| 2024 | Acoustic Side-Channel Attacks on a Computer Mouse. Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik |
| 2024 | Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. Suguru Horimoto, Keane Lucas, Lujo Bauer |
| 2024 | Bringing UFUs Back into the Air with FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners. Sebastian Neef, Maath Oudeh |
| 2024 | Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks. Mohammad Ali Tofighi, Behzad Ousat, Javad Zandi, Esteban Schafir, Amin Kharraz |
| 2024 | Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings Federico Maggi, Manuel Egele, Mathias Payer, Michele Carminati |
| 2024 | Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method. Cristian Assaiante, Simone Nicchi, Daniele Cono D'Elia, Leonardo Querzoni |
| 2024 | Exceptional Interprocedural Control Flow Graphs for x86-64 Binaries. Joshua A. Bockenek, Freek Verbeek, Binoy Ravindran |
| 2024 | Extended Abstract - Tracking Manifests - Persistent Identifiers in Progressive Web Apps. Dolière Francis Somé |
| 2024 | Extended Abstract: A Transfer Learning-Based Training Approach for DGA Classification. Arthur Drichel, Benedikt von Querfurth, Ulrike Meyer |
| 2024 | Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids. Sine Canbolat, Clemens Fruböse, Ghada Elbez, Veit Hagenmeyer |
| 2024 | Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity. Arian Soltani, D'Jeff K. Nkashama, Jordan F. Masakuna, Marc Frappier, Pierre-Martin Tardif, Froduald Kabanza |
| 2024 | Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. Alexandre D'Hondt, Charles-Henry Bertrand Van Ouytsel, Axel Legay |
| 2024 | FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids. Emad Efatinasab, Francesco Marchiori, Alessandro Brighente, Mirco Rampazzo, Mauro Conti |
| 2024 | GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer. Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stijn Volckaert, Stefan Brunthaler |
| 2024 | Inferring Recovery Steps from Cyber Threat Intelligence Reports. Zsolt Levente Kucsván, Marco Caselli, Andreas Peter, Andrea Continella |
| 2024 | Knocking on Admin's Door: Protecting Critical Web Applications with Deception. Billy Tsouvalas, Nick Nikiforakis |
| 2024 | Listening Between the Bits: Privacy Leaks in Audio Fingerprints. Moritz Pfister, Robert Michael, Max Boll, Cosima Körfer, Konrad Rieck, Daniel Arp |
| 2024 | Modularizing Directed Greybox Fuzzing for Binaries over Multiple CPU Architectures. Sofiane Benahmed, Abdullah Qasem, Anis Lounis, Mourad Debbabi |
| 2024 | Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. Trevor Dunlap, John Speed Meyers, Bradley Reaves, William Enck |
| 2024 | PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. Michele Marazzi, Patrick Jattke, Jason Zibung, Kaveh Razavi |
| 2024 | Presshammer: Rowhammer and Rowpress Without Physical Address Information. Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss |
| 2024 | S2malloc: Statistically Secure Allocator for Use-After-Free Protection and More. Ruizhe Wang, Meng Xu, N. Asokan |
| 2024 | SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables. Vivin Paliath, Erik Trickel, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili |
| 2024 | SecMonS: A Security Monitoring Framework for IEC 61850 Substations Based on Configuration Files and Logs. Onur Duman, Mengyuan Zhang, Lingyu Wang, Mourad Debbabi |
| 2024 | Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence Semantics. Anis Lounis, Anthony Andreoli, Mourad Debbabi, Aiman Hanna |
| 2024 | SmmPack: Obfuscation for SMM Modules with TPM Sealed Key. Kazuki Matsuo, Satoshi Tanda, Kuniyasu Suzaki, Yuhei Kawakoya, Tatsuya Mori |
| 2024 | Tarallo: Evading Behavioral Malware Detectors in the Problem Space. Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero |
| 2024 | Using Semgrep OSS to Find OWASP Top 10 Weaknesses in PHP Applications: A Case Study. Lukas Kree, René Helmke, Eugen Winter |
| 2024 | Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit. Florent Galtier, Guillaume Auriol, Vincent Nicomette, Paul L. R. Olivier, Romain Cayre, Mohamed Kaâniche |