Abstract is missing.
- ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double RatchetAlexander Bienstock, Paul Rösler, Yi Tang. 1-15 [doi]
- Lattice-Based Blind Signatures: Short, Efficient, and Round-OptimalWard Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Gregor Seiler. 16-29 [doi]
- Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous CredentialsOmid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig. 30-44 [doi]
- Concurrent Security of Anonymous Credentials Light, RevisitedJulia Kastner, Julian Loss, Omar Renawi. 45-59 [doi]
- Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model PerformanceSavino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge. 60-74 [doi]
- Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMOCong Shi 0004, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen 0001. 75-89 [doi]
- Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge SettingPing He, Yifan Xia, Xuhong Zhang 0002, Shouling Ji. 90-104 [doi]
- Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with AuthenticationFrancesco Marchiori, Mauro Conti. 105-119 [doi]
- TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on EthereumBowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou. 120-134 [doi]
- Uncle Maker: (Time)Stamping Out The Competition in EthereumAviv Yaish, Gilad Stern, Aviv Zohar. 135-149 [doi]
- How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting GovernanceChao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang 0012. 150-164 [doi]
- Demystifying DeFi MEV Activities in Flashbots BundleZihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen. 165-179 [doi]
- Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal AspectsTinhinane Medjkoune, Oana Goga, Juliette Senechal. 180-194 [doi]
- Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design SpaceMaryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz. 195-209 [doi]
- Comprehension from Chaos: Towards Informed Consent for Private ComputationBailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum. 210-224 [doi]
- Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and UseEmiram Kablo, Patricia Arias Cabarcos. 225-238 [doi]
- Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke EavesdroppingJingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang 0001, Jun Luo 0001. 239-252 [doi]
- Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side ChannelTao Ni, Xiaokuan Zhang, Qingchuan Zhao. 253-267 [doi]
- Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light FluctuationsBen Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici. 268-280 [doi]
- The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel LearningZihao Wang, Jiale Guan, Xiaofeng Wang 0001, Wenhao Wang 0001, Luyi Xing, Fares Alharbi. 281-295 [doi]
- Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersFenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang. 296-310 [doi]
- TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS AmplifiersWei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan 0004. 311-325 [doi]
- Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the WildZhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang 0004, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang 0008, Min Yang. 326-340 [doi]
- Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data RecoveryBoyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma 0001. 341-355 [doi]
- Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-thresholdSourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren 0001. 356-370 [doi]
- Post Quantum Fuzzy Stealth Signatures and ApplicationsSihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik. 371-385 [doi]
- Chipmunk: Better Synchronized Multi-Signatures from LatticesNils Fleischhacker, Gottfried Herold, Mark Simkin 0001, Zhenfei Zhang. 386-400 [doi]
- AIM: Symmetric Primitive for Shorter Signatures with Stronger SecuritySeongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyup Lee, Jihoon Kwon, Jihoon Cho, HyoJin Yoon, Jooyoung Lee 0001. 401-415 [doi]
- FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security AnalysisYiling He, Jian Lou 0001, Zhan Qin, Kui Ren 0001. 416-430 [doi]
- Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based TestingJinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li. 431-445 [doi]
- FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion SensorsTianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi 0004, Yan Wang 0003, Nitesh Saxena, Yingying Chen 0001. 446-459 [doi]
- AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech SynthesisZhiyuan Yu, Shixuan Zhai, Ning Zhang. 460-474 [doi]
- Themis: Fast, Strong Order-Fairness in Byzantine ConsensusMahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan. 475-489 [doi]
- Towards Practical Sleepy BFTDahlia Malkhi, Atsuki Momose, Ling Ren 0001. 490-503 [doi]
- ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic PathXiaohai Dai, Bolin Zhang, Hai Jin 0001, Ling Ren 0001. 504-518 [doi]
- Abraxas: Throughput-Efficient Hybrid Asynchronous ConsensusErica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither. 519-533 [doi]
- Ou: Automating the Parallelization of Zero-Knowledge ProtocolsYuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao. 534-548 [doi]
- Black Ostrich: Web Application Scanning with String SolversBenjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld. 549-563 [doi]
- Comparse: Provably Secure Formats for Cryptographic ProtocolsThéophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan. 564-578 [doi]
- Exploration of Power Side-Channel Vulnerabilities in Quantum Computer ControllersChuanqi Xu, Ferhat Erata, Jakub Szefer. 579-593 [doi]
- Securing NISQ Quantum Computer Reset Operations Against Higher Energy State AttacksChuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer. 594-607 [doi]
- Watch This Space: Securing Satellite Communication through Resilient Transmitter FingerprintingJoshua Smailes, Sebastian Köhler 0005, Simon Birnbach, Martin Strohmeier, Ivan Martinovic. 608-621 [doi]
- Protecting HRP UWB Ranging System Against Distance Reduction AttacksKyungho Joo, Dong Hoon Lee 0001, Yeonseon Jeong, Wonsuk Choi. 622-635 [doi]
- BLUFFS: Bluetooth Forward and Future Secrecy Attacks and DefensesDaniele Antonioli. 636-650 [doi]
- When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud SubscriptionYan He, Qiuye He, Song Fang, Yao Liu 0007. 651-665 [doi]
- Formal Analysis of Access Control Mechanism of 5G Core NetworkMujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain. 666-680 [doi]
- IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App AnalysisDavid Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer. 681-695 [doi]
- Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus ConsumptionJung Hee Cheon, Wonhee Cho 0001, Jaehyung Kim, Damien Stehlé. 696-710 [doi]
- PELTA - Shielding Multiparty-FHE against Malicious AdversariesSylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux. 711-725 [doi]
- Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget DecompositionTaechan Kim 0001, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song. 726-740 [doi]
- FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic EncryptionMichiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede. 741-755 [doi]
- Stolen Risks of Models with Security PropertiesYue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan. 756-770 [doi]
- Narcissus: A Practical Clean-Label Backdoor Attack with Limited InformationYi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia. 771-785 [doi]
- Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box AttacksRyan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash 0001. 786-800 [doi]
- Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple ConceptsVibha Belavadi, Yan Zhou 0001, Murat Kantarcioglu, Bhavani Thuraisingham. 801-814 [doi]
- FIN: Practical Signature-Free Asynchronous Common Subset in Constant TimeSisi Duan, Xin Wang, Haibin Zhang. 815-829 [doi]
- Analyzing the Real-World Security of the Algorand BlockchainErica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin. 830-844 [doi]
- Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based CommitteesPeter Gazi, Aggelos Kiayias, Alexander Russell. 845-858 [doi]
- LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor SignaturesErkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind. 859-873 [doi]
- Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM ArchitecturesKha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee 0001. 874-888 [doi]
- Cryptographically Enforced Memory SafetyMartin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, Stefan Mangard. 889-903 [doi]
- Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM ApplicationsHanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo 0001, Xiangqun Chen. 904-918 [doi]
- PANIC: PAN-assisted Intra-process Memory Isolation on ARMJiali Xu, Mengyao Xie, Chenggang Wu 0002, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang 0017. 919-933 [doi]
- Security Verification of Low-Trust ArchitecturesQinhan Tan, Yonathan Fisseha, Shibo Chen, Lauren Biernacki, Jean-Baptiste Jeannin, Sharad Malik, Todd M. Austin. 945-959 [doi]
- TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIGZhenkai Zhang, Tyler Allen, Fan Yao, Xing Gao 0001, Rong Ge. 960-974 [doi]
- FetchBench: Systematic Identification and Characterization of Proprietary PrefetchersTill Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim 0002, Michael Schwarz 0001, Christian Rossow, Nils Ole Tippenhauer. 975-989 [doi]
- Combined Private Circuits - Combined Security RefurbishedJakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert. 990-1004 [doi]
- Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive AlarmsChuanpu Fu, Qi Li, Ke Xu, Jianping Wu. 1005-1019 [doi]
- Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web DomainsPeiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin. 1020-1034 [doi]
- Realistic Website Fingerprinting By Augmenting Network TracesAlireza Bahramali, Ardavan Bozorgi, Amir Houmansadr. 1035-1049 [doi]
- Transformer-based Model for Multi-tab Website Fingerprinting AttackZhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang. 1050-1064 [doi]
- Efficient Registration-Based EncryptionNoemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi. 1065-1079 [doi]
- Efficient Set Membership Encryption and ApplicationsMatthew Green 0001, Abhishek Jain 0002, Gijs Van Laer. 1080-1092 [doi]
- Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key DirectoryRachit Garg 0001, George Lu, Brent Waters, David J. Wu 0001. 1093-1107 [doi]
- Post-Quantum Multi-Recipient Public Key EncryptionJoël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe. 1108-1122 [doi]
- Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and SolutionsTejas Kannan, Nick Feamster, Henry Hoffmann. 1123-1137 [doi]
- Unforgeability in Stochastic Gradient DescentTeodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena. 1138-1152 [doi]
- Devil in Disguise: Breaching Graph Neural Networks Privacy through InfiltrationLingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu 0005, Wenyuan Xu 0001, Haiqin Weng. 1153-1167 [doi]
- Evading Watermark based Detection of AI-Generated ContentZhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong. 1168-1181 [doi]
- Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive ChaosFuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su 0005, Yu Jiang 0001, Jiaguang Sun, Huizhong Li. 1182-1196 [doi]
- Fuzz on the Beach: Fuzzing Solana Smart ContractsSven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl. 1197-1211 [doi]
- Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive LearningKushal Babel, Mojan Javaheripi, Yan Ji 0001, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels. 1212-1226 [doi]
- Riggs: Decentralized Sealed-Bid AuctionsNirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières. 1227-1241 [doi]
- DSFuzz: Detecting Deep State Bugs with Dependent State ExplorationYinxi Liu, Wei Meng 0001. 1242-1256 [doi]
- Profile-guided System Optimizations for Accelerated Greybox FuzzingYunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu. 1257-1271 [doi]
- NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing LogicPeng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang. 1272-1286 [doi]
- Lifting Network Protocol Implementation to Precise Format Specification with Security ApplicationsQingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang 0001. 1287-1301 [doi]
- MicPro: Microphone-based Voice Privacy ProtectionShilin Xiao, Xiaoyu Ji 0001, Chen Yan 0001, Zhicong Zheng, Wenyuan Xu 0001. 1302-1316 [doi]
- TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous DrivingYi Zhu, Chenglin Miao, Hongfei Xue, Zhengxiong Li, Yunnan Yu, Wenyao Xu, Lu Su, Chunming Qiao. 1317-1331 [doi]
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded SystemsXi Tan, Ziming Zhao 0001. 1332-1346 [doi]
- Caveat (IoT) Emptor: Towards Transparency of IoT Device PresenceSashidhar Jakkamsetti, Youngil Kim, Gene Tsudik. 1347-1361 [doi]
- CryptoBap: A Binary Analysis Platform for Cryptographic ProtocolsFaezeh Nasrabadi, Robert Künnemann, Hamed Nemati. 1362-1376 [doi]
- A Generic Methodology for the Modular Verification of Security Protocol ImplementationsLinard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller 0001. 1377-1391 [doi]
- Provably Unlinkable Smart Card-based PaymentsSergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov. 1392-1406 [doi]
- CheckMate: Automated Game-Theoretic Security ReasoningLea Salome Brugger, Laura Kovács, Anja Petkovic Komel, Sophie Rain, Michael Rawson 0001. 1407-1421 [doi]
- Recursion over Public-Coin Interactive Proof Systems; Faster Hash VerificationAlexandre Belling, Azam Soleimanian, Olivier Bégassat. 1422-1436 [doi]
- Modular Sumcheck Proofs with Applications to Machine Learning and Image ProcessingDavid Balbás, Dario Fiore 0001, María Isabel González Vasco, Damien Robissout, Claudio Soriente. 1437-1451 [doi]
- Batchman and Robin: Batched and Non-batched Branching for Interactive ZKYibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam. 1452-1466 [doi]
- Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based AssumptionsDiego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde. 1467-1481 [doi]
- Turning Privacy-preserving Mechanisms against Federated LearningMarco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek. 1482-1495 [doi]
- martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning ArchitectureQi Li, Zhuotao Liu, Qi Li, Ke Xu. 1496-1510 [doi]
- Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning AttacksChulin Xie, Yunhui Long, Pin-Yu Chen, Qinbin Li, Sanmi Koyejo, Bo Li. 1511-1525 [doi]
- MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive AttackersTorsten Krauß, Alexandra Dmitrienko. 1526-1540 [doi]
- Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via HubsZhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long 0001, Xian Xu, Dawu Gu. 1541-1555 [doi]
- CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared AccountsAndrei Tonkikh, Pavel Ponomarev, Petr Kuznetsov, Yvonne Anne Pignolet. 1556-1570 [doi]
- TrustBoost: Boosting Trust among Interoperable BlockchainsPeiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath. 1571-1584 [doi]
- Interchain Timestamping for Mesh SecurityErtem Nusret Tas, Runchao Han, David Tse, Mingchao Yu. 1585-1599 [doi]
- Hopper: Interpretative Fuzzing for LibrariesPeng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen. 1600-1614 [doi]
- Greybox Fuzzing of Distributed SystemsRuijie Meng, George Pîrlea, Abhik Roychoudhury, Ilya Sergey. 1615-1629 [doi]
- SyzDirect: Directed Greybox Fuzzing for Linux KernelXin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang. 1630-1644 [doi]
- PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative FuzzingWen Li, Haoran Yang, Xiapu Luo, Long Cheng 0005, Haipeng Cai. 1645-1659 [doi]
- FITS: Matching Camera Fingerprints Subject to Software Noise PollutionLiu Liu, Xinwen Fu, Xiaodong Chen, Jianpeng Wang, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren 0001. 1660-1674 [doi]
- LeakyOhm: Secret Bits Extraction using Impedance AnalysisSaleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik. 1675-1689 [doi]
- A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic LibrariesAntoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice. 1690-1704 [doi]
- A Thorough Evaluation of RAMBAMDaniel Lammers, Amir Moradi 0001, Nicolai Müller, Aein Rezaei Shahmirzadi. 1705-1717 [doi]
- A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information FlowMário S. Alvim, Natasha Fernandes, Annabelle McIver, Carroll Morgan, Gabriel Henrique Nunes. 1718-1731 [doi]
- Tainted Secure Multi-Execution to Restrict Attacker InfluenceMcKenna McCall, Abhishek Bichhawat, Limin Jia 0001. 1732-1745 [doi]
- Assume but Verify: Deductive Verification of Leaked Information in Concurrent ApplicationsToby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann. 1746-1760 [doi]
- Deciding Differential Privacy of Online Algorithms with Multiple VariablesRohit Chadha, A. Prasad Sistla, Mahesh Viswanathan 0001, Bishnu Bhusal. 1761-1775 [doi]
- FlexiRand: Output Private (Distributed) VRFs and Application to BlockchainsAniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee. 1776-1790 [doi]
- Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness BeaconsRenas Bacho, Julian Loss. 1791-1804 [doi]
- Short Privacy-Preserving Proofs of LiabilitiesFrancesca Falzon, Kaoutar Elkhiyaoui, Yacov Manevich, Angelo De Caro. 1805-1819 [doi]
- The Locality of Memory CheckingWeijie Wang, Yujie Lu, Charalampos Papamanthou, Fan Zhang. 1820-1834 [doi]
- Stealing the Decoding Algorithms of Language ModelsAli Naseh, Kalpesh Krishna, Mohit Iyyer, Amir Houmansadr. 1835-1849 [doi]
- Verifiable Learning for Robust Tree EnsemblesStefano Calzavara, Lorenzo Cazzaro, Giulio Ermanno Pibiri, Nicola Prezza. 1850-1864 [doi]
- Large Language Models for Code: Security Hardening and Adversarial TestingJingxuan He, Martin T. Vechev. 1865-1879 [doi]
- Experimenting with Zero-Knowledge Proofs of TrainingSanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, Mingyuan Wang. 1880-1894 [doi]
- Group and Attack: Auditing Differential PrivacyJohan Lokna, Anouk Paradis, Dimitar I. Dimitrov, Martin T. Vechev. 1905-1918 [doi]
- Interactive Proofs For Differentially Private CountingAri Biswas, Graham Cormode. 1919-1933 [doi]
- Concentrated Geo-PrivacyYuting Liang, Ke Yi 0001. 1934-1948 [doi]
- Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss ParametersSamuel Haney, Michael Shoemate, Grace Tian, Salil P. Vadhan, Andrew Vyrros, Vicki Xu, Wanrong Zhang 0001. 1949-1963 [doi]
- SysXCHG: Refining Privilege with Adaptive System Call FiltersAlexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis. 1964-1978 [doi]
- SysPart: Automated Temporal System Call Filtering for BinariesVidya Lakshmi Rajagopalan, Konstantinos Kleftogiorgos, Enes Göktas, Jun Xu, Georgios Portokalidis. 1979-1993 [doi]
- Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency AnalysisZhenghao Hu, Sangho Lee 0001, Marcus Peinado. 1994-2008 [doi]
- KRover: A Symbolic Execution Engine for Dynamic Kernel AnalysisPansilu Pitigalaarachchi, Xuhua Ding, Haiqing Qiu, Haoxin Tu, Jiaqi Hong, Lingxiao Jiang. 2009-2023 [doi]
- Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication LinksChongzhou Fang, Ning Miao, Han Wang, Jiacheng Zhou, Tyler Sheaves, John Marty Emmert, Avesta Sasan, Houman Homayoun. 2024-2037 [doi]
- iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple DevicesJason Kim 0007, Stephan van Schaik, Daniel Genkin, Yuval Yarom. 2038-2052 [doi]
- Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security MeasuresRutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison 0001, Christopher W. Fletcher. 2053-2067 [doi]
- SpecVerilog: Adapting Information Flow Control for Secure SpeculationDrew Zagieboylo, Charles Sherk, Andrew C. Myers, G. Edward Suh. 2068-2082 [doi]
- Formalizing, Verifying and Applying ISA Security Guarantees as Universal ContractsSander Huyghebaert, Steven Keuchel, Coen De Roover, Dominique Devriese. 2083-2097 [doi]
- Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-KnowledgeSamuel Dittmer, Karim Eldefrawy, Stéphane Graham-Lengrand, Steve Lu 0001, Rafail Ostrovsky, Vitor Pereira 0002. 2098-2112 [doi]
- Galápagos: Developing Verified Low Level Cryptography on Heterogeneous HardwaresYi Zhou, Sydney Gibson, Sarah Cai, Menucha Winchell, Bryan Parno. 2113-2127 [doi]
- Specification and Verification of Side-channel Security for Open-source Processors via Leakage ContractsZilong Wang, Gideon Mohr, Klaus von Gleissenthall, Jan Reineke 0001, Marco Guarnieri. 2128-2142 [doi]
- Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFsKyle Storrier, Adithya Vadapalli, Allan Lyons, Ryan Henry. 2143-2157 [doi]
- Scalable Multiparty GarblingGabrielle Beck, Aarushi Goel, Aditya Hegde 0003, Abhishek Jain 0002, Zhengzhong Jin, Gabriel Kaptchuk. 2158-2172 [doi]
- Linear Communication in Malicious Majority MPCS. Dov Gordon, Phi-Hung Le, Daniel McVicker. 2173-2187 [doi]
- Efficient Multiparty Probabilistic Threshold Private Set IntersectionFeng-Hao Liu, En Zhang, Leiyong Qin. 2188-2201 [doi]
- Vulnerability Intelligence Alignment via Masked Graph Attention NetworksYue Qin, Yue Xiao, Xiaojing Liao. 2202-2216 [doi]
- In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security ProblemsRoman Beltiukov, Wenbo Guo 0014, Arpit Gupta, Walter Willinger. 2217-2231 [doi]
- MDTD: A Multi-Domain Trojan Detector for Deep Neural NetworksArezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran. 2232-2246 [doi]
- ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph SearchEnes Altinisik, Fatih Deniz, Hüsrev Taha Sencar. 2247-2261 [doi]
- Securely Sampling Discrete Gaussian Noise for Multi-Party Differential PrivacyChengkun Wei, Ruijing Yu, Yuan Fan, Wenzhi Chen, Tianhao Wang. 2262-2276 [doi]
- Detecting Violations of Differential Privacy for Quantum AlgorithmsJi Guan, Wang Fang, Mingyu Huang, Mingsheng Ying. 2277-2291 [doi]
- Amplification by Shuffling without ShufflingBorja Balle, James Bell 0001, Adrià Gascón. 2292-2305 [doi]
- HELiKs: HE Linear Algebra Kernels for Secure InferenceShashank Balla, Farinaz Koushanfar. 2306-2320 [doi]
- SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development PhaseSong Liao, Long Cheng 0005, Haipeng Cai, Linke Guo, Hongxin Hu. 2321-2335 [doi]
- Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via WatermarksZongjie Li, Chaozheng Wang, Shuai Wang, Cuiyun Gao. 2336-2350 [doi]
- Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term RewritingJaehyung Lee, Woosuk Lee. 2351-2365 [doi]
- Enhancing OSS Patch Backporting with SemanticsSu Yang, Yang Xiao 0011, Zhengzi Xu, Chengyi Sun, Chen Ji, Yuqing Zhang. 2366-2380 [doi]
- Evaluating the Security Posture of Real-World FIDO2 DeploymentsDhruv Kuchhal, Muhammad Saad 0001, Adam Oest, Frank Li 0001. 2381-2395 [doi]
- Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsFeng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo 0001, Xiangqun Chen. 2396-2410 [doi]
- Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-ProgramsYue Zhang, Yuqing Yang 0003, Zhiqiang Lin. 2411-2425 [doi]
- The Effectiveness of Security Interventions on GitHubFelix Fischer 0001, Jonas Höbenreich, Jens Grossklags. 2426-2440 [doi]
- CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract InterpretationJianjia Yu, Song Li 0006, JunMin Zhu, Yinzhi Cao. 2441-2455 [doi]
- Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web BrowsersDominik Trevor Noß, Lukas Knittel, Christian Mainka, Marcus Niemietz, Jörg Schwenk. 2456-2470 [doi]
- Uncovering and Exploiting Hidden APIs in Mobile Super AppsChao Wang, Yue Zhang, Zhiqiang Lin. 2471-2485 [doi]
- A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page ClassifierChangqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang 0001, Bin Liang 0002. 2486-2500 [doi]
- Improved Distributed RSA Key Generation Using the Miller-Rabin TestJakob Burkhardt, Ivan Damgård, Tore Kasper Frederiksen, Satrajit Ghosh, Claudio Orlandi. 2501-2515 [doi]
- Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs)Yibin Yang, Stanislav Peceny, David Heath, Vladimir Kolesnikov. 2516-2530 [doi]
- COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party ComputationBenjamin Levy, Muhammad Ishaq, Benjamin Sherman, Lindsey Kennard, Ana L. Milanova, Vassilis Zikas. 2531-2545 [doi]
- Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure ComputationAmit Singh Bhati, Erik Pohle, Aysajan Abidin, Elena Andreeva 0001, Bart Preneel. 2546-2560 [doi]
- On the Security of KZG Commitment for VSSAtsuki Momose, Sourav Das, Ling Ren 0001. 2561-2575 [doi]
- Targeted Attack Synthesis for Smart Grid Vulnerability AnalysisSuman Maiti, Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey. 2576-2590 [doi]
- Secure and Timely GPU Execution in Cyber-physical SystemsJinwen Wang, Yujie Wang, Ning Zhang. 2591-2605 [doi]
- SalsaPicante: A Machine Learning Attack on LWE with Binary SecretsCathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter. 2606-2620 [doi]
- DPMLBench: Holistic Evaluation of Differentially Private Machine LearningChengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen. 2621-2635 [doi]
- Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep LearningHanshen Xiao, Jun Wan 0008, Srinivas Devadas. 2636-2650 [doi]
- Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian EstimationXiaochen Zhu 0003, Vincent Y. F. Tan, Xiaokui Xiao. 2651-2664 [doi]
- DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward PassMinxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang 0001, Chenyu Huang, Huan Sun 0001. 2665-2679 [doi]
- Whole-Program Control-Flow Path AttestationNikita Yadav, Vinod Ganapathy. 2680-2694 [doi]
- Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-LevelYufei Du, Omar Alrawi, Kevin Z. Snow, Manos Antonakakis, Fabian Monrose. 2695-2709 [doi]
- SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic ExecutionYuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, Xiangqun Chen. 2710-2724 [doi]
- TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic AnalysisZiyi Lin, Jinku Li, Bowen Li, Haoyu Ma, Debin Gao, Jianfeng Ma. 2725-2739 [doi]
- "Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure AuthenticationJan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl. 2740-2754 [doi]
- Sharing Communities: The Good, the Bad, and the UglyThomas Geras, Thomas Schreck. 2755-2769 [doi]
- Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS RulesMathew Vermeer, Natalia Kadenko, Michel van Eeten, Carlos Gañán, Simon Parkin. 2770-2784 [doi]
- Do Users Write More Insecure Code with AI Assistants?Neil Perry, Megha Srivastava, Deepak Kumar 0006, Dan Boneh. 2785-2799 [doi]
- HODOR: Shrinking Attack Surface on Node.js via System Call LimitationWenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang. 2800-2814 [doi]
- ADEM: An Authentic Digital EMblemFelix Linker, David Basin. 2815-2829 [doi]
- Is Modeling Access Control Worth It?David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen, Martín Ochoa. 2830-2844 [doi]
- Fine-Grained Data-Centric Content Protection Policy for Web ApplicationsZilun Wang, Wei Meng, Michael R. Lyu. 2845-2859 [doi]
- On the Security of Rate-limited Privacy PassHien Chu, Khue Do, Lucjan Hanzlik. 2871-2885 [doi]
- Passive SSH Key Compromise via LatticesKeegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger. 2886-2900 [doi]
- Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3Marc Fischlin. 2901-2914 [doi]
- ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparencyJulia Len, Melissa Chase, Esha Ghosh, Daniel Jost 0001, Balachandar Kesavan, Antonio Marcedone. 2915-2929 [doi]
- HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic EncryptionSong Bian 0001, Zhou Zhang 0016, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan. 2930-2944 [doi]
- Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic EncryptionRasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum. 2945-2958 [doi]
- Fast Unbalanced Private Set Union from Fully Homomorphic EncryptionBinbin Tu, Yu Chen 0003, Qi Liu, Cong Zhang. 2959-2973 [doi]
- Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSAHaiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang. 2974-2988 [doi]
- Splice: Efficiently Removing a User's Data from In-memory Application StateXueyuan Han, James Mickens, Siddhartha Sen. 2989-3002 [doi]
- Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric EncryptionLei Xu, Leqian Zheng, ChengZhi Xu, Xingliang Yuan, Cong Wang. 3003-3017 [doi]
- Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the EdgeCláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues. 3018-3032 [doi]
- Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on LinuxElia Anzuoni, Tommaso Gagliardoni. 3033-3047 [doi]
- Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party ApplicationsNanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma. 3048-3062 [doi]
- Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container IsolationZhi Li, Weijie Liu 0004, Xiaofeng Wang 0001, Bin Yuan, Hongliang Tian, Hai Jin 0001, Shoumeng Yan. 3063-3077 [doi]
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer DetectionShijia Li, Jiang Ming 0002, Pengda Qiu, Qiyuan Chen, Lanqing Liu, Huaifeng Bao, Qiang Wang 0059, Chunfu Jia. 3078-3092 [doi]
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel ProtectionsKyle Zeng, Zhenpeng Lin, Kangjie Lu, Xinyu Xing, Ruoyu Wang 0001, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao. 3093-3107 [doi]
- Measuring Website Password Creation Policies At ScaleSuood Alroomi, Frank Li 0001. 3108-3122 [doi]
- "I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password ManagersCollins W. Munyendo, Peter Mayer 0001, Adam J. Aviv. 3123-3137 [doi]
- "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery DeploymentsSabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl. 3138-3152 [doi]
- Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-WalletsEaswar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate. 3153-3167 [doi]
- You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security MeasurementsFlorian Hantke, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock. 3168-3182 [doi]
- Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and CoverageGibran Gómez, Kevin van Liebergen, Juan Caballero. 3183-3197 [doi]
- Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security ImplicationsJeremy Rack, Cristian-Alexandru Staicu. 3198-3212 [doi]
- Understanding and Detecting Abused Image Hosting Modules as Malicious ServicesGeng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang. 3213-3227 [doi]
- Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve HashingDiego F. Aranha, Benjamin Salling Hvass, Bas Spitters, Mehdi Tibouchi. 3228-3238 [doi]
- Verifiable Verification in Cryptographic ProtocolsMarc Fischlin, Felix Günther 0001. 3239-3253 [doi]
- Compact Frequency Estimators in Adversarial EnvironmentsSam A. Markelon, Mia Filic, Thomas Shrimpton. 3254-3268 [doi]
- ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear AlgebraAntonio De La Piedra, Marloes Venema, Greg Alpár. 3269-3283 [doi]
- Ramen: Souper Fast Three-Party Computation for RAM ProgramsLennart Braun, Mahak Pancholi, Rahul Rachuri, Mark Simkin 0001. 3284-3297 [doi]
- Secure Statistical Analysis on Multiple Datasets: Join and Group-ByGilad Asharov, Koki Hamada, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida. 3298-3312 [doi]
- FutORAMa: A Concretely Efficient Hierarchical Oblivious RAMGilad Asharov, Ilan Komargodski, Yehuda Michelson. 3313-3327 [doi]
- Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman NetworksSajin Sasy, Aaron Johnson 0001, Ian Goldberg. 3328-3342 [doi]
- General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing ApplicationsDavid Klein, Benny Rolle, Thomas Barber, Manuel Karl, Martin Johns. 3343-3357 [doi]
- Control, Confidentiality, and the Right to be ForgottenAloni Cohen, Adam D. Smith, Marika Swanberg, Prashant Nalini Vasudevan. 3358-3372 [doi]
- PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy PoliciesAnhao Xiang, Weiping Pei, Chuan Yue. 3373-3387 [doi]
- Speranza: Usable, Privacy-friendly Software SigningKelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen R. Sollins. 3388-3402 [doi]
- Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image ModelsYiting Qu, Xinyue Shen, Xinlei He, Michael Backes 0001, Savvas Zannettou, Yang Zhang 0016. 3403-3417 [doi]
- DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation ModelsZeyang Sha, Zheng Li, Ning Yu, Yang Zhang 0016. 3418-3432 [doi]
- "Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesDaniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin R. B. Butler, Patrick Traynor. 3433-3459 [doi]
- Unhelpful Assumptions in Software Security ResearchIta Ryan, Utz Roedig, Klaas-Jan Stol. 3460-3474 [doi]
- Read Between the Lines: Detecting Tracking JavaScript with Bytecode ClassificationMohammad Ghasemisharif, Jason Polakis. 3475-3489 [doi]
- CookieGraph: Understanding and Detecting First-Party Tracking CookiesShaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso. 3490-3504 [doi]
- AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker BlockingChangmin Lee, Sooel Son. 3505-3518 [doi]
- Poster: Using CodeQL to Detect Malware in npmMatías F. Gobbi, Johannes Kinder. 3519-3521 [doi]
- Poster: Data Minimization by Construction for Trigger-Action ApplicationsMohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld. 3522-3524 [doi]
- Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption EvaluationSylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux. 3525-3527 [doi]
- Poster: Circumventing the GFW with TLS Record FragmentationNiklas Niere, Sven Hebrok, Juraj Somorovsky, Robert Merget. 3528-3530 [doi]
- Poster: Generating Experiences for Autonomous Network DefenseAndres Molina-Markham, Luis F. Robaina, Akash H. Trivedi, Derek G. Tsui, Ahmad Ridley. 3531-3533 [doi]
- Poster: From Hashes to Ashes - A Comparison of Transcription ServicesRudolf Siegel, Rafael Mrowczynski, Maria Hellenthal, Michael Schilling 0001. 3534-3536 [doi]
- Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability DescriptionHattan Althebeiti, Brett Fazio, William Chen, David Mohaisen. 3537-3539 [doi]
- Poster: Boosting Adversarial Robustness by Adversarial Pre-trainingXiaoyun Xu, Stjepan Picek. 3540-3542 [doi]
- Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset GenerationChristian van Sloun, Klaus Wehrle. 3543-3545 [doi]
- Poster: Computing the Persistent Homology of Encrypted DataDominic Gold, Koray Karabina, Francis C. Motta. 3546-3548 [doi]
- Poster: Attestor - Simple Proof-of-Storage-TimeArup Mondal. 3549-3551 [doi]
- Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement LearningXianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang. 3552-3554 [doi]
- Poster: Membership Inference Attacks via Contrastive LearningDepeng Chen, Xiao Liu, Jie Cui 0004, Hong Zhong 0001. 3555-3557 [doi]
- Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data PerspectiveKevin Li, Zhaohui Wang, Ye Wang, Bo Luo, FengJun Li. 3558-3560 [doi]
- Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active LearningShae McFadden, Zeliang Kan, Lorenzo Cavallaro, Fabio Pierazzi. 3561-3563 [doi]
- Poster: Combining Fuzzing with Concolic Execution for IoT Firmware TestingJihyeon Yu, Juhwan Kim, Yeohoon Yun, Joobeom Yun. 3564-3566 [doi]
- Poster: Efficient AES-GCM Decryption Under Homomorphic EncryptionEhud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu. 3567-3569 [doi]
- Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural NetworksJing Xu, Stjepan Picek. 3570-3572 [doi]
- Poster: Longitudinal Analysis of DoS AttacksFabian Kaiser, Haya Schulmann, Michael Waidner. 3573-3575 [doi]
- Poster: The Risk of Insufficient Isolation of Database Transactions in Web ApplicationsSimon Koch, Malte Wessels, David Klein, Martin Johns. 3576-3578 [doi]
- Poster: Privacy Risks from Misconfigured Android Content ProvidersChristopher Lenk, Johannes Kinder. 3579-3581 [doi]
- Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data EcosystemsJohannes Lohmöller, Eduard Vlad, Markus Dahlmanns, Klaus Wehrle. 3582-3584 [doi]
- Poster: Panacea - Stateless and Non-Interactive Oblivious RAMKelong Cong, Debajyoti Das 0001, Georgio Nicolas, Jeongeun Park 0001. 3585-3587 [doi]
- Poster: Backdoor Attack on Extreme Learning MachinesBehrad Tajalli, Gorka Abad, Stjepan Picek. 3588-3590 [doi]
- Poster: Accountable Processing of Reported Street ProblemsRoman Matzutt, Jan Pennekamp, Klaus Wehrle. 3591-3593 [doi]
- Poster: WIP: Account ZK-Rollups from Sumcheck ArgumentsRex Fernando, Arnab Roy. 3594-3596 [doi]
- Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based SignaturesMario Yaksetig, Alexander Havlin. 3597-3599 [doi]
- Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label EcosystemDavid G. Balash, Mir Masood Ali, Monica Kodwani, Xiaoyuan Wu, Chris Kanich, Adam J. Aviv. 3600-3602 [doi]
- Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted EmailsEric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray. 3603-3605 [doi]
- Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert HandlingWyatt Sweat, Danfeng (Daphne) Yao. 3606-3608 [doi]
- Poster: Towards Lightweight TEE-Assisted MPCWentao Dong, Cong Wang. 3609-3611 [doi]
- Poster: Fooling XAI with Explanation-Aware BackdoorsMaximilian Noppel, Christian Wressnegger. 3612-3614 [doi]
- Poster: Metadata-private Messaging without CoordinationPeipei Jiang 0002, Qian Wang, Yihao Wu, Cong Wang. 3615-3617 [doi]
- Poster: Control-Flow Integrity in Low-end Embedded DevicesSashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik. 3618-3620 [doi]
- Poster: Generic Multidimensional Linear Cryptanalysis of Feistel CiphersBetül Askin Özdemir, Tim Beyne. 3621-3623 [doi]
- Poster: Secure and Differentially Private kth Ranked ElementGowri R. Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider 0003. 3624-3626 [doi]
- Poster: Towards Practical Brainwave-based User AuthenticationMatin Fallahi, Patricia Arias Cabarcos, Thorsten Strufe. 3627-3629 [doi]
- Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned BlockchainWensheng Tian, Lei Zhang, Shuangxi Chen, Hu Wang, Xiao Luo. 3630-3632 [doi]
- Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher EducationJan-Philip van Acken, Joost F. Gadellaa, Slinger Jansen, Katsiaryna Labunets. 3633-3635 [doi]
- Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information TheoryZiming Zhao 0008, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang 0016. 3636-3638 [doi]
- Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth EstimationGyungeun Yun, Kyungho Joo, Wonsuk Choi, Dong-Hoon Lee. 3639-3641 [doi]
- Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated LearningRuei-Hau Hsu, Hsuan-Cheng Su, Yi-An Yu. 3642-3644 [doi]
- WPES '23: 22nd Workshop on Privacy in the Electronic SocietyBart P. Knijnenburg, Panagiotis Papadimitratos. 3645-3647 [doi]
- CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and PrivacyMagnus Almgren, Earlence Fernandes. 3648-3650 [doi]
- WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic CryptographyMichael Brenner 0003, Anamaria Costache, Kurt Rohloff. 3651-3652 [doi]
- MTD '23: 10th ACM Workshop on Moving Target DefenseNing Zhang, Qi Li. 3653-3654 [doi]
- SaTS'23: The 1st ACM Workshop on Secure and Trustworthy SuperappsZhiqiang Lin, Xiaojing Liao. 3655-3656 [doi]
- CCSW '23: Cloud Computing Security WorkshopFrancesco Regazzoni 0001, Apostolos P. Fournaris. 3657-3658 [doi]
- PLAS: The 18th Workshop on Programming Languages and Analysis for SecurityFraser Brown, Klaus von Gleissenthall. 3659 [doi]
- DeFi '23: Workshop on Decentralized Finance and SecurityKaihua Qin, Fan Zhang. 3660-3661 [doi]
- ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous NetworksGregory Blanc, Takeshi Takahashi 0001, Zonghua Zhang. 3662-3663 [doi]
- ASHES '23: Workshop on Attacks and Solutions in Hardware SecurityLejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair. 3664-3665 [doi]
- AISec '23: 16th ACM Workshop on Artificial Intelligence and SecurityMaura Pintor, Florian Simon Tramèr, Xinyun Chen. 3666-3668 [doi]
- Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to MLEhud Aharoni, Nir Drucker, Hayim Shaul. 3669-3670 [doi]
- SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesMarcela S. Melara, Santiago Torres-Arias, Laurent Simon. 3671-3672 [doi]
- Demo: Certified Robustness on ToolformerYue Xu, Wenjie Wang. 3673-3675 [doi]
- Demo: Data Minimization and Informed Consent in Administrative FormsNicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen. 3676-3678 [doi]
- Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep LearningYuechun Gu, Sagar Sharma, Keke Chen. 3679-3681 [doi]