CCS A*

414 papers

YearTitle / Authors
2024"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Kevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin R. B. Butler, Carrie Gates, Patrick Traynor
2024"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang
2024"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Kevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, Kevin R. B. Butler
2024"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion.
Lucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv
2024$DPM: $ Clustering Sensitive Data through Separation.
Johannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi
2024A Causal Explainable Guardrails for Large Language Models.
Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren
2024A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems.
Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, Bo Luo
2024A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu
2024A Framework for Differential Privacy Against Timing Attacks.
Zachary Ratliff, Salil P. Vadhan
2024A General Framework for Data-Use Auditing of ML Models.
Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter
2024A Qualitative Analysis of Practical De-Identification Guides.
Wentao Guo, Aditya Kishore, Adam J. Aviv, Michelle L. Mazurek
2024A Succinct Range Proof for Polynomial-based Vector Commitment.
Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang
2024A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability.
Jie Zhu, Jirong Zha, Ding Li, Leye Wang
2024AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense.
Neil Gong, Qi Li, Xiaoli Zhang
2024ACM CCS 2024 Doctoral Symposium.
Gabriela F. Ciocarlie, Xinming Ou
2024AISec '24: 17th ACM Workshop on Artificial Intelligence and Security.
Maura Pintor, Matthew Jagielski, Xinyun Chen
2024AITIA: Efficient Secure Computation of Bivariate Causal Discovery.
Truong Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu
2024ASHES '24: Workshop on Attacks and Solutions in Hardware Security.
Lejla Batina, Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer
2024Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware.
Haoyu Xiao, Yuan Zhang, Minghang Shen, Chaoyang Lin, Can Zhang, Shengli Liu, Min Yang
2024Actively Secure Private Set Intersection in the Client-Server Setting.
Yunqing Sun, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Xiao Wang
2024AirGapAgent: Protecting Privacy-Conscious Conversational Agents.
Eugene Bagdasarian, Ren Yi, Sahra Ghalebikesabi, Peter Kairouz, Marco Gruteser, Sewoong Oh, Borja Balle, Daniel Ramage
2024Alchemy: Data-Free Adversarial Training.
Yijie Bai, Zhongming Ma, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu
2024Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi
2024Analyzing Inference Privacy Risks Through Gradients In Machine Learning.
Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley A. Malin, Ye Wang
2024ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption.
Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan
2024Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Shuai Li, Zhemin Yang, Yuhong Nan, Shutian Yu, Qirui Zhu, Min Yang
2024Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery.
Nicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic
2024Asynchronous Authentication.
Marwa Mouallem, Ittay Eyal
2024Asynchronous Consensus without Trusted Setup or Public-Key Cryptography.
Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, Victor Shoup
2024Atomic and Fair Data Exchange via Blockchain.
Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko
2024Attacks Against the IND-CPA
Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto
2024AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices.
Mohsen Salehi, Karthik Pattabiraman
2024AutonomousCyber '24 - Workshop on Autonomous Cybersecurity.
Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou
2024BadMerging: Backdoor Attacks Against Model Merging.
Jinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian
2024BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer.
Wenqiang Li, Haohuang Wen, Zhiqiang Lin
2024Batch Range Proof: How to Make Threshold ECDSA More Efficient.
Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan
2024Batching-Efficient RAM using Updatable Lookup Arguments.
Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
2024Benchmarking Secure Sampling Protocols for Differential Privacy.
Yucheng Fu, Tianhao Wang
2024Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Xueluan Gong, Rubin Wei, Ziyao Wang, Yuchen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang
2024BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering.
Jiayi Jiang, Xiyuan Zhang, Chengcheng Wan, Haoyi Chen, Haiying Sun, Ting Su
2024Blind Multisignatures for Anonymous Tokens with Decentralized Issuance.
Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss
2024Blind and Low-Vision Individuals' Detection of Audio Deepfakes.
Filipo Sharevski, Aziz Zeidieh, Jennifer Vander Loop, Peter Jachim
2024Block Ciphers in Idealized Models: Automated Proofs and New Security Results.
Miguel Ambrona, Pooya Farshim, Patrick Harasser
2024Blockchain Bribing Attacks and the Efficacy of Counterincentives.
Dimitris Karakostas, Aggelos Kiayias, Thomas Zacharias
2024Blocking Tracking JavaScript at the Function Granularity.
Abdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar
2024BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li
2024Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Hao Xiang, Zehui Cheng, Jinku Li, Jianfeng Ma, Kangjie Lu
2024Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators.
Ahmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena
2024Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols.
Ellis Fenske, Aaron Johnson
2024Byzantine-Robust Decentralized Federated Learning.
Minghong Fang, Zifan Zhang, Hairi, Prashant Khanduri, Jia Liu, Songtao Lu, Yuchen Liu, Neil Gong
2024Byzantine-Secure Relying Party for Resilient RPKI.
Jens Frieß, Donika Mirdita, Haya Schulmann, Michael Waidner
2024CAPSID: A Private Session ID System for Small UAVs.
Yueshen Li, Jianli Jin, Kirill Levchenko
2024CCSW 2024 - Cloud Computing Security Workshop.
Apostolos P. Fournaris, Paolo Palmieri
2024CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy.
Kassem Fawaz, Magnus Almgren
2024CSCS '24 - Cyber Security in CarS Workshop.
Mario Fritz, Christoph Krauß, Hans-Joachim Hof
2024Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries.
Sofía Celi, Alex Davidson
2024Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy.
Shuangqing Xu, Yifeng Zheng, Zhongyun Hua
2024CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments.
Shenao Wang, Feng Dong, Hangfeng Yang, Jingheng Xu, Haoyu Wang
2024Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning Models.
Zitao Chen
2024Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong
2024Characterizing Ethereum Address Poisoning Attack.
Shixuan Guan, Kai Li
2024Characterizing and Mitigating Phishing Attacks at ccTLD Scale.
Giovane C. M. Moura, Thomas Daniels, Maarten Bosteels, Sebastian Castro, Moritz Müller, Thymen Wabeke, Thijs van Den Hout, Maciej Korczynski, Georgios Smaragdakis
2024CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks.
Sebastian Schrittwieser, Michele Ianni
2024CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses.
Jianfeng Wang, Huazhong Yang, Shuwen Deng, Xueqing Li
2024CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu
2024Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing.
Yue Zhang, Zhen Ling, Michael Cash, Qiguang Zhang, Christopher Morales-Gonzalez, Qun Zhou Sun, Xinwen Fu
2024Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels
2024Compositional Verification of Composite Byzantine Protocols.
Qiyuan Zhao, George Pîrlea, Karolina Grzeszkiewicz, Seth Gilbert, Ilya Sergey
2024Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Adrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma, Mariana Raykova
2024Conan: Distributed Proofs of Compliance for Anonymous Data Collection.
Mingxun Zhou, Giulia Fanti, Elaine Shi
2024Conditional Encryption with Applications to Secure Personalized Password Typo Correction.
Mohammad Hassan Ameri, Jeremiah Blocki
2024Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training.
Daniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun
2024CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel.
Shuangpeng Bai, Zhechang Zhang, Hong Hu
2024Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs.
Fabian Rauscher, Daniel Gruss
2024Cross-silo Federated Learning with Record-level Personalized Differential Privacy.
Junxu Liu, Jian Lou, Li Xiong, Jinfei Liu, Xiaofeng Meng
2024CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon.
Jiaxun Zhu, Minghao Lin, Tingting Yin, Zechao Cai, Yu Wang, Rui Chang, Wenbo Shen
2024Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers.
Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Christophe de Dinechin, Pau-Chen Cheng, Hani Jamjoom
2024Cryptography and Computer Security: A View From the Year 2100.
Dan Boneh
2024Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure.
Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
2024Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power.
Shiming Wang, Liyao Xiang, Bowei Cheng, Zhe Ji, Tianran Sun, Xinbing Wang
2024DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation.
Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing
2024DarthShader: Fuzzing WebGPU Shader Translators & Compilers.
Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz
2024Data Independent Order Policy Enforcement: Limitations and Solutions.
Sarisht Wadhwa, Luca Zanolini, Aditya Asgaonkar, Francesco D'Amato, Chengrui Fang, Fan Zhang, Kartik Nayak
2024Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols.
Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong
2024DeFi '24: Workshop on Decentralized Finance and Security.
Liyi Zhou, Kaihua Qin
2024DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables.
Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, Shuai Wang
2024Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers.
Sébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji
2024Demo: An End-to-End Anonymous Traffic Analysis System.
Xianglan Huang, Qiang Zhou, Liangmin Wang, Weiqi Yu, Wenjin Wang, Shi Shen
2024Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Zhaoxuan Li, Ziming Zhao, Wenhao Li, Rui Zhang, Rui Xue, Siqi Lu, Fan Zhang
2024Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation.
Yuechun Gu, Jiajie He, Keke Chen
2024Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code.
Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen
2024Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches.
Solayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila
2024Demystifying RCE Vulnerabilities in LLM-Integrated Apps.
Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen
2024Derecho: Privacy Pools with Proof-Carrying Disclosures.
Josh Beal, Ben Fisch
2024Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications.
Yongheng Huang, Chenghang Shi, Jie Lu, Haofeng Li, Haining Meng, Lian Li
2024Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns.
Chuanpu Fu, Qi Li, Meng Shen, Ke Xu
2024Direct Range Proofs for Paillier Cryptosystem and Their Applications.
Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu
2024Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses.
Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang
2024Distributed PIR: Scaling Private Messaging via the Users' Machines.
Elkana Tovey, Jonathan Weiss, Yossi Gilad
2024Dora: A Simple Approach to Zero-Knowledge for RAM Programs.
Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk
2024DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back.
Zhiyuan Sun, Zihao Li, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou, Yinqian Zhang
2024Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs.
Chaya Ganesh, Vineet Nair, Ashish Sharma
2024Dye4AI: Assuring Data Boundary on Generative AI Services.
Shu Wang, Kun Sun, Yan Zhai
2024ERACAN: Defending Against an Emerging CAN Threat Model.
Zhaozhou Tang, Khaled Serag, Saman A. Zonouz, Z. Berkay Celik, Dongyan Xu, Raheem Beyah
2024ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.
Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren
2024Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies.
Neophytos Christou, Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis
2024Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing.
Ying Gao, Yuanchao Luo, Longxin Wang, Xiang Liu, Lin Qi, Wei Wang, Mengmeng Zhou
2024Efficient Secret Sharing for Large-Scale Applications.
Sarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo
2024Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget.
Jiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko
2024Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob".
Katharina Schiller, Florian Adamsky, Christian Eichenmüller, Matthias Reimert, Zinaida Benenson
2024End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem.
Jonas Hofmann, Kien Tuong Truong
2024Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization.
Guopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao
2024Evaluations of Machine Learning Privacy Defenses are Misleading.
Michael Aerni, Jie Zhang, Florian Tramèr
2024Evolving Network Security in the Era of Network Programmability.
Mingming Chen
2024Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
Ben Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich
2024FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.
Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis
2024FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software Transformation.
Ryan Craven, Matthew S. Mickelson
2024FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols.
Hongbo Wen, Hanzhi Liu, Jiaxin Song, Yanju Chen, Wenbo Guo, Yu Feng
2024FOX: Coverage-guided Fuzzing as Online Stochastic Control.
Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana
2024Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication.
Marc Fischlin, Olga Sanina
2024Fast Two-party Threshold ECDSA with Proactive Security.
Brian Koziel, S. Dov Gordon, Craig Gentry
2024Fast and Accurate Homomorphic Softmax Evaluation.
Wonhee Cho, Guillaume Hanrot, Taeseong Kim, Minje Park, Damien Stehlé
2024Faster FHE-Based Single-Server Private Information Retrieval.
Ming Luo, Feng-Hao Liu, Han Wang
2024Fisher Information guided Purification against Backdoor Attacks.
Nazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin, Zhishan Guo, Nazanin Rahnavard
2024Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption.
Hanshen Xiao, G. Edward Suh, Srinivas Devadas
2024Foundations for Cryptographic Reductions in CCSA Logics.
David Baelde, Adrien Koutsos, Justine Sauvage
2024Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments.
Nikhil Vanjani, Pratik Soni, Sri Aravinda Krishnan Thyagarajan
2024Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing.
Arvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao
2024FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache.
Penghui Li, Mingxue Zhang
2024Fuzzing JavaScript Engines with a Graph-based IR.
Haoran Xu, Zhiyuan Jiang, Yongjun Wang, Shuhui Fan, Shenglin Xu, Peidai Xie, Shaojing Fu, Mathias Payer
2024GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices.
Hanqiu Wang, Zihao Zhan, Haoqi Shan, Siqi Dai, Maximillian Panoff, Shuo Wang
2024GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations.
Yue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin, Yu Liu, Huadi Zhu, Ming Li
2024GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity.
Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis
2024Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring.
Jana Hofmann, Cédric Fournet, Boris Köpf, Stavros Volos
2024GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Kunsheng Tang, Wenbo Zhou, Jie Zhang, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang, Tianwei Zhang, Nenghai Yu
2024Glitch-Stopping Circuits: Hardware Secure Masking without Registers.
Zhenda Zhang, Svetla Petkova-Nikova, Ventzislav Nikov
2024Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem.
Yuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jia-Ju Bai, Shijie Jia, Qianhong Wu
2024Gramine-TDX: A Lightweight OS Kernel for Confidential VMs.
Dmitrii Kuvaiskii, Dimitrios Stavrakakis, Kailun Qin, Cedric Xing, Pramod Bhatotia, Mona Vij
2024Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility.
Georgi Ganev, Kai Xu, Emiliano De Cristofaro
2024Graphiti: Secure Graph Computation Made More Scalable.
Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal
2024HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare.
William Yurcik, Gregory Pluta, Toan Luong, Luis Garcia
2024Hekaton: Horizontally-Scalable zkSNARKs Via Proof Aggregation.
Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra
2024Helium: Scalable MPC among Lightweight Participants and under Churn.
Christian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso
2024High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies.
Guy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland
2024HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted.
Yanxue Jia, Varun Madathil, Aniket Kate
2024HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su
2024I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors.
Zijin Lin, Yue Zhao, Kai Chen, Jinwen He
2024ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra.
Doreen Riepel, Marloes Venema, Tanya Verma
2024Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Yixin Wu, Yun Shen, Michael Backes, Yang Zhang
2024Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors.
Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Chuhan Wang, Jianwei Zhuge, Haixin Duan
2024Interactive Multi-Credential Authentication.
Deepak Maram, Mahimna Kelkar, Ittay Eyal
2024Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild.
Yuejia Liang, Jianjun Chen, Run Guo, Kaiwen Shen, Hui Jiang, Man Hou, Yue Yu, Haixin Duan
2024Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software.
Yongho Song, Byeongsu Woo, Youngkwang Han, Brent ByungHoon Kang
2024Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao
2024Isolate and Detect the Untrusted Driver with a Virtual Box.
Yonggang Li, Shunrong Jiang, Yu Bao, Pengpeng Chen, Yong Zhou, Yeh-Ching Chung
2024Jäger: Automated Telephone Call Traceback.
David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro
2024Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols.
Cas Cremers, Alexander Dax, Niklas Medinger
2024KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data.
Andy Zhou, Xiaojun Xu, Ramesh Raghunathan, Alok Lal, Xinze Guan, Bin Yu, Bo Li
2024LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Minhui Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan
2024LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao
2024Language-based Sandboxing.
Jialun Zhang
2024Leakage-Resilient Circuit Garbling.
Ruiyang Li, Yiteng Sun, Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang
2024Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu
2024Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing.
Jianzhong Liu, Yuheng Shen, Yiru Xu, Yu Jiang
2024Leveraging Storage Semantics to Enhance Data Security and Privacy.
Weidong Zhu
2024Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors.
Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens
2024LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPT.
Yutong Zhou, Fan Yang, Zirui Song, Ke Zhang, Jiongyi Chen, Kehuan Zhang
2024MGTBench: Benchmarking Machine-Generated Text Detection.
Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
2024Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning.
Mingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger
2024Manipulative Interference Attacks.
Samuel Mergendahl, Stephen Fickas, Boyana Norris, Richard Skowyra
2024MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data Breach.
Yihui Yan, Zhice Yang
2024Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines.
Yue Xiao, Chaoqi Zhang, Yue Qin, Fares Fahad S. Alharbi, Luyi Xing, Xiaojing Liao
2024Membership Inference Attacks Against In-Context Learning.
Rui Wen, Zheng Li, Michael Backes, Yang Zhang
2024Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense.
Qiankun Zhang, Di Yuan, Boyu Zhang, Bin Yuan, Bingqian Du
2024Metric Differential Privacy at the User-Level via the Earth-Mover's Distance.
Jacob Imola, Amrita Roy Chowdhury, Kamalika Chaudhuri
2024MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
Zidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan
2024Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines.
Eugene Bagdasarian, Vitaly Shmatikov
2024Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based Policies.
Peiran Wang, Qiyu Li, Longxuan Yu, Ziyao Wang, Ang Li, Haojian Jin
2024Multi-User Security of CCM Authenticated Encryption Mode.
Xiangyang Zhang, Yaobin Shen, Lei Wang
2024Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers.
Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
2024Nakamoto Consensus under Bounded Processing Capacity.
Lucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse
2024NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE Bootstrapping.
Jae Hyung Ju, Jaiyoung Park, Jongmin Kim, Minsik Kang, Donghwan Kim, Jung Hee Cheon, Jung Ho Ahn
2024Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data.
Yifan Lu, Wenxuan Li, Mi Zhang, Xudong Pan, Min Yang
2024New Secret Keys for Enhanced Performance in (T)FHE.
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap
2024No Peer, no Cry: Network Application Fuzzing via Fault Injection.
Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz
2024Non-Transferable Anonymous Tokens by Secret Binding.
F. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay
2024Non-interactive VSS using Class Groups and Application to DKG.
Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
2024Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang
2024Novel Privacy Attacks and Defenses Against Neural Networks.
Sayanton V. Dibbo
2024OSmart: Whitebox Program Option Fuzzing.
Kelin Wang, Mengda Chen, Liang He, Purui Su, Yan Cai, Jiongyi Chen, Bin Zhang, Chao Feng, Chaojing Tang
2024Obfuscated Key Exchange.
Felix Günther, Douglas Stebila, Shannon Veitch
2024Oblivious Single Access Machines - A New Model for Oblivious Computation.
Ananya Appan, David Heath, Ling Ren
2024OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware.
Abdullah Qasem, Mourad Debbabi, Andrei Soeanu
2024On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead).
Davide Davoli, Martin Avanzini, Tamara Rezk
2024On Understanding and Forecasting Fuzzers Performance with Static Analysis.
Dongjia Zhang, Andrea Fioraldi, Davide Balzarotti
2024On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo
2024On the Tight Security of the Double Ratchet.
Daniel Collins, Doreen Riepel, Si An Oliver Tran
2024Optimization-based Prompt Injection Attack to LLM-as-a-Judge.
Jiawen Shi, Zenghui Yuan, Yinuo Liu, Yue Huang, Pan Zhou, Lichao Sun, Neil Zhenqiang Gong
2024Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao
2024PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery.
Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang
2024PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks.
Zhe Ren, Xinghua Li, Yinbin Miao, Mengyao Zhu, Shunjie Yuan, Robert H. Deng
2024PLeak: Prompt Leaking Attacks against Large Language Model Applications.
Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao
2024Password-Protected Key Retrieval with(out) HSM Protection.
Sebastian H. Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann
2024PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries.
Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia
2024Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network.
Ben Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos
2024PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux.
Juhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, Byoungyoung Lee
2024Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions.
Shubham Agarwal, Aurore Fass, Ben Stock
2024Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning.
Jonathan Knauer, Phillip Rieger, Hossein Fereidooni, Ahmad-Reza Sadeghi
2024PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency.
Yuan Xu, Gelei Deng, Xingshuo Han, Guanlin Li, Han Qiu, Tianwei Zhang
2024PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning.
Zhiyuan Yu, Ao Li, Ruoyao Wen, Yijia Chen, Ning Zhang
2024Poster:
Qiaoran Meng, Nay Oo, Yuning Jiang, Hoon Wei Lim, Biplab Sikdar
2024Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices.
Bo Chen, Caleb Rother, Josh Dafoe
2024Poster: A Multi-step Approach for Classification of Malware Samples.
Arnaldo Sgueglia, Rocco Addabbo, Andrea Di Sorbo, Stanislav Dashevskyi, Daniel Ricardo dos Santos, Corrado Aaron Visaggio
2024Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms.
Pankaj Dayama, Vinayaka Pandit, Sikhar Patranabis, Abhishek Singh, Nitin Singh
2024Poster: Acoustic Side-Channel Attack on Robot Vacuums.
Peter Chen, Guannan Liu, Haining Wang
2024Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor.
Donghoon Kim, Andrew Booth, Euijin Choo, Doosung Hwang
2024Poster: An Exploration of Large Language Models in Malicious Source Code Detection.
Di Xue, Gang Zhao, Zhongqi Fan, Wei Li, Yahong Xu, Zhen Liu, Yin Liu, Zhongliang Yuan
2024Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database.
Sevval Simsek, Zhenpeng Shi, Howell Xia, David Sastre Medina, David Starobinski
2024Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNs.
Yuni Lai, Kai Zhou
2024Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models.
Wanpeng Li, Yuejun Guo
2024Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users.
Zhaoxiang Liu, Ning Luo, Samuel Judson, Raj Gautam Dutta, Xiaolong Guo, Mark Santolucito
2024Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations.
Yvo Desmedt, Alireza Kavousi, Aydin Abadi
2024Poster: Context-Based Effective Password Detection in Plaintext.
Manish Shukla, Shubham Malaviya, Sachin Lodha
2024Poster: Cyber Security Economics Model (CYSEM).
Tong Xin, Ying He, Efpraxia D. Zamani, Cunjin Luo
2024Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks.
Seok Min Hong, Beom Heyn Kim, Mohammad Mannan
2024Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection.
Sachin Shukla, Omid Mirzaei
2024Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection.
Jiawen Diao, Shengmin Zhao, Jianguo Xie, Rongna Xie, Guozhen Shi
2024Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical Study.
Seoksu Lee, Hyeongchang Jeon, Eun-Sun Cho
2024Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration.
Keiichi Ochiai, Masayuki Terada
2024Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience.
Weimin Fu, Yifang Zhao, Yier Jin, Xiaolong Guo
2024Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation.
Faqi Zhao, Duohe Ma, Wenhao Li, Feng Liu, Wen Wang
2024Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training.
Yizhi Li, Jiang Li, Jiahao Cao, Renjie Xie, Yangyang Wang, Mingwei Xu
2024Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi.
Abdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy
2024Poster: Formalizing Cognitive Biases for Cybersecurity Defenses.
Jasmine Vang, Matthew Revelle
2024Poster: Formally Verified Binary Lifting to P-Code.
Nico Naus, Freek Verbeek, Sagar Atla, Binoy Ravindran
2024Poster: From Fort to Foe: The Threat of RCE in RPKI.
Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner
2024Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting.
Joel Osher, James K. Holland, Nicholas Hopper
2024Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web?
Abdul Haddi Amjad, Muhammad Ali Gulzar
2024Poster: In-switch Defense against DNS Amplification DDoS Attacks.
Seyed Mohammad Hadi Mirsadeghi
2024Poster: Kill Krill or Proxy RPKI.
Louis Cattepoel, Donika Mirdita, Haya Schulmann, Michael Waidner
2024Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions.
Thomas Szymkowiak, Endrit Isufi, Markku-Juhani O. Saarinen
2024Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption.
Christian Mouchet, Sylvain Chatel, Lea Nürnberger, Wouter Lueks
2024Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network.
Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang, Feng Liu
2024Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly.
Oliver Jacobsen, Haya Schulmann
2024Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key.
Jheng-Jia Huang, Guan-Yu Chen, Nai-Wei Lo
2024Poster: Privacy Norms for Fertility Data in the Roe v. Wade era.
Zander Chown, Aarathi Prasad
2024Poster: Protecting Source Code Privacy When Hunting Bugs.
Jielun Wu, Qingkai Shi
2024Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling.
Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi
2024Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model.
Elisa Zhang, Shiyu Sun, Yunlong Xing, Kun Sun
2024Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE).
Jelena Mirkovic, David M. Balenson, Brian Kocoloski, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Alba Regalado, David R. Choffnes, Daniel J. Dubois, Luis Garcia
2024Poster: Security of Login Interfaces in Modern Organizations.
Kevin Nsieyanji Tchokodeu, Haya Schulmann, Gil Sobol, Michael Waidner
2024Poster: Solving the Free-rider Problem in Bittensor.
Sin Tai Liu, Jiayuan Yu, Jacob Steeves
2024Poster: Synchronization Concerns of DNS Integrations.
Andrew J. Kaizer, Will Naciri, Swapneel Sheth
2024Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models.
Huan Bui, Harper Lienerth, Chenglong Fu, Meera Sridhar
2024Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code.
Tomasz Hyla, Natalia Wawrzyniak
2024Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector.
Wenhao Li, Duohe Ma, Zhaoxuan Li, Huaifeng Bao, Shuai Wang, Huamin Jin, Xiaoyu Zhang
2024Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks.
Shubham Malaviya, Manish Shukla, Saurabh Anand, Sachin Lodha
2024Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications?
Yuchen Ji, Ting Dai, Yutian Tang, Jingzhu He
2024Poster: YFuzz: Data-Driven Fuzzing.
Yuan Chang, Chun-Chia Huang, Tatsuya Mori, Hsu-Chun Hsiao
2024Poster: libdebug, Build Your Own Debugger for a Better (Hello) World.
Gabriele Digregorio, Roberto Alessandro Bertolini, Francesco Panebianco, Mario Polino
2024Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax Disclosures.
Alex Berke, Tobin South, Robert Mahari, Kent Larson, Alex Pentland
2024PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts.
Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao
2024Practical Key-Extraction Attacks in Leading MPC Wallets.
Nikolaos Makriyannis, Oren Yomtov, Arik Galansky
2024Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu
2024Practical Post-Quantum Signatures for Privacy.
Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders
2024PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps.
Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong
2024Precio: Private Aggregate Measurement via Oblivious Shuffling.
Erik Anderson, Melissa Chase, F. Betül Durak, Kim Laine, Chenkai Weng
2024Principled Microarchitectural Isolation on Cloud CPUs.
Stavros Volos, Cédric Fournet, Jana Hofmann, Boris Köpf, Oleksii Oleksenko
2024Privacy Analyses in Machine Learning.
Jiayuan Ye
2024Privacy-Preserving Graph Analysis.
Bhavish Raj Gopal
2024ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support.
Nada Lahjouji, Sameera Ghayyur, Xi He, Sharad Mehrotra
2024ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren
2024Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024
Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie
2024Program Environment Fuzzing.
Ruijie Meng, Gregory J. Duck, Abhik Roychoudhury
2024Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing.
Yingquan Zhao, Zan Wang, Junjie Chen, Ruifeng Fu, Yanzhou Lu, Tianchang Gao, Haojie Ye
2024PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs).
Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan
2024Prompt Fuzzing for Fuzz Driver Generation.
Yunlong Lyu, Yuxuan Xie, Peng Chen, Hao Chen
2024ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model.
Dawei Wang, Geng Zhou, Li Chen, Dan Li, Yukai Miao
2024Protoss: Protocol for Tight Optimal Symmetric Security.
Emanuele Di Giandomenico, Yong Li, Sven Schäge
2024Provable Security for PKI Schemes.
Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg
2024Pulsar: Secure Steganography for Diffusion Models.
Tushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk
2024Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users.
Céline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb
2024QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems.
Bozhidar Stevanoski, Ana-Maria Cretu, Yves-Alexandre de Montjoye
2024RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.
Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, Kevin R. B. Butler
2024RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security.
Ruimin Sun, Mu Zhang
2024RISiren: Wireless Sensing System Attacks via Metasurface.
Chenghan Jiang, Jinjiang Yang, Xinyi Li, Qi Li, Xinyu Zhang, Ju Ren
2024RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices.
Kaizheng Liu, Ming Yang, Zhen Ling, Yue Zhang, Chongqing Lei, Junzhou Luo, Xinwen Fu
2024RSA-Based Dynamic Accumulator without Hashing into Primes.
Victor Youdom Kemmoe, Anna Lysyanskaya
2024Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter
2024ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries.
Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, Xiangyu Zhang
2024ReactAppScan: Mining React Application Vulnerabilities via Component Graph.
Zhiyong Guo, Mingqing Kang, V. N. Venkatakrishnan, Rigel Gjomemo, Yinzhi Cao
2024Real-World Universal zkSNARKs are Non-Malleable.
Antonio Faonio, Dario Fiore, Luigi Russo
2024Reckle Trees: Updatable Merkle Batch Proofs with Applications.
Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac
2024Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs.
Evangelia Anna Markatou, Roberto Tamassia
2024RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection.
Penghao Wang, Jingzhi Hu, Chao Liu, Jun Luo
2024Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network Data.
Ryan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah
2024Respire: High-Rate PIR for Databases with Small Records.
Alexander Burton, Samir Jordan Menon, David J. Wu
2024Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference.
Jiaxing He, Kang Yang, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang
2024Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Xinhao Deng, Qi Li, Ke Xu
2024Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde
2024Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications.
Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu
2024Rust for Embedded Systems: Current State and Open Problems.
Ayushi Sharma, Shashank Sharma, Sai Ritvik Tanksalkar, Santiago Torres-Arias, Aravind Machiry
2024S
Bokang Zhang, Yanglin Zhang, Zhikun Zhang, Jinglan Yang, Lingying Huang, Junfeng Wu
2024S-BDT: Distributed Differentially Private Boosted Decision Trees.
Thorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi
2024SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures.
Tianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
2024SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses.
Santiago Torres-Arias, Marcela S. Melara
2024SECOMP: Formally Secure Compilation of Compartmentalized C Programs.
Jérémy Thibault, Roberto Blanco, Dongjae Lee, Sven Argo, Arthur Azevedo de Amorim, Aïna Linn Georges, Catalin Hritcu, Andrew Tolmach
2024SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks.
Ronghai Yang, Xianbo Wang, Kaixuan Luo, Xin Lei, Ke Li, Jiayuan Xin, Wing Cheong Lau
2024SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps.
Zhiqiang Lin, Luyi Xing
2024SafeEar: Content Privacy-Preserving Audio Deepfake Detection.
Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2024SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu
2024Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys.
Marius Momeu, Simon Schnückel, Kai Angnis, Michalis Polychronakis, Vasileios P. Kemerlis
2024Samplable Anonymous Aggregation for Private Federated Data Analysis.
Kunal Talwar, Shan Wang, Audra McMillan, Vitaly Feldman, Pansy Bansal, Bailey Basile, Áine Cahill, Yi Sheng Chan, Mike Chatzidakis, Junye Chen, Oliver R. A. Chick, Mona Chitnis, Suman Ganta, Yusuf Goren, Filip Granqvist, Kristine Guo, Frederic Jacobs, Omid Javidbakht, Albert Liu, Richard Low, Dan Mascenik, Steve Myers, David Park, Wonhee Park, Gianni Parsa, Tommy Pauly, Christian Priebe, Rehan Rishi, Guy N. Rothblum, Congzheng Song, Linmao Song, Karl Tarbe, Sebastian Vogt, Shundong Zhou, Vojta Jina, Michael Scaria, Luke Winstrom
2024Scalable Equi-Join Queries over Encrypted Database.
Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang
2024Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing.
Hanwen Feng, Tiancheng Mai, Qiang Tang
2024SeMalloc: Semantics-Informed Memory Allocator.
Ruizhe Wang, Meng Xu, N. Asokan
2024Secret Sharing with Snitching.
Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk
2024Secure Multiparty Computation with Lazy Sharing.
Shuaishuai Li, Cong Zhang, Dongdai Lin
2024Secure Parallel Computation with Oblivious State Transitions.
Nuttapong Attrapadung, Kota Isayama, Kunihiko Sadakane, Kazunari Tozawa
2024Secure Sorting and Selection via Function Secret Sharing.
Amit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Mahimna Kelkar, Yiping Ma
2024Secure Vickrey Auctions with Rational Parties.
Chaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar
2024Securely Training Decision Trees Efficiently.
Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta
2024Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence Methods.
Efrén López-Morales
2024Securing Floating-Point Arithmetic for Noise Addition.
Naoise Holohan, Stefano Braghin, Mohamed Suliman
2024Securing Lightning Channels against Rational Miners.
Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar
2024Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises.
Jonas Hielscher, Markus Schöps, Jens Opdenbusch, Felix Reichmann, Marco Gutfleisch, Karola Marky, Simon Parkin
2024SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security.
Adwait Godbole, Yatin A. Manerkar, Sanjit A. Seshia
2024SeqMIA: Sequential-Metric Based Membership Inference Attack.
Hao Li, Zheng Li, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang
2024Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases.
Peizhao Zhou, Xiaojie Guo, Pinzhi Chen, Tong Li, Siyi Lv, Zheli Liu
2024Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets.
Ling Ren, Muhammad Haris Mughees, I Sun
2024Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS.
Jaehyung Kim, Jinyeong Seo, Yongsoo Song
2024Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development.
Philip Klostermeyer, Sabrina Amft, Sandra Höltervennhoff, Alexander Krause, Niklas Busch, Sascha Fahl
2024Smooth Sensitivity for Geo-Privacy.
Yuting Liang, Ke Yi
2024Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees.
Christodoulos Pappas, Dimitrios Papadopoulos
2024Spec-o-Scope: Cache Probing at Cache Speed.
Gal Horowitz, Eyal Ronen, Yuval Yarom
2024SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks.
Pritam Dash, Ethan Chan, Karthik Pattabiraman
2024SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols.
Kevin Morio, Robert Künnemann
2024Specification and Verification of Strong Timing Isolation of Hardware Enclaves.
Stella Lau, Thomas Bourgeat, Clément Pit-Claudel, Adam Chlipala
2024State Machine Mutation-based Testing Framework for Wireless Communication Protocols.
Syed Md. Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Dong, Omar Chowdhury, Syed Rafiul Hussain
2024Staving off the IoT Armageddon.
Gene Tsudik
2024Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse Engineering.
Simon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel E. Holcomb, Christof Paar
2024Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication.
Kailun Yan, Xiaokuan Zhang, Wenrui Diao
2024Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
Rabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain
2024Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z
Yun Li, Daniel Escudero, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2024Sui Lutris: A Blockchain Combining Broadcast and Consensus.
Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang
2024SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution.
Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren
2024Symbolic Execution for Dynamic Kernel Analysis.
Pansilu Pitigalaarachchi
2024SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon.
Hyerean Jang, Taehun Kim, Youngjoo Shin
2024TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX.
Luca Wilke, Florian Sieck, Thomas Eisenbarth
2024TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, Shouling Ji
2024TabularMark: Watermarking Tabular Datasets for Machine Learning.
Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong
2024Test Suites Guided Vulnerability Validation for Node.js Applications.
Changhua Luo, Penghui Li, Wei Meng, Chao Zhang
2024Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom
2024The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024).
Lesly-Ann Daniel, Vineet Rajani
2024The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective.
Andrea Mengascini, Ryan Aurelio, Giancarlo Pellegrino
2024The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner
2024The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Chuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin, Zhenkai Liang
2024The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations.
Lorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, Mario Polino
2024The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform.
Julius Hermelink, Kai-Chun Ning, Richard Petri, Emanuele Strieder
2024The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li
2024The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, Zhikun Zhang, Xiaofeng Wang, Haixu Tang
2024The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy.
Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer
2024The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols.
Jeffrey Knockel, Mona Wang, Zoë Reichert
2024The Privacy-Utility Trade-off in the Topics API.
Mário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes
2024ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles.
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou
2024Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction.
Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
2024TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang
2024Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects.
Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger
2024Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing.
Chaoyuan Peng, Muhui Jiang, Lei Wu, Yajin Zhou
2024Toward Practical Threshold FHE: Low Communication, Computation and Interaction.
Hyeongmin Choe
2024Toward Understanding the Security of Plugins in Continuous Integration Services.
Xiaofan Li, Yacong Gu, Chu Qiao, Zhenkai Zhang, Daiping Liu, Lingyun Ying, Haixin Duan, Xing Gao
2024Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models.
Feng Luo, Huangkun Lin, Zihao Li, Xiapu Luo, Ruijie Luo, Zheyuan He, Shuwei Song, Ting Chen, Wenxuan Luo
2024Towards Fine-Grained Webpage Fingerprinting at Scale.
Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu
2024Towards Proactive Protection against Unauthorized Speech Synthesis.
Zhiyuan Yu
2024Towards Secure Runtime Auditing of Remote Embedded System Software.
Adam Caulfield
2024Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months.
Keane Lucas, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
2024Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices.
Thien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, Inho Kim, Woongjae Lee, Kihun Hong, Souhwan Jung
2024Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices.
Easton Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan
2024Trusted Execution Environments for Quantum Computers.
Theodoros Trochatos
2024Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning.
Yufei Zhou, Peijia Zheng, Xiaochun Cao, Jiwu Huang
2024UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips.
Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, Zhuo Su
2024Unbalanced Private Set Union with Reduced Computation and Communication.
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang
2024Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles.
Mir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi
2024Uncovering Gradient Inversion Risks in Practical Language Model Training.
Xinguo Feng, Zhongkui Ma, Zihan Wang, Eu Joe Chegne, Mengyao Ma, Alsharif Abuadbba, Guangdong Bai
2024Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion.
Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, Xiaofeng Wang
2024Understanding Implosion in Text-to-Image Generative Models.
Wenxin Ding, Cathy Yuanchen Li, Shawn Shan, Ben Y. Zhao, Hai-Tao Zheng
2024Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting.
Ece Gumusel, Yue Xiao, Yue Qin, Jiaxin Qin, Xiaojing Liao
2024Understanding Routing-Induced Censorship Changes Globally.
Abhishek Bhaskar, Paul Pearce
2024Understanding and Addressing Online Tracking: Online Privacy's Regulatory Turn.
Nathan Reitinger
2024Unmasking the Security and Usability of Password Masking.
Yuqi Hu, Suood Alroomi, Sena Sahin, Frank Li
2024Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks.
Xin'an Zhou, Qing Deng, Juefei Pu, Keyu Man, Zhiyun Qian, Srikanth V. Krishnamurthy
2024Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Tong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng, Shuang Hao, Haojin Zhu
2024Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack.
Guanzhong Chen, ZhengHan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu
2024Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl
2024VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption.
Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux
2024VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching.
Kaifeng Huang, Chenhao Lu, Yiheng Cao, Bihuan Chen, Xin Peng
2024VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Yuxia Zhan, Yan Meng, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu
2024Verifiable Security Policies for Distributed Systems.
Felix A. Wolf, Peter Müller
2024Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly.
Freek Verbeek, Nico Naus, Binoy Ravindran
2024VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice.
Xingshuo Han, Haozhao Wang, Kangqiao Zhao, Gelei Deng, Yuan Xu, Hangcheng Liu, Han Qiu, Tianwei Zhang
2024WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES).
Erman Ayday, Jaideep Vaidya
2024Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense.
Hua Ma, Shang Wang, Yansong Gao, Zhi Zhang, Huming Qiu, Minhui Xue, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott
2024Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma
2024What Did Come Out of It? Analysis and Improvements of DIDComm Messaging.
Christian Badertscher, Fabio Banfi, Jesus Diaz
2024When Compiler Optimizations Meet Symbolic Execution: An Empirical Study.
Yue Zhang, Melih Sirlanci, Ruoyu Wang, Zhiqiang Lin
2024Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms.
Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy
2024Zero-Knowledge Proofs of Training for Deep Neural Networks.
Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos
2024Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang
2024ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models.
Zeyang Sha, Yicong Tan, Mingjie Li, Michael Backes, Yang Zhang
2024fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup.
Zihao Li, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen
2024zkLLM: Zero Knowledge Proofs for Large Language Models.
Haochen Sun, Jason Li, Hongyang Zhang
2024zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang
2024zkPi: Proving Lean Theorems in Zero-Knowledge.
Evan Laufer, Alex Ozdemir, Dan Boneh
2024μCFI: Formal Verification of Microarchitectural Control-flow Integrity.
Katharina Ceesay-Seitz, Flavien Solt, Kaveh Razavi