SP A*

256 papers

YearTitle / Authors
2025"Check-Before-you-Solve": Verifiable Time-Lock Puzzles.
Jiajun Xin, Dimitrios Papadopoulos
2025"I'm Pretty Expert and I Still Screw It Up": Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs.
Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl
2025"It's Time. Time for Digital Security.": An End User Study on Actionable Security and Privacy Advice.
Anna Lena Rotthaler, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, Yasemin Acar
2025"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures.
Souradip Nath, Ananta Soneji, Jaejong Baek, Tiffany Bao, Adam Doupé, Carlos E. Rubio-Medrano, Gail-Joon Ahn
2025"It's been Lovely Watching you": Institutional Decision-Making on Online Proctoring Software.
Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam J. Aviv, Shaanan Cohney
2025"Not the Right Question?" A Study on Attitudes Toward Client-Side Scanning with Security and Privacy Researchers and a U.S. Population Sample.
Lisa Geierhaas, Florin Martius, Arthi Arumugam, Matthew Smith
2025"Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web.
Tommaso Innocenti, Louis Jannett, Christian Mainka, Vladislav Mladenov, Engin Kirda
2025"Sorry for Bugging you so much." Exploring Developers' Behavior Towards Privacy-Compliant Implementation.
Stefan Albert Horstmann, Sandy Hong, David Klein, Raphael Serafini, Martin Degeling, Martin Johns, Veelasha Moonsamy, Alena Naiakshina
2025"We can't Allow IoT Vendors to Pass off all Such Liability to the Consumer": Investigating the U.S. Legal Perspectives on Liability for IoT Product Security.
Prianka Mandal, Amit Seal Ami, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait Nadkarni
2025"We can't Change it Overnight": Understanding Industry Perspectives on IoT Product Security Compliance and Certification.
Prianka Mandal, Adwait Nadkarni
2025"Why Would Money Protect me from Cyber Bullying?": A Mixed-Methods Study of Personal Cyber Insurance.
Rachiyta Jain, Temima Hrle, Margherita Marinetti, Adam D. G. Jenkins, Rainer Böhme, Daniel W. Woods
2025"You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods.
Collins W. Munyendo, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno, Franziska Roesner
2025(Blind) Users Really Do Heed Aural Telephone Scam Warnings.
Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello
2025403 Forbidden? Ethically Evaluating Broken Access Control in the Wild.
Saiid El Hajj Chehade, Florian Hantke, Ben Stock
2025A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements.
Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang
2025A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms.
Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet S. Arora, Mohsen Minaei
2025A Deep Dive into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports.
Jessy Ayala, Steven Ngo, Joshua Garcia
2025A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution.
Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks
2025A Wall Behind A Wall: Emerging Regional Censorship in China.
Mingshi Wu, Ali Zohaib, Zakir Durumeric, Amir Houmansadr, Eric Wustrow
2025ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs.
Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs
2025AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators.
Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang
2025Adversarial Robust ViT-Based Automatic Modulation Recognition in Practical Deep Learning-Based Wireless Systems.
Gen Li, ChunChih Lin, Xiaonan Zhang, Xiaolong Ma, Linke Guo
2025Alleviating the Fear of Losing Alignment in LLM Fine-tuning.
Kang Yang, Guanhong Tao, Xun Chen, Jun Xu
2025An Attack on TON's ADNL Secure Channel Protocol.
Aviv Frenkel, Dmitry Kogan
2025An Attack-Agnostic Defense Framework Against Manipulation Attacks Under Local Differential Privacy.
Puning Zhao, Zhikun Zhang, Jiawei Dong, Jiafei Wu, Zhe Liu, Shaowei Wang, Yunjun Gao
2025Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills.
Aafaq Sabir, Abhinaya S. B., Dilawer Ahmed, Anupam Das
2025Analyzing the iOS Local Network Permission from a Technical and User Perspective.
David Schmidt, Alexander Ponticello, Magdalena Steinböck, Katharina Krombholz, Martina Lindorfer
2025Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing.
Sina Kamali, Diogo Barradas
2025Architectural Neural Backdoors from First Principles.
Harry Langford, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot
2025Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs.
Wanning Ding, Yuzhe Tang, Yibo Wang
2025Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation Under Differential Privacy.
Takao Murakami, Yuichi Sei, Reo Eriguchi
2025BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target.
Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, Xiangyu Zhang
2025BPSniff: Continuously Surveilling Private Blood Pressure Information in the Metaverse via Unrestricted Inbuilt Motion Sensors.
Zhengkun Ye, Ahmed Tanvir Mahdad, Yan Wang, Cong Shi, Yingying Chen, Nitesh Saxena
2025BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments.
Jesse De Meulemeester, Luca Wilke, David F. Oswald, Thomas Eisenbarth, Ingrid Verbauwhede, Jo Van Bulck
2025BaseBridge: Bridging the Gap Between Over-the-Air and Emulation Testing for Cellular Baseband Firmware.
Daniel Klischies, Dyon Goos, David Hirsch, Alyssa Milburn, Marius Muench, Veelasha Moonsamy
2025Benchmarking Attacks on Learning with Errors.
Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter
2025Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls.
Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy
2025Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs.
Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang
2025Breaking the Barrier: Post-Barrier Spectre Attacks.
Johannes Wikner, Kaveh Razavi
2025BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel.
Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan, Wenchang Shi
2025CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction.
Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu
2025CMASan: Custom Memory Allocator-aware Address Sanitizer.
Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon
2025CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
Xiang Zhang, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan, Peng Zhao, Zijian Zhang, Bin Liu, Qing Guo, Tianwei Zhang, Nenghai Yu
2025Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains.
Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate
2025Ceviche: Capability-Enhanced Secure Virtualization of Caches.
Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat
2025Characterizing Robocalls with Multiple Vantage Points.
Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves
2025Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems.
Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson, Tobias Lauinger, Michelle L. Mazurek, Damon McCoy, Blase Ur
2025Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery.
Jiwon Kim, Dave Jing Tian, Benjamin E. Ujcich
2025CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels.
Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su
2025Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy.
Yingtai Xiao, Jian Du, Shikun Zhang, Wanrong Zhang, Qian Yang, Danfeng Zhang, Daniel Kifer
2025Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice.
John M. Schanck
2025CoBBL: Dynamic Constraint Generation for SNARKs.
Kunming Jiang, Fraser Brown, Riad S. Wahby
2025Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications.
Jiawei Guo, Yu Nong, Zhiqiang Lin, Haipeng Cai
2025Codebreaker: Dynamic Extraction Attacks on Code Language Models.
Changzhou Han, Zehang Deng, Wanlun Ma, Xiaogang Zhu, Minhui Xue, Tianqing Zhu, Sheng Wen, Yang Xiang
2025CoinDef: A Comprehensive Code Injection Defense for the Electron Framework.
Zheng Yang, Simon P. Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee
2025Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity.
Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou
2025Connecting the Extra Dots (Contexts): Correlating External Information about Point of Interest for Attack Investigation.
Sareh Mohammadi, Hugo Kermabon-Bobinnec, Azadeh Tabiban, Lingyu Wang, Tomás Navarro Múnera, Yosr Jarraya
2025Constant Latency and Finality for Dynamically Available DAG.
Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
2025Countmamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction.
Xianwen Deng, Ruijie Zhao, Yanhao Wang, Mingwei Zhan, Zhi Xue, Yijun Wang
2025DPolicy: Managing Privacy Risks Across Multiple Releases with Differential Privacy.
Nicolas Küchler, Alexander Viand, Hidde Lycklama, Anwar Hithnawi
2025Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community.
Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, Kevin R. B. Butler
2025DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data.
Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin
2025DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks.
Yupei Liu, Yuqi Jia, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong
2025Decentralization of Ethereum's Builder Market.
Sen Yang, Kartik Nayak, Fan Zhang
2025Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.
Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin, Min Yang, Junyao He, Qi Li
2025Differentially Private Release of Israel's National Registry of Live Births.
Shlomi Hod, Ran Canetti
2025Differentially Private Selection Using Smooth Sensitivity.
Iago C. Chaves, Victor A. E. de Farias, Amanda Perez, Diego Mesquita, Javam C. Machado
2025Disassembly as Weighted Interval Scheduling with Learned Weights.
Antonio Flores-Montoya, Junghee Lim, Adam Seitz, Akshay Sood, Edward Raff, James Holt
2025EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications.
Yue Gu, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang
2025EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way).
Thomas Roche
2025Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices.
Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue
2025Efficient Proofs of Possession for Legacy Signatures.
Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs
2025Efficient Storage Integrity in Adversarial Settings.
Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick D. McDaniel
2025Empc: Effective Path Prioritization for Symbolic Execution with Path Cover.
Shuangjie Yao, Dongdong She
2025Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos.
Chengru Zhang, Xiao Yang, David F. Oswald, Mark Ryan, Philipp Jovanovic
2025Evaluating the Effectiveness of Memory Safety Sanitizers.
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch
2025EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations.
Jung-Woo Chang, Ke Sun, David Xia, Xinyu Zhang, Farinaz Koushanfar
2025EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems.
Xuejing Yuan, Jiangshan Zhang, Feng Guo, Kai Chen, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Dun Liu, Pan Li, Zihao Wang, Runnan Zhu
2025Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications.
Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, Yang Wang
2025Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications.
Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung
2025Eyes on your Typing: Snooping Finger Motions on Virtual Keyboards.
Sunwoo Lee, Wonsuk Choi
2025FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge.
Tianyu Zhang, Shen Dong, Oyku Deniz Kose, Yanning Shen, Yupeng Zhang
2025Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt.
José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub
2025Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang
2025Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization.
Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, Shouling Ji
2025Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites.
Zifeng Kang, Muxi Lyu, Zhengyu Liu, Jianjia Yu, Runqi Fan, Song Li, Yinzhi Cao
2025From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control.
Mujtahid Akon, Md. Toufikuzzaman, Syed Rafiul Hussain
2025From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis.
Kecen Li, Chen Gong, Xiaochen Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang
2025From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era.
Kun Wang, Meng Chen, Li Lu, Jingwen Feng, Qianniu Chen, Zhongjie Ba, Kui Ren, Chun Chen
2025From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy.
Qingqing Ye, Liantong Yu, Kai Huang, Xiaokui Xiao, Weiran Liu, Haibo Hu
2025Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-Based Prompt Injection Attacks via the Fine-Tuning Interface.
Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes
2025Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-to-Image Generation Models.
Yingkai Dong, Xiangtao Meng, Ning Yu, Zheng Li, Shanqing Guo
2025GDPR in the Small: A Field Study of Privacy and Security Challenges in Schools.
Francesco Ciclosi, Giovanna Varni, Fabio Massacci
2025GPTracker: A Large-Scale Measurement of Misused GPTs.
Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang
2025GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models.
Jiadong Lou, Xu Yuan, Rui Zhang, Xingliang Yuan, Neil Zhenqiang Gong, Nian-Feng Tzeng
2025GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning.
Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin
2025Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin
2025Groundhog: A Restart-Based Systems Framework for Increasing Availability in Threshold Cryptosystems.
Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri
2025Growlithe: A Developer-Centric Compliance Tool for Serverless Applications.
Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta
2025Guardain: Protecting Emerging Generative AI Workloads on Heterogeneous NPU.
Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, Lukas Cavigelli
2025Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets.
Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida
2025Harmonycloak: Making Music Unlearnable for Generative AI.
Syed Irfan Ali Meerza, Lichao Sun, Jian Liu
2025Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model.
Borja Balle, James Bell-Clark, Albert Cheu, Adrià Gascón, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke
2025Hermes: Efficient and Secure Multi-Writer Encrypted Database.
Tung Le, Thang Hoang
2025Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild.
Jiawei Zhou, Zidong Zhang, Lingyun Ying, Huajun Chai, Jiuxin Cao, Haixin Duan
2025Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound.
Yi Liu, Junzuo Lai, Peng Yang, Qi Wang, Anjia Yang, Siu-Ming Yiu, Jian Weng
2025HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware.
Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang
2025HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users).
Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou
2025HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost.
Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang
2025I know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs.
Cheng Gu, Yicheng Zhang, Nael B. Abu-Ghazaleh
2025IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025
Marina Blanton, William Enck, Cristina Nita-Rotaru
2025INCOGNITOS: A Practical Unikernel Design for Full-System Obfuscation in Confidential Virtual Machines.
Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee
2025IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions.
Marius Momeu, Alexander J. Gaidis, Jasper v. d. Heidt, Vasileios P. Kemerlis
2025Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints.
Runze Zhang, Ranjita Pai Sridhar, Mingxuan Yao, Zheng Yang, David Oygenblik, Haichuan Xu, Vacha Dave, Cormac Herley, Paul England, Brendan Saltaformaggio
2025Impossibility Results for Post-Compromise Security in Real-World Communication Systems.
Cas Cremers, Niklas Medinger, Aurora Naska
2025Improved Constructions for Distributed Multi-Point Functions.
Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Yaxin Tu
2025Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation.
Naiqian Zhang, Dongpeng Xu, Jiang Ming, Jun Xu, Qiaoyan Yu
2025Invade the Walled Garden: Evaluating GTP Security in Cellular Networks.
Yiming Zhang, Tao Wan, Yaru Yang, Haixin Duan, Yichen Wang, Jianjun Chen, Zixiang Wei, Xiang Li
2025Investigating Physical Latency Attacks Against Camera-Based Perception.
Raymond Muller, Ruoyu Song, Chenyi Wang, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik
2025Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations.
Guopeng Lin, Xiaoning Du, Lushan Song, Weili Han, Jin Tan, Junming Ma, Wenjing Fang, Lei Wang
2025Is Nobody There? Good! Globally Measuring Connection Tampering Without Responsive Endhosts.
Sadia Nourin, Erik C. Rye, Kevin Bock, Nguyen Phong Hoang, Dave Levin
2025JesseQ: Efficient Zero-Knowledge Proofs for Circuits Over Any Field.
Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au
2025Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies.
Elham Pourabbas Vafa, Mohit Singhal, Poojitha Thota, Sayak Saha Roy
2025Let's Get Visual - Testing Visual Analogies and Metaphors for Conveying Privacy Policies and Data Handling Information.
Verena Zimmermann, Adrienn Toth, Hannah Sievers, Linda Fanconi, Yanis Isenring, Mona Henz, Alina Stöver, Nina Gerber
2025Liquefaction: Privately Liquefying Blockchain Assets.
James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu, Ari Juels
2025Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback.
Hongcheng Zhu, Zongkun Sun, Yanzhen Ren, Kun He, Yongpeng Yan, Zixuan Wang, Wuyang Liu, Yuhong Yang, Weiping Tu
2025Low-Cost and Robust Global Time Synchronization.
Marc Wyss, Marc Frei, Jonghoon Kwon, Adrian Perrig
2025MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure.
Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil
2025MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications.
Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang
2025Machine Learning with Privacy for Protected Attributes.
Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri
2025Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks.
Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng, Sheng Zhong, Fengyuan Xu
2025MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing.
Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song
2025Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach.
Bo Jiang, Wanrong Zhang, Donghang Lu, Jian Du, Sagar Sharma, Qiang Yan
2025MicroNova: Folding-Based Arguments with Efficient (On-Chain) Verification.
Jiaxing Zhao, Srinath T. V. Setty, Weidong Cui, Greg Zaverucha
2025Mind the Location Leakage in LEO Direct-to-Cell Satellite Networks.
Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Yuxuan Weng, Wei Liu, Qi Zhang, Jihao Li, Yuanjie Li, Jun Liu
2025Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary.
Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
2025Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts.
Shuofeng Liu, Mengyao Ma, Minhui Xue, Guangdong Bai
2025Mon CHERI: Mitigating Uninitialized Memory Access with Conditional Capabilities.
Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman
2025My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs.
Ruofan Zhu, Ganhao Chen, Wenbo Shen, Xiaofei Xie, Rui Chang
2025Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging.
Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa
2025Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning.
Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan
2025On the (In)Security of LLM App Stores.
Xinyi Hou, Yanjie Zhao, Haoyu Wang
2025On the Conflict Between Robustness and Learning in Collaborative Machine Learning.
Mathilde Raynal, Carmela Troncoso
2025On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts.
Yicong Tan, Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang
2025Open Sesame! On the Security and Memorability of Verbal Passwords.
Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim
2025Opera: Achieving Secure and High-Performance OLAP with Parallelized Homomorphic Comparisons.
Qi Hu, Wei Chen, Tianxiang Shen, Xin Yao, Nicholas Zhang, Heming Cui, Siu-Ming Yiu
2025Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities.
Rui Huan, Kopo M. Ramokapane, Awais Rashid
2025P2C2T: Preserving the Privacy of Cross-Chain Transfer.
Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino
2025PAC-Private Algorithms.
Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas
2025PEARTS: Provable Execution in Real-Time Embedded Systems.
Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes
2025PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning.
Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang
2025PFortifier: Mitigating PHP Object Injection Through Automatic Patch Generation.
Bo Pang, Yiheng Zhang, Mingzhe Gao, Junzhe Zhang, Ligeng Chen, Mingxue Zhangt, Gang Liang
2025PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature.
Yang Yang, Quan Shi, Prosanta Gope, Behzad Abdolmaleki, Biplab Sikdar
2025PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Samy Amer, Yingchen Wang, Hunter Kippen, Thinh Dang, Daniel Genkin, Andrew Kwong, Alexander Nelson, Arkady Yerukhimovich
2025Papercraft: Lattice-Based Verifiable Delay Function Implemented.
Michal Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta
2025Peek-a-Walk: Leaking Secrets via Page Walk Side Channels.
Alan Wang, Boru Chen, Yingchen Wang, Christopher W. Fletcher, Daniel Genkin, David Kohlbrenner, Riccardo Paccagnella
2025Peer2PIR: Private Queries for IPFS.
Miti Mazmudar, Shannon Veitch, Rasoul Akhavan Mahdavi
2025Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups).
Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang
2025Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES.
Changchang Ding, Yan Huang
2025Portal: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs).
Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Taesoo Kim
2025Post-Quantum Cryptographic Analysis of SSH.
Benjamin Bencina, Benjamin Dowling, Varun Maram, Keita Xagawa
2025Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning.
Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko, Surya Nepal
2025Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation.
Chenlin Wang, Wei Meng, Changhua Luo, Penghui Li
2025Preference Poisoning Attacks on Reward Model Learning.
Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik
2025Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof
2025Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-Based Healthcare Consultation.
Zhihuang Liu, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai
2025Prompt Inversion Attack Against Collaborative Inference of Large Language Models.
Wenjie Qu, Yuguang Zhou, Yongji Wu, Tingsong Xiao, Binhang Yuan, Yiming Li, Jiaheng Zhang
2025Provably Robust and Secure Steganography in Asymmetric Resource Scenario.
Minhao Bai, Jinshuai Yang, Kaiyi Pang, Xin Xu, Zhen Yang, Yongfeng Huang
2025PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages.
Joshua Wiedemeier, Elliot Tarbet, Max Zheng, Sangsoo Ko, Jessica Ouyang, Sang Kil Cha, Kangkook Jee
2025Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks.
Shaofei Li, Ziqi Zhang, Haomin Jia, Yao Guo, Xiangqun Chen, Ding Li
2025RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes.
Junyoung Park, Yunho Kim, Insu Yun
2025Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications.
An Chen, Yonghwi Kwon, Kyu Hyung Lee
2025RankGuess: Password Guessing Using Adversarial Ranking.
Tao Yang, Ding Wang
2025Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage.
Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz
2025Redefining Indirect Call Analysis with KallGraph.
Guoren Li, Manu Sridharan, Zhiyun Qian
2025Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS.
Daiping Liu, Ruian Duan, Jun Wang
2025Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness.
Justin Petelka, Benjamin Berens, Carlo Sugatan, Melanie Volkamer, Florian Schaub
2025Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks.
Zihao Wang, Rui Zhu, Zhikun Zhang, Haixu Tang, Xiaofeng Wang
2025Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More.
The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau
2025Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors.
Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi
2025Robust Threshold ECDSA with Online-Friendly Design in Three Rounds.
Guofeng Tang, Haiyang Xue
2025Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations.
Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl
2025SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection.
Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao, Zhiyun Qian
2025SHARK: Actively Secure Inference Using Function Secret Sharing.
Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma
2025SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon.
Jason Kim, Daniel Genkin, Yuval Yarom
2025SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis.
Yansong Li, Paula Branco, Alexander M. Hoole, Manish Marwah, Hari Manassery Koduvely, Guy-Vincent Jourdan, Stephan Jou
2025SYN Proof-of- Work: Improving Volumetric DoS Resilience in TCP.
Samuel DeLaughter, Karen R. Sollins
2025Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points.
Muhammad Daniyal Pirwani Dar, Robert Lorch, AliAkbar Sadeghi, Vincenzo Sorcigli, Héloïse Gollier, Cesare Tinelli, Mathy Vanhoef, Omar Chowdhury
2025Sailfish: Towards Improving the Latency of DAG-Based BFT.
Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak
2025Scheduled Disclosure: Turning Power into Timing Without Frequency Scaling.
Inwhan Chun, Isabella Siu, Riccardo Paccagnella
2025Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset.
Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang
2025Security Analysis of Master-Password-Protected Password Management Protocols.
Yihe Duan, Ding Wang, Yanduo Fu
2025Security Attacks Abusing Pulse-level Quantum Circuits.
Chuanqi Xu, Jakub Szefer
2025Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem.
Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang
2025Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics.
Warda Usman, John Sadik, Taha, Ran Elgedawy, Scott Ruoti, Daniel Zappala
2025Signature-Free Atomic Broadcast with Optimal $O(n^{2})$ Messages and $O(1)$ Expected Time.
Xiao Sui, Xin Wang, Sisi Duan
2025Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye.
Bradley Morgan, Gal Horowitz, Sioli O'Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin, Olaf Maennel, Paul Montague, Eyal Ronen, Yuval Yarom
2025Smaug: Modular Augmentation of LLVM for MPC.
Radhika Garg, Xiao Wang
2025Sniffing Location Privacy of Video Conference Users Using Free Audio Channels.
Long Huang, Chen Wang
2025SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research.
Warda Usman, Daniel Zappala
2025SoK: A Privacy Framework for Security Research Using Social Media Data.
Kyle Beadle, Kieron Ivy Turk, Aliai Eusebi, Mindy Tran, Marilyne Ordekian, Enrico Mariconti, Yixin Zou, Marie Vasek
2025SoK: Challenges and Paths Toward Memory Safety for eBPF.
Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger
2025SoK: Dataset Copyright Auditing in Machine Learning Systems.
Linkang Du, Xuanru Zhou, Min Chen, Chusong Zhang, Zhou Su, Peng Cheng, Jiming Chen, Zhikun Zhang
2025SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers.
Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay K. Jha
2025SoK: Digging into the Digital Underworld of Stolen Data Markets.
Tina Marjanov, Alice Hutchings
2025SoK: Dlog-Based Distributed Key Generation.
Renas Bacho, Alireza Kavousi
2025SoK: Integrity, Attestation, and Auditing of Program Execution.
Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes
2025SoK: Self-Generated Nudes over Private Chats: How can Technology Contribute to a Safer Sexting?
Joel Samper, Bernardo Ferreira
2025SoK: Software Compartmentalization.
Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall, Pierre Olivier
2025SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses.
Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu
2025SoK: Watermarking for AI-Generated Content.
Xuandong Zhao, Sam Gunn, Miranda Christ, Jaiden Fairoze, Andrés Fábrega, Nicholas Carlini, Sanjam Garg, Sanghyun Hong, Milad Nasr, Florian Tramèr, Somesh Jha, Lei Li, Yu-Xiang Wang, Dawn Song
2025Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space.
Johannes Willbold, Tobias Cloosters, Simon Wörner, Felix Buchmann, Moritz Schloegel, Lucas Davi, Thorsten Holz
2025Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis.
Kyle Fredrickson, Ioannis Demertzis, James P. Hughes, Darrell D. E. Long
2025Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment.
Gerbrand ten Napel, Michel van Eeten, Simon Parkin
2025Spoofing Eavesdroppers with Audio Misinformation.
Zhambyl Shaikhanov, Mahmoud Al-Madi, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly
2025Stateful Analysis and Fuzzing of Commercial Baseband Firmware.
Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Syed Rafiul Hussain
2025Study Club, Labor Union or Start-Up? Characterizing Teams and Collaboration in the Bug Bounty Ecosystem.
Yangheran Piao, Temima Hrle, Daniel W. Woods, Ross Anderson
2025Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation.
Zikai Wen, Lanjing Liu, Yaxing Yao
2025Supporting Human Raters with the Detection of Harmful Content Using Large Language Models.
Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein
2025SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World.
Junho Ahn, Kanghyuk Lee, Chanyoung Park, Hyungon Moon, Youngjin Kwon
2025TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices.
Yu Sun, Gaojian Xiong, Jianhua Liu, Zheng Liu, Jian Cui
2025Teaching Data Science Students to Sketch Privacy Designs Through Heuristics.
Jinhe Wen, Yingxi Zhao, Wenqian Xu, Yaxing Yao, Haojian Jin
2025The Digital Cybersecurity Expert: How Far Have We Come?
Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li
2025The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes.
Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich
2025The Importance of Being Earnest: Shedding Light on Johnny's (False) Sense of Privacy.
Wirawan Agahari, Alexandra Dirksen, Martin Johns, Mark de Reuver, Tobias Fiebig
2025The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against "Truly Anonymous" Synthetic Datasets.
Georgi Ganev, Emiliano De Cristofaro
2025Tiktag: Breaking ARM's Memory Tagging Extension with Speculative Execution.
Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee
2025Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation.
Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen
2025Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs.
Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang
2025Towards ML-KEM & ML-DSA on OpenTitan.
Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl
2025Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang
2025TrafficFormer: An Efficient Pre-trained Model for Traffic Data.
Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu
2025Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks.
Sander Wiebing, Cristiano Giuffrida
2025Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations.
Jan H. Klemmer, Juliane Schmüser, Byron M. Lowens, Fabian Fischer, Lea Schmüser, Florian Schaub, Sascha Fahl
2025Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer.
Niklas Niere, Felix Lange, Robert Merget, Juraj Somorovsky
2025TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security.
Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan
2025TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead.
Quang Cao, Son Hoang Dau, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng
2025Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop.
Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini
2025TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries.
Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang
2025UnMarker: A Universal Attack on Defensive Image Watermarking.
Andre Kassis, Urs Hengartner
2025Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms.
Mutahar Ali, Arjun Arunasalam, Habiba Farrukh
2025Understanding the Efficacy of Phishing Training in Practice.
Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, Geoffrey M. Voelker
2025Unveiling Security Vulnerabilities in Git Large File Storage Protocol.
Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji
2025VerITAS: Verifying Image Transformations at Scale.
Trisha Datta, Binyi Chen, Dan Boneh
2025Verifiable Boosted Tree Ensembles.
Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri
2025Verifiable Secret Sharing Simplified.
Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren
2025Vitārit: Paying for Threshold Services on Bitcoin and Friends.
Sri Aravinda Krishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee
2025Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs.
Alex Ozdemir, Evan Laufer, Dan Boneh
2025Warning! The Timeout T Cannot Protect You From Losing Coins: PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps.
Peifang Ni, Anqi Tian, Jing Xu
2025Watermarking Language Models for Many Adaptive Users.
Aloni Cohen, Alexander Hoover, Gabe Schoenbach
2025What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research.
Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates
2025WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem.
Mona Wang, Jeffrey Knockel, Zoë Reichert, Prateek Mittal, Jonathan R. Mayer
2025You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels.
Hadjer Benkraouda, Nirav Diwan, Gang Wang
2025Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals.
Lina Pu, Yu Luo, Song Han, Junming Diao
2025ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations.
Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen
2025Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs.
Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst