


default search action
44th SP 2023: San Francisco, CA, USA - Workshops
- 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023. IEEE 2023, ISBN 979-8-3503-1236-2

- Kyungchan Lim, Joshua H. Kang, Matthew Dixson, Hyungjoon Koo, Doowon Kim:

Evaluating Password Composition Policy and Password Meters of Popular Websites. 12-20 - Etienne Salimbeni, Nina Mainusch, Dario Pasquini:

Your Email Address Holds the Key: Understanding the Connection Between Email and Password Security with Deep Learning. 94-104 - Tomoya Matsumoto, Takayuki Miura, Naoto Yanai

:
Membership Inference Attacks against Diffusion Models. 77-83 - Tom van Goethem, Iskander Sánchez-Rola, Wouter Joosen:

Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection. 371-383 - Romain Cayre

, Damien Cauquil, Aurélien Francillon:
ESPwn32: Hacking with ESP32 System-on-Chips. 311-325 - Pottayil Harisanker Menon, Walt Woods:

Corpus-wide Analysis of Parser Behaviors via a Format Analysis Workbench. 209-218 - Ping-Lun Wang, Fraser Brown, Riad S. Wahby:

The ghost is the machine: Weird machines in transient execution. 264-272 - Marcus Botacin:

GPThreats-3: Is Automatic Malware Generation a Threat? 238-254 - Andreas D. Kellas, Alan Cao, Peter Goodman

, Junfeng Yang:
Divergent Representations: When Compiler Optimizations Enable Exploitation. 337-348 - Sameed Ali, Sean W. Smith:

A Survey of Parser Differential Anti-Patterns. 105-116 - Jared Chandler

, Adam Wick:
Research Report: Synthesizing Intrusion Detection System Test Data from Open-Source Attack Signatures. 198-208 - Prashant Anantharaman, Robert Lathrop, Rebecca Shapiro, Michael E. Locasto:

PolyDoc: Surveying PDF Files from the PolySwarm network. 117-134 - Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi

, Lorenzo Cavallaro
, Gang Wang:
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors. 21-28 - Kelly Kaoudis, Henrik Brodin, Evan Sultanik:

Automatically Detecting Variability Bugs Through Hybrid Control and Data Flow Analysis. 187-197 - Alireza Aghabagherloo, Rafa Gálvez

, Davy Preuveneers, Bart Preneel:
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features. 38-44 - Alessandro Sorniotti, Michael Weissbacher, Anil Kurmus:

Go or No Go: Differential Fuzzing of Native and C Libraries. 349-363 - Jakub Pruzinec, Quynh Anh Nguyen:

Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models. 384-393 - Ben Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici:

The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. 298-310 - Yuanzhe Wu, Grant Skipper, Ang Cui:

Cryo-Mechanical RAM Content Extraction Against Modern Embedded Systems. 273-284 - Alexander J. Ross, Bradley Reaves:

Towards Simultaneous Attacks on Multiple Cellular Networks. 394-405 - Till Gehlhar

, Felix Marx
, Thomas Schneider
, Ajith Suresh
, Tobias Wehrle
, Hossein Yalame
:
SafeFL: MPC-friendly Framework for Private and Robust Federated Learning. 69-76 - Giulio De Pasquale, Fukutomo Nakanishi, Daniele Ferla, Lorenzo Cavallaro

:
ROPfuscator: Robust Obfuscation with ROP. 1-10 - Pietro Borrello, Catherine Easdon

, Martin Schwarzl, Roland Czerny, Michael Schwarz:
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode. 285-297 - Florent Moriconi, Axel Ilmari Neergaard, Lucas Georget

, Samuel Aubertin, Aurélien Francillon:
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems. 219-227 - Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:

On Feasibility of Server-side Backdoor Attacks on Split Learning. 84-93 - Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo:

Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study. 326-336 - Vincent Ulitzsch, Deniz Scholz, Dominik Christian Maier:

ASanity: On Bug Shadowing by Early ASan Exits. 364-370 - Ashish Kumar, Bill Harris, Gang Tan:

DISV: Domain Independent Semantic Validation of Data Files. 163-174 - Chakshu Gupta

, Thijs van Ede, Andrea Continella
:
HoneyKube: Designing and Deploying a Microservices-based Web Honeypot. 1-11 - Hadrien Barral, Georges-Axel Jaloyan, David Naccache:

Emoji shellcoding in RISC-V. 255-263 - Michael Robinson

, Tate Altman, Denley Lam, Letitia W. Li:
Unsupervised clustering of file dialects according to monotonic decompositions of mixtures. 147-162 - Nathalie Baracaldo, Farhan Ahmed, Kevin Eykholt, Yi Zhou, Shriti Priya, Taesung Lee, Swanand Kadhe, Mike Tan, Sridevi Polavaram, Sterling Suggs, Yuyang Gao, David Slater:

Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning Models. 45-56 - Roi Bar Zur, Danielle Dori, Sharon Vardi, Ittay Eyal, Aviv Tamar:

Deep Bribe: Predicting the Rise of Bribery in Blockchain Mining with Deep RL. 29-37 - Henrik Brodin, Marek Surovic, Evan Sultanik:

Blind Spots: Identifying Exploitable Program Inputs. 175-186 - Momin Ahmad Khan, Virat Shejwalkar, Amir Houmansadr, Fatima M. Anwar:

On the Pitfalls of Security Evaluation of Robust Federated Learning. 57-68 - Yudi Yang, Weijie Huang

, Kelly Kaoudis, Nathan Dautenhahn:
Whole-Program Privilege and Compartmentalization Analysis with the Object-Encapsulation Model. 1-12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














