Abstract is missing.
- IdleLeak: Exploiting Idle State Side Effects for Information LeakageFabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss. [doi]
- LMSanitator: Defending Prompt-Tuning Against Task-Agnostic BackdoorsChengkun Wei, Wenlong Meng, Zhikun Zhang 0001, Min Chen 0032, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen. [doi]
- Secure Multiparty Computation of Threshold Signatures Made More EfficientHarry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow. [doi]
- Modeling and Detecting Internet Censorship EventsElisa Tsai, Ram Sundara Raman, Atul Prakash 0001, Roya Ensafi. [doi]
- BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint TrackingHossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan. [doi]
- QUACK: Hindering Deserialization Attacks via Static Duck TypingYaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang. [doi]
- Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZoneNimish Mishra, Anirban Chakraborty 0003, Debdeep Mukhopadhyay. [doi]
- Abusing the Ethereum Smart Contract Verification Services for Fun and ProfitPengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang 0001, Xiapu Luo. [doi]
- Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay AttackHao Zhou 0009, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang 0008. [doi]
- DeepGo: Predictive Directed Greybox FuzzingPeihong Lin, Pengfei Wang 0010, Xu Zhou, Wei Xie 0007, Gen Zhang, Kai Lu. [doi]
- When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V CommunicationsGeoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy. [doi]
- Large Language Model guided Protocol FuzzingRuijie Meng, Martin Mirchev, Marcel Böhme, Abhik Roychoudhury. [doi]
- Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble AttackHui Xia 0001, Rui Zhang 0050, Zi Kang, Shuliang Jiang, Shuo Xu. [doi]
- Detecting Voice Cloning Attacks via Timbre WatermarkingChang Liu, Jie Zhang 0073, Tianwei Zhang 0004, Xi Yang, Weiming Zhang 0001, Nenghai Yu. [doi]
- Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi NetworksYuxiang Yang, Xuewei Feng, Qi Li 0002, Kun Sun 0001, Ziqiang Wang, Ke Xu 0002. [doi]
- TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEsKerem Arikan, Abraham Farrell, Williams Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001. [doi]
- Decentralized Information-Flow Control for ROS2Nishit V. Pandya, Himanshu Kumar, Gokulnath Pillai, Vinod Ganapathy. [doi]
- CamPro: Camera-based Anti-Facial RecognitionWenjun Zhu, Yuan Sun, Jiani Liu 0009, Yushi Cheng, Xiaoyu Ji 0001, Wenyuan Xu 0001. [doi]
- Secret-Shared Shuffle with Malicious SecurityXiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang. [doi]
- Front-running Attack in Sharded Blockchains and Fair Cross-shard ConsensusJianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate. [doi]
- A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced PerformanceYibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou. [doi]
- SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based NotificationFan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner 0001, Mona Vij, Taesoo Kim. [doi]
- SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised LearningPeizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen 0012, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng. [doi]
- Separation is Good: A Faster Order-Fairness Byzantine ConsensusKe Mu, Bo Yin 0004, Alia Asheralieva, Xuetao Wei. [doi]
- Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction AttacksShu Wang, Kun Sun 0001, Qi Li 0002. [doi]
- SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition SystemsGuangke Chen, Yedi Zhang, Fu Song. [doi]
- A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning ServicesHongsheng Hu, Shuo Wang 0012, Jiamin Chang, Haonan Zhong, Ruoxi Sun 0001, Shuang Hao 0001, Haojin Zhu, Minhui Xue. [doi]
- Gradient Shaping: Enhancing Backdoor Attack Against Reverse EngineeringRui Zhu, Di Tang 0001, Siyuan Tang, Zihao Wang, Guanhong Tao 0001, ShiQing Ma, Xiaofeng Wang 0001, Haixu Tang. [doi]
- You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural NetworksQiushi Li, Yan Zhang, Ju Ren 0001, Qi Li 0002, Yaoxue Zhang. [doi]
- REPLICAWATCHER: Training-less Anomaly Detection in Containerized MicroservicesAsbat El Khairi, Marco Caselli, Andreas Peter, Andrea Continella. [doi]
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless InstrumentationJiameng Shi, Wenqiang Li, Wenwen Wang, Le Guan. [doi]
- UntrustIDE: Exploiting Weaknesses in VS Code ExtensionsElizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos. [doi]
- Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall SequencesHugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang 0001, Suryadipta Majumdar, Makan Pourzandi. [doi]
- VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" VulnerabilitiesLevi Taiji Li, Ningyu He, Haoyu Wang 0001, Mu Zhang 0001. [doi]
- Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real TimeXinfeng Li, Chen Yan 0001, Xuancun Lu, Zihan Zeng, Xiaoyu Ji 0001, Wenyuan Xu 0001. [doi]
- Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMRHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li 0001, Zheng Qin 0001, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li 0068. [doi]
- PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction SoundMan Zhou, Shuao Su, Qian Wang 0002, Qi Li 0002, Yuting Zhou, Xiaojing Ma, Zhengxiong Li. [doi]
- PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless CommunicationsYang Yang 0026, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng 0001. [doi]
- Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep ModelsShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang 0063, Xinbing Wang, Chenghu Zhou, Bo Li. [doi]
- dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI RepositoryYingying Su, Dan Li, Li Chen, Qi Li 0002, Sitong Ling. [doi]
- MASTERKEY: Automated Jailbreaking of Large Language Model ChatbotsGelei Deng, Yi Liu 0069, Yuekang Li, Kailong Wang, Ying Zhang 0066, Zefeng Li, Haoyu Wang 0001, Tianwei Zhang 0004, Yang Liu 0003. [doi]
- Understanding the Implementation and Security Implications of Protective DNS ServicesMingxuan Liu, Yiming Zhang 0009, Xiang Li 0108, Chaoyi Lu, Baojun Liu, Haixin Duan, Xiaofeng Zheng. [doi]
- File Hijacking Vulnerability: The Elephant in the RoomChendong Yu, Yang Xiao 0011, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang 0067, Jingyi Shi, Defang Bo, Wei Huo. [doi]
- MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware DependencyJiacheng Xu, Xuhong Zhang 0002, Shouling Ji, Yuan Tian 0001, Binbin Zhao, Qinying Wang, Peng Cheng 0001, Jiming Chen 0001. [doi]
- CrowdGuard: Federated Backdoor Detection in Federated LearningPhillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi. [doi]
- Attributions for ML-based ICS Anomaly Detection: From Theory to PracticeClement Fung, Eric Zeng, Lujo Bauer. [doi]
- Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile AppsFannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu 0005, Yuqing Zhang 0001. [doi]
- Private Aggregate Queries to Untrusted DatabasesSyed Mahbub Hafiz, Chitrabhanu Gupta, Warren Wnuck, Brijesh Vora, Chen-Nee Chuah. [doi]
- Pisces: Private and Compliable Cryptocurrency ExchangeYa-Nan Li 0007, Tian Qiu, Qiang Tang 0005. [doi]
- Transpose Attack: Stealing Datasets with Bidirectional TrainingGuy Amit, Moshe Levy, Yisroel Mirsky. [doi]
- From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote AttestationShahriar Ebrahimi, Parisa Hassanizadeh. [doi]
- Experimental Analyses of the Physical Surveillance Risks in Client-Side Content ScanningAshish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes. [doi]
- Untangle: Multi-Layer Web Server FingerprintingCem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda. [doi]
- UniID: Spoofing Face Authentication System by Universal IdentityZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji 0001, Wenyuan Xu 0001. [doi]
- From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT DevicesYue Xiao, Yi He, Xiaoli Zhang 0003, Qian Wang 0002, Renjie Xie, Kun Sun 0001, Ke Xu 0002, Qi Li 0002. [doi]
- Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual RealityShiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun 0001, Zhisheng Yan. [doi]
- Understanding and Analyzing Appraisal Systems in the Underground MarketplacesZhengyi Li, Xiaojing Liao. [doi]
- A Security and Usability Analysis of Local Attacks Against FIDO2Tarun Kumar Yadav, Kent E. Seamons. [doi]
- Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign PerceptionTakami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara 0001, Qi Alfred Chen, Sara Rampazzi. [doi]
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network TrafficYuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun 0001, Ke Xu 0002, Jia Zhang 0004, Qi Li 0002. [doi]
- NODLINK: An Online System for Fine-Grained APT Attack Detection and InvestigationShaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang 0001, Fei Shao, Jiedong Chen, Yao Guo 0001, Xiangqun Chen, Ding Li 0001. [doi]
- Predictive Context-sensitive FuzzingPietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida. [doi]
- Bernoulli HoneywordsKe Coby Wang, Michael K. Reiter. [doi]
- Architecting Trigger-Action Platforms for Security, Performance and FunctionalityDeepak Sirone Jegan, Michael M. Swift, Earlence Fernandes. [doi]
- The Dark Side of E-Commerce: Dropshipping Abuse as a Business ModelArjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik. [doi]
- The CURE to Vulnerabilities in RPKI ValidationDonika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner. [doi]
- CP-IoT: A Cross-Platform Monitoring System for Smart HomeHai Lin, Chenglong Li 0006, Jiahai Yang 0001, Zhiliang Wang, Linna Fan, Chenxin Duan. [doi]
- IDA: Hybrid Attestation with Support for Interrupts and TOCTOUFatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh. [doi]
- Powers of Tau in AsynchronySourav Das, Zhuolun Xiang, Ling Ren 0001. [doi]
- GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of KeyboardsQinhong Jiang, Yanze Ren, Yan Long, Chen Yan 0001, Yumai Sun, Xiaoyu Ji 0001, Kevin Fu, Wenyuan Xu 0001. [doi]
- SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode DiffingLian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin 0001. [doi]
- Scrappy: SeCure Rate Assuring Protocol with PrivacYKosei Akama, Yoshimichi Nakatsuka, Masaaki Sato, Keisuke Uehara. [doi]
- Symphony: Path Validation at ScaleAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren 0001. [doi]
- SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux EcosystemXiaochen Zou, Yu Hao 0006, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian. [doi]
- Towards Automated Regulation Analysis for Effective Privacy ComplianceSunil Manandhar, Kapil Singh, Adwait Nadkarni. [doi]
- Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic DataGorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta. [doi]
- Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition ModelsRui Duan, Zhe Qu, Leah Ding, Yao Liu 0007, Zhuo Lu. [doi]
- LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack StrategiesTakami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen. [doi]
- DeGPT: Optimizing Decompiler Output with LLMPeiwei Hu, Ruigang Liang, Kai Chen 0012. [doi]
- ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible TokenGe Ren, Gaolei Li, Shenghong Li 0001, Libo Chen, Kui Ren 0001. [doi]
- Group-based Robustness: A General Framework for Customized Robustness in the Real WorldWeiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif. [doi]
- DEMASQ: Unmasking the ChatGPT WordsmithKavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi. [doi]
- Sharing cyber threat intelligence: Does it really help?Beomjin Jin, Eunsoo Kim, Hyunwoo Lee 0001, Elisa Bertino, Doowon Kim, Hyoungshick Kim. [doi]
- Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not FollowedLancheng Qin, Li Chen 0008, Dan Li 0001, Honglin Ye, Yutian Wang. [doi]
- TrustSketch: Trustworthy Sketch-based Telemetry on Cloud HostsZhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar. [doi]
- GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural NetworksBang Wu, He Zhang 0012, Xiangwen Yang, Shuo Wang 0012, Minhui Xue, Shirui Pan, Xingliang Yuan. [doi]
- ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement LearningLinkang Du, Min Chen 0032, Mingyang Sun, Shouling Ji, Peng Cheng 0001, Jiming Chen 0001, Zhikun Zhang 0001. [doi]
- MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW RadarsDavid Hunt, Kristen Angell, Zhenzhou Qi, Tingjun Chen, Miroslav Pajic. [doi]
- Pencil: Private and Extensible Collaborative Learning without the Non-Colluding AssumptionXuanqi Liu, Zhuotao Liu, Qi Li 0002, Ke Xu 0002, Mingwei Xu. [doi]
- MPCDiff: Testing and Repairing MPC-Hardened Deep Learning ModelsQi Pang, Yuanyuan Yuan, Shuai Wang 0011. [doi]
- Like, Comment, Get Scammed: Characterizing Comment Scams on Media PlatformsXigao Li, Amir Rahmati, Nick Nikiforakis. [doi]
- K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux KernelZhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian. [doi]
- Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident PredictionZitao Chen 0001, Karthik Pattabiraman. [doi]
- 5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection ServiceHaohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin. [doi]
- DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on GraphsHanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin. [doi]
- HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic ComputationSong Bian 0001, Zian Zhao, Zhou Zhang 0016, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu 0001. [doi]
- TextGuard: Provable Defense against Backdoor Attacks on Text ClassificationHengzhi Pei, Jinyuan Jia 0001, Wenbo Guo 0002, Bo Li 0026, Dawn Song. [doi]
- Automatic Policy Synthesis and Enforcement for Protecting Untrusted DeserializationQuan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang 0001. [doi]
- LARMix: Latency-Aware Routing in Mix NetworksMahdi Rahimi 0003, Piyush Kumar Sharma, Claudia Díaz. [doi]
- Information Based Heavy Hitters for Real-Time DNS Data Exfiltration DetectionYarin Ozery, Asaf Nadler, Asaf Shabtai. [doi]
- GNNIC: Finding Long-Lost Sibling Functions with Abstract SimilarityQiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu. [doi]
- Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset SumDaniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro 0004, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos 0001. [doi]
- Towards Precise Reporting of Cryptographic MisusesYikang Chen, Yibo Liu, Ka Lok Wu, Duc V. Le, Sze Yiu Chau. [doi]
- Timing Channels in Adaptive Neural NetworksAyomide Akinsanya, Tegan Brennan. [doi]
- ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based FuzzingLinkai Zheng, Xiang Li 0108, Chuhan Wang, Run Guo, Haixin Duan, Jianjun Chen 0005, Chao Zhang 0008, Kaiwen Shen. [doi]
- FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated LearningHossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi. [doi]
- AnonPSI: An Anonymity Assessment Framework for PSIBo Jiang, Jian Du, Qiang Yan. [doi]
- Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart ContractsNicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna. [doi]
- Efficient and Timely Revocation of V2X CredentialsGianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg. [doi]
- BGP-iSec: Improved Security of Internet Routing Against Post-ROV AttacksCameron Morris, Amir Herzberg, Bing Wang 0001, Samuel Secondo. [doi]
- ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte SelectionKunpeng Zhang, Xiaogang Zhu 0001, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen. [doi]
- LoRDMA: A New Low-Rate DoS Attack in RDMA NetworksShicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang 0001. [doi]
- EnclaveFuzz: Finding Vulnerabilities in SGX ApplicationsLiheng Chen, Zheming Li, Zheyu Ma, Yuan Li, Baojian Chen, Chao Zhang 0008. [doi]
- Certificate Transparency Revisited: The Public Inspections on Third-party MonitorsAozhuo Sun, Jingqiang Lin, Wei Wang 0314, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, FengJun Li. [doi]
- Compromising Industrial Processes using Web-Based Programmable Logic Controller MalwareRyan Pickren, Tohid Shekari, Saman A. Zonouz, Raheem Beyah. [doi]
- LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang 0001, Junzhou Luo, Xinwen Fu. [doi]
- BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the InternetChuhan Wang, Yasuhiro Kuranaga, Yihang Wang, Mingming Zhang, Linkai Zheng, Xiang Li 0108, Jianjun Chen 0005, Haixin Duan, Yanzhong Lin, Qingfeng Pan. [doi]
- Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain ProtocolsShichen Wu, Puwen Wei, Ren Zhang 0003, Bowen Jiang. [doi]
- Unus pro omnibus: Multi-Client Searchable Encryption via Access ControlJiafan Wang 0001, Sherman S. M. Chow. [doi]
- DynPRE: Protocol Reverse Engineering via Dynamic InferenceZhengxiong Luo, Kai Liang, Yanyang Zhao, Feifan Wu, Junze Yu, Heyuan Shi, Yu Jiang 0001. [doi]
- CAGE: Complementing Arm CCA with GPU ExtensionsChenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao 0001, Zhenyu Ning, Shoumeng Yan, Zhengyu He. [doi]
- Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated LearningTorsten Krauß, Jan König, Alexandra Dmitrienko, Christian Kanzow. [doi]
- Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition AnalysisZicong Gao, Chao Zhang 0008, Hangtian Liu, Wenhou Sun, Zhizhuo Tang, Liehui Jiang, Jianjun Chen 0005, Yong Xie. [doi]
- On Precisely Detecting Censorship Circumvention in Real-World NetworksRyan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen. [doi]
- A Unified Symbolic Analysis of WireGuardPascal Lafourcade 0001, Dhekra Mahmoud, Sylvain Ruhault. [doi]
- Improving the Robustness of Transformer-based Large Language Models with Dynamic AttentionLujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang 0002, Chunpeng Ge, Ting Wang 0006. [doi]
- 50 Shades of Support: A Device-Centric Analysis of Android Security UpdatesAbbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac. [doi]
- Proof of Backhaul: Trustfree Measurement of Broadband BandwidthPeiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, Anand SVR, Himanshu Tyagi, Pramod Viswanath. [doi]
- AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous CredentialsHexuan Yu, Changlai Du, Yang Xiao 0010, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou 0001, Wenjing Lou. [doi]
- EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded CamerasYan Long, Qinhong Jiang, Chen Yan 0001, Tobias Alam, Xiaoyu Ji 0001, Wenyuan Xu 0001, Kevin Fu. [doi]
- Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in ChromeMarian Harbach, Igor Bilogrevic, Enrico Bacis, Serena Chen, Ravjit Uppal, Andy Paicu, Elias Klim, Meggyn Watkins, Balazs Engedy. [doi]
- MirageFlow: A New Bandwidth Inflation Attack on TorChristoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala. [doi]
- Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile EcosystemJiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang 0002. [doi]
- TALISMAN: Tamper Analysis for Reference MonitorsFrank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang. [doi]
- Content Censorship in the InterPlanetary File SystemSrivatsan Sridhar, Onur Ascigil, Navin V. Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michal Król. [doi]
- Acoustic Keystroke Leakage on Smart TelevisionsTejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann. [doi]
- DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable DefensesChaoxiang He, Xiaojing Ma 0002, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin 0001, Dongmei Zhang 0001. [doi]
- FP-Fed: Privacy-Preserving Federated Detection of Browser FingerprintingMeenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro. [doi]
- IRRedicator: Pruning IRR with RPKI-Valid BGP InsightsMinhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung. [doi]
- Efficient Use-After-Free Prevention with Opportunistic Page-Level SweepingChanyoung Park, Hyungon Moon. [doi]