| 2025 | "Check-Before-you-Solve": Verifiable Time-Lock Puzzles. Jiajun Xin, Dimitrios Papadopoulos |
| 2025 | "I'm Pretty Expert and I Still Screw It Up": Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs. Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl |
| 2025 | "It's Time. Time for Digital Security.": An End User Study on Actionable Security and Privacy Advice. Anna Lena Rotthaler, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, Yasemin Acar |
| 2025 | "It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures. Souradip Nath, Ananta Soneji, Jaejong Baek, Tiffany Bao, Adam Doupé, Carlos E. Rubio-Medrano, Gail-Joon Ahn |
| 2025 | "It's been Lovely Watching you": Institutional Decision-Making on Online Proctoring Software. Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam J. Aviv, Shaanan Cohney |
| 2025 | "Not the Right Question?" A Study on Attitudes Toward Client-Side Scanning with Security and Privacy Researchers and a U.S. Population Sample. Lisa Geierhaas, Florin Martius, Arthi Arumugam, Matthew Smith |
| 2025 | "Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web. Tommaso Innocenti, Louis Jannett, Christian Mainka, Vladislav Mladenov, Engin Kirda |
| 2025 | "Sorry for Bugging you so much." Exploring Developers' Behavior Towards Privacy-Compliant Implementation. Stefan Albert Horstmann, Sandy Hong, David Klein, Raphael Serafini, Martin Degeling, Martin Johns, Veelasha Moonsamy, Alena Naiakshina |
| 2025 | "We can't Allow IoT Vendors to Pass off all Such Liability to the Consumer": Investigating the U.S. Legal Perspectives on Liability for IoT Product Security. Prianka Mandal, Amit Seal Ami, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait Nadkarni |
| 2025 | "We can't Change it Overnight": Understanding Industry Perspectives on IoT Product Security Compliance and Certification. Prianka Mandal, Adwait Nadkarni |
| 2025 | "Why Would Money Protect me from Cyber Bullying?": A Mixed-Methods Study of Personal Cyber Insurance. Rachiyta Jain, Temima Hrle, Margherita Marinetti, Adam D. G. Jenkins, Rainer Böhme, Daniel W. Woods |
| 2025 | "You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods. Collins W. Munyendo, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno, Franziska Roesner |
| 2025 | (Blind) Users Really Do Heed Aural Telephone Scam Warnings. Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello |
| 2025 | 403 Forbidden? Ethically Evaluating Broken Access Control in the Wild. Saiid El Hajj Chehade, Florian Hantke, Ben Stock |
| 2025 | A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements. Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang |
| 2025 | A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms. Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet S. Arora, Mohsen Minaei |
| 2025 | A Deep Dive into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports. Jessy Ayala, Steven Ngo, Joshua Garcia |
| 2025 | A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution. Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks |
| 2025 | A Wall Behind A Wall: Emerging Regional Censorship in China. Mingshi Wu, Ali Zohaib, Zakir Durumeric, Amir Houmansadr, Eric Wustrow |
| 2025 | ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs. Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs |
| 2025 | AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators. Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang |
| 2025 | Adversarial Robust ViT-Based Automatic Modulation Recognition in Practical Deep Learning-Based Wireless Systems. Gen Li, ChunChih Lin, Xiaonan Zhang, Xiaolong Ma, Linke Guo |
| 2025 | Alleviating the Fear of Losing Alignment in LLM Fine-tuning. Kang Yang, Guanhong Tao, Xun Chen, Jun Xu |
| 2025 | An Attack on TON's ADNL Secure Channel Protocol. Aviv Frenkel, Dmitry Kogan |
| 2025 | An Attack-Agnostic Defense Framework Against Manipulation Attacks Under Local Differential Privacy. Puning Zhao, Zhikun Zhang, Jiawei Dong, Jiafei Wu, Zhe Liu, Shaowei Wang, Yunjun Gao |
| 2025 | Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills. Aafaq Sabir, Abhinaya S. B., Dilawer Ahmed, Anupam Das |
| 2025 | Analyzing the iOS Local Network Permission from a Technical and User Perspective. David Schmidt, Alexander Ponticello, Magdalena Steinböck, Katharina Krombholz, Martina Lindorfer |
| 2025 | Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing. Sina Kamali, Diogo Barradas |
| 2025 | Architectural Neural Backdoors from First Principles. Harry Langford, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot |
| 2025 | Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs. Wanning Ding, Yuzhe Tang, Yibo Wang |
| 2025 | Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation Under Differential Privacy. Takao Murakami, Yuichi Sei, Reo Eriguchi |
| 2025 | BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target. Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, Xiangyu Zhang |
| 2025 | BPSniff: Continuously Surveilling Private Blood Pressure Information in the Metaverse via Unrestricted Inbuilt Motion Sensors. Zhengkun Ye, Ahmed Tanvir Mahdad, Yan Wang, Cong Shi, Yingying Chen, Nitesh Saxena |
| 2025 | BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments. Jesse De Meulemeester, Luca Wilke, David F. Oswald, Thomas Eisenbarth, Ingrid Verbauwhede, Jo Van Bulck |
| 2025 | BaseBridge: Bridging the Gap Between Over-the-Air and Emulation Testing for Cellular Baseband Firmware. Daniel Klischies, Dyon Goos, David Hirsch, Alyssa Milburn, Marius Muench, Veelasha Moonsamy |
| 2025 | Benchmarking Attacks on Learning with Errors. Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter |
| 2025 | Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls. Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy |
| 2025 | Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs. Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang |
| 2025 | Breaking the Barrier: Post-Barrier Spectre Attacks. Johannes Wikner, Kaveh Razavi |
| 2025 | BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel. Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan, Wenchang Shi |
| 2025 | CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction. Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu |
| 2025 | CMASan: Custom Memory Allocator-aware Address Sanitizer. Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon |
| 2025 | CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis. Xiang Zhang, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan, Peng Zhao, Zijian Zhang, Bin Liu, Qing Guo, Tianwei Zhang, Nenghai Yu |
| 2025 | Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate |
| 2025 | Ceviche: Capability-Enhanced Secure Virtualization of Caches. Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat |
| 2025 | Characterizing Robocalls with Multiple Vantage Points. Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves |
| 2025 | Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems. Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson, Tobias Lauinger, Michelle L. Mazurek, Damon McCoy, Blase Ur |
| 2025 | Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery. Jiwon Kim, Dave Jing Tian, Benjamin E. Ujcich |
| 2025 | CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels. Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su |
| 2025 | Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy. Yingtai Xiao, Jian Du, Shikun Zhang, Wanrong Zhang, Qian Yang, Danfeng Zhang, Daniel Kifer |
| 2025 | Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice. John M. Schanck |
| 2025 | CoBBL: Dynamic Constraint Generation for SNARKs. Kunming Jiang, Fraser Brown, Riad S. Wahby |
| 2025 | Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications. Jiawei Guo, Yu Nong, Zhiqiang Lin, Haipeng Cai |
| 2025 | Codebreaker: Dynamic Extraction Attacks on Code Language Models. Changzhou Han, Zehang Deng, Wanlun Ma, Xiaogang Zhu, Minhui Xue, Tianqing Zhu, Sheng Wen, Yang Xiang |
| 2025 | CoinDef: A Comprehensive Code Injection Defense for the Electron Framework. Zheng Yang, Simon P. Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee |
| 2025 | Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou |
| 2025 | Connecting the Extra Dots (Contexts): Correlating External Information about Point of Interest for Attack Investigation. Sareh Mohammadi, Hugo Kermabon-Bobinnec, Azadeh Tabiban, Lingyu Wang, Tomás Navarro Múnera, Yosr Jarraya |
| 2025 | Constant Latency and Finality for Dynamically Available DAG. Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu |
| 2025 | Countmamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction. Xianwen Deng, Ruijie Zhao, Yanhao Wang, Mingwei Zhan, Zhi Xue, Yijun Wang |
| 2025 | DPolicy: Managing Privacy Risks Across Multiple Releases with Differential Privacy. Nicolas Küchler, Alexander Viand, Hidde Lycklama, Anwar Hithnawi |
| 2025 | Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community. Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, Kevin R. B. Butler |
| 2025 | DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data. Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin |
| 2025 | DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks. Yupei Liu, Yuqi Jia, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong |
| 2025 | Decentralization of Ethereum's Builder Market. Sen Yang, Kartik Nayak, Fan Zhang |
| 2025 | Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications. Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin, Min Yang, Junyao He, Qi Li |
| 2025 | Differentially Private Release of Israel's National Registry of Live Births. Shlomi Hod, Ran Canetti |
| 2025 | Differentially Private Selection Using Smooth Sensitivity. Iago C. Chaves, Victor A. E. de Farias, Amanda Perez, Diego Mesquita, Javam C. Machado |
| 2025 | Disassembly as Weighted Interval Scheduling with Learned Weights. Antonio Flores-Montoya, Junghee Lim, Adam Seitz, Akshay Sood, Edward Raff, James Holt |
| 2025 | EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications. Yue Gu, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang |
| 2025 | EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way). Thomas Roche |
| 2025 | Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices. Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue |
| 2025 | Efficient Proofs of Possession for Legacy Signatures. Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs |
| 2025 | Efficient Storage Integrity in Adversarial Settings. Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick D. McDaniel |
| 2025 | Empc: Effective Path Prioritization for Symbolic Execution with Path Cover. Shuangjie Yao, Dongdong She |
| 2025 | Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos. Chengru Zhang, Xiao Yang, David F. Oswald, Mark Ryan, Philipp Jovanovic |
| 2025 | Evaluating the Effectiveness of Memory Safety Sanitizers. Emanuel Q. Vintila, Philipp Zieris, Julian Horsch |
| 2025 | EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations. Jung-Woo Chang, Ke Sun, David Xia, Xinyu Zhang, Farinaz Koushanfar |
| 2025 | EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems. Xuejing Yuan, Jiangshan Zhang, Feng Guo, Kai Chen, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Dun Liu, Pan Li, Zihao Wang, Runnan Zhu |
| 2025 | Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications. Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, Yang Wang |
| 2025 | Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications. Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung |
| 2025 | Eyes on your Typing: Snooping Finger Motions on Virtual Keyboards. Sunwoo Lee, Wonsuk Choi |
| 2025 | FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge. Tianyu Zhang, Shen Dong, Oyku Deniz Kose, Yanning Shen, Yupeng Zhang |
| 2025 | Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt. José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub |
| 2025 | Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang |
| 2025 | Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization. Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, Shouling Ji |
| 2025 | Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites. Zifeng Kang, Muxi Lyu, Zhengyu Liu, Jianjia Yu, Runqi Fan, Song Li, Yinzhi Cao |
| 2025 | From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control. Mujtahid Akon, Md. Toufikuzzaman, Syed Rafiul Hussain |
| 2025 | From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis. Kecen Li, Chen Gong, Xiaochen Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang |
| 2025 | From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era. Kun Wang, Meng Chen, Li Lu, Jingwen Feng, Qianniu Chen, Zhongjie Ba, Kui Ren, Chun Chen |
| 2025 | From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy. Qingqing Ye, Liantong Yu, Kai Huang, Xiaokui Xiao, Weiran Liu, Haibo Hu |
| 2025 | Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-Based Prompt Injection Attacks via the Fine-Tuning Interface. Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes |
| 2025 | Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-to-Image Generation Models. Yingkai Dong, Xiangtao Meng, Ning Yu, Zheng Li, Shanqing Guo |
| 2025 | GDPR in the Small: A Field Study of Privacy and Security Challenges in Schools. Francesco Ciclosi, Giovanna Varni, Fabio Massacci |
| 2025 | GPTracker: A Large-Scale Measurement of Misused GPTs. Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang |
| 2025 | GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models. Jiadong Lou, Xu Yuan, Rui Zhang, Xingliang Yuan, Neil Zhenqiang Gong, Nian-Feng Tzeng |
| 2025 | GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning. Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin |
| 2025 | Gold OPRF: Post-Quantum Oblivious Power-Residue PRF. Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin |
| 2025 | Groundhog: A Restart-Based Systems Framework for Increasing Availability in Threshold Cryptosystems. Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri |
| 2025 | Growlithe: A Developer-Centric Compliance Tool for Serverless Applications. Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta |
| 2025 | Guardain: Protecting Emerging Generative AI Workloads on Heterogeneous NPU. Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, Lukas Cavigelli |
| 2025 | Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets. Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida |
| 2025 | Harmonycloak: Making Music Unlearnable for Generative AI. Syed Irfan Ali Meerza, Lichao Sun, Jian Liu |
| 2025 | Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model. Borja Balle, James Bell-Clark, Albert Cheu, Adrià Gascón, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke |
| 2025 | Hermes: Efficient and Secure Multi-Writer Encrypted Database. Tung Le, Thang Hoang |
| 2025 | Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild. Jiawei Zhou, Zidong Zhang, Lingyun Ying, Huajun Chai, Jiuxin Cao, Haixin Duan |
| 2025 | Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound. Yi Liu, Junzuo Lai, Peng Yang, Qi Wang, Anjia Yang, Siu-Ming Yiu, Jian Weng |
| 2025 | HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware. Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang |
| 2025 | HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users). Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou |
| 2025 | HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost. Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang |
| 2025 | I know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs. Cheng Gu, Yicheng Zhang, Nael B. Abu-Ghazaleh |
| 2025 | IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025 Marina Blanton, William Enck, Cristina Nita-Rotaru |
| 2025 | INCOGNITOS: A Practical Unikernel Design for Full-System Obfuscation in Confidential Virtual Machines. Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee |
| 2025 | IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions. Marius Momeu, Alexander J. Gaidis, Jasper v. d. Heidt, Vasileios P. Kemerlis |
| 2025 | Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints. Runze Zhang, Ranjita Pai Sridhar, Mingxuan Yao, Zheng Yang, David Oygenblik, Haichuan Xu, Vacha Dave, Cormac Herley, Paul England, Brendan Saltaformaggio |
| 2025 | Impossibility Results for Post-Compromise Security in Real-World Communication Systems. Cas Cremers, Niklas Medinger, Aurora Naska |
| 2025 | Improved Constructions for Distributed Multi-Point Functions. Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Yaxin Tu |
| 2025 | Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation. Naiqian Zhang, Dongpeng Xu, Jiang Ming, Jun Xu, Qiaoyan Yu |
| 2025 | Invade the Walled Garden: Evaluating GTP Security in Cellular Networks. Yiming Zhang, Tao Wan, Yaru Yang, Haixin Duan, Yichen Wang, Jianjun Chen, Zixiang Wei, Xiang Li |
| 2025 | Investigating Physical Latency Attacks Against Camera-Based Perception. Raymond Muller, Ruoyu Song, Chenyi Wang, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik |
| 2025 | Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations. Guopeng Lin, Xiaoning Du, Lushan Song, Weili Han, Jin Tan, Junming Ma, Wenjing Fang, Lei Wang |
| 2025 | Is Nobody There? Good! Globally Measuring Connection Tampering Without Responsive Endhosts. Sadia Nourin, Erik C. Rye, Kevin Bock, Nguyen Phong Hoang, Dave Levin |
| 2025 | JesseQ: Efficient Zero-Knowledge Proofs for Circuits Over Any Field. Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au |
| 2025 | Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies. Elham Pourabbas Vafa, Mohit Singhal, Poojitha Thota, Sayak Saha Roy |
| 2025 | Let's Get Visual - Testing Visual Analogies and Metaphors for Conveying Privacy Policies and Data Handling Information. Verena Zimmermann, Adrienn Toth, Hannah Sievers, Linda Fanconi, Yanis Isenring, Mona Henz, Alina Stöver, Nina Gerber |
| 2025 | Liquefaction: Privately Liquefying Blockchain Assets. James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu, Ari Juels |
| 2025 | Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback. Hongcheng Zhu, Zongkun Sun, Yanzhen Ren, Kun He, Yongpeng Yan, Zixuan Wang, Wuyang Liu, Yuhong Yang, Weiping Tu |
| 2025 | Low-Cost and Robust Global Time Synchronization. Marc Wyss, Marc Frei, Jonghoon Kwon, Adrian Perrig |
| 2025 | MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure. Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil |
| 2025 | MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications. Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang |
| 2025 | Machine Learning with Privacy for Protected Attributes. Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri |
| 2025 | Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks. Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng, Sheng Zhong, Fengyuan Xu |
| 2025 | MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing. Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song |
| 2025 | Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach. Bo Jiang, Wanrong Zhang, Donghang Lu, Jian Du, Sagar Sharma, Qiang Yan |
| 2025 | MicroNova: Folding-Based Arguments with Efficient (On-Chain) Verification. Jiaxing Zhao, Srinath T. V. Setty, Weidong Cui, Greg Zaverucha |
| 2025 | Mind the Location Leakage in LEO Direct-to-Cell Satellite Networks. Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Yuxuan Weng, Wei Liu, Qi Zhang, Jihao Li, Yuanjie Li, Jun Liu |
| 2025 | Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary. Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate |
| 2025 | Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts. Shuofeng Liu, Mengyao Ma, Minhui Xue, Guangdong Bai |
| 2025 | Mon CHERI: Mitigating Uninitialized Memory Access with Conditional Capabilities. Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman |
| 2025 | My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs. Ruofan Zhu, Ganhao Chen, Wenbo Shen, Xiaofei Xie, Rui Chang |
| 2025 | Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging. Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa |
| 2025 | Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning. Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan |
| 2025 | On the (In)Security of LLM App Stores. Xinyi Hou, Yanjie Zhao, Haoyu Wang |
| 2025 | On the Conflict Between Robustness and Learning in Collaborative Machine Learning. Mathilde Raynal, Carmela Troncoso |
| 2025 | On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts. Yicong Tan, Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang |
| 2025 | Open Sesame! On the Security and Memorability of Verbal Passwords. Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim |
| 2025 | Opera: Achieving Secure and High-Performance OLAP with Parallelized Homomorphic Comparisons. Qi Hu, Wei Chen, Tianxiang Shen, Xin Yao, Nicholas Zhang, Heming Cui, Siu-Ming Yiu |
| 2025 | Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities. Rui Huan, Kopo M. Ramokapane, Awais Rashid |
| 2025 | P2C2T: Preserving the Privacy of Cross-Chain Transfer. Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino |
| 2025 | PAC-Private Algorithms. Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas |
| 2025 | PEARTS: Provable Execution in Real-Time Embedded Systems. Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes |
| 2025 | PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang |
| 2025 | PFortifier: Mitigating PHP Object Injection Through Automatic Patch Generation. Bo Pang, Yiheng Zhang, Mingzhe Gao, Junzhe Zhang, Ligeng Chen, Mingxue Zhangt, Gang Liang |
| 2025 | PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature. Yang Yang, Quan Shi, Prosanta Gope, Behzad Abdolmaleki, Biplab Sikdar |
| 2025 | PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer. Samy Amer, Yingchen Wang, Hunter Kippen, Thinh Dang, Daniel Genkin, Andrew Kwong, Alexander Nelson, Arkady Yerukhimovich |
| 2025 | Papercraft: Lattice-Based Verifiable Delay Function Implemented. Michal Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta |
| 2025 | Peek-a-Walk: Leaking Secrets via Page Walk Side Channels. Alan Wang, Boru Chen, Yingchen Wang, Christopher W. Fletcher, Daniel Genkin, David Kohlbrenner, Riccardo Paccagnella |
| 2025 | Peer2PIR: Private Queries for IPFS. Miti Mazmudar, Shannon Veitch, Rasoul Akhavan Mahdavi |
| 2025 | Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups). Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang |
| 2025 | Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES. Changchang Ding, Yan Huang |
| 2025 | Portal: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs). Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Taesoo Kim |
| 2025 | Post-Quantum Cryptographic Analysis of SSH. Benjamin Bencina, Benjamin Dowling, Varun Maram, Keita Xagawa |
| 2025 | Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning. Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko, Surya Nepal |
| 2025 | Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation. Chenlin Wang, Wei Meng, Changhua Luo, Penghui Li |
| 2025 | Preference Poisoning Attacks on Reward Model Learning. Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik |
| 2025 | Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof |
| 2025 | Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-Based Healthcare Consultation. Zhihuang Liu, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai |
| 2025 | Prompt Inversion Attack Against Collaborative Inference of Large Language Models. Wenjie Qu, Yuguang Zhou, Yongji Wu, Tingsong Xiao, Binhang Yuan, Yiming Li, Jiaheng Zhang |
| 2025 | Provably Robust and Secure Steganography in Asymmetric Resource Scenario. Minhao Bai, Jinshuai Yang, Kaiyi Pang, Xin Xu, Zhen Yang, Yongfeng Huang |
| 2025 | PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages. Joshua Wiedemeier, Elliot Tarbet, Max Zheng, Sangsoo Ko, Jessica Ouyang, Sang Kil Cha, Kangkook Jee |
| 2025 | Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks. Shaofei Li, Ziqi Zhang, Haomin Jia, Yao Guo, Xiangqun Chen, Ding Li |
| 2025 | RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes. Junyoung Park, Yunho Kim, Insu Yun |
| 2025 | Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications. An Chen, Yonghwi Kwon, Kyu Hyung Lee |
| 2025 | RankGuess: Password Guessing Using Adversarial Ranking. Tao Yang, Ding Wang |
| 2025 | Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage. Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz |
| 2025 | Redefining Indirect Call Analysis with KallGraph. Guoren Li, Manu Sridharan, Zhiyun Qian |
| 2025 | Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS. Daiping Liu, Ruian Duan, Jun Wang |
| 2025 | Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness. Justin Petelka, Benjamin Berens, Carlo Sugatan, Melanie Volkamer, Florian Schaub |
| 2025 | Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks. Zihao Wang, Rui Zhu, Zhikun Zhang, Haixu Tang, Xiaofeng Wang |
| 2025 | Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More. The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau |
| 2025 | Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors. Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi |
| 2025 | Robust Threshold ECDSA with Online-Friendly Design in Three Rounds. Guofeng Tang, Haiyang Xue |
| 2025 | Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl |
| 2025 | SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection. Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao, Zhiyun Qian |
| 2025 | SHARK: Actively Secure Inference Using Function Secret Sharing. Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma |
| 2025 | SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon. Jason Kim, Daniel Genkin, Yuval Yarom |
| 2025 | SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis. Yansong Li, Paula Branco, Alexander M. Hoole, Manish Marwah, Hari Manassery Koduvely, Guy-Vincent Jourdan, Stephan Jou |
| 2025 | SYN Proof-of- Work: Improving Volumetric DoS Resilience in TCP. Samuel DeLaughter, Karen R. Sollins |
| 2025 | Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points. Muhammad Daniyal Pirwani Dar, Robert Lorch, AliAkbar Sadeghi, Vincenzo Sorcigli, Héloïse Gollier, Cesare Tinelli, Mathy Vanhoef, Omar Chowdhury |
| 2025 | Sailfish: Towards Improving the Latency of DAG-Based BFT. Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak |
| 2025 | Scheduled Disclosure: Turning Power into Timing Without Frequency Scaling. Inwhan Chun, Isabella Siu, Riccardo Paccagnella |
| 2025 | Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset. Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang |
| 2025 | Security Analysis of Master-Password-Protected Password Management Protocols. Yihe Duan, Ding Wang, Yanduo Fu |
| 2025 | Security Attacks Abusing Pulse-level Quantum Circuits. Chuanqi Xu, Jakub Szefer |
| 2025 | Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem. Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang |
| 2025 | Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics. Warda Usman, John Sadik, Taha, Ran Elgedawy, Scott Ruoti, Daniel Zappala |
| 2025 | Signature-Free Atomic Broadcast with Optimal $O(n^{2})$ Messages and $O(1)$ Expected Time. Xiao Sui, Xin Wang, Sisi Duan |
| 2025 | Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye. Bradley Morgan, Gal Horowitz, Sioli O'Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin, Olaf Maennel, Paul Montague, Eyal Ronen, Yuval Yarom |
| 2025 | Smaug: Modular Augmentation of LLVM for MPC. Radhika Garg, Xiao Wang |
| 2025 | Sniffing Location Privacy of Video Conference Users Using Free Audio Channels. Long Huang, Chen Wang |
| 2025 | SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research. Warda Usman, Daniel Zappala |
| 2025 | SoK: A Privacy Framework for Security Research Using Social Media Data. Kyle Beadle, Kieron Ivy Turk, Aliai Eusebi, Mindy Tran, Marilyne Ordekian, Enrico Mariconti, Yixin Zou, Marie Vasek |
| 2025 | SoK: Challenges and Paths Toward Memory Safety for eBPF. Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger |
| 2025 | SoK: Dataset Copyright Auditing in Machine Learning Systems. Linkang Du, Xuanru Zhou, Min Chen, Chusong Zhang, Zhou Su, Peng Cheng, Jiming Chen, Zhikun Zhang |
| 2025 | SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers. Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay K. Jha |
| 2025 | SoK: Digging into the Digital Underworld of Stolen Data Markets. Tina Marjanov, Alice Hutchings |
| 2025 | SoK: Dlog-Based Distributed Key Generation. Renas Bacho, Alireza Kavousi |
| 2025 | SoK: Integrity, Attestation, and Auditing of Program Execution. Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes |
| 2025 | SoK: Self-Generated Nudes over Private Chats: How can Technology Contribute to a Safer Sexting? Joel Samper, Bernardo Ferreira |
| 2025 | SoK: Software Compartmentalization. Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall, Pierre Olivier |
| 2025 | SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses. Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu |
| 2025 | SoK: Watermarking for AI-Generated Content. Xuandong Zhao, Sam Gunn, Miranda Christ, Jaiden Fairoze, Andrés Fábrega, Nicholas Carlini, Sanjam Garg, Sanghyun Hong, Milad Nasr, Florian Tramèr, Somesh Jha, Lei Li, Yu-Xiang Wang, Dawn Song |
| 2025 | Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space. Johannes Willbold, Tobias Cloosters, Simon Wörner, Felix Buchmann, Moritz Schloegel, Lucas Davi, Thorsten Holz |
| 2025 | Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis. Kyle Fredrickson, Ioannis Demertzis, James P. Hughes, Darrell D. E. Long |
| 2025 | Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment. Gerbrand ten Napel, Michel van Eeten, Simon Parkin |
| 2025 | Spoofing Eavesdroppers with Audio Misinformation. Zhambyl Shaikhanov, Mahmoud Al-Madi, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly |
| 2025 | Stateful Analysis and Fuzzing of Commercial Baseband Firmware. Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Syed Rafiul Hussain |
| 2025 | Study Club, Labor Union or Start-Up? Characterizing Teams and Collaboration in the Bug Bounty Ecosystem. Yangheran Piao, Temima Hrle, Daniel W. Woods, Ross Anderson |
| 2025 | Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation. Zikai Wen, Lanjing Liu, Yaxing Yao |
| 2025 | Supporting Human Raters with the Detection of Harmful Content Using Large Language Models. Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein |
| 2025 | SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World. Junho Ahn, Kanghyuk Lee, Chanyoung Park, Hyungon Moon, Youngjin Kwon |
| 2025 | TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices. Yu Sun, Gaojian Xiong, Jianhua Liu, Zheng Liu, Jian Cui |
| 2025 | Teaching Data Science Students to Sketch Privacy Designs Through Heuristics. Jinhe Wen, Yingxi Zhao, Wenqian Xu, Yaxing Yao, Haojian Jin |
| 2025 | The Digital Cybersecurity Expert: How Far Have We Come? Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li |
| 2025 | The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes. Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich |
| 2025 | The Importance of Being Earnest: Shedding Light on Johnny's (False) Sense of Privacy. Wirawan Agahari, Alexandra Dirksen, Martin Johns, Mark de Reuver, Tobias Fiebig |
| 2025 | The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against "Truly Anonymous" Synthetic Datasets. Georgi Ganev, Emiliano De Cristofaro |
| 2025 | Tiktag: Breaking ARM's Memory Tagging Extension with Speculative Execution. Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee |
| 2025 | Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation. Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen |
| 2025 | Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs. Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang |
| 2025 | Towards ML-KEM & ML-DSA on OpenTitan. Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl |
| 2025 | Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models. Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang |
| 2025 | TrafficFormer: An Efficient Pre-trained Model for Traffic Data. Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu |
| 2025 | Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks. Sander Wiebing, Cristiano Giuffrida |
| 2025 | Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations. Jan H. Klemmer, Juliane Schmüser, Byron M. Lowens, Fabian Fischer, Lea Schmüser, Florian Schaub, Sascha Fahl |
| 2025 | Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer. Niklas Niere, Felix Lange, Robert Merget, Juraj Somorovsky |
| 2025 | TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan |
| 2025 | TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead. Quang Cao, Son Hoang Dau, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng |
| 2025 | Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop. Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini |
| 2025 | TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries. Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang |
| 2025 | UnMarker: A Universal Attack on Defensive Image Watermarking. Andre Kassis, Urs Hengartner |
| 2025 | Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms. Mutahar Ali, Arjun Arunasalam, Habiba Farrukh |
| 2025 | Understanding the Efficacy of Phishing Training in Practice. Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, Geoffrey M. Voelker |
| 2025 | Unveiling Security Vulnerabilities in Git Large File Storage Protocol. Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji |
| 2025 | VerITAS: Verifying Image Transformations at Scale. Trisha Datta, Binyi Chen, Dan Boneh |
| 2025 | Verifiable Boosted Tree Ensembles. Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri |
| 2025 | Verifiable Secret Sharing Simplified. Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren |
| 2025 | Vitārit: Paying for Threshold Services on Bitcoin and Friends. Sri Aravinda Krishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee |
| 2025 | Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. Alex Ozdemir, Evan Laufer, Dan Boneh |
| 2025 | Warning! The Timeout T Cannot Protect You From Losing Coins: PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps. Peifang Ni, Anqi Tian, Jing Xu |
| 2025 | Watermarking Language Models for Many Adaptive Users. Aloni Cohen, Alexander Hoover, Gabe Schoenbach |
| 2025 | What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research. Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates |
| 2025 | WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem. Mona Wang, Jeffrey Knockel, Zoë Reichert, Prateek Mittal, Jonathan R. Mayer |
| 2025 | You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels. Hadjer Benkraouda, Nirav Diwan, Gang Wang |
| 2025 | Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals. Lina Pu, Yu Luo, Song Han, Junming Diao |
| 2025 | ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen |
| 2025 | Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs. Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst |