| 2024 | 31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024 |
| 2024 | 50 Shades of Support: A Device-Centric Analysis of Android Security Updates. Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac |
| 2024 | 5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin |
| 2024 | A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue |
| 2024 | A Security and Usability Analysis of Local Attacks Against FIDO2. Tarun Kumar Yadav, Kent E. Seamons |
| 2024 | A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou |
| 2024 | A Unified Symbolic Analysis of WireGuard. Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault |
| 2024 | AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou |
| 2024 | Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo |
| 2024 | Acoustic Keystroke Leakage on Smart Televisions. Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann |
| 2024 | ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token. Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren |
| 2024 | AnonPSI: An Anonymity Assessment Framework for PSI. Bo Jiang, Jian Du, Qiang Yan |
| 2024 | Architecting Trigger-Action Platforms for Security, Performance and Functionality. Deepak Sirone Jegan, Michael M. Swift, Earlence Fernandes |
| 2024 | Attributions for ML-based ICS Anomaly Detection: From Theory to Practice. Clement Fung, Eric Zeng, Lujo Bauer |
| 2024 | Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning. Torsten Krauß, Jan König, Alexandra Dmitrienko, Christian Kanzow |
| 2024 | Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization. Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang |
| 2024 | BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks. Cameron Morris, Amir Herzberg, Bing Wang, Samuel Secondo |
| 2024 | Bernoulli Honeywords. Ke Coby Wang, Michael K. Reiter |
| 2024 | Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang |
| 2024 | BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan |
| 2024 | BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet. Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang, Mingming Zhang, Linkai Zheng, Xiang Li, Jianjun Chen, Haixin Duan, Yanzhong Lin, Qingfeng Pan |
| 2024 | CAGE: Complementing Arm CCA with GPU Extensions. Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He |
| 2024 | CP-IoT: A Cross-Platform Monitoring System for Smart Home. Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan |
| 2024 | CamPro: Camera-based Anti-Facial Recognition. Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu |
| 2024 | Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li |
| 2024 | Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. Shu Wang, Kun Sun, Qi Li |
| 2024 | Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware. Ryan Pickren, Tohid Shekari, Saman A. Zonouz, Raheem Beyah |
| 2024 | Content Censorship in the InterPlanetary File System. Srivatsan Sridhar, Onur Ascigil, Navin V. Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michal Król |
| 2024 | Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li |
| 2024 | CrowdGuard: Federated Backdoor Detection in Federated Learning. Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi |
| 2024 | DEMASQ: Unmasking the ChatGPT Wordsmith. Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi |
| 2024 | DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs. Hanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin |
| 2024 | DeGPT: Optimizing Decompiler Output with LLM. Peiwei Hu, Ruigang Liang, Kai Chen |
| 2024 | Decentralized Information-Flow Control for ROS2. Nishit V. Pandya, Himanshu Kumar, Gokulnath Pillai, Vinod Ganapathy |
| 2024 | DeepGo: Predictive Directed Greybox Fuzzing. Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu |
| 2024 | Detecting Voice Cloning Attacks via Timbre Watermarking. Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu |
| 2024 | Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome. Marian Harbach, Igor Bilogrevic, Enrico Bacis, Serena Chen, Ravjit Uppal, Andy Paicu, Elias Klim, Meggyn Watkins, Balazs Engedy |
| 2024 | DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses. Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang |
| 2024 | DynPRE: Protocol Reverse Engineering via Dynamic Inference. Zhengxiong Luo, Kai Liang, Yanyang Zhao, Feifan Wu, Junze Yu, Heyuan Shi, Yu Jiang |
| 2024 | EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu |
| 2024 | Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li |
| 2024 | Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality. Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, Zhisheng Yan |
| 2024 | Efficient Use-After-Free Prevention with Opportunistic Page-Level Sweeping. Chanyoung Park, Hyungon Moon |
| 2024 | Efficient and Timely Revocation of V2X Credentials. Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg |
| 2024 | EnclaveFuzz: Finding Vulnerabilities in SGX Applications. Liheng Chen, Zheming Li, Zheyu Ma, Yuan Li, Baojian Chen, Chao Zhang |
| 2024 | Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack. Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu |
| 2024 | Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning. Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes |
| 2024 | Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu |
| 2024 | FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting. Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro |
| 2024 | Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation. Jiameng Shi, Wenqiang Li, Wenwen Wang, Le Guan |
| 2024 | Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis. Zicong Gao, Chao Zhang, Hangtian Liu, Wenhou Sun, Zhizhuo Tang, Liehui Jiang, Jianjun Chen, Yong Xie |
| 2024 | Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone. Nimish Mishra, Anirban Chakraborty, Debdeep Mukhopadhyay |
| 2024 | File Hijacking Vulnerability: The Elephant in the Room. Chendong Yu, Yang Xiao, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang, Jingyi Shi, Defang Bo, Wei Huo |
| 2024 | Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum. Daniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos |
| 2024 | FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi |
| 2024 | From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li |
| 2024 | From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation. Shahriar Ebrahimi, Parisa Hassanizadeh |
| 2024 | Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus. Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate |
| 2024 | GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity. Qiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu |
| 2024 | GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu |
| 2024 | Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang |
| 2024 | GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan |
| 2024 | Group-based Robustness: A General Framework for Customized Robustness in the Real World. Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif |
| 2024 | HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu |
| 2024 | IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh |
| 2024 | IRRedicator: Pruning IRR with RPKI-Valid BGP Insights. Minhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung |
| 2024 | IdleLeak: Exploiting Idle State Side Effects for Information Leakage. Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss |
| 2024 | Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang |
| 2024 | Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu |
| 2024 | Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection. Yarin Ozery, Asaf Nadler, Asaf Shabtai |
| 2024 | Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception. Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi |
| 2024 | K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel. Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian |
| 2024 | LARMix: Latency-Aware Routing in Mix Networks. Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz |
| 2024 | LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems. Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu |
| 2024 | LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen |
| 2024 | Large Language Model guided Protocol Fuzzing. Ruijie Meng, Martin Mirchev, Marcel Böhme, Abhik Roychoudhury |
| 2024 | Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem. Jiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang |
| 2024 | LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies. Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen |
| 2024 | Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms. Xigao Li, Amir Rahmati, Nick Nikiforakis |
| 2024 | LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang |
| 2024 | Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li |
| 2024 | MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots. Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu |
| 2024 | MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen |
| 2024 | MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models. Qi Pang, Yuanyuan Yuan, Shuai Wang |
| 2024 | MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars. David Hunt, Kristen Angell, Zhenzhou Qi, Tingjun Chen, Miroslav Pajic |
| 2024 | Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang |
| 2024 | MirageFlow: A New Bandwidth Inflation Attack on Tor. Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala |
| 2024 | Modeling and Detecting Internet Censorship Events. Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi |
| 2024 | NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li |
| 2024 | Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts. Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
| 2024 | ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang |
| 2024 | On Precisely Detecting Censorship Circumvention in Real-World Networks. Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen |
| 2024 | Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction. Zitao Chen, Karthik Pattabiraman |
| 2024 | Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu |
| 2024 | Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu |
| 2024 | Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences. Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar, Makan Pourzandi |
| 2024 | Pisces: Private and Compliable Cryptocurrency Exchange. Ya-Nan Li, Tian Qiu, Qiang Tang |
| 2024 | Powers of Tau in Asynchrony. Sourav Das, Zhuolun Xiang, Ling Ren |
| 2024 | Predictive Context-sensitive Fuzzing. Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida |
| 2024 | PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng |
| 2024 | PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound. Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li |
| 2024 | Private Aggregate Queries to Untrusted Databases. Syed Mahbub Hafiz, Chitrabhanu Gupta, Warren Wnuck, Brijesh Vora, Chen-Nee Chuah |
| 2024 | Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth. Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, Anand SVR, Himanshu Tyagi, Pramod Viswanath |
| 2024 | QUACK: Hindering Deserialization Attacks via Static Duck Typing. Yaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang |
| 2024 | REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices. Asbat El Khairi, Marco Caselli, Andreas Peter, Andrea Continella |
| 2024 | ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing. Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo, Haixin Duan, Jianjun Chen, Chao Zhang, Kaiwen Shen |
| 2024 | SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification. Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim |
| 2024 | SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems. Guangke Chen, Yedi Zhang, Fu Song |
| 2024 | SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng |
| 2024 | Scrappy: SeCure Rate Assuring Protocol with PrivacY. Kosei Akama, Yoshimichi Nakatsuka, Masaaki Sato, Keisuke Uehara |
| 2024 | Secret-Shared Shuffle with Malicious Security. Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang |
| 2024 | Secure Multiparty Computation of Threshold Signatures Made More Efficient. Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow |
| 2024 | Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang |
| 2024 | Separation is Good: A Faster Order-Fairness Byzantine Consensus. Ke Mu, Bo Yin, Alia Asheralieva, Xuetao Wei |
| 2024 | ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection. Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen |
| 2024 | Sharing cyber threat intelligence: Does it really help? Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim |
| 2024 | SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing. Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin |
| 2024 | Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta |
| 2024 | Symphony: Path Validation at Scale. Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren |
| 2024 | SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem. Xiaochen Zou, Yu Hao, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian |
| 2024 | TALISMAN: Tamper Analysis for Reference Monitors. Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang |
| 2024 | TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs. Kerem Arikan, Abraham Farrell, Williams Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev |
| 2024 | TextGuard: Provable Defense against Backdoor Attacks on Text Classification. Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song |
| 2024 | The CURE to Vulnerabilities in RPKI Validation. Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner |
| 2024 | The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model. Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik |
| 2024 | Timing Channels in Adaptive Neural Networks. Ayomide Akinsanya, Tegan Brennan |
| 2024 | Towards Automated Regulation Analysis for Effective Privacy Compliance. Sunil Manandhar, Kapil Singh, Adwait Nadkarni |
| 2024 | Towards Precise Reporting of Cryptographic Misuses. Yikang Chen, Yibo Liu, Ka Lok Wu, Duc Viet Le, Sze Yiu Chau |
| 2024 | Transpose Attack: Stealing Datasets with Bidirectional Training. Guy Amit, Moshe Levy, Yisroel Mirsky |
| 2024 | TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts. Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar |
| 2024 | Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed. Lancheng Qin, Li Chen, Dan Li, Honglin Ye, Yutian Wang |
| 2024 | Understanding and Analyzing Appraisal Systems in the Underground Marketplaces. Zhengyi Li, Xiaojing Liao |
| 2024 | Understanding the Implementation and Security Implications of Protective DNS Services. Mingxuan Liu, Yiming Zhang, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Xiaofeng Zheng |
| 2024 | UniID: Spoofing Face Authentication System by Universal Identity. Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu |
| 2024 | Untangle: Multi-Layer Web Server Fingerprinting. Cem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda |
| 2024 | UntrustIDE: Exploiting Weaknesses in VS Code Extensions. Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos |
| 2024 | Unus pro omnibus: Multi-Client Searchable Encryption via Access Control. Jiafan Wang, Sherman S. M. Chow |
| 2024 | VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities. Levi Taiji Li, Ningyu He, Haoyu Wang, Mu Zhang |
| 2024 | When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy |
| 2024 | You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks. Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang |
| 2024 | dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository. Yingying Su, Dan Li, Li Chen, Qi Li, Sitong Ling |