EuroS&P A

61 papers

YearTitle / Authors
202510th IEEE European Symposium on Security and Privacy, EuroS&P 2025, Venice, Italy, June 30 - July 4, 2025
2025A Formal Security Analysis of Hyperledger AnonCreds.
Ashley Fraser, Steve Schneider
2025A Systematic Study of Practical & Formal Privacy in the 5G AKMA Procedure.
Ioana Boureanu, Stephan Wesemeyer, Fortunat Rajaona, Steve Schneider, Helen Treharne
2025AceCov: Auxiliary Composite Edge Coverage for Fuzzing.
Haruki Yoshida, Yuichi Sugiyama, Ryota Shioya
2025Active Attribute Inference Against Well-Generalized Models In Federated Learning.
Catarina Gomes, Ricardo Mendes, João P. Vilela
2025All that Glitters is not Gold: Uncovering Exposed Industrial Control Systems and Honeypots in the Wild.
Martin Mladenov, László Erdodi, Georgios Smaragdakis
2025Attacking and Fixing the Android Protected Confirmation Protocol.
Myrto Arapinis, Vincent Danos, Maïwenn Racouchot, David A. R. Robin, Thomas Zacharias
2025Beneath the Surface: An Analysis of OEM Customizations on the Android TLS Protocol Stack.
Vinuri Bandara, Stijn Pletinckx, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna, Juan Tapiador, Narseo Vallina-Rodriguez
2025Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design.
Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, Hong-Sheng Zhou
2025CHARON: Polyglot Code Analysis for Detecting Vulnerabilities in Scripting Languages Native Extensions.
Raoul Scholtes, Soheil Khodayari, Cristian-Alexandru Staicu, Giancarlo Pellegrino
2025CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models.
Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao
2025CTRAPS: CTAP Client Impersonation and API Confusion on FIDO2.
Marco Casagrande, Daniele Antonioli
2025Caiba: Multicast Source Authentication for CAN Through Reactive Bit Flipping.
Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze
2025Can You Hear Me? A First Study of VoIP Censorship Techniques in Saudi Arabia and the UAE.
Friedemann Lipphardt, Anja Feldmann, Devashish Gosain
2025Commitment Attacks on Ethereum's Reward Mechanism.
Roozbeh Sarenche, Ertem Nusret Tas, Barnabé Monnot, Caspar Schwarz-Schilling, Bart Preneel
2025CovFUZZ: Coverage-based fuzzer for 4G&5G protocols.
Ilja Siros, Dave Singelée, Bart Preneel
2025Cryptographic Commitments on Anonymizable Data.
Xavier Bultel, Céline Chevalier, Charlène Jojon, Diandian Liu, Benjamin Nguyen
2025Cybersquatting in Web3: The Case of NFT.
Kai Ma, Ningyu He, Jintao Huang, Bosi Zhang, Ping Wu, Haoyu Wang
2025Deep Unlearn: Benchmarking Machine Unlearning for Image Classification.
Xavier F. Cadet, Anastasia Borovykh, Mohammad Malekzadeh, Sara Ahmadi-Abhari, Hamed Haddadi
2025Demystifying the Perceptions Gap Between Designers and Practitioners in Two Security Standards.
Shreyas Kumar, Evelyn Crowe, Guofei Gu
2025Divide and Conquer: Introducing Partial Multi-Variant Execution.
Jonas Vinck, Adriaan Jacobs, Alexios Voulimeneas, Stijn Volckaert
2025Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution.
Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
2025Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem.
Thomas Johansson, Mustafa Khairallah, Vu Nguyen
2025Endless Subscriptions: Open RAN is Open to RIC E2 Subscription Denial of Service Attacks.
Felix Klement, Alessandro Brighente, Anup Kiran Bhattacharjee, Stefano Cecconello, Fernando Kuipers, Georgios Smaragdakis, Mauro Conti, Stefan Katzenbeisser
2025Enhancing Cybersecurity Awareness in Small and Medium Enterprises Through a User-Friendly Risk Assessment Tool.
Miriam Curtin, Brian Sheehan, Melanie Gruben, Gillian O'Carroll, Hazel Murray
2025Exploring the Design Space for Security Warnings in Immersive Environments.
Andrea Mengascini, Rebecca Weil, Annabelle Walle, Jürgen Steimle, Giancarlo Pellegrino
2025Harmless Backdoor-based Client-side Watermarking in Federated Learning.
Kaijing Luo, Ka-Ho Chow
2025Incentivizing Security Excellence in Cyber Liability Insurance.
Shreyas Kumar, Paula deWitte, Guofei Gu
2025Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications.
Syed Mahbub Hafiz, Bahattin Yildiz, Marcos A. Simplício Jr., Thales B. Paiva, Henrique S. Ogawa, Gabrielle De Micheli, Eduardo Lopes Cominetti
2025KubeKeeper: Protecting Kubernetes Secrets Against Excessive Permissions.
Maryam Rostamipoor, AliAkbar Sadeghi, Michalis Polychronakis
2025LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation.
Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos
2025Latte: Layered Attestation for Portable Enclaved Applications.
Haoxuan Xu, Jia Xiang, Zhen Huang, Guoxing Chen, Yan Meng, Haojin Zhu
2025LeapFrog: The Rowhammer Instruction Skip Attack.
Andrew J. Adiletta, M. Caner Tol, Kemal Derya, Berk Sunar, Saad Islam
2025LegoLog: A configurable transparency log.
Vivian Fang, Emma Dauterman, Akshay Ravoor, Akshit Dewan, Raluca Ada Popa
2025LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing.
Elia Geretto, Andrea Jemmett, Cristiano Giuffrida, Herbert Bos
2025MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning.
Jiliang Li, Yifan Zhang, Yu Huang, Kevin Leach
2025Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors.
Truong Son Nguyen, Tancrède Lepoint, Ni Trieu
2025Not in The Prophecies: Practical Attacks on Nostr.
Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe
2025O'MINE: A Novel Collaborative DDoS Detection Mechanism for Programmable Data-Planes.
Enkeleda Bardhi, Chenxing Ji, Ali Imran, Muhammad Shahbaz, Riccardo Lazzeretti, Mauro Conti, Fernando Kuipers
2025On the Lack of Robustness of Binary Function Similarity Systems.
Gianluca Capozzi, Tong Tang, Jie Wan, Ziqi Yang, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Lorenzo Cavallaro, Leonardo Querzoni
2025Pfuzzer: Practical, Sound, and Effective Multi-path Analysis of Environment-sensitive Malware with Coverage-guided Fuzzing.
Nicola Bottura, Daniele Cono D'Elia, Leonardo Querzoni
2025Port Forwarding Services Are Forwarding Security Risks.
Haoyuan Wang, Yue Xue, Xuan Feng, Chao Zhou, Xianghang Mi
2025PreFence: A Fine-Grained and Scheduling-Aware Defense Against Prefetching-Based Attacks.
Till Schlüter, Nils Ole Tippenhauer
2025Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging.
Matej Bölcskei, Patrick Jattke, Johannes Wikner, Kaveh Razavi
2025SPARK: Secure Privacy-Preserving Anonymous Swarm Attestation for In-Vehicle Networks.
Wouter Hellemans, Nada El Kassem, Md Masoom Rabbani, Edlira Dushku, Liqun Chen, An Braeken, Bart Preneel, Nele Mentens
2025Sandi: A System for Accountability.
F. Betül Durak, Kim Laine, Simon Langowski, Radames Cruz Moreno
2025Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions.
Dennis Faut, Julia Hesse, Lisa Kohl, Andy Rupp
2025Sequentially Consistent Concurrent Encrypted Multimaps.
Archita Agarwal, Zachary Espiritu
2025Shaking up authenticated encryption.
Joan Daemen, Seth Hoffert, Silvia Mella, Gilles Van Assche, Ronny Van Keer
2025SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet?
Magdalena Steinböck, Jens Troost, Wilco Van Beijnum, Jan Seredynski, Herbert Bos, Martina Lindorfer, Andrea Continella
2025SoK: No Goto, No Cry? The Fairy Tale of Flawless Control-Flow Structuring.
Eva-Maria C. Behner, Steffen Enders, Elmar Padilla
2025SoK: Security of EMV Contactless Payment Systems.
Mahshid Mehr Nezhad, Feng Hao, Gregory Epiphaniou, Carsten Maple, Timur Yunusov
2025SoK: Systematization and Benchmarking of Deepfake Detectors in a Unified Framework.
Binh Minh Le, Jiwon Kim, Simon S. Woo, Kristen Moore, Alsharif Abuadbba, Shahroz Tariq
2025TAPShield: Securing Trigger-Action Platforms against Strong Attackers.
Mojtaba Moazen, Nicolae Paladi, Adnan Jamil Ahsan, Musard Balliu
2025The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS.
Céline Chevalier, Guirec Lebrun, Ange Martinelli, Jérôme Plût
2025The Danger of Packet Length Leakage: Off-path TCP/IP Hijacking Attacks Against Wireless and Mobile Networks.
Guancheng Li, Minghao Zhang, Jianjun Chen, Ge Dai, Pinji Chen, Huiming Liu, Yang Yu, Haixin Duan, Zhiyun Qian
2025They See Me Scooting - A Long-Term Real-World Data Analysis of Shared Micro-Mobility Services and their Privacy Leakage.
Karina Elzer, Eric Jedermann, Stefanie Roos, Jens B. Schmitt
2025WWXSS: Systematic Study, and Large-Scale Measurement of Cross-Site Scripting (XSS) in Web Workers Contexts.
Dolière Francis Somé
2025You Can't Trust Your Tag Neither: Privacy Leaks and Potential Legal Violations within the Google Tag Manager.
Gilles Mertens, Nataliia Bielova, Vincent Roca, Cristiana Teixeira Santos
2025Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data.
Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Andrea Valori
2025openIPE: An Extensible Memory Isolation Framework for Microcontrollers.
Marton Bognar, Jo Van Bulck