| 2023 | "Always Contribute Back": A Qualitative Study on Security Challenges of the Open Source Supply Chain. Dominik Wermke, Jan H. Klemmer, Noah Wöhler, Juliane Schmüser, Harshini Sri Ramulu, Yasemin Acar, Sascha Fahl |
| 2023 | "How technical do you get? I'm an English teacher": Teaching and Learning Cybersecurity and AI Ethics in High School. Zachary Kilhoffer, Kyrie Zhixuan Zhou, Firmiana Wang, Fahad Tamton, Yun Huang, Pilyoung Kim, Tom Yeh, Yang Wang |
| 2023 | "In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. Collins W. Munyendo, Yasemin Acar, Adam J. Aviv |
| 2023 | "It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit. Jingjie Li, Kaiwen Sun, Brittany Skye Huff, Anna Marie Bierley, Younghyun Kim, Florian Schaub, Kassem Fawaz |
| 2023 | "We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups. Dilara Keküllüoglu, Yasemin Acar |
| 2023 | 3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning. Haoyang Li, Qingqing Ye, Haibo Hu, Jin Li, Leixia Wang, Chengfang Fang, Jie Shi |
| 2023 | 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023 |
| 2023 | A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs. Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz |
| 2023 | A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction. Hanshen Xiao, Zihang Xiang, Di Wang, Srinivas Devadas |
| 2023 | ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems. Qi Pang, Yuanyuan Yuan, Shuai Wang, Wenting Zheng |
| 2023 | AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang |
| 2023 | AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang |
| 2023 | AI-Guardian: Defeating Adversarial Attacks using Backdoors. Hong Zhu, Shengzhi Zhang, Kai Chen |
| 2023 | AUC: Accountable Universal Composability. Mike Graf, Ralf Küsters, Daniel Rausch |
| 2023 | Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective. Shahbaz Rezaei, Zubair Shafiq, Xin Liu |
| 2023 | Adaptive Risk-Limiting Comparison Audits. Benjamin Fuller, Abigail Harrison, Alexander Russell |
| 2023 | Analyzing Leakage of Personally Identifiable Information in Language Models. Nils Lukas, Ahmed Salem, Robert Sim, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin |
| 2023 | Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany. Lisa Geierhaas, Fabian Otto, Maximilian Häring, Matthew Smith |
| 2023 | BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino |
| 2023 | BayBFed: Bayesian Backdoor Defense for Federated Learning. Kavita Kumari, Phillip Rieger, Hossein Fereidooni, Murtuza Jadliwala, Ahmad-Reza Sadeghi |
| 2023 | Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu, Wei Wang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé |
| 2023 | Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu |
| 2023 | Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities. Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu |
| 2023 | BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oguzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen |
| 2023 | Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones. Richard Roberts, Julio Poveda, Raley Roberts, Dave Levin |
| 2023 | Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices. Tyler Tucker, Hunter Searle, Kevin R. B. Butler, Patrick Traynor |
| 2023 | Breaking Security-Critical Voice Authentication. Andre Kassis, Urs Hengartner |
| 2023 | CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss |
| 2023 | Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning. Wenyu Zhu, Zhiyao Feng, Zihan Zhang, Jianjun Chen, Zhijian Ou, Min Yang, Chao Zhang |
| 2023 | Characterizing Everyday Misuse of Smart Home Devices. Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek |
| 2023 | Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels |
| 2023 | Collaborative Ad Transparency: Promises and Limitations. Eleni Gkiouzepi, Athanasios Andreou, Oana Goga, Patrick Loiseau |
| 2023 | Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models. Peiyuan Liu, Jeremiah Blocki, Wenjie Bai |
| 2023 | Continual Observation under User-level Differential Privacy. Wei Dong, Qiyao Luo, Ke Yi |
| 2023 | Continuous Intrusion: Characterizing the Security of Continuous Integration Services. Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao |
| 2023 | Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture. Ravi Theja Gollapudi, Gokturk Yuksek, David Demicco, Matthew Cole, Gaurav Kothari, Rohit Kulkarni, Xin Zhang, Kanad Ghose, Aravind Prakash, Zerksis Umrigar |
| 2023 | Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms. Harm Griffioen, Christian Doerr |
| 2023 | D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, Xiangyu Zhang |
| 2023 | D-DAE: Defense-Penetrating Model Extraction Attacks. Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue |
| 2023 | DBREACH: Stealing from Databases Using Compression Side Channels. Mathew Hogan, Yan Michalevsky, Saba Eskandarian |
| 2023 | DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham |
| 2023 | DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li |
| 2023 | Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. Shubham Jain, Ana-Maria Cretu, Antoine Cully, Yves-Alexandre de Montjoye |
| 2023 | Deepfake Text Detection: Limitations and Opportunities. Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath |
| 2023 | DepthFake: Spoofing 3D Face Authentication with a 2D Photo. Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu |
| 2023 | Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments. Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang |
| 2023 | Detection of Inconsistencies in Privacy Practices of Browser Extensions. Duc Bui, Brian Tang, Kang G. Shin |
| 2023 | DevFuzz: Automatic Device Model-Guided Device Driver Fuzzing. Yilun Wu, Tong Zhang, Changhee Jung, Dongyoon Lee |
| 2023 | DevIOus: Device-Driven Side-Channel Attacks on the IOMMU. Taehun Kim, Hyeongjin Park, Seokmin Lee, Seunghee Shin, Junbeom Hur, Youngjoo Shin |
| 2023 | Discop: Provably Secure Steganography in Practice Based on "Distribution Copies". Jinyang Ding, Kejiang Chen, Yaofei Wang, Na Zhao, Weiming Zhang, Nenghai Yu |
| 2023 | Disguising Attacks with Explanation-Aware Backdoors. Maximilian Noppel, Lukas Peter, Christian Wressnegger |
| 2023 | EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation. Arslan Khan, Dongyan Xu, Dave Jing Tian |
| 2023 | ELSA: Secure Aggregation for Federated Learning with Malicious Actors. Mayank Rathee, Conghao Shen, Sameer Wagh, Raluca Ada Popa |
| 2023 | Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation. Xinyi Wang, Cen Zhang, Yeting Li, Zhiwu Xu, Shuailin Huang, Yi Liu, Yican Yao, Yang Xiao, Yanyan Zou, Yang Liu, Wei Huo |
| 2023 | Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations. Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang |
| 2023 | Examining Zero-Shot Vulnerability Repair with Large Language Models. Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt |
| 2023 | Examining Zero-Shot Vulnerability Repair with Large Language Models. Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt |
| 2023 | FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. Nina Bindel, Cas Cremers, Mang Zhao |
| 2023 | FLUTE: Fast and Secure Lookup Table Evaluations. Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame |
| 2023 | Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. Xu Lin, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis |
| 2023 | FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information. Xiaoyu Cao, Jinyuan Jia, Zaixi Zhang, Neil Zhenqiang Gong |
| 2023 | Finding Specification Blind Spots via Fuzz Testing. Ru Ji, Meng Xu |
| 2023 | Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning. Yiping Ma, Jess Woods, Sebastian Angel, Antigoni Polychroniadou, Tal Rabin |
| 2023 | From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers. Norbert Ludant, Pieter Robyns, Guevara Noubir |
| 2023 | From Grim Reality to Practical Solution: Malware Classification in Real-World Noise. Xian Wu, Wenbo Guo, Jia Yan, Baris Coskun, Xinyu Xing |
| 2023 | GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas. Ruijie Zhao, Xianwen Deng, Yanhao Wang, Zhicong Yan, Zhengguang Han, Libo Chen, Zhi Xue, Yijun Wang |
| 2023 | GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li |
| 2023 | Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean M. Tullsen |
| 2023 | Half&Half: Demystifying Intel's Directional Branch Predictors for Fast, Secure Partitioned Execution. Hosein Yavarzadeh, Mohammadkazem Taram, Shravan Narayan, Deian Stefan, Dean M. Tullsen |
| 2023 | Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein |
| 2023 | High-Order Masking of Lattice Signatures in Quasilinear Time. Rafaël del Pino, Thomas Prest, Mélissa Rossi, Markku-Juhani O. Saarinen |
| 2023 | How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen |
| 2023 | IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation. Erik C. Rye, Robert Beverly |
| 2023 | ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang |
| 2023 | Improving Developers' Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies. Sk Adnan Hassan, Zainab Aamir, Dongyoon Lee, James C. Davis, Francisco Servant |
| 2023 | Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks. Donghui Dai, Zhenlin An, Lei Yang |
| 2023 | Investigating Package Related Security Threats in Software Registries. Yacong Gu, Lingyun Ying, Yingyuan Pu, Xiao Hu, Huajun Chai, Ruimin Wang, Xing Gao, Haixin Duan |
| 2023 | Investigating the Password Policy Practices of Website Administrators. Sena Sahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank Li |
| 2023 | Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers |
| 2023 | It's (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses. Soheil Khodayari, Giancarlo Pellegrino |
| 2023 | It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. Marcel Fourné, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar |
| 2023 | Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang |
| 2023 | Jolt: Recovering TLS Signing Keys via Rowhammer Faults. Koksal Mus, Yarkin Doröz, M. Caner Tol, Kristi Rahman, Berk Sunar |
| 2023 | Lambretta: Learning to Rank for Twitter Soft Moderation. Pujan Paudel, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini |
| 2023 | LazyTAP: On-Demand Data Minimization for Trigger-Action Applications. Mohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld |
| 2023 | Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols. Tianyu Zheng, Shang Gao, Yubo Song, Bin Xiao |
| 2023 | Less is more: refinement proofs for probabilistic proofs. Kunming Jiang, Devora Chait-Roth, Zachary DeStefano, Michael Walfish, Thomas Wies |
| 2023 | Limits of I/O Based Ransomware Detection: An Imitation Based Attack. Chijin Zhou, Lihua Guo, Yiwei Hou, Zhenya Ma, Quan Zhang, Mingzhe Wang, Zhe Liu, Yu Jiang |
| 2023 | Locally Differentially Private Frequency Estimation Based on Convolution Framework. Huiyu Fang, Liquan Chen, Yali Liu, Yuan Gao |
| 2023 | Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems. Arslan Khan, Dongyan Xu, Dave Jing Tian |
| 2023 | Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance. Ruxin Wang, Long Huang, Chen Wang |
| 2023 | MEGA: Malleable Encryption Goes Awry. Matilda Backendal, Miro Haller, Kenneth G. Paterson |
| 2023 | MPCAuth: Multi-factor Authentication for Distributed-trust Systems. Sijun Tan, Weikeng Chen, Ryan Deng, Raluca Ada Popa |
| 2023 | MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks. Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren |
| 2023 | Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu |
| 2023 | Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches. Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, Guofei Gu |
| 2023 | No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information. Stephanie de Smale, Rik van Dijk, Xander Bouwman, Jeroen van der Ham, Michel van Eeten |
| 2023 | No Privacy in the Electronics Repair Industry. Jason Ceci, Jonah Stegman, Hassan Khan |
| 2023 | Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution. Boya Wang, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso |
| 2023 | ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su, Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei |
| 2023 | ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking. Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal |
| 2023 | On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy |
| 2023 | On the (In)security of Peer-to-Peer Decentralized Machine Learning. Dario Pasquini, Mathilde Raynal, Carmela Troncoso |
| 2023 | On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou |
| 2023 | One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. Habiba Farrukh, Muslum Ozgur Ozmen, Faik Kerem Örs, Z. Berkay Celik |
| 2023 | Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense. Ryan Torok, Amit Levy |
| 2023 | Optimistic Access Control for the Smart Home. Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle L. Mazurek |
| 2023 | Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains. Ruomu Hou, Haifeng Yu |
| 2023 | Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno |
| 2023 | PCSPOOF: Compromising the Safety of Time-Triggered Ethernet. Andrew D. Loveless, Linh Thi Xuan Phan, Ronald G. Dreslinski, Baris Kasikci |
| 2023 | PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu |
| 2023 | Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals. Carolyn Guthoff, Simon Anell, Johann Hainzinger, Adrian Dabrowski, Katharina Krombholz |
| 2023 | Practical Program Modularization with Type-Based Dependence Analysis. Kangjie Lu |
| 2023 | Practical Timing Side-Channel Attacks on Memory Compression. Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss |
| 2023 | Practically-exploitable Cryptographic Vulnerabilities in Matrix. Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones |
| 2023 | Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis. Gabriel Ryan, Abhishek Shah, Dongdong She, Suman Jana |
| 2023 | Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, Yingying Chen |
| 2023 | Private Access Control for Function Secret Sharing. Sacha Servan-Schreiber, Simon Beyzerov, Eli Yablon, Hyojae Park |
| 2023 | Private Collaborative Data Cleaning via Non-Equi PSI. Erik-Oliver Blass, Florian Kerschbaum |
| 2023 | Private Collaborative Data Cleaning via Non-Equi PSI. Erik-Oliver Blass, Florian Kerschbaum |
| 2023 | Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu |
| 2023 | Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han |
| 2023 | Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards. Anna Maria Mandalari, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes |
| 2023 | Public Verification for Private Hash Matching. Sarah Scheffler, Anunay Kulshrestha, Jonathan R. Mayer |
| 2023 | PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere |
| 2023 | Pyfet: Forensically Equivalent Transformation for Python Binary Decompilation. Ali Ahad, Chijung Jung, Ammar Askar, Doowon Kim, Taesoo Kim, Yonghwi Kwon |
| 2023 | QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries. HyungSeok Han, JeongOh Kyea, Yonghwi Jin, Jinoh Kang, Brian Pak, Insu Yun |
| 2023 | RAB: Provable Robustness Against Backdoor Attacks. Maurice Weber, Xiaojun Xu, Bojan Karlas, Ce Zhang, Bo Li |
| 2023 | REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi |
| 2023 | RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing. Jiawei Yin, Menghao Li, Yuekang Li, Yong Yu, Boru Lin, Yanyan Zou, Yang Liu, Wei Huo, Jingling Xue |
| 2023 | Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations. Endres Puschner, Thorben Moos, Steffen Becker, Christian Kison, Amir Moradi, Christof Paar |
| 2023 | Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen |
| 2023 | Rethinking Searchable Symmetric Encryption. Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis |
| 2023 | RoFL: Robustness of Secure Federated Learning. Hidde Lycklama, Lukas Burkhalter, Alexander Viand, Nicolas Küchler, Anwar Hithnawi |
| 2023 | Robust Multi-tab Website Fingerprinting Attacks in the Wild. Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu |
| 2023 | RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks. Mafalda Ferreira, Tiago Brito, José Fragoso Santos, Nuno Santos |
| 2023 | SNAP: Efficient Extraction of Private Properties with Poisoning. Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan R. Ullman |
| 2023 | SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. Andreas Hülsing, Mikhail A. Kudinov, Eyal Ronen, Eylon Yogev |
| 2023 | SQUIP: Exploiting the Scheduler Queue Contention Side Channel. Stefan Gast, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza, Markus Köstl, Daniel Gruss |
| 2023 | Scalable and Privacy-Preserving Federated Principal Component Analysis. David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Bonnie Berger, Jean-Pierre Hubaux |
| 2023 | Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. Mingqing Kang, Yichao Xu, Song Li, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao |
| 2023 | Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical. Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee |
| 2023 | Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks. Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, Stefan Mangard, Daniel Gruss |
| 2023 | SecureCells: A Secure Compartmentalized Architecture. Atri Bhattacharyya, Florian Hofhammer, Yuanlong Li, Siddharth Gupta, Andrés Sánchez, Babak Falsafi, Mathias Payer |
| 2023 | SegFuzz: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing. Dae R. Jeong, Byoungyoung Lee, Insik Shin, Youngjin Kwon |
| 2023 | SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration. Changhua Luo, Wei Meng, Penghui Li |
| 2023 | Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models. Rui Zhu, Di Tang, Siyuan Tang, Xiaofeng Wang, Haixu Tang |
| 2023 | ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks. Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha |
| 2023 | Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations. Brian Singer, Amritanshu Pandey, Shimiao Li, Lujo Bauer, Craig Miller, Lawrence T. Pileggi, Vyas Sekar |
| 2023 | Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses. Yan Long, Pirouz Naghavi, Blas Kojusner, Kevin R. B. Butler, Sara Rampazzi, Kevin Fu |
| 2023 | Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols. Edward Chen, Jinhao Zhu, Alex Ozdemir, Riad S. Wahby, Fraser Brown, Wenting Zheng |
| 2023 | Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno |
| 2023 | SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses. Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright |
| 2023 | SoK: Anti-Facial Recognition Technology. Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao |
| 2023 | SoK: Certified Robustness for Deep Neural Networks. Linyi Li, Tao Xie, Bo Li |
| 2023 | SoK: Cryptographic Neural-Network Computation. Lucien K. L. Ng, Sherman S. M. Chow |
| 2023 | SoK: Decentralized Finance (DeFi) Attacks. Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais |
| 2023 | SoK: Distributed Randomness Beacons. Kevin Choi, Aathira Manoj, Joseph Bonneau |
| 2023 | SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions. Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan |
| 2023 | SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning. Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin |
| 2023 | SoK: Taxonomy of Attacks on Open-Source Software Supply Chains. Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais |
| 2023 | Sound Verification of Security Protocols: From Design to Interoperable Implementations. Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller |
| 2023 | Space Odyssey: An Experimental Software Security Analysis of Satellites. Johannes Willbold, Moritz Schloegel, Manuel Vögele, Maximilian Gerhardt, Thorsten Holz, Ali Abbasi |
| 2023 | Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering. Ce Feng, Nuo Xu, Wujie Wen, Parv Venkitasubramaniam, Caiwen Ding |
| 2023 | Spectre Declassified: Reading from the Right Place at the Wrong Time. Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom |
| 2023 | Spoofing Real-world Face Authentication Systems through Optical Synthesis. Yueli Yan, Zhice Yang |
| 2023 | StyleFool: Fooling Video Classification Systems via Style Transfer. Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen |
| 2023 | SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers. Yu Hao, Guoren Li, Xiaochen Zou, Weiteng Chen, Shitong Zhu, Zhiyun Qian, Ardalan Amiri Sani |
| 2023 | TEEzz: Fuzzing Trusted Applications on COTS Android Devices. Marcel Busch, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, Mathias Payer |
| 2023 | TeSec: Accurate Server-side Attack Investigation for Web Applications. Ruihua Wang, Yihao Peng, Yilun Sun, Xuancheng Zhang, Hai Wan, Xibin Zhao |
| 2023 | Telepath: A Minecraft-based Covert Communication System. Zhen Sun, Vitaly Shmatikov |
| 2023 | The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web. Jannis Rautenstrauch, Giancarlo Pellegrino, Ben Stock |
| 2023 | Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks. Muhammad Saad, David Mohaisen |
| 2023 | Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner |
| 2023 | Threshold Signatures in the Multiverse. Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang |
| 2023 | Token meets Wallet: Formalizing Privacy and Revocation for FIDO2. Lucjan Hanzlik, Julian Loss, Benedikt Wagner |
| 2023 | Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé |
| 2023 | Towards a Rigorous Statistical Analysis of Empirical Password Datasets. Jeremiah Blocki, Peiyuan Liu |
| 2023 | TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh |
| 2023 | Typing High-Speed Cryptography against Spectre v1. Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Swarn Priya, Peter Schwabe, Lucas Tabary-Maujean |
| 2023 | Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model. Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Yu Jiang, Ting Chen, Jia-Guang Sun |
| 2023 | UTopia: Automatic Generation of Fuzz Driver using Unit Tests. Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, Woochul Shim, Yong Ho Hwang |
| 2023 | Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao |
| 2023 | Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective. Xiaohan Zhang, Haoqi Ye, Ziqi Huang, Xiao Ye, Yinzhi Cao, Yuan Zhang, Min Yang |
| 2023 | User Perceptions and Experiences with Smart Home Updates. Julie M. Haney, Susanne M. Furman |
| 2023 | Vectorized Batch Private Information Retrieval. Muhammad Haris Mughees, Ling Ren |
| 2023 | ViDeZZo: Dependency-aware Virtual Device Fuzzing. Qiang Liu, Flavio Toffalini, Yajin Zhou, Mathias Payer |
| 2023 | Volttack: Control IoT Devices by Manipulating Power Supply Voltage. Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu |
| 2023 | Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery. Kelsey R. Fulton, Samantha Katcher, Kevin Song, Marshini Chetty, Michelle L. Mazurek, Chloé Messdaghi, Daniel Votipka |
| 2023 | WaVe: a verifiably secure WebAssembly sandboxing runtime. Evan Johnson, Evan Laufer, Zijie Zhao, Dan Gohman, Shravan Narayan, Stefan Savage, Deian Stefan, Fraser Brown |
| 2023 | WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer |
| 2023 | WeRLman: To Tackle Whale (Transactions), Go Deep (RL). Roi Bar Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar |
| 2023 | Weak Fiat-Shamir Attacks on Modern Proof Systems. Quang Dao, Jim Miller, Opal Wright, Paul Grubbs |
| 2023 | WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms. Lorenzo Veronese, Benjamin Farinier, Pedro Bernardo, Mauro Tempesta, Marco Squarcina, Matteo Maffei |
| 2023 | When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel. Lin Ma, Duoming Zhou, Hanjie Wu, Yajin Zhou, Rui Chang, Hao Xiong, Lei Wu, Kui Ren |
| 2023 | When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study. Hao-Ping Hank Lee, Jacob Logas, Stephanie S. Yang, Zhouyu Li, Natã M. Barbosa, Yang Wang, Sauvik Das |
| 2023 | XFL: Naming Functions in Binaries with Extreme Multi-label Learning. James Patrick-Evans, Moritz Dannehl, Johannes Kinder |
| 2023 | mmEcho: A mmWave-based Acoustic Eavesdropping Method. Pengfei Hu, Wenhao Li, Riccardo Spolaor, Xiuzhen Cheng |
| 2023 | mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array. Rohith Reddy Vennam, Ish Kumar Jain, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia |
| 2023 | zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure. Michael Rosenberg, Jacob D. White, Christina Garman, Ian Miers |
| 2023 | μSwitch: Fast Kernel Context Isolation with Implicit Context Switches. Dinglan Peng, Congyu Liu, Tapti Palit, Pedro Fonseca, Anjo Vahldiek-Oberwagner, Mona Vij |