EuroS&P A

43 papers

YearTitle / Authors
20227th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022
2022Captcha me if you can: Imitation Games with Reinforcement Learning.
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen
2022Compositional Information Flow Monitoring for Reactive Programs.
McKenna McCall, Abhishek Bichhawat, Limin Jia
2022CostCO: An automatic cost modeling framework for secure multi-party computation.
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
2022Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments.
Yacov Manevich, Adi Akavia
2022DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices.
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah
2022Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán
2022Dynamic Backdoor Attacks Against Machine Learning Models.
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang
2022Dynamic Policies Revisited.
Amir M. Ahmadian, Musard Balliu
2022EZEE: Epoch Parallel Zero Knowledge for ANSI C.
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
2022Fuzzing with Data Dependency Information.
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti
2022GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems.
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash
2022HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers.
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang
2022Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions.
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns
2022Hide and Seek: Revisiting DNS-based User Tracking.
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li
2022HyperLogLog: Exponentially Bad in Adversarial Settings.
Kenneth G. Paterson, Mathilde Raynal
2022Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis.
Haoyu He, Yuede Ji, H. Howie Huang
2022Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection.
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert
2022KGP Meter: Communicating Kin Genomic Privacy to the Masses.
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin
2022Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space.
Payton Walker, Nitesh Saxena
2022Lethe: Practical Data Breach Detection with Zero Persistent Secret State.
Antreas Dionysiou, Elias Athanasopoulos
2022Lightweight, Multi-Stage, Compiler-Assisted Application Specialization.
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps
2022LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit.
Mert Side, Fan Yao, Zhenkai Zhang
2022Modelling direct messaging networks with multiple recipients for cyber deception.
Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey
2022SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef
2022SIERRA: Ranking Anomalous Activities in Enterprise Networks.
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran
2022Signature Correction Attack on Dilithium Signature Scheme.
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar
2022SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward.
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda
2022SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
2022SoK: Oblivious Pseudorandom Functions.
Sílvia Casacuberta, Julia Hesse, Anja Lehmann
2022SoK: Privacy-Preserving Computing in the Blockchain Era.
Ghada Almashaqbeh, Ravital Solomon
2022SoK: The Impact of Unlabelled Data in Cyberthreat Detection.
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova
2022SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations.
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci
2022Towards Fair and Robust Classification.
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang
2022Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu
2022Transformer-based Extraction of Deep Image Models.
Verena Battis, Alexander Penner
2022Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control.
Jason Liu, Anant Kandikuppa, Adam Bates
2022TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang
2022Unrolling SGD: Understanding Factors Influencing Machine Unlearning.
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot
2022WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch.
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic
2022We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption.
Dandan Yuan, Shujie Cui, Giovanni Russello
2022aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA.
Md. Imran Hossen, Xiali Hei
2022xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64.
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi