EuroS&P A

64 papers

YearTitle / Authors
2023"Act natural!": Exchanging Private Messages on Public Blockchains.
Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz
20238th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023
2023A Certified Radius-Guided Attack Framework to Image Segmentation Models.
Wenjie Qu, Youqi Li, Binghui Wang
2023A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs.
Owen Millwood, Meltem Kurt Pehlivanoglu, Aryan Mohammadi Pasikhani, Jack Miskelly, Prosanta Gope, Elif Bilge Kavun
2023Active Countermeasures for Email Fraud.
Wentao Chen, Fuzhou Wang, Matthew Edwards
2023An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph.
Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad
2023Android, Notify Me When It Is Time To Go Phishing.
Antonio Ruggia, Andrea Possemato, Alessio Merlo, Dario Nisi, Simone Aonzo
2023Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives.
Jonas Bushart, Christian Rossow
2023AoT - Attack on Things: A security analysis of IoT firmware updates.
Muhammad Ibrahim, Andrea Continella, Antonio Bianchi
2023Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices.
Nick Frymann, Daniel Gardham, Mark Manulis
2023Automatic verification of transparency protocols.
Vincent Cheval, José Moreira, Mark Ryan
2023Been Here Already? Detecting Synchronized Browsers in the Wild.
Pantelina Ioannou, Elias Athanasopoulos
2023CHERI-TrEE: Flexible enclaves on capability machines.
Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald, Frank Piessens, Dominique Devriese
2023Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol.
Felix Günther, Marc Ilunga Tshibumbu Mukendi
2023Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.
Stijn Pletinckx, Thanh-Dat Nguyen, Tobias Fiebig, Christopher Kruegel, Giovanni Vigna
2023Chex-Mix: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud.
Deepika Natarajan, Andrew D. Loveless, Wei Dai, Ronald G. Dreslinski
2023Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API.
José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador
2023Code Vulnerability Detection via Signal-Aware Learning.
Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana
2023CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs.
Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert
2023Comprehensively Analyzing the Impact of Cyberattacks on Power Grids.
Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze
2023Conjunctive Searchable Symmetric Encryption from Hard Lattices.
Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay
2023Coverage and Secure Use Analysis of Content Security Policies via Clustering.
Mengxia Ren, Chuan Yue
2023DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs.
Daniel Kirkman, Kami Vaniea, Daniel W. Woods
2023EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation.
Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi
2023Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian
2023Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis.
Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves
2023Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy.
Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage
2023From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake.
Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan
2023Fuzzing SGX Enclaves via Host Program Mutations.
Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian
2023GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks.
Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini
2023Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery.
Tom Ganz, Philipp Rall, Martin Härterich, Konrad Rieck
2023MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments.
Rongwu Xu, Sen Yang, Fan Zhang, Zhixuan Fang
2023Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors.
Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen
2023MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling.
Marton Bognar, Hans Winderix, Jo Van Bulck, Frank Piessens
2023Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance.
Vivek Nair, Dawn Song
2023NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs.
Darion Cassel, Wai Tuck Wong, Limin Jia
2023Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation.
Anrin Chakraborti, Michael K. Reiter
2023Privformer: Privacy-preserving Transformer with MPC.
Yoshimasa Akimoto, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma
2023Proof-of-Learning is Currently More Broken Than You Think.
Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot
2023Protecting Voice-Controllable Devices Against Self-Issued Voice Commands.
Sergio Esposito, Daniele Sgandurra, Giampaolo Bella
2023Provable Adversarial Safety in Cyber-Physical Systems.
John Henry Castellanos, Mohamed Maghenem, Alvaro A. Cárdenas, Ricardo G. Sanfelice, Jianying Zhou
2023Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation.
Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot
2023Recurring Contingent Service Payment.
Aydin Abadi, Steven J. Murdoch, Thomas Zacharias
2023Revelio: A Network-Level Privacy Attack in the Lightning Network.
Theo von Arx, Muoi Tran, Laurent Vanbever
2023SIM: Secure Interval Membership Testing and Applications to Secure Comparison.
Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji
2023SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting).
Jack P. K. Ma, Sherman S. M. Chow
2023SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities.
Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed
2023SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots.
Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch
2023SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations.
Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström
2023SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh
2023SoK: Data Sovereignty.
Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song
2023SoK: Explainable Machine Learning for Computer Security Applications.
Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer
2023SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection.
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
2023SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Yuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang
2023Systematic Improvement of Access-Stratum Security in Mobile Networks.
Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Zhili Sun, Hemant Zope
2023Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code.
Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer
2023Towards Fine-Grained Localization of Privacy Behaviors.
Vijayanta Jain, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan
2023Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild.
Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, Xiaofeng Wang, Kai Li
2023Understanding, Measuring, and Detecting Modern Technical Support Scams.
Jienan Liu, Pooja Pun, Phani Vadrevu, Roberto Perdisci
2023Watermarking Graph Neural Networks based on Backdoor Attacks.
Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek
2023When the Curious Abandon Honesty: Federated Learning Is Not Private.
Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot
2023You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks.
Alyssa Milburn, Ke Sun, Henrique Kawakami
2023faulTPM: Exposing AMD fTPMs' Deepest Secrets.
Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert
2023smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption.
Ravital Solomon, Rick Weber, Ghada Almashaqbeh