| 2025 | "Where Are We On Cyber?" - A Qualitative Study On Boards' Cybersecurity Risk Decision Making. Jens Opdenbusch, Jonas Hielscher, M. Angela Sasse |
| 2025 | "Who is Trying to Access My Account?" Exploring User Perceptions and Reactions to Risk-based Authentication Notifications. Tongxin Wei, Ding Wang, Yutong Li, Yuehuan Wang |
| 2025 | 32nd Annual Network and Distributed System Security Symposium, NDSS 2025, San Diego, California, USA, February 24-28, 2025 |
| 2025 | A Comprehensive Memory Safety Analysis of Bootloaders. Jianqiang Wang, Meng Wang, Qinying Wang, Nils Langius, Li Shi, Ali Abbasi, Thorsten Holz |
| 2025 | A Formal Approach to Multi-Layered Privileges for Enclaves. Ganxiang Yang, Chenyang Liu, Zhen Huang, Guoxing Chen, Hongfei Fu, Yuanyuan Zhang, Haojin Zhu |
| 2025 | A Key-Driven Framework for Identity-Preserving Face Anonymization. Miaomiao Wang, Guang Hua, Sheng Li, Guorui Feng |
| 2025 | A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications. Stijn Pletinckx, Christopher Kruegel, Giovanni Vigna |
| 2025 | A Method to Facilitate Membership Inference Attacks in Deep Learning Models. Zitao Chen, Karthik Pattabiraman |
| 2025 | A Multifaceted Study on the Use of TLS and Auto-detect in Email Ecosystems. Ka Fun Tang, Che Wei Tu, Sui Ling Angela Mak, Sze Yiu Chau |
| 2025 | A New PPML Paradigm for Quantized Models. Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren |
| 2025 | A Systematic Evaluation of Novel and Existing Cache Side Channels. Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss |
| 2025 | ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments. Myungsuk Moon, Minhee Kim, Joonkyo Jung, Dokyung Song |
| 2025 | Alba: The Dawn of Scalable Bridges for Blockchains. Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei |
| 2025 | All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks. Kevin van Liebergen, Gibran Gómez, Srdjan Matic, Juan Caballero |
| 2025 | AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight. Qi Xia, Qian Chen |
| 2025 | An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps. Xin Zhang, Xiaohan Zhang, Zhichen Liu, Bo Zhao, Zhemin Yang, Min Yang |
| 2025 | Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security. Jan-Ulrich Holtgrave, Kay Friedrich, Fabian Fischer, Nicolas Huaman, Niklas Busch, Jan H. Klemmer, Marcel Fourné, Oliver Wiese, Dominik Wermke, Sascha Fahl |
| 2025 | Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification. Yue Qin, Yue Xiao, Xiaojing Liao |
| 2025 | Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation. Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan, Xiapu Luo |
| 2025 | Automatic Insecurity: Exploring Email Auto-configuration in the Wild. Shushang Wen, Yiming Zhang, Yuxiang Shen, Bingyu Li, Haixin Duan, Jingqiang Lin |
| 2025 | Automatic Library Fuzzing through API Relation Evolvement. Jiayi Lin, Qingyu Zhang, Junzhe Li, Chenxin Sun, Hao Zhou, Changhua Luo, Chenxiong Qian |
| 2025 | BARBIE: Robust Backdoor Detection Based on Latent Separability. Hanlei Zhang, Yijie Bai, Yanjiao Chen, Zhongming Ma, Wenyuan Xu |
| 2025 | BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS. Yinggang Guo, Zicheng Wang, Weiheng Bai, Qingkai Zeng, Kangjie Lu |
| 2025 | Balancing Privacy and Data Utilization: A Comparative Vignette Study on User Acceptance of Data Trustees in Germany and the US. Leona Lassak, Hanna Püschel, Oliver D. Reithmaier, Tobias Gostomzyk, Markus Dürmuth |
| 2025 | Be Careful of What You Embed: Demystifying OLE Vulnerabilities. Yunpeng Tian, Feng Dong, Haoyi Liu, Meng Xu, Zhiniang Peng, Zesen Ye, Shenghui Li, Xiapu Luo, Haoyu Wang |
| 2025 | Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs. Linxi Jiang, Xin Jin, Zhiqiang Lin |
| 2025 | BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search. Yongpan Wang, Hong Li, Xiaojie Zhu, Siyuan Li, Chaopeng Dong, Shouguo Yang, Kangyuan Qin |
| 2025 | BitShield: Defending Against Bit-Flip Attacks on DNN Executables. Yanzuo Chen, Yuanyuan Yuan, Zhibo Liu, Sihang Hu, Tianxiang Li, Shuai Wang |
| 2025 | Black-box Membership Inference Attacks against Fine-tuned Diffusion Models. Yan Pang, Tianhao Wang |
| 2025 | Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning. Yong-Hao Zou, Jia-Ju Bai, Zu-Ming Jiang, Ming Zhao, Diyu Zhou |
| 2025 | Blindfold: Confidential Memory Management by Untrusted Operating System. Caihua Li, Seung-Seob Lee, Lin Zhong |
| 2025 | BumbleBee: Secure Two-party Inference Framework for Large Transformers. Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, Wenguang Chen |
| 2025 | CASPR: Context-Aware Security Policy Recommendation. Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng |
| 2025 | CCTAG: Configurable and Combinable Tagged Architecture. Zhanpeng Liu, Yi Rong, Chenyang Li, Wende Tan, Yuan Li, Xinhui Han, Songtao Yang, Chao Zhang |
| 2025 | CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling. Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Bruno Ribeiro, Shengwei An, Pin-Yu Chen, Xiangyu Zhang, Ninghui Li |
| 2025 | CHAOS: Exploiting Station Time Synchronization in 802.11 Networks. Sirus Shahini, Robert Ricci |
| 2025 | CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji |
| 2025 | Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph. Shang Ma, Chaoran Chen, Shao Yang, Shifu Hou, Toby Jia-Jun Li, Xusheng Xiao, Tao Xie, Yanfang Ye |
| 2025 | Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting. Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz |
| 2025 | Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant. Magdalena Pasternak, Kevin Warren, Daniel Olszewski, Susan Nittrouer, Patrick Traynor, Kevin R. B. Butler |
| 2025 | Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables. Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang |
| 2025 | CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP. Stefan Gast, Hannes Weissteiner, Robin Leander Schröder, Daniel Gruss |
| 2025 | Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange. Pinji Chen, Jianjun Chen, Mingming Zhang, Qi Wang, Yiming Zhang, Mingwei Xu, Haixin Duan |
| 2025 | Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers. Navnil Choudhury, Chaithanya Naik Mude, Sanjay Das, Preetham Chandra Tikkireddi, Swamit Tannu, Kanad Basu |
| 2025 | Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams. Platon Kotzias, Michalis Pachilakis, Javier Aldana-Iuit, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge |
| 2025 | DLBox: New Model Training Framework for Protecting Training Data. Jaewon Hur, Juheon Yi, Cheolwoo Myung, Sangyun Kim, Youngki Lee, Byoungyoung Lee |
| 2025 | DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning. Hao Yu, Chuan Ma, Xinhang Wan, Jun Wang, Tao Xiang, Meng Shen, Xinwang Liu |
| 2025 | DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing. Liam Wachter, Julian Gremminger, Christian Wressnegger, Mathias Payer, Flavio Toffalini |
| 2025 | Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation. Christopher Ellis, Yue Zhang, Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin |
| 2025 | Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks. Jing Shang, Jian Wang, Kailun Wang, Jiqiang Liu, Nan Jiang, Md. Armanuzzaman, Ziming Zhao |
| 2025 | Delay-allowed Differentially Private Data Stream Release. Xiaochen Li, Zhan Qin, Kui Ren, Chen Gong, Shuya Feng, Yuan Hong, Tianhao Wang |
| 2025 | Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors. Jianwen Tian, Wei Kong, Debin Gao, Tong Wang, Taotao Gu, Kefan Qiu, Zhi Wang, Xiaohui Kuang |
| 2025 | Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic. Tyler Tucker, Nathaniel Bennett, Martin Kotuliak, Simon Erni, Srdjan Capkun, Kevin R. B. Butler, Patrick Traynor |
| 2025 | Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach. Christian van Sloun, Vincent Woeste, Konrad Wolsing, Jan Pennekamp, Klaus Wehrle |
| 2025 | DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More. Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell |
| 2025 | Diffence: Fencing Membership Privacy With Diffusion Models. Yuefeng Peng, Ali Naseh, Amir Houmansadr |
| 2025 | Dissecting Payload-based Transaction Phishing on Ethereum. Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou |
| 2025 | Distributed Function Secret Sharing and Applications. Pengzhi Xing, Hongwei Li, Meng Hao, Hanxiao Chen, Jia Hu, Dongxiao Liu |
| 2025 | Do (Not) Follow the White Rabbit: Challenging the Myth of Harmless Open Redirection. Soheil Khodayari, Kai Glauber, Giancarlo Pellegrino |
| 2025 | Do We Really Need to Design New Byzantine-robust Aggregation Rules? Minghong Fang, Seyedsina Nabavirazavi, Zhuqing Liu, Wei Sun, Sundaraja Sitharama Iyengar, Haibo Yang |
| 2025 | Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector. He Shuang, Lianying Zhao, David Lie |
| 2025 | EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis. Hangtian Liu, Lei Zheng, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Yishun Zeng, Zhiyuan Jiang, Jiahai Yang |
| 2025 | EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side Channel. Wenhao Li, Jiahao Wang, Guoming Zhang, Yanni Yang, Riccardo Spolaor, Xiuzhen Cheng, Pengfei Hu |
| 2025 | ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis. Lingbo Zhao, Yuhui Zhang, Zhilu Wang, Fengkai Yuan, Rui Hou |
| 2025 | Eclipse Attacks on Monero's Peer-to-Peer Network. Ruisheng Shi, Zhiyuan Peng, Lina Lan, Yulian Ge, Peng Liu, Qin Wang, Juan Wang |
| 2025 | Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis. Shangzhi Xu, Jialiang Dong, Weiting Cai, Juanru Li, Arash Shaghaghi, Nan Sun, Siqi Ma |
| 2025 | Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications. Eman Maali, Omar Alrawi, Julie A. McCann |
| 2025 | EvoCrawl: Exploring Web Application Code and State using Evolutionary Search. Xiangyu Guo, Akshay Kawlay, Eric Liu, David Lie |
| 2025 | Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution. Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren |
| 2025 | Exploring User Perceptions of Security Auditing in the Web3 Ecosystem. Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang |
| 2025 | FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2. Connor Glosner, Aravind Machiry |
| 2025 | From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection. Jie Lin, David Mohaisen |
| 2025 | GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization. Haotian Zhu, Shuchao Pang, Zhigang Lu, Yongbin Zhou, Minhui Xue |
| 2025 | GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative Gadgets. Qi Ling, Yujun Liang, Yi Ren, Baris Kasikci, Shuwen Deng |
| 2025 | Generating API Parameter Security Rules with LLM for API Misuse Detection. Jinghua Liu, Yi Yang, Kai Chen, Miaoqian Lin |
| 2025 | GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference. Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2025 | HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists. Ruixuan Li, Chaoyi Lu, Baojun Liu, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao |
| 2025 | Heimdall: Towards Risk-Aware Network Management Outsourcing. Yuejie Wang, Qiutong Men, Yongting Chen, Jiajin Liu, Gengyu Chen, Ying Zhang, Guyue Liu, Vyas Sekar |
| 2025 | Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller. Haoqiang Wang, Yiwei Fang, Yichen Liu, Ze Jin, Emma Delph, Xiaojiang Du, Qixu Liu, Luyi Xing |
| 2025 | Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse. Runze Zhang, Mingxuan Yao, Haichuan Xu, Omar Alrawi, Jeman Park, Brendan Saltaformaggio |
| 2025 | Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments. Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu |
| 2025 | I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving. Guanlong Wu, Zheng Zhang, Yao Zhang, Weili Wang, Jianyu Niu, Ye Wu, Yinqian Zhang |
| 2025 | I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models. Yong Zhuang, Keyan Guo, Juan Wang, Yiheng Jing, Xiaoyang Xu, Wenzhe Yi, Mengda Yang, Bo Zhao, Hongxin Hu |
| 2025 | ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems. Corban Villa, Constantine Doumanidis, Hithem Lamri, Prashant Hari Narayan Rajput, Michail Maniatakos |
| 2025 | Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems. Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng |
| 2025 | Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection. Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen |
| 2025 | Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems. Shuguang Wang, Qian Zhou, Kui Wu, Jinghuai Deng, Dapeng Wu, Wei-Bin Lee, Jianping Wang |
| 2025 | Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks. Angeliki Aktypi, Kasper Rasmussen |
| 2025 | IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems. Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal |
| 2025 | JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs. Yue Xiao, Dhilung Kirat, Douglas Lee Schales, Jiyong Jang, Luyi Xing, Xiaojing Liao |
| 2025 | KernelSnitch: Side Channel-Attacks on Kernel Data Structures. Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard |
| 2025 | Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead. Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti |
| 2025 | L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target. Taifeng Liu, Yang Liu, Zhuo Ma, Tong Yang, Xinjing Liu, Teng Li, Jianfeng Ma |
| 2025 | LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm. Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis |
| 2025 | LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations. Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz |
| 2025 | LLMPirate: LLMs for Black-box Hardware IP Piracy. Vasudev Gohil, Matthew DeLorenzo, Veera Vishwa Achuta Sai Venkat Nallam, Joey See, Jeyavijayan Rajendran |
| 2025 | LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms. Maryam Rostamipoor, Seyedhamed Ghavamnia, Michalis Polychronakis |
| 2025 | Lend Me Your Beam: Privacy Implications of Plaintext Beamforming Feedback in WiFi. Rui Xiao, Xiankai Chen, Yinghui He, Jun Han, Jinsong Han |
| 2025 | LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference. Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2025 | MALintent: Coverage Guided Intent Fuzzing Framework for Android. Ammar Askar, Fabian Fleischer, Christopher Kruegel, Giovanni Vigna, Taesoo Kim |
| 2025 | MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers. Dongwei Xiao, Zhibo Liu, Yiteng Peng, Shuai Wang |
| 2025 | Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems. Jung-Woo Chang, Ke Sun, Nasimeh Heydaribeni, Seira Hidano, Xinyu Zhang, Farinaz Koushanfar |
| 2025 | Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding. Chunjiang Che, Songze Li, Xuechao Wang |
| 2025 | Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research. René Helmke, Elmar Padilla, Nils Aschenbruck |
| 2025 | MineShark: Cryptomining Traffic Detection at Scale. Shaoke Xi, Tianyi Fu, Kai Bu, Chunling Yang, Zhihua Chang, Wenzhi Chen, Zhou Ma, Chongjie Chen, Yongsheng Shen, Kui Ren |
| 2025 | MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL. Cheng Zhang, Yang Xu, Jianghao Tan, Jiajie An, Wenqiang Jin |
| 2025 | Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service. Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang |
| 2025 | Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States. Joonkyo Jung, Jisoo Jang, Yongwan Jo, Jonas Vinck, Alexios Voulimeneas, Stijn Volckaert, Dokyung Song |
| 2025 | Mysticeti: Reaching the Latency Limits with Uncertified DAGs. Kushal Babel, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Arun Koshy, Alberto Sonnino, Mingwei Tian |
| 2025 | NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities. Darion Cassel, Nuno Sabino, Min-Chien Hsu, Ruben Martins, Limin Jia |
| 2025 | Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel. Tao Ni, Yuefeng Du, Qingchuan Zhao, Cong Wang |
| 2025 | Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu |
| 2025 | On Borrowed Time - Preventing Static Side-Channel Analysis. Robert Dumitru, Thorben Moos, Andrew Wabnitz, Yuval Yarom |
| 2025 | On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance. Takami Sato, Ryo Suzuki, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Ryo Yoshida, Qi Alfred Chen, Kentaro Yoshioka |
| 2025 | On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks. Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun |
| 2025 | Onion Franking: Abuse Reports for Mix-Based Private Messaging. Matthew Gregoire, Margaret Pierce, Saba Eskandarian |
| 2025 | Oreo: Protecting ASLR Against Microarchitectural Attacks. Shixin Song, Joseph Zhang, Mengjia Yan |
| 2025 | PBP: Post-training Backdoor Purification for Malware Classifiers. Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach |
| 2025 | PQConnect: Automated Post-Quantum End-to-End Tunnels. Daniel J. Bernstein, Tanja Lange, Jonathan Levin, Bo-Yin Yang |
| 2025 | Passive Inference Attacks on Split Learning via Adversarial Regularization. Xiaochen Zhu, Xinjian Luo, Yuncheng Wu, Yangfan Jiang, Xiaokui Xiao, Beng Chin Ooi |
| 2025 | PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2025 | PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy Comprehension. Andrick Adhikari, Sanchari Das, Rinku Dewri |
| 2025 | Power-Related Side-Channel Attacks using the Android Sensor Framework. Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard |
| 2025 | PowerRadio: Manipulate Sensor Measurement via Power GND Radiation. Yan Jiang, Xiaoyu Ji, Yancheng Jiang, Kai Wang, Chenren Xu, Wenyuan Xu |
| 2025 | Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models. Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar |
| 2025 | Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing. Ruyi Ding, Tong Zhou, Lili Su, Aidong Adam Ding, Xiaolin Xu, Yunsi Fei |
| 2025 | PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation. Ye Liu, Yue Xue, Daoyuan Wu, Yuqiang Sun, Yi Li, Miaolei Shi, Yang Liu |
| 2025 | ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs. Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang |
| 2025 | Provably Unlearnable Data Examples. Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu |
| 2025 | QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing. Matteo Marini, Daniele Cono D'Elia, Mathias Payer, Leonardo Querzoni |
| 2025 | RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu |
| 2025 | RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation. Dzung Pham, Shreyas Kulkarni, Amir Houmansadr |
| 2025 | RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives. Qihang Zhou, WenZhuo Cao, Xiaoqi Jia, Peng Liu, Shengzhi Zhang, Jiayun Chen, Shaowen Xu, Zhenyu Song |
| 2025 | RadSee: See Your Handwriting Through Walls Using FMCW Radar. Shichen Zhang, Qijun Wang, Maolin Gan, Zhichao Cao, Huacheng Zeng |
| 2025 | ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu |
| 2025 | ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters. Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu |
| 2025 | Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE. Eduardo Chielle, Michail Maniatakos |
| 2025 | Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth. Maximilian von Tschirschnitz, Ludwig Peuckert, Moritz Buhl, Jens Grossklags |
| 2025 | Reinforcement Unlearning. Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue |
| 2025 | Repurposing Neural Networks for Efficient Cryptographic Computation. Xin Jin, Shiqing Ma, Zhiqiang Lin |
| 2025 | Rethinking Trust in Forge-Based Git Security. Aditya Sirish A Yelgundhalli, Patrick Zielinski, Reza Curtmola, Justin Cappos |
| 2025 | Retrofitting XoM for Stripped Binaries without Embedded Data Relocation. Chenke Luo, Jiang Ming, Mengfei Xie, Guojun Peng, Jianming Fu |
| 2025 | Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration. Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang |
| 2025 | Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples. Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino |
| 2025 | Revisiting EM-based Estimation for Locally Differentially Private Protocols. Yutong Ye, Tianhao Wang, Min Zhang, Dengguo Feng |
| 2025 | Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective. Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo, Kaidi Xu, Qi Alfred Chen |
| 2025 | Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle. Wentao Dong, Peipei Jiang, Huayi Duan, Cong Wang, Lingchen Zhao, Qian Wang |
| 2025 | Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon. Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan |
| 2025 | SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns. Marzieh Bitaab, Alireza Karimi, Zhuoer Lyu, Adam Oest, Dhruv Kuchhal, Muhammad Saad, Gail-Joon Ahn, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé |
| 2025 | SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone. Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He |
| 2025 | SHAFT: Secure, Handy, Accurate and Fast Transformer Inference. Andes Y. L. Kei, Sherman S. M. Chow |
| 2025 | SIGuard: Guarding Secure Inference with Post Data Privacy. Xinqian Wang, Xiaoning Liu, Shangqi Lai, Xun Yi, Xingliang Yuan |
| 2025 | SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills. Jingwen Yan, Song Liao, Mohammed Aldeen, Luyi Xing, Danfeng Yao, Long Cheng |
| 2025 | SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning. Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi |
| 2025 | Safety Misalignment Against Large Language Models. Yichen Gong, Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Xiaoyun Wang |
| 2025 | Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction. Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou |
| 2025 | ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis. Zeyu Lei, Güliz Seray Tuncay, Beatrice Carissa Williem, Z. Berkay Celik, Antonio Bianchi |
| 2025 | Secret Spilling Drive: Leaking User Behavior through SSD Contention. Jonas Juffinger, Fabian Rauscher, Giuseppe La Manna, Daniel Gruss |
| 2025 | Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution. Byeongwook Kim, Jaewon Hur, Adil Ahmad, Byoungyoung Lee |
| 2025 | Secure IP Address Allocation at Cloud Scale. Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Engin Kirda, Patrick D. McDaniel |
| 2025 | Secure Transformer Inference Made Non-interactive. Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang |
| 2025 | Securing BGP ASAP: ASPA and other Post-ROV Defenses. Justin Furuness, Cameron Morris, Reynaldo Morillo, Arvind Kasiliya, Bing Wang, Amir Herzberg |
| 2025 | Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote IPC. Fangming Gu, Qingli Guo, Jie Lu, Qinghe Xie, Beibei Zhao, Kangjie Lu, Hong Li, Xiaorui Gong |
| 2025 | Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection. Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, Jiahao Cao |
| 2025 | Siniel: Distributed Privacy-Preserving zkSNARK. Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng |
| 2025 | SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data Plane. Sian Kim, Seyed Mohammad Mehdi Mirnajafizadeh, Bara Kim, Rhongho Jang, DaeHun Nyang |
| 2025 | SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers. Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu |
| 2025 | Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces. Philipp Mackensen, Paul Staat, Stefan Roth, Aydin Sezgin, Christof Paar, Veelasha Moonsamy |
| 2025 | Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac |
| 2025 | Starshields for iOS: Navigating the Security Cosmos in Satellite Communication. Jiska Classen, Alexander Heinrich, Fabian Portner, Felix Rohrbach, Matthias Hollick |
| 2025 | Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel. Hang Zhang, Jangha Kim, Chuhong Yuan, Zhiyun Qian, Taesoo Kim |
| 2025 | THEMIS: Regulating Textual Inversion for Personalized Concept Censorship. Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang |
| 2025 | TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption. Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, Stefan Mangard |
| 2025 | TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks. Matteo Leonelli, Addison Crump, Meng Wang, Florian Bauckholt, Keno Hassler, Ali Abbasi, Thorsten Holz |
| 2025 | TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization. Zelun Kong, Minkyung Park, Le Guan, Ning Zhang, Chung Hwan Kim |
| 2025 | The (Un)usual Suspects - Studying Reasons for Lacking Updates in WordPress. Maria Hellenthal, Lena Gotsche, Rafael Mrowczynski, Sarah Kugel, Michael Schilling, Ben Stock |
| 2025 | The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic. Diwen Xue, Robert Stanley, Piyush Kumar, Roya Ensafi |
| 2025 | The Forking Way: When TEEs Meet Consensus. Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame |
| 2025 | The Guardians of Name Street: Studying the Defensive Registration Practices of the Fortune 500. Boladji Vinny Adjibi, Athanasios Avgetidis, Manos Antonakakis, Michael D. Bailey, Fabian Monrose |
| 2025 | The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams. Elijah Robert Bouma-Sims, Lily Klucinec, Mandy Lanyon, Julie Downs, Lorrie Faith Cranor |
| 2025 | The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection. Yi Yang, Jinghua Liu, Kai Chen, Miaoqian Lin |
| 2025 | The Philosopher's Stone: Trojaning Plugins of Large Language Models. Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu |
| 2025 | The Power of Words: A Comprehensive Analysis of Rationales and Their Effects on Users' Permission Decisions. Yusra Elbitar, Alexander Hart, Sven Bugiel |
| 2025 | The Road to Trust: Building Enclaves within Confidential VMs. Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, Xiaofeng Wang, Dan Meng, Rui Hou |
| 2025 | The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps. Yizhe Shi, Zhemin Yang, Kangwei Zhong, Guangliang Yang, Yifan Yang, Xiaohan Zhang, Min Yang |
| 2025 | Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures. Yangtao Deng, Qian Wu, Zeqi Lai, Chenwei Gu, Hewu Li, Yuanjie Li, Jun Liu |
| 2025 | Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems. Hengkai Ye, Hong Hu |
| 2025 | Towards Understanding Unsafe Video Generation. Yan Pang, Aiping Xiong, Yang Zhang, Tianhao Wang |
| 2025 | TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents. Chen Gong, Kecen Li, Jin Yao, Tianhao Wang |
| 2025 | Translating C To Rust: Lessons from a User Study. Ruishi Li, Bo Wang, Tianyu Li, Prateek Saxena, Ashish Kundu |
| 2025 | Transparency or Information Overload? Evaluating Users' Comprehension and Perceptions of the iOS App Privacy Report. Xiaoyuan Wu, Lydia Hu, Eric Zeng, Hana Habib, Lujo Bauer |
| 2025 | Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices. Zheyu Ma, Qiang Liu, Zheming Li, Tingting Yin, Wende Tan, Chao Zhang, Mathias Payer |
| 2025 | Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! Yansong Gao, Huaibing Peng, Hua Ma, Zhi Zhang, Shuo Wang, Rayne Holland, Anmin Fu, Minhui Xue, Derek Abbott |
| 2025 | Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding. Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao |
| 2025 | UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications. Jiawei Li, Jiahao Liu, Jian Mao, Jun Zeng, Zhenkai Liang |
| 2025 | URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning. Duanyi Yao, Songze Li, Xueluan Gong, Sizai Hou, Gaoning Pan |
| 2025 | Uncovering the iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis. Miaoqian Lin, Kai Chen, Yi Yang, Jinghua Liu |
| 2025 | Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Rui Wen, Michael Backes, Yang Zhang |
| 2025 | Understanding Miniapp Malware: Identification, Dissection, and Characterization. Yuqing Yang, Yue Zhang, Zhiqiang Lin |
| 2025 | Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary. Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang |
| 2025 | VeriBin: Adaptive Verification of Patches at the Binary Level. Hongwei Wu, Jianliang Wu, Ruoyu Wu, Ayushi Sharma, Aravind Machiry, Antonio Bianchi |
| 2025 | VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis. Kavita Kumari, Maryam Abbasihafshejani, Alessandro Pegoraro, Phillip Rieger, Kamyar Arshi, Murtuza Jadliwala, Ahmad-Reza Sadeghi |
| 2025 | VulShield: Protecting Vulnerable Code Before Deploying Patches. Yuan Li, Chao Zhang, Jinhao Zhu, Penghui Li, Chenyang Li, Songtao Yang, Wende Tan |
| 2025 | Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets. Daniel Klischies, Philipp Mackensen, Veelasha Moonsamy |
| 2025 | WAVEN: WebAssembly Memory Virtualization for Enclaves. Weili Wang, Honghan Ji, Peixuan He, Yao Zhang, Ye Wu, Yinqian Zhang |
| 2025 | Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China. Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, Eric Wustrow |
| 2025 | Was This You? Investigating the Design Considerations for Suspicious Login Notifications. Sena Sahin, Burak Sahin, Frank Li |
| 2025 | Welcome to Jurassic Park: A Comprehensive Study of Security Risks in Deno and its Ecosystem. Abdullah AlHamdan, Cristian-Alexandru Staicu |
| 2025 | What's Done Is Not What's Claimed: Detecting and Interpreting Inconsistencies in App Behaviors. Chang Yue, Kai Chen, Zhixiu Guo, Jun Dai, Xiaoyan Sun, Yi Yang |
| 2025 | You Can Rand but You Can't Hide: A Holistic Security Analysis of Google Fuchsia's (and gVisor's) Network Stack. Inon Kaplan, Ron Even, Amit Klein |
| 2025 | YuraScanner: Leveraging LLMs for Task-driven Web App Scanning. Aleksei Stafeev, Tim Recktenwald, Gianluca De Stefano, Soheil Khodayari, Giancarlo Pellegrino |
| 2025 | type++: Prohibiting Type Confusion with Inline Type Information. Nicolas Badoux, Flavio Toffalini, Yuseok Jeon, Mathias Payer |