Abstract is missing.
- Cryptography and Computer Security: A View From the Year 2100Dan Boneh. 1 [doi]
- Staving off the IoT ArmageddonGene Tsudik. 2-3 [doi]
- Verifiable Security Policies for Distributed SystemsFelix A. Wolf, Peter Müller 0001. 4-18 [doi]
- Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End ProcessorsHans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens. 19-33 [doi]
- Compositional Verification of Composite Byzantine ProtocolsQiyuan Zhao, George Pîrlea, Karolina Grzeszkiewicz, Seth Gilbert, Ilya Sergey. 34-48 [doi]
- Byzantine-Secure Relying Party for Resilient RPKIJens Frieß, Donika Mirdita, Haya Schulmann, Michael Waidner. 49-63 [doi]
- SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconHyerean Jang, Taehun Kim, Youngjoo Shin. 64-78 [doi]
- TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDXLuca Wilke, Florian Sieck, Thomas Eisenbarth 0001. 79-93 [doi]
- Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIsFabian Rauscher, Daniel Gruss. 94-108 [doi]
- Spec-o-Scope: Cache Probing at Cache SpeedGal Horowitz, Eyal Ronen, Yuval Yarom. 109-123 [doi]
- Training Robust ML-based Raw-Binary Malware Detectors in Hours, not MonthsKeane Lucas, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif. 124-138 [doi]
- TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph LearningMingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, Shouling Ji. 139-152 [doi]
- SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration SignaturesTianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi 0004, Yan Wang 0003, Nitesh Saxena, Yingying Chen 0001. 153-167 [doi]
- KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph DataAndy Zhou, Xiaojun Xu, Ramesh Raghunathan, Alok Lal, Xinze Guan, Bin Yu, Bo Li 0026. 168-182 [doi]
- Principled Microarchitectural Isolation on Cloud CPUsStavros Volos, Cédric Fournet, Jana Hofmann, Boris Köpf, Oleksii Oleksenko. 183-197 [doi]
- Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged SoftwareYongho Song, Byeongsu Woo, Youngkwang Han, Brent ByungHoon Kang. 198-212 [doi]
- μCFI: Formal Verification of Microarchitectural Control-flow IntegrityKatharina Ceesay-Seitz, Flavien Solt, Kaveh Razavi. 213-227 [doi]
- Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata StructureRei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu. 228-242 [doi]
- Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential PrivacyShuangqing Xu, Yifeng Zheng, Zhongyun Hua. 243-257 [doi]
- 2NeRF: Privacy-preserving Training Framework for NeRFBokang Zhang, Yanglin Zhang, Zhikun Zhang, Jinglan Yang, Lingying Huang, Junfeng Wu 0001. 258-272 [doi]
- $DPM: $ Clustering Sensitive Data through SeparationJohannes Liebenow, Yara Schütt, Tanya Braun, Marcel Gehrke, Florian Thaeter, Esfandiar Mohammadi. 273-287 [doi]
- S-BDT: Distributed Differentially Private Boosted Decision TreesThorsten Peinemann, Moritz Kirschte, Joshua Stock, Carlos Cotrini, Esfandiar Mohammadi. 288-302 [doi]
- Cross-silo Federated Learning with Record-level Personalized Differential PrivacyJunxu Liu, Jian Lou 0001, Li Xiong 0001, Jinfei Liu, Xiaofeng Meng 0001. 303-317 [doi]
- Benchmarking Secure Sampling Protocols for Differential PrivacyYucheng Fu, Tianhao Wang. 318-332 [doi]
- Smooth Sensitivity for Geo-PrivacyYuting Liang, Ke Yi 0001. 333-347 [doi]
- Metric Differential Privacy at the User-Level via the Earth-Mover's DistanceJacob Imola, Amrita Roy Chowdhury 0001, Kamalika Chaudhuri. 348-362 [doi]
- Nakamoto Consensus under Bounded Processing CapacityLucianna Kiffer, Joachim Neu, Srivatsan Sridhar, Aviv Zohar, David Tse. 363-377 [doi]
- Data Independent Order Policy Enforcement: Limitations and SolutionsSarisht Wadhwa, Luca Zanolini, Aditya Asgaonkar, Francesco D'Amato, Chengrui Fang, Fan Zhang 0022, Kartik Nayak. 378-392 [doi]
- Securing Lightning Channels against Rational MinersLukas Aumayr, Zeta Avarikioti, Matteo Maffei, Subhra Mazumdar 0001. 393-407 [doi]
- Interactive Multi-Credential AuthenticationDeepak Maram, Mahimna Kelkar, Ittay Eyal. 408-422 [doi]
- Towards Fine-Grained Webpage Fingerprinting at ScaleXiyuan Zhao, Xinhao Deng, Qi Li 0002, Yunpeng Liu, Zhuotao Liu, Kun Sun 0001, Ke Xu 0002. 423-436 [doi]
- Understanding Routing-Induced Censorship Changes GloballyAbhishek Bhaskar, Paul Pearce. 437-451 [doi]
- Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the WildYuejia Liang, Jianjun Chen 0005, Run Guo, Kaiwen Shen, Hui Jiang, Man Hou, Yue Yu, Haixin Duan. 452-466 [doi]
- Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment DetectorsJiahe Zhang, Jianjun Chen 0005, Qi Wang, Hangyu Zhang, Chuhan Wang, Jianwei Zhuge, Haixin Duan. 467-481 [doi]
- Toward Understanding the Security of Plugins in Continuous Integration ServicesXiaofan Li, Yacong Gu, Chu Qiao, Zhenkai Zhang, Daiping Liu, Lingyun Ying, Haixin Duan, Xing Gao 0001. 482-496 [doi]
- The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSECElias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner. 497-510 [doi]
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data CachePenghui Li 0001, Mingxue Zhang 0001. 511-524 [doi]
- MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-ProgramsZidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan. 525-539 [doi]
- SWIDE: A Semantic-aware Detection Engine for Successful Web Injection AttacksRonghai Yang, Xianbo Wang, Kaixuan Luo, Xin Lei, Ke Li, Jiayuan Xin, Wing Cheong Lau. 540-554 [doi]
- Stealing Trust: Unraveling Blind Message Attacks in Web3 AuthenticationKailun Yan, Xiaokuan Zhang, Wenrui Diao. 555-569 [doi]
- Test Suites Guided Vulnerability Validation for Node.js ApplicationsChanghua Luo, Penghui Li 0001, Wei Meng 0001, Chao Zhang 0008. 570-584 [doi]
- ReactAppScan: Mining React Application Vulnerabilities via Component GraphZhiyong Guo, Mingqing Kang, V. N. Venkatakrishnan, Rigel Gjomemo, Yinzhi Cao. 585-599 [doi]
- Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable ConfidenceHanbin Hong, Xinyu Zhang 0016, Binghui Wang, Zhongjie Ba, Yuan Hong. 600-614 [doi]
- Phantom: Untargeted Poisoning Attacks on Semi-Supervised LearningJonathan Knauer, Phillip Rieger, Hossein Fereidooni, Ahmad-Reza Sadeghi. 615-629 [doi]
- Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition SystemsZheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li 0002, Chao Shen 0001, Qian Wang 0002. 630-644 [doi]
- SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning SystemsOubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji. 645-659 [doi]
- Optimization-based Prompt Injection Attack to LLM-as-a-JudgeJiawen Shi, Zenghui Yuan, Yinuo Liu, Yue Huang, Pan Zhou 0001, Lichao Sun 0001, Neil Zhenqiang Gong. 660-674 [doi]
- Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited DataYifan Lu, Wenxuan Li, Mi Zhang 0001, Xudong Pan, Min Yang 0002. 675-689 [doi]
- DarthShader: Fuzzing WebGPU Shader Translators & CompilersLukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz. 690-704 [doi]
- OSmart: Whitebox Program Option FuzzingKelin Wang, Mengda Chen, Liang He 0011, Purui Su, Yan Cai 0001, Jiongyi Chen, Bin Zhang, Chao Feng, Chaojing Tang. 705-719 [doi]
- Program Environment FuzzingRuijie Meng, Gregory J. Duck, Abhik Roychoudhury. 720-734 [doi]
- ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language ModelDawei Wang, Geng Zhou, Li Chen 0008, Dan Li 0001, Yukai Miao. 735-749 [doi]
- No Peer, no Cry: Network Application Fuzzing via Fault InjectionNils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz. 750-764 [doi]
- FOX: Coverage-guided Fuzzing as Online Stochastic ControlDongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana. 765-779 [doi]
- Leakage-Resilient Circuit GarblingRuiyang Li, Yiteng Sun, Chun Guo 0002, François-Xavier Standaert, Weijia Wang 0003, Xiao Wang 0012. 780-794 [doi]
- Secure Multiparty Computation with Lazy SharingShuaishuai Li, Cong Zhang, Dongdai Lin. 795-809 [doi]
- Coral: Maliciously Secure Computation Framework for Packed and Mixed CircuitsZhicong Huang, Wen-Jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, Wenguang Chen. 810-824 [doi]
- k Without Ring ExtensionsYun Li, Daniel Escudero 0001, Yufei Duan, Zhicong Huang, Cheng Hong, Chao Zhang, Yifan Song. 825-839 [doi]
- Secret Sharing with SnitchingStefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk. 840-853 [doi]
- Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic DatabasesPeizhao Zhou, Xiaojie Guo 0004, Pinzhi Chen, Tong Li 0011, Siyi Lv, Zheli Liu. 854-868 [doi]
- Dora: A Simple Approach to Zero-Knowledge for RAM ProgramsAarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk. 869-883 [doi]
- Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKsChaya Ganesh, Vineet Nair, Ashish Sharma. 884-898 [doi]
- Direct Range Proofs for Paillier Cryptosystem and Their ApplicationsZhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu. 899-913 [doi]
- Conan: Distributed Proofs of Compliance for Anonymous Data CollectionMingxun Zhou, Giulia Fanti, Elaine Shi. 914-928 [doi]
- Hekaton: Horizontally-Scalable zkSNARKs Via Proof AggregationMichael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra. 929-940 [doi]
- GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication ComplexityRenas Bacho, Christoph Lenzen 0001, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis. 941-955 [doi]
- TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph LearningCong Wu 0003, Jing Chen 0003, Ziming Zhao 0001, Kun He 0008, Guowen Xu, Yueming Wu 0001, Haijun Wang, Hongwei Li 0001, Yang Liu 0003, Yang Xiang 0001. 956-970 [doi]
- fAmulet: Finding Finalization Failure Bugs in Polygon zkRollupZihao Li 0001, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen 0002. 971-985 [doi]
- Characterizing Ethereum Address Poisoning AttackShixuan Guan, Kai Li 0017. 986-1000 [doi]
- FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi ProtocolsHongbo Wen, Hanzhi Liu, Jiaxin Song, Yanju Chen, Wenbo Guo 0002, Yu Feng 0001. 1001-1015 [doi]
- Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource ModelsFeng Luo, Huangkun Lin, Zihao Li 0001, Xiapu Luo, Ruijie Luo, Zheyuan He, Shuwei Song, Ting Chen 0002, Wenxuan Luo. 1016-1030 [doi]
- Blockchain Bribing Attacks and the Efficacy of CounterincentivesDimitris Karakostas, Aggelos Kiayias, Thomas Zacharias 0001. 1031-1045 [doi]
- Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based ProtocolsCas Cremers, Alexander Dax, Niklas Medinger. 1046-1060 [doi]
- SECOMP: Formally Secure Compilation of Compartmentalized C ProgramsJérémy Thibault, Roberto Blanco, Dongjae Lee, Sven Argo, Arthur Azevedo de Amorim, Aïna Linn Georges, Catalin Hritcu, Andrew Tolmach. 1061-1075 [doi]
- Testing Side-channel Security of Cryptographic Implementations against Future MicroarchitecturesGilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom. 1076-1090 [doi]
- On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead)Davide Davoli 0001, Martin Avanzini, Tamara Rezk. 1091-1105 [doi]
- The Privacy-Utility Trade-off in the Topics APIMário S. Alvim, Natasha Fernandes, Annabelle McIver, Gabriel H. Nunes. 1106-1120 [doi]
- Specification and Verification of Strong Timing Isolation of Hardware EnclavesStella Lau, Thomas Bourgeat, Clément Pit-Claudel, Adam Chlipala. 1121-1135 [doi]
- A Causal Explainable Guardrails for Large Language ModelsZhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang 0001, Zhan Qin, Kui Ren 0001. 1136-1150 [doi]
- Legilimens: Practical and Unified Content Moderation for Large Language Model ServicesJialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu 0001. 1151-1165 [doi]
- SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via SubstitutionZhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng 0007, Qinglong Wang, Zhan Qin, Zhibo Wang 0001, Kui Ren 0001. 1166-1180 [doi]
- Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based PoliciesPeiran Wang, Qiyu Li, Longxuan Yu, Ziyao Wang, Ang Li 0005, Haojian Jin. 1181-1195 [doi]
- GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language ModelsKunsheng Tang, Wenbo Zhou, Jie Zhang 0073, Aishan Liu, Gelei Deng, Shuai Li, Peigui Qi, Weiming Zhang 0001, Tianwei Zhang 0004, Nenghai Yu. 1196-1210 [doi]
- Understanding Implosion in Text-to-Image Generative ModelsWenxin Ding, Cathy Y. Li, Shawn Shan, Ben Y. Zhao, Hai-Tao Zheng 0002. 1211-1225 [doi]
- Is Difficulty Calibration All We Need? Towards More Practical Membership Inference AttacksYu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang 0006, Hongxin Hu, Xingyu Zhao. 1226-1240 [doi]
- A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware CapabilityJie Zhu, Jirong Zha, Ding Li 0001, Leye Wang. 1241-1255 [doi]
- Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the DefenseQiankun Zhang, Di Yuan, Boyu Zhang, Bin Yuan, Bingqian Du. 1256-1270 [doi]
- Evaluations of Machine Learning Privacy Defenses are MisleadingMichael Aerni, Jie Zhang, Florian Tramèr. 1271-1284 [doi]
- The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy RisksXiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, Zhikun Zhang, Xiaofeng Wang, Haixu Tang. 1285-1299 [doi]
- A General Framework for Data-Use Auditing of ML ModelsZonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter. 1300-1314 [doi]
- CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux KernelShuangpeng Bai, Zhechang Zhang, Hong Hu 0004. 1315-1329 [doi]
- Top of the Heap: Efficient Memory Error Protection of Safe Heap ObjectsKaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger. 1330-1344 [doi]
- Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection KeysMarius Momeu, Simon Schnückel, Kai Angnis, Michalis Polychronakis, Vasileios P. Kemerlis. 1345-1359 [doi]
- The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization ImplementationsLorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, Mario Polino. 1360-1374 [doi]
- SeMalloc: Semantics-Informed Memory AllocatorRuizhe Wang, Meng Xu, N. Asokan. 1375-1389 [doi]
- Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential ContainersEnriquillo Valdez, Salman Ahmed 0001, Zhongshu Gu, Christophe de Dinechin, Pau-Chen Cheng, Hani Jamjoom. 1390-1404 [doi]
- Faster FHE-Based Single-Server Private Information RetrievalMing Luo, Feng-Hao Liu, Han Wang. 1405-1419 [doi]
- Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy SubsetsLing Ren 0001, Muhammad Haris Mughees, I Sun. 1420-1433 [doi]
- Unbalanced Private Set Union with Reduced Computation and CommunicationCong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang. 1434-1447 [doi]
- ThorPIR: Single Server PIR via Homomorphic Thorp ShufflesBen Fisch, Arthur Lazzaretti, Zeyu Liu 0004, Charalampos Papamanthou. 1448-1462 [doi]
- Respire: High-Rate PIR for Databases with Small RecordsAlexander Burton, Samir Jordan Menon, David J. Wu 0001. 1463-1477 [doi]
- Actively Secure Private Set Intersection in the Client-Server SettingYunqing Sun, Jonathan Katz, Mariana Raykova 0001, Phillipp Schoppmann, Xiao Wang 0012. 1478-1492 [doi]
- Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based PaymentsNikhil Vanjani, Pratik Soni, Sri Aravinda Krishnan Thyagarajan. 1493-1507 [doi]
- Blind Multisignatures for Anonymous Tokens with Decentralized IssuanceIoanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss. 1508-1522 [doi]
- Practical Post-Quantum Signatures for PrivacySven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders. 1523-1537 [doi]
- Reckle Trees: Updatable Merkle Batch Proofs with ApplicationsCharalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac. 1538-1551 [doi]
- Provable Security for PKI SchemesSara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg. 1552-1566 [doi]
- Fast Two-party Threshold ECDSA with Proactive SecurityBrian Koziel, S. Dov Gordon, Craig Gentry. 1567-1580 [doi]
- Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile AppsShuai Li 0006, Zhemin Yang, Yuhong Nan, Shutian Yu, Qirui Zhu, Min Yang 0002. 1581-1595 [doi]
- Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on UtilityGeorgi Ganev, Kai Xu, Emiliano De Cristofaro. 1596-1610 [doi]
- A Qualitative Analysis of Practical De-Identification GuidesWentao Guo, Aditya Kishore, Adam J. Aviv, Michelle L. Mazurek. 1611-1625 [doi]
- A First Look at Security and Privacy Risks in the RapidAPI EcosystemSong Liao, Long Cheng 0005, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu. 1626-1640 [doi]
- Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure GuidelinesYue Xiao, Chaoqi Zhang 0006, Yue Qin, Fares Fahad S. Alharbi, Luyi Xing, Xiaojing Liao. 1641-1655 [doi]
- Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition PracticesEaston Kelso, Ananta Soneji, Sazzadur Rahaman, Yan Shoshitaishvili, Rakibul Hasan. 1656-1670 [doi]
- "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language ModelsXinyue Shen, Zeyuan Chen, Michael Backes 0001, Yun Shen, Yang Zhang 0016. 1671-1685 [doi]
- Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display AuthenticatorsAhmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena. 1686-1700 [doi]
- The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security ProtocolsJeffrey Knockel, Mona Wang, Zoë Reichert. 1701-1715 [doi]
- Demystifying RCE Vulnerabilities in LLM-Integrated AppsTong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen 0012. 1716-1730 [doi]
- GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR DevicesHanqiu Wang, Zihao Zhan, Haoqi Shan, Siqi Dai, Maximillian Panoff, Shuo Wang 0003. 1731-1745 [doi]
- VPVet: Vetting Privacy Policies of Virtual Reality AppsYuxia Zhan, Yan Meng 0001, Lu Zhou, Yichang Xiong, Xiaokuan Zhang, Lichuan Ma, Guoxing Chen, Qingqi Pei, Haojin Zhu. 1746-1760 [doi]
- Collapse Like A House of Cards: Hacking Building Automation System Through FuzzingYue Zhang 0025, Zhen Ling, Michael Cash, Qiguang Zhang, Christopher Morales-Gonzalez, Qun Zhou Sun, Xinwen Fu. 1761-1775 [doi]
- Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5HzQingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma 0001. 1776-1790 [doi]
- CAPSID: A Private Session ID System for Small UAVsYueshen Li, Jianli Jin, Kirill Levchenko. 1791-1805 [doi]
- MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data BreachYihui Yan, Zhice Yang. 1806-1818 [doi]
- Precio: Private Aggregate Measurement via Oblivious ShufflingErik Anderson, Melissa Chase, F. Betül Durak, Kim Laine, Chenkai Weng. 1819-1833 [doi]
- Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable EncryptionHanshen Xiao, G. Edward Suh, Srinivas Devadas. 1834-1848 [doi]
- SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical AttacksPritam Dash, Ethan Chan, Karthik Pattabiraman. 1849-1863 [doi]
- VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in PracticeXingshuo Han, Haozhao Wang, Kangqiao Zhao, Gelei Deng, Yuan Xu, Hangcheng Liu, Han Qiu 0001, Tianwei Zhang 0004. 1864-1878 [doi]
- PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal ConsistencyYuan Xu, Gelei Deng, Xingshuo Han, Guanlin Li, Han Qiu 0001, Tianwei Zhang 0004. 1879-1893 [doi]
- ERACAN: Defending Against an Emerging CAN Threat ModelZhaozhou Tang, Khaled Serag, Saman A. Zonouz, Z. Berkay Celik, Dongyan Xu, Raheem Beyah. 1894-1908 [doi]
- Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy BudgetJiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin I. P. Rubinstein, Yuval Yarom, Olga Ohrimenko. 1909-1923 [doi]
- ProBE: Proportioning Privacy Budget for Complex Exploratory Decision SupportNada Lahjouji, Sameera Ghayyur, Xi He 0001, Sharad Mehrotra. 1924-1938 [doi]
- Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential PrivacyWei Dong 0007, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi 0001. 1939-1953 [doi]
- Securing Floating-Point Arithmetic for Noise AdditionNaoise Holohan, Stefano Braghin, Mohamed Suliman 0002. 1954-1966 [doi]
- Distributed PIR: Scaling Private Messaging via the Users' MachinesElkana Tovey, Jonathan Weiss, Yossi Gilad. 1967-1981 [doi]
- Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted ProtocolsEllis Fenske, Aaron Johnson 0001. 1982-1996 [doi]
- Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution AnalysisXinhao Deng, Qi Li 0002, Ke Xu 0002. 1997-2011 [doi]
- HomeRun: High-efficiency Oblivious Message Retrieval, UnrestrictedYanxue Jia, Varun Madathil, Aniket Kate. 2012-2026 [doi]
- RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core InterfacesNathaniel Bennett, Weidong Zhu 0002, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, Kevin R. B. Butler. 2027-2041 [doi]
- Jäger: Automated Telephone Call TracebackDavid Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro. 2042-2056 [doi]
- Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network OperatorRabiah Alnashwan, Yang Yang, Yilu Dong, Prosanta Gope, Behzad Abdolmaleki, Syed Rafiul Hussain. 2057-2071 [doi]
- Untangling the Knot: Breaking Access Control in Home Wireless Mesh NetworksXin'an Zhou, Qing Deng, Juefei Pu, Keyu Man, Zhiyun Qian, Srikanth V. Krishnamurthy. 2072-2086 [doi]
- BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low EnergyXijia Che, Yi He, Xuewei Feng, Kun Sun 0001, Ke Xu 0002, Qi Li 0002. 2087-2101 [doi]
- State Machine Mutation-based Testing Framework for Wireless Communication ProtocolsSyed Md. Mukit Rashid, Tianwei Wu, Kai Tu, Abdullah Al Ishtiaq, Ridwanul Hasan Tanvir, Yilu Dong, Omar Chowdhury, Syed Rafiul Hussain. 2102-2116 [doi]
- Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and InteractionsShubham Agarwal, Aurore Fass, Ben Stock. 2117-2131 [doi]
- Understanding Cross-Platform Referral Traffic for Illicit Drug PromotionMingming Zha, Zilong Lin 0001, Siyuan Tang, Xiaojing Liao, Yuhong Nan, Xiaofeng Wang 0001. 2132-2146 [doi]
- Characterizing and Mitigating Phishing Attacks at ccTLD ScaleGiovane C. M. Moura, Thomas Daniels 0002, Maarten Bosteels, Sebastian Castro, Moritz Müller, Thymen Wabeke, Thijs van Den Hout, Maciej Korczynski, Georgios Smaragdakis. 2147-2161 [doi]
- The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's PerspectiveAndrea Mengascini, Ryan Aurelio, Giancarlo Pellegrino. 2162-2176 [doi]
- Blocking Tracking JavaScript at the Function GranularityAbdul Haddi Amjad, Shaoor Munir, Zubair Shafiq, Muhammad Ali Gulzar. 2177-2191 [doi]
- Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesMir Masood Ali, Peter Snyder, Chris Kanich, Hamed Haddadi. 2192-2206 [doi]
- ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive LearningHuiyu Xu, Yaopeng Wang, Zhibo Wang 0001, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren 0001. 2207-2221 [doi]
- Trident of Poseidon: A Generalized Approach for Detecting Deepfake VoicesThien-Phuc Doan, Hung Dinh-Xuan, Taewon Ryu, Inho Kim, Woongjae Lee, Kihun Hong, Souhwan Jung. 2222-2235 [doi]
- On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic WritingZeyan Liu, Zijun Yao 0001, FengJun Li, Bo Luo. 2236-2250 [doi]
- MGTBench: Benchmarking Machine-Generated Text DetectionXinlei He 0001, Xinyue Shen, Zeyuan Chen, Michael Backes 0001, Yang Zhang 0016. 2251-2265 [doi]
- PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs)Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan. 2266-2280 [doi]
- Dye4AI: Assuring Data Boundary on Generative AI ServicesShu Wang 0004, Kun Sun 0001, Yan Zhai. 2281-2295 [doi]
- Rust for Embedded Systems: Current State and Open ProblemsAyushi Sharma, Shashank Sharma, Sai Ritvik Tanksalkar, Santiago Torres-Arias, Aravind Machiry. 2296-2310 [doi]
- BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface LayerWenqiang Li, Haohuang Wen, Zhiqiang Lin 0001. 2311-2325 [doi]
- CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial EnvironmentsShenao Wang 0001, Feng Dong 0008, Hangfeng Yang, Jingheng Xu, Haoyu Wang 0001. 2326-2340 [doi]
- RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT DevicesKaizheng Liu, Ming Yang 0001, Zhen Ling, Yue Zhang 0025, Chongqing Lei, Junzhou Luo, Xinwen Fu. 2341-2354 [doi]
- OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT FirmwareAbdullah Qasem, Mourad Debbabi, Andrei Soeanu. 2355-2369 [doi]
- AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded DevicesMohsen Salehi, Karthik Pattabiraman. 2370-2384 [doi]
- Obfuscated Key ExchangeFelix Günther 0001, Douglas Stebila, Shannon Veitch. 2385-2399 [doi]
- Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive UsersCéline Chevalier, Guirec Lebrun, Ange Martinelli, Abdul Rahman Taleb. 2400-2414 [doi]
- Complete Knowledge: Preventing Encumbrance of Cryptographic SecretsMahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels. 2415-2429 [doi]
- The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-TransformJulius Hermelink, Kai-Chun Ning, Richard Petri 0001, Emanuele Strieder. 2430-2444 [doi]
- Password-Protected Key Retrieval with(out) HSM ProtectionSebastian H. Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann. 2445-2459 [doi]
- Non-Transferable Anonymous Tokens by Secret BindingF. Betül Durak, Laurane Marco, Abdullah Talayhan, Serge Vaudenay. 2460-2474 [doi]
- DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional ManipulationWenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing. 2475-2489 [doi]
- Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party InferenceJiaxing He, Kang Yang, GuoFeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, Wei Wang. 2490-2504 [doi]
- D Security of Exact FHE SchemesJung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, Elias Suvanto. 2505-2519 [doi]
- VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic EncryptionSylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux. 2520-2534 [doi]
- Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKSJaehyung Kim 0002, Jinyeong Seo, Yongsoo Song. 2535-2546 [doi]
- New Secret Keys for Enhanced Performance in (T)FHELoris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Adeline Roux-Langlois, Samuel Tap. 2547-2561 [doi]
- Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning NetworkBen Weintraub, Satwik Prabhu Kumble, Cristina Nita-Rotaru, Stefanie Roos. 2562-2576 [doi]
- DoubleUp Roll: Double-spending in Arbitrum by Rolling It BackZhiyuan Sun, Zihao Li 0001, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou 0009, Yinqian Zhang. 2577-2590 [doi]
- Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 RollupsChristof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde. 2591-2605 [doi]
- Sui Lutris: A Blockchain Combining Broadcast and ConsensusSam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon Williams, Lu Zhang. 2606-2620 [doi]
- without Threshold CryptographyAkhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter. 2621-2635 [doi]
- Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands CheckpointingHanwen Feng 0001, Tiancheng Mai, Qiang Tang 0005. 2636-2650 [doi]
- Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game DevelopmentPhilip Klostermeyer, Sabrina Amft, Sandra Höltervennhoff, Alexander Krause, Niklas Busch, Sascha Fahl. 2651-2665 [doi]
- Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' PromisesJonas Hielscher, Markus Schöps, Jens Opdenbusch, Felix Reichmann, Marco Gutfleisch, Karola Marky, Simon Parkin. 2666-2680 [doi]
- "Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring EvasionLucy Simko, Adryana Hutchinson, Alvin Isaac, Evan Fries, Micah Sherr, Adam J. Aviv. 2681-2695 [doi]
- "Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake DetectorsKevin Warren, Tyler Tucker, Anna Crowder, Daniel Olszewski, Allison Lu, Caroline Fedele, Magdalena Pasternak, Seth Layton, Kevin R. B. Butler, Carrie Gates, Patrick Traynor. 2696-2710 [doi]
- Understanding Legal Professionals' Practices and Expectations in Data Breach Incident ReportingEce Gumusel, Yue Xiao, Yue Qin, Jiaxin Qin, Xiaojing Liao. 2711-2725 [doi]
- Using AI Assistants in Software Development: A Qualitative Study on Security Practices and ConcernsJan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl. 2726-2740 [doi]
- SpecMon: Modular Black-Box Runtime Monitoring of Security ProtocolsKevin Morio, Robert Künnemann. 2741-2755 [doi]
- SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural SecurityAdwait Godbole, Yatin A. Manerkar, Sanjit A. Seshia. 2756-2770 [doi]
- Block Ciphers in Idealized Models: Automated Proofs and New Security ResultsMiguel Ambrona, Pooya Farshim, Patrick Harasser. 2771-2785 [doi]
- Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized AssemblyFreek Verbeek, Nico Naus, Binoy Ravindran. 2786-2798 [doi]
- Gaussian Elimination of Side-Channels: Linear Algebra for Memory ColoringJana Hofmann, Cédric Fournet, Boris Köpf, Stavros Volos. 2799-2813 [doi]
- Foundations for Cryptographic Reductions in CCSA LogicsDavid Baelde, Adrien Koutsos, Justine Sauvage. 2814-2828 [doi]
- Distributed Backdoor Attacks on Federated Graph Learning and Certified DefensesYuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang. 2829-2843 [doi]
- Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated LearningYufei Zhou, Peijia Zheng, Xiaochun Cao, Jiwu Huang. 2844-2858 [doi]
- Samplable Anonymous Aggregation for Private Federated Data AnalysisKunal Talwar, Shan Wang, Audra McMillan, Vitaly Feldman, Pansy Bansal, Bailey Basile, Áine Cahill, Yi-Sheng Chan, Mike Chatzidakis, Junye Chen, Oliver R. A. Chick, Mona Chitnis, Suman Ganta, Yusuf Goren, Filip Granqvist, Kristine Guo, Frederic Jacobs, Omid Javidbakht, Albert Liu, Richard Low, Dan Mascenik, Steve Myers, David Park, Wonhee Park, Gianni Parsa, Tommy Pauly, Christian Priebe, Rehan Rishi, Guy N. Rothblum, Congzheng Song, Linmao Song, Karl Tarbe, Sebastian Vogt, Shundong Zhou, Vojta Jina, Michael Scaria, Luke Winstrom. 2859-2873 [doi]
- Byzantine-Robust Decentralized Federated LearningMinghong Fang, Zifan Zhang, Hairi, Prashant Khanduri, Jia Liu 0002, Songtao Lu, Yuchen Liu 0001, Neil Gong 0001. 2874-2888 [doi]
- Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated RecommendationYurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang 0012. 2889-2903 [doi]
- Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced AttackGuanzhong Chen, Zhenghan Qin, Mingxin Yang, Yajie Zhou, Tao Fan, Tianyu Du, Zenglin Xu. 2904-2918 [doi]
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on LinuxJuhee Kim, Jinbum Park, Yoochan Lee, Chengyu Song, Taesoo Kim, Byoungyoung Lee. 2919-2933 [doi]
- Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed ApplicationsYongheng Huang, Chenghang Shi, Jie Lu 0009, Haofeng Li, Haining Meng, Lian Li 0002. 2934-2948 [doi]
- AuthSaber: Automated Safety Verification of OpenID Connect ProgramsTamjid Al Rahat, Yu Feng 0001, Yuan Tian 0001. 2949-2962 [doi]
- Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security ImplicationsTong Zhu, Chaofan Shou, Zhen Huang, Guoxing Chen, Xiaokuan Zhang, Yan Meng 0001, Shuang Hao 0001, Haojin Zhu. 2963-2977 [doi]
- Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go EcosystemYuexi Zhang, Bingyu Li, Jingqiang Lin, Linghui Li, Jiaju Bai, Shijie Jia 0001, Qianhong Wu. 2978-2992 [doi]
- uMMU: Securing Data Confidentiality with Unobservable Memory SubsystemHajeong Lim, Jaeyoon Kim, Hojoon Lee 0001. 2993-3007 [doi]
- Secure Parallel Computation with Oblivious State TransitionsNuttapong Attrapadung, Kota Isayama, Kunihiko Sadakane, Kazunari Tozawa. 3008-3022 [doi]
- Secure Sorting and Selection via Function Secret SharingAmit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta 0001, Yuval Ishai, Mahimna Kelkar, Yiping Ma 0001. 3023-3037 [doi]
- Helium: Scalable MPC among Lightweight Participants and under ChurnChristian Mouchet, Sylvain Chatel, Apostolos Pyrgelis, Carmela Troncoso. 3038-3052 [doi]
- Practical Key-Extraction Attacks in Leading MPC WalletsNikolaos Makriyannis, Oren Yomtov, Arik Galansky. 3053-3064 [doi]
- Efficient Secret Sharing for Large-Scale ApplicationsSarvar Patel, Giuseppe Persiano, Joon Young Seo, Kevin Yeo. 3065-3079 [doi]
- Oblivious Single Access Machines - A New Model for Oblivious ComputationAnanya Appan, David Heath, Ling Ren 0001. 3080-3094 [doi]
- Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated InstructionYibin Yang 0001, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam. 3095-3109 [doi]
- Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision TreesChristodoulos Pappas, Dimitrios Papadopoulos 0001. 3110-3124 [doi]
- The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe PrivacyVadim Lyubashevsky, Gregor Seiler, Patrick Steuer. 3125-3137 [doi]
- Real-World Universal zkSNARKs are Non-MalleableAntonio Faonio, Dario Fiore 0001, Luigi Russo 0001. 3138-3151 [doi]
- A Succinct Range Proof for Polynomial-based Vector CommitmentRui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang. 3152-3166 [doi]
- LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from LatticesRon Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao. 3167-3181 [doi]
- zkLogin: Privacy-Preserving Blockchain Authentication with Existing CredentialsFoteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji 0001, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy 0001, Mahdi Sedaghat, Joy Wang. 3182-3196 [doi]
- Derecho: Privacy Pools with Proof-Carrying DisclosuresJosh Beal, Ben Fisch. 3197-3211 [doi]
- Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact DiscoveryNicolas Mohnblatt, Alberto Sonnino, Kobi Gurkan, Philipp Jovanovic. 3212-3226 [doi]
- Atomic and Fair Data Exchange via BlockchainErtem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko. 3227-3241 [doi]
- Asynchronous Consensus without Trusted Setup or Public-Key CryptographySourav Das 0001, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren 0001, Victor Shoup. 3242-3256 [doi]
- Asynchronous AuthenticationMarwa Mouallem, Ittay Eyal. 3257-3271 [doi]
- PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output DeliveryChenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, Haibin Zhang. 3272-3286 [doi]
- A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite ModemsLingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, Bo Luo. 3287-3301 [doi]
- GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic RadiationsYue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin 0001, Yu Liu 0021, Huadi Zhu, Ming Li 0006. 3302-3316 [doi]
- Accurate and Efficient Recurring Vulnerability Detection for IoT FirmwareHaoyu Xiao, Yuan Zhang 0009, Minghang Shen, Chaoyang Lin, Can Zhang, Shengli Liu 0003, Min Yang 0002. 3317-3331 [doi]
- RISiren: Wireless Sensing System Attacks via MetasurfaceChenghan Jiang, Jinjiang Yang, Xinyi Li, Qi Li 0002, Xinyu Zhang 0003, Ju Ren 0001. 3332-3345 [doi]
- The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face RecognitionYe Wang, Zeyan Liu, Bo Luo, Rongqing Hui, FengJun Li. 3346-3360 [doi]
- RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound ReflectionPengHao Wang, Jingzhi Hu, Chao Liu, Jun Luo 0001. 3361-3375 [doi]
- UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS ChipsYuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen 0002, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang 0001, Ruicong Shi, Jingwei Li 0001, Yu Jiang 0001, Zhuo Su 0005. 3376-3390 [doi]
- Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse EngineeringSimon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel E. Holcomb, Christof Paar. 3391-3405 [doi]
- Glitch-Stopping Circuits: Hardware Secure Masking without RegistersZhenda Zhang, Svetla Petkova-Nikova, Ventzislav Nikov. 3406-3420 [doi]
- Whipping the Multivariate-based MAYO Signature Scheme using Hardware PlatformsFlorian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy. 3421-3435 [doi]
- CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture DefensesJianfeng Wang, Huazhong Yang, Shuwen Deng, Xueqing Li. 3436-3450 [doi]
- QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based SystemsBozhidar Stevanoski, Ana-Maria Cretu 0002, Yves-Alexandre de Montjoye. 3451-3465 [doi]
- Analyzing Inference Privacy Risks Through Gradients In Machine LearningZhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley A. Malin, Ye Wang 0001. 3466-3480 [doi]
- Membership Inference Attacks Against In-Context LearningRui Wen 0002, Zheng Li 0023, Michael Backes 0001, Yang Zhang 0016. 3481-3495 [doi]
- SeqMIA: Sequential-Metric Based Membership Inference AttackHao Li, Zheng Li 0023, Siyuan Wu, Chengrui Hu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang 0016. 3496-3510 [doi]
- PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy TrapsRuixuan Liu, Tianhao Wang, Yang Cao 0011, Li Xiong 0001. 3511-3524 [doi]
- Uncovering Gradient Inversion Risks in Practical Language Model TrainingXinguo Feng, Zhongkui Ma, Zihan Wang, Eu Joe Chegne, Mengyao Ma, Alsharif Abuadbba, Guangdong Bai. 3525-3539 [doi]
- Curator Attack: When Blackbox Differential Privacy Auditing Loses Its PowerShiming Wang, Liyao Xiang, Bowei Cheng, Zhe Ji, Tianran Sun, Xinbing Wang. 3540-3554 [doi]
- Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining ProtocolsWei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong 0002. 3555-3569 [doi]
- TabularMark: Watermarking Tabular Datasets for Machine LearningYihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren 0001, Lingyang Chu, Yang Cao 0011, Li Xiong 0001. 3570-3584 [doi]
- SafeEar: Content Privacy-Preserving Audio Deepfake DetectionXinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu. 3585-3599 [doi]
- PLeak: Prompt Leaking Attacks against Large Language Model ApplicationsBo Hui 0002, Haolin Yuan, Neil Gong 0001, Philippe Burlina, Yinzhi Cao. 3600-3614 [doi]
- A Framework for Differential Privacy Against Timing AttacksZachary Ratliff, Salil Vadhan. 3615-3629 [doi]
- Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingBen Weintraub, Jiwon Kim, Ran Tao, Cristina Nita-Rotaru, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich. 3630-3644 [doi]
- PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT NetworksZhe Ren, Xinghua Li 0001, Yinbin Miao, Mengyao Zhu, Shunjie Yuan, Robert H. Deng. 3645-3658 [doi]
- Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length PatternsChuanpu Fu, Qi Li 0002, Meng Shen 0001, Ke Xu 0002. 3659-3673 [doi]
- Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network DataRyan Pickren, Animesh Chhotaray, Frank Li, Saman A. Zonouz, Raheem Beyah. 3674-3688 [doi]
- BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse EngineeringJiayi Jiang, Xiyuan Zhang, Chengcheng Wan 0001, Haoyi Chen, Haiying Sun, Ting Su 0001. 3689-3703 [doi]
- Manipulating OpenFlow Link Discovery Packet Forwarding for Topology PoisoningMingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger. 3704-3718 [doi]
- Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust FuzzingArvind S. Raj, Wil Gibbs, Fangzhou Dong, Jayakrishna Menon Vadayath, Michael Tompkins, Steven Wirsz, Yibo Liu, Zhenghao Hu, Chang Zhu, Gokulkrishna Praveen Menon, Brendan Dolan-Gavitt, Adam Doupé, Ruoyu Wang 0001, Yan Shoshitaishvili, Tiffany Bao. 3719-3733 [doi]
- Fuzzing JavaScript Engines with a Graph-based IRHaoran Xu, Zhiyuan Jiang, Yongjun Wang, Shuhui Fan, Shenglin Xu, Peidai Xie, Shaojing Fu, Mathias Payer. 3734-3748 [doi]
- CrossFire: Fuzzing macOS Cross-XPU Memory on Apple SiliconJiaxun Zhu, Minghao Lin, Tingting Yin, Zechao Cai, Yu Wang, Rui Chang, Wenbo Shen. 3749-3762 [doi]
- Leveraging Binary Coverage for Effective Generation Guidance in Kernel FuzzingJianzhong Liu, Yuheng Shen, Yiru Xu, Yu Jiang 0001. 3763-3777 [doi]
- LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPTYutong Zhou, Fan Yang, Zirui Song, Ke Zhang, Jiongyi Chen, Kehuan Zhang. 3778-3792 [doi]
- Prompt Fuzzing for Fuzz Driver GenerationYunlong Lyu, Yuxuan Xie, Peng Chen, Hao Chen. 3793-3807 [doi]
- Alchemy: Data-Free Adversarial TrainingYijie Bai, Zhongming Ma, Yanjiao Chen, Jiangyi Deng, Shengyuan Pang, Yan Liu, Wenyuan Xu 0001. 3808-3822 [doi]
- I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object DetectorsZijin Lin, Yue Zhao 0018, Kai Chen 0012, Jinwen He. 3823-3837 [doi]
- Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision RegionsXueluan Gong, Rubin Wei, Ziyao Wang, YuChen Sun, Jiawen Peng, Yanjiao Chen, Qian Wang 0002. 3838-3852 [doi]
- PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency ReasoningZhiyuan Yu 0001, Ao Li 0006, Ruoyao Wen, Yijia Chen, Ning Zhang 0017. 3853-3867 [doi]
- AirGapAgent: Protecting Privacy-Conscious Conversational AgentsEugene Bagdasarian, Ren Yi, Sahra Ghalebikesabi, Peter Kairouz, Marco Gruteser, Sewoong Oh, Borja Balle, Daniel Ramage. 3868-3882 [doi]
- ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware ApproachYuke Hu, Jian Lou 0001, Jiaqi Liu 0003, Wangze Ni, Feng Lin 0004, Zhan Qin, Kui Ren 0001. 3883-3897 [doi]
- The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission SwitchesChuqi Zhang, Jun Zeng, Yiming Zhang, Adil Ahmad, Fengwei Zhang, Hai Jin 0001, Zhenkai Liang. 3898-3912 [doi]
- Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data DependenciesNeophytos Christou, Alexander J. Gaidis, Vaggelis Atlidakis, Vasileios P. Kemerlis. 3913-3927 [doi]
- Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential FuzzingChaoyuan Peng, Muhui Jiang, Lei Wu 0012, Yajin Zhou. 3928-3942 [doi]
- Program Ingredients Abstraction and Instantiation for Synthesis-based JVM TestingYingquan Zhao, Zan Wang, Junjie Chen 0003, Ruifeng Fu, Yanzhou Lu, Tianchang Gao, Haojie Ye. 3943-3957 [doi]
- VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement MatchingKaifeng Huang 0001, Chenhao Lu, Yiheng Cao, Bihuan Chen 0001, Xin Peng 0001. 3958-3972 [doi]
- On Understanding and Forecasting Fuzzers Performance with Static AnalysisDongjia Zhang, Andrea Fioraldi, Davide Balzarotti. 3973-3987 [doi]
- End-to-End Encrypted Cloud Storage in the Wild: A Broken EcosystemJonas Hofmann, Kien Tuong Truong. 3988-4001 [doi]
- Scalable Equi-Join Queries over Encrypted DatabaseKai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang. 4002-4016 [doi]
- Graphiti: Secure Graph Computation Made More ScalableNishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal. 4017-4031 [doi]
- CoGNN: Towards Secure and Efficient Collaborative Graph LearningZhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li 0002, Ke Xu 0002, Mingwei Xu. 4032-4046 [doi]
- PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path QueriesFrancesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia. 4047-4061 [doi]
- Secure Vickrey Auctions with Rational PartiesChaya Ganesh, Shreyas Gupta, Bhavana Kanukurthi, Girisha Shankar. 4062-4076 [doi]
- Batching-Efficient RAM using Updatable Lookup ArgumentsMoumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh. 4077-4091 [doi]
- Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted VerifiersDaniel Escudero 0001, Antigoni Polychroniadou, Yifan Song, Chenkai Weng. 4092-4106 [doi]
- Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword QueriesSofía Celi, Alex Davidson. 4107-4121 [doi]
- Computationally Secure Aggregation and Private Information Retrieval in the Shuffle ModelAdrià Gascón, Yuval Ishai, Mahimna Kelkar, Baiyu Li, Yiping Ma 0001, Mariana Raykova 0001. 4122-4136 [doi]
- Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-SharingYing Gao 0006, Yuanchao Luo, Longxin Wang, Xiang Liu, Lin Qi, Wei Wang, Mengmeng Zhou. 4137-4151 [doi]
- High-Throughput Three-Party DPFs with Applications to ORAM and Digital CurrenciesGuy Zyskind, Avishay Yanai, Alex 'Sandy' Pentland. 4152-4166 [doi]
- Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob"Katharina Schiller, Florian Adamsky, Christian Eichenmüller, Matthias Reimert, Zinaida Benenson. 4167-4181 [doi]
- Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing TrainingDaniele Lain, Tarek Jost, Sinisa Matetic, Kari Kostiainen, Srdjan Capkun. 4182-4196 [doi]
- "I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing ApplicationsKevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, Kevin R. B. Butler. 4197-4211 [doi]
- When Compiler Optimizations Meet Symbolic Execution: An Empirical StudyYue Zhang 0025, Melih Sirlanci, Ruoyu Wang 0001, Zhiqiang Lin 0001. 4212-4225 [doi]
- Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by DevelopersSébastien Andreina, Tobias Cloosters, Lucas Davi, Jens-Rene Giesen, Marco Gutfleisch, Ghassan Karame, Alena Naiakshina, Houda Naji. 4226-4240 [doi]
- Unmasking the Security and Usability of Password MaskingYuqi Hu, Suood Alroomi, Sena Sahin, Frank Li 0001. 4241-4255 [doi]
- Batch Range Proof: How to Make Threshold ECDSA More EfficientGuoFeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan. 4256-4270 [doi]
- RSA-Based Dynamic Accumulator without Hashing into PrimesVictor Youdom Kemmoe, Anna Lysyanskaya. 4271-4285 [doi]
- Non-interactive VSS using Class Groups and Application to DKGAniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan. 4286-4300 [doi]
- zkPi: Proving Lean Theorems in Zero-KnowledgeEvan Laufer, Alex Ozdemir, Dan Boneh. 4301-4315 [doi]
- Zero-Knowledge Proofs of Training for Deep Neural NetworksKasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos 0001. 4316-4330 [doi]
- Multi-User Security of CCM Authenticated Encryption ModeXiangyang Zhang, Yaobin Shen, Lei Wang. 4331-4345 [doi]
- HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side ChannelsYuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang 0011, Yinqian Zhang, Zhendong Su 0001. 4346-4360 [doi]
- NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE BootstrappingJae Hyung Ju, Jaiyoung Park, Jongmin Kim 0007, Minsik Kang, Donghwan Kim, Jung Hee Cheon, Jung Ho Ahn. 4361-4375 [doi]
- Ents: An Efficient Three-party Training Framework for Decision Trees by Communication OptimizationGuopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao 0001. 4376-4390 [doi]
- Fast and Accurate Homomorphic Softmax EvaluationWonhee Cho 0001, Guillaume Hanrot, Taeseong Kim, Minje Park, Damien Stehlé. 4391-4404 [doi]
- zkLLM: Zero Knowledge Proofs for Large Language ModelsHaochen Sun, Jason Li, Hongyang Zhang 0001. 4405-4419 [doi]
- AITIA: Efficient Secure Computation of Bivariate Causal DiscoveryTruong-Son Nguyen, Lun Wang, Evgenios M. Kornaropoulos, Ni Trieu. 4420-4434 [doi]
- Fisher Information guided Purification against Backdoor AttacksNazmul Karim, Abdullah Al Arafat, Adnan Siraj Rakin, Zhishan Guo, Nazanin Rahnavard. 4435-4449 [doi]
- BadMerging: Backdoor Attacks Against Model MergingJinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian. 4450-4464 [doi]
- Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade DefenseHua Ma, Shang Wang, Yansong Gao 0001, Zhi Zhang 0001, Huming Qiu, Minhui Xue 0001, Alsharif Abuadbba, Anmin Fu, Surya Nepal, Derek Abbott. 4465-4479 [doi]
- Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning PipelinesEugene Bagdasarian, Vitaly Shmatikov. 4480-4494 [doi]
- DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks ExecutablesZhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, Shuai Wang. 4495-4508 [doi]
- Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security ApplicationsDongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang 0001, Xingang Shi, Xia Yin, Yang Liu 0160. 4509-4523 [doi]
- Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin AwarenessHao Xiang, Zehui Cheng, Jinku Li, Jianfeng Ma 0001, Kangjie Lu. 4524-4538 [doi]
- PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell ScriptsRuijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao. 4539-4553 [doi]
- ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped BinariesDanning Xie, Zhuo Zhang 0002, Nan Jiang 0012, Xiangzhe Xu, Lin Tan 0001, Xiangyu Zhang 0001. 4554-4568 [doi]
- Manipulative Interference AttacksSamuel Mergendahl, Stephen Fickas, Boyana Norris, Richard Skowyra. 4569-4583 [doi]
- Isolate and Detect the Untrusted Driver with a Virtual BoxYonggang Li, Shunrong Jiang, Yu Bao, Pengpeng Chen, Yong Zhou, Yeh-Ching Chung. 4584-4597 [doi]
- Gramine-TDX: A Lightweight OS Kernel for Confidential VMsDmitrii Kuvaiskii, Dimitrios Stavrakakis, Kailun Qin, Cedric Xing, Pramod Bhatotia, Mona Vij. 4598-4612 [doi]
- ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic EncryptionZhou Zhang 0016, Song Bian 0001, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan. 4613-4627 [doi]
- ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear AlgebraDoreen Riepel, Marloes Venema, Tanya Verma. 4628-4642 [doi]
- Conditional Encryption with Applications to Secure Personalized Password Typo CorrectionMohammad Hassan Ameri, Jeremiah Blocki. 4643-4657 [doi]
- Practical Non-interactive Encrypted Conjunctive Search with Leakage SuppressionYunling Wang, Shi-Feng Sun 0001, Jianfeng Wang, Xiaofeng Chen 0001, Joseph K. Liu, Dawu Gu. 4658-4672 [doi]
- Securely Training Decision Trees EfficientlyDivyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta 0001. 4673-4687 [doi]
- FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard AssumptionLong Meng, Liqun Chen 0002, Yangguang Tian, Mark Manulis. 4688-4702 [doi]
- Pulsar: Secure Steganography for Diffusion ModelsTushar M. Jois, Gabrielle Beck, Gabriel Kaptchuk. 4703-4717 [doi]
- Protoss: Protocol for Tight Optimal Symmetric SecurityEmanuele Di Giandomenico, Yong Li 0021, Sven Schäge. 4718-4731 [doi]
- What Did Come Out of It? Analysis and Improvements of DIDComm MessagingChristian Badertscher, Fabio Banfi, Jesus Diaz. 4732-4746 [doi]
- On the Tight Security of the Double RatchetDaniel Collins 0001, Doreen Riepel, Si An Oliver Tran. 4747-4761 [doi]
- Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable AuthenticationMarc Fischlin, Olga Sanina. 4762-4776 [doi]
- Reconstructing with Even Less: Amplifying Leakage and Drawing GraphsEvangelia Anna Markatou, Roberto Tamassia. 4777-4791 [doi]
- Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion AttacksXinyao Ma, Chaoqi Zhang 0002, Huadi Zhu, L. Jean Camp, Ming Li, Xiaojing Liao. 4792-4806 [doi]
- SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image ModelsXinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan 0001, Yanjiao Chen, Xiaoyu Ji 0001, Wenyuan Xu 0001. 4807-4821 [doi]
- Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Hai-Tao Zheng 0002, Ben Y. Zhao. 4822-4836 [doi]
- Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model EvolutionYixin Wu, Yun Shen, Michael Backes 0001, Yang Zhang 0016. 4837-4851 [doi]
- ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation ModelsZeyang Sha, Yicong Tan, Mingjie Li, Michael Backes 0001, Yang Zhang 0016. 4852-4866 [doi]
- Blind and Low-Vision Individuals' Detection of Audio DeepfakesFilipo Sharevski, Aziz Zeidieh, Jennifer Vander Loop, Peter Jachim. 4867-4881 [doi]
- HealthSec '24: First ACM CCS Workshop on Cybersecurity in HealthcareWilliam Yurcik, Gregory Pluta, Toan Luong, Luis Garcia. 4882-4883 [doi]
- AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber DefenseNeil Gong 0001, Qi Li 0002, Xiaoli Zhang 0003. 4884-4885 [doi]
- SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy SuperappsZhiqiang Lin 0001, Luyi Xing. 4886-4887 [doi]
- LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety AnalysisBo Li 0026, Wenyuan Xu 0001, Jieshan Chen, Yang Zhang 0016, Minhui Xue 0001, Shuo Wang 0012, Guangdong Bai, Xingliang Yuan. 4888-4889 [doi]
- WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES)Erman Ayday, Jaideep Vaidya. 4893 [doi]
- RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with SecurityRuimin Sun, Mu Zhang 0001. 4894-4895 [doi]
- The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024)Lesly-Ann Daniel, Vineet Rajani. 4896-4897 [doi]
- FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software TransformationRyan Craven, Matthew S. Mickelson. 4898-4899 [doi]
- CCSW 2024 - Cloud Computing Security WorkshopApostolos Fournaris, Paolo Palmieri 0001. 4900 [doi]
- CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) AttacksSebastian Schrittwieser, Michele Ianni. 4901-4902 [doi]
- CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and PrivacyKassem Fawaz, Magnus Almgren. 4903-4904 [doi]
- AISec '24: 17th ACM Workshop on Artificial Intelligence and SecurityMaura Pintor, Matthew Jagielski, Xinyun Chen. 4905-4906 [doi]
- DeFi '24: Workshop on Decentralized Finance and SecurityLiyi Zhou, Kaihua Qin. 4907-4908 [doi]
- ASHES '24: Workshop on Attacks and Solutions in Hardware SecurityLejla Batina, Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer. 4909-4910 [doi]
- AutonomousCyber '24 - Workshop on Autonomous CybersecurityAli Dehghantanha, Reza M. Parizi, Gregory Epiphaniou. 4911-4913 [doi]
- CSCS '24 - Cyber Security in CarS WorkshopMario Fritz, Christoph Krauß, Hans-Joachim Hof. 4914-4916 [doi]
- SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem DefensesSantiago Torres-Arias, Marcela S. Melara. 4917-4918 [doi]
- Poster: Privacy Norms for Fertility Data in the Roe v. Wade eraZander Chown, Aarathi Prasad. 4919-4921 [doi]
- Poster: Kill Krill or Proxy RPKILouis Cattepoel, Donika Mirdita, Haya Schulmann, Michael Waidner. 4922-4924 [doi]
- Poster: Security of Login Interfaces in Modern OrganizationsKevin Nsieyanji Tchokodeu, Haya Schulmann, Gil Sobol, Michael Waidner. 4925-4927 [doi]
- Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications?Yuchen Ji, Ting Dai, Yutian Tang, Jingzhu He. 4928-4930 [doi]
- Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography ExtensionsThomas Szymkowiak, Endrit Isufi, Markku-Juhani O. Saarinen. 4931-4933 [doi]
- Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based DetectorWenhao Li, Duohe Ma, Zhaoxuan Li, Huaifeng Bao, Shuai Wang, Huamin Jin, Xiao-Yu Zhang. 4934-4936 [doi]
- Poster: Patching NSEC3-Encloser: The Good, the Bad, and the UglyOliver Jacobsen, Haya Schulmann. 4937-4939 [doi]
- Poster: An Exploration of Large Language Models in Malicious Source Code DetectionDi Xue, Gang Zhao, Zhongqi Fan, Wei Li, Yahong Xu, Zhen Liu, Yin Liu, Zhongliang Yuan. 4940-4942 [doi]
- Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source CodeTomasz Hyla, Natalia Wawrzyniak. 4943-4945 [doi]
- Poster: Cyber Security Economics Model (CYSEM)Tong Xin, Ying He 0004, Efpraxia D. Zamani, Cunjin Luo. 4946-4948 [doi]
- Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNsYuni Lai, Kai Zhou 0001. 4949-4951 [doi]
- Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax DisclosuresAlex Berke, Tobin South, Robert Mahari, Kent Larson, Alex Pentland. 4952-4954 [doi]
- Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data CollaborationKeiichi Ochiai, Masayuki Terada. 4955-4957 [doi]
- Poster: YFuzz: Data-Driven FuzzingYuan Chang, Chun-Chia Huang, Tatsuya Mori, Hsu-Chun Hsiao. 4958-4960 [doi]
- Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language ModelElisa Zhang, ShiYu Sun, Yunlong Xing, Kun Sun 0001. 4961-4963 [doi]
- Poster: In-switch Defense against DNS Amplification DDoS AttacksSeyed Mohammad Hadi Mirsadeghi. 4964-4966 [doi]
- Poster: A Full-stack Secure Deletion Framework for Modern Computing DevicesBo Chen 0028, Caleb Rother, Josh Dafoe. 4967-4969 [doi]
- Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-TrainingYizhi Li, Jiang Li, Jiahao Cao, Renjie Xie, Yangyang Wang 0001, Mingwei Xu. 4970-4972 [doi]
- Poster: Formally Verified Binary Lifting to P-CodeNico Naus, Freek Verbeek, Sagar Atla, Binoy Ravindran. 4973-4975 [doi]
- Poster: libdebug, Build Your Own Debugger for a Better (Hello) WorldGabriele Digregorio, Roberto Alessandro Bertolini, Francesco Panebianco, Mario Polino. 4976-4978 [doi]
- 2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK MappingQiaoran Meng, Nay Oo, Yuning Jiang, Hoon Wei Lim, Biplab Sikdar 0001. 4979-4981 [doi]
- Poster: Synchronization Concerns of DNS IntegrationsAndrew J. Kaizer, Will Naciri, Swapneel Sheth. 4982-4984 [doi]
- Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical StudySeoksu Lee, Hyeongchang Jeon, Eun-Sun Cho. 4985-4987 [doi]
- Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email ProtectionSachin Shukla, Omid Mirzaei. 4988-4990 [doi]
- Poster: Formalizing Cognitive Biases for Cybersecurity DefensesJasmine Vang, Matthew Revelle. 4991-4993 [doi]
- Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language ModelsHuan Bui, Harper Lienerth, Chenglong Fu 0002, Meera Sridhar. 4994-4996 [doi]
- Poster: Gift or Curse? Safety Slider Settings in Tor Website FingerprintingJoel Osher, James K. Holland, Nicholas Hopper. 4997-4999 [doi]
- Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural NetworksSeok-Min Hong, Beom Heyn Kim, Mohammad Mannan. 5000-5002 [doi]
- Poster: Multiparty Private Set Intersection from Multiparty Homomorphic EncryptionChristian Mouchet, Sylvain Chatel, Lea Nürnberger, Wouter Lueks. 5003-5005 [doi]
- Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption KeyJheng-Jia Huang, Guan-Yu Chen, Nai-Wei Lo. 5006-5008 [doi]
- Poster: A Multi-step Approach for Classification of Malware SamplesArnaldo Sgueglia, Rocco Addabbo, Andrea Di Sorbo, Stanislav Dashevskyi, Daniel Ricardo Dos Santos, Corrado Aaron Visaggio. 5009-5011 [doi]
- Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detectionJiawen Diao, Shengmin Zhao, Jianguo Xie, Rongna Xie, Guozhen Shi. 5012-5014 [doi]
- Poster: From Fort to Foe: The Threat of RCE in RPKIOliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner. 5015-5017 [doi]
- Poster: Unmasking Label Errors: A need for Robust Cybersecurity BenchmarksShubham Malaviya, Manish Shukla 0001, Saurabh Anand, Sachin Lodha. 5018-5020 [doi]
- Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web?Abdul Haddi Amjad, Muhammad Ali Gulzar. 5021-5023 [doi]
- Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language ModelsWanpeng Li, Yuejun Guo 0001. 5024-5026 [doi]
- Poster: Acoustic Side-Channel Attack on Robot VacuumsPeter Chen, Guannan Liu, Haining Wang 0001. 5027-5029 [doi]
- Poster: Protecting Source Code Privacy When Hunting BugsJielun Wu, Qingkai Shi. 5030-5032 [doi]
- Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature ImputationFaqi Zhao, Duohe Ma, Wenhao Li, Feng Liu 0001, Wen Wang 0008. 5033-5035 [doi]
- Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and ShufflingAndreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi. 5036-5038 [doi]
- Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFiAbdulrahman Alhaidari, Balaji Palanisamy, Prashant Krishnamurthy. 5039-5041 [doi]
- Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability DatabaseSevval Simsek, Zhenpeng Shi, Howell Xia, David Sastre Medina, David Starobinski. 5042-5044 [doi]
- Poster: Solving the Free-rider Problem in BittensorSin Tai Liu, Jiayuan Yu, Jacob Steeves. 5045-5047 [doi]
- Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and UsersZhaoxiang Liu, Ning Luo, Samuel Judson, Raj Gautam Dutta, Xiaolong Guo, Mark Santolucito. 5048-5050 [doi]
- Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE)Jelena Mirkovic, David M. Balenson, Brian Kocoloski, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Alba Regalado, David R. Choffnes, Daniel J. Dubois, Luis Garcia 0001. 5051-5053 [doi]
- Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on TorDonghoon Kim, Andrew Booth, Euijin Choo, Doosung Hwang. 5054-5056 [doi]
- Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and NationsYvo Desmedt, Alireza Kavousi, Aydin Abadi. 5057-5059 [doi]
- Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for ResilienceWeimin Fu, Yifang Zhao, Yier Jin, Xiaolong Guo. 5060-5062 [doi]
- Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype NetworkHuaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang, Feng Liu. 5063-5065 [doi]
- Poster: Context-Based Effective Password Detection in PlaintextManish Shukla 0001, Shubham Malaviya, Sachin Lodha. 5066-5068 [doi]
- Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj Dayama 0001, Vinayaka Pandit, Sikhar Patranabis, Abhishek Singh, Nitin Singh. 5069-5071 [doi]
- Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic ExecutionZhaoxuan Li, Ziming Zhao 0008, Wenhao Li, Rui Zhang 0016, Rui Xue 0001, Siqi Lu, Fan Zhang 0010. 5072-5074 [doi]
- Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning ParticipationYuechun Gu, Jiajie He, Keke Chen. 5075-5077 [doi]
- Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of CodeKhiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen. 5078-5080 [doi]
- Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven ApproachesSolayman Ayoubi, Sébastien Tixeuil, Gregory Blanc, Houda Jmila. 5081-5083 [doi]
- Demo: An End-to-End Anonymous Traffic Analysis SystemXianglan Huang, Qiang Zhou, Liangmin Wang, Weiqi Yu, Wenjin Wang, Shi Shen. 5084-5086 [doi]
- ACM CCS 2024 Doctoral SymposiumGabriela Ciocarlie, Xinming Ou. 5087-5088 [doi]
- Trusted Execution Environments for Quantum ComputersTheodoros Trochatos. 5089-5091 [doi]
- Towards Secure Runtime Auditing of Remote Embedded System SoftwareAdam Caulfield. 5092-5094 [doi]
- Understanding and Addressing Online Tracking: Online Privacy's Regulatory TurnNathan Reitinger. 5095-5097 [doi]
- Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning ModelsZitao Chen 0001. 5098-5100 [doi]
- Evolving Network Security in the Era of Network ProgrammabilityMingming Chen. 5101-5103 [doi]
- Symbolic Execution for Dynamic Kernel AnalysisPansilu Pitigalaarachchi. 5104-5106 [doi]
- Toward Practical Threshold FHE: Low Communication, Computation and InteractionHyeongmin Choe. 5107-5109 [doi]
- Privacy Analyses in Machine LearningJiayuan Ye. 5110-5112 [doi]
- Novel Privacy Attacks and Defenses Against Neural NetworksSayanton V. Dibbo. 5113-5115 [doi]
- Leveraging Storage Semantics to Enhance Data Security and PrivacyWeidong Zhu 0002. 5116-5118 [doi]
- Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence MethodsEfrén López-Morales. 5119-5121 [doi]
- Language-based SandboxingJialun Zhang. 5122-5124 [doi]
- Privacy-Preserving Graph AnalysisBhavish Raj Gopal. 5125-5127 [doi]
- Towards Proactive Protection against Unauthorized Speech SynthesisZhiyuan Yu. 5128-5130 [doi]