Abstract is missing.
- Rethinking IoT Security: Understanding and Mitigating Out-of-Band VulnerabilitiesWenyuan Xu. 1 [doi]
- Faster TFHE Bootstrapping with Block Binary KeysChangmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song. 2-13 [doi]
- Flag: A Framework for Lightweight Robust Secure AggregationLaasya Bangalore, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. 14-28 [doi]
- Implementing and Optimizing Matrix Triples with Homomorphic EncryptionJohannes Mono, Tim Güneysu. 29-40 [doi]
- Invasion of location privacy using online map services and smartphone sensorsHyunsoo Kim, Youngbae Jeon, Ji Won Yoon. 41-52 [doi]
- Privacy-Preserving Record Linkage for Cardinality CountingNan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh. 53-64 [doi]
- Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant ApplicationsBaiqi Chen, Tingmin Wu, Yanjun Zhang, Mohan Baruwal Chhetri, Guangdong Bai. 65-79 [doi]
- RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy DefenseYue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu. 80-94 [doi]
- LDL: A Defense for Label-Based Membership Inference AttacksArezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran. 95-108 [doi]
- Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information BottleneckChenhan Zhang, Weiqi Wang, James J. Q. Yu, Shui Yu 0001. 109-121 [doi]
- LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference AttacksMengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai. 122-135 [doi]
- Data Privacy Examination against Semi-Supervised LearningJiadong Lou, Xu Yuan, Miao Pan, Hao Wang, Nian-Feng Tzeng. 136-148 [doi]
- Cage4Deno: A Fine-Grained Sandbox for Deno SubprocessesMarco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi. 149-162 [doi]
- CacheFX: A Framework for Evaluating Cache SecurityDaniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom. 163-176 [doi]
- Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory TaggingMartin Unterguggenberger, David Schrammel, Pascal Nasahl, Robert Schilling, Lukas Lamster, Stefan Mangard. 177-189 [doi]
- FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-AJingquan Ge, Fengwei Zhang. 190-204 [doi]
- ShowTime: Amplifying Arbitrary CPU Timing Side ChannelsAntoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede. 205-217 [doi]
- Symbolic modelling of remote attestation protocols for device and app integrity on AndroidAbdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald. 218-231 [doi]
- Arvin: Greybox Fuzzing Using Approximate Dynamic CFG AnalysisSirus Shahini, Mu Zhang, Mathias Payer, Robert Ricci. 232-246 [doi]
- AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract InterpretationAlexander Küchler, Leon Wenning, Florian Wendland. 247-258 [doi]
- Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary ProgramsMohamad Mansouri, Jun Xu, Georgios Portokalidis. 259-273 [doi]
- Secure and Efficient Mobile DNN Using Trusted Execution EnvironmentsBin Hu 0016, Yan Wang 0003, Jerry Cheng, Tianming Zhao 0001, Yucheng Xie, Xiaonan Guo, Yingying Chen 0001. 274-285 [doi]
- Stairway To RainbowGildas Avoine, Xavier Carpent, Diane Leblanc-Albarel. 286-299 [doi]
- EMShepherd: Detecting Adversarial Samples via Side-channel LeakageRuyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei. 300-313 [doi]
- Electromagnetic Signal Injection Attacks on Differential SignalingYouqian Zhang, Kasper Rasmussen. 314-325 [doi]
- Formal Methods for Payment ProtocolsDavid A. Basin. 326 [doi]
- Model Stealing Attacks and Defenses: Where Are We Now?N. Asokan. 327 [doi]
- On the Cryptographic Fragility of the Telegram EcosystemTheo von Arx, Kenneth G. Paterson. 328-341 [doi]
- PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic EncryptionYongha Son, Jinhyuck Jeong. 342-356 [doi]
- ZEKRA: Zero-Knowledge Control-Flow AttestationHeini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi. 357-371 [doi]
- Overdrive LowGear 2.0: Reduced-Bandwidth MPC without SacrificePascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters. 372-386 [doi]
- Benchmarking the BenchmarksMarc Miltenberger, Steven Arzt, Philipp Holzinger, Julius Näumann. 387-400 [doi]
- Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IOGuy Farrelly, Michael Chesser, Damith C. Ranasinghe. 401-414 [doi]
- RaceBench: A Triggerable and Observable Concurrency Bug BenchmarkJiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han, Chao Zhang. 415-428 [doi]
- BinWrap: Hybrid Protection against Native Node.js Add-onsGeorge Christou, Grigoris Ntousakis, Eric Lahtinen, Sotiris Ioannidis, Vasileios P. Kemerlis, Nikos Vasilakis. 429-442 [doi]
- Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU ArchitecturesAbdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf. 443-456 [doi]
- SPEAR-V: Secure and Practical Enclave Architecture for RISC-VDavid Schrammel, Moritz Waser, Lukas Lamster, Martin Unterguggenberger, Stefan Mangard. 457-468 [doi]
- Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel ExtensionsJiwon Seo, Junseung You, Yungi Cho, Yeongpil Cho, Donghyun Kwon, Yunheung Paek. 469-480 [doi]
- An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus NetworksMatthew Rogers, Kasper Rasmussen. 481-493 [doi]
- #DM-Me: Susceptibility to Direct Messaging-Based ScamsRaj Vardhan, Alok Chandrawal, Phakpoom Chinprutthiwong, Yangyong Zhang, Guofei Gu. 494-508 [doi]
- An End-to-End Analysis of Covid-Themed Scams in the WildBehzad Ousat, Mohammad Ali Tofighi, Amin Kharraz. 509-523 [doi]
- MASCARA : Systematically Generating Memorable And Secure PassphrasesAvirup Mukherjee, Kousshik Murali, Shivam Kumar Jha, Niloy Ganguly, Rahul Chatterjee 0001, Mainack Mondal. 524-538 [doi]
- How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And UsabilityKun Peng. 539-551 [doi]
- Democratizing election verification: new methods for addressing an ancient attacker modelVanessa Teague. 552 [doi]
- FLAIR: Defense against Model Poisoning Attack in Federated LearningAtul Sharma, Wei Chen 0124, Joshua C. Zhao, Qiang Qiu, Saurabh Bagchi, Somali Chaterji. 553-566 [doi]
- BFU: Bayesian Federated Unlearning with Parameter Self-SharingWeiqi Wang, Zhiyi Tian, Chenhan Zhang, An Liu 0002, Shui Yu 0001. 567-578 [doi]
- SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to CompletenessGeetanjli Sharma, M. A. P. Chamikara, Mohan Baruwal Chhetri, Yi-Ping Phoebe Chen. 579-592 [doi]
- Going Haywire: False Friends in Federated Learning and How to Find ThemWilliam Aiken, Paula Branco, Guy-Vincent Jourdan. 593-607 [doi]
- Deepfake CAPTCHA: A Method for Preventing Fake CallsLior Yasur, Guy Frankovits, Fred M. Grabovski, Yisroel Mirsky. 608-622 [doi]
- A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-QuantumMuhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao. 623-637 [doi]
- IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise NonlinearityLili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng 0001. 638-648 [doi]
- FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party ComputationLennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider 0003, Oleksandr Tkachenko. 649-663 [doi]
- A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ SimulatorLeizhang Wang, Yuntao Wang 0002, Baocang Wang. 664-677 [doi]
- Communication-Efficient Inner Product Private Join and Compute with CardinalityKoji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida. 678-688 [doi]
- Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural NetworksZitao Chen, Pritam Dash, Karthik Pattabiraman. 689-703 [doi]
- Mitigating Adversarial Attacks by Distributing Different Copies to Different BuyersJiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang. 704-715 [doi]
- Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation MixupMengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo. 716-730 [doi]
- DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial DistillationZhicong Yan, Shenghong Li 0001, Ruijie Zhao 0001, Yuan Tian, Yuanyuan Zhao. 731-745 [doi]
- T-TER: Defeating A2 Trojans with Targeted Tamper-Evident RoutingTimothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks. 746-759 [doi]
- SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive NetworksOleg Schell, Marcel Kneib. 760-772 [doi]
- Investigating Traffic Analysis Attacks on Apple iCloud Private RelayAli Zohaib, Jade Sheffey, Amir Houmansadr. 773-784 [doi]
- A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessageYeomin Jeong, Woonghee Lee, Junbeom Hur. 785-796 [doi]
- Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and ImpactMarkus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle. 797-811 [doi]
- Securing Container-based Clouds with Syscall-aware SchedulingMichael V. Le, Salman Ahmed, Dan Williams, Hani Jamjoom. 812-826 [doi]
- IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud SystemsThore Tiemann, Zane Weissman, Thomas Eisenbarth 0001, Berk Sunar. 827-840 [doi]
- Security Properties of Virtual Remotes and SPOOKing their violationsJoshua David Oetting Majors, Edgardo Barsallo Yi, Amiya Maji, Darren Wu, Saurabh Bagchi, Aravind Machiry. 841-854 [doi]
- Payment with Dispute Resolution: A Protocol for Reimbursing Frauds VictimsAydin Abadi, Steven J. Murdoch. 855-869 [doi]
- Do Users Really Know Alexa? Understanding Alexa Skill Security IndicatorsYangyong Zhang, Raj Vardhan, Phakpoom Chinprutthiwong, Guofei Gu. 870-883 [doi]
- Formalising Application-Driven Authentication & Access-Control based on Users' Companion DevicesChris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne. 884-898 [doi]
- CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android ApplicationsFlorian Draschbacher, Johannes Feichtner. 899-912 [doi]
- QUDA: Query-Limited Data-Free Model ExtractionZijun Lin, Ke Xu, Chengfang Fang, Huadi Zheng, Aneez Ahmed Jaheezuddin, Jie Shi. 913-924 [doi]
- Masked Language Model Based Textual Adversarial Example DetectionXiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang. 925-937 [doi]
- CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor DefensesShang Wang, Yansong Gao, Anmin Fu, Zhi Zhang 0001, Yuqing Zhang, Willy Susilo, Dongxi Liu. 938-950 [doi]
- A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary ReversingHyunjin Kim, JinYeong Bak, KyungHyun Cho, Hyungjoon Koo. 951-965 [doi]
- ThreadLock: Native Principal Isolation Through Memory Protection KeysWilliam Blair, William K. Robertson, Manuel Egele. 966-979 [doi]
- Secure Context Switching of Masked Software ImplementationsBarbara Gigerl, Robert Primas, Stefan Mangard. 980-992 [doi]
- A Scalable Double Oracle Algorithm for Hardening Large Active Directory SystemsYumeng Zhang, Max Ward 0001, Mingyu Guo, Hung Nguyen 0004. 993-1003 [doi]
- Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-GuuidePallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco. 1004-1015 [doi]
- POSTER: A Cyberspace Study of the Russia-Ukraine WarGursimran Singh, H. B. Acharya. 1016-1018 [doi]
- POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power SystemsMuhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh. 1019-1021 [doi]
- POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined NetworkingTina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim. 1022-1024 [doi]
- POSTER: A Common Framework for Resilient and Safe Cyber-Physical System DesignLuyao Niu, Abdullah Al Maruf, Andrew Clark 0001, J. Sukarno Mertoguno, Radha Poovendran. 1025-1027 [doi]
- POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimesMarco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi. 1028-1030 [doi]
- POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning ModelsZhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen. 1031-1033 [doi]
- POSTER: Performance Characterization of Binarized Neural Networks in Traffic FingerprintingYiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne. 1034-1036 [doi]
- POSTER: On searching information leakage of Python model execution to detect adversarial examplesCheng-Yao Guo, Fang Yu. 1037-1039 [doi]
- POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in CybersecurityAbdullahi Chowdhury, Hung Nguyen, Debi Ashenden, Ganna Pogrebna. 1040-1042 [doi]
- POSTER: Security Logs Graph Analytics for Industry Network SystemQiaoran Meng, Nay Oo, Hoon Wei Lim, Biplab Sikdar 0001. 1043-1045 [doi]