


default search action
46th SP 2025: San Francisco, CA, USA
- IEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025. IEEE 2025, ISBN 979-8-3315-2236-0
- Yanzhong Wang, Ruigang Liang, Yilin Li, Peiwei Hu, Kai Chen, Bolun Zhang:
TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries. 1-18 - Linkang Du, Xuanru Zhou, Min Chen, Chusong Zhang, Zhou Su, Peng Cheng, Jiming Chen, Zhikun Zhang:
SoK: Dataset Copyright Auditing in Machine Learning Systems. 1-19 - Justin Petelka, Benjamin Berens, Carlo Sugatan, Melanie Volkamer, Florian Schaub:
Restricting the Link: Effects of Focused Attention and Time Delay on Phishing Warning Effectiveness. 1-19 - Amin Abdulrahman, Felix Oberhansl, Hoang Nguyen Hien Pham, Jade Philipoom, Peter Schwabe, Tobias Stelzer, Andreas Zankl:
Towards ML-KEM & ML-DSA on OpenTitan. 1-19 - Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang:
Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset. 1-19 - Tina Marjanov, Alice Hutchings:
SoK: Digging into the Digital Underworld of Stolen Data Markets. 1-18 - Sathvik Prasad, Aleksandr Nahapetyan, Bradley Reaves:
Characterizing Robocalls with Multiple Vantage Points. 19-36 - Grant Ho, Ariana Mirian, Elisa Luo, Khang Tong, Euyhyun Lee, Lin Liu, Christopher A. Longhurst, Christian Dameff, Stefan Savage, Geoffrey M. Voelker:
Understanding the Efficacy of Phishing Training in Practice. 37-54 - Runze Zhang, Ranjita Pai Sridhar, Mingxuan Yao, Zheng Yang, David Oygenblik, Haichuan Xu, Vacha Dave, Cormac Herley, Paul England, Brendan Saltaformaggio:
Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints. 93-111 - Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates:
What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research. 112-129 - Sareh Mohammadi, Hugo Kermabon-Bobinnec, Azadeh Tabiban, Lingyu Wang, Tomás Navarro Múnera, Yosr Jarraya:
Connecting the Extra Dots (Contexts): Correlating External Information about Point of Interest for Attack Investigation. 130-148 - Cecilia Boschini, Darya Kaviani, Russell W. F. Lai, Giulio Malavolta, Akira Takahashi, Mehdi Tibouchi:
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors. 149-164 - Ashish Kashinath, Disha Agarwala, Gabriel Kulp, Sourav Das, Sibin Mohan, Radha Venkatagiri:
Groundhog: A Restart-Based Systems Framework for Increasing Availability in Threshold Cryptosystems. 165-183 - The-Anh Ta, Xiangyu Hui, Sid Chi-Kin Chau:
Ring Referral: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User Anonymity for Decentralized Identity and More. 184-202 - Guofeng Tang, Haiyang Xue:
Robust Threshold ECDSA with Online-Friendly Design in Three Rounds. 203-221 - Chuanqi Xu, Jakub Szefer:
Security Attacks Abusing Pulse-level Quantum Circuits. 222-239 - Changchang Ding, Yan Huang:
Phecda: Post-Quantum Transparent zkSNARKs from Improved Polynomial Commitment and VOLE-in-the-Head with Application in Publicly Verifiable AES. 240-258 - Yibin Yang, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Gold OPRF: Post-Quantum Oblivious Power-Residue PRF. 259-278 - Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. 279-297 - Mutahar Ali, Arjun Arunasalam, Habiba Farrukh:
Understanding Users' Security and Privacy Concerns and Attitudes Towards Conversational AI Platforms. 298-316 - Xinyi Hou, Yanjie Zhao, Haoyu Wang:
On the (In)Security of LLM App Stores. 317-335 - Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang:
GPTracker: A Large-Scale Measurement of Misused GPTs. 336-354 - Shuofeng Liu, Mengyao Ma, Minhui Xue, Guangdong Bai:
Modifier Unlocked: Jailbreaking Text-to-Image Models Through Prompts. 355-372 - Yingkai Dong, Xiangtao Meng, Ning Yu, Zheng Li, Shanqing Guo:
Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-to-Image Generation Models. 373-391 - Yicong Tan, Xinyue Shen, Yun Shen, Michael Backes, Yang Zhang:
On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts. 392-410 - Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes:
Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-Based Prompt Injection Attacks via the Fine-Tuning Interface. 411-429 - Syed Irfan Ali Meerza, Lichao Sun, Jian Liu:
Harmonycloak: Making Music Unlearnable for Generative AI. 430-448 - Jiawei Zhou, Zidong Zhang, Lingyun Ying, Huajun Chai, Jiuxin Cao, Haixin Duan:
Hey, Your Secrets Leaked! Detecting and Characterizing Secret Leakage in the Wild. 449-467 - Yuan Chen, Qinying Wang, Yong Yang, Yuanchao Chen, Yuwei Li, Shouling Ji:
Unveiling Security Vulnerabilities in Git Large File Storage Protocol. 468-485 - Ruofan Zhu, Ganhao Chen, Wenbo Shen, Xiaofei Xie, Rui Chang:
My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs. 486-503 - Gerbrand ten Napel, Michel van Eeten, Simon Parkin:
Speedrunning the Maze: Meeting Regulatory Patching Deadlines in a Large Enterprise Environment. 504-521 - Jessy Ayala, Steven Ngo, Joshua Garcia:
A Deep Dive into How Open-Source Project Maintainers Review and Resolve Bug Bounty Reports. 522-538 - Yangheran Piao, Temima Hrle, Daniel W. Woods, Ross Anderson:
Study Club, Labor Union or Start-Up? Characterizing Teams and Collaboration in the Bug Bounty Ecosystem. 539-558 - Changzhou Han, Zehang Deng, Wanlun Ma, Xiaogang Zhu, Minhui Xue, Tianqing Zhu, Sheng Wen, Yang Xiang:
Codebreaker: Dynamic Extraction Attacks on Code Language Models. 559-575 - Xiao Li, Yue Li, Hao Wu, Yue Zhang, Kaidi Xu, Xiuzhen Cheng, Sheng Zhong, Fengyuan Xu:
Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks. 576-594 - Benjamin Bencina, Benjamin Dowling, Varun Maram, Keita Xagawa:
Post-Quantum Cryptographic Analysis of SSH. 595-613 - Renas Bacho, Alireza Kavousi:
SoK: Dlog-Based Distributed Key Generation. 614-632 - Sourav Das, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, Ling Ren:
Verifiable Secret Sharing Simplified. 633-651 - John M. Schanck:
Clubcards for the WebPKI: Smaller Certificate Revocation Tests in Theory and Practice. 652-663 - Munshi Rejwan Ala Muid, Taejoong Chung, Thang Hoang:
AccuRevoke: Enhancing Certificate Revocation with Distributed Cryptographic Accumulators. 664-681 - Tao Yang, Ding Wang:
RankGuess: Password Guessing Using Adversarial Ranking. 682-700 - Yihe Duan, Ding Wang, Yanduo Fu:
Security Analysis of Master-Password-Protected Password Management Protocols. 701-719 - Eunsoo Kim, Kiho Lee, Doowon Kim, Hyoungshick Kim:
Open Sesame! On the Security and Memorability of Verbal Passwords. 720-739 - Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon:
CMASan: Custom Memory Allocator-aware Address Sanitizer. 740-757 - Junwha Hong, Wonil Jang, Mijung Kim, Lei Yu, Yonghwi Kwon, Yuseok Jeon:
CMASan: Custom Memory Allocator-Aware Address Sanitizer. 740-757 - Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin:
GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning. 758-773 - Emanuel Q. Vintila, Philipp Zieris, Julian Horsch:
Evaluating the Effectiveness of Memory Safety Sanitizers. 774-792 - Junho Ahn, Kanghyuk Lee, Chanyoung Park, Hyungon Moon, Youngjin Kwon:
SwiftSweeper: Defeating Use-After-Free Bugs Using Memory Sweeper Without Stop-the-World. 793-809 - Dongchen Xie, Dongnan He, Wei You, Jianjun Huang, Bin Liang, Shuitao Gan, Wenchang Shi:
BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel. 810-828 - Merve Gülmez, Håkan Englund, Jan Tobias Mühlberg, Thomas Nyman:
Mon CHERI: Mitigating Uninitialized Memory Access with Conditional Capabilities. 829-847 - Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
SoK: Challenges and Paths Toward Memory Safety for eBPF. 848-866 - Marius Momeu, Alexander J. Gaidis, Jasper v. d. Heidt, Vasileios P. Kemerlis:
IUBIK: Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extensions. 867-885 - Chenlin Wang, Wei Meng, Changhua Luo, Penghui Li:
Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation. 886-902 - Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang:
MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications. 903-919 - Junyoung Park, Yunho Kim, Insu Yun:
RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes. 920-938 - An Chen, Yonghwi Kwon, Kyu Hyung Lee:
Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications. 939-955 - Bo Pang, Yiheng Zhang, Mingzhe Gao, Junzhe Zhang, Ligeng Chen, Mingxue Zhangt, Gang Liang:
PFortifier: Mitigating PHP Object Injection Through Automatic Patch Generation. 956-971 - Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin, Min Yang, Junyao He, Qi Li:
Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications. 972-990 - Zifeng Kang, Muxi Lyu, Zhengyu Liu, Jianjia Yu, Runqi Fan, Song Li, Yinzhi Cao:
Follow My Flow: Unveiling Client-Side Prototype Pollution Gadgets from One Million Real-World Websites. 991-1008 - Tommaso Innocenti, Louis Jannett, Christian Mainka, Vladislav Mladenov, Engin Kirda:
"Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web. 1009-1027 - Jose Luis Castanon Remy, Ekzhin Ear, Caleb Chang, Antonia Feffer, Shouhuai Xu:
SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses. 1028-1046 - Johannes Willbold, Tobias Cloosters, Simon Wörner, Felix Buchmann, Moritz Schloegel, Lucas Davi, Thorsten Holz:
Space RADSIM: Binary-Agnostic Fault Injection to Evaluate Cosmic Radiation Impact on Exploit Mitigation Techniques in Space. 1047-1063 - Weisen Liu, Zeqi Lai, Qian Wu, Hewu Li, Yuxuan Weng, Wei Liu, Qi Zhang, Jihao Li, Yuanjie Li, Jun Liu:
Mind the Location Leakage in LEO Direct-to-Cell Satellite Networks. 1064-1080 - Mujtahid Akon, Md. Toufikuzzaman, Syed Rafiul Hussain:
From Control to Chaos: A Comprehensive Formal Analysis of 5G's Access Control. 1081-1100 - Daniel Klischies, Dyon Goos, David Hirsch, Alyssa Milburn, Marius Muench, Veelasha Moonsamy:
BaseBridge: Bridging the Gap Between Over-the-Air and Emulation Testing for Cellular Baseband Firmware. 1101-1119 - Ali Ranjbar, Tianchang Yang, Kai Tu, Saaman Khalilollahi, Syed Rafiul Hussain:
Stateful Analysis and Fuzzing of Commercial Baseband Firmware. 1120-1139 - Yang Yang, Quan Shi, Prosanta Gope, Behzad Abdolmaleki, Biplab Sikdar:
PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature. 1140-1158 - Yiming Zhang, Tao Wan, Yaru Yang, Haixin Duan, Yichen Wang, Jianjun Chen, Zixiang Wei, Xiang Li:
Invade the Walled Garden: Evaluating GTP Security in Cellular Networks. 1159-1177 - Kyle Beadle, Kieron Ivy Turk, Aliai Eusebi, Mindy Tran, Marilyne Ordekian, Enrico Mariconti, Yixin Zou, Marie Vasek:
SoK: A Privacy Framework for Security Research Using Social Media Data. 1178-1196 - Francesco Ciclosi, Giovanna Varni, Fabio Massacci:
GDPR in the Small: A Field Study of Privacy and Security Challenges in Schools. 1197-1214 - Stefan Albert Horstmann, Sandy Hong, David Klein, Raphael Serafini, Martin Degeling, Martin Johns, Veelasha Moonsamy, Alena Naiakshina:
"Sorry for Bugging you so much." Exploring Developers' Behavior Towards Privacy-Compliant Implementation. 1215-1233 - Eva Luvison, Sylvain Chatel, Justinas Sukaitis, Vincent Graf Narbel, Carmela Troncoso, Wouter Lueks:
A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution. 1234-1250 - Jinhe Wen, Yingxi Zhao, Wenqian Xu, Yaxing Yao, Haojian Jin:
Teaching Data Science Students to Sketch Privacy Designs Through Heuristics. 1251-1269 - Kevin Bryson, Arthur Borem, Phoebe Moh, Omer Akgul, Laura Edelson, Tobias Lauinger, Michelle L. Mazurek, Damon McCoy, Blase Ur:
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems. 1270-1287 - Zikai Wen, Lanjing Liu, Yaxing Yao:
Supporting Family Discussions About Digital Privacy Through Perspective-Taking: An Empirical Investigation. 1288-1305 - Wirawan Agahari, Alexandra Dirksen, Martin Johns, Mark de Reuver, Tobias Fiebig:
The Importance of Being Earnest: Shedding Light on Johnny's (False) Sense of Privacy. 1306-1324 - Elham Pourabbas Vafa, Mohit Singhal, Poojitha Thota, Sayak Saha Roy:
Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies. 1325-1343 - Niklas Niere, Felix Lange, Robert Merget, Juraj Somorovsky:
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer. 1344-1362 - Mingshi Wu, Ali Zohaib, Zakir Durumeric, Amir Houmansadr, Eric Wustrow:
A Wall Behind A Wall: Emerging Regional Censorship in China. 1363-1380 - Sina Kamali, Diogo Barradas:
Anix: Anonymous Blackout-Resistant Microblogging with Message Endorsing. 1381-1399 - Sadia Nourin, Erik C. Rye, Kevin Bock, Nguyen Phong Hoang, Dave Levin:
Is Nobody There? Good! Globally Measuring Connection Tampering Without Responsive Endhosts. 1400-1418 - Xianwen Deng, Ruijie Zhao, Yanhao Wang, Mingwei Zhan, Zhi Xue, Yijun Wang:
Countmamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction. 1419-1437 - Minhao Bai, Jinshuai Yang, Kaiyi Pang, Xin Xu, Zhen Yang, Yongfeng Huang:
Provably Robust and Secure Steganography in Asymmetric Resource Scenario. 1438-1456 - Kyle Fredrickson, Ioannis Demertzis, James P. Hughes, Darrell D. E. Long:
Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis. 1457-1473 - Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. 1474-1492 - James Austgen, Andrés Fábrega, Mahimna Kelkar, Dani Vilardell, Sarah Allen, Kushal Babel, Jay Yu, Ari Juels:
Liquefaction: Privately Liquefying Blockchain Assets. 1493-1511 - Sen Yang, Kartik Nayak, Fan Zhang:
Decentralization of Ethereum's Builder Market. 1512-1530 - Panagiotis Chatzigiannis, Ke Coby Wang, Sunpreet S. Arora, Mohsen Minaei:
A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms. 1531-1546 - Xiao Sui, Xin Wang, Sisi Duan:
Signature-Free Atomic Broadcast with Optimal $O(n^{2})$ Messages and $O(1)$ Expected Time. 1547-1565 - Peifang Ni, Anqi Tian, Jing Xu:
Warning! The Timeout T Cannot Protect You From Losing Coins: PipeSwap: Forcing the Timely Release of a Secret for Atomic Cross-Chain Swaps. 1566-1583 - Wanning Ding, Yuzhe Tang, Yibo Wang:
Asymmetric Mempool DoS Security: Formal Definitions and Provable Secure Designs. 1584-1602 - Michal Osadnik, Darya Kaviani, Valerio Cini, Russell W. F. Lai, Giulio Malavolta:
Papercraft: Lattice-Based Verifiable Delay Function Implemented. 1603-1621 - Junlin Wu, Jiongxiao Wang, Chaowei Xiao, Chenguang Wang, Ning Zhang, Yevgeniy Vorobeychik:
Preference Poisoning Attacks on Reward Model Learning. 1622-1640 - Shaofei Li, Ziqi Zhang, Haomin Jia, Yao Guo, Xiangqun Chen, Ding Li:
Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks. 1641-1656 - Harry Langford, Ilia Shumailov, Yiren Zhao, Robert D. Mullins, Nicolas Papernot:
Architectural Neural Backdoors from First Principles. 1657-1675 - Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, Xiangyu Zhang:
BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target. 1676-1694 - Wenjie Qu, Yuguang Zhou, Yongji Wu, Tingsong Xiao, Binhang Yuan, Yiming Li, Jiaheng Zhang:
Prompt Inversion Attack Against Collaborative Inference of Large Language Models. 1695-1712 - Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. 1713-1731 - Viet Vo, Mengyao Ma, Guangdong Bai, Ryan K. L. Ko, Surya Nepal:
Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning. 1751-1769 - Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, Srikanth V. Krishnamurthy:
Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls. 1770-1788 - Fatih Deniz, Mohamed Nabeel, Ting Yu, Issa Khalil:
MANTIS: Detection of Zero-Day Malicious Domains Leveraging Low Reputed Hosting Infrastructure. 1789-1807 - Daiping Liu, Ruian Duan, Jun Wang:
Resolution Without Dissent: In-Path Per-Query Sanitization to Defeat Surreptitious Communication Over DNS. 1808-1824 - Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay K. Jha:
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers. 1825-1843 - Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu:
TrafficFormer: An Efficient Pre-trained Model for Traffic Data. 1844-1860 - Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin'an Zhou, Yue Cao, Zhiyun Qian:
SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection. 1861-1876 - Samuel DeLaughter, Karen R. Sollins:
SYN Proof-of- Work: Improving Volumetric DoS Resilience in TCP. 1877-1890 - Marc Wyss, Marc Frei, Jonghoon Kwon, Adrian Perrig:
Low-Cost and Robust Global Time Synchronization. 1891-1909 - Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu:
Constant Latency and Finality for Dynamically Available DAG. 1910-1927 - Nibesh Shrestha, Rohan Shrothrium, Aniket Kate, Kartik Nayak:
Sailfish: Towards Improving the Latency of DAG-Based BFT. 1928-1946 - Zhongtang Luo, Yanxue Jia, Alejandra Victoria Ospina Gracia, Aniket Kate:
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains. 1947-1963 - Jiaxing Zhao, Srinath T. V. Setty, Weidong Cui, Greg Zaverucha:
MicroNova: Folding-Based Arguments with Efficient (On-Chain) Verification. 1964-1982 - Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang:
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups). 1983-2001 - Aviv Frenkel, Dmitry Kogan:
An Attack on TON's ADNL Secure Channel Protocol. 2002-2017 - Sri Aravinda Krishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee:
Vitārit: Paying for Threshold Services on Bitcoin and Friends. 2018-2036 - Jiajun Xin, Dimitrios Papadopoulos:
"Check-Before-you-Solve": Verifiable Time-Lock Puzzles. 2037-2056 - Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri:
Verifiable Boosted Tree Ensembles. 2057-2075 - Jiadong Lou, Xu Yuan, Rui Zhang, Xingliang Yuan, Neil Zhenqiang Gong, Nian-Feng Tzeng:
GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models. 2095-2113 - Yu Sun, Gaojian Xiong, Jianhua Liu, Zheng Liu, Jian Cui:
TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices. 2114-2132 - Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. 2133-2151 - Kang Yang, Guanhong Tao, Xun Chen, Jun Xu:
Alleviating the Fear of Losing Alignment in LLM Fine-tuning. 2152-2170 - Mathilde Raynal, Carmela Troncoso:
On the Conflict Between Robustness and Learning in Collaborative Machine Learning. 2171-2189 - Yupei Liu, Yuqi Jia, Jinyuan Jia, Dawn Song, Neil Zhenqiang Gong:
DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks. 2190-2208 - Rui Huan, Kopo M. Ramokapane, Awais Rashid:
Ownership and Gatekeeping vs. Safeguarding and Consent: How Migrant Parents Navigate Child Data Management Complexities. 2209-2227 - Anna Lena Rotthaler, Harshini Sri Ramulu, Lucy Simko, Sascha Fahl, Yasemin Acar:
"It's Time. Time for Digital Security.": An End User Study on Actionable Security and Privacy Advice. 2228-2245 - Lisa Geierhaas, Florin Martius, Arthi Arumugam, Matthew Smith:
"Not the Right Question?" A Study on Attitudes Toward Client-Side Scanning with Security and Privacy Researchers and a U.S. Population Sample. 2246-2263 - Rachiyta Jain, Temima Hrle, Margherita Marinetti, Adam Jenkins, Rainer Böhme, Daniel W. Woods:
"Why Would Money Protect me from Cyber Bullying?": A Mixed-Methods Study of Personal Cyber Insurance. 2264-2283 - Warda Usman, John Sadik, Taha, Ran Elgedawy, Scott Ruoti, Daniel Zappala:
Security and Privacy Experiences of First- and Second-Generation Pakistani Immigrants to the US: Perceptions, Practices, Challenges, and Parent-Child Dynamics. 2284-2302 - Verena Zimmermann, Adrienn Toth, Hannah Sievers, Linda Fanconi, Yanis Isenring, Mona Henz, Alina Stöver, Nina Gerber:
Let's Get Visual - Testing Visual Analogies and Metaphors for Conveying Privacy Policies and Data Handling Information. 2303-2321 - Juliane Schmüser, Philip Klostermeyer, Kay Friedrich, Sascha Fahl:
"I'm Pretty Expert and I Still Screw It Up": Qualitative Insights into Experiences and Challenges of Designing and Implementing Cryptographic Library APIs. 2322-2340 - Prianka Mandal, Adwait Nadkarni:
"We can't Change it Overnight": Understanding Industry Perspectives on IoT Product Security Compliance and Certification. 2341-2359 - Qi Hu, Wei Chen, Tianxiang Shen, Xin Yao, Nicholas Zhang, Heming Cui, Siu-Ming Yiu:
Opera: Achieving Secure and High-Performance OLAP with Parallelized Homomorphic Comparisons. 2360-2377 - Muhammad Husni Santriaji, Jiaqi Xue, Yancheng Zhang, Qian Lou, Yan Solihin:
DataSeal: Ensuring the Verifiability of Private Computation on Encrypted Data. 2378-2394 - Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu:
CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction. 2395-2413 - Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Yaxin Tu:
Improved Constructions for Distributed Multi-Point Functions. 2414-2432 - Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, Ariel Nof:
Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. 2433-2452 - Hyunho Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing. 2453-2471 - Kanav Gupta, Nishanth Chandran, Divya Gupta, Jonathan Katz, Rahul Sharma:
SHARK: Actively Secure Inference Using Function Secret Sharing. 2472-2490 - Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl:
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations. 2491-2508 - Zihao Wang, Rui Zhu, Zhikun Zhang, Haixu Tang, Xiaofeng Wang:
Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks. 2509-2526 - Zirui Gong, Yanjun Zhang, Leo Yu Zhang, Zhaoxi Zhang, Yong Xiang, Shirui Pan:
Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning. 2527-2545 - Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue:
Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices. 2546-2563 - Boheng Li, Yanhao Wei, Yankai Fu, Zhenting Wang, Yiming Li, Jie Zhang, Run Wang, Tianwei Zhang:
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models. 2564-2582 - Aloni Cohen, Alexander Hoover, Gabe Schoenbach:
Watermarking Language Models for Many Adaptive Users. 2583-2601 - Andre Kassis, Urs Hengartner:
UnMarker: A Universal Attack on Defensive Image Watermarking. 2602-2620 - Xuandong Zhao, Sam Gunn, Miranda Christ, Jaiden Fairoze, Andres Fabrega, Nicholas Carlini, Sanjam Garg, Sanghyun Hong, Milad Nasr, Florian Tramèr, Somesh Jha, Lei Li, Yu-Xiang Wang, Dawn Song:
SoK: Watermarking for AI-Generated Content. 2621-2639 - Saeed Mahloujifar, Chuan Guo, G. Edward Suh, Kamalika Chaudhuri:
Machine Learning with Privacy for Protected Attributes. 2640-2657 - Jan H. Klemmer, Juliane Schmüser, Byron M. Lowens, Fabian Fischer, Lea Schmüser, Florian Schaub, Sascha Fahl:
Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations. 2658-2677 - Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, Kevin R. B. Butler:
Data to Infinity and Beyond: Examining Data Sharing and Reuse Practices in the Computer Security Community. 2678-2696 - Warda Usman, Daniel Zappala:
SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research. 2697-2715 - Zhihuang Liu, Ling Hu, Tongqing Zhou, Yonghao Tang, Zhiping Cai:
Prevalence Overshadows Concerns? Understanding Chinese Users' Privacy Awareness and Expectations Towards LLM-Based Healthcare Consultation. 2716-2734 - Yaman Yu, Tanusree Sharma, Melinda Hu, Justin Wang, Yang Wang:
Exploring Parent-Child Perceptions on Safety in Generative AI: Concerns, Mitigation Strategies, and Design Implications. 2735-2752 - Maggie Yongqi Guan, Yaman Yu, Tanusree Sharma, Molly Zhuangtong Huang, Kaihua Qin, Yang Wang, Kanye Ye Wang:
Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem. 2753-2771 - Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein:
Supporting Human Raters with the Detection of Harmful Content Using Large Language Models. 2772-2789 - Elisa Shioji, Ani Meliksetyan, Lucy Simko, Ryan Watkins, Adam J. Aviv, Shaanan Cohney:
"It's been Lovely Watching you": Institutional Decision-Making on Online Proctoring Software. 2790-2808 - Guopeng Lin, Xiaoning Du, Lushan Song, Weili Han, Jin Tan, Junming Ma, Wenjing Fang, Lei Wang:
Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations. 2809-2826 - Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou:
Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity. 2827-2845 - Yi Liu, Junzuo Lai, Peng Yang, Qi Wang, Anjia Yang, Siu-Ming Yiu, Jian Weng:
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound. 2846-2864 - Tung Le, Thang Hoang:
Hermes: Efficient and Secure Multi-Writer Encrypted Database. 2865-2884 - Xuanwei Hu, Rujia Li, Yi Liu, Qi Wang:
Towards Efficient and Practical Multi-party Computation under Inconsistent Trust in TEEs. 2885-2902 - Borja Balle, James Bell-Clark, Albert Cheu, Adrià Gascón, Jonathan Katz, Mariana Raykova, Phillipp Schoppmann, Thomas Steinke:
Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model. 2903-2918 - Yingtai Xiao, Jian Du, Shikun Zhang, Wanrong Zhang, Qian Yang, Danfeng Zhang, Daniel Kifer:
Click Without Compromise: Online Advertising Measurement via Per User Differential Privacy. 2919-2937 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 2938-2956 - Guoren Li, Manu Sridharan, Zhiyun Qian:
Redefining Indirect Call Analysis with KallGraph. 2957-2975 - Joshua Wiedemeier, Elliot Tarbet, Max Zheng, Sangsoo Ko, Jessica Ouyang, Sang Kil Cha, Kangkook Jee:
PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages. 2976-2994 - Shuangjie Yao, Dongdong She:
Empc: Effective Path Prioritization for Symbolic Execution with Path Cover. 2995-3013 - Yansong Li, Paula Branco, Alexander M. Hoole, Manish Marwah, Hari Manassery Koduvely, Guy-Vincent Jourdan, Stephan Jou:
SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis. 3014-3032 - Antonio Flores-Montoya, Junghee Lim, Adam Seitz, Akshay Sood, Edward Raff, James Holt:
Disassembly as Weighted Interval Scheduling with Learned Weights. 3033-3050 - Naiqian Zhang, Dongpeng Xu, Jiang Ming, Jun Xu, Qiaoyan Yu:
Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation. 3051-3069 - Jiwon Kim, Dave Jing Tian, Benjamin E. Ujcich:
Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery. 3088-3106 - Hugo Lefeuvre, Nathan Dautenhahn, David Chisnall, Pierre Olivier:
SoK: Software Compartmentalization. 3107-3126 - Zheng Yang, Simon P. Chung, Jizhou Chen, Runze Zhang, Brendan Saltaformaggio, Wenke Lee:
CoinDef: A Comprehensive Code Injection Defense for the Electron Framework. 3127-3144 - Quinn Burke, Ryan Sheatsley, Yohan Beugin, Eric Pauley, Owen Hines, Michael Swift, Patrick D. McDaniel:
Efficient Storage Integrity in Adversarial Settings. 3145-3160 - Praveen Gupta, Arshia Moghimi, Devam Sisodraker, Mohammad Shahrad, Aastha Mehta:
Growlithe: A Developer-Centric Compliance Tool for Serverless Applications. 3161-3179 - Soufian El Yadmani, Olga Gadyatskaya, Yury Zhauniarovich:
The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcomes. 3180-3198 - Yue Gu, Xin Tan, Yuan Zhang, Siyan Gao, Min Yang:
EPScan: Automated Detection of Excessive RBAC Permissions in Kubernetes Applications. 3199-3217 - Saiid El Hajj Chehade, Florian Hantke, Ben Stock:
403 Forbidden? Ethically Evaluating Broken Access Control in the Wild. 3218-3235 - Souradip Nath, Ananta Soneji, Jaejong Baek, Tiffany Bao, Adam Doupé, Carlos E. Rubio-Medrano, Gail-Joon Ahn:
"It's almost like Frankenstein": Investigating the Complexities of Scientific Collaboration and Privilege Management within Research Computing Infrastructures. 3236-3254 - Mahmoud Ammar, Adam Caulfield, Ivan De Oliveira Nunes:
SoK: Integrity, Attestation, and Auditing of Program Execution. 3255-3272 - Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li:
The Digital Cybersecurity Expert: How Far Have We Come? 3273-3290 - Anna P. Y. Woo, Alex Ozdemir, Chad Sharp, Thomas Pornin, Paul Grubbs:
Efficient Proofs of Possession for Legacy Signatures. 3291-3308 - Alex Ozdemir, Evan Laufer, Dan Boneh:
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. 3309-3327 - Zhelei Zhou, Yun Li, Yuchen Wang, Zhaomin Yang, Bingsheng Zhang, Cheng Hong, Tao Wei, Wenguang Chen:
ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations. 3328-3346 - Kunming Jiang, Fraser Brown, Riad S. Wahby:
CoBBL: Dynamic Constraint Generation for SNARKs. 3347-3363 - Jiwon Kim, Abhiram Kothapalli, Orestis Chardouvelis, Riad S. Wahby, Paul Grubbs:
ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs. 3364-3382 - Chongrong Li, Pengfei Zhu, Yun Li, Cheng Hong, Wenjie Qu, Jiaheng Zhang:
HyperPianist: Pianist with Linear-Time Prover and Logarithmic Communication Cost. 3383-3401 - Mengling Liu, Yang Heng, Xingye Lu, Man Ho Au:
JesseQ: Efficient Zero-Knowledge Proofs for Circuits Over Any Field. 3402-3420 - Christodoulos Pappas, Dimitrios Papadopoulos, Charalampos Papamanthou:
HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users). 3421-3439 - Jens Ernstberger, Chengru Zhang, Luca Ciprian, Philipp Jovanovic, Sebastian Steinhorst:
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs. 3440-3459 - Tianyu Zhang, Shen Dong, Oyku Deniz Kose, Yanning Shen, Yupeng Zhang:
FairZK: A Scalable System to Prove Machine Learning Fairness in Zero-Knowledge. 3460-3478 - Bradley Morgan, Gal Horowitz, Sioli O'Connell, Stephan van Schaik, Chitchanok Chuengsatiansup, Daniel Genkin, Olaf Maennel, Paul Montague, Eyal Ronen, Yuval Yarom:
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye. 3479-3496 - Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz:
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage. 3497-3515 - Johannes Wikner, Kaveh Razavi:
Breaking the Barrier: Post-Barrier Spectre Attacks. 3516-3533 - Alan Wang, Boru Chen, Yingchen Wang, Christopher W. Fletcher, Daniel Genkin, David Kohlbrenner, Riccardo Paccagnella:
Peek-a-Walk: Leaking Secrets via Page Walk Side Channels. 3534-3548 - Jason Kim, Daniel Genkin, Yuval Yarom:
SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon. 3549-3566 - Samy Amer, Yingchen Wang, Hunter Kippen, Thinh Dang, Daniel Genkin, Andrew Kwong, Alexander Nelson, Arkady Yerukhimovich:
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer. 3567-3582 - Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida:
Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets. 3583-3598 - Sander Wiebing, Cristiano Giuffrida:
Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks. 3599-3616 - Inwhan Chun, Isabella Siu, Riccardo Paccagnella:
Scheduled Disclosure: Turning Power into Timing Without Frequency Scaling. 3617-3635 - Cheng Gu, Yicheng Zhang, Nael B. Abu-Ghazaleh:
I know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs. 3636-3652 - Xiang Zhang, Jie Zhang, Zehua Ma, Jinyang Huang, Meng Li, Huan Yan, Peng Zhao, Zijian Zhang, Bin Liu, Qing Guo, Tianwei Zhang, Nenghai Yu:
CamLopa: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis. 3653-3671 - Gen Li, ChunChih Lin, Xiaonan Zhang, Xiaolong Ma, Linke Guo:
Adversarial Robust ViT-Based Automatic Modulation Recognition in Practical Deep Learning-Based Wireless Systems. 3672-3690 - Muhammad Daniyal Pirwani Dar, Robert Lorch, Aliakbar Sadeghi, Vincenzo Sorcigli, Héloïse Gollier, Cesare Tinelli, Mathy Vanhoef, Omar Chowdhury:
Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points. 3691-3709 - Lina Pu, Yu Luo, Song Han, Junming Diao:
Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals. 3710-3726 - Hadjer Benkraouda, Nirav Diwan, Gang Wang:
You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels. 3727-3745 - Prianka Mandal, Amit Seal Ami, Iria Giuffrida, Daniel Shin, Ella Sullivan, Adwait Nadkarni:
"We can't Allow IoT Vendors to Pass off all Such Liability to the Consumer": Investigating the U.S. Legal Perspectives on Liability for IoT Product Security. 3746-3764 - Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes:
PEARTS: Provable Execution in Real-Time Embedded Systems. 3765-3782 - Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, Shouling Ji:
Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization. 3783-3800 - Haoyu Xiao, Ziqi Wei, Jiarun Dai, Bowen Li, Yuan Zhang, Min Yang:
HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware. 3801-3819 - José Bacelar Almeida, Gustavo Xavier Delerue Marinho Alves, Manuel Barbosa, Gilles Barthe, Luís Esquível, Vincent Hwang, Tiago Oliveira, Hugo Pacheco, Peter Schwabe, Pierre-Yves Strub:
Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt. 3820-3838 - Mayuri Sridhar, Hanshen Xiao, Srinivas Devadas:
PAC-Private Algorithms. 3839-3857 - Puning Zhao, Zhikun Zhang, Jiawei Dong, Jiafei Wu, Zhe Liu, Shaowei Wang, Yunjun Gao:
An Attack-Agnostic Defense Framework Against Manipulation Attacks Under Local Differential Privacy. 3858-3876 - Qingqing Ye, Liantong Yu, Kai Huang, Xiaokui Xiao, Weiran Liu, Haibo Hu:
From Randomized Response to Randomized Index: Answering Subset Counting Queries with Local Differential Privacy. 3877-3891 - Takao Murakami, Yuichi Sei, Reo Eriguchi:
Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation Under Differential Privacy. 3892-3911 - Shlomi Hod, Ran Canetti:
Differentially Private Release of Israel's National Registry of Live Births. 3912-3930 - Bo Jiang, Wanrong Zhang, Donghang Lu, Jian Du, Sagar Sharma, Qiang Yan:
Meeting Utility Constraints in Differential Privacy: A Privacy-Boosting Approach. 3931-3949 - Nicolas Küchler, Alexander Viand, Hidde Lycklama, Anwar Hithnawi:
DPolicy: Managing Privacy Risks Across Multiple Releases with Differential Privacy. 3950-3968 - Iago C. Chaves, Victor A. E. de Farias, Amanda Perez, Diego Mesquita, Javam C. Machado:
Differentially Private Selection Using Smooth Sensitivity. 3969-3987 - Kecen Li, Chen Gong, Xiaochen Li, Yuzhong Zhao, Xinwen Hou, Tianhao Wang:
From Easy to Hard: Building a Shortcut for Differentially Private Image Synthesis. 3988-4006 - Georgi Ganev, Emiliano De Cristofaro:
The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against "Truly Anonymous" Synthetic Datasets. 4007-4025 - Thomas Roche:
EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way). 4026-4043 - Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee:
Tiktag: Breaking ARM's Memory Tagging Extension with Speculative Execution. 4063-4081 - Arnabjyoti Kalita, Yilong Yang, Alenkruth Krishnan Murali, Ashish Venkat:
Ceviche: Capability-Enhanced Secure Virtualization of Caches. 4082-4098 - Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Taesoo Kim:
Portal: Fast and Secure Device Access with Arm CCA for Modern Arm Mobile System-on-Chips (SoCs). 4099-4116 - Jesse De Meulemeester, Luca Wilke, David F. Oswald, Thomas Eisenbarth, Ingrid Verbauwhede, Jo Van Bulck:
BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments. 4117-4135 - Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su:
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels. 4136-4154 - Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, Lukas Cavigelli:
Guardain: Protecting Emerging Generative AI Workloads on Heterogeneous NPU. 4155-4172 - Cas Cremers, Gal Horowitz, Charlie Jacomme, Eyal Ronen:
Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation. 4173-4191 - Kha Dinh Duy, Jaeyoon Kim, Hajeong Lim, Hojoon Lee:
INCOGNITOS: A Practical Unikernel Design for Full-System Obfuscation in Confidential Virtual Machines. 4192-4209 - Liu Wang, Dong Wang, Shidong Pan, Zheng Jiang, Haoyu Wang, Yi Wang:
A Big Step Forward? A User-Centric Examination of iOS App Privacy Report and Enhancements. 4210-4228 - David Schmidt, Alexander Ponticello, Magdalena Steinböck, Katharina Krombholz, Martina Lindorfer:
Analyzing the iOS Local Network Permission from a Technical and User Perspective. 4229-4247 - Mona Wang, Jeffrey Knockel, Zoë Reichert, Prateek Mittal, Jonathan R. Mayer:
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem. 4248-4266 - Chao Wang, Yanjie Zhao, Jiapeng Deng, Haoyu Wang:
Born with a Silver Spoon: On the (In)Security of Native Granted App Privileges in Custom Android ROMs. 4267-4283 - Jiawei Guo, Yu Nong, Zhiqiang Lin, Haipeng Cai:
Code Speaks Louder: Exploring Security and Privacy Relevant Regional Variations in Mobile Applications. 4284-4302 - Hongcheng Zhu, Zongkun Sun, Yanzhen Ren, Kun He, Yongpeng Yan, Zixuan Wang, Wuyang Liu, Yuhong Yang, Weiping Tu:
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback. 4303-4320 - Aafaq Sabir, Abhinaya S. B., Dilawer Ahmed, Anupam Das:
Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills. 4321-4339 - Sunwoo Lee, Wonsuk Choi:
Eyes on your Typing: Snooping Finger Motions on Virtual Keyboards. 4340-4355 - Zhengkun Ye, Ahmed Tanvir Mahdad, Yan Wang, Cong Shi, Yingying Chen, Nitesh Saxena:
BPSniff: Continuously Surveilling Private Blood Pressure Information in the Metaverse via Unrestricted Inbuilt Motion Sensors. 4356-4374 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
TreeKEM: A Modular Machine-Checked Symbolic Security Analysis of Group Key Agreement in Messaging Layer Security. 4375-4390 - Cas Cremers, Niklas Medinger, Aurora Naska:
Impossibility Results for Post-Compromise Security in Real-World Communication Systems. 4391-4405 - Liron David, Omer Berkman, Avinatan Hassidim, David Lazarov, Yossi Matias, Moti Yung:
Extended Diffie-Hellman Encryption for Secure and Efficient Real-Time Beacon Notifications. 4406-4418 - Darya Kaviani, Deevashwer Rathee, Bhargav Annem, Raluca Ada Popa:
Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging. 4419-4437 - Miti Mazmudar, Shannon Veitch, Rasoul Akhavan Mahdavi:
Peer2PIR: Private Queries for IPFS. 4438-4456 - Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate:
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary. 4457-4475 - Quang Cao, Son Hoang Dau, Rinaldo Gagiano, Duy Huynh, Xun Yi, Phuc Lu Le, Quang-Hung Luu, Emanuele Viterbo, Yu-Chih Huang, Jingge Zhu, Mohammad M. Jalalzai, Chen Feng:
TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead. 4476-4494 - Joel Samper, Bernardo Ferreira:
SoK: Self-Generated Nudes over Private Chats: How can Technology Contribute to a Safer Sexting? 4495-4514 - Collins W. Munyendo, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno, Franziska Roesner:
"You Have to Ignore the Dangers": User Perceptions of the Security and Privacy Benefits of WhatsApp Mods. 4515-4533 - Jung-Woo Chang, Ke Sun, David Xia, Xinyu Zhang, Farinaz Koushanfar:
EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations. 4534-4552 - Zhambyl Shaikhanov, Mahmoud Al-Madi, Hou-Tong Chen, Chun-Chieh Chang, Sadhvikas Addamane, Daniel M. Mittleman, Edward W. Knightly:
Spoofing Eavesdroppers with Audio Misinformation. 4553-4568 - Xuejing Yuan, Jiangshan Zhang, Feng Guo, Kai Chen, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Dun Liu, Pan Li, Zihao Wang, Runnan Zhu:
EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems. 4569-4587 - Raymond Muller, Ruoyu Song, Chenyi Wang, Yuxia Zhan, Jean-Philippe Monteuuis, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
Investigating Physical Latency Attacks Against Camera-Based Perception. 4588-4605 - Trisha Datta, Binyi Chen, Dan Boneh:
VerITAS: Verifying Image Transformations at Scale. 4606-4623 - Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini:
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop. 4624-4642 - Chengru Zhang, Xiao Yang, David F. Oswald, Mark Ryan, Philipp Jovanovic:
Eva: Efficient Privacy-Preserving Proof of Authenticity for Lossily Encoded Videos. 4643-4662 - Kun Wang, Meng Chen, Li Lu, Jingwen Feng, Qianniu Chen, Zhongjie Ba, Kui Ren, Chun Chen:
From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era. 4663-4681 - Long Huang, Chen Wang:
Sniffing Location Privacy of Video Conference Users Using Free Audio Channels. 4682-4698

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.