


default search action
43rd SP 2022: San Francisco, CA, USA - Workshops
- 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022. IEEE 2022, ISBN 978-1-6654-9643-8

SecWeb: Workshop on Designing Security for the Web
- Peter Stolz, Sebastian Roth

, Ben Stock:
To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. 1-12 - Moritz Birghan, Thyla van der Merwe:

A Client-Side Seat to TLS Deployment. 13-19 - Tom van Goethem, Wouter Joosen:

Towards Improving the Deprecation Process of Web Features through Progressive Web Security. 20-30 - Merve Sahin, Tolga Ünlü

, Cédric Hébert, Lynsay A. Shepherd
, Natalie Coull
, Colin McLean:
Measuring Developers' Web Security Awareness from Attack and Defense Perspectives. 31-43 - Emanuel von Zezschwitz, Serena Chen, Emily Stark:

"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI. 44-50 - Dashmeet Kaur Ajmani, Igibek Koishybayev

, Alexandros Kapravelos:
yoU aRe a Liar: //A Unified Framework for Cross-Testing URL Parsers. 51-58
DLS: Deep Learning and Security Workshop
- Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring

:
Misleading Deep-Fake Detection with GAN Fingerprints. 59-65 - Johannes Schneider, Giovanni Apruzzese

:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. 66-72 - Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:

Ares: A System-Oriented Wargame Framework for Adversarial ML. 73-79 - Sihui Dai, Saeed Mahloujifar, Prateek Mittal:

Parameterizing Activation Functions for Adversarial Robustness. 80-87
LangSec: The 8th Workshop on Language-theoretic Security and Applications
- Alexander Grushin, Walt Woods:

Anomaly Detection with Neural Parsers That Never Reject. 88-97 - Michael Robinson

, Cory Anderson, Letitia W. Li, Steve Huntsman:
Statistical detection of format dialects using the weighted Dowker complex. 98-112 - John Sarracino

, Gang Tan, Greg Morrisett:
Certified Parsing of Dependent Regular Grammars. 113-123 - Sameed Ali, Sean W. Smith:

A Secure Parser Generation Framework for IoT Protocols on Microcontrollers. 124-135 - Prashant Anantharaman, Steven Cheung, Nicholas Boorman, Michael E. Locasto:

A Format-Aware Reducer for Scriptable Rewriting of PDF Files. 136-151 - Mark Tullsen, William Harris, Peter Wyatt

:
Research Report: Strengthening Weak Links in the PDF Trust Chain. 152-167 - Tim Allison, Wayne Burke, Dustin Graf, Chris Mattmann, Anastasija Mensikova, Mike Milano, Philip Southam, Ryan Stonebraker

:
Research Report: Progress on Building a File Observatory for Secure Parser Development. 168-175 - Vijay H. Kothari, Prashant Anantharaman, Sean W. Smith, Briland Hitaj

, Prashanth Mundkur, Natarajan Shankar, Letitia W. Li, Iavor Diatchki, William Harris:
Capturing the iccMAX calculatorElement: A Case Study on Format Design. 176-197 - Wayne Wang, Peter C. Johnson:

Research Report: On the Feasibility of Retrofitting Operating Systems with Generated Protocol Parsers. 198-207
SafeThings: Workshop on the Internet of Safe Things
- Jimmy Briggs, Christine Geeng:

BLE-Doubt: Smartphone-Based Detection of Malicious Bluetooth Trackers. 208-214 - Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:

Biometric Identification System based on Object Interactions in Internet of Things Environments. 215-221 - Nikos Fotiou, Vasilios A. Siris, George C. Polyzos, Yki Kortesniemi, Dmitrij Lagutin:

Capabilities-based access control for IoT devices using Verifiable Credentials. 222-228 - Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:

Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. 229-235 - Haoda Wang

, Christophe Hauser, Luis Garcia:
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering. 236-242 - Xi Qin, Martin Rosso, Alvaro A. Cárdenas

, Sandro Etalle, Jerry den Hartog, Emmanuele Zambon
:
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network. 243-250 - Abdullah Zubair Mohammed, Alok K. Singh, Gökçen Yilmaz Dayanikli, Ryan M. Gerdes, Mani Mina, Ming Li:

Towards Wireless Spiking of Smart Locks. 251-257 - Pavan Srihari Darbha, Mauro Conti

, Eleonora Losiouk
, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? 258-264
WOOT: Workshop on Offensive Technologies
- Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig:

Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits. 265-276 - Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque

:
Exploring Widevine for Fun and Profit. 277-288 - Jordy Gennissen, Daniel O'Keeffe

:
Hack the Heap: Heap Layout Manipulation made Easy. 289-300 - Thomas Roth, Fabian Freyer, Matthias Hollick

, Jiska Classen:
AirTag of the Clones: Shenanigans with Liberated Item Finders. 301-311 - Sisheng Liang, Zihao Zhan, Fan Yao

, Long Cheng, Zhenkai Zhang:
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance. 312-322 - Anish Saxena, Biswabandan Panda

:
DABANGG: A Case for Noise Resilient Flush-Based Cache Attacks. 323-334 - Keith O'Neal, Scott Yilek:

Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending. 335-341 - Hendrik Siewert, Martin Kretschmer, Marcus Niemietz, Juraj Somorovsky:

On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. 342-352 - Daniele Antonioli, Mathias Payer:

On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats. 353-362

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














