default search action
45th SP 2024: San Francisco, CA, USA - Workshops
- IEEE Security and Privacy, SP 2024 - Workshops, San Francisco, CA, USA, May 23, 2024. IEEE 2024, ISBN 979-8-3503-5487-4
- Yohan Beugin, Patrick D. McDaniel:
A Public and Reproducible Assessment of the Topics API on Real Data. 1-8 - Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:
User Verification System using Location-based Dynamic Questions for Account Recovery. 9-16 - Chris Tsoukaladelis, Nick Nikiforakis:
Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events. 17-27 - Tim Walsh, Trevor Thomas, Armon Barton:
Exploring the Capabilities and Limitations of Video Stream Fingerprinting. 28-39 - Bruno Casella, Iacopo Colonnelli, Gianluca Mittone, Robert Birke, Walter Riviera, Antonio Sciarappa, Carlo Cavazzoni, Marco Aldinucci:
A Performance Analysis for Confidential Federated Learning. 40-47 - Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. 48-56 - Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik:
Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks. 57-67 - Shae McFadden, Marcello Maugeri, Chris Hicks, Vasilios Mavroudis, Fabio Pierazzi:
WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL. 68-75 - Sanyam Vyas, Chris Hicks, Vasilios Mavroudis:
Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space. 76-86 - Sivana Hamer, Marcelo d'Amorim, Laurie A. Williams:
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. 87-94 - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. 95-103 - Andreas Müller, Erwin Quiring:
The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision. 104-111 - Reshabh K. Sharma, Vinayak Gupta, Dan Grossman:
Defending Language Models Against Image-Based Prompt Attacks via User-Provided Specifications. 112-131 - Daniel Kang, Xuechen Li, Ion Stoica, Carlos Guestrin, Matei Zaharia, Tatsunori Hashimoto:
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks. 132-143 - Hongbin Liu, Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong:
Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning. 144-156 - Mohsen Lesani:
Vulnerability Flow Type Systems. 157-168 - Sameed Ali, Michael E. Locasto, Sean W. Smith:
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems. 169-179 - Natarajan Shankar, Zephyr Lucas:
Robust Verification of PEG Parser Interpreters. 180-191 - Mark Tullsen, Sam Cowger, Mike Dodds, Peter Wyatt:
Research Report: An Optim (l) Approach to Parsing Random-Access Formats. 192-199 - Meng Xu:
Research Report: Not All Move Specifications Are Created Equal : A Case Study on the Formally Verified Diem Payment Network. 200-214 - J. Peter Brady, Sean W. Smith:
Parsing, Performance, and Pareto in Data Stream Security. 215-223 - Guang Jin, Jason H. Li, Greg Briskin:
Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection. 224-230 - Paul Lintilhac, Joshua Ackerman, George Cybenko:
Research Report: Testing and Evaluating Artificial Intelligence Applications. 231-238 - Brian Wang, Luis Antonio Garcia, Mani B. Srivastava:
PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built Environments. 239-245 - Sean O'Toole, Hoda Mehrpouyan:
Towards Cyber-Physical Representation and Cyber-Resilience Against Attack and Failure within a Hydraulic Network Simulation Toolkit. 246-252 - Fatemeh Arkannezhad, Pooya Aghanoury, Justin Feng, Hossein Khalili, Nader Sehatbakhsh:
SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels. 253-259 - Hossein Khalili, Alexander Chen, Theodoros Papaiakovou, Timothy Jacques, Hao-Jen Chien, Changwei Liu, Aolin Ding, Amin Hass, Saman A. Zonouz, Nader Sehatbakhsh:
Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels. 260-266 - Qi Liu, Yizhe Zhang, Yixin Sun:
Intercepting Bluetooth Traffic from Wearable Health Devices. 267-273 - Daniel Timko, Mike Sharko, Yanyan Li:
Security Analysis of Wearable Smart Health Devices and Their Companion Apps. 274-280 - Narmeen Shafqat, Aanjhan Ranganathan:
Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter Devices. 281-288 - Chengzeng You, Zhongyuan Hau, Binbin Xu, Soteris Demetriou:
Adversarial 3D Virtual Patches using Integrated Gradients. 289-295 - Luoyao Hao, Henning Schulzrinne:
Poster: Identity-Independent IoT for Overarching Policy Enforcement. 296 - Thirasara Ariyarathna, Salil S. Kanhere, Hye-Young Paik:
Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions. 297 - Mounib Khanafer, Logan Kostick, Chixiang Wang, Wondimu Zegeye, Weijia He, Berkay Kaplan, Nurzaman Ahmed, Kevin T. Kornegay, David Kotz, Timothy J. Pierson:
Device Discovery in the Smart Home Environment. 298-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.