EuroS&P A

47 papers

YearTitle / Authors
2024(Deep) Learning of Android Access Control Recommendation from Static Execution Paths.
Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan
2024(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting.
Dennis Dayanikli, Anja Lehmann
20249th IEEE European Symposium on Security and Privacy, EuroS&P 2024, Vienna, Austria, July 8-12, 2024
2024Activity Recognition Protection for IoT Trigger-Action Platforms.
Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, Musard Balliu
2024Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis.
Huaijin Wang, Zhibo Liu, Shuai Wang, Ying Wang, Qiyi Tang, Sen Nie, Shi Wu
2024Bad Design Smells in Benchmark NIDS Datasets.
Robert Flood, Gints Engelen, David Aspinall, Lieven Desmet
2024CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process.
Andrea Bisegna, Matteo Bitussi, Roberto Carbone, Luca Compagna, Silvio Ranise, Avinash Sudhodanan
2024Can Allowlists Capture the Variability of Home IoT Device Network Behavior?
Weijia He, Kevin Bryson, Ricardo Calderon, Vijay Prakash, Nick Feamster, Danny Yuxing Huang, Blase Ur
2024Communication-Efficient Secure Logistic Regression.
Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2024DISC-NG: Robust Service Discovery in the Ethereum Global Network.
Michal Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Matthieu Pigaglio, Ramin Sadre, Felix Lange, Etienne Rivière
2024DNS Exfiltration Guided by Generative Adversarial Networks.
Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy
2024David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge.
Miguel Costa, Sandro Pinto
2024DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems.
Hotaka Oyama, Ryo Iijima, Tatsuya Mori
2024Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments.
Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth
2024Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function.
Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann
2024FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE.
Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay
2024Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption.
Kang Hoon Lee, Young Bae Jeon, Ji Won Yoon
2024Fingerprinting Image-to-Image Generative Adversarial Networks.
Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu
2024Gotcha: Real-Time Video Deepfake Detection via Challenge-Response.
Govind Mittal, Chinmay Hegde, Nasir D. Memon
2024Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici
2024How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India.
Koustuv Kanungo, Rahul Khatoliya, Vishrut Arora, Aairah Bari, Arani Bhattacharya, Mukulika Maity, Sambuddho Chakravarty
2024Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks.
Haonan Shi, Tu Ouyang, An Wang
2024MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem.
Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain
2024Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs.
David Schrammel, Martin Unterguggenberger, Lukas Lamster, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Stefan Mangard
2024Message from General Chairs; EuroSP 2024.
Edgar R. Weippl, Matteo Maffei
2024Metadata Privacy Beyond Tunneling for Instant Messaging.
Boel Nelson, Elena Pagnin, Aslan Askarov
2024MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search.
Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang
2024PASA: Attack Agnostic Unsupervised Adversarial Detection Using Prediction & Attribution Sensitivity Analysis.
Dipkamal Bhusal, Md Tanvirul Alam, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi
2024Panacea: Non-Interactive and Stateless Oblivious RAM.
Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park
2024Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications.
Sami Ullah, Awais Rashid
2024Practical Constructions for Single Input Functionality Against a Dishonest Majority.
Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren
2024ProInspector: Uncovering Logical Bugs in Protocol Implementations.
Zichao Zhang, Limin Jia, Corina S. Pasareanu
2024SACfe: Secure Access Control in Functional Encryption with Unbounded Data.
Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal
2024SEKA: Secretless Key Exchange and Authentication in LiFi Networks.
Eric G. Ackermann, Kai Lennert Bober, Volker Jungnickel, Anja Lehmann
2024Secure compilation of rich smart contracts on poor UTXO blockchains.
Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino
2024Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators.
Zhaojie Hu, Jingzhou Ye, Yifan Zhang, Xueqiang Wang
2024Share with Care: Breaking E2EE in Nextcloud.
Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson
2024Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster.
Han Xia, Mingsheng Wang
2024SoK: Public Randomness.
Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic
2024SoK: SSO-MONITOR - The Current State and Future Research Directions in Single Sign-on Security Measurements.
Louis Jannett, Christian Mainka, Maximilian Westers, Andreas Mayer, Tobias Wich, Vladislav Mladenov
2024The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments.
Abdullah Zubair Mohammed, Louis Jenkins, Rees R. Hatch, Gökçen Yilmaz Dayanikli, Craig Simpson, Ryan M. Gerdes, Hongjie Wang
2024The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance.
Maied Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee
2024Trojan attribute inference attack on gradient boosting decision trees.
Kunihiro Ito, Batnyam Enkhtaivan, Isamu Teranishi, Jun Sakuma
2024Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns.
Giada Stivala, Gianluca De Stefano, Andrea Mengascini, Mariano Graziano, Giancarlo Pellegrino
2024Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild.
Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, Liz Izhikevich
2024Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs.
Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert
2024chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets.
Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh