researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1993
1994
1996
1997
1998
1999
2000
2001
2003
2005
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
analysis
architecture
data-flow
e-science
empirical
mobile
open-source
protocol
routing
rule-based
security
social
source-to-source
systematic-approach
testing
web applications
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Adrian Perrig
Ahmad-Reza Sadeghi
Ari Juels
Christopher Kruegel
Dawn Song
Elaine Shi
Elisa Bertino
Florian Kerschbaum
Frank Piessens
Gilles Barthe
Michael Backes 0001
Michael K. Reiter
Reihaneh Safavi-Naini
Robert H. Deng
Wenke Lee
Xiaofeng Wang
Yinqian Zhang
Yuval Elovici
Zhiqiang Lin
Zhiyun Qian
Filter by Top terms
[+]
OR
AND
NOT
1
acm
analysis
applications
attacks
cloud
data
detection
efficient
encryption
learning
poster
privacy
secure
security
system
systems
towards
using
via
workshop
ACM Conference on Computer and Communications Security (ccs)
Editions
Publications
Viewing Publication 1 - 100 from 5318
2024
Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning Models
Zitao Chen 0001
.
ccs 2024
:
5098-5100
[doi]
On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead)
Davide Davoli 0001
,
Martin Avanzini
,
Tamara Rezk
.
ccs 2024
:
1091-1105
[doi]
Obfuscated Key Exchange
Felix Günther 0001
,
Douglas Stebila
,
Shannon Veitch
.
ccs 2024
:
2385-2399
[doi]
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets
Ling Ren 0001
,
Muhammad Haris Mughees
,
I Sun
.
ccs 2024
:
1420-1433
[doi]
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps
Zhiqiang Lin 0001
,
Luyi Xing
.
ccs 2024
:
4886-4887
[doi]
Leveraging Storage Semantics to Enhance Data Security and Privacy
Weidong Zhu 0002
.
ccs 2024
:
5116-5118
[doi]
PLeak: Prompt Leaking Attacks against Large Language Model Applications
Bo Hui 0002
,
Haolin Yuan
,
Neil Gong 0001
,
Philippe Burlina
,
Yinzhi Cao
.
ccs 2024
:
3600-3614
[doi]
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing
Yue Zhang 0025
,
Zhen Ling
,
Michael Cash
,
Qiguang Zhang
,
Christopher Morales-Gonzalez
,
Qun Zhou Sun
,
Xinwen Fu
.
ccs 2024
:
1761-1775
[doi]
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study
Yue Zhang 0025
,
Melih Sirlanci
,
Ruoyu Wang 0001
,
Zhiqiang Lin 0001
.
ccs 2024
:
4212-4225
[doi]
Jäger: Automated Telephone Call Traceback
David Adei
,
Varun Madathil
,
Sathvik Prasad
,
Bradley Reaves
,
Alessandra Scafuro
.
ccs 2024
:
2042-2056
[doi]
The Privacy-Utility Trade-off in the Topics API
Mário S. Alvim
,
Natasha Fernandes
,
Annabelle McIver
,
Gabriel H. Nunes
.
ccs 2024
:
1106-1120
[doi]
Conditional Encryption with Applications to Secure Personalized Password Typo Correction
Mohammad Hassan Ameri
,
Jeremiah Blocki
.
ccs 2024
:
4643-4657
[doi]
Oblivious Single Access Machines - A New Model for Oblivious Computation
Ananya Appan
,
David Heath
,
Ling Ren 0001
.
ccs 2024
:
3080-3094
[doi]
Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling
Andreas Athanasiou
,
Kangsoo Jung
,
Catuscia Palamidessi
.
ccs 2024
:
5036-5038
[doi]
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity
Renas Bacho
,
Christoph Lenzen 0001
,
Julian Loss
,
Simon Ochsenreither
,
Dimitrios Papachristoudis
.
ccs 2024
:
941-955
[doi]
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging
Christian Badertscher
,
Fabio Banfi
,
Jesus Diaz
.
ccs 2024
:
4732-4746
[doi]
Foundations for Cryptographic Reductions in CCSA Logics
David Baelde
,
Adrien Koutsos
,
Justine Sauvage
.
ccs 2024
:
2814-2828
[doi]
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines
Eugene Bagdasarian
,
Vitaly Shmatikov
.
ccs 2024
:
4480-4494
[doi]
CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel
Shuangpeng Bai
,
Zhechang Zhang
,
Hong Hu 0004
.
ccs 2024
:
1315-1329
[doi]
Derecho: Privacy Pools with Proof-Carrying Disclosures
Josh Beal
,
Ben Fisch
.
ccs 2024
:
3197-3211
[doi]
New Secret Keys for Enhanced Performance in (T)FHE
Loris Bergerat
,
Ilaria Chillotti
,
Damien Ligier
,
Jean-Baptiste Orfila
,
Adeline Roux-Langlois
,
Samuel Tap
.
ccs 2024
:
2547-2561
[doi]
Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax Disclosures
Alex Berke
,
Tobin South
,
Robert Mahari
,
Kent Larson
,
Alex Pentland
.
ccs 2024
:
4952-4954
[doi]
Securely Training Decision Trees Efficiently
Divyanshu Bhardwaj
,
Sandhya Saravanan
,
Nishanth Chandran
,
Divya Gupta 0001
.
ccs 2024
:
4673-4687
[doi]
Understanding Routing-Induced Censorship Changes Globally
Abhishek Bhaskar
,
Paul Pearce
.
ccs 2024
:
437-451
[doi]
Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models
Huan Bui
,
Harper Lienerth
,
Chenglong Fu 0002
,
Meera Sridhar
.
ccs 2024
:
4994-4996
[doi]
Towards Secure Runtime Auditing of Remote Embedded System Software
Adam Caulfield
.
ccs 2024
:
5092-5094
[doi]
μCFI: Formal Verification of Microarchitectural Control-flow Integrity
Katharina Ceesay-Seitz
,
Flavien Solt
,
Kaveh Razavi
.
ccs 2024
:
213-227
[doi]
VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption
Sylvain Chatel
,
Christian Knabenhans
,
Apostolos Pyrgelis
,
Carmela Troncoso
,
Jean-Pierre Hubaux
.
ccs 2024
:
2520-2534
[doi]
Evolving Network Security in the Era of Network Programmability
Mingming Chen
.
ccs 2024
:
5101-5103
[doi]
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning
Mingming Chen
,
Thomas La Porta
,
Teryl Taylor
,
Frederico Araujo
,
Trent Jaeger
.
ccs 2024
:
3704-3718
[doi]
Toward Practical Threshold FHE: Low Communication, Computation and Interaction
Hyeongmin Choe
.
ccs 2024
:
5107-5109
[doi]
Poster: Privacy Norms for Fertility Data in the Roe v. Wade era
Zander Chown
,
Aarathi Prasad
.
ccs 2024
:
4919-4921
[doi]
Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies
Neophytos Christou
,
Alexander J. Gaidis
,
Vaggelis Atlidakis
,
Vasileios P. Kemerlis
.
ccs 2024
:
3913-3927
[doi]
ACM CCS 2024 Doctoral Symposium
Gabriela Ciocarlie
,
Xinming Ou
.
ccs 2024
:
5087-5088
[doi]
FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software Transformation
Ryan Craven
,
Matthew S. Mickelson
.
ccs 2024
:
4898-4899
[doi]
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols
Cas Cremers
,
Alexander Dax
,
Niklas Medinger
.
ccs 2024
:
1046-1060
[doi]
The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024)
Lesly-Ann Daniel
,
Vineet Rajani
.
ccs 2024
:
4896-4897
[doi]
Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection
Jiawen Diao
,
Shengmin Zhao
,
Jianguo Xie
,
Rongna Xie
,
Guozhen Shi
.
ccs 2024
:
5012-5014
[doi]
Novel Privacy Attacks and Defenses Against Neural Networks
Sayanton V. Dibbo
.
ccs 2024
:
5113-5115
[doi]
Non-Transferable Anonymous Tokens by Secret Binding
F. Betül Durak
,
Laurane Marco
,
Abdullah Talayhan
,
Serge Vaudenay
.
ccs 2024
:
2460-2474
[doi]
Password-Protected Key Retrieval with(out) HSM Protection
Sebastian H. Faller
,
Tobias Handirk
,
Julia Hesse
,
Máté Horváth
,
Anja Lehmann
.
ccs 2024
:
2445-2459
[doi]
CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy
Kassem Fawaz
,
Magnus Almgren
.
ccs 2024
:
4903-4904
[doi]
ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles
Ben Fisch
,
Arthur Lazzaretti
,
Zeyu Liu 0004
,
Charalampos Papamanthou
.
ccs 2024
:
1448-1462
[doi]
Secure Vickrey Auctions with Rational Parties
Chaya Ganesh
,
Shreyas Gupta
,
Bhavana Kanukurthi
,
Girisha Shankar
.
ccs 2024
:
4062-4076
[doi]
Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation
Yuechun Gu
,
Jiajie He
,
Keke Chen
.
ccs 2024
:
5075-5077
[doi]
Characterizing Ethereum Address Poisoning Attack
Shixuan Guan
,
Kai Li 0017
.
ccs 2024
:
986-1000
[doi]
Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring
Jana Hofmann
,
Cédric Fournet
,
Boris Köpf
,
Stavros Volos
.
ccs 2024
:
2799-2813
[doi]
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem
Jonas Hofmann
,
Kien Tuong Truong
.
ccs 2024
:
3988-4001
[doi]
Securing Floating-Point Arithmetic for Noise Addition
Naoise Holohan
,
Stefano Braghin
,
Mohamed Suliman 0002
.
ccs 2024
:
1954-1966
[doi]
Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks
Seok-Min Hong
,
Beom Heyn Kim
,
Mohammad Mannan
.
ccs 2024
:
5000-5002
[doi]
Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code
Tomasz Hyla
,
Natalia Wawrzyniak
.
ccs 2024
:
4943-4945
[doi]
Metric Differential Privacy at the User-Level via the Earth-Mover's Distance
Jacob Imola
,
Amrita Roy Chowdhury 0001
,
Kamalika Chaudhuri
.
ccs 2024
:
348-362
[doi]
Poster: Synchronization Concerns of DNS Integrations
Andrew J. Kaizer
,
Will Naciri
,
Swapneel Sheth
.
ccs 2024
:
4982-4984
[doi]
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets
Mahimna Kelkar
,
Kushal Babel
,
Philip Daian
,
James Austgen
,
Vitalik Buterin
,
Ari Juels
.
ccs 2024
:
2415-2429
[doi]
RSA-Based Dynamic Accumulator without Hashing into Primes
Victor Youdom Kemmoe
,
Anna Lysyanskaya
.
ccs 2024
:
4271-4285
[doi]
Fast Two-party Threshold ECDSA with Proactive Security
Brian Koziel
,
S. Dov Gordon
,
Craig Gentry
.
ccs 2024
:
1567-1580
[doi]
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training
Daniele Lain
,
Tarek Jost
,
Sinisa Matetic
,
Kari Kostiainen
,
Srdjan Capkun
.
ccs 2024
:
4182-4196
[doi]
CAPSID: A Private Session ID System for Small UAVs
Yueshen Li
,
Jianli Jin
,
Kirill Levchenko
.
ccs 2024
:
1791-1805
[doi]
Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models
Wanpeng Li
,
Yuejun Guo 0001
.
ccs 2024
:
5024-5026
[doi]
uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem
Hajeong Lim
,
Jaeyoon Kim
,
Hojoon Lee 0001
.
ccs 2024
:
2993-3007
[doi]
Poster: Solving the Free-rider Problem in Bittensor
Sin Tai Liu
,
Jiayuan Yu
,
Jacob Steeves
.
ccs 2024
:
5045-5047
[doi]
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing
Zeyan Liu
,
Zijun Yao 0001
,
FengJun Li
,
Bo Luo
.
ccs 2024
:
2236-2250
[doi]
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024
Bo Luo
,
Xiaojing Liao
,
Jun Xu 0024
,
Engin Kirda
,
David Lie
, editors,
ACM,
2024.
[doi]
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
Vadim Lyubashevsky
,
Gregor Seiler
,
Patrick Steuer
.
ccs 2024
:
3125-3137
[doi]
Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence Methods
Efrén López-Morales
.
ccs 2024
:
5119-5121
[doi]
Practical Key-Extraction Attacks in Leading MPC Wallets
Nikolaos Makriyannis
,
Oren Yomtov
,
Arik Galansky
.
ccs 2024
:
3053-3064
[doi]
Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs
Evangelia Anna Markatou
,
Roberto Tamassia
.
ccs 2024
:
4777-4791
[doi]
Poster: In-switch Defense against DNS Amplification DDoS Attacks
Seyed Mohammad Hadi Mirsadeghi
.
ccs 2024
:
4964-4966
[doi]
Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys
Marius Momeu
,
Simon Schnückel
,
Kai Angnis
,
Michalis Polychronakis
,
Vasileios P. Kemerlis
.
ccs 2024
:
1345-1359
[doi]
SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols
Kevin Morio
,
Robert Künnemann
.
ccs 2024
:
2741-2755
[doi]
Asynchronous Authentication
Marwa Mouallem
,
Ittay Eyal
.
ccs 2024
:
3257-3271
[doi]
Poster: Formally Verified Binary Lifting to P-Code
Nico Naus
,
Freek Verbeek
,
Sagar Atla
,
Binoy Ravindran
.
ccs 2024
:
4973-4975
[doi]
Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration
Keiichi Ochiai
,
Masayuki Terada
.
ccs 2024
:
4955-4957
[doi]
Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting
Joel Osher
,
James K. Holland
,
Nicholas Hopper
.
ccs 2024
:
4997-4999
[doi]
Reckle Trees: Updatable Merkle Batch Proofs with Applications
Charalampos Papamanthou
,
Shravan Srinivasan
,
Nicolas Gailly
,
Ismael Hishon-Rezaizadeh
,
Andrus Salumets
,
Stjepan Golemac
.
ccs 2024
:
1538-1551
[doi]
Efficient Secret Sharing for Large-Scale Applications
Sarvar Patel
,
Giuseppe Persiano
,
Joon Young Seo
,
Kevin Yeo
.
ccs 2024
:
3065-3079
[doi]
S-BDT: Distributed Differentially Private Boosted Decision Trees
Thorsten Peinemann
,
Moritz Kirschte
,
Joshua Stock
,
Carlos Cotrini
,
Esfandiar Mohammadi
.
ccs 2024
:
288-302
[doi]
Symbolic Execution for Dynamic Kernel Analysis
Pansilu Pitigalaarachchi
.
ccs 2024
:
5104-5106
[doi]
AuthSaber: Automated Safety Verification of OpenID Connect Programs
Tamjid Al Rahat
,
Yu Feng 0001
,
Yuan Tian 0001
.
ccs 2024
:
2949-2962
[doi]
A Framework for Differential Privacy Against Timing Attacks
Zachary Ratliff
,
Salil Vadhan
.
ccs 2024
:
3615-3629
[doi]
Hekaton: Horizontally-Scalable zkSNARKs Via Proof Aggregation
Michael Rosenberg
,
Tushar Mopuri
,
Hossein Hafezi
,
Ian Miers
,
Pratyush Mishra
.
ccs 2024
:
929-940
[doi]
Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob"
Katharina Schiller
,
Florian Adamsky
,
Christian Eichenmüller
,
Matthias Reimert
,
Zinaida Benenson
.
ccs 2024
:
4167-4181
[doi]
Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection
Sachin Shukla
,
Omid Mirzaei
.
ccs 2024
:
4988-4990
[doi]
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software
Yongho Song
,
Byeongsu Woo
,
Youngkwang Han
,
Brent ByungHoon Kang
.
ccs 2024
:
198-212
[doi]
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems
Bozhidar Stevanoski
,
Ana-Maria Cretu 0002
,
Yves-Alexandre de Montjoye
.
ccs 2024
:
3451-3465
[doi]
SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
Santiago Torres-Arias
,
Marcela S. Melara
.
ccs 2024
:
4917-4918
[doi]
Trusted Execution Environments for Quantum Computers
Theodoros Trochatos
.
ccs 2024
:
5089-5091
[doi]
Staving off the IoT Armageddon
Gene Tsudik
.
ccs 2024
:
2-3
[doi]
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly
Freek Verbeek
,
Nico Naus
,
Binoy Ravindran
.
ccs 2024
:
2786-2798
[doi]
Principled Microarchitectural Isolation on Cloud CPUs
Stavros Volos
,
Cédric Fournet
,
Jana Hofmann
,
Boris Köpf
,
Oleksii Oleksenko
.
ccs 2024
:
183-197
[doi]
Data Independent Order Policy Enforcement: Limitations and Solutions
Sarisht Wadhwa
,
Luca Zanolini
,
Aditya Asgaonkar
,
Francesco D'Amato
,
Chengrui Fang
,
Fan Zhang 0022
,
Kartik Nayak
.
ccs 2024
:
378-392
[doi]
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors
Kevin Warren
,
Tyler Tucker
,
Anna Crowder
,
Daniel Olszewski
,
Allison Lu
,
Caroline Fedele
,
Magdalena Pasternak
,
Seth Layton
,
Kevin R. B. Butler
,
Carrie Gates
,
Patrick Traynor
.
ccs 2024
:
2696-2710
[doi]
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors
Hans Winderix
,
Marton Bognar
,
Lesly-Ann Daniel
,
Frank Piessens
.
ccs 2024
:
19-33
[doi]
Provable Security for PKI Schemes
Sara Wrótniak
,
Hemi Leibowitz
,
Ewa Syta
,
Amir Herzberg
.
ccs 2024
:
1552-1566
[doi]
Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication
Kailun Yan
,
Xiaokuan Zhang
,
Wenrui Diao
.
ccs 2024
:
555-569
[doi]
MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data Breach
Yihui Yan
,
Zhice Yang
.
ccs 2024
:
1806-1818
[doi]
Privacy Analyses in Machine Learning
Jiayuan Ye
.
ccs 2024
:
5110-5112
[doi]
HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare
William Yurcik
,
Gregory Pluta
,
Toan Luong
,
Luis Garcia
.
ccs 2024
:
4882-4883
[doi]
Language-based Sandboxing
Jialun Zhang
.
ccs 2024
:
5122-5124
[doi]
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies
Guy Zyskind
,
Avishay Yanai
,
Alex 'Sandy' Pentland
.
ccs 2024
:
4152-4166
[doi]
Sign in
or
sign up
to see more results.