Abstract is missing.
- HoneyKube: Designing and Deploying a Microservices-based Web HoneypotChakshu Gupta, Thijs van Ede, Andrea Continella. 1-11 [doi]
- ROPfuscator: Robust Obfuscation with ROPGiulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro. 1-10 [doi]
- Whole-Program Privilege and Compartmentalization Analysis with the Object-Encapsulation ModelYudi Yang, Weijie Huang, Kelly Kaoudis, Nathan Dautenhahn. 1-12 [doi]
- Evaluating Password Composition Policy and Password Meters of Popular WebsitesKyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim. 12-20 [doi]
- Is It Overkill? Analyzing Feature-Space Concept Drift in Malware DetectorsZhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang. 21-28 [doi]
- Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RLRoi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar. 29-37 [doi]
- On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust FeaturesAlireza Aghabagherloo, Rafa Gálvez, Davy Preuveneers, Bart Preneel. 38-44 [doi]
- Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo, Farhan Ahmed, Kevin Eykholt, Yi Zhou, Shriti Priya, Taesung Lee, Swanand Kadhe, Mike Tan, Sridevi Polavaram, Sterling Suggs, Yuyang Gao, David Slater. 45-56 [doi]
- On the Pitfalls of Security Evaluation of Robust Federated LearningMomin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar. 57-68 [doi]
- SafeFL: MPC-friendly Framework for Private and Robust Federated LearningTill Gehlhar, Felix Marx, Thomas Schneider 0003, Ajith Suresh, Tobias Wehrle, Hossein Yalame. 69-76 [doi]
- Membership Inference Attacks against Diffusion ModelsTomoya Matsumoto, Takayuki Miura, Naoto Yanai. 77-83 [doi]
- On Feasibility of Server-side Backdoor Attacks on Split LearningBehrad Tajalli, Oguzhan Ersoy, Stjepan Picek. 84-93 [doi]
- Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep LearningEtienne Salimbeni, Nina Mainusch, Dario Pasquini. 94-104 [doi]
- A Survey of Parser Differential Anti-PatternsSameed Ali, Sean W. Smith. 105-116 [doi]
- PolyDoc: Surveying PDF Files from the PolySwarm networkPrashant Anantharaman, Robert Lathrop, Rebecca Shapiro, Michael E. Locasto. 117-134 [doi]
- Unsupervised clustering of file dialects according to monotonic decompositions of mixturesMichael Robinson, Tate Altman, Denley Lam, Letitia W. Li. 147-162 [doi]
- DISV: Domain Independent Semantic Validation of Data FilesAshish Kumar, Bill Harris, Gang Tan. 163-174 [doi]
- Blind Spots: Identifying Exploitable Program InputsHenrik Brodin, Marek Surovic, Evan Sultanik. 175-186 [doi]
- Automatically Detecting Variability Bugs Through Hybrid Control and Data Flow AnalysisKelly Kaoudis, Henrik Brodin, Evan Sultanik. 187-197 [doi]
- Research Report: Synthesizing Intrusion Detection System Test Data from Open-Source Attack SignaturesJared Chandler, Adam Wick. 198-208 [doi]
- Corpus-wide Analysis of Parser Behaviors via a Format Analysis WorkbenchPottayil Harisanker Menon, Walt Woods. 209-218 [doi]
- Reflections on Trusting Docker: Invisible Malware in Continuous Integration SystemsFlorent Moriconi, Axel Ilmari Neergaard, Lucas Georget, Samuel Aubertin, Aurélien Francillon. 219-227 [doi]
- GPThreats-3: Is Automatic Malware Generation a Threat?Marcus Botacin. 238-254 [doi]
- Emoji shellcoding in RISC-VHadrien Barral, Georges-Axel Jaloyan, David Naccache. 255-263 [doi]
- The ghost is the machine: Weird machines in transient executionPing-Lun Wang, Fraser Brown, Riad S. Wahby. 264-272 [doi]
- Cryo-Mechanical RAM Content Extraction Against Modern Embedded SystemsYuanzhe Wu, Grant Skipper, Ang Cui. 273-284 [doi]
- CustomProcessingUnit: Reverse Engineering and Customization of Intel MicrocodePietro Borrello, Catherine Easdon, Martin Schwarzl, Roland Czerny, Michael Schwarz 0001. 285-297 [doi]
- The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective ObjectsBen Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici. 298-310 [doi]
- ESPwn32: Hacking with ESP32 System-on-ChipsRomain Cayre, Damien Cauquil, Aurélien Francillon. 311-325 [doi]
- Fuzzing the Latest NTFS in Linux with Papora: An Empirical StudyEdward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo 0001. 326-336 [doi]
- Divergent Representations: When Compiler Optimizations Enable ExploitationAndreas D. Kellas, Alan Cao, Peter Goodman, Junfeng Yang. 337-348 [doi]
- Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro Sorniotti, Michael Weissbacher, Anil Kurmus. 349-363 [doi]
- ASanity: On Bug Shadowing by Early ASan ExitsVincent Ulitzsch, Deniz Scholz, Dominik Maier. 364-370 [doi]
- Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability DetectionTom van Goethem, Iskander Sánchez-Rola, Wouter Joosen. 371-383 [doi]
- Hakuin: Optimizing Blind SQL Injection with Probabilistic Language ModelsJakub Pruzinec, Quynh-Anh Nguyen. 384-393 [doi]
- Towards Simultaneous Attacks on Multiple Cellular NetworksAlexander J. Ross, Bradley Reaves. 394-405 [doi]