default search action
43rd SP 2022: San Francisco, CA, USA
- 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022. IEEE 2022, ISBN 978-1-6654-1316-9
- Jie Liang, Mingzhe Wang, Chijin Zhou, Zhiyong Wu, Yu Jiang, Jianzhong Liu, Zhe Liu, Jiaguang Sun:
PATA: Fuzzing with Path Aware Taint Analysis. 1-17 - Ju Chen, Jinghan Wang, Chengyu Song, Heng Yin:
JIGSAW: Efficient and Scalable Path Constraints Fuzzing. 18-35 - Heqing Huang, Yiyuan Guo, Qingkai Shi, Peisen Yao, Rongxin Wu, Charles Zhang:
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning. 36-50 - Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, Cristina Nita-Rotaru:
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. 51-68 - Bruno Blanchet, Vincent Cheval, Véronique Cortier:
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More. 69-86 - Martin R. Albrecht, Lenka Mareková, Kenneth G. Paterson, Igors Stepanovs:
Four Attacks and a Proof for Telegram. 87-106 - Son Ho, Jonathan Protzenko, Abhishek Bichhawat, Karthikeyan Bhargavan:
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations. 107-124 - Cas Cremers, Caroline Fontaine, Charlie Jacomme:
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols. 125-141 - Sonia Belaïd, Darius Mercadier, Matthieu Rivain, Abdul Rahman Taleb:
IronMask: Versatile Verification of Masking Security. 142-160 - Priyanka Bose, Dipanjan Das, Yanju Chen, Yu Feng, Christopher Kruegel, Giovanni Vigna:
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds. 161-178 - Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin T. Vechev:
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs. 179-197 - Kaihua Qin, Liyi Zhou, Arthur Gervais:
Quantifying Blockchain Extractable Value: How dark is the forest? 198-214 - Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Nils Wenzler, Tim Würtele:
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. 215-234 - Hernán Ponce de León, Johannes Kinder:
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. 235-248 - Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems. 249-266 - Sophie Stephenson, Bijeeta Pal, Stephen Fan, Earlence Fernandes, Yuhang Zhao, Rahul Chatterjee:
SoK: Authentication in Augmented and Virtual Reality. 267-284 - Haotian Chi, Chenglong Fu, Qiang Zeng, Xiaojiang Du:
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks. 285-302 - Haojian Jin, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong:
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes. 303-320 - Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
vSGX: Virtualizing SGX Enclaves on AMD SEV. 321-336 - Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang:
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. 337-351 - Jinwen Wang, Ao Li, Haoran Li, Chenyang Lu, Ning Zhang:
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone. 352-369 - Hongyan Xia, David Zhang, Wei Liu, István Haller, Bruce Sherwin, David Chisnall:
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities. 370-385 - Lei Zhou, Xuhua Ding, Fengwei Zhang:
Smile: Secure Memory Introspection for Live Enclave. 386-401 - Önder Askin, Tim Kutta, Holger Dette:
Statistical Quantification of Differential Privacy: A Local Approach. 402-421 - Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi:
Locally Differentially Private Sparse Vector Aggregation. 422-439 - Albert Cheu, Maxim Zhilyaev:
Differentially Private Histograms in the Shuffle Model from Fake Users. 440-457 - Miranda Christ, Sarah Radway, Steven M. Bellovin:
Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census. 457-472 - Jiankai Jin, Eleanor McMurtry, Benjamin I. P. Rubinstein, Olga Ohrimenko:
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems. 473-488 - Jun Zeng, Xiang Wang, Jiahao Liu, Yinfang Chen, Zhenkai Liang, Tat-Seng Chua, Zheng Leong Chua:
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records. 489-506 - Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu:
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors. 507-521 - Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. 522-539 - Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. 540-557 - Eric Pauley, Ryan Sheatsley, Blaine Hoak, Quinn Burke, Yohan Beugin, Patrick D. McDaniel:
Measuring and Mitigating the Risk of IP Reuse on Public Clouds. 558-575 - Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. 576-595 - Liang Feng Zhang, Huaxiong Wang:
Multi-Server Verifiable Computation of Low-Degree Polynomials. 596-613 - Amit Seal Ami, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. 614-631 - Jan Jancar, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, Yasemin Acar:
"They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. 632-649 - Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. 650-665 - Sunjay Cauligi, Craig Disselkoen, Daniel Moghimi, Gilles Barthe, Deian Stefan:
SoK: Practical Foundations for Software Spectre Defenses. 666-680 - Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin:
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. 681-698 - Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom:
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. 699-715 - Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi:
BLACKSMITH: Scalable Rowhammering in the Frequency Domain. 716-734 - Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi:
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh. 735-753 - Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri:
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. 754-768 - Eugene Bagdasaryan, Vitaly Shmatikov:
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures. 769-786 - Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum:
SoK: How Robust is Image Classification Deep Neural Network Watermarking? 787-804 - Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift. 805-823 - Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. 824-841 - Daniele Lain, Kari Kostiainen, Srdjan Capkun:
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. 842-859 - Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl:
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. 860-875 - Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek:
Investigating Influencer VPN Ads on YouTube. 876-892 - Marco Gutfleisch, Jan H. Klemmer, Niklas Busch, Yasemin Acar, M. Angela Sasse, Sascha Fahl:
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study. 893-910 - Sacha Servan-Schreiber, Simon Langowski, Srinivas Devadas:
Private Approximate Nearest Neighbor Search with Sublinear Communication. 911-929 - Samir Jordan Menon, David J. Wu:
SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition. 930-947 - Michael Rosenberg, Mary Maller, Ian Miers:
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs. 948-965 - Ding Wang, Yunkai Zou, Qiying Dong, Yuanming Song, Xinyi Huang:
How to Attack and Generate Honeywords. 966-983 - Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. 984-1001 - Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton:
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints. 1002-1017 - John V. Monaco:
Device Fingerprinting with Peripheral Timestamps. 1018-1033 - Long Huang, Chen Wang:
PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response. 1034-1048 - Alyssa Milburn, Erik van der Kouwe, Cristiano Giuffrida:
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation. 1049-1065 - Nicola Ruaro, Fabio Pagani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna:
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros. 1066-1081 - Fabio Gritti, Fabio Pagani, Ilya Grishchenko, Lukas Dresel, Nilo Redini, Christopher Kruegel, Giovanni Vigna:
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images. 1082-1099 - Zhibo Liu, Yuanyuan Yuan, Shuai Wang, Yuyan Bao:
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications. 1100-1119 - Saeed Mahloujifar, Esha Ghosh, Melissa Chase:
Property Inference from Poisoning. 1120-1137 - Borja Balle, Giovanni Cherubin, Jamie Hayes:
Reconstructing Training Data with Informed Adversaries. 1138-1156 - Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan:
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories. 1157-1174 - Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. 1175-1192 - Giovanni Camurati, Aurélien Francillon:
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security. 1193-1210 - Suryoday Basak, Mahanth Gowda:
mmSpy: Spying Phone Calls using mmWave Radars. 1211-1228 - Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick:
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation. 1229-1245 - Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin:
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices. 1246-1262 - Ruomu Hou, Haifeng Yu, Prateek Saxena:
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains. 1263-1280 - Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments. 1281-1298 - Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez:
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains. 1299-1316 - Sisi Duan, Haibin Zhang:
Foundations of Dynamic BFT. 1317-1334 - Robin Vassantlal, Eduardo Alchieri, Bernardo Ferreira, Alysson Bessani:
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services. 1335-1353 - Virat Shejwalkar, Amir Houmansadr, Peter Kairouz, Daniel Ramage:
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning. 1354-1371 - Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang:
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. 1372-1389 - Shangyu Xie, Han Wang, Yu Kong, Yuan Hong:
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems. 1390-1407 - Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. 1408-1422 - Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. 1423-1439 - Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, Xenofon D. Koutsoukos:
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors. 1440-1457 - Yanan Guo, Andrew Zigerelli, Youtao Zhang, Jun Yang:
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks. 1458-1473 - Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz:
Finding and Exploiting CPU Features using MSR Templating. 1474-1490 - Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner:
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest. 1491-1505 - Junpeng Wan, Yanxiang Bi, Zhe Zhou, Zhou Li:
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh. 1506-1524 - Zihao Jin, Ziqiao Kong, Shuo Chen, Haixin Duan:
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation. 1525-1539 - Zhiju Yang, Weiping Pei, Monchu Chen, Chuan Yue:
WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural Networks. 1540-1557 - Jiajun Gong, Wuqi Zhang, Charles Zhang, Tao Wang:
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense. 1558-1573 - Alan Romano, Daniel Lehmann, Michael Pradel, Weihang Wang:
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly. 1574-1589 - Soheil Khodayari, Giancarlo Pellegrino:
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies. 1590-1607 - Zhenghao Hu, Brendan Dolan-Gavitt:
IRQDebloat: Reducing Driver Attack Surface in Embedded Devices. 1608-1622 - Jiawei Yin, Menghao Li, Wei Wu, Dandan Sun, Jianhua Zhou, Wei Huo, Jingling Xue:
Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis. 1623-1637 - Marton Bognar, Jo Van Bulck, Frank Piessens:
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures. 1638-1655 - Julian Speith, Florian Schweins, Maik Ender, Marc Fyrbiak, Alexander May, Christof Paar:
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations. 1656-1671 - Animesh Chhotaray, Thomas Shrimpton:
Hardening Circuit-Design IP Against Reverse-Engineering Attacks. 1672-1689 - Hadi Givehchian, Nishant Bhaskar, Eliana Rodriguez Herrera, Héctor Rodrigo López Soto, Christian Dameff, Dinesh Bharadia, Aaron Schulman:
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices. 1690-1704 - Paul Staat, Simon Mulzer, Stefan Roth, Veelasha Moonsamy, Markus Heinrichs, Rainer Kronberger, Aydin Sezgin, Christof Paar:
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing. 1705-1721 - Paul Staat, Johannes Tobisch, Christian T. Zenger, Christof Paar:
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems. 1722-1736 - Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. 1737-1756 - Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingam, Riccardo Spolaor, Parth H. Pathak, Guoming Zhang, Xiuzhen Cheng:
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary. 1757-1773 - Mohammad Ghasemisharif, Chris Kanich, Jason Polakis:
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments. 1774-1790 - Adil Ahmad, Sangho Lee, Marcus Peinado:
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device. 1791-1807 - Chijung Jung, Ali Ahad, Yuseok Jeon, Yonghwi Kwon:
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms. 1808-1825 - Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, Dongyan Xu:
PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles. 1826-1844 - Ananta Soneji, Faris Bugra Kokulu, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé:
"Flawed, but like democracy we don't have a better system": The Experts' Insights on the Peer Review Process of Evaluating Security Papers. 1845-1862 - Yuxi Wu, W. Keith Edwards, Sauvik Das:
SoK: Social Cybersecurity. 1863-1879 - Dominik Wermke, Noah Wöhler, Jan H. Klemmer, Marcel Fourné, Yasemin Acar, Sascha Fahl:
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 1880-1896 - Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramèr:
Membership Inference Attacks From First Principles. 1897-1914 - Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. 1915-1932 - Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas:
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing. 1933-1952 - Adithya Vadapalli, Kyle Storrier, Ryan Henry:
Sabre: Sender-Anonymous Messaging with Fast Audits. 1953-1970 - James K. Howes IV, Marios Georgiou, Alex J. Malozemoff, Thomas Shrimpton:
Security Foundations for Application-Based Covert Communication Channels. 1971-1986 - Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot:
Bad Characters: Imperceptible NLP Attacks. 1987-2004 - Fan Wu, Yunhui Long, Ce Zhang, Bo Li:
LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis. 2005-2024 - Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Piccolo: Exposing Complex Backdoors in NLP Transformer Models. 2025-2042 - Jinyuan Jia, Yupei Liu, Neil Zhenqiang Gong:
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning. 2043-2059 - Nariyoshi Chida, Tachio Terauchi:
Repairing DoS Vulnerability of Real-World Regexes. 2060-2077 - Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Dongliang Mu, Chensheng Yu, Xinyu Xing, Kang Li:
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs. 2078-2095 - Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. 2096-2113 - Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang:
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. 2114-2129 - Johnny So, Najmeh Miramirkhani, Michael Ferdman, Nick Nikiforakis:
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust. 2130-2144 - Preethi Santhanam, Hoang Dang, Zhiyong Shan, Iulian Neamtiu:
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion. 2145-2160 - Mohammad Hammas Saeed, Shiza Ali, Jeremy Blackburn, Emiliano De Cristofaro, Savvas Zannettou, Gianluca Stringhini:
TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit. 2161-2175 - Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan:
Analyzing Ground-Truth Data of Mobile Gambling Scams. 2176-2193 - Dongdong She, Abhishek Shah, Suman Jana:
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. 2194-2211 - Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian:
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. 2212-2229 - Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. 2230-2247 - Alex Ozdemir, Fraser Brown, Riad S. Wahby:
CirC: Compiler infrastructure for proof systems, software verification, and more. 2248-2266 - Xiao Li, Farzin Houshmand, Mohsen Lesani:
HAMRAZ: Resilient Partitioning and Replication. 2267-2284 - Jianliang Wu, Ruoyu Wu, Dongyan Xu, Dave Jing Tian, Antonio Bianchi:
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. 2285-2303 - Collins W. Munyendo, Yasemin Acar, Adam J. Aviv:
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya. 2304-2319 - Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, Konstantin Beznosov:
SoK: The Dual Nature of Technology in Sexual Abuse. 2320-2343 - Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. 2344-2360 - Qasim Lone, Alisa Frik, Matthew Luckie, Maciej Korczynski, Michel van Eeten, Carlos Gañán:
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial. 2361-2378 - Takayuki Sasaki, Akira Fujita, Carlos Hernandez Gañán, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices. 2379-2396 - Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. 2397-2412 - Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik:
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA. 2413-2429 - Marc Rivinius, Pascal Reisert, Daniel Rausch, Ralf Küsters:
Publicly Accountable Robust Multi-Party Computation. 2430-2449 - Emma Dauterman, Mayank Rathee, Raluca Ada Popa, Ion Stoica:
Waldo: A Private Time-Series Database from Function Secret Sharing. 2450-2468 - Hamza Harkous, Sai Teja Peddinti, Rishabh Khandelwal, Animesh Srivastava, Nina Taft:
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale. 2469-2486 - Han Tian, Chaoliang Zeng, Zhenghang Ren, Di Chai, Junxue Zhang, Kai Chen, Qiang Yang:
Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud. 2487-2501 - Sourav Das, Vinith Krishnan, Irene Miriam Isaac, Ling Ren:
Spurt: Scalable Distributed Randomness Beacon with Transparent Setup. 2502-2517 - Sourav Das, Thomas Yurek, Zhuolun Xiang, Andrew Miller, Lefteris Kokoris-Kogias, Ling Ren:
Practical Asynchronous Distributed Key Generation. 2518-2534 - Chris Brzuska, Eric Cornelissen, Konrad Kohbrok:
Security Analysis of the MLS Key Derivation. 2535-2553 - Damiano Abram, Ariel Nof, Claudio Orlandi, Peter Scholl, Omer Shlomovits:
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators. 2554-2572 - Iskander Sánchez-Rola, Matteo Dell'Amico, Davide Balzarotti, Pierre-Antoine Vervier, Leyla Bilge:
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships. 1990-2004
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.