USENIX Security Symposium A*

423 papers

YearTitle / Authors
2023"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers.
Reethika Ramesh, Anjali Vyas, Roya Ensafi
2023"Employees Who Don't Accept the Time Security Takes Are Not Aware Enough": The CISO View of Human-Centred Security.
Jonas Hielscher, Uta Menges, Simon Parkin, Annette Kluge, M. Angela Sasse
2023"I wouldn't want my unsafe code to run my pacemaker": An Interview Study on the Use, Comprehension, and Perceived Risks of Unsafe Rust.
Sandra Höltervennhoff, Philip Klostermeyer, Noah Wöhler, Yasemin Acar, Sascha Fahl
2023"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology.
Victoria Zhong, Susan E. McGregor, Rachel Greenstadt
2023"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager.
Garrett Smith, Tarun Kumar Yadav, Jonathan Dutson, Scott Ruoti, Kent E. Seamons
2023"If sighted people know, I should be able to know: " Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology.
Yuhang Zhao, Yaxing Yao, Jiaru Fu, Nihan Zhou
2023"It's the Equivalent of Feeling Like You're in Jail": Lessons from Firsthand and Secondhand Accounts of IoT-Enabled Intimate Partner Abuse.
Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Rahul Chatterjee
2023"Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators.
Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, Kurt Thomas
2023"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan
2023"Security is not my field, I'm a stats guy": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry.
Jaron Mink, Harjot Kaur, Juliane Schmüser, Sascha Fahl, Yasemin Acar
2023"To Do This Properly, You Need More Resources": The Hidden Costs of Introducing Simulated Phishing Campaigns.
Lina Brunken, Annalina Buckmann, Jonas Hielscher, M. Angela Sasse
2023"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns.
Kovila P. L. Coopamootoo, Magdalene Ng
2023(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels.
Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz
202332nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023
Joseph A. Calandrino, Carmela Troncoso
2023A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs.
Gertjan Franken, Tom van Goethem, Lieven Desmet, Wouter Joosen
2023A Data-free Backdoor Injection Approach in Neural Networks.
Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen
2023A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian
2023A Large Scale Study of the Ethereum Arbitrage Ecosystem.
Robert McLaughlin, Christopher Kruegel, Giovanni Vigna
2023A Large-Scale Measurement of Website Login Policies.
Suood Abdulaziz Al-Roomi, Frank Li
2023A Mixed-Methods Study of Security Practices of Smart Contract Developers.
Tanusree Sharma, Kyrie Zhixuan Zhou, Andrew Miller, Yang Wang
2023A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games.
Chaoshun Zuo, Chao Wang, Zhiqiang Lin
2023A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang
2023A Research Framework and Initial Study of Browser Security for the Visually Impaired.
Elaine Lau, Zachary Peterson
2023A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming.
Yuzhou Feng, Ruyu Zhai, Radu Sion, Bogdan Carbunar
2023A Study of Multi-Factor and Risk-Based Authentication Availability.
Anthony Gavazzi, Ryan Williams, Engin Kirda, Long Lu, Andre King, Andy Davis, Tim Leek
2023A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.
Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, Blase Ur
2023A Verified Confidential Computing as a Service Framework for Privacy Preservation.
Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, Xiaofeng Wang
2023A comprehensive, formal and automated analysis of the EDHOC protocol.
Charlie Jacomme, Elise Klein, Steve Kremer, Maïwenn Racouchot
2023ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation.
Adam Caulfield, Norrathep Rattanavipanon, Ivan De Oliveira Nunes
2023ACORN: Input Validation for Secure Aggregation.
James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun
2023ACTOR: Action-Guided Kernel Fuzzing.
Marius Fleischer, Dipanjan Das, Priyanka Bose, Weiheng Bai, Kangjie Lu, Mathias Payer, Christopher Kruegel, Giovanni Vigna
2023ACon
Sangdon Park, Osbert Bastani, Taesoo Kim
2023AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich, Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein
2023AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering.
Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang
2023AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
2023AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma
2023ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry
2023ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi
2023ARI: Attestation of Real-time Mission Execution Integrity.
Jinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang
2023ARMore: Pushing Love Back Into Binaries.
Luca Di Bartolomeo, Hossein Moghaddas, Mathias Payer
2023ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms.
Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia
2023AURC: Detecting Errors in Program Code and Documentation.
Peiwei Hu, Ruigang Liang, Ying Cao, Kai Chen, Runze Zhang
2023Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.
Sophie Stephenson, Majed Almansoori, Pardis Emami Naeini, Danny Yuxing Huang, Rahul Chatterjee
2023Access Denied: Assessing Physical Risks to Internet Access Networks.
Alexander Marder, Zesen Zhang, Ricky K. P. Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, K. C. Claffy, Alex C. Snoeren, Aaron Schulman
2023Account Security Interfaces: Important, Unintuitive, and Untrustworthy.
Alaa Daffalla, Marina Sanusi Bohuk, Nicola Dell, Rosanna Bellini, Thomas Ristenpart
2023Account Verification on Social Media: User Perceptions and Paid Enrollment.
Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan R. Mayer
2023Adversarial Training for Raw-Binary Malware Classifiers.
Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif
2023Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang
2023Aliasing Backdoor Attacks on Pre-trained Models.
Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv
2023All cops are broadcasting: TETRA under scrutiny.
Carlo Meijer, Wouter Bokslag, Jos Wetzels
2023AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects.
Ruipeng Wang, Kaixiang Chen, Chao Zhang, Zulie Pan, Qianyu Li, Siliang Qin, Shenglin Xu, Min Zhang, Yang Li
2023An Efficient Design of Intelligent Network Data Plane.
Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu
2023An Empirical Study & Evaluation of Modern CAPTCHAs.
Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji
2023An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan
2023Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case.
Svetlana Abramova, Rainer Böhme
2023AnimateDead: Debloating Web Applications Using Concolic Execution.
Babak Amin Azad, Rasoul Jahanshahi, Chris Tsoukaladelis, Manuel Egele, Nick Nikiforakis
2023Araña: Discovering and Characterizing Password Guessing Attacks in Practice.
Mazharul Islam, Marina Sanusi Bohuk, Paul Chung, Thomas Ristenpart, Rahul Chatterjee
2023Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
2023Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, Xiaofeng Wang
2023Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment.
Dominic Deuber, Michael Keuchen, Nicolas Christin
2023Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma
2023Auditing Framework APIs via Inferred App-side Security Specifications.
Parjanya Vyas, Asim Waheed, Yousra Aafer, N. Asokan
2023Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu
2023Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
Yazhou Tu, Liqun Shan, Md. Imran Hossen, Sara Rampazzi, Kevin R. B. Butler, Xiali Hei
2023Authenticated private information retrieval.
Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford
2023AutoFR: Automated Filter Rule Generation for Adblocking.
Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq
2023Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib
2023Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
Cas Cremers, Alexander Dax, Charlie Jacomme, Mang Zhao
2023Automated Cookie Notice Analysis and Enforcement.
Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz
2023Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing.
Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, Chaojing Tang
2023Automated Inference on Financial Security of Ethereum Smart Contracts.
Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji
2023Automated Security Analysis of Exposure Notification Systems.
Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann
2023BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Eunsoo Kim, Minwoo Baek, CheolJun Park, Dongkwan Kim, Yongdae Kim, Insu Yun
2023Back to School: On the (In)Security of Academic VPNs.
Ka Lok Wu, Man Hong Hue, Ngai Man Poon, Kin Man Leung, Wai Yin Po, Kin Ting Wong, Sze Ho Hui, Sze Yiu Chau
2023BalanceProofs: Maintainable Vector Commitments with Fast Aggregation.
Weijie Wang, Annie Ulichney, Charalampos Papamanthou
2023Beyond The Gates: An Empirical Analysis of HTTP-Managed Password Stealers and Operators.
Athanasios Avgetidis, Omar Alrawi, Kevin Valakuzhy, Charles Lever, Paul Burbage, Angelos D. Keromytis, Fabian Monrose, Manos Antonakakis
2023Beyond Typosquatting: An In-depth Look at Package Confusion.
Shradha Neupane, Grant Holmes, Elizabeth Wyss, Drew Davidson, Lorenzo De Carli
2023Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes
2023Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information.
Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo
2023Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations.
Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, Jiaguang Sun
2023BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.
Mingi Cho, Dohyeon An, Hoyong Jin, Taekyoung Kwon
2023BotScreen: Trust Everybody, but Cut the Aimbots Yourself.
Minyeop Choi, Gihyuk Ko, Sang Kil Cha
2023Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka
2023BunnyHop: Exploiting the Instruction Prefetcher.
Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom
2023Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables.
Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef
2023CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu
2023CSHER: A System for Compact Storage with HE-Retrieval.
Adi Akavia, Neta Oren, Boaz Sapir, Margarita Vald
2023CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software.
Yuanyuan Yuan, Zhibo Liu, Shuai Wang
2023Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning.
Wenjun Qiu, David Lie, Lisa M. Austin
2023Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
Junzhe Wang, Matthew Sharp, Chuxiong Wu, Qiang Zeng, Lannan Luo
2023Capstone: A Capability-based Foundation for Trustless Secure Memory Access.
Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, Prateek Saxena
2023CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing.
Dawei Wang, Ying Li, Zhiyu Zhang, Kai Chen
2023Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu
2023Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom
2023Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities.
Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer
2023CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang
2023Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software.
Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth
2023ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.
Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu
2023CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot.
Liang Niu, Muhammad Shujaat Mirza, Zayd Maradni, Christina Pöpper
2023Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard
2023Combating Robocalls with Phone Virtual Assistant Mediated Interaction.
Sharbani Pandit, Krishanu Sarker, Roberto Perdisci, Mustaque Ahamad, Diyi Yang
2023Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
2023Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption.
Fabian Ising, Damian Poddebniak, Tobias Kappert, Christoph Saatjohann, Sebastian Schinzel
2023Continuous Learning for Android Malware Detection.
Yizheng Chen, Zhoujie Ding, David A. Wagner
2023Controlled Data Races in Enclaves: Attacks and Detection.
Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang
2023Cookie Crumbles: Breaking and Fixing Web Session Integrity.
Marco Squarcina, Pedro Adão, Lorenzo Veronese, Matteo Maffei
2023Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference.
Xueqiang Wang, Yuqiong Sun, Susanta Nanda, Xiaofeng Wang
2023Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li
2023Cryptographic Administration for Secure Group Messaging.
David Balbás, Daniel Collins, Serge Vaudenay
2023Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations.
Tarun Kumar Yadav, Devashish Gosain, Kent E. Seamons
2023Curve Trees: Practical and Transparent Zero-Knowledge Accumulators.
Matteo Campanelli, Mathias Hall-Andersen, Simon Holmgaard Kamp
2023DAFL: Directed Grey-box Fuzzing guided by Data Dependency.
Tae Eun Kim, Jaeseung Choi, Kihong Heo, Sang Kil Cha
2023DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Ming Yuan, Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang
2023DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao
2023DScope: A Cloud-Native Internet Telescope.
Eric Pauley, Paul Barford, Patrick D. McDaniel
2023DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship.
Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang
2023Decompiling x86 Deep Neural Network Executables.
Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Xiaofei Xie, Lei Ma
2023Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience.
Alexandra Nisenoff, Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, Blase Ur
2023Demystifying Pointer Authentication on Apple M1.
Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren
2023Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees.
Dino Mehmedagic, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, Wolfgang Kunz
2023Detecting API Post-Handling Bugs Using Code and Description in Patches.
Miaoqian Lin, Kai Chen, Yang Xiao
2023Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.
Ilia Shevrin, Oded Margalit
2023Detecting Union Type Confusion in Component Object Model.
Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng
2023Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
Haotian Chi, Qiang Zeng, Xiaojiang Du
2023Device Tracking via Linux's New TCP Source Port Selection Algorithm.
Moshe Kol, Amit Klein, Yossi Gilad
2023Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System.
Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, Adrian Perrig
2023DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing.
Jiawei Zhang, Zhongzhu Chen, Huan Zhang, Chaowei Xiao, Bo Li
2023Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities.
Zizhuang Deng, Guozhu Meng, Kai Chen, Tong Liu, Lu Xiang, Chunyang Chen
2023Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.
Ruoyu Song, Muslum Ozgur Ozmen, Hyungsub Kim, Raymond Muller, Z. Berkay Celik, Antonio Bianchi
2023Distance-Aware Private Set Intersection.
Anrin Chakraborti, Giulia Fanti, Michael K. Reiter
2023Diving into Robocall Content with SnorCall.
Sathvik Prasad, Trevor Dunlap, Alexander J. Ross, Bradley Reaves
2023Don't be Dense: Efficient Keyword PIR for Sparse Databases.
Sarvar Patel, Joon Young Seo, Kevin Yeo
2023Downfall: Exploiting Speculative Data Gathering.
Daniel Moghimi
2023Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones.
Elias Heftrig, Haya Schulmann, Michael Waidner
2023Dubhe: Succinct Zero-Knowledge Proofs for Standard AES and related Applications.
Changchang Ding, Yan Huang
2023Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.
Adithya Vadapalli, Ryan Henry, Ian Goldberg
2023DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation.
Zu-Ming Jiang, Jia-Ju Bai, Zhendong Su
2023ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.
Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, Hanjun Kim
2023Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.
Tao Ni, Guohao Lan, Jia Wang, Qingchuan Zhao, Weitao Xu
2023Educators' Perspectives of Using (or Not Using) Online Exam Proctoring.
David G. Balash, Elena Korkes, Miles Grant, Adam J. Aviv, Rahel A. Fainchtein, Micah Sherr
2023Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference.
Yun Li, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song
2023Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing.
Mingli Wu, Tsz Hon Yuen
2023Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries.
Haohuang Wen, Zhiqiang Lin
2023EnigMap: External-Memory Oblivious Map for Secure Enclaves.
Afonso Tinoco, Sixiang Gao, Elaine Shi
2023Eos: Efficient Private Delegation of zkSNARK Provers.
Alessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
2023Erebus: Access Control for Augmented Reality Systems.
Yoonsang Kim, Sanket Goutam, Amir Rahmati, Arie E. Kaufman
2023Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.
Tadayoshi Kohno, Yasemin Acar, Wulf Loh
2023Evading Provenance-Based ML Detectors with Adversarial System Actions.
Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, James Wei, Feng Chen, Muhyun Kim, Murat Kantarcioglu, Kangkook Jee
2023Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures.
Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, Jörg Schwenk
2023Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks.
Hamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
2023Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Swaathi Vetrivel, Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin
2023Examining Power Dynamics and User Privacy in Smart Technology Use Among Jordanian Households.
Wael S. Albayaydh, Ivan Flechais
2023Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang
2023Exploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps.
Oshrat Ayalon, Dana Turjeman, Elissa M. Redmiles
2023Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.
Zixin Wang, Danny Yuxing Huang, Yaxing Yao
2023Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner
2023Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet.
Nurullah Erinola, Marcel Maehren, Robert Merget, Juraj Somorovsky, Jörg Schwenk
2023Extended Hell(o): A Comprehensive Large-Scale Study on Email Confidentiality and Integrity Mechanisms in the Wild.
Birk Blechschmidt, Ben Stock
2023Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions.
Young Min Kim, Byoungyoung Lee
2023Extracting Protocol Format as State Machine via Controlled Static Loop Analysis.
Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang
2023Extracting Training Data from Diffusion Models.
Nicholas Carlini, Jamie Hayes, Milad Nasr, Matthew Jagielski, Vikash Sehwag, Florian Tramèr, Borja Balle, Daphne Ippolito, Eric Wallace
2023Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing.
Brian Tang, Kang G. Shin
2023FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks.
Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier
2023FACE-AUDITOR: Data Auditing in Facial Recognition Systems.
Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang
2023FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer
2023Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
Sahar Abdelnabi, Mario Fritz
2023Fairness Properties of Face Recognition and Obfuscation Systems.
Harrison Rosenberg, Brian Tang, Kassem Fawaz, Somesh Jha
2023Fast IDentity Online with Anonymous Credentials (FIDO-AC).
Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik
2023FedVal: Different good or different bad in federated learning.
Viktor Valadi, Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi
2023Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Xiaoguang Li, Ninghui Li, Wenhai Sun, Neil Zhenqiang Gong, Hui Li
2023FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules.
Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
2023FloatZone: Accelerating Memory Error Detection using the Floating Point Unit.
Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, Herbert Bos
2023Formal Analysis and Patching of BLE-SC Pairing.
Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du
2023Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
Cas Cremers, Alexander Dax, Aurora Naska
2023Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
Cas Cremers, Charlie Jacomme, Aurora Naska
2023Forming Faster Firmware Fuzzers.
Lukas Seidel, Dominik Christian Maier, Marius Muench
2023Fourteen Years in the Life: A Root Server's Perspective on DNS Resolver Security.
Alden Hilton, Casey T. Deccio, Jacob Davis
2023Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.
Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
2023Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings.
Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan
2023FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases.
Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin
2023FuncTeller: How Well Does eFPGA Hide Functionality?
Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa M. Shihab, Yiorgos Makris, Jeyavijayan Rajendran
2023Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery.
Kyungtae Kim, Sungwoo Kim, Kevin R. B. Butler, Antonio Bianchi, Rick Kennell, Dave Tian
2023FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.
Junjie Wang, Zhiyi Zhang, Shuang Liu, Xiaoning Du, Junjie Chen
2023Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge.
Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, Thorsten Holz
2023GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation.
Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez
2023GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation.
Hui Peng, Zhihao Yao, Ardalan Amiri Sani, Dave Tian, Mathias Payer
2023Generative Intrusion Detection and Prevention on Data Stream.
HyungBin Seo, MyungKeun Yoon
2023GigaDORAM: Breaking the Billion Address Barrier.
Brett Hemenway Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang
2023Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
2023Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi.
Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei
2023GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu
2023Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild.
Hammas Bin Tanveer, Rachee Singh, Paul Pearce, Rishab Nithyanand
2023Going through the motions: AR/VR keylogging from user head motions.
Carter Slocum, Yicheng Zhang, Nael B. Abu-Ghazaleh, Jiasi Chen
2023Gradient Obfuscation Gives a False Sense of Security in Federated Learning.
Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai
2023Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
Hui Jun Tay, Kyle Zeng, Jayakrishna Menon Vadayath, Arvind S. Raj, Audrey Dutcher, Tejesh Reddy, Wil Gibbs, Zion Leonahenahe Basque, Fangzhou Dong, Zack Smith, Adam Doupé, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang
2023Guarding Serverless Applications with Kalium.
Deepak Sirone Jegan, Liang Wang, Siddhant Bhagat, Michael M. Swift
2023HECO: Fully Homomorphic Encryption Compiler.
Alexander Viand, Patrick Jattke, Miro Haller, Anwar Hithnawi
2023HOLMES: Efficient Distribution Testing for Secure Collaborative Learning.
Ian Chang, Katerina Sotiraki, Weikeng Chen, Murat Kantarcioglu, Raluca A. Popa
2023HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.
Kong Huang, Yutong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang
2023Hard-label Black-box Universal Adversarial Patch Attack.
Guanhong Tao, Shengwei An, Siyuan Cheng, Guangyu Shen, Xiangyu Zhang
2023Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer
2023HashTag: Hash-based Integrity Protection for Tagged Architectures.
Lukas Lamster, Martin Unterguggenberger, David Schrammel, Stefan Mangard
2023Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia.
Piet De Vaere, Adrian Perrig
2023Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!
Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
2023Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware.
Mingxuan Yao, Jonathan Fuller, Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, Brendan Saltaformaggio
2023High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
2023Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs.
Tobias Scharnowski, Simon Wörner, Felix Buchmann, Nils Bars, Moritz Schloegel, Thorsten Holz
2023HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches.
Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu
2023Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.
Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom
2023How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal
2023How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities.
Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald
2023How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert
2023How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.
Mingshi Wu, Jackson Sippe, Danesh Sivakumar, Jack Burg, Peter Anderson, Xiaokang Wang, Kevin Bock, Amir Houmansadr, Dave Levin, Eric Wustrow
2023How to Bind Anonymous Credentials to Humans.
Julia Hesse, Nitin Singh, Alessandro Sorniotti
2023How to Cover up Anomalous Accesses to Electronic Health Records.
Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David M. Liebovitz, Gang Wang, Carl A. Gunter
2023Humans vs. Machines in Malware Classification.
Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti
2023HyPFuzz: Formal-Assisted Processor Fuzzing.
Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran
2023ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs.
Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos
2023Improving Logging to Reduce Permission Over-Granting Mistakes.
Bingyu Shen, Tianyi Shan, Yuanyuan Zhou
2023Improving Real-world Password Guessing Attacks via Bi-directional Transformers.
Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han
2023In the Quest to Protect Users from Side-Channel Attacks - A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment Terminals.
Karola Marky, Shaun Alexander Macdonald, Yasmeen Abdrabou, Mohamed Khamis
2023Inception: Exposing New Attack Surfaces with Training in Transient Execution.
Daniël Trujillo, Johannes Wikner, Kaveh Razavi
2023Inducing Authentication Failures to Bypass Credit Card PINs.
David A. Basin, Patrick Schaller, Jorge Toro-Pozo
2023Inductive Graph Unlearning.
Cheng-Long Wang, Mengdi Huai, Di Wang
2023InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack.
Yu Chen, Yang Yu, Lidong Zhai
2023Instructions Unclear: Undefined Behaviour in Cellular Network Specifications.
Daniel Klischies, Moritz Schloegel, Tobias Scharnowski, Mikhail Bogodukhov, David Rupprecht, Veelasha Moonsamy
2023Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance.
Jiwon Kim, Benjamin E. Ujcich, Dave Tian
2023Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT.
Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue
2023Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Dañiel Gerhardt, Alexander Ponticello, Adrian Dabrowski, Katharina Krombholz
2023Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3.
Christof Ferreira Torres, Fiona Willi, Shweta Shinde
2023Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
Matthias Gierlings, Marcus Brinkmann, Jörg Schwenk
2023It's all in your head(set): Side-channel attacks on AR/VR systems.
Yicheng Zhang, Carter Slocum, Jiasi Chen, Nael B. Abu-Ghazaleh
2023IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks.
Neophytos Christou, Di Jin, Vaggelis Atlidakis, Baishakhi Ray, Vasileios P. Kemerlis
2023Jinn: Hijacking Safe Programs with Trojans.
Komail Dharsee, John Criswell
2023KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao
2023Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet.
Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner
2023KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations.
Tingting Yin, Zicong Gao, Zhenghang Xiao, Zheyu Ma, Min Zheng, Chao Zhang
2023Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale.
Michele Campobasso, Luca Allodi
2023Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection.
Ruofan Liu, Yun Lin, Yifan Zhang, Penn Han Lee, Jin Song Dong
2023Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing
2023Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu
2023Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys.
Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz
2023LibScan: Towards More Precise Third-Party Library Identification for Android Applications.
Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang
2023LightThief: Your Optical Communication Information is Stolen behind the Wall.
Xin Liu, Wei Wang, Guanqun Song, Ting Zhu
2023Linear Private Set Union from Multi-Query Reverse Private Membership Test.
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
2023LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality.
Habiba Farrukh, Reham Mohamed, Aniket Nare, Antonio Bianchi, Z. Berkay Celik
2023Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.
Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez
2023Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications.
Thomas Yurek, Zhuolun Xiang, Yu Xia, Andrew Miller
2023Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants.
Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, Brendan Dolan-Gavitt
2023Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems.
Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang
2023MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah
2023MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.
Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang
2023Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth.
Thomas Haines, Rajeev Goré, Mukesh Tiwari
2023McFIL: Model Counting Functionality-Inherent Leakage.
Maximilian Zinkus, Yinzhi Cao, Matthew D. Green
2023Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin
2023Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li
2023Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
Yi Zeng, Minzhou Pan, Himanshu Jahagirdar, Ming Jin, Lingjuan Lyu, Ruoxi Jia
2023Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis.
Rasoul Jahanshahi, Babak Amin Azad, Nick Nikiforakis, Manuel Egele
2023Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness.
Yuhang Wu, Zhenpeng Lin, Yueqi Chen, Dang K. Le, Dongliang Mu, Xinyu Xing
2023Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics of a Bitcoin Mixing Service.
Fieke Miedema, Kelvin Lubbertsen, Verena Schrama, Rolf van Wegberg
2023MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
Gabriel K. Gegenhuber, Wilfried Mayer, Edgar R. Weippl, Adrian Dabrowski
2023MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation.
Jinyan Xu, Yiyuan Liu, Sirui He, Haoran Lin, Yajin Zhou, Cong Wang
2023Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management.
Vivek Nair, Dawn Song
2023Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis.
Bingyu Shen, Tianyi Shan, Yuanyuan Zhou
2023NAUTILUS: Automated RESTful API Vulnerability Detection.
Gelei Deng, Zhiyi Zhang, Yuekang Li, Yi Liu, Tianwei Zhang, Yang Liu, Guo Yu, Dongjin Wang
2023NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers.
Yehuda Afek, Anat Bremler-Barr, Shani Stajnrod
2023NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.
Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean M. Tullsen, Jishen Zhao
2023Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps.
Alexander Bienstock, Sarvar Patel, Joon Young Seo, Kevin Yeo
2023Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
Qi Xia, Qian Chen, Shouhuai Xu
2023Network Detection of Interactive SSH Impostors Using Deep Learning.
Julien Piet, Aashish Sharma, Vern Paxson, David A. Wagner
2023Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom.
Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Douglas Madory, Roya Ensafi
2023NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks.
Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, Shi Sha
2023No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting.
Leo Stone, Rishi Ranjan, Stefan Nagy, Matthew Hicks
2023No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters.
Ding Wang, Xuan Shan, Qiying Dong, Yaosheng Shen, Chunfu Jia
2023No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck
2023Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao
2023Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang
2023On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.
Binlin Cheng, Erika A. Leal, Haotian Zhang, Jiang Ming
2023On the Security Risks of Knowledge Graph Reasoning.
Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang
2023One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan
2023One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Chao Wang, Yue Zhang, Zhiqiang Lin
2023One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero
2023Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
Xhani Marvin Saß, Richard Mitev, Ahmad-Reza Sadeghi
2023Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon.
Jessica McClearn, Rikke Bjerg Jensen, Reem Talhouk
2023PATROL: Provable Defense against Adversarial Policy in Two-player Games.
Wenbo Guo, Xian Wu, Lun Wang, Xinyu Xing, Dawn Song
2023PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack.
Xinben Gao, Lan Zhang
2023PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
2023PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel.
Zicheng Wang, Yueqi Chen, Qingkai Zeng
2023POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu
2023PORE: Provably Robust Recommender Systems against Data Poisoning Attacks.
Jinyuan Jia, Yupei Liu, Yuepeng Hu, Neil Zhenqiang Gong
2023PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding.
Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang
2023PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit.
Oliver Broadrick, Poorvi L. Vora, Filip Zagórski
2023PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators.
Nils Lukas, Florian Kerschbaum
2023PUMM: Preventing Use-After-Free Using Execution Unit Partitioning.
Carter Yagemann, Simon P. Chung, Brendan Saltaformaggio, Wenke Lee
2023Panda: Security Analysis of Algorand Smart Contracts.
Zhiyuan Sun, Xiapu Luo, Yinqian Zhang
2023Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Ding Wang, Yunkai Zou, Yuan-an Xiao, Siqi Ma, Xiaofeng Chen
2023Password Guessing Using Random Forest.
Ding Wang, Yunkai Zou, Zijian Zhang, Kedong Xiu
2023PatchVerif: Discovering Faulty Patches in Robotic Vehicles.
Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu
2023Person Re-identification in 3D Space: A WiFi Vision-based Approach.
Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang
2023PhyAuth: Physical-Layer Message Authentication for ZigBee Networks.
Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Ting Zhu, Yanchao Zhang
2023Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs.
Yuandao Cai, Peisen Yao, Chengfeng Ye, Charles Zhang
2023PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs.
Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan
2023PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems.
Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai
2023Pool-Party: Exploiting Browser Resource Pools for Web Tracking.
Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi
2023Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones.
Daniel Hugenroth, Alastair R. Beresford
2023Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance.
Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D. Abowd, Sauvik Das
2023Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling.
Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
2023Precise and Generalized Robustness Certification for Neural Networks.
Yuanyuan Yuan, Shuai Wang, Zhendong Su
2023Prime Match: A Privacy-Preserving Inventory Matching System.
Antigoni Polychroniadou, Gilad Asharov, Benjamin E. Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, Manuela Veloso
2023PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information.
Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Peng Cheng, Mingyang Sun
2023PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models.
Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang
2023Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion.
Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhala
2023PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation.
Yuchen Yang, Bo Hui, Haolin Yuan, Neil Zhenqiang Gong, Yinzhi Cao
2023ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Frank Piessens
2023Problematic Advertising and its Disparate Exposure on Facebook.
Muhammad Ali, Angelica Goetzen, Alan Mislove, Elissa M. Redmiles, Piotr Sapiezynski
2023Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains.
William Edward Bodell III, Sajad Meisami, Yue Duan
2023Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique.
Yoochan Lee, Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee
2023Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.
Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl
2023QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.
Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song
2023RIDAS: Real-time identification of attack sources on controller area networks.
Jiwoo Shin, Hyunghoon Kim, Seyoung Lee, Wonsuk Choi, Dong Hoon Lee, Hyo Jin Jo
2023ReUSB: Replay-Guided USB Driver Fuzzing.
Jisoo Jang, Minsuk Kang, Dokyung Song
2023Reassembly is Hard: A Reflection on Challenges and Strategies.
Hyungseok Kim, Soomin Kim, Junoh Lee, Kangkook Jee, Sang Kil Cha
2023Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.
Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji
2023Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Yudi Zhao, Yuan Zhang, Min Yang
2023Remote Direct Memory Introspection.
Hongyi Liu, Jiarong Xing, Yibo Huang, Danyang Zhuo, Srinivas Devadas, Ang Chen
2023Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability.
Varun Gandhi, Sarbartha Banerjee, Aniket Agrawal, Adil Ahmad, Sangho Lee, Marcus Peinado
2023Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Yifan Yan, Xudong Pan, Mi Zhang, Min Yang
2023Reusable Enclaves for Confidential Serverless Computing.
Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin
2023Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol.
Alexandre Debant, Lucca Hirschi
2023Rods with Laser Beams: Understanding Browser Fingerprinting on Phishing Pages.
Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti, Armin Buescher, Petros Efstathopoulos
2023Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang
2023RøB: Ransomware over Modern Web Browsers.
Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, A. Selcuk Uluagac
2023SAFER: Efficient and Error-Tolerant Binary Instrumentation.
Soumyakant Priyadarshan, Huan Nguyen, Rohit Chouhan, R. Sekar
2023SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.
Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno
2023SHELTER: Extending Arm CCA with Isolation in User Space.
Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He
2023SMACK: Semantically Meaningful Adversarial Audio Attack.
Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao
2023SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning.
Salim Al Wahaibi, Myles Foley, Sergio Maffeis
2023SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes.
Abdullah AlHamdan, Cristian-Alexandru Staicu
2023Secure Floating-Point Training.
Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song
2023Security Analysis of MongoDB Queryable Encryption.
Zichen Gui, Kenneth G. Paterson, Tianxin Tang
2023Security and Privacy Failures in Popular 2FA Apps.
Conor Gilsenan, Fuzail Shakir, Noura Alomar, Serge Egelman
2023Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu
2023Side-Channel Attacks on Optane Persistent Memory.
Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Manabi Khan
2023Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs.
Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, Bing Mao
2023Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js.
Mikhail Shcherbakov, Musard Balliu, Cristian-Alexandru Staicu
2023Smart Learning to Find Dumb Contracts.
Tamer Abdelaziz, Aquinas Hobor
2023Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes.
Massimiliano Taverna, Kenneth G. Paterson
2023Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices.
Rose Ceccio, Sophie Stephenson, Varun Chadha, Danny Yuxing Huang, Rahul Chatterjee
2023Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao
2023SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution.
Jesse De Meulemeester, Antoon Purnal, Lennert Wouters, Arthur Beckers, Ingrid Verbauwhede
2023Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Jana Hofmann, Emanuele Vannacci, Cédric Fournet, Boris Köpf, Oleksii Oleksenko
2023Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting.
Dilawer Ahmed, Aafaq Sabir, Anupam Das
2023Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar M. Jois, Yinzhi Cao
2023Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree.
Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong
2023Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations.
Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin
2023Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu
2023Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher
2023Systematic Assessment of Fuzzers using Mutation Analysis.
Philipp Görz, Björn Mathis, Keno Hassler, Emre Güler, Thorsten Holz, Andreas Zeller, Rahul Gopinath
2023TAP: Transparent and Privacy-Preserving Data Services.
Daniël Reijsbergen, Aung Maw, Zheng Yang, Tien Tuan Anh Dinh, Jianying Zhou
2023TPatch: A Triggered Physical Adversarial Patch.
Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu
2023TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
Zheng Yang, Joey Allen, Matthew Landen, Roberto Perdisci, Wenke Lee
2023TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code.
Inyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek
2023TVA: A multi-party computation system for secure and expressive time series analytics.
Muhammad Faisal, Jerry Zhang, John Liagouris, Vasiliki Kalavri, Mayank Varia
2023Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Run Guo, Jianjun Chen, Yihang Wang, Keran Mu, Baojun Liu, Xiang Li, Chao Zhang, Haixin Duan, Jianping Wu
2023That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes
2023The Blockchain Imitation Game.
Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais
2023The Case for Learned Provenance Graph Storage Systems.
Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
2023The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence.
Rosanna Bellini, Kevin Lee, Megan A. Brown, Jeremy Shaffer, Rasika Bhalerao, Thomas Ristenpart
2023The Gates of Time: Improving Cache Attacks with Transient Execution.
Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom
2023The Impostor Among US(B): Off-Path Injection Attacks on USB Communications.
Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom
2023The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li
2023The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
Willy R. Vasquez, Stephen Checkoway, Hovav Shacham
2023The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications.
Simon Koch, Benjamin Altpeter, Martin Johns
2023The Role of Professional Product Reviewers in Evaluating Security and Privacy.
Wentao Guo, Jason Walter, Michelle L. Mazurek
2023The Space of Adversarial Strategies.
Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick D. McDaniel
2023The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate.
Rachel McAmis, Tadayoshi Kohno
2023Three Lessons From Threema: Analysis of a Secure Messenger.
Kenneth G. Paterson, Matteo Scarlata, Kien Tuong Truong
2023Tight Auditing of Differentially Private Machine Learning.
Milad Nasr, Jamie Hayes, Thomas Steinke, Borja Balle, Florian Tramèr, Matthew Jagielski, Nicholas Carlini, Andreas Terzis
2023Time for Change: How Clocks Break UWB Secure Ranging.
Claudio Anliker, Giovanni Camurati, Srdjan Capkun
2023Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.
Rasmus Dahlberg, Tobias Pulls
2023To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset.
Lea Gröber, Rafael Mrowczynski, Nimisha Vijay, Daphne A. Muller, Adrian Dabrowski, Katharina Krombholz
2023Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB).
Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi
2023Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.
Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal
2023Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability.
Mazal Bethany, Andrew Seong, Samuel Henrique Silva, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad
2023Towards a General Video-based Keystroke Inference Attack.
Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
2023TreeSync: Authenticated Group Management for Messaging Layer Security.
Théophile Wallez, Jonathan Protzenko, Benjamin Beurdouche, Karthikeyan Bhargavan
2023Trojan Source: Invisible Vulnerabilities.
Nicholas Boucher, Ross Anderson
2023Tubes Among Us: Analog Attack on Automatic Speaker Identification.
Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
2023Two Sides of the Shield: Understanding Protective DNS adoption factors.
Elsa Turcios Rodriguez, Radu Anghel, Simon Parkin, Michel van Eeten, Carlos Gañán
2023Two-in-One: A Model Hijacking Attack Against Text Generation Models.
Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem
2023UCBlocker: Unwanted Call Blocking Using Anonymous Authentication.
Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou
2023URET: Universal Robustness Evaluation Toolkit (for Evasion).
Kevin Eykholt, Taesung Lee, Douglas Lee Schales, Jiyong Jang, Ian M. Molloy, Masha Zorin
2023UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah
2023Ultimate SLH: Taking Speculative Load Hardening to the Next Level.
Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom
2023UnGANable: Defending Against GAN-based Face Manipulation.
Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang
2023Uncontained: Uncovering Container Confusion in the Linux Kernel.
Jakob Koschel, Pietro Borrello, Daniele Cono D'Elia, Herbert Bos, Cristiano Giuffrida
2023Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles.
Zekun Cai, Aiping Xiong
2023Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Xueqiang Wang, Yifan Zhang, Xiaofeng Wang, Yan Jia, Luyi Xing
2023Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data.
Vivek Nair, Wenbo Guo, Justus Mattern, Rui Wang, James F. O'Brien, Louis B. Rosenberg, Dawn Song
2023User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.
Alexandra Nisenoff, Ranya Sharma, Nick Feamster
2023V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu
2023V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh
2023VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman
2023VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
Hengkai Ye, Song Liu, Zhechang Zhang, Hong Hu
2023VeriZexe: Decentralized Private Computation with Universal Setup.
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho
2023VulChecker: Graph-based Vulnerability Localization in Source Code.
Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee
2023WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate.
Feras Al Kassar, Luca Compagna, Davide Balzarotti
2023Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers.
Noé Zufferey, Mathias Humbert, Romain Tavenard, Kévin Huguenin
2023WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Haibin Zhang, Sisi Duan, Boxin Zhao, Liehuang Zhu
2023We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets.
Sven Hebrok, Simon Nachtigall, Marcel Maehren, Nurullah Erinola, Robert Merget, Juraj Somorovsky, Jörg Schwenk
2023What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy.
Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, Elissa M. Redmiles
2023Wink: Deniable Secure Messaging.
Anrin Chakraborti, Darius Suciu, Radu Sion
2023Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center.
Kailani R. Jones, Dalton A. Brucker-Hahn, Bradley Fidler, Alexandru G. Bardas
2023X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao
2023XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography.
Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, Tao Ju, Xiaofeng Wang, Uday Jammalamadaka, Ning Zhang
2023You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Yulong Cao, S. Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z. Morley Mao, Sara Rampazzi
2023You've Got Report: Measurement and Security Implications of DMARC Reporting.
Md. Ishtiaq Ashiq, Weitong Li, Tobias Fiebig, Taejoong Chung
2023Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang
2023ZBCAN: A Zero-Byte CAN Defense System.
Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu
2023autofz: Automated Fuzzer Composition at Runtime.
Yu-Fu Fu, Jae-Hyuk Lee, Taesoo Kim
2023xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses.
Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu
2023zkSaaS: Zero-Knowledge SNARKs as a Service.
Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar
2023µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Yongheng Chen, Rui Zhong, Yupeng Yang, Hong Hu, Dinghao Wu, Wenke Lee