2024 | Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption. Hanshen Xiao, G. Edward Suh, Srinivas Devadas |
| 2024 | Foundations for Cryptographic Reductions in CCSA Logics. David Baelde, Adrien Koutsos, Justine Sauvage |
| 2024 | Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments. Nikhil Vanjani, Pratik Soni, Sri Aravinda Krishnan Thyagarajan |
| 2024 | Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao |
| 2024 | FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache. Penghui Li, Mingxue Zhang |
| 2024 | Fuzzing JavaScript Engines with a Graph-based IR. Haoran Xu, Zhiyuan Jiang, Yongjun Wang, Shuhui Fan, Shenglin Xu, Peidai Xie, Shaojing Fu, Mathias Payer |
| 2024 | GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices. Hanqiu Wang, Zihao Zhan, Haoqi Shan, Siqi Dai, Maximillian Panoff, Shuo Wang |
| 2024 | GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations. Yue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin, Yu Liu, Huadi Zhu, Ming Li |
| 2024 | GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity. Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis |
| 2024 | Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring. Jana Hofmann, Cédric Fournet, Boris Köpf, Stavros Volos |
| 2024 | GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu |
| 2024 | Glitch-Stopping Circuits: Hardware Secure Masking without Registers. Zhenda Zhang, Svetla Petkova-Nikova, Ventzislav Nikov |
| 2024 | Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jia-Ju Bai, Shijie Jia, Qianhong Wu |
| 2024 | Gramine-TDX: A Lightweight OS Kernel for Confidential VMs. Dmitrii Kuvaiskii, Dimitrios Stavrakakis, Kailun Qin, Cedric Xing, Pramod Bhatotia, Mona Vij |
| 2024 | Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility. Georgi Ganev, Kai Xu, Emiliano De Cristofaro |
| 2024 | Graphiti: Secure Graph Computation Made More Scalable. Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
| 2024 | HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare. William Yurcik, Gregory Pluta, Toan Luong, Luis Garcia |
| 2024 | Hekaton: Horizontally-Scalable zkSNARKs Via Proof Aggregation. Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra |
| 2024 | Helium: Scalable MPC among Lightweight Participants and under Churn. Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso |
| 2024 | High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies. Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland |
| 2024 | HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. Yanxue Jia, Varun Madathil, Aniket Kate |
| 2024 | HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels. Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su |
| 2024 | I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. Zijin Lin, Yue Zhao, Kai Chen, Jinwen He |
| 2024 | ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. Doreen Riepel, Marloes Venema, Tanya Verma |
| 2024 | Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. Yixin Wu, Yun Shen, Michael Backes, Yang Zhang |
| 2024 | Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors. Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Chuhan Wang, Jianwei Zhuge, Haixin Duan |
| 2024 | Interactive Multi-Credential Authentication. Deepak Maram, Mahimna Kelkar, Ittay Eyal |
| 2024 | Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild. Yuejia Liang, Jianjun Chen, Run Guo, Kaiwen Shen, Hui Jiang, Man Hou, Yue Yu, Haixin Duan |
| 2024 | Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software. Yongho Song, Byeongsu Woo, Youngkwang Han, Brent ByungHoon Kang |
| 2024 | Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao |
| 2024 | Isolate and Detect the Untrusted Driver with a Virtual Box. Yonggang Li, Shunrong Jiang, Yu Bao, Pengpeng Chen, Yong Zhou, Yeh-Ching Chung |
| 2024 | Jäger: Automated Telephone Call Traceback. David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro |
| 2024 | Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols. Cas Cremers, Alexander Dax, Niklas Medinger |
| 2024 | KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data. Andy Zhou, Xiaojun Xu, Ramesh Raghunathan, Alok Lal, Xinze Guan, Bin Yu, Bo Li |
| 2024 | LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis. Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Minhui Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan |
| 2024 | LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices. Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao |
| 2024 | Language-based Sandboxing. Jialun Zhang |
| 2024 | Leakage-Resilient Circuit Garbling. Ruiyang Li, Yiteng Sun, Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang |
| 2024 | Legilimens: Practical and Unified Content Moderation for Large Language Model Services. Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu |
| 2024 | Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing. Jianzhong Liu, Yuheng Shen, Yiru Xu, Yu Jiang |
| 2024 | Leveraging Storage Semantics to Enhance Data Security and Privacy. Weidong Zhu |
| 2024 | Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors. Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens |
| 2024 | LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPT. Yutong Zhou, Fan Yang, Zirui Song, Ke Zhang, Jiongyi Chen, Kehuan Zhang |
| 2024 | MGTBench: Benchmarking Machine-Generated Text Detection. Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang |
| 2024 | Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. Mingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger |
| 2024 | Manipulative Interference Attacks. Samuel Mergendahl, Stephen Fickas, Boyana Norris, Richard Skowyra |
| 2024 | MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data Breach. Yihui Yan, Zhice Yang |
| 2024 | Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines. Yue Xiao, Chaoqi Zhang, Yue Qin, Fares Fahad S. Alharbi, Luyi Xing, Xiaojing Liao |
| 2024 | Membership Inference Attacks Against In-Context Learning. Rui Wen, Zheng Li, Michael Backes, Yang Zhang |
| 2024 | Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense. Qiankun Zhang, Di Yuan, Boyu Zhang, Bin Yuan, Bingqian Du |
| 2024 | Metric Differential Privacy at the User-Level via the Earth-Mover's Distance. Jacob Imola, Amrita Roy Chowdhury, Kamalika Chaudhuri |
| 2024 | MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs. Zidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan |
| 2024 | Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines. Eugene Bagdasarian, Vitaly Shmatikov |
| 2024 | Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based Policies. Peiran Wang, Qiyu Li, Longxuan Yu, Ziyao Wang, Ang Li, Haojian Jin |
| 2024 | Multi-User Security of CCM Authenticated Encryption Mode. Xiangyang Zhang, Yaobin Shen, Lei Wang |
| 2024 | Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers. Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng |
| 2024 | Nakamoto Consensus under Bounded Processing Capacity. Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse |
| 2024 | NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE Bootstrapping. Jae Hyung Ju, Jaiyoung Park, Jongmin Kim, Minsik Kang, Donghwan Kim, Jung Hee Cheon, Jung Ho Ahn |
| 2024 | Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data. Yifan Lu, Wenxuan Li, Mi Zhang, Xudong Pan, Min Yang |
| 2024 | New Secret Keys for Enhanced Performance in (T)FHE. Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap |
| 2024 | No Peer, no Cry: Network Application Fuzzing via Fault Injection. Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz |
| 2024 | Non-Transferable Anonymous Tokens by Secret Binding. F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay |
| 2024 | Non-interactive VSS using Class Groups and Application to DKG. Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan |
| 2024 | Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation. Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang |
| 2024 | Novel Privacy Attacks and Defenses Against Neural Networks. Sayanton V. Dibbo |
| 2024 | OSmart: Whitebox Program Option Fuzzing. Kelin Wang, Mengda Chen, Liang He, Purui Su, Yan Cai, Jiongyi Chen, Bin Zhang, Chao Feng, Chaojing Tang |
| 2024 | Obfuscated Key Exchange. Felix Günther, Douglas Stebila, Shannon Veitch |
| 2024 | Oblivious Single Access Machines - A New Model for Oblivious Computation. Ananya Appan, David Heath, Ling Ren |
| 2024 | OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware. Abdullah Qasem, Mourad Debbabi, Andrei Soeanu |
| 2024 | On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead). Davide Davoli, Martin Avanzini, Tamara Rezk |
| 2024 | On Understanding and Forecasting Fuzzers Performance with Static Analysis. Dongjia Zhang, Andrea Fioraldi, Davide Balzarotti |
| 2024 | On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo |
| 2024 | On the Tight Security of the Double Ratchet. Daniel Collins, Doreen Riepel, Si An Oliver Tran |
| 2024 | Optimization-based Prompt Injection Attack to LLM-as-a-Judge. Jiawen Shi, Zenghui Yuan, Yinuo Liu, Yue Huang, Pan Zhou, Lichao Sun, Neil Zhenqiang Gong |
| 2024 | Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao |
| 2024 | PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang |
| 2024 | PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks. Zhe Ren, Xinghua Li, Yinbin Miao, Mengyao Zhu, Shunjie Yuan, Robert H. Deng |
| 2024 | PLeak: Prompt Leaking Attacks against Large Language Model Applications. Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao |
| 2024 | Password-Protected Key Retrieval with(out) HSM Protection. Sebastian H. Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann |
| 2024 | PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia |
| 2024 | Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos |
| 2024 | PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, Byoungyoung Lee |
| 2024 | Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions. Shubham Agarwal, Aurore Fass, Ben Stock |
| 2024 | Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning. Jonathan Knauer, Phillip Rieger, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| 2024 | PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency. Yuan Xu, Gelei Deng, Xingshuo Han, Guanlin Li, Han Qiu, Tianwei Zhang |
| 2024 | PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning. Zhiyuan Yu, Ao Li, Ruoyao Wen, Yijia Chen, Ning Zhang |
| 2024 | Poster: Qiaoran Meng, Nay Oo, Yuning Jiang, Hoon Wei Lim, Biplab Sikdar |
| 2024 | Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices. Bo Chen, Caleb Rother, Josh Dafoe |
| 2024 | Poster: A Multi-step Approach for Classification of Malware Samples. Arnaldo Sgueglia, Rocco Addabbo, Andrea Di Sorbo, Stanislav Dashevskyi, Daniel Ricardo dos Santos, Corrado Aaron Visaggio |
| 2024 | Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms. Pankaj Dayama, Vinayaka Pandit, Sikhar Patranabis, Abhishek Singh, Nitin Singh |
| 2024 | Poster: Acoustic Side-Channel Attack on Robot Vacuums. Peter Chen, Guannan Liu, Haining Wang |
| 2024 | Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor. Donghoon Kim, Andrew Booth, Euijin Choo, Doosung Hwang |
| 2024 | Poster: An Exploration of Large Language Models in Malicious Source Code Detection. Di Xue, Gang Zhao, Zhongqi Fan, Wei Li, Yahong Xu, Zhen Liu, Yin Liu, Zhongliang Yuan |
| 2024 | Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database. Sevval Simsek, Zhenpeng Shi, Howell Xia, David Sastre Medina, David Starobinski |
| 2024 | Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNs. Yuni Lai, Kai Zhou |
| 2024 | Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models. Wanpeng Li, Yuejun Guo |
| 2024 | Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users. Zhaoxiang Liu, Ning Luo, Samuel Judson, Raj Gautam Dutta, Xiaolong Guo, Mark Santolucito |
| 2024 | Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations. Yvo Desmedt, Alireza Kavousi, Aydin Abadi |
| 2024 | Poster: Context-Based Effective Password Detection in Plaintext. Manish Shukla, Shubham Malaviya, Sachin Lodha |
| 2024 | Poster: Cyber Security Economics Model (CYSEM). Tong Xin, Ying He, Efpraxia D. Zamani, Cunjin Luo |
| 2024 | Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks. Seok Min Hong, Beom Heyn Kim, Mohammad Mannan |
| 2024 | Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection. Sachin Shukla, Omid Mirzaei |
| 2024 | Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection. Jiawen Diao, Shengmin Zhao, Jianguo Xie, Rongna Xie, Guozhen Shi |
| 2024 | Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical Study. Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho |
| 2024 | Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration. Keiichi Ochiai, Masayuki Terada |
| 2024 | Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience. Weimin Fu, Yifang Zhao, Yier Jin, Xiaolong Guo |
| 2024 | Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation. Faqi Zhao, Duohe Ma, Wenhao Li, Feng Liu, Wen Wang |
| 2024 | Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training. Yizhi Li, Jiang Li, Jiahao Cao, Renjie Xie, Yangyang Wang, Mingwei Xu |
| 2024 | Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi. Abdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy |
| 2024 | Poster: Formalizing Cognitive Biases for Cybersecurity Defenses. Jasmine Vang, Matthew Revelle |
| 2024 | Poster: Formally Verified Binary Lifting to P-Code. Nico Naus, Freek Verbeek, Sagar Atla, Binoy Ravindran |
| 2024 | Poster: From Fort to Foe: The Threat of RCE in RPKI. Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner |
| 2024 | Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting. Joel Osher, James K. Holland, Nicholas Hopper |
| 2024 | Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web? Abdul Haddi Amjad, Muhammad Ali Gulzar |
| 2024 | Poster: In-switch Defense against DNS Amplification DDoS Attacks. Seyed Mohammad Hadi Mirsadeghi |
| 2024 | Poster: Kill Krill or Proxy RPKI. Louis Cattepoel, Donika Mirdita, Haya Schulmann, Michael Waidner |
| 2024 | Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions. Thomas Szymkowiak, Endrit Isufi, Markku-Juhani O. Saarinen |
| 2024 | Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption. Christian Mouchet, Sylvain Chatel, Lea Nürnberger, Wouter Lueks |
| 2024 | Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang, Feng Liu |
| 2024 | Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly. Oliver Jacobsen, Haya Schulmann |
| 2024 | Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key. Jheng-Jia Huang, Guan-Yu Chen, Nai-Wei Lo |
| 2024 | Poster: Privacy Norms for Fertility Data in the Roe v. Wade era. Zander Chown, Aarathi Prasad |
| 2024 | Poster: Protecting Source Code Privacy When Hunting Bugs. Jielun Wu, Qingkai Shi |
| 2024 | Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling. Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi |
| 2024 | Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model. Elisa Zhang, Shiyu Sun, Yunlong Xing, Kun Sun |
| 2024 | Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE). Jelena Mirkovic, David M. Balenson, Brian Kocoloski, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Alba Regalado, David R. Choffnes, Daniel J. Dubois, Luis Garcia |
| 2024 | Poster: Security of Login Interfaces in Modern Organizations. Kevin Nsieyanji Tchokodeu, Haya Schulmann, Gil Sobol, Michael Waidner |
| 2024 | Poster: Solving the Free-rider Problem in Bittensor. Sin Tai Liu, Jiayuan Yu, Jacob Steeves |
| 2024 | Poster: Synchronization Concerns of DNS Integrations. Andrew J. Kaizer, Will Naciri, Swapneel Sheth |
| 2024 | Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models. Huan Bui, Harper Lienerth, Chenglong Fu, Meera Sridhar |
| 2024 | Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code. Tomasz Hyla, Natalia Wawrzyniak |
| 2024 | Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector. Wenhao Li, Duohe Ma, Zhaoxuan Li, Huaifeng Bao, Shuai Wang, Huamin Jin, Xiaoyu Zhang |
| 2024 | Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks. Shubham Malaviya, Manish Shukla, Saurabh Anand, Sachin Lodha |
| 2024 | Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications? Yuchen Ji, Ting Dai, Yutian Tang, Jingzhu He |
| 2024 | Poster: YFuzz: Data-Driven Fuzzing. Yuan Chang, Chun-Chia Huang, Tatsuya Mori, Hsu-Chun Hsiao |
| 2024 | Poster: libdebug, Build Your Own Debugger for a Better (Hello) World. Gabriele Digregorio, Roberto Alessandro Bertolini, Francesco Panebianco, Mario Polino |
| 2024 | Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax Disclosures. Alex Berke, Tobin South, Robert Mahari, Kent Larson, Alex Pentland |
| 2024 | PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao |
| 2024 | Practical Key-Extraction Attacks in Leading MPC Wallets. Nikolaos Makriyannis, Oren Yomtov, Arik Galansky |
| 2024 | Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu |
| 2024 | Practical Post-Quantum Signatures for Privacy. Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders |
| 2024 | PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps. Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong |
| 2024 | Precio: Private Aggregate Measurement via Oblivious Shuffling. Erik Anderson, Melissa Chase, F. Betül Durak, Kim Laine, Chenkai Weng |
| 2024 | Principled Microarchitectural Isolation on Cloud CPUs. Stavros Volos, Cédric Fournet, Jana Hofmann, Boris Köpf, Oleksii Oleksenko |
| 2024 | Privacy Analyses in Machine Learning. Jiayuan Ye |
| 2024 | Privacy-Preserving Graph Analysis. Bhavish Raj Gopal |
| 2024 | ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support. Nada Lahjouji, Sameera Ghayyur, Xi He, Sharad Mehrotra |
| 2024 | ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren |
| 2024 | Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024 Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie |
| 2024 | Program Environment Fuzzing. Ruijie Meng, Gregory J. Duck, Abhik Roychoudhury |
| 2024 | Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing. Yingquan Zhao, Zan Wang, Junjie Chen, Ruifeng Fu, Yanzhou Lu, Tianchang Gao, Haojie Ye |
| 2024 | PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan |
| 2024 | Prompt Fuzzing for Fuzz Driver Generation. Yunlong Lyu, Yuxuan Xie, Peng Chen, Hao Chen |
| 2024 | ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model. Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao |
| 2024 | Protoss: Protocol for Tight Optimal Symmetric Security. Emanuele Di Giandomenico, Yong Li, Sven Schäge |
| 2024 | Provable Security for PKI Schemes. Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg |
| 2024 | Pulsar: Secure Steganography for Diffusion Models. Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk |
| 2024 | Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users. Céline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb |
| 2024 | QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems. Bozhidar Stevanoski, Ana-Maria Cretu, Yves-Alexandre de Montjoye |
| 2024 | RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, Kevin R. B. Butler |
| 2024 | RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security. Ruimin Sun, Mu Zhang |
| 2024 | RISiren: Wireless Sensing System Attacks via Metasurface. Chenghan Jiang, Jinjiang Yang, Xinyi Li, Qi Li, Xinyu Zhang, Ju Ren |
| 2024 | RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices. Kaizheng Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo, Xinwen Fu |
| 2024 | RSA-Based Dynamic Accumulator without Hashing into Primes. Victor Youdom Kemmoe, Anna Lysyanskaya |
| 2024 | Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter |
| 2024 | ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries. Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, Xiangyu Zhang |
| 2024 | ReactAppScan: Mining React Application Vulnerabilities via Component Graph. Zhiyong Guo, Mingqing Kang, V. N. Venkatakrishnan, Rigel Gjomemo, Yinzhi Cao |
| 2024 | Real-World Universal zkSNARKs are Non-Malleable. Antonio Faonio, Dario Fiore, Luigi Russo |
| 2024 | Reckle Trees: Updatable Merkle Batch Proofs with Applications. Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac |
| 2024 | Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs. Evangelia Anna Markatou, Roberto Tamassia |
| 2024 | RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection. Penghao Wang, Jingzhi Hu, Chao Liu, Jun Luo |
| 2024 | Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network Data. Ryan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah |
| 2024 | Respire: High-Rate PIR for Databases with Small Records. Alexander Burton, Samir Jordan Menon, David J. Wu |
| 2024 | Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference. Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang |
| 2024 | Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. Xinhao Deng, Qi Li, Ke Xu |
| 2024 | Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde |
| 2024 | Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu |
| 2024 | Rust for Embedded Systems: Current State and Open Problems. Ayushi Sharma, Shashank Sharma, Sai Ritvik Tanksalkar, Santiago Torres-Arias, Aravind Machiry |
| 2024 | S Bokang Zhang, Yanglin Zhang, Zhikun Zhang, Jinglan Yang, Lingying Huang, Junfeng Wu |
| 2024 | S-BDT: Distributed Differentially Private Boosted Decision Trees. Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi |
| 2024 | SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures. Tianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen |
| 2024 | SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. Santiago Torres-Arias, Marcela S. Melara |
| 2024 | SECOMP: Formally Secure Compilation of Compartmentalized C Programs. Jérémy Thibault, Roberto Blanco, Dongjae Lee, Sven Argo, Arthur Azevedo de Amorim, Aïna Linn Georges, Catalin Hritcu, Andrew Tolmach |
| 2024 | SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks. Ronghai Yang, Xianbo Wang, Kaixuan Luo, Xin Lei, Ke Li, Jiayuan Xin, Wing Cheong Lau |
| 2024 | SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps. Zhiqiang Lin, Luyi Xing |
| 2024 | SafeEar: Content Privacy-Preserving Audio Deepfake Detection. Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2024 | SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu |
| 2024 | Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys. Marius Momeu, Simon Schnückel, Kai Angnis, Michalis Polychronakis, Vasileios P. Kemerlis |
| 2024 | Samplable Anonymous Aggregation for Private Federated Data Analysis. Kunal Talwar, Shan Wang, Audra McMillan, Vitaly Feldman, Pansy Bansal, Bailey Basile, Áine Cahill, Yi Sheng Chan, Mike Chatzidakis, Junye Chen, Oliver R. A. Chick, Mona Chitnis, Suman Ganta, Yusuf Goren, Filip Granqvist, Kristine Guo, Frederic Jacobs, Omid Javidbakht, Albert Liu, Richard Low, Dan Mascenik, Steve Myers, David Park, Wonhee Park, Gianni Parsa, Tommy Pauly, Christian Priebe, Rehan Rishi, Guy N. Rothblum, Congzheng Song, Linmao Song, Karl Tarbe, Sebastian Vogt, Shundong Zhou, Vojta Jina, Michael Scaria, Luke Winstrom |
| 2024 | Scalable Equi-Join Queries over Encrypted Database. Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang |
| 2024 | Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing. Hanwen Feng, Tiancheng Mai, Qiang Tang |
| 2024 | SeMalloc: Semantics-Informed Memory Allocator. Ruizhe Wang, Meng Xu, N. Asokan |
| 2024 | Secret Sharing with Snitching. Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk |
| 2024 | Secure Multiparty Computation with Lazy Sharing. Shuaishuai Li, Cong Zhang, Dongdai Lin |
| 2024 | Secure Parallel Computation with Oblivious State Transitions. Nuttapong Attrapadung, Kota Isayama, Kunihiko Sadakane, Kazunari Tozawa |
| 2024 | Secure Sorting and Selection via Function Secret Sharing. Amit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Mahimna Kelkar, Yiping Ma |
| 2024 | Secure Vickrey Auctions with Rational Parties. Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar |
| 2024 | Securely Training Decision Trees Efficiently. Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta |
| 2024 | Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence Methods. Efrén López-Morales |
| 2024 | Securing Floating-Point Arithmetic for Noise Addition. Naoise Holohan, Stefano Braghin, Mohamed Suliman |
| 2024 | Securing Lightning Channels against Rational Miners. Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar |
| 2024 | Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises. Jonas Hielscher, Markus Schöps, Jens Opdenbusch, Felix Reichmann, Marco Gutfleisch, Karola Marky, Simon Parkin |
| 2024 | SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security. Adwait Godbole, Yatin A. Manerkar, Sanjit A. Seshia |
| 2024 | SeqMIA: Sequential-Metric Based Membership Inference Attack. Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang |
| 2024 | Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu |
| 2024 | Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets. Ling Ren, Muhammad Haris Mughees, I Sun |
| 2024 | Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. Jaehyung Kim, Jinyeong Seo, Yongsoo Song |
| 2024 | Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development. Philip Klostermeyer, Sabrina Amft, Sandra Höltervennhoff, Alexander Krause, Niklas Busch, Sascha Fahl |
| 2024 | Smooth Sensitivity for Geo-Privacy. Yuting Liang, Ke Yi |
| 2024 | Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees. Christodoulos Pappas, Dimitrios Papadopoulos |
| 2024 | Spec-o-Scope: Cache Probing at Cache Speed. Gal Horowitz, Eyal Ronen, Yuval Yarom |
| 2024 | SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks. Pritam Dash, Ethan Chan, Karthik Pattabiraman |
| 2024 | SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols. Kevin Morio, Robert Künnemann |
| 2024 | Specification and Verification of Strong Timing Isolation of Hardware Enclaves. Stella Lau, Thomas Bourgeat, Clément Pit-Claudel, Adam Chlipala |
| 2024 | State Machine Mutation-based Testing Framework for Wireless Communication Protocols. Syed Md. Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Dong, Omar Chowdhury, Syed Rafiul Hussain |
| 2024 | Staving off the IoT Armageddon. Gene Tsudik |
| 2024 | Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse Engineering. Simon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel E. Holcomb, Christof Paar |
| 2024 | Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication. Kailun Yan, Xiaokuan Zhang, Wenrui Diao |
| 2024 | Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain |
| 2024 | Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song |
| 2024 | Sui Lutris: A Blockchain Combining Broadcast and Consensus. Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang |
| 2024 | SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren |
| 2024 | Symbolic Execution for Dynamic Kernel Analysis. Pansilu Pitigalaarachchi |
| 2024 | SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon. Hyerean Jang, Taehun Kim, Youngjoo Shin |
| 2024 | TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX. Luca Wilke, Florian Sieck, Thomas Eisenbarth |
| 2024 | TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, Shouling Ji |
| 2024 | TabularMark: Watermarking Tabular Datasets for Machine Learning. Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong |
| 2024 | Test Suites Guided Vulnerability Validation for Node.js Applications. Changhua Luo, Penghui Li, Wei Meng, Chao Zhang |
| 2024 | Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures. Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom |
| 2024 | The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024). Lesly-Ann Daniel, Vineet Rajani |
| 2024 | The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective. Andrea Mengascini, Ryan Aurelio, Giancarlo Pellegrino |
| 2024 | The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner |
| 2024 | The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang |
| 2024 | The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations. Lorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, Mario Polino |
| 2024 | The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. Julius Hermelink, Kai-Chun Ning, Richard Petri, Emanuele Strieder |
| 2024 | The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li |
| 2024 | The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, Zhikun Zhang, Xiaofeng Wang, Haixu Tang |
| 2024 | The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy. Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer |
| 2024 | The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols. Jeffrey Knockel, Mona Wang, Zoë Reichert |
| 2024 | The Privacy-Utility Trade-off in the Topics API. Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes |
| 2024 | ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles. Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou |
| 2024 | Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam |
| 2024 | TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang |
| 2024 | Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects. Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger |
| 2024 | Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing. Chaoyuan Peng, Muhui Jiang, Lei Wu, Yajin Zhou |
| 2024 | Toward Practical Threshold FHE: Low Communication, Computation and Interaction. Hyeongmin Choe |
| 2024 | Toward Understanding the Security of Plugins in Continuous Integration Services. Xiaofan Li, Yacong Gu, Chu Qiao, Zhenkai Zhang, Daiping Liu, Lingyun Ying, Haixin Duan, Xing Gao |
| 2024 | Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models. Feng Luo, Huangkun Lin, Zihao Li, Xiapu Luo, Ruijie Luo, Zheyuan He, Shuwei Song, Ting Chen, Wenxuan Luo |
| 2024 | Towards Fine-Grained Webpage Fingerprinting at Scale. Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu |
| 2024 | Towards Proactive Protection against Unauthorized Speech Synthesis. Zhiyuan Yu |
| 2024 | Towards Secure Runtime Auditing of Remote Embedded System Software. Adam Caulfield |
| 2024 | Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. Keane Lucas, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| 2024 | Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices. Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, Inho Kim, Woongjae Lee, Kihun Hong, Souhwan Jung |
| 2024 | Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices. Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan |
| 2024 | Trusted Execution Environments for Quantum Computers. Theodoros Trochatos |
| 2024 | Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning. Yufei Zhou, Peijia Zheng, Xiaochun Cao, Jiwu Huang |
| 2024 | UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips. Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, Zhuo Su |
| 2024 | Unbalanced Private Set Union with Reduced Computation and Communication. Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang |
| 2024 | Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi |
| 2024 | Uncovering Gradient Inversion Risks in Practical Language Model Training. Xinguo Feng, Zhongkui Ma, Zihan Wang, Eu Joe Chegne, Mengyao Ma, Alsharif Abuadbba, Guangdong Bai |
| 2024 | Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, Xiaofeng Wang |
| 2024 | Understanding Implosion in Text-to-Image Generative Models. Wenxin Ding, Cathy Yuanchen Li, Shawn Shan, Ben Y. Zhao, Hai-Tao Zheng |
| 2024 | Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting. Ece Gumusel, Yue Xiao, Yue Qin, Jiaxin Qin, Xiaojing Liao |
| 2024 | Understanding Routing-Induced Censorship Changes Globally. Abhishek Bhaskar, Paul Pearce |
| 2024 | Understanding and Addressing Online Tracking: Online Privacy's Regulatory Turn. Nathan Reitinger |
| 2024 | Unmasking the Security and Usability of Password Masking. Yuqi Hu, Suood Alroomi, Sena Sahin, Frank Li |
| 2024 | Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks. Xin'an Zhou, Qing Deng, Juefei Pu, Keyu Man, Zhiyun Qian, Srikanth V. Krishnamurthy |
| 2024 | Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications. Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, Shuang Hao, Haojin Zhu |
| 2024 | Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack. Guanzhong Chen, ZhengHan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu |
| 2024 | Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl |
| 2024 | VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption. Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux |
| 2024 | VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching. Kaifeng Huang, Chenhao Lu, Yiheng Cao, Bihuan Chen, Xin Peng |
| 2024 | VPVet: Vetting Privacy Policies of Virtual Reality Apps. Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu |
| 2024 | Verifiable Security Policies for Distributed Systems. Felix A. Wolf, Peter Müller |
| 2024 | Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly. Freek Verbeek, Nico Naus, Binoy Ravindran |
| 2024 | VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice. Xingshuo Han, Haozhao Wang, Kangqiao Zhao, Gelei Deng, Yuan Xu, Hangcheng Liu, Han Qiu, Tianwei Zhang |
| 2024 | WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES). Erman Ayday, Jaideep Vaidya |
| 2024 | Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense. Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott |
| 2024 | Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz. Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma |
| 2024 | What Did Come Out of It? Analysis and Improvements of DIDComm Messaging. Christian Badertscher, Fabio Banfi, Jesus Diaz |
| 2024 | When Compiler Optimizations Meet Symbolic Execution: An Empirical Study. Yue Zhang, Melih Sirlanci, Ruoyu Wang, Zhiqiang Lin |
| 2024 | Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms. Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy |
| 2024 | Zero-Knowledge Proofs of Training for Deep Neural Networks. Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos |
| 2024 | Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang |
| 2024 | ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models. Zeyang Sha, Yicong Tan, Mingjie Li, Michael Backes, Yang Zhang |
| 2024 | fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup. Zihao Li, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen |
| 2024 | zkLLM: Zero Knowledge Proofs for Large Language Models. Haochen Sun, Jason Li, Hongyang Zhang |
| 2024 | zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang |
| 2024 | zkPi: Proving Lean Theorems in Zero-Knowledge. Evan Laufer, Alex Ozdemir, Dan Boneh |
| 2024 | μCFI: Formal Verification of Microarchitectural Control-flow Integrity. Katharina Ceesay-Seitz, Flavien Solt, Kaveh Razavi |