default search action
EuroS&P 2024: Vienna, Austria
- 9th IEEE European Symposium on Security and Privacy, EuroS&P 2024, Vienna, Austria, July 8-12, 2024. IEEE 2024, ISBN 979-8-3503-5425-6
- Edgar R. Weippl, Matteo Maffei:
Message from General Chairs; EuroSP 2024. xi - Govind Mittal, Chinmay Hegde, Nasir D. Memon:
Gotcha: Real-Time Video Deepfake Detection via Challenge-Response. 1-20 - Dipkamal Bhusal, Md Tanvirul Alam, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi:
PASA: Attack Agnostic Unsupervised Adversarial Detection Using Prediction & Attribution Sensitivity Analysis. 21-40 - Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu:
Fingerprinting Image-to-Image Generative Adversarial Networks. 41-61 - Haonan Shi, Tu Ouyang, An Wang:
Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks. 62-77 - Hotaka Oyama, Ryo Iijima, Tatsuya Mori:
DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems. 78-94 - Katherine Izhikevich, Geoffrey M. Voelker, Stefan Savage, Liz Izhikevich:
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild. 95-113 - Weijia He, Kevin Bryson, Ricardo Calderon, Vijay Prakash, Nick Feamster, Danny Yuxing Huang, Blase Ur:
Can Allowlists Capture the Variability of Home IoT Device Network Behavior? 114-138 - Andrea Bisegna, Matteo Bitussi, Roberto Carbone, Luca Compagna, Silvio Ranise, Avinash Sudhodanan:
CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process. 139-154 - Giada Stivala, Gianluca De Stefano, Andrea Mengascini, Mariano Graziano, Giancarlo Pellegrino:
Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns. 155-172 - Louis Jannett, Christian Mainka, Maximilian Westers, Andreas Mayer, Tobias Wich, Vladislav Mladenov:
SoK: SSO-MONITOR - The Current State and Future Research Directions in Single Sign-on Security Measurements. 173-192 - Michal Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Matthieu Pigaglio, Ramin Sadre, Felix Lange, Etienne Rivière:
DISC-NG: Robust Service Discovery in the Ethereum Global Network. 193-215 - Alireza Kavousi, Zhipeng Wang, Philipp Jovanovic:
SoK: Public Randomness. 216-234 - Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino:
Secure compilation of rich smart contracts on poor UTXO blockchains. 235-267 - Zahra Motaqy, Mohamed E. Najd, Ghada Almashaqbeh:
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets. 268-292 - Han Xia, Mingsheng Wang:
Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster. 293-310 - David Schrammel, Martin Unterguggenberger, Lukas Lamster, Salmin Sultana, Karanvir Grewal, Michael LeMay, David M. Durham, Stefan Mangard:
Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs. 311-326 - Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth:
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. 327-344 - Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert:
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs. 345-360 - Abdullah Zubair Mohammed, Louis Jenkins, Rees R. Hatch, Gökçen Yilmaz Dayanikli, Craig Simpson, Ryan M. Gerdes, Hongjie Wang:
The IEMI Effect: On the Efficacy of PCB-Level Countermeasures in Adversarial Environments. 361-380 - Sami Ullah, Awais Rashid:
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications. 381-397 - Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality Against a Dishonest Majority. 398-414 - Dennis Dayanikli, Anja Lehmann:
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting. 415-439 - Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth:
Communication-Efficient Secure Logistic Regression. 440-467 - Ryad Benadjila, Thibauld Feneuil, Matthieu Rivain:
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem. 468-485 - Kang Hoon Lee, Young Bae Jeon, Ji Won Yoon:
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption. 486-505 - Huaijin Wang, Zhibo Liu, Shuai Wang, Ying Wang, Qiyi Tang, Sen Nie, Shi Wu:
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis. 506-523 - Miguel Costa, Sandro Pinto:
David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge. 524-541 - Kunihiro Ito, Batnyam Enkhtaivan, Isamu Teranishi, Jun Sakuma:
Trojan attribute inference attack on gradient boosting decision trees. 542-559 - Zhaojie Hu, Jingzhou Ye, Yifan Zhang, Xueqiang Wang:
Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators. 560-579 - Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. 580-599 - Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, Musard Balliu:
Activity Recognition Protection for IoT Trigger-Action Platforms. 600-616 - Zichao Zhang, Limin Jia, Corina S. Pasareanu:
ProInspector: Uncovering Logical Bugs in Protocol Implementations. 617-632 - Eric G. Ackermann, Kai Lennert Bober, Volker Jungnickel, Anja Lehmann:
SEKA: Secretless Key Exchange and Authentication in LiFi Networks. 633-657 - Robert Flood, Gints Engelen, David Aspinall, Lieven Desmet:
Bad Design Smells in Benchmark NIDS Datasets. 658-675 - Sagi Brudni, Sapir Anidgar, Oleg Brodt, Dudu Mimran, Asaf Shabtai, Yuval Elovici:
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions. 676-696 - Boel Nelson, Elena Pagnin, Aslan Askarov:
Metadata Privacy Beyond Tunneling for Instant Messaging. 697-723 - Zicheng Zhang, Haoyu Ma, Daoyuan Wu, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang:
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search. 724-740 - Koustuv Kanungo, Rahul Khatoliya, Vishrut Arora, Aairah Bari, Arani Bhattacharya, Mukulika Maity, Sambuddho Chakravarty:
How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India. 741-757 - Dheeraj Vagavolu, Yousra Aafer, Meiyappan Nagappan:
(Deep) Learning of Android Access Control Recommendation from Static Execution Paths. 758-772 - Maied Almansoori, Mazharul Islam, Saptarshi Ghosh, Mainack Mondal, Rahul Chatterjee:
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance. 773-789 - Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park:
Panacea: Non-Interactive and Stateless Oblivious RAM. 790-809 - Nan Cheng, Aikaterini Mitrokotsa, Feng Zhang, Frank Hartmann:
Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function. 810-827 - Martin R. Albrecht, Matilda Backendal, Daniele Coppola, Kenneth G. Paterson:
Share with Care: Breaking E2EE in Nextcloud. 828-840 - Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. 841-859 - Uddipana Dowerah, Subhranil Dutta, Frank Hartmann, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal:
SACfe: Secure Access Control in Functional Encryption with Unbounded Data. 860-882
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.