Abstract is missing.
- Analyzing the AI Nudification Application EcosystemCassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin R. B. Butler, Patrick Traynor, Elissa M. Redmiles, Tadayoshi Kohno. 1-20 [doi]
- Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android AppsYifan Yao, Shawn McCollum, Zhibo Sun, Yue Zhang 0025. 21-39 [doi]
- Abusability of Automation Apps in Intimate Partner ViolenceShirley Zhang 0002, Paul Chung, Jacob Vervelde, Nishant Korapati, Rahul Chatterjee 0001, Kassem Fawaz. 41-60 [doi]
- Malicious LLM-Based Conversational AI Makes Users Reveal Personal InformationXiao Zhan, Juan Carlos Carrillo, William Seymour, Jose Such. 61-80 [doi]
- An Industry Interview Study of Software Signing for Supply Chain SecurityKelechi G. Kalu, Tanmay Singla, Chinenye Okafor, Santiago Torres-Arias, James C. Davis 0001. 81-100 [doi]
- Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What Minimizes Losses?Adam Hastings, Simha Sethumadhavan. 101-117 [doi]
- A First Look at Governments' Enterprise Security GuidanceKimberly Ruth, Raymond Buernor Obu, Ifeoluwa Shode, Gavin Li, Carrie Gates, Grant Ho, Zakir Durumeric. 119-138 [doi]
- SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image GenerationYunsung Chung, Yunbei Zhang, Nassir Marrouche, Jihun Hamm. 139-159 [doi]
- Characterizing and Detecting Propaganda-Spreading Accounts on TelegramKlim Kireev, Yevhen Mykhno, Carmela Troncoso, Rebekah Overdorf. 161-180 [doi]
- GradEscape: A Gradient-Based Evader Against AI-Generated Text DetectorsWenlong Meng, Shuguo Fan, Chengkun Wei, Min Chen 0032, Yuwei Li, Yuanchao Zhang, Zhikun Zhang 0001, Wenzhi Chen. 181-200 [doi]
- Provably Robust Multi-bit Watermarking for AI-generated TextWenjie Qu 0001, Wengrui Zheng, Tianyang Tao, Dong Yin, Yanze Jiang, Zhihua Tian, Wei Zou, Jinyuan Jia 0001, Jiaheng Zhang. 201-220 [doi]
- HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate CampaignsXinyue Shen 0001, Yixin Wu 0001, Yiting Qu, Michael Backes 0001, Savvas Zannettou, Yang Zhang 0016. 221-240 [doi]
- EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language ModelsNan Yan 0001, Yuqing Li, Xiong Wang 0006, Jing Chen 0003, Kun He 0008, Bo Li 0001. 241-257 [doi]
- Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs' Refusal BoundariesJiahao Yu 0001, Haozheng Luo, Jerry Yao-Chieh Hu, Yan Chen 0004, Wenbo Guo 0002, Han Liu 0001, Xinyu Xing 0001. 259-278 [doi]
- Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition AlgorithmsPengli Wang, Bingyou Dong, Yifeng Cai, Zheng Zhang, Junlin Liu, Huanran Xue, Ye Wu, Yao Zhang, Ziqi Zhang. 279-298 [doi]
- LLMmap: Fingerprinting for Large Language ModelsDario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese. 299-318 [doi]
- Refusal Is Not an Option: Unlearning Safety Alignment of Large Language ModelsMinkyoo Song, Hanna Kim, Jaehan Kim, Seungwon Shin 0001, Sooel Son. 319-338 [doi]
- Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and DefenseJiawen Zhang 0005, Kejia Chen 0007, Lipeng He, Jian Lou 0001, Dan Li 0032, Zunlei Feng, Mingli Song, Jian Liu 0012, Kui Ren 0001, Xiaohu Yang 0001. 339-358 [doi]
- Narrowbeer: A Practical Replay Attack Against the Widevine DRMFlorian Roudot, Mohamed Sabt. 359-374 [doi]
- Lancet: A Formalization Framework for Crash and Exploit PathologyQinrun Dai, Kirby Linvill, Yueqi Chen 0001, Gowtham Kaki. 375-394 [doi]
- Synthesis of Code-Reuse Attacks from p-code ProgramsMark DenHoed, Tom Melham. 395-411 [doi]
- Sound and Efficient Generation of Data-Oriented Exploits via Programming Language SynthesisYuxi Ling, Gokul Rajiv, Kiran Gopinathan, Ilya Sergey. 413-429 [doi]
- My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP ParsersYufan You, Jianjun Chen 0005, Qi Wang 0094, Haixin Duan. 431-450 [doi]
- Tady: A Neural Disassembler without Structural Constraint ViolationsSiliang Qin, Fengrui Yang, Hao Wang 0003, Bolun Zhang, Zeyu Gao, Chao Zhang 0008, Kai Chen 0012. 451-468 [doi]
- SoK: Towards a Unified Approach to Applied Replicability for Computer SecurityDaniel Olszewski, Tyler Tucker, Kevin R. B. Butler, Patrick Traynor. 469-488 [doi]
- LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language ModelsAhmed Lekssays, Hamza Mouhcine, Khang Tran, Ting Yu 0001, Issa Khalil. 489-507 [doi]
- X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 CertificatesBing Shi, Wenchao Li, Yuchen Wang, Xiaolong Bai, Luyi Xing. 509-528 [doi]
- Cyber-Physical Deception Through Coordinated IoT HoneypotsChongqi Guan, Guohong Cao. 529-545 [doi]
- AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset GenerationYihao Peng, Tongxin Zhang, Jieshao Lai, Yuxuan Zhang, Yiming Wu, Hai Wan, Xibin Zhao. 547-566 [doi]
- CoVault: Secure, Scalable Analytics of Personal DataRoberta De Viti, Isaac Sheff, Noemi Glaeser, Baltasar Dinis, Rodrigo Rodrigues 0001, Bobby Bhattacharjee, Anwar Hithnawi, Deepak Garg 0001, Peter Druschel. 567-586 [doi]
- EvilEDR: Repurposing EDR as an Offensive ToolKotaiba Alachkar, Dirk Gaastra, Eduardo Barbaro, Michel van Eeten, Yury Zhauniarovich. 587-605 [doi]
- TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and AnalysisBo Zhang, Yansong Gao 0001, Changlong Yu, Boyu Kuang, Zhi Zhang 0001, Hyoungshick Kim, Anmin Fu. 607-624 [doi]
- Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation PrimitivesNicolas Bailluet, Emmanuel Fleury, Isabelle Puaut, Erven Rohou. 625-643 [doi]
- BlueGuard: Accelerated Host and Guest Introspection Using DPUsMeni Orenbach, Rami Ailabouni, Nael Masalha, Thanh Nguyen, Ahmad Saleh, Frank Block, Fritz Alder, Ofir Arkin, Ahmad Atamli. 645-664 [doi]
- RollingEvidence: Autoregressive Video Evidence via Rolling Shutter EffectFeng Qian 0006, Lingfeng Zhang 0004, Tao Luo, Shiqi Xu, Zhijun Yu, Wei Wang. 665-684 [doi]
- From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded SystemsJiaxu Zhao 0004, Yuekang Li, Yanyan Zou 0002, Yang Xiao 0011, Naijia Jiang, Yeting Li, Nanyu Zhong, Bingwei Peng, Kunpeng Jian, Wei Huo. 685-704 [doi]
- IRBlock: A Large-Scale Measurement Study of the Great Firewall of IranJonas Tai, Karthik Nishanth Sengottuvelavan, Peter Whiting, Nguyen Phong Hoang. 705-722 [doi]
- Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this VulnerabilityChuhan Wang, Chenkai Wang 0001, Songyi Yang, Sophia Liu, Jianjun Chen 0005, Haixin Duan, Gang Wang 0011. 723-742 [doi]
- The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box TestingKeran Mu, Jianjun Chen 0005, Jianwei Zhuge, Qi Li 0002, Haixin Duan, Nick Feamster. 743-762 [doi]
- Censorship Evasion with Unidentified Protocol GenerationRyan Wails, Rob Jansen, Aaron Johnson 0001, Micah Sherr. 763-782 [doi]
- Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of ChinaAli Zohaib, Qiang Zao, Jackson Sippe, Abdulrahman Alaraj, Amir Houmansadr, Zakir Durumeric, Eric Wustrow. 783-802 [doi]
- Ares: Comprehensive Path Hijacking Detection via Routing TreeYinxiang Tao, Chengwan Zhang, Changqing An, Shuying Zhuang, Jilong Wang 0001, Congcong Miao. 803-821 [doi]
- Trust but Verify: An Assessment of Vulnerability Tagging ServicesSzu-Chun Huang, Harm Griffioen, Max van der Horst, Georgios Smaragdakis, Michel van Eeten, Yury Zhauniarovich. 823-842 [doi]
- Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming EcosystemJungun Ahn, Sueun Jung, Seungwan Yoo, Jungheum Park, Sangjin Lee 0002. 843-860 [doi]
- Catch-22: Uncovering Compromised Hosts using SSH Public KeysCristian Munteanu, Georgios Smaragdakis, Anja Feldmann, Tobias Fiebig. 861-878 [doi]
- USD: NSFW Content Detection for Text-to-Image Models via Scene GraphYuyang Zhang, Kangjie Chen, Xudong Jiang, Jiahui Wen, Yihui Jin, Ziyou Liang, Yihao Huang 0001, Run Wang 0001, Lina Wang 0001. 879-895 [doi]
- Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image PipelinesCorban Villa, Muhammad Shujaat Mirza, Christina Pöpper. 897-916 [doi]
- On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign PromptsYixin Wu 0001, Ning Yu 0006, Michael Backes 0001, Yun Shen, Yang Zhang 0016. 917-936 [doi]
- Neural Invisibility Cloak: Concealing Adversary in Images via Compromised AI-driven Image Signal ProcessingWenjun Zhu, Xiaoyu Ji 0001, Xinfeng Li, Qihang Chen, Kun Wang, Xinyu Li, Ruoyan Xu, Wenyuan Xu 0001. 937-956 [doi]
- Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across ModalitiesYiting Qu, Michael Backes 0001, Yang Zhang 0016. 957-976 [doi]
- Backdooring Bias (B^2) into Stable Diffusion ModelsAli Naseh, Jaechul Roh, Eugene Bagdasarian, Amir Houmansadr. 977-996 [doi]
- Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion ModelsChangjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, Ting Wang 0006. 997-1016 [doi]
- Pretender: Universal Active Defense against Diffusion Finetuning AttacksZekun Sun, Zijian Liu, Shouling Ji, Chenhao Lin, Na Ruan. 1017-1036 [doi]
- Self-interpreting Adversarial ImagesTingwei Zhang, Collin Zhang, John X. Morris, Eugene Bagdasarian, Vitaly Shmatikov. 1037-1052 [doi]
- TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor NetworkYumingzhi Pan, Zhen Ling 0001, Yue Zhang 0025, Hongze Wang, Guangchi Liu, Junzhou Luo, Xinwen Fu. 1053-1072 [doi]
- CloudFlow: Identifying Security-sensitive Data Flows in Serverless ApplicationsGiuseppe Raffa, Jorge Blasco, Daniel O'Keeffe, Santanu Kumar Dash 0001. 1073-1090 [doi]
- Serverless Functions Made Confidential and Efficient with Split ContainersJiacheng Shi, Jinyu Gu 0001, Yubin Xia, Haibo Chen 0001. 1091-1110 [doi]
- Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly ContainersZhaofeng Yu, Dongyang Zhan, Lin Ye, Haining Yu, Hongli Zhang 0001, Zhihong Tian. 1111-1128 [doi]
- Transparent Attested DNS for Confidential Computing ServicesAntoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Manuel Costa, Sylvan Clebsch, Christoph M. Wintersteiger. 1129-1148 [doi]
- Dorami: Privilege Separating Security Monitor on RISC-V TEEsMark Kuhne, Stavros Volos, Shweta Shinde. 1149-1166 [doi]
- TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX PlatformsDaan Vanoverloop, Andrés Sánchez, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck. 1167-1186 [doi]
- TETD: Trusted Execution in Trust DomainsZhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu. 1187-1206 [doi]
- TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDXFabian Rauscher, Luca Wilke, Hannes Weissteiner, Thomas Eisenbarth 0001, Daniel Gruss. 1207-1222 [doi]
- Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in BlockchainZheyuan He, Zihao Li 0001, Jiahao Luo, Feng Luo, Junhan Duan, Jingwei Li 0001, Shuwei Song, Xiapu Luo, Ting Chen 0002, Xiaosong Zhang 0001. 1223-1242 [doi]
- Blockchain Address PoisoningTaro Tsuchiya, Jin-Dong Dong, Kyle Soska, Nicolas Christin. 1243-1262 [doi]
- Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-StakeMingfei Zhang, Rujia Li 0001, Xueqian Lu, Sisi Duan. 1263-1280 [doi]
- Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom EcosystemNicola Ruaro, Fabio Gritti, Dongyu Meng, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna. 1281-1298 [doi]
- Voting-Bloc Entropy: A New Metric for DAO DecentralizationAndrés Fábrega, Amy Zhao, Jay Yu, James Austgen, Sarah Allen, Kushal Babel, Mahimna Kelkar, Ari Juels. 1299-1318 [doi]
- Deanonymizing Ethereum Validators: The P2P Network Has a Privacy IssueLioba Heimbach, Yann Vonlanthen, Juan Villacis, Lucianna Kiffer, Roger Wattenhofer. 1319-1338 [doi]
- Let's Move2EVMLorenzo Benetollo, Andreas Lackner, Matteo Maffei, Markus Scherer. 1339-1355 [doi]
- Ghost Clusters: Evaluating Attribution of Illicit Services through Cryptocurrency TracingKelvin Lubbertsen, Michel van Eeten, Rolf van Wegberg. 1357-1374 [doi]
- Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application LayerZuchao Ma, Muhui Jiang, Feng Luo, Xiapu Luo, Yajin Zhou. 1375-1392 [doi]
- SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic ProposalsMd Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena. 1393-1413 [doi]
- Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based AttacksMarvin Kowalewski, Leona Lassak, Markus Dürmuth, Theodor Schnitzler. 1415-1434 [doi]
- URL Inspection Tasks: Helping Users Detect Phishing Links in EmailsDaniele Lain, Yoshimichi Nakatsuka, Kari Kostiainen, Gene Tsudik, Srdjan Capkun. 1435-1454 [doi]
- Digital Security Perceptions and Practices Around the World: A WEIRD versus Non-WEIRD ComparisonFranziska Herbert, Collins W. Munyendo, Jonas Hielscher, Steffen Becker 0003, Yixin Zou. 1455-1474 [doi]
- SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis FrameworkAli Teymourian, Andrew M. Webb, Taha Gharaibeh, Arushi Ghildiyal, Ibrahim Baggili. 1475-1492 [doi]
- Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic ServiceTakayuki Sasaki, Tomoya Inazawa, Youhei Yamaguchi, Simon Parkin, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto. 1493-1510 [doi]
- AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating FeaturesDañiel Gerhardt, Matthias Fassl, Carolyn Guthoff, Adrian Dabrowski, Katharina Krombholz. 1511-1530 [doi]
- PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual IntegrityEmiram Kablo, Melina Kleber, Patricia Arias Cabarcos. 1531-1548 [doi]
- Shadowed Realities: An Investigation of UI Attacks in WebXRChandrika Mukherjee, Reham Mohamed 0003, Arjun Arunasalam, Habiba Farrukh, Z. Berkay Celik. 1549-1568 [doi]
- Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMsErgute Bao, Yangfan Jiang 0001, Fei Wei, Xiaokui Xiao, Zitao Li, Yaliang Li, Bolin Ding. 1569-1588 [doi]
- Membership Inference Attacks Against Vision-Language ModelsYuke Hu, Zheng Li, Zhihao Liu, Yang Zhang, Zhan Qin, Kui Ren 0001, Chun Chen 0001. 1589-1608 [doi]
- Towards Label-Only Membership Inference Attack against Pre-trained Large Language ModelsYu He, Boheng Li, Liu Liu, Zhongjie Ba, Wei Dong 0011, Yiming Li 0004, Zhan Qin, Kui Ren 0001, Chun Chen 0001. 1609-1628 [doi]
- Depth Gives a False Sense of Privacy: LLM Internal States InversionTian Dong, Yan Meng 0001, Shaofeng Li 0001, Guoxing Chen, Zhen Liu 0008, Haojin Zhu. 1629-1648 [doi]
- I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model InferenceZibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv. 1649-1668 [doi]
- Evaluating LLM-based Personal Information Extraction and CountermeasuresYupei Liu, Yuqi Jia, Jinyuan Jia 0001, Neil Zhenqiang Gong. 1669-1688 [doi]
- Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream ApplicationsYixin Wu 0001, Ziqing Yang 0002, Yun Shen, Michael Backes 0001, Yang Zhang 0016. 1689-1708 [doi]
- Data-Free Model-Related Attacks: Unleashing the Potential of Generative AIDayong Ye, Tianqing Zhu, Shang Wang, Bo Liu 0001, Leo Yu Zhang, Wanlei Zhou 0001, Yang Zhang 0016. 1709-1727 [doi]
- When LLMs Go Online: The Emerging Threat of Web-Enabled LLMsHanna Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin 0001, Kimin Lee. 1729-1748 [doi]
- Enabling Low-Cost Secure Computing on Untrusted In-Memory ArchitecturesSahar Ghoflsaz Ghinani, Jingyao Zhang, Elaheh Sadredini. 1749-1767 [doi]
- AidFuzzer: Adaptive Interrupt-Driven Firmware Fuzzing via Run-Time State RecognitionJianqiang Wang, Qinying Wang, Tobias Scharnowski, Li Shi, Simon Wörner, Thorsten Holz. 1769-1786 [doi]
- GenHuzz: An Efficient Generative Hardware FuzzerLichao Wu, Mohamadreza Rostami, Huimin Li 0004, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi. 1787-1805 [doi]
- Software Availability Protection in Cyber-Physical SystemsAo Li 0006, Jinwen Wang, Ning Zhang 0017. 1807-1825 [doi]
- GDMA: Fully Automated DMA Rehosting via Iterative Type OverlaysTobias Scharnowski, Simeon Hoffmann, Moritz Bley, Simon Wörner, Daniel Klischies, Felix Buchmann, Nils Ole Tippenhauer, Thorsten Holz, Marius Muench. 1827-1845 [doi]
- Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded SystemsPhilipp Mackensen, Christian Niesler, Roberto Blanco, Lucas Davi, Veelasha Moonsamy. 1847-1866 [doi]
- Security Implications of Malicious G-Codes in 3D PrintingJost Rossel, Vladislav Mladenov, Nico Wördenweber, Juraj Somorovsky. 1867-1885 [doi]
- Secure Information Embedding in Forensic 3D FingerprintingCanran Wang, Jinwen Wang, Mi Zhou, Vinh Pham, Senyue Hao, Chao Zhou, Ning Zhang 0017, Netanel Raviv. 1887-1906 [doi]
- SoK: A Security Architect's View of Printed Circuit Board AttacksJacob Harrison, Nathan Jessurun, Mark Tehranipoor. 1907-1924 [doi]
- Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal ResilienceYuan Su, Yuan Lu 0001, Jiliang Li, Yuyi Wang 0001, Chengyi Dong, Qiang Tang 0005. 1925-1944 [doi]
- FABLE: Batched Evaluation on Confidential Lookup Tables in 2PCZhengyuan Su, Qi Pang, Simon Beyzerov, Wenting Zheng. 1945-1964 [doi]
- MAESTRO: Multi-Party AES Using Lookup TablesHiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, Daniel Tschudi. 1965-1984 [doi]
- Efficient 2PC for Constant Round Secure Equality Testing and ComparisonTianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma 0001, Xiaoyuan Zhang, Yang Liu 0118, Kui Ren 0001, Chun Chen 0001. 1985-2004 [doi]
- Efficient Multi-Party Private Set Union Without Non-Collusion AssumptionsMinglang Dong, Cong Zhang, Yujie Bai, Yu Chen. 2005-2024 [doi]
- Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof DelegationXuanming Liu, Zhelei Zhou, Yinghao Wang, Yanxin Pang, Jinye He, Bingsheng Zhang, Xiaohu Yang 0001, Jiaheng Zhang. 2025-2044 [doi]
- zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM InferenceWenjie Qu 0001, Yijun Sun, Xuanming Liu, Tao Lu, Yanpei Guo, Kai Chen, Jiaheng Zhang. 2045-2063 [doi]
- DFS: Delegation-friendly zkSNARK and Private Delegation of ProversYuncong Hu, Pratyush Mishra, Xiao Wang 0012, Jie Xie, Kang Yang 0002, Yu Yu 0001, Yuwen Zhang. 2065-2084 [doi]
- SoK: Understanding zk-SNARKs: The Gap Between Research and PracticeJunkai Liang, Daqi Hu, Pengfei Wu 0003, Yunbo Yang, Qingni Shen, Zhonghai Wu. 2085-2104 [doi]
- A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security FeaturesJessy Ayala, Yu-Jye Tung, Joshua Garcia. 2105-2124 [doi]
- "Threat modeling is very formal, it's very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software ProjectsHarjot Kaur, Carson Powers, Ronald E. Thompson III, Sascha Fahl, Daniel Votipka. 2125-2144 [doi]
- "I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm PackagesRajdeep Ghosh 0005, Shiladitya De, Mainack Mondal. 2145-2164 [doi]
- Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition AnalysisElizabeth Lin, Sparsha Gowda, William Enck, Dominik Wermke. 2165-2183 [doi]
- Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and ChallengesAakanksha Saha, James Mattei, Jorge Blasco, Lorenzo Cavallaro, Daniel Votipka, Martina Lindorfer. 2185-2204 [doi]
- How Researchers De-Identify Data in PracticeWentao Guo 0005, Paige Pepitone, Adam J. Aviv, Michelle L. Mazurek. 2205-2224 [doi]
- A limited technical background is sufficient for attack-defense tree acceptabilityNathan Daniel Schiele, Olga Gadyatskaya. 2225-2244 [doi]
- "It's not my responsibility to write them": An Empirical Study of Software Product Managers and Security RequirementsHouda Naji, Felix Reichmann, Tobias Bruns, M. Angela Sasse, Alena Naiakshina. 2245-2264 [doi]
- Patching Up: Stakeholder Experiences of Security Updates for Connected Medical DevicesLorenz Kustosch, Carlos Gañán, Michel van Eeten, Simon Parkin. 2265-2281 [doi]
- PRSA: Prompt Stealing Attacks against Real-World Prompt ServicesYong Yang, Changjiang Li, Qingming Li, Oubo Ma, Haoyu Wang, Zonghui Wang, Yandong Gao, Wenzhi Chen, Shouling Ji. 2283-2302 [doi]
- Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI ModelsDayong Ye, Tianqing Zhu, Feng He, Bo Liu 0001, Minhui Xue 0001, Wanlei Zhou 0001. 2303-2322 [doi]
- Prompt Obfuscation for Large Language ModelsDavid Pape, Sina Mavali, Thorsten Eisenhofer, Lea Schönherr. 2323-2342 [doi]
- TwinBreak: Jailbreaking LLM Security Alignments based on Twin PromptsTorsten Krauß, Hamid Dashtbani, Alexandra Dmitrienko. 2343-2362 [doi]
- Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMsLan Zhang 0002, Xinben Gao, Liuyi Yao, Jinke Song, Yaliang Li. 2363-2382 [doi]
- StruQ: Defending Against Prompt Injection with Structured QueriesSizhe Chen, Julien Piet, Chawin Sitawarin, David A. Wagner 0001. 2383-2400 [doi]
- PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMsXueluan Gong, Mingzhe Li, Yilin Zhang, Fengyuan Ran, Chen Chen, Yanjiao Chen, Qian Wang 0002, Kwok-Yan Lam. 2401-2420 [doi]
- Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak AttackMark Russinovich, Ahmed Salem 0001, Ronen Eldan. 2421-2440 [doi]
- SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical MannerXunguang Wang, Daoyuan Wu, Zhenlan Ji, Zongjie Li, Pingchuan Ma 0004, Shuai Wang 0011, Yingjiu Li, Yang Liu 0003, Ning Liu, Juergen Rahmel. 2441-2460 [doi]
- SoK: So, You Think You Know All About Secure Randomized Caches?Anubhav Bhatla, Hari Rohit Bhavsar, Sayandeep Saha, Biswabandan Panda. 2461-2480 [doi]
- TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEsHannes Weissteiner, Fabian Rauscher, Robin Leander Schröder, Jonas Juffinger, Stefan Gast, Jan Wichelmann, Thomas Eisenbarth 0001, Daniel Gruss, Thomas Eisenbarth 0001. 2481-2498 [doi]
- Systematic Evaluation of Randomized Cache Designs against Cache OccupancyAnirban Chakraborty 0003, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay. 2499-2518 [doi]
- Exploiting Inaccurate Branch History in Side-Channel AttacksYuhui Zhu, Alessandro Biondi 0001. 2519-2538 [doi]
- Phantom Trails: Practical Pre-Silicon Discovery of Transient Data LeaksAlvise de Faveri Tron, Raphael Isemann, Hany Ragab, Cristiano Giuffrida, Klaus von Gleissenthall, Herbert Bos. 2539-2556 [doi]
- Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1Yiming Zhu, Wenchao Huang 0001, Yan Xiong 0001. 2557-2576 [doi]
- Encarsia: Evaluating CPU Fuzzers via Automatic Bug InjectionMatej Bölcskei, Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi. 2577-2593 [doi]
- FLOP: Breaking the Apple M3 CPU via False Load Output PredictionsJason Kim 0007, Jalen Chuang, Daniel Genkin, Yuval Yarom. 2595-2614 [doi]
- Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race ConditionsSandro Rüegge, Johannes Wikner, Kaveh Razavi. 2615-2631 [doi]
- GraphAce: Secure Two-Party Graph Analysis Achieving Communication EfficiencyJiping Yu, Kun Chen 0004, Yunyi Chen, Xiaoyu Fan, Xiaowei Zhu 0001, Cheng Hong 0001, Wenguang Chen. 2633-2652 [doi]
- Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPCTianshi Xu, Wen-Jie Lu, Jiangrui Yu, Yi Chen, Chenqi Lin, Runsheng Wang, Meng Li 0004. 2653-2672 [doi]
- HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party LearningWenqiang Ruan, Xin Lin, Ruisheng Zhou, Guopeng Lin, Shui Yu, Weili Han. 2673-2691 [doi]
- Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One RunZihang Xiang, Tianhao Wang 0001, Di Wang 0015. 2693-2711 [doi]
- General-Purpose f-DP Estimation and Auditing in a Black-Box SettingÖnder Askin, Holger Dette, Martin Dunsche, Tim Kutta, Yun Lu 0001, Yu Wei 0007, Vassilis Zikas. 2713-2732 [doi]
- FastLloyd: Federated, Accurate, Secure, and Tunable k-Means Clustering with Differential PrivacyAbdulrahman Diaa, Thomas Humphries, Florian Kerschbaum. 2733-2752 [doi]
- Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized FrameworkXingyu He, Youwen Zhu, Rongke Liu, Gaoning Pan, Changyu Dong. 2753-2769 [doi]
- Further Study on Frequency Estimation under Local Differential PrivacyHuiyu Fang, Liquan Chen, Suhui Liu. 2771-2787 [doi]
- Beyond Statistical Estimation: Differentially Private Individual Computation via ShufflingShaowei Wang 0003, Changyu Dong, Xiangfu Song, Jin Li 0002, Zhili Zhou 0001, Di Wang 0015, Han Wu. 2789-2808 [doi]
- Stack Overflow Meets Replication: Security Research Amid Evolving Code SnippetsAlfusainey Jallow, Sven Bugiel. 2809-2828 [doi]
- "I'm regretting that I hit run": In-situ Assessment of Potential MalwareBrandon Lit, Edward Crowder, Hassan Khan, Daniel Vogel 0001. 2829-2846 [doi]
- Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version IdentificationJinsong Chen, Mengying Wu, Geng Hong, Baichao An, Mingxuan Liu, Lei Zhang 0096, Baojun Liu, Haixin Duan, Min Yang 0002. 2847-2866 [doi]
- "I'm trying to learn...and I'm shooting myself in the foot": Beginners' Struggles When Solving Binary Exploitation ExercisesJames Mattei, Christopher Pellegrini, Matthew Soto, Marina Sanusi Bohuk, Daniel Votipka. 2867-2886 [doi]
- Confusing Value with Enumeration: Studying the Use of CVEs in AcademiaMoritz Schloegel, Daniel Klischies, Simon Koch 0001, David Klein 0001, Lukas Gerlach 0001, Malte Wessels, Leon Trampert, Martin Johns, Mathy Vanhoef, Michael Schwarz 0001, Thorsten Holz, Jo Van Bulck. 2887-2906 [doi]
- "That's my perspective from 30 years of doing this": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic CodeAlexander Krause, Harjot Kaur, Jan H. Klemmer, Oliver Wiese, Sascha Fahl. 2907-2926 [doi]
- "I have no idea how to make it safer": Studying Security and Privacy Mindsets of Browser Extension DevelopersShubham Agarwal 0006, Rafael Mrowczynski, Maria Hellenthal, Ben Stock. 2927-2946 [doi]
- Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph ConstructionYiheng Zhang, Ming Wen 0001, Shunjie Liu, Dongjie He, Hai Jin 0001. 2947-2964 [doi]
- Mitigating Injection Attacks against E2EE Applications via View-Based PartitioningAndrés Fábrega, Samuel Breckenridge, Armin Namavari, Thomas Ristenpart. 2965-2984 [doi]
- Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL SettingsMingyuan Fan 0003, Fuyi Wang, Cen Chen 0001, Jianying Zhou 0001. 2985-3004 [doi]
- Refiner: Data Refining against Gradient Leakage Attacks in Federated LearningMingyuan Fan 0003, Cen Chen 0001, Chengyu Wang 0001, Xiaodan Li, Wenmeng Zhou. 3005-3024 [doi]
- Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious ParticipantsYizhong Liu, Zixiao Jia, Xiao Chen, Song Bian 0001, Runhua Xu, Dawei Li 0009, Yuan Lu 0001. 3025-3044 [doi]
- SoK: On Gradient Leakage in Federated LearningJiacheng Du, Jiahui Hu, Zhibo Wang 0001, Peng Sun 0003, Neil Gong 0001, Kui Ren 0001, Chun Chen 0001. 3045-3064 [doi]
- DP-BREM: Differentially-Private and Byzantine-Robust Federated Learning with Client MomentumXiaolan Gu, Ming Li 0003, Li Xiong 0001. 3065-3082 [doi]
- SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted DataKevin Nam, Youyeon Joo, Seungjin Ha, Yunheung Paek. 3083-3102 [doi]
- Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First PrinciplesZihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang 0001, Xiaofeng Wang 0001, Haixu Tang. 3103-3122 [doi]
- Task-Oriented Training Data Privacy Protection for Cloud-based Model TrainingZhiqiang Wang, Jiahui Hou, Haifeng Sun 0005, Jingmiao Zhang, Yunhao Yao, Haikuo Yu, Xiang-Yang Li 0001. 3123-3140 [doi]
- From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated LearningXiangrui Xu 0001, Zhize Li 0001, Yufei Han 0001, Bin Wang 0062, Jiqiang Liu, Wei Wang 0012. 3141-3160 [doi]
- Demystifying the (In)Security of QR Code-based Login in Real-world DeploymentsXin Zhang, Xiaohan Zhang 0001, Bo Zhao, Yuhong Nan, Zhichen Liu, Jianzhou Chen, Huijun Zhou, Min Yang 0002. 3161-3180 [doi]
- Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking TechniquesAnish Chand, Nick Nikiforakis, Phani Vadrevu. 3181-3200 [doi]
- Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection ModelsFujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim. 3201-3220 [doi]
- Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration PlatformsKaixuan Luo, Xianbo Wang, Adonis P. H. Fung, Wing Cheong Lau, Julien Lecomte. 3221-3238 [doi]
- Predictive Response Optimization: Using Reinforcement Learning to Fight Online Social Network AbuseGarrett Wilson, Geoffrey Goh, Yan Jiang, Ajay Gupta, Jiaxuan Wang, David Freeman, Francesco Dinuzzo. 3239-3256 [doi]
- Hercules Droidot and the murder on the JNI ExpressLuca Di Bartolomeo, Philipp Mao, Yu-Jye Tung, Jessy Ayala, Samuele Doria, Paolo Celada, Marcel Busch, Joshua Garcia, Eleonora Losiouk, Mathias Payer. 3257-3275 [doi]
- No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion RequirementsJingwen Yan, Song Liao, Jin Ma, Mohammed Aldeen, Salish Kumar, Long Cheng 0005. 3277-3296 [doi]
- Lost in the Mists of Time: Expirations in DNS Footprints of Mobile AppsJohnny So, Iskander Sánchez-Rola, Nick Nikiforakis. 3297-3316 [doi]
- TapTrap: Animation-Driven Tapjacking on AndroidPhilipp Beer, Marco Squarcina, Sebastian Roth, Martina Lindorfer. 3317-3335 [doi]
- BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent SetupNan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba. 3337-3356 [doi]
- PolySys: an Algebraic Leakage Attack EngineZachary Espiritu, Seny Kamara, Tarik Moataz, Andrew Park. 3357-3376 [doi]
- Distributional Private Information RetrievalRyan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs. 3377-3396 [doi]
- Practical Keyword Private Information Retrieval from Key-to-Index MappingsMeng Hao 0001, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu 0003, Lei Zhang 0006, Hongwei Li 0001, Robert H. Deng. 3397-3416 [doi]
- SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party InferenceHao Guo, Zhaoqian Liu, Ximing Fu, Zhusen Liu. 3417-3435 [doi]
- Fast Enhanced Private Set Union in the Balanced and Unbalanced ScenariosBinbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen. 3437-3456 [doi]
- BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV PreventionJan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu. 3457-3476 [doi]
- Practical Mempool Privacy via One-time Setup Batched Threshold EncryptionArka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, Mingyuan Wang 0001. 3477-3495 [doi]
- DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge ProofsYanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu 0001, Tianyang Tao, Jiaheng Zhang. 3497-3516 [doi]
- Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC ValidationShuhan Zhang, Shuai Wang 0028, Li Chen 0008, Dan Li 0001, Baojun Liu. 3517-3535 [doi]
- POPS: From History to Mitigation of DNS Cache Poisoning AttacksYehuda Afek, Harel Berger, Anat Bremler-Barr. 3537-3556 [doi]
- DNS FLaRE: A Flush-Reload Attack on DNS ForwardersGilad Moav, Yehuda Afek, Anat Bremler-Barr, Amit Klein 0001. 3557-3576 [doi]
- Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow MeasurementWenhao Wu, Zhenyu Li 0001, Xilai Liu, Zhaohua Wang, Heng Pan, Guangxing Zhang, Gaogang Xie. 3577-3594 [doi]
- Assessing the Aftermath: the Effects of a Global Takedown against DDoS-for-hire ServicesAnh V. Vu, Ben Collier, Daniel R. Thomas, John Kristoff, Richard Clayton 0001, Alice Hutchings. 3595-3612 [doi]
- BGP Vortex: Update Message Floods Can Create Internet InstabilitiesFelix Stöger, Henry Birge-Lee, Giacomo Giuliari, Jordi Subirà Nieto, Adrian Perrig. 3613-3629 [doi]
- ImpROV: Measurement and Practical Mitigation of Collateral Damage in RPKI Route Origin ValidationWeitong Li, Yuze Li, Taejoong Chung. 3631-3647 [doi]
- SoK: An Introspective Analysis of RPKI SecurityDonika Mirdita, Haya Schulmann, Michael Waidner. 3649-3665 [doi]
- Onions Got Puzzled: On the Challenges of Mitigating Denial-of-Service Problems in Tor Onion ServicesJinseo Lee, Hobin Kim, Min-Suk Kang. 3667-3685 [doi]
- We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMsJoseph Spracklen, Raveen Wijewickrama, A. H. M. Nazmus Sakib, Anindya Maiti, Bimal Viswanath. 3687-3706 [doi]
- Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention SinkYining Wang, Mi Zhang 0001, Junjie Sun, Chenyue Wang, Min Yang 0002, Hui Xue 0001, Jialing Tao, Ranjie Duan, Jiexi Liu 0005. 3707-3726 [doi]
- "I Cannot Write This Because It Violates Our Content Policy": Understanding Content Moderation Policies and User Experiences in Generative AI ProductsLan Gao 0001, Oscar Chen, Rachel Lee, Nick Feamster, Chenhao Tan, Marshini Chetty. 3727-3746 [doi]
- Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language ModelXiwen Teoh, Yun Lin 0001, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, Jin Song Dong 0001. 3747-3766 [doi]
- Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based AgentsFengyu Liu, Yuan Zhang 0009, Jiaqi Luo, Jiarun Dai, Tian Chen, Letian Yuan, Zhengmin Yu, Youkun Shi, Ke Li, Chengyuan Zhou, Hao Chen 0003, Min Yang 0002. 3767-3786 [doi]
- Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker DocumentsAvital Shafran, Roei Schuster, Vitaly Shmatikov. 3787-3806 [doi]
- Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation ModelsYuyang Gong, Zhuo Chen, Jiawei Liu 0002, Miaokun Chen, Fengchang Yu, Wei Lu 0019, Xiaofeng Wang 0001, Xiaozhong Liu. 3807-3826 [doi]
- PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language ModelsWei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia 0001. 3827-3844 [doi]
- TracLLM: A Generic Framework for Attributing Long Context LLMsYanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia 0001. 3845-3864 [doi]
- Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density ModulationArifu Onishi, S. Hrushikesh Bhupathiraju, Rishikesh Bhatt, Sara Rampazzi, Takeshi Sugawara 0001. 3865-3884 [doi]
- TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic WavesJianshuo Liu, Hong Li 0004, Haining Wang 0001, Mengjie Sun, Hui-Wen, Jinfa Wang, Limin Sun 0001. 3885-3902 [doi]
- DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of μm-level HDD VibrationsWeiye Xu 0001, Danli Wen, Jianwei Liu 0008, Zixin Lin, Yuanqing Zheng, Xian Xu, Jinsong Han. 3903-3920 [doi]
- HubBub: Contention-Based Side-Channel Attacks on USB HubsJunpeng Wan, Yanxiang Bi, Han Gao, Dave (Jing) Tian. 3921-3940 [doi]
- Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzzFlavien Solt, Kaveh Razavi. 3941-3958 [doi]
- Automated Discovery of Semantic Attacks in Multi-Robot Navigation SystemsDoguhan Yeke, Kartik Anand Pant, Muslum Ozgur Ozmen, Hyungsub Kim, James M. Goppert, Inseok Hwang 0002, Antonio Bianchi, Z. Berkay Celik. 3959-3978 [doi]
- The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous DrivingJunqi Zhang, Shaoyin Cheng, Linqing Hu, Jie Zhang 0073, Chengyu Shi, Xingshuo Han, Tianwei Zhang 0004, Yueqiang Cheng, Weiming Zhang 0001. 3979-3998 [doi]
- NeuroScope: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic AnalysisRuoyu Wu, Muqi Zou, Arslan Khan, TaeGyu Kim, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi. 3999-4016 [doi]
- BarraCUDA: Edge GPUs do Leak DNN WeightsPéter Horváth, Lukasz Chmielewski, Léo Weissbart, Lejla Batina, Yuval Yarom. 4017-4034 [doi]
- CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart ContractsYu Pan, Wanjing Han, Yue Duan, Mu Zhang 0001. 4035-4052 [doi]
- On the Atomicity and Efficiency of Blockchain Payment ChannelsDi Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu 0012, Wu Wen, Kui Ren 0001, Chun Chen 0001. 4053-4072 [doi]
- Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency ExchangesDanlei Xiao, Chuan Zhang 0003, Haotian Deng, Jinwen Liang, Licheng Wang, Liehuang Zhu. 4073-4092 [doi]
- Automated Soundness and Completeness Vetting of Polygon zkEVMXinghao Peng, Zhiyuan Sun, Kunsong Zhao, Zuchao Ma, Zihao Li 0001, Jinan Jiang, Xiapu Luo, Yinqian Zhang. 4093-4108 [doi]
- Does Finality Gadget Finalize Your Block? A Case Study of Binance ConsensusRujia Li 0001, Jingyuan Ding, Qin Wang 0008, Keting Jia, Haibin Zhang, Sisi Duan. 4109-4125 [doi]
- Following Devils' Footprint: Towards Real-time Detection of Price Manipulation AttacksBosi Zhang, Ningyu He, Xiaohui Hu, Kai Ma, Haoyu Wang. 4127-4145 [doi]
- Recover from Excessive Faults in Partially-Synchronous BFT SMRTiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate. 4147-4166 [doi]
- TockOwl: Asynchronous Consensus with Fault and Network AdaptabilityMinghang Li, Qianhong Wu, Zhipeng Wang 0009, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding. 4167-4186 [doi]
- Thunderdome: Timelock-Free Rationally-Secure Virtual ChannelsZeta Avarikioti, Yuheng Wang, Yuyi Wang 0001. 4187-4204 [doi]
- The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel VulnerabilitiesLukas Maar, Florian Draschbacher, Lorenz Schumm, Ernesto MartÃnez GarcÃa, Stefan Mangard. 4205-4224 [doi]
- NASS: Fuzzing All Native Android System Services with Interface Awareness and CoveragePhilipp Mao, Marcel Busch, Mathias Payer. 4225-4243 [doi]
- Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in AndroidParjanya Vyas, Haseeb Ur Rehman Faheem, Yousra Aafer, N. Asokan. 4245-4264 [doi]
- Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating SystemHaochen Gong, Siyu Hong, Shenyi Yang, Rui Chang, Wenbo Shen, Ziqi Yuan, Chenyang Yu, Yajin Zhou. 4265-4284 [doi]
- Scoop: Mitigation of Recapture Attacks on Provenance-Based Media AuthenticationYuxin (Myles) Liu, Habiba Farrukh, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik. 4285-4304 [doi]
- Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake DetectorsSeongbin Park, Alexander Vilesov, Jinghuai Zhang, Hossein Khalili, Yuan Tian, Achuta Kadambi, Nader Sehatbakhsh. 4305-4324 [doi]
- Principled and Automated Approach for Investigating AR/VR AttacksMuhammad Shoaib, Alex Suh, Wajih Ul Hassan. 4325-4344 [doi]
- Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root PrivilegesJunming Chen, Xiaoyue Ma, Lannan Luo, Qiang Zeng 0001. 4345-4362 [doi]
- ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade agoFlorian Draschbacher, Lukas Maar, Mathias Oberhuber, Stefan Mangard. 4363-4379 [doi]
- PATCHAGENT: A Practical Program Repair Agent Mimicking Human ExpertiseZheng Yu 0003, Ziyi Guo, Yuhang Wu 0003, Jiahao Yu 0001, Meng Xu 0001, Dongliang Mu, Yan Chen 0004, Xinyu Xing 0001. 4381-4400 [doi]
- Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM AnalysisYoungjoon Kim, Sunguk Shin 0001, Hyoungshick Kim, Ji Won Yoon. 4401-4419 [doi]
- SoK: Automated Vulnerability Repair: Methods, Tools, and AssessmentsYiwei Hu, Zhen Li 0027, Kedie Shu, Shenghua Guan, Deqing Zou, Shouhuai Xu, Bin Yuan, Hai Jin 0001. 4421-4440 [doi]
- SoK: Towards Effective Automated Vulnerability RepairYing Li 0095, Faysal Hossain Shezan, Bomin Wei, Gang Wang 0011, Yuan Tian 0001. 4441-4462 [doi]
- VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature NormalizationYeting Li, Yecheng Sun, Zhiwu Xu 0001, Haiming Chen 0001, Xinyi Wang, Hengyu Yang, Huina Chao, Cen Zhang, Yang Xiao 0011, Yanyan Zou 0002, Feng Li 0045, Wei Huo. 4463-4479 [doi]
- APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability PatchingYu Nong, Haoran Yang, Long Cheng 0005, Hongxin Hu, Haipeng Cai. 4481-4500 [doi]
- RangeSanitizer: Detecting Memory Errors with Efficient Range ChecksFloris Gorter, Cristiano Giuffrida. 4501-4519 [doi]
- DISPATCH: Unraveling Security Patches from Entangled Code ChangesShiYu Sun, Yunlong Xing, Xinda Wang 0001, Shu Wang 0004, Qi Li 0002, Kun Sun 0001. 4521-4540 [doi]
- Attacker Control and Bug PrioritizationGuilhem Lacombe, Sébastien Bardin. 4541-4560 [doi]
- VoiceWukong: Benchmarking Deepfake Voice DetectionZiwei Yan, Yanjie Zhao 0001, Haoyu Wang 0001. 4561-4580 [doi]
- SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech SynthesisZhisheng Zhang, Derui Wang, Qianyi Yang, Pengyang Huang, Junhan Pu, Yuxin Cao, Kai Ye, Jie Hao 0001, Yixian Yang. 4581-4600 [doi]
- AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright ProtectionHanqing Guo, Junfeng Guo, Bocheng Chen, Yuanda Wang, Xun Chen, Heng Huang, Qiben Yan, Li Xiao 0001. 4601-4620 [doi]
- SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?Marvin Büchel, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein 0003, Giancarlo Guizzardi, Marco Caselli, Andrea Continella, Maarten van Steen, Andreas Peter 0001, Thijs van Ede. 4621-4641 [doi]
- Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition SystemsWeifei Jin, Yuxin Cao, Junjie Su, Derui Wang, Yedi Zhang, Minhui Xue 0001, Jie Hao 0001, Jin Song Dong, Yixian Yang. 4643-4662 [doi]
- AudioMarkNet: Audio Watermarking for Deepfake Speech DetectionWei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Seyit Camtepe. 4663-4682 [doi]
- SoK: Efficiency Robustness of Dynamic Deep Learning SystemsRavishka Rathnasuriya, Tingxi Li, Zexin Xu, Zihe Song, Mirazul Haque, Simin Chen, Wei Yang 0013. 4683-4702 [doi]
- From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language ModelsYihan Ma 0001, Xinyue Shen 0001, Yiting Qu, Ning Yu 0006, Michael Backes 0001, Savvas Zannettou, Yang Zhang 0016. 4703-4722 [doi]
- When Translators Refuse to Translate: A Novel Attack to Speech Translation SystemsHaolin Wu, Chang Liu 0089, Jing Chen 0003, RuiYing Du, Kun He 0008, Yu Zhang 0036, Cong Wu 0003, Tianwei Zhang 0004, Qing Guo 0005, Jie Zhang 0073. 4723-4740 [doi]
- MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI EcosystemXingan Gao, Xiaobing Sun 0001, Sicong Cao, Kaifeng Huang 0001, Di Wu, Xiaolei Liu, Xingwei Lin, Yang Xiang. 4741-4758 [doi]
- VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial RobustnessSide Liu, Jiang Ming 0002, Yilin Zhou, Jianming Fu, Guojun Peng. 4759-4778 [doi]
- NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search EnginesMingxuan Liu, Yunyi Zhang, Lijie Wu, Baojun Liu, Geng Hong, Yiming Zhang 0009, Hui Jiang, Jia Zhang 0004, Haixin Duan, Min Zhang 0054, Wei Guan, Fan Shi 0003, Min Yang 0002. 4779-4798 [doi]
- The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal StudyArmin Sarabi, Ziyuan Huang, Chenlan Wang 0001, Tai Karir, Mingyan Liu. 4799-4818 [doi]
- High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware AttributionMax van der Horst, Ricky Kho, Olga Gadyatskaya, Michel Mollema, Michel van Eeten, Yury Zhauniarovich. 4819-4838 [doi]
- DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on TelegramSayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohamaddi, Shirin Nilizadeh. 4839-4858 [doi]
- "Please don't send that bot anything": A Mixed-methods Study of Personal Impersonation Attacks Targeting Digital Payments on Social MediaHoang Dai Nguyen, Sumit Dhungana, Madhulika Itha, Phani Vadrevu. 4859-4878 [doi]
- 'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United KingdomSharad Agarwal, Emma Harvey, Enrico Mariconti, Guillermo Suarez-Tangil, Marie Vasek. 4879-4896 [doi]
- Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware DetectionYinyuan Zhang, Cuiying Gao, Yueming Wu 0001, Shihan Dou, Cong Wu 0003, Ying Zhang 0066, Wei Yuan 0001, Yang Liu 0003. 4897-4916 [doi]
- Hobbit: Space-Efficient zkSNARK with Optimal Prover TimeChristodoulos Pappas, Dimitrios Papadopoulos 0001. 4917-4936 [doi]
- A Tale of Two Worlds, a Formal Story of WireGuard HybridizationPascal Lafourcade 0001, Dhekra Mahmoud, Sylvain Ruhault, Abdul Rahman Taleb. 4937-4956 [doi]
- Improved Secure Two-party Computation from a Geometric PerspectiveHao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu 0003. 4957-4974 [doi]
- Secure Caches for Compartmentalized SoftwareKerem Arikan, Huaxin Tang, Williams Zhang Cen, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001. 4975-4994 [doi]
- zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with CallbacksMaurice Shih, Michael Rosenberg, Hari Kailad, Ian Miers. 4995-5014 [doi]
- A Formal Analysis of Apple's iMessage PQ3 ProtocolFelix Linker, Ralf Sasse, David A. Basin. 5015-5034 [doi]
- Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with VerdictZhengyao Lin, Michael Mcloughlin, Pratap Singh, Rory Brennan-Jones, Paul Hitchcox, Joshua Gancher, Bryan Parno. 5035-5052 [doi]
- PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data AnalyticsHaobin Hiroki Chen, Hongbo Chen, Mingshen Sun, Chenghong Wang, Xiaofeng Wang 0001. 5053-5070 [doi]
- OwlC: Compiling Security Protocols to Verified, Secure, High-Performance LibrariesPratap Singh, Joshua Gancher, Bryan Parno. 5071-5090 [doi]
- On the Virtues of Information Security in the UK Climate MovementMikaela Brough, Rikke Bjerg Jensen, Martin R. Albrecht. 5091-5110 [doi]
- Tracking the Takes and Trajectories of English-Language News Narratives across Trustworthy and Worrisome WebsitesHans W. A. Hanley, Emily Okabe, Zakir Durumeric. 5111-5130 [doi]
- "No, I Can't Be a Security Personnel on Your Phone": Security and Privacy Threats From Sharing Infrastructure in Rural GhanaEmmanuel Tweneboah, Collins W. Munyendo, Yixin Zou. 5131-5148 [doi]
- Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience ActLorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin. 5149-5168 [doi]
- Characterizing the MrDeepFakes Sexual Deepfake MarketplaceCatherine Han, Anne Li, Deepak Kumar 0006, Zakir Durumeric. 5169-5188 [doi]
- Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to CollusionsJhih-Yi Hsieh, Aditi Raghunathan, Nihar B. Shah. 5189-5208 [doi]
- Dormant: Defending against Pose-driven Human Image AnimationJiachen Zhou 0001, Mingsi Wang, Tianlin Li, Guozhu Meng, Kai Chen 0012. 5209-5228 [doi]
- The Conspiracy Money Machine: Uncovering Telegram's Conspiracy Channels and their Profit ModelVincenzo Imperati, Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, Francesco Sassi. 5229-5246 [doi]
- SoK: Machine Learning for Misinformation DetectionMadelyne Xiao, Jonathan R. Mayer. 5247-5266 [doi]
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower LayersTuan Dinh Hoang, Taekkyung Oh, CheolJun Park, Insu Yun, Yongdae Kim. 5267-5286 [doi]
- CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core NetworksYilu Dong, Tianchang Yang, Abdullah Al Ishtiaq, Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Md. Sultan Mahmud, Syed Rafiul Hussain. 5287-5306 [doi]
- GLaDoS: Location-aware Denial-of-Service of Cellular NetworksSimon Erni, Martin Kotuliak, Richard Baker 0008, Ivan Martinovic, Srdjan Capkun. 5307-5325 [doi]
- AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G CommunicationYang Yang 0026, Guomin Yang, Yingjiu Li, Minming Huang, Zilin Shen, Imtiaz Karim, Ralf Sasse, David A. Basin, Elisa Bertino, Jian Weng 0001, HweeHwa Pang, Robert H. Deng. 5327-5345 [doi]
- A Thorough Security Analysis of BLE Proximity Tracking ProtocolsXiaofeng Liu 0013, Chaoshun Zuo, Qinsheng Hou, Pengcheng Ren, Jianliang Wu 0002, Qingchuan Zhao, Shanqing Guo. 5347-5364 [doi]
- Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular NetworksKazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino. 5365-5384 [doi]
- SNI5GECT: A Practical Approach to Inject aNRchy into 5G NRShijie Luo, Matheus E. Garbelini, Sudipta Chattopadhyay 0001, Jianying Zhou 0001. 5385-5404 [doi]
- Preventing Artificially Inflated SMS Attacks through Large-Scale Traffic InspectionJun Ho Huh, Hyejin Shin, Sunwoo Ahn, Hayoon Yi, Joonho Cho, Taewoo Kim, Minchae Lim, Nu-El Choi. 5405-5423 [doi]
- eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM EcosystemMaryam Motallebighomi, Jason Veara, Evangelos Bitsikas, Aanjhan Ranganathan. 5425-5444 [doi]
- Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and DefensesEhsanul Kabir, Lucas Craig, Shagufta Mehnaz. 5445-5463 [doi]
- Enhanced Label-Only Membership Inference Attacks with Fewer QueriesHao Li 0092, Zheng Li 0023, Siyuan Wu, Yutong Ye 0002, Min Zhang 0043, Dengguo Feng, Yang Zhang 0016. 5465-5483 [doi]
- For Human Ears Only: Preventing Automated Monitoring on Voice DataIrtaza Shahid, Nirupam Roy. 5485-5503 [doi]
- Towards a Re-evaluation of Data Forging Attacks in PracticeMohamed Suliman 0002, Anisa Halimi, Swanand Ravindra Kadhe, Nathalie Baracaldo, Douglas J. Leith. 5505-5524 [doi]
- Free Record-Level Privacy Risk Evaluation Through Artifact-Based MethodsJoseph Pollock, Igor Shilov, Euodia Dodd, Yves-Alexandre de Montjoye. 5525-5544 [doi]
- Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack PerspectiveNima Naderloui, Shenao Yan, Binghui Wang, Jie Fu 0003, Wendy Hui Wang, Weiran Liu, Yuan Hong 0001. 5545-5564 [doi]
- Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU SystemJuyang Bai, Md Hafizul Islam Chowdhuryy, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Deliang Fan. 5565-5582 [doi]
- LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or AccuracyKevin Nam, Youyeon Joo, Dongju Lee, Seungjin Ha, Hyunyoung Oh, Hyungon Moon, Yunheung Paek. 5583-5600 [doi]
- SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and BenchmarkRui Wen 0002, Yiyong Liu, Michael Backes 0001, Yang Zhang 0016. 5601-5620 [doi]
- McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic AnalysisPatrick Jattke, Michele Marazzi, Flavien Solt, Max Wipfli, Stefan Gloor, Kaveh Razavi. 5621-5640 [doi]
- Not so Refreshing: Attacking GPUs using RFM Rowhammer MitigationRavan Nazaraliyev, Yicheng Zhang, Sankha Baran Dutta, Andrés Márquez 0001, Kevin J. Barker, Nael B. Abu-Ghazaleh. 5641-5660 [doi]
- Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh CommandsFinn de Ridder, Patrick Jattke, Kaveh Razavi. 5661-5678 [doi]
- ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC MemoryNureddin Kamadan, Walter Wang, Stephan van Schaik, Christina Garman, Daniel Genkin, Yuval Yarom. 5679-5698 [doi]
- Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-ChannelsYuqin Yan, Wei Huang 0027, Ilya Grishchenko, Gururaj Saileshwar, Aastha Mehta, David Lie. 5699-5717 [doi]
- GPUHammer: Rowhammer Attacks on GPU Memories are PracticalChris S. Lin, Joyce Qu, Gururaj Saileshwar. 5719-5738 [doi]
- SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic ExecutionDaniel Weber 0007, Lukas Gerlach 0001, Leon Trampert, Youheng Lü, Jo Van Bulck, Michael Schwarz 0001. 5739-5758 [doi]
- Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory EncryptionWei Peng, Yinshuai Li, Yinqian Zhang. 5759-5776 [doi]
- Breaking the Blindfold: Deep Learning-based Blind Side-channel AnalysisAzade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek. 5777-5796 [doi]
- Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated ApproachQinge Xie, Karthik Ramakrishnan, Frank Li 0001. 5797-5816 [doi]
- Navigating Cookie Consent Violations Across the GlobeBrian Tang, Duc Bui, Kang G. Shin. 5817-5836 [doi]
- Websites' Global Privacy Control Compliance at Scale and over TimeKatherine Hausladen, Oliver Wang, Sophie Eng, Jocelyn Wang, Francisca Wijaya, Matthew May, Sebastian Zimmeck. 5837-5856 [doi]
- Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years' Special Privacy Rectification CampaignsTao Jing, Yao Li, Jingzhou Ye, Jie Wang, Xueqiang Wang. 5857-5874 [doi]
- A Stakeholder-Based Framework to Highlight Tensions when Implementing Privacy FeaturesJulia Netter, Tim Nelson, Skyler Austen, Eva Lau, Colton Rusch, Malte Schwarzkopf, Kathi Fisler. 5875-5892 [doi]
- Who Pays Whom? Anonymous EMV-Compliant Contactless PaymentsCharles Olivier-Anclin, Ioana Boureanu, Liqun Chen 0002, Christopher J. P. Newton, Tom Chothia, Anna Clee, Andreas Kokkinis, Pascal Lafourcade 0001. 5893-5912 [doi]
- Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and BeyondYushu Zhang 0001, Yuanyuan Sun, Shuren Qi, Zhongyun Hua, Wenying Wen, Yuming Fang. 5913-5930 [doi]
- SpeechGuard: Recoverable and Customizable Speech Privacy ProtectionJingmiao Zhang, Suyuan Liu, Jiahui Hou, Zhiqiang Wang, Haikuo Yu, Xiang-Yang Li 0001. 5931-5948 [doi]
- Shimmer: a Provably Secure Steganography Based on Entropy Collecting MechanismMinhao Bai, Kaiyi Pang, Guorui Liao, Jinshuai Yang, Yongfeng Huang 0001. 5949-5965 [doi]
- How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency PracticesJan H. Klemmer, Juliane Schmüser, Fabian Fischer 0009, Jacques Suray, Jan-Ulrich Holtgrave, Simon Lenau, Byron M. Lowens, Florian Schaub, Sascha Fahl. 5967-5986 [doi]
- Understanding How Users Prepare for and React to Smartphone TheftDivyanshu Bhardwaj, Sumair Ijaz Hashmi, Katharina Krombholz, Maximilian Golla. 5987-6005 [doi]
- Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental HealthJabari Kwesi, Jiaxun Cao, Riya Manchanda, Pardis Emami Naeini. 6007-6024 [doi]
- Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use DrugsJiliang Li, Nora Sinong Lu, Isaak Hanimann, Janice Jianing Si, Dazhao Cheng, Xiaobo Zhou 0002, Kanye Ye Wang. 6025-6044 [doi]
- Privacy Solution or Menace? Investigating Perceptions of Radio-Frequency SensingMaximiliane Windl, Omer Akgul, Nathan Malkin, Lorrie Faith Cranor. 6045-6064 [doi]
- Navigating Security and Privacy Threats in Homeless Service ProvisionYuxi Wu, Ruoxi Zhang, Shiyue Liu, Mufei He, Aidan Hong, Jeremy J. Northup, Calla Kainaroi, Fei Fang 0001, Hong Shen 0004. 6065-6084 [doi]
- Security and Privacy Advice for UPI Users in IndiaDeepthi Mungara, Harshini Sri Ramulu, Yasemin Acar. 6085-6103 [doi]
- "Helps me Take the Post With a Grain of Salt: " Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on XFilipo Sharevski, Verena Distler, Florian Alt. 6105-6124 [doi]
- As Advertised? Understanding the Impact of Influencer VPN AdsOmer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek. 6125-6142 [doi]
- Fuzzing the PHP Interpreter via Dataflow FusionYuancheng Jiang, Chuqi Zhang, Bonan Ruan, Jiahao Liu 0005, Manuel Rigger, Roland H. C. Yap, Zhenkai Liang. 6143-6158 [doi]
- Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant TransformationLingming Zhang, Binbin Zhao, Jiacheng Xu, Peiyu Liu 0003, Qinge Xie, Yuan Tian 0001, Jianhai Chen, Shouling Ji. 6159-6178 [doi]
- MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT BrokersXiangpu Song, Jianliang Wu 0002, Yingpei Zeng, Hao Pan, Chaoshun Zuo, Qingchuan Zhao, Shanqing Guo. 6179-6197 [doi]
- ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply ChainsPeng Deng, Lei Zhang 0096, Yuchuan Meng, Zhemin Yang, Yuan Zhang 0009, Zhemin Yang. 6199-6218 [doi]
- IDFuzz: Intelligent Directed Grey-box FuzzingYiyang Chen, Chao Zhang 0008, Long Wang, Wenyu Zhu, Changhua Luo, Nuoqi Gui, Zheyu Ma, Xingjian Zhang 0009, Bingkai Su. 6219-6238 [doi]
- Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern FeedbackJifan Xiao, Peng Jiang 0007, Zixi Zhao, Ruizhe Huang, Junlin Liu, Ding Li 0001. 6239-6258 [doi]
- BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol StacksWei-Che Kao, Yen-Chia Chen, Yu-sheng Lin, Yu-Cheng Yang, Chi-Yu Li, Chun-Ying Huang. 6259-6278 [doi]
- ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer SpaceChuyang Chen, Brendan Dolan-Gavitt, Chuyang Chen. 6279-6298 [doi]
- Hybrid Language Processor Fuzzing via LLM-Based Constraint SolvingYupeng Yang, Shenglong Yao, Jizhou Chen, Wenke Lee. 6299-6318 [doi]
- Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNsXiang Li, Ying Meng, Junming Chen, Lannan Luo, Qiang Zeng 0001. 6319-6337 [doi]
- From Purity to Peril: Backdooring Merged Models From "Harmless" Benign ComponentsLijin Wang, Jingjing Wang, Tianshuo Cong, Xinlei He 0001, Zhan Qin, Xinyi Huang 0001. 6339-6358 [doi]
- Revisiting Training-Inference Trigger Intensity in Backdoor AttacksChenhao Lin, Chenyang Zhao 0006, Shiwei Wang, Longtian Wang, Chao Shen 0001, Zhengyu Zhao 0001. 6359-6378 [doi]
- Persistent Backdoor Attacks in Continual LearningZhen Guo, Abhinav Kumar 0007, Reza Tourani. 6379-6397 [doi]
- Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine UnlearningDayong Ye, Tianqing Zhu, Jiayang Li, Kun Gao 0006, Bo Liu 0001, Leo Yu Zhang, Wanlei Zhou 0001, Yang Zhang 0016. 6399-6418 [doi]
- DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited DataDorde Popovic, Amin Sadeghi, Ting Yu 0001, Sanjay Chawla, Issa Khalil. 6419-6438 [doi]
- SoK: Gradient Inversion Attacks in Federated LearningVincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento. 6439-6459 [doi]
- PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated LearningXiaoyi Pang, Chenxu Zhao, Zhibo Wang 0001, Jiahui Hu, Yinggui Wang, Lei Wang, Tao Wei 0002, Kui Ren 0001, Chun Chen 0001. 6461-6479 [doi]
- Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning CompletenessCheng-Long Wang 0003, Qi Li, Zihang Xiang, Yinzhi Cao, Di Wang 0015. 6481-6500 [doi]
- Addressing the Address Books' (Interdependent) Privacy IssuesKavous Salehzadeh Niksirat, Lev Velykoivanenko, Samuel Mätzler, Stephan Mulders, Aurelia Tamò-Larrieux, Marc-Olivier Boldi, Mathias Humbert, Kévin Huguenin. 6501-6520 [doi]
- HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the WebMalte Wessels, Simon Koch 0001, Jan Drescher, Louis Bettels, David Klein 0001, Martin Johns. 6521-6539 [doi]
- I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-appsYifeng Cai, Ziqi Zhang, Mengyu Yao, Junlin Liu, Xiaoke Zhao, Xinyi Fu, Ruoyu Li, Zhe Liu 0001, Xiangqun Chen, Yao Guo 0001, Ding Li 0001. 6541-6560 [doi]
- Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video CallsFelix Weissberg, Jan Malte Hilgefort, Steve Grogorick, Daniel Arp, Thorsten Eisenhofer, Martin Eisemann, Konrad Rieck. 6561-6580 [doi]
- Endangered Privacy: Large-Scale Monitoring of Video Streaming ServicesMartin Björklund, Romaric Duvignau. 6581-6597 [doi]
- Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group ChatsKai-Hsiang Chou, Yi-Min Lin, Yi-An Wang, Jonathan Weiping Li, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao. 6599-6618 [doi]
- EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave RadarXin Yao 0002, Kecheng Huang, Yimin Chen 0004, Jiawei Guo, Jie Tang, Ming Zhao 0007. 6619-6638 [doi]
- DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic DiffractionXiang Zhang 0011, Jie Zhang 0073, Huan Yan 0004, Jinyang Huang, Zehua Ma, Bin Liu 0016, Meng Li 0006, Kejiang Chen, Qing Guo 0005, Tianwei Zhang 0004, Zhi Liu 0002. 6639-6658 [doi]
- Double-Edged Shield: On the Fingerprintability of Customized Ad BlockersSaiid El Hajj Chehade, Ben Stock, Carmela Troncoso. 6659-6678 [doi]
- Encrypted Access Logging for Online Accounts: Device Attributions without Device TrackingCarolina Ortega Pérez, Alaa Daffalla. 6679-6697 [doi]
- Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous BlocklistableKeitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez. 6699-6716 [doi]
- How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum ProtocolBenedikt Auerbach, Yevgeniy Dodis, Daniel Jost 0001, Shuichi Katsumata, Rolfe Schmidt. 6717-6736 [doi]
- S/MINE: Collecting and Analyzing S/MIME Certificates at ScaleGurur Öndarö, Jonas Kaspereit, Samson Umezulike, Christoph Saatjohann, Fabian Ising, Sebastian Schinzel. 6737-6756 [doi]
- Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via RowhammerJunkai Liang, Zhi Zhang 0001, Xin Zhang 0110, Qingni Shen, Yansong Gao 0001, Xingliang Yuan, Haiyang Xue, Pengfei Wu 0003, Zhonghai Wu. 6757-6776 [doi]
- Bundled Authenticated Key Exchange: A Concrete Treatment of Signal's Handshake Protocol and Post-Quantum SecurityKeitaro Hashimoto, Shuichi Katsumata, Thom Wiggers. 6777-6796 [doi]
- Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring SignaturesShuichi Katsumata, Guilhem Niot, Ida Tucker, Thom Wiggers. 6797-6816 [doi]
- SparSamp: Efficient Provably Secure Steganography Based on Sparse SamplingYaofei Wang, Gang Pei, Kejiang Chen, Jinyang Ding, Chao Pan, Weilong Pang, Donghui Hu, Weiming Zhang 0001. 6817-6835 [doi]
- A Framework for Designing Provably Secure SteganographyGuorui Liao, Jinshuai Yang, Weizhi Shao, Yongfeng Huang 0001. 6837-6856 [doi]
- REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance DecodingTongwei Ren, Ronghan Che, Guin Gilman, Lorenzo De Carli, Robert J. Walls. 6857-6875 [doi]
- BLens: Contrastive Captioning of Binary Functions using Ensemble EmbeddingTristan Benoit, Yunru Wang, Moritz Dannehl, Johannes Kinder. 6877-6896 [doi]
- TRex: Practical Type Reconstruction for Binary CodeJay Bosamiya, Maverick Woo, Bryan Parno. 6897-6915 [doi]
- Vest: Verified, Secure, High-Performance Parsing and Serialization for RustYi Cai, Pratap Singh, Zhengyao Lin, Jay Bosamiya, Joshua Gancher, Milijana Surbatovich, Bryan Parno. 6917-6935 [doi]
- LEMIX: Enabling Testing of Embedded Applications as Linux ApplicationsSai Ritvik Tanksalkar, Siddharth Muralee, Srihari Danduri, Paschal Amusuo, Antonio Bianchi, James C. Davis 0001, Aravind Kumar Machiry. 6937-6956 [doi]
- TYPEPULSE: Detecting Type Confusion Bugs in Rust ProgramsHung-Mao Chen, Xu He, Shu Wang 0004, Xiaokuan Zhang, Kun Sun 0001. 6957-6976 [doi]
- From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result VerificationAndrew Bao, Wenjia Zhao, Yanhao Wang, Yueqiang Cheng, Stephen McCamant, Pen-Chung Yew. 6977-6997 [doi]
- Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input GeneratorsKunpeng Zhang, Zongjie Li, Daoyuan Wu, Shuai Wang 0011, Xin Xia 0001. 6999-7018 [doi]
- Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File OperationsBocheng Xiang, Yuan Zhang 0009, Fengyu Liu, Hao Huang, Zihan Lin, Min Yang 0002. 7019-7038 [doi]
- GNSS-WASP: GNSS Wide Area SPoofingChristopher Tibaldo, Harshad Sathaye, Giovanni Camurati, Srdjan Capkun. 7039-7058 [doi]
- LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting SatellitesDaniele Coppola, Arslan Mumtaz, Giovanni Camurati, Harshad Sathaye, Mridula Singh, Srdjan Capkun. 7059-7075 [doi]
- A Comprehensive Formal Security Analysis of OPC UAVincent Diemunsch, Lucca Hirschi, Steve Kremer. 7077-7096 [doi]
- Towards Internet-Based State Learning of TLS State MachinesMarcel Maehren, Nurullah Erinola, Robert Merget, Jörg Schwenk, Juraj Somorovsky. 7097-7116 [doi]
- Misty Registry: An Empirical Study of Flawed Domain Registry OperationMingming Zhang, Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang 0054, Fan Shi 0003, Chengxi Xu. 7117-7134 [doi]
- Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling HostsAngelos Beitis, Mathy Vanhoef. 7135-7152 [doi]
- GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion DetectionKonrad Wolsing, Eric Wagner 0003, Luisa Lux, Klaus Wehrle, Martin Henze. 7153-7172 [doi]
- ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection SystemsBaoxiang Jiang, Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui, Shahrear Iqbal, Xueyuan Han, Thomas Pasquier. 7173-7192 [doi]
- Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection SystemsTristan Bilot, Baoxiang Jiang, Zefeng Li, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui, Thomas Pasquier. 7193-7212 [doi]
- CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius MaximizationDerui Wang, Kristen Moore, Diksha Goel, Minjune Kim, Gang Li 0009, Yang Li 0182, Robin Doss, Minhui Xue 0001, Bo Li 0026, Seyit Camtepe, Liming Zhu 0001. 7213-7232 [doi]
- Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership VerificationYijia Chang, Hanrui Jiang, Chao Lin, Xinyi Huang 0001, Jian Weng 0001. 7233-7250 [doi]
- AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic CertificationJiate Li, Binghui Wang. 7251-7270 [doi]
- LightShed: Defeating Perturbation-based Image Copyright ProtectionsHanna Foerster, Sasha Behrouzi, Phillip Rieger, Murtuza Jadliwala, Ahmad-Reza Sadeghi. 7271-7290 [doi]
- Robustifying ML-powered Network Classifiers with PANTSMinhao Jin, Maria Apostolaki. 7291-7310 [doi]
- THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning ModelsYujin Huang, Zhi Zhang 0001, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen 0001. 7311-7330 [doi]
- A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring WatermarksJunhua Lin, Marc Juarez. 7331-7348 [doi]
- CertTA: Certified Robustness Made Practical for Learning-Based Traffic AnalysisJinzhu Yan, Zhuotao Liu, Yuyang Xie, Shiyu Liang, Lin Liu, Ke Xu 0002. 7349-7368 [doi]
- Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object DetectionRyunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka, Tatsuya Mori. 7369-7386 [doi]
- From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative PerceptionChenyi Wang, Raymond Muller, Ruoyu Song 0001, Jean Philippe Monteuuis, Jonathan Petit, Yanmao Man, Ryan M. Gerdes, Z. Berkay Celik, Ming Li 0003. 7387-7406 [doi]
- Await() a Second: Evading Control Flow Integrity by Hijacking C++ CoroutinesMarcos Bajo, Christian Rossow. 7407-7426 [doi]
- System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the SystemJennifer Miller, Manas Ghandat, Kyle Zeng, hongkai Chen, Abdelouahab Benchikh, Tiffany Bao, Ruoyu Wang 0001, Adam Doupé, Yan Shoshitaishvili. 7427-7446 [doi]
- When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel LeaksLukas Maar, Lukas Giner, Daniel Gruss, Stefan Mangard. 7447-7465 [doi]
- Approximation Enforced Execution of Untrusted Linux Kernel ExtensionsHao Sun 0021, Zhendong Su 0001. 7467-7485 [doi]
- EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OSJiaqin Yan, Qiujiang Chen, Shuai Zhou, Yuke Peng, Guoxing Chen, Yinqian Zhang. 7487-7506 [doi]
- The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading AttacksXinhui Shao, Zhen Ling 0001, Yue Zhang 0025, Huaiyu Yan, Yumeng Wei, Lan Luo, Zixia Liu, Junzhou Luo, Xinwen Fu. 7507-7524 [doi]
- Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation ModelingFuchen Ma, Yuanliang Chen, Yuanhang Zhou, Zhen Yan, Hao Sun 0021, Yu Jiang 0001. 7525-7543 [doi]
- Subverting the Secure VM by Exploiting PCIe DevicesCheolwoo Myung, Sangho Lee 0001, Byoungyoung Lee. 7525-7540 [doi]
- Save what must be saved: Secure context switching with SailorNeelu S. Kalani, Thomas Bourgeat, Guerney D. H. Hunt, Wojciech Ozga. 7545-7561 [doi]
- Flexway O-Sort: Enclave-Friendly and Optimal Oblivious SortingTianyao Gu, Yilei Wang, Afonso Tinoco, Bingnan Chen, Ke Yi 0001, Elaine Shi. 7563-7582 [doi]
- Treebeard: A Scalable and Fault Tolerant ORAM DatastoreAmin Setayesh, Cheran Mahalingam, Emily Chen, Sujaya Maiyya. 7583-7602 [doi]
- Learning from Functionality Outputs: Private Join and Compute in the Real WorldFrancesca Falzon, Tianxin Tang. 7603-7622 [doi]
- ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted QueriesLongxiang Wang, Lei Xu 0019, Yufei Chen 0001, Ying Zou 0029, Cong Wang 0001. 7623-7641 [doi]
- Distributed Private Aggregation in Graph Neural NetworksHuanhuan Jia, Yuanbo Zhao, Kai Dong 0001, Zhen Ling 0001, Ming Yang 0001, Junzhou Luo, Xinwen Fu. 7643-7662 [doi]
- Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine LearningLushan Song, Qizhi Zhang, Yu Lin, Haoyu Niu, Daode Zhang, Zheng Qu, Weili Han, Jue Hong, Quanwei Cai 0003, Ye Wu. 7663-7682 [doi]
- Assuring Certified Database Utility in Privacy-Preserving Database FingerprintingMingYang Song, Zhongyun Hua, Yifeng Zheng 0001, Tao Xiang 0001, Guoai Xu, Xingliang Yuan. 7683-7702 [doi]
- Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic EncryptionHaris Smajlovic, David Froelicher, Ariya Shajii, Bonnie Berger, Hyunghoon Cho, Ibrahim Numanagic. 7703-7722 [doi]
- Private Set Intersection and other Set Operations in the Third Party SettingFoo Yee Yeo, Jason H. M. Ying. 7723-7742 [doi]
- Detecting Compromise of Passkey Storage on the CloudMazharul Islam 0002, Sunpreet S. Arora, Rahul Chatterjee 0001, Ke Coby Wang. 7743-7762 [doi]
- OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP TokenYihui Yan, Zhice Yang. 7763-7780 [doi]
- Practically Secure Honey Password Vaults: New Design and New Evaluation against Online GuessingHaibo Cheng, Fugeng Huang, Jiahong Yang, Wenting Li 0002, Ping Wang 0003. 7781-7798 [doi]
- Password Guessing Using Large Language ModelsYunkai Zou, Maoxiang An, Ding Wang 0002. 7799-7818 [doi]
- A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat ModelsAlaa Daffalla, Arkaprabha Bhattacharya, Jacob Wilder, Rahul Chatterjee 0001, Nicola Dell, Rosanna Bellini, Thomas Ristenpart. 7819-7838 [doi]
- CertPHash: Towards Certified Perceptual Hashing via Robust TrainingYuchen Yang, Qichang Liu, Christopher Brix, Huan Zhang 0001, Yinzhi Cao. 7839-7856 [doi]
- Phishing Attacks against Password Manager Browser ExtensionsClaudio Anliker, Daniele Lain, Srdjan Capkun. 7857-7876 [doi]
- Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication SystemsBowen Hu, Kuo Wang, Chip-Hong Chang. 7877-7896 [doi]
- Oblivious Digital TokensMihael Liskij, Xuhua Ding, Gene Tsudik, David A. Basin. 7897-7915 [doi]
- V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic WorkloadsBo Zhang 0119, Helei Cui, Xingliang Yuan, Zhiwen Yu 0001, Bin Guo 0001. 7917-7936 [doi]
- AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality AppsJohn Y. Kim, Chaoshun Zuo, Yanjie Zhao, Zhiqiang Lin 0001. 7937-7955 [doi]
- Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern AttacksGrace Jia, Alex Wong 0001, Anurag Khandelwal. 7957-7975 [doi]
- More is Less: Extra Features in Contactless Payments Break SecurityGeorge Pavlides, Anna Clee, Ioana Boureanu, Tom Chothia. 7977-7996 [doi]
- Current Affairs: A Security Measurement Study of CCS EV Charging DeploymentsMarcell Szakály, Sebastian Köhler 0005, Ivan Martinovic. 7997-8015 [doi]
- STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session TicketsSven Hebrok, Tim Leonhard Storm, Felix Matthias Cramer, Maximilian Radoy, Juraj Somorovsky. 8017-8034 [doi]
- Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South KoreaTaisic Yun, Suhwan Jeong, Yonghwa Lee, Seungjoo Kim, Hyoungshick Kim, Insu Yun, Yongdae Kim. 8035-8054 [doi]
- Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web SearchZeren Luo, Zifan Peng, Yule Liu, Zhen Sun 0001, Mingchen Li, Jingyi Zheng, Xinlei He 0001. 8055-8074 [doi]
- Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated DataAtilla Akkus, Masoud Poorghaffar Aghdam, Mingjie Li 0007, Junjie Chu 0002, Michael Backes 0001, Yuyang Zhang, Sinem Sav. 8075-8093 [doi]
- Cloak, Honey, Trap: Proactive Defenses Against LLM AgentsDaniel Ayzenshteyn, Roy Weiss, Yisroel Mirsky. 8095-8114 [doi]
- Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI AssistantsYash Vekaria, Aurelio Loris Canino, Jonathan Levitsky, Alex Ciechonski, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq. 8115-8134 [doi]
- SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference AttacksKaiyuan Zhang 0002, Siyuan Cheng 0005, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du 0002, Charles Fleming, Ashish Kundu, Xiangyu Zhang 0001, Ninghui Li. 8135-8154 [doi]
- Effective PII Extraction from LLMs through Augmented Few-Shot LearningShuai Cheng, Shu Meng, Haitao Xu 0002, Haoran Zhang, Shuai Hao 0001, Chuan Yue, Wenrui Ma, Meng Han, Fan Zhang 0010, Zhao Li 0007. 8155-8173 [doi]
- Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized PromptsSeongho Keum, Dongwon Shin, Leo Marchyok, Sanghyun Hong 0001, Sooel Son. 8175-8194 [doi]
- PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability CertaintyJinwen He, Yiyang Lu, Zijin Lin, Kai Chen 0012, Yue Zhao 0018. 8195-8214 [doi]
- JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and ManipulationShenyi Zhang, Yuchen Zhai, Keyan Guo, Hongxin Hu, Shengnan Guo, Zheng Fang 0014, Lingchen Zhao, Chao Shen 0001, Cong Wang 0001, Qian Wang 0002. 8215-8234 [doi]
- Web Execution Bundles: Reproducible, Accurate, and Archivable Web MeasurementsFlorian Hantke, Peter Snyder, Hamed Haddadi, Ben Stock. 8235-8253 [doi]
- XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent FuzzingYoukun Shi, Yuan Zhang 0009, Tianhao Bai, Feng Xue, Jiarun Dai, Fengyu Liu, Lei Zhang 0096, Xiapu Luo, Min Yang 0002. 8255-8272 [doi]
- ZIPPER: Static Taint Analysis for PHP Applications with Precision and EfficiencyXinyi Wang, Yeting Li, Jie Lu 0009, Shizhe Cui, Chenghang Shi, Qin Mai, Yunpei Zhang, Yang Xiao 0011, Feng Li 0045, Wei Huo. 8273-8291 [doi]
- The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOMZhengyu Liu, Theo Lee, Jianjia Yu, Zifeng Kang, Yinzhi Cao. 8293-8312 [doi]
- FIXX: FInding eXploits from eXamplesNeil P. Thimmaiah, Yashashvi J. Dave, Rigel Gjomemo, V. N. Venkatakrishnan. 8313-8327 [doi]
- Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web ContainersKeke Lian, Lei Zhang 0096, Haoran Zhao, Yinzhi Cao, Yongheng Liu, Fute Sun, Yuan Zhang 0009, Min Yang 0002. 8329-8348 [doi]
- Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability DetectionZihan Lin, Yuan Zhang 0009, Jiarun Dai, Xinyou Huang, Bocheng Xiang, Guangliang Yang 0001, Letian Yuan, Lei Zhang 0096, Tian Chen, Min Yang 0002. 8349-8366 [doi]
- Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object ManipulationXinyou Huang, Lei Zhang 0096, Yongheng Liu, Peng Deng, Yinzhi Cao, Yuan Zhang 0009, Min Yang 0002. 8367-8384 [doi]
- Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGVJelle Vos, Mauro Conti, Zekeriya Erkin. 8385-8402 [doi]
- Arbitrary-Threshold Fully Homomorphic Encryption with Lower ComplexityYijia Chang, Songze Li. 8403-8422 [doi]
- Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per CellWouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede. 8423-8440 [doi]
- Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic EncryptionSong Bian 0001, Haowen Pan, Jiaqi Hu, Zhou Zhang 0016, Yunhao Fu, Jiafeng Hua, Yunyi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan. 8441-8460 [doi]
- Qelect: Lattice-based Single Secret Leader Election Made PracticalYunhao Wang, Fan Zhang. 8461-8480 [doi]
- GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault InjectionLakshmi Likhitha Mankali, Mohammed Nabeel 0001, Faiq Raees, Michail Maniatakos, Ozgur Sinanoglu, Johann Knechtel. 8481-8500 [doi]
- H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAMLeqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang 0001. 8501-8520 [doi]
- OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory EnvironmentsApostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos 0001, Minos N. Garofalakis. 8521-8540 [doi]
- Efficient Ranking, Order Statistics, and Sorting under CKKSFederico Mazzone, Maarten H. Everts, Florian Hahn 0001, Andreas Peter 0001. 8541-8558 [doi]