| 2024 | (Deep) Learning of Android Access Control Recommendation from Static Execution Paths. Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan |
| 2024 | (Strong) aPAKE Revisited: Capturing Multi-User Security and Salting. Dennis Dayanikli, Anja Lehmann |
| 2024 | 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024, Vienna, Austria, July 8-12, 2024 |
| 2024 | Activity Recognition Protection for IoT Trigger-Action Platforms. Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, Musard Balliu |
| 2024 | Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis. Huaijin Wang, Zhibo Liu, Shuai Wang, Ying Wang, Qiyi Tang, Sen Nie, Shi Wu |
| 2024 | Bad Design Smells in Benchmark NIDS Datasets. Robert Flood, Gints Engelen, David Aspinall, Lieven Desmet |
| 2024 | CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process. Andrea Bisegna, Matteo Bitussi, Roberto Carbone, Luca Compagna, Silvio Ranise, Avinash Sudhodanan |
| 2024 | Can Allowlists Capture the Variability of Home IoT Device Network Behavior? Weijia He, Kevin Bryson, Ricardo Calderon, Vijay Prakash, Nick Feamster, Danny Yuxing Huang, Blase Ur |
| 2024 | Communication-Efficient Secure Logistic Regression. Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth |
| 2024 | DISC-NG: Robust Service Discovery in the Ethereum Global Network. Michal Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Matthieu Pigaglio, Ramin Sadre, Felix Lange, Etienne Rivière |
| 2024 | DNS Exfiltration Guided by Generative Adversarial Networks. Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy |
| 2024 | David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge. Miguel Costa, Sandro Pinto |
| 2024 | DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems. Hotaka Oyama, Ryo Iijima, Tatsuya Mori |
| 2024 | Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth |
| 2024 | Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function. Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann |
| 2024 | FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay |
| 2024 | Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption. Kang Hoon Lee, Young Bae Jeon, Ji Won Yoon |
| 2024 | Fingerprinting Image-to-Image Generative Adversarial Networks. Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu |
| 2024 | Gotcha: Real-Time Video Deepfake Detection via Challenge-Response. Govind Mittal, Chinmay Hegde, Nasir D. Memon |
| 2024 | Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici |
| 2024 | How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India. Koustuv Kanungo, Rahul Khatoliya, Vishrut Arora, Aairah Bari, Arani Bhattacharya, Mukulika Maity, Sambuddho Chakravarty |
| 2024 | Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks. Haonan Shi, Tu Ouyang, An Wang |
| 2024 | MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem. Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain |
| 2024 | Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs. David Schrammel, Martin Unterguggenberger, Lukas Lamster, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Stefan Mangard |
| 2024 | Message from General Chairs; EuroSP 2024. Edgar R. Weippl, Matteo Maffei |
| 2024 | Metadata Privacy Beyond Tunneling for Instant Messaging. Boel Nelson, Elena Pagnin, Aslan Askarov |
| 2024 | MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang |
| 2024 | PASA: Attack Agnostic Unsupervised Adversarial Detection Using Prediction & Attribution Sensitivity Analysis. Dipkamal Bhusal, Md Tanvirul Alam, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi |
| 2024 | Panacea: Non-Interactive and Stateless Oblivious RAM. Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park |
| 2024 | Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications. Sami Ullah, Awais Rashid |
| 2024 | Practical Constructions for Single Input Functionality Against a Dishonest Majority. Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren |
| 2024 | ProInspector: Uncovering Logical Bugs in Protocol Implementations. Zichao Zhang, Limin Jia, Corina S. Pasareanu |
| 2024 | SACfe: Secure Access Control in Functional Encryption with Unbounded Data. Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal |
| 2024 | SEKA: Secretless Key Exchange and Authentication in LiFi Networks. Eric G. Ackermann, Kai Lennert Bober, Volker Jungnickel, Anja Lehmann |
| 2024 | Secure compilation of rich smart contracts on poor UTXO blockchains. Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino |
| 2024 | Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators. Zhaojie Hu, Jingzhou Ye, Yifan Zhang, Xueqiang Wang |
| 2024 | Share with Care: Breaking E2EE in Nextcloud. Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson |
| 2024 | Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster. Han Xia, Mingsheng Wang |
| 2024 | SoK: Public Randomness. Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic |
| 2024 | SoK: SSO-MONITOR - The Current State and Future Research Directions in Single Sign-on Security Measurements. Louis Jannett, Christian Mainka, Maximilian Westers, Andreas Mayer, Tobias Wich, Vladislav Mladenov |
| 2024 | The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments. Abdullah Zubair Mohammed, Louis Jenkins, Rees R. Hatch, Gökçen Yilmaz Dayanikli, Craig Simpson, Ryan M. Gerdes, Hongjie Wang |
| 2024 | The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance. Maied Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee |
| 2024 | Trojan attribute inference attack on gradient boosting decision trees. Kunihiro Ito, Batnyam Enkhtaivan, Isamu Teranishi, Jun Sakuma |
| 2024 | Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns. Giada Stivala, Gianluca De Stefano, Andrea Mengascini, Mariano Graziano, Giancarlo Pellegrino |
| 2024 | Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, Liz Izhikevich |
| 2024 | Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs. Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert |
| 2024 | chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets. Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh |