SP A*

149 papers

YearTitle / Authors
2022"Adversarial Examples" for Proof-of-Learning.
Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren
2022"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya.
Collins W. Munyendo, Yasemin Acar, Adam J. Aviv
2022"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé
2022"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks.
Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar
202227 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl
202243rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022
2022A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification.
Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele
2022A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
Cas Cremers, Caroline Fontaine, Charlie Jacomme
2022A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities.
Hongyan Xia, David Zhang, Wei Liu, István Haller, Bruce Sherwin, David Chisnall
2022A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang
2022AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.
Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng
2022Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks.
Yanan Guo, Andrew Zigerelli, Youtao Zhang, Jun Yang
2022Analyzing Ground-Truth Data of Mobile Gambling Scams.
Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan
2022Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li
2022Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems.
Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar
2022Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems.
Jiankai Jin, Eleanor McMurtry, Benjamin I. P. Rubinstein, Olga Ohrimenko
2022Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions.
Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri
2022Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick
2022Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest.
Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner
2022Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru
2022BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning.
Heqing Huang, Yiyuan Guo, Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang
2022BLACKSMITH: Scalable Rowhammering in the Frequency Domain.
Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi
2022Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning.
Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage
2022Bad Characters: Imperceptible NLP Attacks.
Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot
2022BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
Jinyuan Jia, Yupei Liu, Neil Zhenqiang Gong
2022COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services.
Robin Vassantlal, Eduardo Alchieri, Bernardo Ferreira, Alysson Bessani
2022Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks.
Hernán Ponce de León, Johannes Kinder
2022CirC: Compiler infrastructure for proof systems, software verification, and more.
Alex Ozdemir, Fraser Brown, Riad S. Wahby
2022Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl
2022Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song
2022DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna
2022DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng
2022DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright
2022DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.
Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan
2022Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
Haotian Chi, Chenglong Fu, Qiang Zeng, Xiaojiang Du
2022Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán
2022Device Fingerprinting with Peripheral Timestamps.
John V. Monaco
2022Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census.
Miranda Christ, Sarah Radway, Steven M. Bellovin
2022Differentially Private Histograms in the Shuffle Model from Fake Users.
Albert Cheu, Maxim Zhilyaev
2022Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust.
Johnny So, Najmeh Miramirkhani, Michael Ferdman, Nick Nikiforakis
2022Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.
Dongdong She, Abhishek Shah, Suman Jana
2022Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.
Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Héctor Rodrigo López Soto, Christian Dameff, Dinesh Bharadia, Aaron Schulman
2022Exploit the Last Straw That Breaks Android Systems.
Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan
2022Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto
2022FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang
2022Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.
Jiawei Yin, Menghao Li, Wei Wu, Dandan Sun, Jianhua Zhou, Wei Huo, Jingling Xue
2022Finding and Exploiting CPU Features using MSR Templating.
Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz
2022Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi
2022Foundations of Dynamic BFT.
Sisi Duan, Haibin Zhang
2022Four Attacks and a Proof for Telegram.
Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs
2022FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks.
Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian
2022GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs.
Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li
2022Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.
Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li
2022Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, Xenofon D. Koutsoukos
2022HAMRAZ: Resilient Partitioning and Replication.
Xiao Li, Farzin Houshmand, Mohsen Lesani
2022HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device.
Adil Ahmad, Sangho Lee, Marcus Peinado
2022HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.
Fabio Gritti, Fabio Pagani, Ilya Grishchenko, Lukas Dresel, Nilo Redini, Christopher Kruegel, Giovanni Vigna
2022Hardening Circuit-Design IP Against Reverse-Engineering Attacks.
Animesh Chhotaray, Thomas Shrimpton
2022Hark: A Deep Learning System for Navigating Privacy Feedback at Scale.
Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft
2022How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl
2022How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.
Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar
2022How to Attack and Generate Honeywords.
Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang
2022IRQDebloat: Reducing Driver Attack Surface in Embedded Devices.
Zhenghao Hu, Brendan Dolan-Gavitt
2022IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.
Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Markus Heinrichs, Rainer Kronberger, Aydin Sezgin, Christof Paar
2022Investigating Influencer VPN Ads on YouTube.
Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek
2022Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin
2022IronMask: Versatile Verification of Masking Security.
Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb
2022JIGSAW: Efficient and Scalable Path Constraints Fuzzing.
Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin
2022Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
Iskander Sánchez-Rola, Matteo Dell'Amico, Davide Balzarotti, Pierre-Antoine Vervier, Leyla Bilge
2022LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis.
Fan Wu, Yunhui Long, Ce Zhang, Bo Li
2022Locally Differentially Private Sparse Vector Aggregation.
Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi
2022Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.
Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits
2022MatRiCT
Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao
2022Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel
2022Membership Inference Attacks From First Principles.
Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramèr
2022MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
Junpeng Wan, Yanxiang Bi, Zhe Zhou, Zhou Li
2022Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.
Marton Bognar, Jo Van Bulck, Frank Piessens
2022Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.
Alyssa Milburn, Erik van der Kouwe, Cristiano Giuffrida
2022Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang
2022Model Stealing Attacks Against Inductive Graph Neural Networks.
Yun Shen, Xinlei He, Yufei Han, Yang Zhang
2022Multi-Server Verifiable Computation of Low-Degree Polynomials.
Liang Feng Zhang, Huaxiong Wang
2022Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations.
Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan
2022Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security.
Giovanni Camurati, Aurélien Francillon
2022PATA: Fuzzing with Path Aware Taint Analysis.
Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Yu Jiang, Jianzhong Liu, Zhe Liu, Jiaguang Sun
2022PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response.
Long Huang, Chen Wang
2022PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles.
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu
2022Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.
Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong
2022Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Daniele Lain, Kari Kostiainen, Srdjan Capkun
2022Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang
2022Practical Asynchronous Distributed Key Generation.
Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren
2022Practical EMV Relay Protection.
Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen
2022Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik
2022Private Approximate Nearest Neighbor Search with Sublinear Communication.
Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas
2022ProTRR: Principled yet Optimal In-DRAM Target Row Refresh.
Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi
2022ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.
Bruno Blanchet, Vincent Cheval, Véronique Cortier
2022Property Inference from Poisoning.
Saeed Mahloujifar, Esha Ghosh, Melissa Chase
2022Publicly Accountable Robust Multi-Party Computation.
Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters
2022Quantifying Blockchain Extractable Value: How dark is the forest?
Kaihua Qin, Liyi Zhou, Arthur Gervais
2022RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone.
Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, Ning Zhang
2022Reconstructing Training Data with Informed Adversaries.
Borja Balle, Giovanni Cherubin, Jamie Hayes
2022Repairing DoS Vulnerability of Real-World Regexes.
Nariyoshi Chida, Tachio Terauchi
2022Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Zhi Li, Weijie Liu, Hongbo Chen, Xiaofeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou
2022SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds.
Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna
2022SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua
2022SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu
2022SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.
Michael Rosenberg, Mary Maller, Ian Miers
2022SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition.
Samir Jordan Menon, David J. Wu
2022SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms.
Chijung Jung, Ali Ahad, Yuseok Jeon, Yonghwi Kwon
2022SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
Nicola Ruaro, Fabio Pagani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna
2022Sabre: Sender-Anonymous Messaging with Fast Audits.
Adithya Vadapalli, Kyle Storrier, Ryan Henry
2022Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion.
Preethi Santhanam, Hoang Dang, Zhiyong Shan, Iulian Neamtiu
2022SecFloat: Accurate Floating-Point meets Secure 2-Party Computation.
Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi
2022Security Analysis of the MLS Key Derivation.
Chris Brzuska, Eric Cornelissen, Konrad Kohbrok
2022Security Foundations for Application-Based Covert Communication Channels.
James K. Howes IV, Marios Georgiou, Alex J. Malozemoff, Thomas Shrimpton
2022ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas
2022Smile: Secure Memory Introspection for Live Enclave.
Lei Zhou, Xuhua Ding, Fengwei Zhang
2022SoK: A Framework for Unifying At-Risk User Research.
Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas
2022SoK: Authentication in Augmented and Virtual Reality.
Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, Rahul Chatterjee
2022SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications.
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao
2022SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum
2022SoK: Practical Foundations for Software Spectre Defenses.
Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan
2022SoK: Social Cybersecurity.
Yuxi Wu, W. Keith Edwards, Sauvik Das
2022SoK: The Dual Nature of Technology in Sexual Abuse.
Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin Beznosov
2022SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin
2022Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud.
Han Tian, Chaoliang Zeng, Zhenghang Ren, Di Chai, Junxue Zhang, Kai Chen, Qiang Yang
2022Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.
Eugene Bagdasaryan, Vitaly Shmatikov
2022Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom
2022Spurt: Scalable Distributed Randomness Beacon with Transparent Setup.
Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren
2022Statistical Quantification of Differential Privacy: A Local Approach.
Önder Askin, Tim Kutta, Holger Dette
2022Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense.
Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang
2022TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi
2022The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.
Soheil Khodayari, Giancarlo Pellegrino
2022Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints.
Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton
2022Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
Zihao Jin, Ziqiao Kong, Shuo Chen, Haixin Duan
2022Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
Mohammad Ghasemisharif, Chris Kanich, Jason Polakis
2022Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift.
Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro
2022Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang
2022TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit.
Mohammad Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini
2022Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
Shangyu Xie, Han Wang, Yu Kong, Yuan Hong
2022Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains.
Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez
2022Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.
Ruomu Hou, Haifeng Yu, Prateek Saxena
2022WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu
2022WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks.
Zhiju Yang, Weiping Pei, Monchu Chen, Chuan Yue
2022Waldo: A Private Time-Series Database from Function Secret Sharing.
Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica
2022Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques.
Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni
2022Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.
Alan Romano, Daniel Lehmann, Michael Pradel, Weihang Wang
2022ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.
Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin T. Vechev
2022mmSpy: Spying Phone Calls using mmWave Radars.
Suryoday Basak, Mahanth Gowda
2022vSGX: Virtualizing SGX Enclaves on AMD SEV.
Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin