Abstract is missing.
- A Public and Reproducible Assessment of the Topics API on Real DataYohan Beugin, Patrick D. McDaniel. 1-8 [doi]
- User Verification System using Location-based Dynamic Questions for Account RecoveryShuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara. 9-16 [doi]
- Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World EventsChris Tsoukaladelis, Nick Nikiforakis. 17-27 [doi]
- Exploring the Capabilities and Limitations of Video Stream FingerprintingTim Walsh, Trevor Thomas, Armon Barton. 28-39 [doi]
- A Performance Analysis for Confidential Federated LearningBruno Casella, Iacopo Colonnelli, Gianluca Mittone, Robert Birke, Walter Riviera, Antonio Sciarappa, Carlo Cavazzoni, Marco Aldinucci. 40-47 [doi]
- LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything ModelYuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu. 48-56 [doi]
- Certifying Safety in Reinforcement Learning under Adversarial Perturbation AttacksJunlin Wu 0001, Hussein Sibai, Yevgeniy Vorobeychik. 57-67 [doi]
- WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQLShae McFadden, Marcello Maugeri, Chris Hicks, Vasilios Mavroudis, Fabio Pierazzi. 68-75 [doi]
- Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation SpaceSanyam Vyas, Chris Hicks, Vasilios Mavroudis. 76-86 [doi]
- Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answersSivana Hamer, Marcelo d'Amorim, Laurie A. Williams. 87-94 [doi]
- NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision TreeTianxiang Dai, Yufan Jiang, Yong Li, Fei Mei. 95-103 [doi]
- The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer VisionAndreas Müller, Erwin Quiring. 104-111 [doi]
- Defending Language Models Against Image-Based Prompt Attacks via User-Provided SpecificationsReshabh K. Sharma, Vinayak Gupta, Dan Grossman. 112-131 [doi]
- Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security AttacksDaniel Kang, Xuechen Li, Ion Stoica, Carlos Guestrin, Matei Zaharia, Tatsunori Hashimoto. 132-143 [doi]
- Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised LearningHongbin Liu 0005, Wenjie Qu 0001, Jinyuan Jia, Neil Zhenqiang Gong. 144-156 [doi]
- Vulnerability Flow Type SystemsMohsen Lesani. 157-168 [doi]
- Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software SystemsSameed Ali, Michael E. Locasto, Sean W. Smith. 169-179 [doi]
- Robust Verification of PEG Parser InterpretersNatarajan Shankar, Zephyr Lucas. 180-191 [doi]
- Research Report: An Optim (l) Approach to Parsing Random-Access FormatsMark Tullsen, Sam Cowger, Mike Dodds, Peter Wyatt. 192-199 [doi]
- Research Report: Not All Move Specifications Are Created Equal : A Case Study on the Formally Verified Diem Payment NetworkMeng Xu. 200-214 [doi]
- Parsing, Performance, and Pareto in Data Stream SecurityJ. Peter Brady, Sean W. Smith. 215-223 [doi]
- Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety ProtectionGuang Jin, Jason H. Li, Greg Briskin. 224-230 [doi]
- Research Report: Testing and Evaluating Artificial Intelligence ApplicationsPaul Lintilhac, Joshua Ackerman, George Cybenko. 231-238 [doi]
- PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built EnvironmentsBrian Wang, Luis Antonio Garcia, Mani B. Srivastava. 239-245 [doi]
- Towards Cyber-Physical Representation and Cyber-Resilience Against Attack and Failure within a Hydraulic Network Simulation ToolkitSean O'Toole, Hoda Mehrpouyan. 246-252 [doi]
- SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-ChannelsFatemeh Arkannezhad, Pooya Aghanoury, Justin Feng, Hossein Khalili, Nader Sehatbakhsh. 253-259 [doi]
- Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-ChannelsHossein Khalili, Alexander Chen, Theodoros Papaiakovou, Timothy Jacques, Hao-Jen Chien, Changwei Liu, Aolin Ding, Amin Hass, Saman A. Zonouz, Nader Sehatbakhsh. 260-266 [doi]
- Intercepting Bluetooth Traffic from Wearable Health DevicesQi Liu, Yizhe Zhang, Yixin Sun. 267-273 [doi]
- Security Analysis of Wearable Smart Health Devices and Their Companion AppsDaniel Timko, Mike Sharko, Yanyan Li. 274-280 [doi]
- Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter DevicesNarmeen Shafqat, Aanjhan Ranganathan. 281-288 [doi]
- Adversarial 3D Virtual Patches using Integrated GradientsChengzeng You, Zhongyuan Hau, Binbin Xu, Soteris Demetriou. 289-295 [doi]
- Poster: Identity-Independent IoT for Overarching Policy EnforcementLuoyao Hao, Henning Schulzrinne. 296 [doi]
- Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic InteractionsThirasara Ariyarathna, Salil S. Kanhere, Hye-Young Paik. 297 [doi]
- Device Discovery in the Smart Home EnvironmentMounib Khanafer, Logan Kostick, Chixiang Wang, Wondimu Zegeye, Weijia He, Berkay Kaplan, Nurzaman Ahmed, Kevin T. Kornegay, David Kotz, Timothy J. Pierson. 298-304 [doi]
- LayerDBA: Circumventing Similarity-Based Defenses in Federated LearningJavor Nikolov, Alessandro Pegoraro, Phillip Rieger, Ahmad-Reza Sadeghi. 299-305 [doi]
- PUF-Based Authentication in IoT Against Strong Physical Adversary Using Zero-Knowledge ProofsLukas Petzi, Alexandra Dmitrienko, Ivan Visconti. 312-319 [doi]