Abstract is missing.
- Designing Hardware for Cryptography and Cryptography for HardwareSrinivas Devadas, Simon Langowski, Nikola Samardzic, Sacha Servan-Schreiber, Daniel Sánchez 0003. 1-4 [doi]
- We Are the Experts, and We Are the Problem: The Security Advice FiascoMichelle L. Mazurek. 7 [doi]
- Sustainability is a Security ProblemPatrick Drew McDaniel. 9-10 [doi]
- Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger SecurityCalvin Abou Haidar, Benoît Libert, Alain Passelègue. 11-22 [doi]
- Helping or Hindering?: How Browser Extensions Undermine SecurityShubham Agarwal 0006. 23-37 [doi]
- Practical, Round-Optimal Lattice-Based Blind SignaturesShweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav. 39-53 [doi]
- Blacktooth: Breaking through the Defense of Bluetooth in SilenceMingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu 0001. 55-68 [doi]
- Server-Aided Continuous Group Key AgreementJoël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk. 69-82 [doi]
- Enforcing Fine-grained Constant-time PoliciesBasavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya. 83-96 [doi]
- Post Quantum NoiseYawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber. 97-109 [doi]
- Laconic Private Set-Intersection From PairingsDiego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin 0001. 111-124 [doi]
- Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy HittersGilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida. 125-138 [doi]
- Chaghri - A FHE-friendly Block CipherTomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar. 139-150 [doi]
- Secure Parallel Computation on Privately Partitioned Data and ApplicationsNuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa. 151-164 [doi]
- Thora: Atomic and Privacy-Preserving Multi-Channel UpdatesLukas Aumayr, Kasra Abbaszadeh, Matteo Maffei. 165-178 [doi]
- Sleepy Channels: Bi-directional Payment Channels without WatchtowersLukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei. 179-192 [doi]
- On the Adaptive Security of the Threshold BLS Signature SchemeRenas Bacho, Julian Loss. 193-207 [doi]
- Secret-Shared Joins with Multiplicity from Aggregation TreesSaikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal. 209-222 [doi]
- META-BTS: Bootstrapping Precision Beyond the LimitYoungjin Bae, Jung Hee Cheon, Wonhee Cho 0001, Jaehyung Kim, Taekyung Kim. 223-234 [doi]
- i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?Leemon Baird, Pratyay Mukherjee, Rohit Sinha 0001. 235-248 [doi]
- Membership Inference Attacks and Generalization: A Causal PerspectiveTeodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena. 249-262 [doi]
- Tidy: Symbolic Verification of Timed Cryptographic ProtocolsGilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina. 263-276 [doi]
- A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular MusicAnomadarshi Barua, Yonatan Gizachew Achamyeleh, Mohammad Abdullah Al Faruque. 277-291 [doi]
- Feta: Efficient Threshold Designated-Verifier Zero-Knowledge ProofsCarsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart. 293-306 [doi]
- Distributed, Private, Sparse Histograms in the Two-Server ModelJames Bell 0001, Adrià Gascón, Badih Ghazi, Ravi Kumar 0001, Pasin Manurangsi, Mariana Raykova 0001, Phillipp Schoppmann. 307-321 [doi]
- Threshold Cryptography as a Service (in the Multiserver and YOSO Models)Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin. 323-336 [doi]
- Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoCAlex Berke, Dan Calacci. 337-349 [doi]
- JIT-Picking: Differential Fuzzing of JavaScript EnginesLukas Bernhard, Tobias Scharnowski, Moritz Schlögel, Tim Blazytko, Thorsten Holz. 351-364 [doi]
- A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client HelloKarthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood. 365-379 [doi]
- Power Contracts: Provably Complete Power Leakage Models for ProcessorsRoderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas. 381-395 [doi]
- Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial AccountabilityMikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani. 397-410 [doi]
- Victory by KO: Attacking OpenPGP Using Key OverwritingLara Bruseghini, Daniel Huigens, Kenneth G. Paterson. 411-423 [doi]
- Do Opt-Outs Really Opt Me Out?Duc Bui, Brian Tang, Kang G. Shin. 425-439 [doi]
- Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy ControlsChengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang. 441-454 [doi]
- Succinct Zero-Knowledge Batch Proofs for Set AccumulatorsMatteo Campanelli, Dario Fiore 0001, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh. 455-469 [doi]
- Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix ItSílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman. 471-484 [doi]
- SFuzz: Slice-based Fuzzing for Real-Time Operating SystemsLibo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu 0004, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue. 485-498 [doi]
- Graph UnlearningMin Chen 0032, Zhikun Zhang 0001, Tianhao Wang 0001, Michael Backes 0001, Mathias Humbert, Yang Zhang 0016. 499-513 [doi]
- MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive FirmwareZitai Chen, Sam L. Thomas, Flavio D. Garcia. 515-529 [doi]
- PSI from Ring-OLEWutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky. 531-545 [doi]
- HammerScope: Observing DRAM Power Consumption Using RowhammerYaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom. 547-561 [doi]
- SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and TranscipheringKelong Cong, Debajyoti Das 0001, Jeongeun Park 0001, Hilder V. L. Pereira. 563-577 [doi]
- SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained EncodersTianshuo Cong, Xinlei He, Yang Zhang 0016. 579-593 [doi]
- The Generals' Scuttlebutt: Byzantine-Resilient Gossip ProtocolsSandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell. 595-608 [doi]
- Sharp: Short Relaxed Range ProofsGeoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle. 609-622 [doi]
- QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based SystemsAna-Maria Cretu 0002, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye. 623-637 [doi]
- VRust: Automated Vulnerability Detection for Solana Smart ContractsSiwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang 0001. 639-652 [doi]
- Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest MajorityAnders P. K. Dalskov, Daniel Escudero 0001, Ariel Nof. 653-666 [doi]
- Understanding Security Issues in the NFT EcosystemDipanjan Das 0002, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna. 667-681 [doi]
- GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness DichotomyBernardo David, Bernardo Magri, Christian Matt 0002, Jesper Buus Nielsen, Daniel Tschudi. 683-696 [doi]
- STAR: Secret Sharing for Private Threshold Aggregation ReportingAlex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi. 697-710 [doi]
- CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive NetworksAlvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero. 711-723 [doi]
- Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering DetectionPaola de Perthuis, David Pointcheval. 725-737 [doi]
- On the (In)Security of Secure ROS2Gelei Deng, Guowen Xu, Yuan Zhou 0005, Tianwei Zhang 0004, Yang Liu 0003. 739-753 [doi]
- FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition SystemsJiangyi Deng, Yanjiao Chen, Wenyuan Xu. 755-767 [doi]
- StrongBox: A GPU TEE on Arm EndpointsYunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang. 769-783 [doi]
- Understanding Real-world Threats to Deep Learning Models in Android AppsZizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng. 785-799 [doi]
- A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social NetworksKarel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert. 801-814 [doi]
- Second-Order Low-Randomness d + 1 Hardware Sharing of the AESSiemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi 0001. 815-828 [doi]
- Improving Line-Point Zero Knowledge: Two Multiplications for the Price of OneSamuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky. 829-841 [doi]
- Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key CryptoChristoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha. 843-857 [doi]
- Leakage and Tamper Resilient Permutation-Based CryptographyChristoph Dobraunig, Bart Mennink, Robert Primas. 859-873 [doi]
- Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware DetectionPriyanka Dodia, Mashael AlSabah, Omar Alrawi, Tao Wang. 875-889 [doi]
- Watch Out for Race Condition Attacks When Using Android External StorageShaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo. 891-904 [doi]
- Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human PerceptionRui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu. 905-919 [doi]
- Towards Automated Safety Vetting of Smart Contracts in Decentralized ApplicationsYue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang 0001. 921-935 [doi]
- Poirot: Probabilistically Recommending Protections for the Android FrameworkZeinab El-Rewini, Zhuo Zhang 0002, Yousra Aafer. 937-950 [doi]
- TurboPack: Honest Majority MPC with Constant Online CommunicationDaniel Escudero 0001, Vipul Goyal, Antigoni Polychroniadou, Yifan Song. 951-964 [doi]
- Automatic Detection of Speculative Execution CombinationsXaver Fabian, Marco Guarnieri, Marco Patrignani. 965-978 [doi]
- When Frodo Flips: End-to-End Key Recovery on FrodoKEM via RowhammerMichael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon. 979-993 [doi]
- NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC PlatformsXiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu. 995-1008 [doi]
- Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential PrivacyJuanru Fang, Wei Dong, Ke Yi 0001. 1009-1022 [doi]
- CINI MINIS: Domain Isolation for Fault and Combined SecurityJakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu. 1023-1036 [doi]
- Adversarial Correctness and Privacy for Probabilistic Data StructuresMia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia. 1037-1050 [doi]
- LibAFL: A Framework to Build Modular and Reusable FuzzersAndrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti. 1051-1065 [doi]
- Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data StreamsDario Fiore 0001, Ida Tucker. 1067-1080 [doi]
- Minotaur: Multi-Resource Blockchain ConsensusMatthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang. 1095-1108 [doi]
- Squirrel: Efficient Synchronized Multi-Signatures from LatticesNils Fleischhacker, Mark Simkin 0001, Zhenfei Zhang. 1109-1123 [doi]
- Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication FormatsDaniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn. 1125-1139 [doi]
- Understanding the How and the Why: Exploring Secure Development Practices through a Course CompetitionKelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks 0001, James Parker. 1141-1155 [doi]
- "Is your explanation stable?": A Robustness Evaluation Framework for Feature AttributionYuyou Gan, Yuhao Mao, Xuhong Zhang 0005, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang 0006. 1157-1171 [doi]
- Secure Auctions in the Presence of Rational AdversariesChaya Ganesh, Bhavana Kanukurthi, Girisha Shankar. 1173-1186 [doi]
- Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious LatencyYingzi Gao, Yuan Lu 0001, Zhenliang Lu, Qiang Tang 0005, Jing Xu 0002, Zhenfeng Zhang. 1187-1201 [doi]
- Succinct Zero Knowledge for Floating Point ComputationsSanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Yinuo Zhang. 1203-1216 [doi]
- Practical Settlement Bounds for Proof-of-Work BlockchainsPeter Gazi, Ling Ren 0001, Alexander Russell. 1217-1230 [doi]
- Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted CloudXinyang Ge, Hsuan-Chi Kuo, Weidong Cui. 1231-1242 [doi]
- C2C: Fine-grained Configuration-driven System Call FilteringSeyedhamed Ghavamnia, Tapti Palit, Michalis Polychronakis. 1243-1257 [doi]
- Foundations of Coin Mixing ServicesNoemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan. 1259-1273 [doi]
- ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement LearningVasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran. 1275-1289 [doi]
- Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth ExplorationGibran Gómez, Pedro Moreno-Sanchez, Juan Caballero. 1291-1305 [doi]
- DangZero: Efficient Use-After-Free Detection via Direct Page Table AccessFloris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida. 1307-1322 [doi]
- Reinforced Concrete: A Fast Hash Function for Verifiable ComputationLorenzo Grassi 0001, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch. 1323-1335 [doi]
- Proof-of-Possession for KEM Certificates using Verifiable GenerationTim Güneysu, Philip Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha. 1337-1351 [doi]
- SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech RecognitionHanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao 0001, Qiben Yan. 1353-1366 [doi]
- Identifying a Training-Set Attack's Target Using Renormalized Influence EstimationZayd Hammoudeh, Daniel Lowd. 1367-1381 [doi]
- Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation APIXiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu. 1383-1397 [doi]
- How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-QuantumKeitaro Hashimoto, Shuichi Katsumata, Thomas Prest. 1399-1412 [doi]
- Behind the Scenes of RPKITomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner. 1413-1426 [doi]
- On the Privacy Risks of Cell-Based NAS ArchitecturesHai Huang, Zhikun Zhang 0001, Yun Shen, Michael Backes 0001, Qi Li 0002, Yang Zhang 0016. 1427-1441 [doi]
- Kryvos: Publicly Tally-Hiding Verifiable E-VotingNicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller 0001, Daniel Rausch 0001, Pascal Reisert, Andreas Vogt 0001. 1443-1457 [doi]
- Selective MPC: Distributed Computation of Differentially Private Key-Value StatisticsThomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum. 1459-1472 [doi]
- SpecDoctor: Differential Fuzz Testing to Find Transient Execution VulnerabilitiesJaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee. 1473-1487 [doi]
- Microarchitectural Leakage Templates and Their Application to Cache-Based Side ChannelsAhmad Ibrahim 0002, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow. 1489-1503 [doi]
- Differentially Private Triangle and 4-Cycle Counting in the Shuffle ModelJacob Imola, Takao Murakami, Kamalika Chaudhuri. 1505-1519 [doi]
- On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical UsageAkira Ito, Rei Ueno, Naofumi Homma. 1521-1535 [doi]
- AI/ML for Network Security: The Emperor has no ClothesArthur Selle Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, Lisandro Z. Granville. 1537-1551 [doi]
- DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-OnLouis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk. 1553-1567 [doi]
- Are Attribute Inference Attacks Just Imputation?Bargav Jayaraman, David Evans 0001. 1569-1582 [doi]
- Cache Refinement Type for Side-Channel Detection of Cryptographic SoftwareKe Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang 0004. 1583-1597 [doi]
- Evocatio: Conjuring Bug Capabilities from a Single PoCZhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer. 1599-1613 [doi]
- Understanding IoT Security from a Market-Scale PerspectiveXin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni. 1615-1629 [doi]
- SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code EmbeddingsXin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin. 1631-1645 [doi]
- P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access PoliciesZe Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu. 1647-1661 [doi]
- Private and Reliable Neural Network InferenceNikola Jovanovic 0001, Marc Fischer 0002, Samuel Steffen, Martin T. Vechev. 1663-1677 [doi]
- A Scalable and Dynamic ACL System for In-Network DefenseChanghun Jung, Sian Kim, RhongHo Jang, David Mohaisen, DaeHun Nyang. 1679-1693 [doi]
- TRACER: Signature-based Static Analysis for Detecting Recurring VulnerabilitiesWooseok Kang, Byoungho Son, Kihong Heo. 1695-1708 [doi]
- HyperDbg: Reinventing Hardware-Assisted DebuggingMohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin 0001, Dara Rahmati, Michael Schwarz. 1709-1723 [doi]
- RedShift: Transparent SNARKs from List Polynomial CommitmentsAssimakis A. Kattis, Konstantin Panarin, Alexander Vlasov. 1725-1737 [doi]
- PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital CurrenciesAggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh. 1739-1752 [doi]
- DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided FuzzingSeulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon 0001, Chung Hwan Kim. 1753-1767 [doi]
- Phishing URL Detection: A Network-based Approach Robust to EvasionTaeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim. 1769-1782 [doi]
- NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small ModulusKamil Kluczniak. 1783-1797 [doi]
- Low-Latency Hardware Private CircuitsDavid Knichel, Amir Moradi 0001. 1799-1812 [doi]
- LPGNet: Link Private Graph Networks for Node ClassificationAashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena. 1813-1827 [doi]
- Leakage Inversion: Towards Quantifying Privacy in Searchable EncryptionEvgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas 0001. 1829-1842 [doi]
- PentaGOD: Stepping beyond Traditional GOD with Five PartiesNishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal. 1843-1856 [doi]
- Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation PoliciesJames Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson. 1857-1870 [doi]
- Cerberus: A Formal Approach to Secure and Efficient Enclave Memory SharingDayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic. 1871-1885 [doi]
- Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile AppsShuai Li, Zhemin Yang, Nan Hua, Peng Liu 0005, Xiaohan Zhang 0001, Guangliang Yang 0001, Min Yang 0002. 1887-1900 [doi]
- PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer AuthenticationYuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang. 1901-1915 [doi]
- Auditing Membership Leakages of Multi-Exit NetworksZheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes 0001, Yang Zhang 0016. 1917-1931 [doi]
- Overo: Sharing Private Audio RecordingsJaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee. 1933-1946 [doi]
- InviCloak: An End-to-End Approach to Privacy and Performance in Web Content DistributionShihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang. 1947-1961 [doi]
- DirtyCred: Escalating Privilege in Linux KernelZhenpeng Lin, Yuhang Wu, Xinyu Xing. 1963-1976 [doi]
- Frequency Throttling Side-Channel AttackChen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel. 1977-1991 [doi]
- Ready Raider One: Exploring the Misuse of Cloud Gaming ServicesGuannan Liu, Daiping Liu, Shuai Hao 0001, Xing Gao 0001, Kun Sun 0001, Haining Wang. 1993-2007 [doi]
- When Evil Calls: Targeted Adversarial Voice over IP NetworkHan Liu, Zhiyuan Yu, Mingming Zha, Xiaofeng Wang 0001, William Yeoh 0001, Yevgeniy Vorobeychik, Ning Zhang. 2009-2023 [doi]
- Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking ModelsJiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu. 2025-2039 [doi]
- Matproofs: Maintainable Matrix Commitment with Efficient AggregationJing Liu, Liang Feng Zhang. 2041-2054 [doi]
- Harnessing Perceptual Adversarial Patches for Crowd CountingShunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu 0001, Dacheng Tao. 2055-2069 [doi]
- Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity VulnerabilitiesYinxi Liu, Wei Meng 0001. 2071-2084 [doi]
- Membership Inference Attacks by Exploiting Loss TrajectoryYiyong Liu, Zhengyu Zhao 0004, Michael Backes 0001, Yang Zhang 0016. 2085-2098 [doi]
- Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus SecurityYulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, Yinhong Zhao. 2099-2113 [doi]
- StolenEncoder: Stealing Pre-trained Encoders in Self-supervised LearningYupei Liu, Jinyuan Jia, Hongbin Liu 0005, Neil Zhenqiang Gong. 2115-2128 [doi]
- LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic WatermarksZeyan Liu, FengJun Li, Zhu Li, Bo Luo. 2129-2143 [doi]
- Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud SystemsJie Lu, Haofeng Li, Chen Liu, Lian Li 0002, Kun Cheng. 2145-2158 [doi]
- Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFTYuan Lu 0001, Zhenliang Lu, Qiang Tang 0005. 2159-2173 [doi]
- TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP ApplicationsChanghua Luo, Penghui Li 0001, Wei Meng 0001. 2175-2188 [doi]
- Proving UNSAT in Zero KnowledgeNing Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang. 2203-2217 [doi]
- Frequency Estimation in the Shuffle Model with Almost a Single MessageQiyao Luo, Yilei Wang, Ke Yi 0001. 2219-2232 [doi]
- Feature Inference Attack on Shapley ValuesXinjian Luo, Yangfan Jiang, Xiaokui Xiao. 2233-2247 [doi]
- Federated Boosted Decision Trees with Differential PrivacySamuel Maddock, Graham Cormode, Tianhao Wang 0001, Carsten Maple, Somesh Jha. 2249-2263 [doi]
- The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine LearningChris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia. 2265-2278 [doi]
- Securing Reset Operations in NISQ Quantum ComputersAllen Mi, Shuwen Deng, Jakub Szefer. 2279-2293 [doi]
- Constant Latency in Sleepy ConsensusAtsuki Momose, Ling Ren 0001. 2295-2308 [doi]
- Physical Hijacking Attacks against Object TrackersRaymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes. 2309-2322 [doi]
- The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDESYusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001, Kan Yasuda. 2323-2336 [doi]
- CERBERUS: Exploring Federated Prediction of Security EventsMohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro. 2337-2351 [doi]
- Sigstore: Software Signing for EverybodyZachary Newman, John Speed Meyers, Santiago Torres-Arias. 2353-2367 [doi]
- Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android AppsTrung Tin Nguyen, Michael Backes 0001, Ben Stock. 2369-2383 [doi]
- NARRATOR: Secure and Practical State Continuity for Trusted Execution in the CloudJianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang. 2385-2399 [doi]
- **TITLE HIDDEN - per chairs request*ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce. 2401-2414 [doi]
- Discovering IoT Physical Channel VulnerabilitiesMuslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang 0001. 2415-2428 [doi]
- Eluding Secure Aggregation in Federated Learning via Model InconsistencyDario Pasquini, Danilo Francati, Giuseppe Ateniese. 2429-2443 [doi]
- Hidden in Plain Sight: Exploring Encrypted Channels in Android AppsSajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan. 2445-2458 [doi]
- Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider ImplementationsTamjid Al Rahat, Yu Feng 0001, Yuan Tian. 2459-2473 [doi]
- TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock SignalsSoundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, Jun Han. 2475-2489 [doi]
- FABEO: Fast Attribute-Based Encryption with Optimal SecurityDoreen Riepel, Hoeteck Wee. 2491-2504 [doi]
- Blazing Fast PSI from Improved OKVS and Subfield VOLESrinivasan Raghuraman, Peter Rindal. 2505-2517 [doi]
- Strengthening Order Preserving Encryption with Differential PrivacyAmrita Roy Chowdhury 0001, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou. 2519-2533 [doi]
- EIFFeL: Ensuring Integrity for Federated LearningAmrita Roy Chowdhury 0001, Chuan Guo, Somesh Jha, Laurens van der Maaten. 2535-2549 [doi]
- ROAST: Robust Asynchronous Schnorr Threshold SignaturesTim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder. 2551-2564 [doi]
- Fast Fully Oblivious Compaction and ShufflingSajin Sasy, Aaron Johnson, Ian Goldberg. 2565-2579 [doi]
- FeIDo: Recoverable FIDO2 Tokens Using Electronic IDsFabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow. 2581-2594 [doi]
- MC2: Rigorous and Efficient Directed Greybox FuzzingAbhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana. 2595-2609 [doi]
- Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN ModelsShawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng 0001, Ben Y. Zhao. 2611-2625 [doi]
- Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless ComputingJunxian Shen, Han Zhang 0009, Yantao Geng, Jiawei Li, Jilong Wang 0001, Mingwei Xu. 2627-2641 [doi]
- Finding MNEMON: Reviving Memories of Node EmbeddingsYun Shen, Yufei Han, Zhikun Zhang 0001, Min Chen 0032, Ting Yu, Michael Backes 0001, Yang Zhang 0016, Gianluca Stringhini. 2643-2657 [doi]
- Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain ChatbotsWai Man Si, Michael Backes 0001, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang 0016. 2659-2673 [doi]
- Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral ModificationsKonstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis. 2675-2688 [doi]
- pMPL: A Robust Multi-Party Learning Framework with a Privileged PartyLushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han. 2689-2703 [doi]
- Bullshark: DAG BFT Protocols Made PracticalAlexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias. 2705-2718 [doi]
- Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear AccumulatorsShravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou. 2719-2733 [doi]
- Zapper: Smart Contracts with Data and Identity PrivacySamuel Steffen, Benjamin Bichsel, Martin T. Vechev. 2735-2749 [doi]
- Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS SpamSiyuan Tang, Xianghang Mi, Ying Li, Xiaofeng Wang 0001, Kai Chen 0012. 2751-2764 [doi]
- NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage ApplicationsKonstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler. 2765-2778 [doi]
- Truth Serum: Poisoning Machine Learning Models to Reveal Their SecretsFlorian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong 0001, Nicholas Carlini. 2779-2792 [doi]
- VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated DictionariesNirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro. 2793-2807 [doi]
- L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized ResponseHan Wang, Hanbin Hong, Li Xiong 0001, Zhan Qin, Yuan Hong. 2809-2823 [doi]
- Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and BeyondJianfeng Wang, Shi-Feng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen 0001. 2825-2839 [doi]
- ENGRAFT: Enclave-guarded Raft on Byzantine Faulty NodesWeili Wang 0005, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang. 2841-2855 [doi]
- Don't Kick Over the Beehive: Attacks and Security Analysis on ZigbeeXian Wang, Shuang Hao. 2857-2870 [doi]
- Group Property Inference Attacks Against Graph Neural NetworksXiuling Wang, Wendy Hui Wang. 2871-2884 [doi]
- DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance SamplingJianxin Wei 0005, Ergute Bao, Xiaokui Xiao, Yin Yang 0001. 2885-2899 [doi]
- AntMan: Interactive Zero-Knowledge Proofs with Sublinear CommunicationChenkai Weng, Kang Yang 0002, Zhaomin Yang, Xiang Xie, Xiao Wang 0012. 2901-2914 [doi]
- Microwalk-CI: Practical Side-Channel Analysis for JavaScript ApplicationsJan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth 0001. 2915-2929 [doi]
- EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile DevicesCong Wu 0003, Jing Chen 0003, Kun He 0008, Ziming Zhao 0001, RuiYing Du, Chen Zhang. 2931-2945 [doi]
- Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving RegulationKarl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun. 2947-2960 [doi]
- Protecting Critical Inter-Domain Communication through Flyover ReservationsMarc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig. 2961-2974 [doi]
- Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform EcosystemFeng Xiao, Zheng Yang, Joey Allen, Guangliang Yang 0001, Grant Williams, Wenke Lee. 2975-2988 [doi]
- CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory IsolationMengyao Xie, Chenggang Wu 0002, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang 0017. 2989-3002 [doi]
- zkBridge: Trustless Cross-chain Bridges Made PracticalTiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang 0001, Yongzheng Jia, Dan Boneh, Dawn Song. 3003-3017 [doi]
- Automatic Detection of Fake Key Attacks in Secure MessagingTarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons. 3019-3032 [doi]
- WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal AnalysisEdwin Yang, Qiuye He, Song Fang. 3033-3047 [doi]
- An Extensive Study of Residential Proxies in ChinaMingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan. 3049-3062 [doi]
- Detecting and Measuring Misconfigured Manifests in Android AppsAllen Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson 0002, Angelos Stavrou, Zhiqiang Lin. 3063-3077 [doi]
- Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability DetectionYuQing Yang, Yue Zhang 0025, Zhiqiang Lin. 3079-3092 [doi]
- Enhanced Membership Inference Attacks against Machine Learning ModelsJiayuan Ye 0001, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri. 3093-3106 [doi]
- HeatDeCam: Detecting Hidden Spy Cameras via Thermal EmissionsZhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang. 3107-3120 [doi]
- Caulk: Lookup Arguments in Sublinear TimeArantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin 0001. 3121-3134 [doi]
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System ObservabilityJun Zeng, Chuqi Zhang, Zhenkai Liang. 3135-3149 [doi]
- PACE: Fully Parallelizable BFT from Reproposable Byzantine AgreementHaibin Zhang, Sisi Duan. 3151-3164 [doi]
- I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking BehaviorPenghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé. 3165-3179 [doi]
- When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its CountermeasureYue Zhang 0025, Zhiqiang Lin. 3181-3194 [doi]
- VOProof: Efficient zkSNARKs from Vector Oracle CompilersYuncong Zhang, Alan Szepieniec, Ren Zhang, Shi-Feng Sun, Geng Wang, Dawu Gu. 3195-3208 [doi]
- Characterizing and Detecting Non-Consensual Photo Sharing on Social NetworksTengfei Zheng, Tongqing Zhou, Qiang Liu 0004, Kui Wu 0001, Zhiping Cai. 3209-3222 [doi]
- Ibex: Privacy-preserving Ad Conversion Tracking and BiddingKe Zhong, Yiping Ma 0001, Sebastian Angel. 3223-3237 [doi]
- Uncovering Intent based Leak of Sensitive Data in Android FrameworkHao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai. 3239-3252 [doi]
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security BugsQingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu. 3253-3267 [doi]
- What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware EmulationWei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang 0001. 3269-3283 [doi]
- Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoTXin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian. 3285-3299 [doi]
- Poster: Backdoor Attacks on Spiking NNs and Neuromorphic DatasetsGorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta. 3315-3317 [doi]
- Poster: Correctness of n-parties ECDSA By the Claim of Byzantine AgreementAkshit Aggarwal, Srinibas Swain. 3319-3321 [doi]
- Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT SystemsLamya Alkhariji, Suparna De, Omer F. Rana, Charith Perera. 3323-3325 [doi]
- Poster: A Post-Quantum Oblivious PRF from IsogeniesAndrea Basso 0002. 3327-3329 [doi]
- Poster: Efficient Three-Party Shuffling Using PrecomputationAndreas Brüggemann, Thomas Schneider 0003, Ajith Suresh, Hossein Yalame. 3331-3333 [doi]
- Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data ExtractionNiusen Chen, Josh Dafoe, Bo Chen. 3335-3337 [doi]
- Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command InjectionKohei Doi, Takeshi Sugawara 0001. 3339-3341 [doi]
- Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' AppsAnirudh Ekambaranathan, Jun Zhao 0003, Max Van Kleek. 3343-3345 [doi]
- Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development StacksMafalda Ferreira, Tiago Brito, José Fragoso Santos, Nuno Santos 0001. 3347-3349 [doi]
- Poster: Privacy-Preserving Epidemiological Modeling on Mobile GraphsDaniel Günther 0004, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider 0003, Ajith Suresh. 3351-3353 [doi]
- Poster EveGAN: Using Generative Deep Learning for CryptanalysisRoger A. Hallman. 3355-3357 [doi]
- Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control SystemNur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman. 3359-3361 [doi]
- Poster: The Unintended Consequences of Algorithm Agility in DNSSECElias Heftrig, Haya Shulman, Michael Waidner. 3363-3365 [doi]
- Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large SoftwareCan Huang, Cheng Li, Jiashuo Liang, Xinhui Han. 3367-3369 [doi]
- Poster: Vogue: Faster Computation of Private Heavy HittersPranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal. 3371-3373 [doi]
- Poster: Coded Broadcast for Scalable Leader-Based BFT ConsensusIoannis Kaklamanis, Lei Yang, Mohammad Alizadeh. 3375-3377 [doi]
- Poster MPClan: : Protocol Suite for Privacy-Conscious ComputationsNishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh. 3379-3381 [doi]
- Poster: Patient Community - A Test Bed for Privacy Threat AnalysisImmanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder. 3383-3385 [doi]
- Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT NetworksKiho Lee, Sanghak Oh, Hyoungshick Kim. 3387-3389 [doi]
- Poster: EOSDFA: Data Flow Analysis of EOSIO Smart ContractsLevi Taiji Li, Mu Zhang. 3391-3393 [doi]
- Poster: Cryptographic Inferences for Video Deep Neural NetworksBingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong. 3395-3397 [doi]
- Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos 0001. 3399-3401 [doi]
- Poster: Investigating QUIC's Potential Impact on Censorship CircumventionAnna Harbluk Lorimer, Nick Feamster, Prateek Mittal. 3403-3405 [doi]
- Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device AuthenticationXiaofeng Lu, Renyu Pang, Pietro Liò. 3407-3409 [doi]
- Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS ApplicationsYunpeng Luo, Ziwen Wan, Qi Alfred Chen. 3411-3413 [doi]
- Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the CloudSalman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri. 3415-3417 [doi]
- Poster: Multi-Layer Threat Analysis of the CloudSalman Manzoor, Antonios Gouglidis, Matthew Bradbury, Neeraj Suri. 3419-3421 [doi]
- Poster: RPKI Kill SwitchDonika Mirdita, Haya Shulman, Michael Waidner. 3423-3425 [doi]
- Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart GridMuhammad Nouman Nafees, Neetesh Saxena, Pete Burnap. 3427-3429 [doi]
- Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI ModelsChuyen Nguyen, Caleb Morgan, Sudip Mittal. 3431-3433 [doi]
- Poster - Towards Authorship Obfuscation with Language ModelsRajvardhan Oak. 3435-3437 [doi]
- Poster: Adversarial Defense with Deep Learning Coverage on MagNet's PurificationLeo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon 0002. 3439-3441 [doi]
- Poster: A WiFi Vision-based Approach to Person Re-identificationYili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang 0003. 3443-3445 [doi]
- Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Botsshadi sadeghpour, Natalija Vlajic. 3447-3449 [doi]
- Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded DevicesMohsen Salehi, Karthik Pattabiraman. 3451-3453 [doi]
- Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware DetectionDavide Sanvito, Giuseppe Siracusano, Roberto Gonzalez, Roberto Bifulco. 3455-3457 [doi]
- Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object DetectionTakami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen. 3459-3461 [doi]
- Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility MonitoringMartin Serror, Lennart Bader, Martin Henze, Arne Schwarze, Kai Nürnberger. 3463-3465 [doi]
- Poster: Insights into Global Deployment of RPKI ValidationHaya Shulman, Niklas Vogel, Michael Waidner. 3467-3469 [doi]
- Poster: DNS in Routers Considered HarmfulHaya Shulman, Michael Waidner. 3471-3473 [doi]
- Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain ComputationLeon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen. 3475-3477 [doi]
- Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous DrivingNingfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen. 3479-3481 [doi]
- Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction ExecutionYibo Wang, Yuzhe Tang. 3483-3485 [doi]
- Poster: Fingerprint-Face Friction Based Earable AuthenticationZi Wang, Yilin Wang, Yingying Chen, Jie Yang. 3487-3489 [doi]
- Poster: Clean-label Backdoor Attack on Graph Neural NetworksJing Xu, Stjepan Picek. 3491-3493 [doi]
- Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its LimitYibin Xu, Tijs Slaats, Boris Düdder. 3495-3497 [doi]
- Poster: User-controlled System-level Encryption for all ApplicationsTarun Kumar Yadav, Justin Hales, Kent E. Seamons. 3499-3501 [doi]
- Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic VehiclesKyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon 0001, Heejo Lee, Chung Hwan Kim. 3503-3505 [doi]
- Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined RulesRuiguo Yang, Jiajin Cai, Xinhui Han. 3507-3509 [doi]
- Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone SwarmsYingao (Elaine) Yao, Pritam Dash, Karthik Pattabiraman. 3511-3513 [doi]
- Demo: End-to-End Wireless Disruption of CCS EV ChargingSebastian Köhler, Richard Baker 0008, Martin Strohmeier, Ivan Martinovic. 3515-3517 [doi]
- Demo - SPoKE: Secure Polling and Knowledge ExchangeThomas Sandholm, Sayandev Mukherjee, Bernardo A. Huberman. 3519-3521 [doi]
- Demo - MaLFraDA: A Machine Learning Framework with Data AirlockChandra Thapa, Seyit Camtepe, Raj Gaire 0001, Surya Nepal, Seung Ick Jang. 3523-3525 [doi]
- Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 RecordsXiangan Tian, Vlasis Koutsos, Lijia Wu, Yijian Wu, Dimitrios Papadopoulos 0001. 3527-3529 [doi]
- WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic CryptographyMichael Brenner 0003, Anamaria Costache, Kurt Rohloff. 3531-3532 [doi]
- CPSIoTSec '22: 4th Workshop on CPS & IoT Security and PrivacyEarlence Fernandes, Cristina Alcaraz. 3533-3534 [doi]
- WPES '22: 21st Workshop on Privacy in the Electronic SocietyYuan Hong, Lingyu Wang 0001. 3535-3537 [doi]
- MTD '22: 9th ACM Workshop on Moving Target DefenseHamed Okhravi, Cliff Wang. 3539-3540 [doi]
- CCSW '22: The 2022 Cloud Computing Security WorkshopMarten van Dijk, Francesco Regazzoni 0001. 3541-3542 [doi]
- ConsensusDay '22: ACM Workshop on Developments in ConsensusJorge M. Soares, Dawn Song, Marko Vukolic. 3543-3544 [doi]
- ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware SecurityChip-Hong Chang, Domenic Forte, Debdeep Mukhopadhyay, Ulrich Rührmair. 3545-3547 [doi]
- AISec '22: 15th ACM Workshop on Artificial Intelligence and SecurityAmbra Demontis, Xinyun Chen, Florian Tramèr. 3549-3551 [doi]
- Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacksGolden G. Richard III, Tim Blazytko. 3553-3554 [doi]
- SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesSantiago Torres-Arias, Marcela Melara, Laurent Simon. 3555-3556 [doi]
- AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) SecurityMark Yampolskiy, Moti Yung. 3557-3558 [doi]
- DeFi '22: ACM CCS Workshop on Decentralized Finance and SecurityFan Zhang 0009, Patrick McCorry. 3559-3560 [doi]