NDSS A*

141 papers

YearTitle / Authors
202431st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024
202450 Shades of Support: A Device-Centric Analysis of Android Security Updates.
Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac
20245G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin
2024A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue
2024A Security and Usability Analysis of Local Attacks Against FIDO2.
Tarun Kumar Yadav, Kent E. Seamons
2024A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance.
Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou
2024A Unified Symbolic Analysis of WireGuard.
Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault
2024AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials.
Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou
2024Abusing the Ethereum Smart Contract Verification Services for Fun and Profit.
Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo
2024Acoustic Keystroke Leakage on Smart Televisions.
Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann
2024ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token.
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren
2024AnonPSI: An Anonymity Assessment Framework for PSI.
Bo Jiang, Jian Du, Qiang Yan
2024Architecting Trigger-Action Platforms for Security, Performance and Functionality.
Deepak Sirone Jegan, Michael M. Swift, Earlence Fernandes
2024Attributions for ML-based ICS Anomaly Detection: From Theory to Practice.
Clement Fung, Eric Zeng, Lujo Bauer
2024Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning.
Torsten Krauß, Jan König, Alexandra Dmitrienko, Christian Kanzow
2024Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization.
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang
2024BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks.
Cameron Morris, Amir Herzberg, Bing Wang, Samuel Secondo
2024Bernoulli Honeywords.
Ke Coby Wang, Michael K. Reiter
2024Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang
2024BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking.
Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan
2024BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang, Mingming Zhang, Linkai Zheng, Xiang Li, Jianjun Chen, Haixin Duan, Yanzhong Lin, Qingfeng Pan
2024CAGE: Complementing Arm CCA with GPU Extensions.
Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He
2024CP-IoT: A Cross-Platform Monitoring System for Smart Home.
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan
2024CamPro: Camera-based Anti-Facial Recognition.
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu
2024Certificate Transparency Revisited: The Public Inspections on Third-party Monitors.
Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li
2024Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
Shu Wang, Kun Sun, Qi Li
2024Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware.
Ryan Pickren, Tohid Shekari, Saman A. Zonouz, Raheem Beyah
2024Content Censorship in the InterPlanetary File System.
Srivatsan Sridhar, Onur Ascigil, Navin V. Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michal Król
2024Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models.
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li
2024CrowdGuard: Federated Backdoor Detection in Federated Learning.
Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi
2024DEMASQ: Unmasking the ChatGPT Wordsmith.
Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi
2024DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs.
Hanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin
2024DeGPT: Optimizing Decompiler Output with LLM.
Peiwei Hu, Ruigang Liang, Kai Chen
2024Decentralized Information-Flow Control for ROS2.
Nishit V. Pandya, Himanshu Kumar, Gokulnath Pillai, Vinod Ganapathy
2024DeepGo: Predictive Directed Greybox Fuzzing.
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu
2024Detecting Voice Cloning Attacks via Timbre Watermarking.
Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu
2024Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome.
Marian Harbach, Igor Bilogrevic, Enrico Bacis, Serena Chen, Ravjit Uppal, Andy Paicu, Elias Klim, Meggyn Watkins, Balazs Engedy
2024DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang
2024DynPRE: Protocol Reverse Engineering via Dynamic Inference.
Zhengxiong Luo, Kai Liang, Yanyang Zhao, Feifan Wu, Junze Yu, Heyuan Shi, Yu Jiang
2024EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu
2024Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR.
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li
2024Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality.
Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, Zhisheng Yan
2024Efficient Use-After-Free Prevention with Opportunistic Page-Level Sweeping.
Chanyoung Park, Hyungon Moon
2024Efficient and Timely Revocation of V2X Credentials.
Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg
2024EnclaveFuzz: Finding Vulnerabilities in SGX Applications.
Liheng Chen, Zheming Li, Zheyu Ma, Yuan Li, Baojian Chen, Chao Zhang
2024Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack.
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu
2024Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning.
Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes
2024Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu
2024FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting.
Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro
2024Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation.
Jiameng Shi, Wenqiang Li, Wenwen Wang, Le Guan
2024Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis.
Zicong Gao, Chao Zhang, Hangtian Liu, Wenhou Sun, Zhizhuo Tang, Liehui Jiang, Jianjun Chen, Yong Xie
2024Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone.
Nimish Mishra, Anirban Chakraborty, Debdeep Mukhopadhyay
2024File Hijacking Vulnerability: The Elephant in the Room.
Chendong Yu, Yang Xiao, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang, Jingyi Shi, Defang Bo, Wei Huo
2024Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum.
Daniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos
2024FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi
2024From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li
2024From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation.
Shahriar Ebrahimi, Parisa Hassanizadeh
2024Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus.
Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate
2024GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity.
Qiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu
2024GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu
2024Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang
2024GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks.
Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan
2024Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
2024HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu
2024IDA: Hybrid Attestation with Support for Interrupts and TOCTOU.
Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh
2024IRRedicator: Pruning IRR with RPKI-Valid BGP Insights.
Minhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung
2024IdleLeak: Exploiting Idle State Side Effects for Information Leakage.
Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss
2024Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang
2024Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu
2024Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection.
Yarin Ozery, Asaf Nadler, Asaf Shabtai
2024Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception.
Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi
2024K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel.
Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian
2024LARMix: Latency-Aware Routing in Mix Networks.
Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz
2024LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems.
Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu
2024LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors.
Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen
2024Large Language Model guided Protocol Fuzzing.
Ruijie Meng, Martin Mirchev, Marcel Böhme, Abhik Roychoudhury
2024Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Jiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang
2024LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies.
Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen
2024Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms.
Xigao Li, Amir Rahmati, Nick Nikiforakis
2024LoRDMA: A New Low-Rate DoS Attack in RDMA Networks.
Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang
2024Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li
2024MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots.
Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu
2024MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen
2024MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models.
Qi Pang, Yuanyuan Yuan, Shuai Wang
2024MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars.
David Hunt, Kristen Angell, Zhenzhou Qi, Tingjun Chen, Miroslav Pajic
2024Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang
2024MirageFlow: A New Bandwidth Inflation Attack on Tor.
Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala
2024Modeling and Detecting Internet Censorship Events.
Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi
2024NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li
2024Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.
Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
2024ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning.
Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang
2024On Precisely Detecting Censorship Circumvention in Real-World Networks.
Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen
2024Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction.
Zitao Chen, Karthik Pattabiraman
2024Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models.
Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu
2024Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu
2024Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar, Makan Pourzandi
2024Pisces: Private and Compliable Cryptocurrency Exchange.
Ya-Nan Li, Tian Qiu, Qiang Tang
2024Powers of Tau in Asynchrony.
Sourav Das, Zhuolun Xiang, Ling Ren
2024Predictive Context-sensitive Fuzzing.
Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida
2024PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng
2024PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li
2024Private Aggregate Queries to Untrusted Databases.
Syed Mahbub Hafiz, Chitrabhanu Gupta, Warren Wnuck, Brijesh Vora, Chen-Nee Chuah
2024Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth.
Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, Anand SVR, Himanshu Tyagi, Pramod Viswanath
2024QUACK: Hindering Deserialization Attacks via Static Duck Typing.
Yaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang
2024REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices.
Asbat El Khairi, Marco Caselli, Andreas Peter, Andrea Continella
2024ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo, Haixin Duan, Jianjun Chen, Chao Zhang, Kaiwen Shen
2024SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification.
Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim
2024SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems.
Guangke Chen, Yedi Zhang, Fu Song
2024SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning.
Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng
2024Scrappy: SeCure Rate Assuring Protocol with PrivacY.
Kosei Akama, Yoshimichi Nakatsuka, Masaaki Sato, Keisuke Uehara
2024Secret-Shared Shuffle with Malicious Security.
Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang
2024Secure Multiparty Computation of Threshold Signatures Made More Efficient.
Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow
2024Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols.
Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang
2024Separation is Good: A Faster Order-Fairness Byzantine Consensus.
Ke Mu, Bo Yin, Alia Asheralieva, Xuetao Wei
2024ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection.
Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen
2024Sharing cyber threat intelligence: Does it really help?
Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim
2024SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing.
Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin
2024Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta
2024Symphony: Path Validation at Scale.
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren
2024SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem.
Xiaochen Zou, Yu Hao, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian
2024TALISMAN: Tamper Analysis for Reference Monitors.
Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang
2024TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs.
Kerem Arikan, Abraham Farrell, Williams Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev
2024TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song
2024The CURE to Vulnerabilities in RPKI Validation.
Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner
2024The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model.
Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik
2024Timing Channels in Adaptive Neural Networks.
Ayomide Akinsanya, Tegan Brennan
2024Towards Automated Regulation Analysis for Effective Privacy Compliance.
Sunil Manandhar, Kapil Singh, Adwait Nadkarni
2024Towards Precise Reporting of Cryptographic Misuses.
Yikang Chen, Yibo Liu, Ka Lok Wu, Duc Viet Le, Sze Yiu Chau
2024Transpose Attack: Stealing Datasets with Bidirectional Training.
Guy Amit, Moshe Levy, Yisroel Mirsky
2024TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts.
Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar
2024Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed.
Lancheng Qin, Li Chen, Dan Li, Honglin Ye, Yutian Wang
2024Understanding and Analyzing Appraisal Systems in the Underground Marketplaces.
Zhengyi Li, Xiaojing Liao
2024Understanding the Implementation and Security Implications of Protective DNS Services.
Mingxuan Liu, Yiming Zhang, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Xiaofeng Zheng
2024UniID: Spoofing Face Authentication System by Universal Identity.
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu
2024Untangle: Multi-Layer Web Server Fingerprinting.
Cem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda
2024UntrustIDE: Exploiting Weaknesses in VS Code Extensions.
Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos
2024Unus pro omnibus: Multi-Client Searchable Encryption via Access Control.
Jiafan Wang, Sherman S. M. Chow
2024VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities.
Levi Taiji Li, Ningyu He, Haoyu Wang, Mu Zhang
2024When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications.
Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy
2024You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks.
Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang
2024dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository.
Yingying Su, Dan Li, Li Chen, Qi Li, Sitong Ling