


default search action
45th SP 2024: San Francisco, CA, USA - Workshops
- IEEE Security and Privacy, SP 2024 - Workshops, San Francisco, CA, USA, May 23, 2024. IEEE 2024, ISBN 979-8-3503-5487-4

- Yohan Beugin, Patrick D. McDaniel:

A Public and Reproducible Assessment of the Topics API on Real Data. 1-8 - Shuji Yamaguchi, Hidehito Gomi, Tetsutaro Uehara:

User Verification System using Location-based Dynamic Questions for Account Recovery. 9-16 - Chris Tsoukaladelis, Nick Nikiforakis:

Manufactured Narratives: On the Potential of Manipulating Social Media to Politicize World Events. 17-27 - Timothy Walsh

, Trevor Thomas, Armon Barton:
Exploring the Capabilities and Limitations of Video Stream Fingerprinting. 28-39 - Bruno Casella, Iacopo Colonnelli

, Gianluca Mittone, Robert Birke, Walter Riviera, Antonio Sciarappa, Carlo Cavazzoni, Marco Aldinucci:
A Performance Analysis for Confidential Federated Learning. 40-47 - Yuxin Cao, Jinghao Li, Xi Xiao, Derui Wang, Minhui Xue, Hao Ge, Wei Liu, Guangwu Hu:

LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. 48-56 - Junlin Wu, Hussein Sibai, Yevgeniy Vorobeychik:

Certifying Safety in Reinforcement Learning under Adversarial Perturbation Attacks. 57-67 - Shae McFadden

, Marcello Maugeri, Chris Hicks, Vasilios Mavroudis, Fabio Pierazzi
:
WENDIGO: Deep Reinforcement Learning for Denial-of-Service Query Discovery in GraphQL. 68-75 - Sanyam Vyas, Chris Hicks, Vasilios Mavroudis:

Mitigating Deep Reinforcement Learning Backdoors in the Neural Activation Space. 76-86 - Sivana Hamer, Marcelo d'Amorim

, Laurie A. Williams:
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. 87-94 - Tianxiang Dai

, Yufan Jiang
, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. 95-103 - Andreas Müller

, Erwin Quiring
:
The Impact of Uniform Inputs on Activation Sparsity and Energy-Latency Attacks in Computer Vision. 104-111 - Reshabh K. Sharma, Vinayak Gupta

, Dan Grossman:
Defending Language Models Against Image-Based Prompt Attacks via User-Provided Specifications. 112-131 - Daniel Kang, Xuechen Li, Ion Stoica, Carlos Guestrin, Matei Zaharia, Tatsunori Hashimoto:

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks. 132-143 - Hongbin Liu, Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong:

Pre-trained Encoders in Self-Supervised Learning Improve Secure and Privacy-preserving Supervised Learning. 144-156 - Mohsen Lesani:

Vulnerability Flow Type Systems. 157-168 - Sameed Ali, Michael E. Locasto, Sean W. Smith:

Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems. 169-179 - Natarajan Shankar, Zephyr Lucas:

Robust Verification of PEG Parser Interpreters. 180-191 - Mark Tullsen, Sam Cowger, Mike Dodds

, Peter Wyatt
:
Research Report: An Optim (l) Approach to Parsing Random-Access Formats. 192-199 - Meng Xu:

Research Report: Not All Move Specifications Are Created Equal : A Case Study on the Formally Verified Diem Payment Network. 200-214 - J. Peter Brady, Sean W. Smith:

Parsing, Performance, and Pareto in Data Stream Security. 215-223 - Guang Jin, Jason H. Li, Greg Briskin:

Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection. 224-230 - Paul Lintilhac, Joshua Ackerman, George Cybenko:

Research Report: Testing and Evaluating Artificial Intelligence Applications. 231-238 - Brian Wang, Luis Antonio Garcia, Mani Srivastava

:
PrivacyOracle: Configuring Sensor Privacy Firewalls with Large Language Models in Smart Built Environments. 239-245 - Sean O'Toole, Hoda Mehrpouyan:

Towards Cyber-Physical Representation and Cyber-Resilience Against Attack and Failure within a Hydraulic Network Simulation Toolkit. 246-252 - Fatemeh Arkannezhad, Pooya Aghanoury, Justin Feng, Hossein Khalili, Nader Sehatbakhsh:

SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels. 253-259 - Hossein Khalili, Alexander Chen, Theodoros Papaiakovou, Timothy Jacques, Hao-Jen Chien, Changwei Liu, Aolin Ding, Amin Hass, Saman A. Zonouz, Nader Sehatbakhsh:

Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels. 260-266 - Qi Liu, Yizhe Zhang

, Yixin Sun:
Intercepting Bluetooth Traffic from Wearable Health Devices. 267-273 - Daniel Timko, Mike Sharko, Yanyan Li:

Security Analysis of Wearable Smart Health Devices and Their Companion Apps. 274-280 - Narmeen Shafqat, Aanjhan Ranganathan:

Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter Devices. 281-288 - Chengzeng You, Zhongyuan Hau, Binbin Xu, Soteris Demetriou:

Adversarial 3D Virtual Patches using Integrated Gradients. 289-295 - Luoyao Hao, Henning Schulzrinne:

Poster: Identity-Independent IoT for Overarching Policy Enforcement. 296 - Thirasara Ariyarathna, Salil S. Kanhere, Hye-Young Paik:

Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions. 297 - Mounib Khanafer, Logan Kostick, Chixiang Wang, Wondimu Zegeye, Weijia He, Berkay Kaplan, Nurzaman Ahmed, Kevin T. Kornegay

, David Kotz, Timothy J. Pierson:
Device Discovery in the Smart Home Environment. 298-304 - Javor Nikolov, Alessandro Pegoraro, Phillip Rieger, Ahmad-Reza Sadeghi:

LayerDBA: Circumventing Similarity-Based Defenses in Federated Learning. 299-305 - Lukas Petzi, Alexandra Dmitrienko, Ivan Visconti:

PUF-Based Authentication in IoT Against Strong Physical Adversary Using Zero-Knowledge Proofs. 312-319

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














