NDSS A*

212 papers

YearTitle / Authors
2025"Where Are We On Cyber?" - A Qualitative Study On Boards' Cybersecurity Risk Decision Making.
Jens Opdenbusch, Jonas Hielscher, M. Angela Sasse
2025"Who is Trying to Access My Account?" Exploring User Perceptions and Reactions to Risk-based Authentication Notifications.
Tongxin Wei, Ding Wang, Yutong Li, Yuehuan Wang
202532nd Annual Network and Distributed System Security Symposium, NDSS 2025, San Diego, California, USA, February 24-28, 2025
2025A Comprehensive Memory Safety Analysis of Bootloaders.
Jianqiang Wang, Meng Wang, Qinying Wang, Nils Langius, Li Shi, Ali Abbasi, Thorsten Holz
2025A Formal Approach to Multi-Layered Privileges for Enclaves.
Ganxiang Yang, Chenyang Liu, Zhen Huang, Guoxing Chen, Hongfei Fu, Yuanyuan Zhang, Haojin Zhu
2025A Key-Driven Framework for Identity-Preserving Face Anonymization.
Miaomiao Wang, Guang Hua, Sheng Li, Guorui Feng
2025A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications.
Stijn Pletinckx, Christopher Kruegel, Giovanni Vigna
2025A Method to Facilitate Membership Inference Attacks in Deep Learning Models.
Zitao Chen, Karthik Pattabiraman
2025A Multifaceted Study on the Use of TLS and Auto-detect in Email Ecosystems.
Ka Fun Tang, Che Wei Tu, Sui Ling Angela Mak, Sze Yiu Chau
2025A New PPML Paradigm for Quantized Models.
Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren
2025A Systematic Evaluation of Novel and Existing Cache Side Channels.
Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss
2025ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments.
Myungsuk Moon, Minhee Kim, Joonkyo Jung, Dokyung Song
2025Alba: The Dawn of Scalable Bridges for Blockchains.
Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei
2025All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks.
Kevin van Liebergen, Gibran Gómez, Srdjan Matic, Juan Caballero
2025AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight.
Qi Xia, Qian Chen
2025An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps.
Xin Zhang, Xiaohan Zhang, Zhichen Liu, Bo Zhao, Zhemin Yang, Min Yang
2025Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security.
Jan-Ulrich Holtgrave, Kay Friedrich, Fabian Fischer, Nicolas Huaman, Niklas Busch, Jan H. Klemmer, Marcel Fourné, Oliver Wiese, Dominik Wermke, Sascha Fahl
2025Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification.
Yue Qin, Yue Xiao, Xiaojing Liao
2025Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation.
Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan, Xiapu Luo
2025Automatic Insecurity: Exploring Email Auto-configuration in the Wild.
Shushang Wen, Yiming Zhang, Yuxiang Shen, Bingyu Li, Haixin Duan, Jingqiang Lin
2025Automatic Library Fuzzing through API Relation Evolvement.
Jiayi Lin, Qingyu Zhang, Junzhe Li, Chenxin Sun, Hao Zhou, Changhua Luo, Chenxiong Qian
2025BARBIE: Robust Backdoor Detection Based on Latent Separability.
Hanlei Zhang, Yijie Bai, Yanjiao Chen, Zhongming Ma, Wenyuan Xu
2025BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS.
Yinggang Guo, Zicheng Wang, Weiheng Bai, Qingkai Zeng, Kangjie Lu
2025Balancing Privacy and Data Utilization: A Comparative Vignette Study on User Acceptance of Data Trustees in Germany and the US.
Leona Lassak, Hanna Püschel, Oliver D. Reithmaier, Tobias Gostomzyk, Markus Dürmuth
2025Be Careful of What You Embed: Demystifying OLE Vulnerabilities.
Yunpeng Tian, Feng Dong, Haoyi Liu, Meng Xu, Zhiniang Peng, Zesen Ye, Shenghui Li, Xiapu Luo, Haoyu Wang
2025Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs.
Linxi Jiang, Xin Jin, Zhiqiang Lin
2025BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search.
Yongpan Wang, Hong Li, Xiaojie Zhu, Siyuan Li, Chaopeng Dong, Shouguo Yang, Kangyuan Qin
2025BitShield: Defending Against Bit-Flip Attacks on DNN Executables.
Yanzuo Chen, Yuanyuan Yuan, Zhibo Liu, Sihang Hu, Tianxiang Li, Shuai Wang
2025Black-box Membership Inference Attacks against Fine-tuned Diffusion Models.
Yan Pang, Tianhao Wang
2025Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning.
Yong-Hao Zou, Jia-Ju Bai, Zu-Ming Jiang, Ming Zhao, Diyu Zhou
2025Blindfold: Confidential Memory Management by Untrusted Operating System.
Caihua Li, Seung-Seob Lee, Lin Zhong
2025BumbleBee: Secure Two-party Inference Framework for Large Transformers.
Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, Wenguang Chen
2025CASPR: Context-Aware Security Policy Recommendation.
Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng
2025CCTAG: Configurable and Combinable Tagged Architecture.
Zhanpeng Liu, Yi Rong, Chenyang Li, Wende Tan, Yuan Li, Xinhui Han, Songtao Yang, Chao Zhang
2025CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling.
Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Bruno Ribeiro, Shengwei An, Pin-Yu Chen, Xiangyu Zhang, Ninghui Li
2025CHAOS: Exploiting Station Time Synchronization in 802.11 Networks.
Sirus Shahini, Robert Ricci
2025CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models.
Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji
2025Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph.
Shang Ma, Chaoran Chen, Shao Yang, Shifu Hou, Toby Jia-Jun Li, Xusheng Xiao, Tao Xie, Yanfang Ye
2025Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting.
Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz
2025Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant.
Magdalena Pasternak, Kevin Warren, Daniel Olszewski, Susan Nittrouer, Patrick Traynor, Kevin R. B. Butler
2025Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables.
Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang
2025CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP.
Stefan Gast, Hannes Weissteiner, Robin Leander Schröder, Daniel Gruss
2025Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange.
Pinji Chen, Jianjun Chen, Mingming Zhang, Qi Wang, Yiming Zhang, Mingwei Xu, Haixin Duan
2025Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers.
Navnil Choudhury, Chaithanya Naik Mude, Sanjay Das, Preetham Chandra Tikkireddi, Swamit Tannu, Kanad Basu
2025Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams.
Platon Kotzias, Michalis Pachilakis, Javier Aldana-Iuit, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge
2025DLBox: New Model Training Framework for Protecting Training Data.
Jaewon Hur, Juheon Yi, Cheolwoo Myung, Sangyun Kim, Youngki Lee, Byoungyoung Lee
2025DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning.
Hao Yu, Chuan Ma, Xinhang Wan, Jun Wang, Tao Xiang, Meng Shen, Xinwang Liu
2025DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing.
Liam Wachter, Julian Gremminger, Christian Wressnegger, Mathias Payer, Flavio Toffalini
2025Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation.
Christopher Ellis, Yue Zhang, Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin
2025Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks.
Jing Shang, Jian Wang, Kailun Wang, Jiqiang Liu, Nan Jiang, Md. Armanuzzaman, Ziming Zhao
2025Delay-allowed Differentially Private Data Stream Release.
Xiaochen Li, Zhan Qin, Kui Ren, Chen Gong, Shuya Feng, Yuan Hong, Tianhao Wang
2025Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors.
Jianwen Tian, Wei Kong, Debin Gao, Tong Wang, Taotao Gu, Kefan Qiu, Zhi Wang, Xiaohui Kuang
2025Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic.
Tyler Tucker, Nathaniel Bennett, Martin Kotuliak, Simon Erni, Srdjan Capkun, Kevin R. B. Butler, Patrick Traynor
2025Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach.
Christian van Sloun, Vincent Woeste, Konrad Wolsing, Jan Pennekamp, Klaus Wehrle
2025DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More.
Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell
2025Diffence: Fencing Membership Privacy With Diffusion Models.
Yuefeng Peng, Ali Naseh, Amir Houmansadr
2025Dissecting Payload-based Transaction Phishing on Ethereum.
Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou
2025Distributed Function Secret Sharing and Applications.
Pengzhi Xing, Hongwei Li, Meng Hao, Hanxiao Chen, Jia Hu, Dongxiao Liu
2025Do (Not) Follow the White Rabbit: Challenging the Myth of Harmless Open Redirection.
Soheil Khodayari, Kai Glauber, Giancarlo Pellegrino
2025Do We Really Need to Design New Byzantine-robust Aggregation Rules?
Minghong Fang, Seyedsina Nabavirazavi, Zhuqing Liu, Wei Sun, Sundaraja Sitharama Iyengar, Haibo Yang
2025Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.
He Shuang, Lianying Zhao, David Lie
2025EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis.
Hangtian Liu, Lei Zheng, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Yishun Zeng, Zhiyuan Jiang, Jiahai Yang
2025EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side Channel.
Wenhao Li, Jiahao Wang, Guoming Zhang, Yanni Yang, Riccardo Spolaor, Xiuzhen Cheng, Pengfei Hu
2025ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis.
Lingbo Zhao, Yuhui Zhang, Zhilu Wang, Fengkai Yuan, Rui Hou
2025Eclipse Attacks on Monero's Peer-to-Peer Network.
Ruisheng Shi, Zhiyuan Peng, Lina Lan, Yulian Ge, Peng Liu, Qin Wang, Juan Wang
2025Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
Shangzhi Xu, Jialiang Dong, Weiting Cai, Juanru Li, Arash Shaghaghi, Nan Sun, Siqi Ma
2025Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications.
Eman Maali, Omar Alrawi, Julie A. McCann
2025EvoCrawl: Exploring Web Application Code and State using Evolutionary Search.
Xiangyu Guo, Akshay Kawlay, Eric Liu, David Lie
2025Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren
2025Exploring User Perceptions of Security Auditing in the Web3 Ecosystem.
Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang
2025FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2.
Connor Glosner, Aravind Machiry
2025From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection.
Jie Lin, David Mohaisen
2025GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization.
Haotian Zhu, Shuchao Pang, Zhigang Lu, Yongbin Zhou, Minhui Xue
2025GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative Gadgets.
Qi Ling, Yujun Liang, Yi Ren, Baris Kasikci, Shuwen Deng
2025Generating API Parameter Security Rules with LLM for API Misuse Detection.
Jinghua Liu, Yi Yang, Kai Chen, Miaoqian Lin
2025GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference.
Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2025HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Ruixuan Li, Chaoyi Lu, Baojun Liu, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao
2025Heimdall: Towards Risk-Aware Network Management Outsourcing.
Yuejie Wang, Qiutong Men, Yongting Chen, Jiajin Liu, Gengyu Chen, Ying Zhang, Guyue Liu, Vyas Sekar
2025Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller.
Haoqiang Wang, Yiwei Fang, Yichen Liu, Ze Jin, Emma Delph, Xiaojiang Du, Qixu Liu, Luyi Xing
2025Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse.
Runze Zhang, Mingxuan Yao, Haichuan Xu, Omar Alrawi, Jeman Park, Brendan Saltaformaggio
2025Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments.
Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu
2025I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving.
Guanlong Wu, Zheng Zhang, Yao Zhang, Weili Wang, Jianyu Niu, Ye Wu, Yinqian Zhang
2025I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models.
Yong Zhuang, Keyan Guo, Juan Wang, Yiheng Jing, Xiaoyang Xu, Wenzhe Yi, Mengda Yang, Bo Zhao, Hongxin Hu
2025ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems.
Corban Villa, Constantine Doumanidis, Hithem Lamri, Prashant Hari Narayan Rajput, Michail Maniatakos
2025Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems.
Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng
2025Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection.
Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen
2025Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems.
Shuguang Wang, Qian Zhou, Kui Wu, Jinghuai Deng, Dapeng Wu, Wei-Bin Lee, Jianping Wang
2025Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks.
Angeliki Aktypi, Kasper Rasmussen
2025IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems.
Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal
2025JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs.
Yue Xiao, Dhilung Kirat, Douglas Lee Schales, Jiyong Jang, Luyi Xing, Xiaojing Liao
2025KernelSnitch: Side Channel-Attacks on Kernel Data Structures.
Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard
2025Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead.
Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti
2025L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target.
Taifeng Liu, Yang Liu, Zhuo Ma, Tong Yang, Xinjing Liu, Teng Li, Jianfeng Ma
2025LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm.
Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis
2025LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations.
Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz
2025LLMPirate: LLMs for Black-box Hardware IP Piracy.
Vasudev Gohil, Matthew DeLorenzo, Veera Vishwa Achuta Sai Venkat Nallam, Joey See, Jeyavijayan Rajendran
2025LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms.
Maryam Rostamipoor, Seyedhamed Ghavamnia, Michalis Polychronakis
2025Lend Me Your Beam: Privacy Implications of Plaintext Beamforming Feedback in WiFi.
Rui Xiao, Xiankai Chen, Yinghui He, Jun Han, Jinsong Han
2025LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference.
Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2025MALintent: Coverage Guided Intent Fuzzing Framework for Android.
Ammar Askar, Fabian Fleischer, Christopher Kruegel, Giovanni Vigna, Taesoo Kim
2025MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers.
Dongwei Xiao, Zhibo Liu, Yiteng Peng, Shuai Wang
2025Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems.
Jung-Woo Chang, Ke Sun, Nasimeh Heydaribeni, Seira Hidano, Xinyu Zhang, Farinaz Koushanfar
2025Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding.
Chunjiang Che, Songze Li, Xuechao Wang
2025Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research.
René Helmke, Elmar Padilla, Nils Aschenbruck
2025MineShark: Cryptomining Traffic Detection at Scale.
Shaoke Xi, Tianyi Fu, Kai Bu, Chunling Yang, Zhihua Chang, Wenzhi Chen, Zhou Ma, Chongjie Chen, Yongsheng Shen, Kui Ren
2025MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL.
Cheng Zhang, Yang Xu, Jianghao Tan, Jiajie An, Wenqiang Jin
2025Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service.
Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang
2025Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States.
Joonkyo Jung, Jisoo Jang, Yongwan Jo, Jonas Vinck, Alexios Voulimeneas, Stijn Volckaert, Dokyung Song
2025Mysticeti: Reaching the Latency Limits with Uncertified DAGs.
Kushal Babel, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Arun Koshy, Alberto Sonnino, Mingwei Tian
2025NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities.
Darion Cassel, Nuno Sabino, Min-Chien Hsu, Ruben Martins, Limin Jia
2025Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel.
Tao Ni, Yuefeng Du, Qingchuan Zhao, Cong Wang
2025Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu
2025On Borrowed Time - Preventing Static Side-Channel Analysis.
Robert Dumitru, Thorben Moos, Andrew Wabnitz, Yuval Yarom
2025On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance.
Takami Sato, Ryo Suzuki, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Ryo Yoshida, Qi Alfred Chen, Kentaro Yoshioka
2025On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks.
Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun
2025Onion Franking: Abuse Reports for Mix-Based Private Messaging.
Matthew Gregoire, Margaret Pierce, Saba Eskandarian
2025Oreo: Protecting ASLR Against Microarchitectural Attacks.
Shixin Song, Joseph Zhang, Mengjia Yan
2025PBP: Post-training Backdoor Purification for Malware Classifiers.
Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach
2025PQConnect: Automated Post-Quantum End-to-End Tunnels.
Daniel J. Bernstein, Tanja Lange, Jonathan Levin, Bo-Yin Yang
2025Passive Inference Attacks on Split Learning via Adversarial Regularization.
Xiaochen Zhu, Xinjian Luo, Yuncheng Wu, Yangfan Jiang, Xiaokui Xiao, Beng Chin Ooi
2025PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2025PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy Comprehension.
Andrick Adhikari, Sanchari Das, Rinku Dewri
2025Power-Related Side-Channel Attacks using the Android Sensor Framework.
Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard
2025PowerRadio: Manipulate Sensor Measurement via Power GND Radiation.
Yan Jiang, Xiaoyu Ji, Yancheng Jiang, Kai Wang, Chenren Xu, Wenyuan Xu
2025Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models.
Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar
2025Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing.
Ruyi Ding, Tong Zhou, Lili Su, Aidong Adam Ding, Xiaolin Xu, Yunsi Fei
2025PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
Ye Liu, Yue Xue, Daoyuan Wu, Yuqiang Sun, Yi Li, Miaolei Shi, Yang Liu
2025ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang
2025Provably Unlearnable Data Examples.
Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu
2025QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing.
Matteo Marini, Daniele Cono D'Elia, Mathias Payer, Leonardo Querzoni
2025RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu
2025RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation.
Dzung Pham, Shreyas Kulkarni, Amir Houmansadr
2025RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives.
Qihang Zhou, WenZhuo Cao, Xiaoqi Jia, Peng Liu, Shengzhi Zhang, Jiayun Chen, Shaowen Xu, Zhenyu Song
2025RadSee: See Your Handwriting Through Walls Using FMCW Radar.
Shichen Zhang, Qijun Wang, Maolin Gan, Zhichao Cao, Huacheng Zeng
2025ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu
2025ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters.
Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu
2025Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE.
Eduardo Chielle, Michail Maniatakos
2025Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth.
Maximilian von Tschirschnitz, Ludwig Peuckert, Moritz Buhl, Jens Grossklags
2025Reinforcement Unlearning.
Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue
2025Repurposing Neural Networks for Efficient Cryptographic Computation.
Xin Jin, Shiqing Ma, Zhiqiang Lin
2025Rethinking Trust in Forge-Based Git Security.
Aditya Sirish A Yelgundhalli, Patrick Zielinski, Reza Curtmola, Justin Cappos
2025Retrofitting XoM for Stripped Binaries without Embedded Data Relocation.
Chenke Luo, Jiang Ming, Mengfei Xie, Guojun Peng, Jianming Fu
2025Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang
2025Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples.
Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino
2025Revisiting EM-based Estimation for Locally Differentially Private Protocols.
Yutong Ye, Tianhao Wang, Min Zhang, Dengguo Feng
2025Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective.
Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo, Kaidi Xu, Qi Alfred Chen
2025Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle.
Wentao Dong, Peipei Jiang, Huayi Duan, Cong Wang, Lingchen Zhao, Qian Wang
2025Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon.
Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan
2025SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns.
Marzieh Bitaab, Alireza Karimi, Zhuoer Lyu, Adam Oest, Dhruv Kuchhal, Muhammad Saad, Gail-Joon Ahn, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé
2025SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone.
Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He
2025SHAFT: Secure, Handy, Accurate and Fast Transformer Inference.
Andes Y. L. Kei, Sherman S. M. Chow
2025SIGuard: Guarding Secure Inference with Post Data Privacy.
Xinqian Wang, Xiaoning Liu, Shangqi Lai, Xun Yi, Xingliang Yuan
2025SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills.
Jingwen Yan, Song Liao, Mohammed Aldeen, Luyi Xing, Danfeng Yao, Long Cheng
2025SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning.
Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi
2025Safety Misalignment Against Large Language Models.
Yichen Gong, Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Xiaoyun Wang
2025Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou
2025ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis.
Zeyu Lei, Güliz Seray Tuncay, Beatrice Carissa Williem, Z. Berkay Celik, Antonio Bianchi
2025Secret Spilling Drive: Leaking User Behavior through SSD Contention.
Jonas Juffinger, Fabian Rauscher, Giuseppe La Manna, Daniel Gruss
2025Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution.
Byeongwook Kim, Jaewon Hur, Adil Ahmad, Byoungyoung Lee
2025Secure IP Address Allocation at Cloud Scale.
Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Engin Kirda, Patrick D. McDaniel
2025Secure Transformer Inference Made Non-interactive.
Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang
2025Securing BGP ASAP: ASPA and other Post-ROV Defenses.
Justin Furuness, Cameron Morris, Reynaldo Morillo, Arvind Kasiliya, Bing Wang, Amir Herzberg
2025Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote IPC.
Fangming Gu, Qingli Guo, Jie Lu, Qinghe Xie, Beibei Zhao, Kangjie Lu, Hong Li, Xiaorui Gong
2025Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection.
Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, Jiahao Cao
2025Siniel: Distributed Privacy-Preserving zkSNARK.
Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng
2025SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data Plane.
Sian Kim, Seyed Mohammad Mehdi Mirnajafizadeh, Bara Kim, Rhongho Jang, DaeHun Nyang
2025SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers.
Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu
2025Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces.
Philipp Mackensen, Paul Staat, Stefan Roth, Aydin Sezgin, Christof Paar, Veelasha Moonsamy
2025Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors.
Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac
2025Starshields for iOS: Navigating the Security Cosmos in Satellite Communication.
Jiska Classen, Alexander Heinrich, Fabian Portner, Felix Rohrbach, Matthias Hollick
2025Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel.
Hang Zhang, Jangha Kim, Chuhong Yuan, Zhiyun Qian, Taesoo Kim
2025THEMIS: Regulating Textual Inversion for Personalized Concept Censorship.
Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang
2025TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption.
Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, Stefan Mangard
2025TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks.
Matteo Leonelli, Addison Crump, Meng Wang, Florian Bauckholt, Keno Hassler, Ali Abbasi, Thorsten Holz
2025TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization.
Zelun Kong, Minkyung Park, Le Guan, Ning Zhang, Chung Hwan Kim
2025The (Un)usual Suspects - Studying Reasons for Lacking Updates in WordPress.
Maria Hellenthal, Lena Gotsche, Rafael Mrowczynski, Sarah Kugel, Michael Schilling, Ben Stock
2025The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic.
Diwen Xue, Robert Stanley, Piyush Kumar, Roya Ensafi
2025The Forking Way: When TEEs Meet Consensus.
Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame
2025The Guardians of Name Street: Studying the Defensive Registration Practices of the Fortune 500.
Boladji Vinny Adjibi, Athanasios Avgetidis, Manos Antonakakis, Michael D. Bailey, Fabian Monrose
2025The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams.
Elijah Robert Bouma-Sims, Lily Klucinec, Mandy Lanyon, Julie Downs, Lorrie Faith Cranor
2025The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection.
Yi Yang, Jinghua Liu, Kai Chen, Miaoqian Lin
2025The Philosopher's Stone: Trojaning Plugins of Large Language Models.
Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu
2025The Power of Words: A Comprehensive Analysis of Rationales and Their Effects on Users' Permission Decisions.
Yusra Elbitar, Alexander Hart, Sven Bugiel
2025The Road to Trust: Building Enclaves within Confidential VMs.
Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, Xiaofeng Wang, Dan Meng, Rui Hou
2025The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps.
Yizhe Shi, Zhemin Yang, Kangwei Zhong, Guangliang Yang, Yifan Yang, Xiaohan Zhang, Min Yang
2025Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures.
Yangtao Deng, Qian Wu, Zeqi Lai, Chenwei Gu, Hewu Li, Yuanjie Li, Jun Liu
2025Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems.
Hengkai Ye, Hong Hu
2025Towards Understanding Unsafe Video Generation.
Yan Pang, Aiping Xiong, Yang Zhang, Tianhao Wang
2025TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents.
Chen Gong, Kecen Li, Jin Yao, Tianhao Wang
2025Translating C To Rust: Lessons from a User Study.
Ruishi Li, Bo Wang, Tianyu Li, Prateek Saxena, Ashish Kundu
2025Transparency or Information Overload? Evaluating Users' Comprehension and Perceptions of the iOS App Privacy Report.
Xiaoyuan Wu, Lydia Hu, Eric Zeng, Hana Habib, Lujo Bauer
2025Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices.
Zheyu Ma, Qiang Liu, Zheming Li, Tingting Yin, Wende Tan, Chao Zhang, Mathias Payer
2025Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum!
Yansong Gao, Huaibing Peng, Hua Ma, Zhi Zhang, Shuo Wang, Rayne Holland, Anmin Fu, Minhui Xue, Derek Abbott
2025Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding.
Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao
2025UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
Jiawei Li, Jiahao Liu, Jian Mao, Jun Zeng, Zhenkai Liang
2025URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning.
Duanyi Yao, Songze Li, Xueluan Gong, Sizai Hou, Gaoning Pan
2025Uncovering the iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis.
Miaoqian Lin, Kai Chen, Yi Yang, Jinghua Liu
2025Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?
Rui Wen, Michael Backes, Yang Zhang
2025Understanding Miniapp Malware: Identification, Dissection, and Characterization.
Yuqing Yang, Yue Zhang, Zhiqiang Lin
2025Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary.
Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang
2025VeriBin: Adaptive Verification of Patches at the Binary Level.
Hongwei Wu, Jianliang Wu, Ruoyu Wu, Ayushi Sharma, Aravind Machiry, Antonio Bianchi
2025VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis.
Kavita Kumari, Maryam Abbasihafshejani, Alessandro Pegoraro, Phillip Rieger, Kamyar Arshi, Murtuza Jadliwala, Ahmad-Reza Sadeghi
2025VulShield: Protecting Vulnerable Code Before Deploying Patches.
Yuan Li, Chao Zhang, Jinhao Zhu, Penghui Li, Chenyang Li, Songtao Yang, Wende Tan
2025Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets.
Daniel Klischies, Philipp Mackensen, Veelasha Moonsamy
2025WAVEN: WebAssembly Memory Virtualization for Enclaves.
Weili Wang, Honghan Ji, Peixuan He, Yao Zhang, Ye Wu, Yinqian Zhang
2025Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China.
Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, Eric Wustrow
2025Was This You? Investigating the Design Considerations for Suspicious Login Notifications.
Sena Sahin, Burak Sahin, Frank Li
2025Welcome to Jurassic Park: A Comprehensive Study of Security Risks in Deno and its Ecosystem.
Abdullah AlHamdan, Cristian-Alexandru Staicu
2025What's Done Is Not What's Claimed: Detecting and Interpreting Inconsistencies in App Behaviors.
Chang Yue, Kai Chen, Zhixiu Guo, Jun Dai, Xiaoyan Sun, Yi Yang
2025You Can Rand but You Can't Hide: A Holistic Security Analysis of Google Fuchsia's (and gVisor's) Network Stack.
Inon Kaplan, Ron Even, Amit Klein
2025YuraScanner: Leveraging LLMs for Task-driven Web App Scanning.
Aleksei Stafeev, Tim Recktenwald, Gianluca De Stefano, Soheil Khodayari, Giancarlo Pellegrino
2025type++: Prohibiting Type Confusion with Inline Type Information.
Nicolas Badoux, Flavio Toffalini, Yuseok Jeon, Mathias Payer