No abstract available.
Front Matter
Front Matter
Cips: The Cache Intrusion Prevention System
Caches are an essential component in the performance-driven memory hierarchy of modern CPUs. However, they are also known to be vulnerable against a variety of timing side-channel attacks like Prime+Probe, Flush+Reload, and others. These allow ...
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks
Trusted Execution Environments (TEEs) have long served as a prominent security measure for ensuring isolation and data privacy in cloud environments. However, their security foundations face challenges from numerous side-channel threats, ...
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques
With the advancement of cyber technology, proactive security methods such as adversary emulation and leveraging Cyber Threat Intelligence (CTI) have become increasingly essential. Currently, some methods have achieved automatic mapping of ...
Duplication-Based Fault Tolerance for RISC-V Embedded Software
Embedded devices play critical roles in security and safety, demanding robust protection against fault injection attacks. Among the myriad of fault effects, the instruction skip fault model stands out due to its recurrent manifestation in silicon ...
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
Searchable symmetric encryption (SSE) schemes provide users with the ability to perform keyword searches on encrypted databases without the need for decryption. While this functionality is advantageous, it introduces the potential for inadvertent ...
SAEG: Stateful Automatic Exploit Generation
The field of Automatic Exploit Generation (AEG) plays a pivotal role in the assessment of software vulnerabilities, automating the analysis for exploit creation. Although AEG systems are instrumental in probing for vulnerabilities, they often lack ...
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts
In the era of Large Language Models (LLMs), developers establish content review conditions to comply with legal, policy, and societal requirements, aiming to prevent the generation of sensitive or restricted content due to considerations like ...
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features
Video traffic is increasingly dominating the Internet, and most video platforms encrypt their transmissions to ensure content security and user privacy. However, attackers can still leverage traffic analysis methods to identify the being-watching ...
Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches
Distributed Denial-of-Service (DDoS) attacks continue to pose a significant threat to the Internet. While middlebox-based defenses offer high performance, they are costly and lack flexibility. Software-based defenses, on the other hand, provide ...
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements
Cellular network users can be attacked through Rogue Base Stations (RBSes). 3G introduced network authentication as a mitigation. However, roaming partnerships between network operators allow requesting authentication vectors. This feature opens ...
It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
Attack Graph (AG) represents the best-suited solution to support cyber risk assessment for multi-step attacks on computer networks, although their generation suffers from poor scalability due to their combinatorial complexity. Current solutions ...
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Trajectories, a specific type of mobility data, can be used for many useful data mining tasks. However, these trajectories also raises important privacy concerns due to their strong inference potential. In this work, we propose TUL-STEO, a novel ...
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification
Vertical Federated Learning (VFL) focuses on handling vertically partitioned data over FL participants. Recent studies have discovered a significant vulnerability in VFL to backdoor attacks which specifically target the distinct characteristics of ...
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach
- Marc-Antoine Faillon,
- Baptiste Bout,
- Julien Francq,
- Christopher Neal,
- Nora Boulahia-Cuppens,
- Frédéric Cuppens,
- Reda Yaich
In response to the rapidly evolving landscape of Information Technology (IT) and Operational Technology (OT) systems, automated vulnerability assessment is gaining prominence. While traditional scripted approaches are common, supervised and ...
Revoke: Mitigating Ransomware Attacks Against Ethereum Validators
Recent research has shown the viability of ransomware attacks on Ethereum Proof-of-Stake (PoS) validators, whereby an attacker that compromises a validator can threaten to perform slashable actions unless a ransom is paid. Given the size of ...
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning
Federated learning is an emerging paradigm for distributed machine learning that enables clients to collaboratively train models while maintaining data privacy. However, this approach introduces vulnerabilities, notably the risk of backdoor ...
Front Matter
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
Given a fixed-size block, cryptographic block functions generate outputs by a sequence of bitwise operations. Block functions are widely used in the design of hash functions and stream ciphers. Their correct implementations hence are crucial to ...
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication
We observe that server-aided message-locked encryption (MLE) and server-aided public key encryption with keyword search (PEKS) can be integrated into one cloud storage system to support both deduplication and keyword search over encrypted ...
Incremental Time-Deniable Signatures
Digital signatures guarantee long-term public verifiability and non-repudiation. However, in some applications, signatures can be stored by several actors and, later on (e.g., if leaked after an attack), those signatures could be adversarially ...
“Ask and Thou Shall Receive”: Reaction-Based Full Key Recovery Attacks on FHE
Fully Homomorphic Encryption (FHE) promises to secure our data on the untrusted cloud by allowing arbitrary computations on encrypted data. However, the malleability and flexibility provided by FHE schemes also open up arenas for integrity issues ...
Index Terms
- Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part IV