Abstract is missing.
- Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial VehiclesSavio Sciancalepore, Dominik Roy George. 1-12 [doi]
- DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack DetectionMatthew Landen, Keywhan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee. 13-27 [doi]
- Randezvous: Making Randomization Effective on MCUsZhuojia Shen, Komail Dharsee, John Criswell. 28-41 [doi]
- Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid CommunicationMaria Zhdanova, Julian Urbansky, Anne Hagemeier, Daniel Zelle, Isabelle Herrmann, Dorian Höffner. 42-55 [doi]
- Play the Imitation Game: Model Extraction Attack against Autonomous Driving LocalizationQifan Zhang, Junjie Shen 0001, Mingtian Tan, Zhe Zhou 0001, Zhou Li 0001, Qi Alfred Chen, Haipeng Zhang. 56-70 [doi]
- Towards Practical Application-level Support for Privilege SeparationNik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis, Boon Thau Loo. 71-87 [doi]
- Formal Modeling and Security Analysis for Intra-level Privilege SeparationYinggang Guo, ZiCheng Wang, Bingnan Zhong, Qingkai Zeng. 88-101 [doi]
- Designing a Provenance Analysis for SGX EnclavesFlavio Toffalini, Mathias Payer, Jianying Zhou 0001, Lorenzo Cavallaro. 102-116 [doi]
- Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party ComputationQian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang 0031, Bangdao Chen. 117-131 [doi]
- Stopping Silent Sneaks: Defending against Malicious Mixes with Topological EngineeringXinshu Ma, Florentin Rochet, Tariq Elahi. 132-145 [doi]
- Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated LearningMohamad Mansouri, Melek Önen, Wafa Ben Jaballah. 146-158 [doi]
- Compressed Federated Learning Based on Adaptive Local Differential PrivacyYinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng. 159-170 [doi]
- SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine LearningGiovanni Apruzzese, Mauro Conti, Ying Yuan. 171-185 [doi]
- Curiosity-Driven and Victim-Aware Adversarial PoliciesChen Gong, Zhou Yang 0003, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo 0001, Xinwen Hou, Guoliang Fan. 186-200 [doi]
- Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update AmplificationLiyue Shen, Yanjun Zhang, Jingwei Wang, Guangdong Bai. 201-213 [doi]
- MProbe: Make the code probing meaninglessYong-Gang Li, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, Guoyuan Lin. 214-226 [doi]
- DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware DetectionJia Yan, Ming Wan, Xiangkun Jia, Lingyun Ying, Purui Su, Zhanyi Wang. 227-239 [doi]
- View from Above: Exploring the Malware Ecosystem from the Upper DNS HierarchyAaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis. 240-250 [doi]
- A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet DevicesAfsah Anwar, Yi-Hui Chen, Roy Hodgman, Tom Sellers, Engin Kirda, Alina Oprea. 251-266 [doi]
- Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning AttacksXutong Wang, Chaoge Liu, Xiaohui Hu, Zhi Wang, Jie Yin, Xiang Cui. 267-278 [doi]
- Reconstruction Attack on Differential Private Trajectory Protection MechanismsErik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere. 279-292 [doi]
- Differentially Private Map Matching for Mobility TrajectoriesAmmar Haydari, Chen-Nee Chuah, H. Michael Zhang, Jane Macfarlane, Sean Peisert. 293-303 [doi]
- Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and ImplementationJieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao. 304-317 [doi]
- CryptoGo: Automatic Detection of Go Cryptographic API MisusesWenqing Li, Shijie Jia 0001, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin. 318-331 [doi]
- Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy StandpointSeung Ho Na, Hyeong Gwon Hong, Junmo Kim, Seungwon Shin. 332-345 [doi]
- TyPro: Forward CFI for C-Style Indirect Function Calls Using Type PropagationMarkus Bauer 0004, Ilya Grishchenko, Christian Rossow. 346-360 [doi]
- Practical Binary Code Similarity Detection with BERT-based Transferable Similarity LearningSunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, Yunheung Paek. 361-374 [doi]
- Snappy: Efficient Fuzzing with Adaptive and Mutable SnapshotsElia Geretto, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe. 375-387 [doi]
- One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State RestrictionPrashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer. 388-399 [doi]
- From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw DiscoveryCarmen Cheh, Nicholas Tay, Binbin Chen. 400-411 [doi]
- Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment AttacksAlessandro Erba, Nils Ole Tippenhauer. 412-426 [doi]
- Spacelord: Private and Secure Smart Space SharingYechan Bae, Sarbartha Banerjee, Sangho Lee 0001, Marcus Peinado. 427-439 [doi]
- BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control SystemsAnomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque. 440-454 [doi]
- Ripples in the Pond: Transmitting Information through Grid Frequency ModulationJan Sebastian Götte, Liran Katzir 0002, Björn Scheuermann 0001. 455-466 [doi]
- Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profilesLuca Morgese Zangrandi, Thijs van Ede, Tim Booij, Savio Sciancalepore, Luca Allodi, Andrea Continella. 467-480 [doi]
- Transformer-Based Language Models for Software Vulnerability DetectionChandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal. 481-496 [doi]
- Compact Abstract Graphs for Detecting Code Vulnerability with GNN ModelsYu Luo, Weifeng Xu, Dianxiang Xu. 497-507 [doi]
- Boosting Neural Networks to Decompile Optimized BinariesYing Cao, Ruigang Liang, Kai Chen 0012, Peiwei Hu. 508-518 [doi]
- SLOPT: Bandit Optimization Framework for Mutation-Based FuzzingYuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome. 519-533 [doi]
- Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided FuzzingYiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin. 534-547 [doi]
- On the Implications of Spoofing and Jamming Aviation Datalink ApplicationsHarshad Sathaye, Guevara Noubir, Aanjhan Ranganathan. 548-560 [doi]
- You have been warned: Abusing 5G's Warning and Emergency SystemsEvangelos Bitsikas, Christina Pöpper. 561-575 [doi]
- Analysis of Payment Service Provider SDKs in AndroidSamin Yaseer Mahmud, K. Virgil English, Seaver Thorn, William Enck, Adam Oest, Muhammad Saad. 576-590 [doi]
- User Perceptions of the Privacy and Usability of Smart DNSRahel A. Fainchtein, Adam J. Aviv, Micah Sherr. 591-604 [doi]
- User Perceptions of Five-Word PasswordsXiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, Adam J. Aviv. 605-618 [doi]
- A Qualitative Evaluation of Reverse Engineering Tool UsabilityJames Mattei, Madeline McLaughlin, Samantha Katcher, Daniel Votipka. 619-631 [doi]
- AFLGuard: Byzantine-robust Asynchronous Federated LearningMinghong Fang, Jia Liu, Neil Zhenqiang Gong, Elizabeth S. Bentley. 632-646 [doi]
- Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-LearningNing Wang 0022, Yang Xiao, Yimin Chen 0004, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou. 647-657 [doi]
- Drone Authentication via Acoustic FingerprintYufeng Diao, Yichi Zhang, Guodong Zhao, Mohamed Khamis. 658-668 [doi]
- NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference AttacksNuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam. 669-683 [doi]
- More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural NetworksJing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek. 684-698 [doi]
- ZeroDNS: Towards Better Zero Trust Security using DNSLevente Csikor, Sriram Ramachandran, Anantharaman Lakshminarayanan. 699-713 [doi]
- Are There Wireless Hidden Cameras Spying on Me?Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim 0003, Woojin Park, Yongdae Kim, Kang G. Shin, Choong-Hoon Lee. 714-726 [doi]
- If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is ProfitableZheng Yang 0001, Chao Yin, Junming Ke, Tien Tuan Anh Dinh, Jianying Zhou 0001. 727-741 [doi]
- Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypotsShreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. 742-755 [doi]
- StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy GuidanceZhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin 0001. 756-768 [doi]
- MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event LogsXiaolei Wang, Lin Yang, Dongyang Li, Linru Ma, Yongzhong He, Junchao Xiao, Jiyuan Liu 0003, Yuexiang Yang. 769-784 [doi]
- ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world DriftXian Wang. 785-798 [doi]
- Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer InterfaceBingkun Wu, Weizhi Meng 0001, Wei-Yang Chiu. 799-812 [doi]
- FAuST: Striking a Bargain between Forensic Auditing's Security and ThroughputMuhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates 0001, Wajih Ul Hassan. 813-826 [doi]
- RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat DiscoveryYushan Liu, Xiaokui Shu, Yixin Sun, Jiyong Jang, Prateek Mittal. 827-840 [doi]
- DF-SCA: Dynamic Frequency Side Channel Attacks are PracticalDebopriya Roy Dipta, Berk Gülmezoglu. 841-853 [doi]
- POPKORN: Popping Windows Kernel Drivers At ScaleRajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim. 854-868 [doi]
- Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container PlatformsYutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren 0001. 869-880 [doi]
- DeView: Confining Progressive Web Applications by Debloating Web APIsChangSeok Oh, Sangho Lee 0001, Chenxiong Qian, Hyungjoon Koo, Wenke Lee. 881-895 [doi]
- No Signal Left to Chance: Driving Browser Extension Analysis by Download PatternsPablo Picazo-Sanchez, Benjamin Eriksson, Andrei Sabelfeld. 896-910 [doi]
- Accept All Exploits: Exploring the Security Impact of Cookie BannersDavid Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns. 911-922 [doi]
- Trebiz: Byzantine Fault Tolerance with Byzantine MerchantsXiaohai Dai, Liping Huang, Jiang Xiao, Zhaonan Zhang, Xia Xie, Hai Jin 0001. 923-935 [doi]
- ArchiveSafe LT: Secure Long-term Archiving SystemMoe Sabry, Reza Samavi. 936-948 [doi]
- Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control TrafficMinJae Seo, Jaehan Kim, Eduard Marin, Myoungsung You, Taejune Park, Seungsoo Lee, Seungwon Shin, Jinwoo Kim. 949-963 [doi]
- iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOSYizhuo Wang, Yikun Hu, Xuangan Xiao, Dawu Gu. 964-977 [doi]
- MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location EscapeFan Lang, Wei Wang 0314, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu. 978-988 [doi]
- CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing EnvironmentsJoana Pecholt, Sascha Wessel. 989-998 [doi]