


default search action
46th SP 2025: San Francisco, CA, USA
- Marina Blanton, William Enck, Cristina Nita-Rotaru:

IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025. IEEE 2025, ISBN 979-8-3315-2236-0 - Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang:

TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries. 1-18 - Linkang Du, Xuanru Zhou, Min Chen, Chusong Zhang, Zhou Su, Peng Cheng, Jiming Chen, Zhikun Zhang:

SoK: Dataset Copyright Auditing in Machine Learning Systems. 1-19 - Justin Petelka, Benjamin Berens

, Carlo Sugatan, Melanie Volkamer, Florian Schaub:
Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness. 1-19 - Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer

, Andreas Zankl:
Towards ML-KEM & ML-DSA on OpenTitan. 1-19 - Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang:

Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset. 1-19 - Tina Marjanov, Alice Hutchings:

SoK: Digging into the Digital Underworld of Stolen Data Markets. 1-18 - Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves:

Characterizing Robocalls with Multiple Vantage Points. 19-36 - Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong

, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, Geoffrey M. Voelker:
Understanding the Efficacy of Phishing Training in Practice. 37-54 - Runze Zhang, Ranjita Pai Sridhar, Mingxuan Yao, Zheng Yang, David Oygenblik, Haichuan Xu, Vacha Dave, Cormac Herley, Paul England, Brendan Saltaformaggio:

Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints. 93-111 - Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates:

What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research. 112-129 - Sareh Mohammadi, Hugo Kermabon-Bobinnec, Azadeh Tabiban, Lingyu Wang, Tomás Navarro Múnera, Yosr Jarraya:

Connecting the Extra Dots (Contexts): Correlating External Information about Point of Interest for Attack Investigation. 130-148 - Cecilia Boschini, Darya Kaviani, Russell W. F. Lai

, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi:
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors. 149-164 - Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri:

Groundhog: A Restart-Based Systems Framework for Increasing Availability in Threshold Cryptosystems. 165-183 - The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau:

Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More. 184-202 - Guofeng Tang, Haiyang Xue

:
Robust Threshold ECDSA with Online-Friendly Design in Three Rounds. 203-221 - Chuanqi Xu, Jakub Szefer:

Security Attacks Abusing Pulse-level Quantum Circuits. 222-239 - Changchang Ding, Yan Huang:

Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES. 240-258 - Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin:

Gold OPRF: Post-Quantum Oblivious Power-Residue PRF. 259-278 - Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:

Benchmarking Attacks on Learning with Errors. 279-297 - Mutahar Ali, Arjun Arunasalam, Habiba Farrukh:

Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms. 298-316 - Xinyi Hou, Yanjie Zhao, Haoyu Wang:

On the (In)Security of LLM App Stores. 317-335 - Xinyue Shen

, Yun Shen, Michael Backes, Yang Zhang:
GPTracker: A Large-Scale Measurement of Misused GPTs. 336-354 - Shuofeng Liu, Mengyao Ma, Minhui Xue, Guangdong Bai:

Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts. 355-372 - Yingkai Dong, Xiangtao Meng

, Ning Yu, Zheng Li, Shanqing Guo:
Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-to-Image Generation Models. 373-391 - Yicong Tan, Xinyue Shen

, Yun Shen, Michael Backes, Yang Zhang:
On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts. 392-410 - Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes:

Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-Based Prompt Injection Attacks via the Fine-Tuning Interface. 411-429 - Syed Irfan Ali Meerza, Lichao Sun, Jian Liu

:
Harmonycloak: Making Music Unlearnable for Generative AI. 430-448 - Jiawei Zhou, Zidong Zhang, Lingyun Ying, Huajun Chai, Jiuxin Cao, Haixin Duan:

Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild. 449-467 - Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji:

Unveiling Security Vulnerabilities in Git Large File Storage Protocol. 468-485 - Ruofan Zhu, Ganhao Chen, Wenbo Shen, Xiaofei Xie

, Rui Chang:
My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs. 486-503 - Gerbrand ten Napel, Michel van Eeten, Simon Parkin:

Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment. 504-521 - Jessy Ayala

, Steven Ngo, Joshua Garcia:
A Deep Dive into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports. 522-538 - Yangheran Piao, Temima Hrle, Daniel W. Woods, Ross Anderson:

Study Club, Labor Union or Start-Up? Characterizing Teams and Collaboration in the Bug Bounty Ecosystem. 539-558 - Changzhou Han, Zehang Deng, Wanlun Ma, Xiaogang Zhu, Minhui Xue, Tianqing Zhu, Sheng Wen, Yang Xiang:

Codebreaker: Dynamic Extraction Attacks on Code Language Models. 559-575 - Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng, Sheng Zhong, Fengyuan Xu:

Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks. 576-594 - Benjamin Bencina, Benjamin Dowling, Varun Maram, Keita Xagawa

:
Post-Quantum Cryptographic Analysis of SSH. 595-613 - Renas Bacho, Alireza Kavousi:

SoK: Dlog-Based Distributed Key Generation. 614-632 - Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren:

Verifiable Secret Sharing Simplified. 633-651 - John M. Schanck:

Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice. 652-663 - Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang:

AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators. 664-681 - Tao Yang, Ding Wang:

RankGuess: Password Guessing Using Adversarial Ranking. 682-700 - Yihe Duan, Ding Wang, Yanduo Fu:

Security Analysis of Master-Password-Protected Password Management Protocols. 701-719 - Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim:

Open Sesame! On the Security and Memorability of Verbal Passwords. 720-739 - Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon:

CMASan: Custom Memory Allocator-aware Address Sanitizer. 740-757 - Md Sakib Anwar

, Carter Yagemann, Zhiqiang Lin:
GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning. 758-773 - Emanuel Q. Vintila, Philipp Zieris, Julian Horsch:

Evaluating the Effectiveness of Memory Safety Sanitizers. 774-792 - Junho Ahn, Kanghyuk Lee, Chanyoung Park, Hyungon Moon, Youngjin Kwon:

SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World. 793-809 - Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan, Wenchang Shi:

BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel. 810-828 - Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman

:
Mon CHERI: Mitigating Uninitialized Memory Access with Conditional Capabilities. 829-847 - Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:

SoK: Challenges and Paths Toward Memory Safety for eBPF. 848-866 - Marius Momeu, Alexander J. Gaidis, Jasper v. d. Heidt, Vasileios P. Kemerlis:

IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions. 867-885 - Chenlin Wang

, Wei Meng, Changhua Luo, Penghui Li:
Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation. 886-902 - Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang:

MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications. 903-919 - Junyoung Park, Yunho Kim, Insu Yun:

RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes. 920-938 - An Chen, Yonghwi Kwon, Kyu Hyung Lee:

Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications. 939-955 - Bo Pang

, Yiheng Zhang, Mingzhe Gao, Junzhe Zhang, Ligeng Chen, Mingxue Zhangt, Gang Liang:
PFortifier: Mitigating PHP Object Injection Through Automatic Patch Generation. 956-971 - Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin, Min Yang, Junyao He, Qi Li:

Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications. 972-990 - Zifeng Kang, Muxi Lyu, Zhengyu Liu, Jianjia Yu, Runqi Fan, Song Li, Yinzhi Cao:

Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites. 991-1008 - Tommaso Innocenti

, Louis Jannett
, Christian Mainka
, Vladislav Mladenov
, Engin Kirda
:
"Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web. 1009-1027 - Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu:

SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses. 1028-1046 - Johannes Willbold, Tobias Cloosters, Simon Wörner, Felix Buchmann, Moritz Schloegel, Lucas Davi, Thorsten Holz:

Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space. 1047-1063 - Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Yuxuan Weng, Wei Liu, Qi Zhang, Jihao Li, Yuanjie Li, Jun Liu:

Mind the Location Leakage in LEO Direct-to-Cell Satellite Networks. 1064-1080 - Mujtahid Akon

, Md. Toufikuzzaman
, Syed Rafiul Hussain:
From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control. 1081-1100 - Daniel Klischies, Dyon Goos, David Hirsch, Alyssa Milburn, Marius Muench

, Veelasha Moonsamy:
BaseBridge: Bridging the Gap Between Over-the-Air and Emulation Testing for Cellular Baseband Firmware. 1101-1119 - Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Syed Rafiul Hussain:

Stateful Analysis and Fuzzing of Commercial Baseband Firmware. 1120-1139 - Yang Yang, Quan Shi

, Prosanta Gope, Behzad Abdolmaleki, Biplab Sikdar:
PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature. 1140-1158 - Yiming Zhang, Tao Wan, Yaru Yang, Haixin Duan, Yichen Wang, Jianjun Chen, Zixiang Wei

, Xiang Li
:
Invade the Walled Garden: Evaluating GTP Security in Cellular Networks. 1159-1177 - Kyle Beadle

, Kieron Ivy Turk, Aliai Eusebi, Mindy Tran, Marilyne Ordekian
, Enrico Mariconti
, Yixin Zou
, Marie Vasek:
SoK: A Privacy Framework for Security Research Using Social Media Data. 1178-1196 - Francesco Ciclosi

, Giovanna Varni, Fabio Massacci:
GDPR in the Small: A Field Study of Privacy and Security Challenges in Schools. 1197-1214 - Stefan Albert Horstmann, Sandy Hong, David Klein

, Raphael Serafini, Martin Degeling
, Martin Johns, Veelasha Moonsamy, Alena Naiakshina:
"Sorry for Bugging you so much." Exploring Developers' Behavior Towards Privacy-Compliant Implementation. 1215-1233 - Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks:

A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution. 1234-1250 - Jinhe Wen

, Yingxi Zhao, Wenqian Xu, Yaxing Yao, Haojian Jin:
Teaching Data Science Students to Sketch Privacy Designs Through Heuristics. 1251-1269 - Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson

, Tobias Lauinger, Michelle L. Mazurek, Damon McCoy, Blase Ur:
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems. 1270-1287 - Zikai Wen

, Lanjing Liu
, Yaxing Yao
:
Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation. 1288-1305 - Wirawan Agahari, Alexandra Dirksen

, Martin Johns, Mark de Reuver, Tobias Fiebig:
The Importance of Being Earnest: Shedding Light on Johnny's (False) Sense of Privacy. 1306-1324 - Elham Pourabbas Vafa, Mohit Singhal, Poojitha Thota, Sayak Saha Roy:

Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies. 1325-1343 - Niklas Niere, Felix Lange, Robert Merget, Juraj Somorovsky:

Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer. 1344-1362 - Mingshi Wu, Ali Zohaib, Zakir Durumeric, Amir Houmansadr, Eric Wustrow:

A Wall Behind A Wall: Emerging Regional Censorship in China. 1363-1380 - Sina Kamali, Diogo Barradas:

Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing. 1381-1399 - Sadia Nourin, Erik C. Rye, Kevin Bock, Nguyen Phong Hoang, Dave Levin:

Is Nobody There? Good! Globally Measuring Connection Tampering Without Responsive Endhosts. 1400-1418 - Xianwen Deng, Ruijie Zhao, Yanhao Wang, Mingwei Zhan, Zhi Xue, Yijun Wang:

Countmamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction. 1419-1437 - Minhao Bai, Jinshuai Yang, Kaiyi Pang, Xin Xu, Zhen Yang, Yongfeng Huang:

Provably Robust and Secure Steganography in Asymmetric Resource Scenario. 1438-1456 - Kyle Fredrickson, Ioannis Demertzis

, James P. Hughes, Darrell D. E. Long:
Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis. 1457-1473 - Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:

P2C2T: Preserving the Privacy of Cross-Chain Transfer. 1474-1492 - James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu

, Ari Juels:
Liquefaction: Privately Liquefying Blockchain Assets. 1493-1511 - Sen Yang

, Kartik Nayak, Fan Zhang:
Decentralization of Ethereum's Builder Market. 1512-1530 - Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet S. Arora, Mohsen Minaei:

A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms. 1531-1546 - Xiao Sui, Xin Wang, Sisi Duan:

Signature-Free Atomic Broadcast with Optimal $O(n^{2})$ Messages and $O(1)$ Expected Time. 1547-1565 - Peifang Ni, Anqi Tian, Jing Xu:

Warning! The Timeout T Cannot Protect You From Losing Coins: PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps. 1566-1583 - Wanning Ding, Yuzhe Tang, Yibo Wang

:
Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs. 1584-1602 - Michal Osadnik

, Darya Kaviani, Valerio Cini, Russell W. F. Lai
, Giulio Malavolta:
Papercraft: Lattice-Based Verifiable Delay Function Implemented. 1603-1621 - Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik:

Preference Poisoning Attacks on Reward Model Learning. 1622-1640 - Shaofei Li

, Ziqi Zhang, Haomin Jia, Yao Guo, Xiangqun Chen, Ding Li:
Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks. 1641-1656 - Harry Langford, Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Nicolas Papernot:

Architectural Neural Backdoors from First Principles. 1657-1675 - Guangyu Shen

, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo
, Lu Yan, Xiaolong Jin, Shengwei An
, Shiqing Ma, Xiangyu Zhang:
BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target. 1676-1694 - Wenjie Qu, Yuguang Zhou, Yongji Wu, Tingsong Xiao, Binhang Yuan

, Yiming Li, Jiaheng Zhang:
Prompt Inversion Attack Against Collaborative Inference of Large Language Models. 1695-1712 - Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:

PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. 1713-1731 - Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko

, Surya Nepal
:
Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning. 1751-1769 - Qing Deng

, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy:
Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls. 1770-1788 - Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil:

MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure. 1789-1807 - Daiping Liu, Ruian Duan, Jun Wang:

Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS. 1808-1824 - Nimesha Wickramasinghe

, Arash Shaghaghi, Gene Tsudik, Sanjay K. Jha:
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers. 1825-1843 - Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu:

TrafficFormer: An Efficient Pre-trained Model for Traffic Data. 1844-1860 - Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao, Zhiyun Qian:

SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection. 1861-1876 - Samuel DeLaughter, Karen R. Sollins:

SYN Proof-of- Work: Improving Volumetric DoS Resilience in TCP. 1877-1890 - Marc Wyss

, Marc Frei, Jonghoon Kwon, Adrian Perrig:
Low-Cost and Robust Global Time Synchronization. 1891-1909 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu

:
Constant Latency and Finality for Dynamically Available DAG. 1910-1927 - Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak:

Sailfish: Towards Improving the Latency of DAG-Based BFT. 1928-1946 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:

Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 1947-1963 - Jiaxing Zhao, Srinath T. V. Setty, Weidong Cui, Greg Zaverucha:

MicroNova: Folding-Based Arguments with Efficient (On-Chain) Verification. 1964-1982 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang:

Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups). 1983-2001 - Aviv Frenkel, Dmitry Kogan:

An Attack on TON's ADNL Secure Channel Protocol. 2002-2017 - Sri Aravinda Krishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee:

Vitārit: Paying for Threshold Services on Bitcoin and Friends. 2018-2036 - Jiajun Xin, Dimitrios Papadopoulos:

"Check-Before-you-Solve": Verifiable Time-Lock Puzzles. 2037-2056 - Stefano Calzavara, Lorenzo Cazzaro

, Claudio Lucchese, Giulio Ermanno Pibiri:
Verifiable Boosted Tree Ensembles. 2057-2075 - Jiadong Lou, Xu Yuan

, Rui Zhang, Xingliang Yuan, Neil Zhenqiang Gong, Nian-Feng Tzeng:
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models. 2095-2113 - Yu Sun, Gaojian Xiong

, Jianhua Liu, Zheng Liu, Jian Cui:
TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices. 2114-2132 - Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. 2133-2151 - Kang Yang, Guanhong Tao, Xun Chen, Jun Xu:

Alleviating the Fear of Losing Alignment in LLM Fine-tuning. 2152-2170 - Mathilde Raynal, Carmela Troncoso:

On the Conflict Between Robustness and Learning in Collaborative Machine Learning. 2171-2189 - Yupei Liu, Yuqi Jia, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong:

DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks. 2190-2208 - Rui Huan

, Kopo M. Ramokapane
, Awais Rashid
:
Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities. 2209-2227 - Anna Lena Rotthaler, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, Yasemin Acar:

"It's Time. Time for Digital Security.": An End User Study on Actionable Security and Privacy Advice. 2228-2245 - Lisa Geierhaas, Florin Martius, Arthi Arumugam, Matthew Smith:

"Not the Right Question?" A Study on Attitudes Toward Client-Side Scanning with Security and Privacy Researchers and a U.S. Population Sample. 2246-2263 - Rachiyta Jain, Temima Hrle, Margherita Marinetti, Adam Jenkins

, Rainer Böhme, Daniel W. Woods:
"Why Would Money Protect me from Cyber Bullying?": A Mixed-Methods Study of Personal Cyber Insurance. 2264-2283 - Warda Usman, John Sadik

, Taha, Ran Elgedawy, Scott Ruoti
, Daniel Zappala:
Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics. 2284-2302 - Verena Zimmermann, Adrienn Toth, Hannah Sievers, Linda Fanconi, Yanis Isenring, Mona Henz, Alina Stöver, Nina Gerber

:
Let's Get Visual - Testing Visual Analogies and Metaphors for Conveying Privacy Policies and Data Handling Information. 2303-2321 - Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl:

"I'm Pretty Expert and I Still Screw It Up": Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs. 2322-2340 - Prianka Mandal, Adwait Nadkarni:

"We can't Change it Overnight": Understanding Industry Perspectives on IoT Product Security Compliance and Certification. 2341-2359 - Qi Hu

, Wei Chen, Tianxiang Shen, Xin Yao, Nicholas Zhang, Heming Cui, Siu-Ming Yiu:
Opera: Achieving Secure and High-Performance OLAP with Parallelized Homomorphic Comparisons. 2360-2377 - Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin:

DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data. 2378-2394 - Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu:

CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction. 2395-2413 - Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Yaxin Tu

:
Improved Constructions for Distributed Multi-Point Functions. 2414-2432 - Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof:

Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. 2433-2452 - Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:

MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing. 2453-2471 - Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma:

SHARK: Actively Secure Inference Using Function Secret Sharing. 2472-2490 - Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner

, Peter Scholl:
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. 2491-2508 - Zihao Wang, Rui Zhu, Zhikun Zhang, Haixu Tang, Xiaofeng Wang:

Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks. 2509-2526 - Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan:

Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning. 2527-2545 - Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue:

Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices. 2546-2563 - Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang:

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models. 2564-2582 - Aloni Cohen

, Alexander Hoover
, Gabe Schoenbach
:
Watermarking Language Models for Many Adaptive Users. 2583-2601 - Andre Kassis, Urs Hengartner:

UnMarker: A Universal Attack on Defensive Image Watermarking. 2602-2620 - Xuandong Zhao, Sam Gunn

, Miranda Christ, Jaiden Fairoze, Andrés Fábrega, Nicholas Carlini, Sanjam Garg, Sanghyun Hong, Milad Nasr, Florian Tramèr, Somesh Jha, Lei Li
, Yu-Xiang Wang, Dawn Song:
SoK: Watermarking for AI-Generated Content. 2621-2639 - Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri:

Machine Learning with Privacy for Protected Attributes. 2640-2657 - Jan H. Klemmer, Juliane Schmüser, Byron M. Lowens, Fabian Fischer, Lea Schmüser, Florian Schaub, Sascha Fahl:

Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations. 2658-2677 - Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, Kevin R. B. Butler:

Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community. 2678-2696 - Warda Usman, Daniel Zappala:

SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research. 2697-2715 - Zhihuang Liu

, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai:
Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-Based Healthcare Consultation. 2716-2734 - Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, Yang Wang:

Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications. 2735-2752 - Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang:

Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem. 2753-2771 - Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein:

Supporting Human Raters with the Detection of Harmful Content Using Large Language Models. 2772-2789 - Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam J. Aviv, Shaanan Cohney

:
"It's been Lovely Watching you": Institutional Decision-Making on Online Proctoring Software. 2790-2808 - Guopeng Lin, Xiaoning Du, Lushan Song, Weili Han, Jin Tan, Junming Ma, Wenjing Fang, Lei Wang:

Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations. 2809-2826 - Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:

Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. 2827-2845 - Yi Liu, Junzuo Lai, Peng Yang, Qi Wang, Anjia Yang, Siu-Ming Yiu, Jian Weng:

Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound. 2846-2864 - Tung Le, Thang Hoang:

Hermes: Efficient and Secure Multi-Writer Encrypted Database. 2865-2884 - Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang:

Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs. 2885-2902 - Borja Balle, James Bell-Clark, Albert Cheu, Adrià Gascón, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke:

Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model. 2903-2918 - Yingtai Xiao, Jian Du, Shikun Zhang, Wanrong Zhang, Qian Yang, Danfeng Zhang, Daniel Kifer:

Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy. 2919-2937 - Radhika Garg, Xiao Wang:

Smaug: Modular Augmentation of LLVM for MPC. 2938-2956 - Guoren Li, Manu Sridharan, Zhiyun Qian:

Redefining Indirect Call Analysis with KallGraph. 2957-2975 - Joshua Wiedemeier, Elliot Tarbet, Max Zheng, Sangsoo Ko, Jessica Ouyang, Sang Kil Cha, Kangkook Jee:

PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages. 2976-2994 - Shuangjie Yao, Dongdong She:

Empc: Effective Path Prioritization for Symbolic Execution with Path Cover. 2995-3013 - Yansong Li, Paula Branco, Alexander M. Hoole, Manish Marwah, Hari Manassery Koduvely, Guy-Vincent Jourdan, Stephan Jou:

SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis. 3014-3032 - Antonio Flores-Montoya, Junghee Lim, Adam Seitz, Akshay Sood, Edward Raff, James Holt:

Disassembly as Weighted Interval Scheduling with Learned Weights. 3033-3050 - Naiqian Zhang, Dongpeng Xu, Jiang Ming, Jun Xu, Qiaoyan Yu:

Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation. 3051-3069 - Jiwon Kim, Dave Jing Tian, Benjamin E. Ujcich:

Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery. 3088-3106 - Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall

, Pierre Olivier
:
SoK: Software Compartmentalization. 3107-3126 - Zheng Yang, Simon P. Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee:

CoinDef: A Comprehensive Code Injection Defense for the Electron Framework. 3127-3144 - Quinn Burke

, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick D. McDaniel:
Efficient Storage Integrity in Adversarial Settings. 3145-3160 - Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta:

Growlithe: A Developer-Centric Compliance Tool for Serverless Applications. 3161-3179 - Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich:

The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes. 3180-3198 - Yue Gu

, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang:
EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications. 3199-3217 - Saiid El Hajj Chehade, Florian Hantke, Ben Stock:

403 Forbidden? Ethically Evaluating Broken Access Control in the Wild. 3218-3235 - Souradip Nath

, Ananta Soneji, Jaejong Baek, Tiffany Bao, Adam Doupé, Carlos E. Rubio-Medrano, Gail-Joon Ahn:
"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures. 3236-3254 - Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes:

SoK: Integrity, Attestation, and Auditing of Program Execution. 3255-3272 - Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li:

The Digital Cybersecurity Expert: How Far Have We Come? 3273-3290 - Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs:

Efficient Proofs of Possession for Legacy Signatures. 3291-3308 - Alex Ozdemir, Evan Laufer, Dan Boneh:

Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. 3309-3327 - Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong

, Tao Wei, Wenguang Chen:
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. 3328-3346 - Kunming Jiang, Fraser Brown, Riad S. Wahby:

CoBBL: Dynamic Constraint Generation for SNARKs. 3347-3363 - Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs:

ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs. 3364-3382 - Chongrong Li

, Pengfei Zhu, Yun Li, Cheng Hong
, Wenjie Qu, Jiaheng Zhang:
HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost. 3383-3401 - Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au:

JesseQ: Efficient Zero-Knowledge Proofs for Circuits Over Any Field. 3402-3420 - Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou:

HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users). 3421-3439 - Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst:

Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs. 3440-3459 - Tianyu Zhang, Shen Dong, Oyku Deniz Kose, Yanning Shen, Yupeng Zhang:

FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge. 3460-3478 - Bradley Morgan

, Gal Horowitz, Sioli O'Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin, Olaf Maennel, Paul Montague, Eyal Ronen, Yuval Yarom:
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye. 3479-3496 - Mikka Rainer

, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz
, Leon Trampert, Lukas Gerlach, Michael Schwarz:
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage. 3497-3515 - Johannes Wikner, Kaveh Razavi:

Breaking the Barrier: Post-Barrier Spectre Attacks. 3516-3533 - Alan Wang, Boru Chen, Yingchen Wang, Christopher W. Fletcher, Daniel Genkin, David Kohlbrenner, Riccardo Paccagnella:

Peek-a-Walk: Leaking Secrets via Page Walk Side Channels. 3534-3548 - Jason Kim, Daniel Genkin, Yuval Yarom:

SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon. 3549-3566 - Samy Amer, Yingchen Wang, Hunter Kippen, Thinh Dang, Daniel Genkin, Andrew Kwong, Alexander Nelson, Arkady Yerukhimovich:

PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer. 3567-3582 - Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida

:
Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets. 3583-3598 - Sander Wiebing, Cristiano Giuffrida

:
Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks. 3599-3616 - Inwhan Chun, Isabella Siu, Riccardo Paccagnella:

Scheduled Disclosure: Turning Power into Timing Without Frequency Scaling. 3617-3635 - Cheng Gu, Yicheng Zhang

, Nael B. Abu-Ghazaleh:
I know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs. 3636-3652 - Xiang Zhang

, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan, Peng Zhao, Zijian Zhang, Bin Liu, Qing Guo, Tianwei Zhang, Nenghai Yu:
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis. 3653-3671 - Gen Li, ChunChih Lin, Xiaonan Zhang

, Xiaolong Ma, Linke Guo:
Adversarial Robust ViT-Based Automatic Modulation Recognition in Practical Deep Learning-Based Wireless Systems. 3672-3690 - Muhammad Daniyal Pirwani Dar, Robert Lorch, Aliakbar Sadeghi, Vincenzo Sorcigli, Héloïse Gollier, Cesare Tinelli, Mathy Vanhoef, Omar Chowdhury:

Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points. 3691-3709 - Lina Pu, Yu Luo, Song Han, Junming Diao

:
Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals. 3710-3726 - Hadjer Benkraouda, Nirav Diwan, Gang Wang:

You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels. 3727-3745 - Prianka Mandal, Amit Seal Ami

, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait Nadkarni:
"We can't Allow IoT Vendors to Pass off all Such Liability to the Consumer": Investigating the U.S. Legal Perspectives on Liability for IoT Product Security. 3746-3764 - Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes:

PEARTS: Provable Execution in Real-Time Embedded Systems. 3765-3782 - Boyu Chang

, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, Shouling Ji:
Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization. 3783-3800 - Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang:

HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware. 3801-3819 - José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub:

Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt. 3820-3838 - Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas:

PAC-Private Algorithms. 3839-3857 - Puning Zhao, Zhikun Zhang, Jiawei Dong, Jiafei Wu, Zhe Liu, Shaowei Wang, Yunjun Gao:

An Attack-Agnostic Defense Framework Against Manipulation Attacks Under Local Differential Privacy. 3858-3876 - Qingqing Ye, Liantong Yu, Kai Huang, Xiaokui Xiao, Weiran Liu, Haibo Hu:

From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy. 3877-3891 - Takao Murakami, Yuichi Sei, Reo Eriguchi:

Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation Under Differential Privacy. 3892-3911 - Shlomi Hod, Ran Canetti:

Differentially Private Release of Israel's National Registry of Live Births. 3912-3930 - Bo Jiang, Wanrong Zhang, Donghang Lu, Jian Du, Sagar Sharma, Qiang Yan:

Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach. 3931-3949 - Nicolas Küchler, Alexander Viand, Hidde Lycklama

, Anwar Hithnawi:
DPolicy: Managing Privacy Risks Across Multiple Releases with Differential Privacy. 3950-3968 - Iago C. Chaves, Victor A. E. de Farias, Amanda Perez, Diego Mesquita, Javam C. Machado:

Differentially Private Selection Using Smooth Sensitivity. 3969-3987 - Kecen Li, Chen Gong, Xiaochen Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang:

From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis. 3988-4006 - Georgi Ganev, Emiliano De Cristofaro:

The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against "Truly Anonymous" Synthetic Datasets. 4007-4025 - Thomas Roche:

EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way). 4026-4043 - Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee:

Tiktag: Breaking ARM's Memory Tagging Extension with Speculative Execution. 4063-4081 - Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali

, Ashish Venkat:
Ceviche: Capability-Enhanced Secure Virtualization of Caches. 4082-4098 - Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Taesoo Kim:

Portal: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs). 4099-4116 - Jesse De Meulemeester, Luca Wilke, David F. Oswald, Thomas Eisenbarth, Ingrid Verbauwhede

, Jo Van Bulck
:
BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments. 4117-4135 - Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su:

CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels. 4136-4154 - Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, Lukas Cavigelli:

Guardain: Protecting Emerging Generative AI Workloads on Heterogeneous NPU. 4155-4172 - Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen:

Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation. 4173-4191 - Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee:

INCOGNITOS: A Practical Unikernel Design for Full-System Obfuscation in Confidential Virtual Machines. 4192-4209 - Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang:

A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements. 4210-4228 - David Schmidt

, Alexander Ponticello, Magdalena Steinböck, Katharina Krombholz, Martina Lindorfer:
Analyzing the iOS Local Network Permission from a Technical and User Perspective. 4229-4247 - Mona Wang, Jeffrey Knockel, Zoë Reichert, Prateek Mittal, Jonathan R. Mayer:

WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem. 4248-4266 - Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang:

Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs. 4267-4283 - Jiawei Guo, Yu Nong, Zhiqiang Lin, Haipeng Cai:

Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications. 4284-4302 - Hongcheng Zhu

, Zongkun Sun, Yanzhen Ren, Kun He, Yongpeng Yan, Zixuan Wang, Wuyang Liu, Yuhong Yang, Weiping Tu:
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback. 4303-4320 - Aafaq Sabir, Abhinaya S. B., Dilawer Ahmed, Anupam Das:

Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills. 4321-4339 - Sunwoo Lee

, Wonsuk Choi:
Eyes on your Typing: Snooping Finger Motions on Virtual Keyboards. 4340-4355 - Zhengkun Ye, Ahmed Tanvir Mahdad, Yan Wang, Cong Shi, Yingying Chen, Nitesh Saxena:

BPSniff: Continuously Surveilling Private Blood Pressure Information in the Metaverse via Unrestricted Inbuilt Motion Sensors. 4356-4374 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:

TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. 4375-4390 - Cas Cremers, Niklas Medinger, Aurora Naska:

Impossibility Results for Post-Compromise Security in Real-World Communication Systems. 4391-4405 - Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung:

Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications. 4406-4418 - Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa:

Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging. 4419-4437 - Miti Mazmudar, Shannon Veitch, Rasoul Akhavan Mahdavi:

Peer2PIR: Private Queries for IPFS. 4438-4456 - Sebastian Meiser, Debajyoti Das, Moritz Kirschte

, Esfandiar Mohammadi
, Aniket Kate:
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary. 4457-4475 - Quang Cao, Son Hoang Dau, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng:

TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead. 4476-4494 - Joel Samper

, Bernardo Ferreira:
SoK: Self-Generated Nudes over Private Chats: How can Technology Contribute to a Safer Sexting? 4495-4514 - Collins W. Munyendo

, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno, Franziska Roesner:
"You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods. 4515-4533 - Jung-Woo Chang, Ke Sun

, David Xia, Xinyu Zhang, Farinaz Koushanfar
:
EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations. 4534-4552 - Zhambyl Shaikhanov, Mahmoud Al-Madi, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly:

Spoofing Eavesdroppers with Audio Misinformation. 4553-4568 - Xuejing Yuan, Jiangshan Zhang, Feng Guo, Kai Chen, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Dun Liu, Pan Li, Zihao Wang, Runnan Zhu:

EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems. 4569-4587 - Raymond Muller, Ruoyu Song, Chenyi Wang

, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
Investigating Physical Latency Attacks Against Camera-Based Perception. 4588-4605 - Trisha Datta, Binyi Chen, Dan Boneh:

VerITAS: Verifying Image Transformations at Scale. 4606-4623 - Pierpaolo Della Monica

, Ivan Visconti, Andrea Vitaletti, Marco Zecchini:
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop. 4624-4642 - Chengru Zhang, Xiao Yang, David F. Oswald, Mark Ryan, Philipp Jovanovic:

Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos. 4643-4662 - Kun Wang

, Meng Chen, Li Lu
, Jingwen Feng, Qianniu Chen, Zhongjie Ba, Kui Ren, Chun Chen:
From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era. 4663-4681 - Long Huang, Chen Wang

:
Sniffing Location Privacy of Video Conference Users Using Free Audio Channels. 4682-4698

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














