Abstract is missing.
- Modelling direct messaging networks with multiple recipients for cyber deceptionKristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey. 1-19 [doi]
- SoK: The Impact of Unlabelled Data in Cyberthreat DetectionGiovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. 20-42 [doi]
- SIERRA: Ranking Anomalous Activities in Enterprise NetworksJehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. 44-59 [doi]
- Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity DetectionVictor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. 60-73 [doi]
- Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity AnalysisHaoyu He, Yuede Ji, H. Howie Huang. 74-89 [doi]
- SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world dataSeny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider 0003, Amos Treiber, Michael Yonli. 90-108 [doi]
- EZEE: Epoch Parallel Zero Knowledge for ANSI CYibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. 109-123 [doi]
- SoK: Privacy-Preserving Computing in the Blockchain EraGhada Almashaqbeh, Ravital Solomon. 124-139 [doi]
- CostCO: An automatic cost modeling framework for secure multi-party computationVivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. 140-153 [doi]
- HyperLogLog: Exponentially Bad in Adversarial SettingsKenneth G. Paterson, Mathilde Raynal. 154-170 [doi]
- Trampoline Over the Air: Breaking in IoT Devices Through MQTT BrokersHuikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. 171-187 [doi]
- Hide and Seek: Revisiting DNS-based User TrackingDeliang Chang, Joann Qiongna Chen, Zhou Li 0001, Xing Li. 188-205 [doi]
- SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path ForwardSteven Sprecher, Christoph Kerschbaumer, Engin Kirda. 206-222 [doi]
- Lethe: Practical Data Breach Detection with Zero Persistent Secret StateAntreas Dionysiou, Elias Athanasopoulos. 223-235 [doi]
- Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer FunctionsDavid Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. 236-250 [doi]
- Lightweight, Multi-Stage, Compiler-Assisted Application SpecializationMohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps. 251-269 [doi]
- LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and ProfitMert Side, Fan Yao, Zhenkai Zhang. 270-285 [doi]
- Fuzzing with Data Dependency InformationAlessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. 286-302 [doi]
- Unrolling SGD: Understanding Factors Influencing Machine UnlearningAnvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. 303-319 [doi]
- Transformer-based Extraction of Deep Image ModelsVerena Battis, Alexander Penner. 320-336 [doi]
- DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge DevicesKartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. 337-355 [doi]
- Towards Fair and Robust ClassificationHaipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. 356-376 [doi]
- WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a SmartwatchJack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. 377-391 [doi]
- Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT MalwareElsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. 392-409 [doi]
- KGP Meter: Communicating Kin Genomic Privacy to the MassesMathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. 410-429 [doi]
- aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHAImran Hossen, Xiali Hei. 430-447 [doi]
- Dynamic Policies RevisitedAmir M. Ahmadian, Musard Balliu. 448-466 [doi]
- Compositional Information Flow Monitoring for Reactive ProgramsMcKenna McCall, Abhishek Bichhawat, Limin Jia 0001. 467-486 [doi]
- Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow ControlJason Liu, Anant Kandikuppa, Adam Bates 0001. 487-501 [doi]
- xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davit. 502-519 [doi]
- HARM: Hardware-Assisted Continuous Re-randomization for MicrocontrollersJiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang 0017. 520-536 [doi]
- Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User SpacePayton Walker, Nitesh Saxena. 537-554 [doi]
- SoK: Workerounds - Categorizing Service Worker Attacks and MitigationsKarthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. 555-571 [doi]
- SAUSAGE: Security Analysis of Unix domain Socket usAGE in AndroidMounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef. 572-586 [doi]
- We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric EncryptionDandan Yuan, Shujie Cui, Giovanni Russello. 587-605 [doi]
- Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed CommitmentsYacov Manevich, Adi Akavia. 606-625 [doi]
- SoK: Oblivious Pseudorandom FunctionsSílvia Casacuberta, Julia Hesse, Anja Lehmann. 625-646 [doi]
- Signature Correction Attack on Dilithium Signature SchemeSaad Islam, Koksal Mus, Richa Singh 0003, Patrick Schaumont, Berk Sunar. 647-663 [doi]
- GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision SystemsRyan Feng, Neal Mangaokar, Jiefeng Chen 0001, Earlence Fernandes, Somesh Jha, Atul Prakash 0001. 664-683 [doi]
- TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural BackdoorsRen Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng 0001, Xiapu Luo, Ting Wang 0006. 684-702 [doi]
- Dynamic Backdoor Attacks Against Machine Learning ModelsAhmed Salem 0001, Rui Wen, Michael Backes 0001, ShiQing Ma, Yang Zhang 0016. 703-718 [doi]
- Captcha me if you can: Imitation Games with Reinforcement LearningIlias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. 719-735 [doi]