default search action
31st NDSS 2024: San Diego, CA, USA
- 31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024. The Internet Society 2024
Summer Cycle
- Deepak Sirone Jegan, Michael M. Swift, Earlence Fernandes:
Architecting Trigger-Action Platforms for Security, Performance and Functionality. - Clement Fung, Eric Zeng, Lujo Bauer:
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice. - Ke Coby Wang, Michael K. Reiter:
Bernoulli Honeywords. - Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang, Mingming Zhang, Linkai Zheng, Xiang Li, Jianjun Chen, Haixin Duan, Yanzhong Lin, Qingfeng Pan:
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet. - Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. - Ryan Pickren, Tohid Shekari, Saman A. Zonouz, Raheem Beyah:
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware. - Srivatsan Sridhar, Onur Ascigil, Navin V. Keizer, François Genon, Sébastien Pierre, Yiannis Psaras, Etienne Rivière, Michal Król:
Content Censorship in the InterPlanetary File System. - Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li:
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models. - Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
CrowdGuard: Federated Backdoor Detection in Federated Learning. - Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li:
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. - Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu:
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack. - Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. - Jiameng Shi, Wenqiang Li, Wenwen Wang, Le Guan:
Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation. - Chendong Yu, Yang Xiao, Jie Lu, Yuekang Li, Yeting Li, Lian Li, Yifan Dong, Jian Wang, Jingyi Shi, Defang Bo, Wei Huo:
File Hijacking Vulnerability: The Elephant in the Room. - Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate:
Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus. - Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. - Qiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu:
GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity. - Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. - Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh:
IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. - Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. - Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz:
LARMix: Latency-Aware Routing in Mix Networks. - Huaiyu Yan, Zhen Ling, Haobo Li, Lan Luo, Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang, Junzhou Luo, Xinwen Fu:
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems. - Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka, Qi Alfred Chen:
LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies. - Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen:
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors. - Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. - Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. - Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
Modeling and Detecting Internet Censorship Events. - Qi Pang, Yuanyuan Yuan, Shuai Wang:
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models. - Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. - Ryan Wails, George Arnold Sullivan, Micah Sherr, Rob Jansen:
On Precisely Detecting Censorship Circumvention in Real-World Networks. - Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. - Zitao Chen, Karthik Pattabiraman:
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction. - Ya-Nan Li, Tian Qiu, Qiang Tang:
Pisces: Private and Compliable Cryptocurrency Exchange. - Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen:
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection. - Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin:
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing. - Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren:
Symphony: Path Validation at Scale. - Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model. - Guy Amit, Moshe Levy, Yisroel Mirsky:
Transpose Attack: Stealing Datasets with Bidirectional Training. - Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar:
TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts. - Zhengyi Li, Xiaojing Liao:
Understanding and Analyzing Appraisal Systems in the Underground Marketplaces. - Jiafan Wang, Sherman S. M. Chow:
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control.
Fall Cycle
- Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac:
50 Shades of Support: A Device-Centric Analysis of Android Security Updates. - Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin:
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. - Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. - Tarun Kumar Yadav, Kent E. Seamons:
A Security and Usability Analysis of Local Attacks Against FIDO2. - Yibin Xu, Jingyi Zheng, Boris Düdder, Tijs Slaats, Yongluan Zhou:
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance. - Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault:
A Unified Symbolic Analysis of WireGuard. - Hexuan Yu, Changlai Du, Yang Xiao, Angelos D. Keromytis, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Wenjing Lou:
AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials. - Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. - Tejas Kannan, Synthia Qia Wang, Max Sunog, Abraham Bueno de Mesquita, Nick Feamster, Henry Hoffmann:
Acoustic Keystroke Leakage on Smart Televisions. - Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren:
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token. - Bo Jiang, Jian Du, Qiang Yan:
AnonPSI: An Anonymity Assessment Framework for PSI. - Torsten Krauß, Jan König, Alexandra Dmitrienko, Christian Kanzow:
Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning. - Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang:
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization. - Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang:
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. - Cameron Morris, Amir Herzberg, Bing Wang, Samuel Secondo:
BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks. - Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan:
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking. - Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He:
CAGE: Complementing Arm CCA with GPU Extensions. - Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. - Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li:
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. - Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan:
CP-IoT: A Cross-Platform Monitoring System for Smart Home. - Nishit V. Pandya, Himanshu Kumar, Gokulnath Pillai, Vinod Ganapathy:
Decentralized Information-Flow Control for ROS2. - Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Kai Lu:
DeepGo: Predictive Directed Greybox Fuzzing. - Peiwei Hu, Ruigang Liang, Kai Chen:
DeGPT: Optimizing Decompiler Output with LLM. - Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi:
DEMASQ: Unmasking the ChatGPT Wordsmith. - Chang Liu, Jie Zhang, Tianwei Zhang, Xi Yang, Weiming Zhang, Nenghai Yu:
Detecting Voice Cloning Attacks via Timbre Watermarking. - Marian Harbach, Igor Bilogrevic, Enrico Bacis, Serena Chen, Ravjit Uppal, Andy Paicu, Elias Klim, Meggyn Watkins, Balazs Engedy:
Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome. - Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang:
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses. - Hanna Kim, Jian Cui, Eugene Jang, Chanhee Lee, Yongjae Lee, Jin-Woo Chung, Seungwon Shin:
DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using Classifiers Learned on Graphs. - Yingying Su, Dan Li, Li Chen, Qi Li, Sitong Ling:
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository. - Zhengxiong Luo, Kai Liang, Yanyang Zhao, Feifan Wu, Junze Yu, Heyuan Shi, Yu Jiang:
DynPRE: Protocol Reverse Engineering via Dynamic Inference. - Shiqing Luo, Anh Nguyen, Hafsa Farooq, Kun Sun, Zhisheng Yan:
Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality. - Gianluca Scopelliti, Christoph Baumann, Fritz Alder, Eddy Truyen, Jan Tobias Mühlberg:
Efficient and Timely Revocation of V2X Credentials. - Chanyoung Park, Hyungon Moon:
Efficient Use-After-Free Prevention with Opportunistic Page-Level Sweeping. - Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. - Liheng Chen, Zheming Li, Zheyu Ma, Yuan Li, Baojian Chen, Chao Zhang:
EnclaveFuzz: Finding Vulnerabilities in SGX Applications. - Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes:
Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning. - Zicong Gao, Chao Zhang, Hangtian Liu, Wenhou Sun, Zhizhuo Tang, Liehui Jiang, Jianjun Chen, Yong Xie:
Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis. - Nimish Mishra, Anirban Chakraborty, Debdeep Mukhopadhyay:
Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone. - Daniela Lopes, Jin-Dong Dong, Pedro Medeiros, Daniel Castro, Diogo Barradas, Bernardo Portela, João Vinagre, Bernardo Ferreira, Nicolas Christin, Nuno Santos:
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum. - Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro:
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting. - Hossein Fereidooni, Alessandro Pegoraro, Phillip Rieger, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning. - Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. - Shahriar Ebrahimi, Parisa Hassanizadeh:
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation. - Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. - Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. - Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. - Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss:
IdleLeak: Exploiting Idle State Side Effects for Information Leakage. - Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. - Yarin Ozery, Asaf Nadler, Asaf Shabtai:
Information Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection. - Takami Sato, Sri Hrushikesh Varma Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, Sara Rampazzi:
Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign Perception. - Minhyeok Kang, Weitong Li, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung:
IRRedicator: Pruning IRR with RPKI-Valid BGP Insights. - Zhengchuan Liang, Xiaochen Zou, Chengyu Song, Zhiyun Qian:
K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel. - Ruijie Meng, Martin Mirchev, Marcel Böhme, Abhik Roychoudhury:
Large Language Model guided Protocol Fuzzing. - Jiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang:
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem. - Xigao Li, Amir Rahmati, Nick Nikiforakis:
Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms. - Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang:
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. - David Hunt, Kristen Angell, Zhenzhou Qi, Tingjun Chen, Miroslav Pajic:
MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars. - Fannv He, Yan Jia, Jiayu Zhao, Yue Fang, Jice Wang, Mengyue Feng, Peng Liu, Yuqing Zhang:
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps. - Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots. - Christoph Sendner, Jasper Stang, Alexandra Dmitrienko, Raveen Wijewickrama, Murtuza Jadliwala:
MirageFlow: A New Bandwidth Inflation Attack on Tor. - Nicola Ruaro, Fabio Gritti, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts. - Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. - Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. - Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar, Makan Pourzandi:
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences. - Sourav Das, Zhuolun Xiang, Ling Ren:
Powers of Tau in Asynchrony. - Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida:
Predictive Context-sensitive Fuzzing. - Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li:
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound. - Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. - Syed Mahbub Hafiz, Chitrabhanu Gupta, Warren Wnuck, Brijesh Vora, Chen-Nee Chuah:
Private Aggregate Queries to Untrusted Databases. - Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, Anand SVR, Himanshu Tyagi, Pramod Viswanath:
Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth. - Yaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang:
QUACK: Hindering Deserialization Attacks via Static Duck Typing. - Asbat El Khairi, Marco Caselli, Andreas Peter, Andrea Continella:
REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices. - Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo, Haixin Duan, Jianjun Chen, Chao Zhang, Kaiwen Shen:
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing. - Kosei Akama, Yoshimichi Nakatsuka, Masaaki Sato, Keisuke Uehara:
Scrappy: SeCure Rate Assuring Protocol with PrivacY. - Xiangfu Song, Dong Yin, Jianli Bai, Changyu Dong, Ee-Chien Chang:
Secret-Shared Shuffle with Malicious Security. - Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow:
Secure Multiparty Computation of Threshold Signatures Made More Efficient. - Shichen Wu, Puwen Wei, Ren Zhang, Bowen Jiang:
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. - Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim:
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification. - Ke Mu, Bo Yin, Alia Asheralieva, Xuetao Wei:
Separation is Good: A Faster Order-Fairness Byzantine Consensus. - Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? - Guangke Chen, Yedi Zhang, Fu Song:
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems. - Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. - Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. - Xiaochen Zou, Yu Hao, Zheng Zhang, Juefei Pu, Weiteng Chen, Zhiyun Qian:
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem. - Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang:
TALISMAN: Tamper Analysis for Reference Monitors. - Kerem Arikan, Abraham Farrell, Williams Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:
TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs. - Hengzhi Pei, Jinyuan Jia, Wenbo Guo, Bo Li, Dawn Song:
TextGuard: Provable Defense against Backdoor Attacks on Text Classification. - Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner:
The CURE to Vulnerabilities in RPKI Validation. - Ayomide Akinsanya, Tegan Brennan:
Timing Channels in Adaptive Neural Networks. - Sunil Manandhar, Kapil Singh, Adwait Nadkarni:
Towards Automated Regulation Analysis for Effective Privacy Compliance. - Yikang Chen, Yibo Liu, Ka Lok Wu, Duc V. Le, Sze Yiu Chau:
Towards Precise Reporting of Cryptographic Misuses. - Lancheng Qin, Li Chen, Dan Li, Honglin Ye, Yutian Wang:
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed. - Mingxuan Liu, Yiming Zhang, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Xiaofeng Zheng:
Understanding the Implementation and Security Implications of Protective DNS Services. - Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu:
UniID: Spoofing Face Authentication System by Universal Identity. - Cem Topcuoglu, Kaan Onarlioglu, Bahruz Jabiyev, Engin Kirda:
Untangle: Multi-Layer Web Server Fingerprinting. - Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos:
UntrustIDE: Exploiting Weaknesses in VS Code Extensions. - Levi Taiji Li, Ningyu He, Haoyu Wang, Mu Zhang:
VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities. - Geoff Twardokus, Nina Bindel, Hanif Rahbari, Sarah McCarthy:
When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications. - Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang:
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.