


default search action
31st USENIX Security Symposium 2022
- Kevin R. B. Butler, Kurt Thomas:

31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022. USENIX Association 2022, ISBN 978-1-939133-31-1
Measurement I: Network
- Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Ted Taekyoung Kwon, Taejoong Chung:

Under the Hood of DANE Mismanagement in SMTP. 1-16 - Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao:

Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests. 17-34 - Guannan Liu, Xing Gao, Haining Wang, Kun Sun:

Exploring the Unchartered Space of Container Registry Typosquatting. 35-51 - Brian Kondracki, Johnny So, Nick Nikiforakis:

Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots. 53-70
Kernel Security
- Kyle Zeng, Yueqi Chen, Haehyun Cho, Xinyu Xing, Adam Doupé, Yan Shoshitaishvili, Tiffany Bao:

Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability. 71-88 - Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, Taesoo Kim:

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. 89-106 - Atri Bhattacharyya, Uros Tesic, Mathias Payer:

Midas: Systematic Kernel TOCTTOU Protection. 107-124 - Jian Liu, Lin Yi, Weiteng Chen, Chengyu Song, Zhiyun Qian, Qiuping Yi:

LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. 125-142
Web Security I: Vulnerabilities
- Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:

Mining Node.js Vulnerabilities via Object Dependence Graph and Query. 143-160 - Ranjita Pai Kasturi, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio:

Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces. 161-178 - Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo:

Web Cache Deception Escalates! 179-196 - Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son:

FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. 197-214
Crypto I: Attacking Implementations
- Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk:

TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries. 215-232 - George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow:

Open to a fault: On the passive compromise of TLS keys via transient errors. 233-250 - Alon Shakevsky, Eyal Ronen, Avishai Wool:

Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. 251-268 - Martin R. Albrecht, Raphael Eikenberg, Kenneth G. Paterson:

Breaking Bridgefy, again: Adopting libsignal is not enough. 269-286
User Studies I: At-Risk Users
- Kovila P. L. Coopamootoo, Maryam Mehrnezhad, Ehsan Toreini:

"I feel invaded, annoyed, anxious and I may protect myself": Individuals' Feelings about Online Tracking and their Protective Behaviour across Gender and Country. 287-304 - Christine Geeng, Mike Harris, Elissa M. Redmiles, Franziska Roesner:

"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice. 305-322 - Julia Slupska, Selina Y. Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan:

"They Look at Vulnerability and Use That to Abuse You": Participatory Threat Modelling with Migrant Domestic Workers. 323-340 - Julia Slupska, Angelika Strohmayer:

Networks of Care: Tech Abuse Advocates' Digital Security Practices. 341-358
Software Vulnerabilities
- Nikolaos Alexopoulos, Manuel Brack, Jan Philipp Wagner, Tim Grube, Max Mühlhäuser:

How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes. 359-376 - Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras:

Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. 377-394 - Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu:

OS-Aware Vulnerability Prioritization via Differential Severity Analysis. 395-412 - Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, Yan Shoshitaishvili:

Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs. 413-430
Network Security I: Scanning & Censorship
- Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:

Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. 431-448 - Abhishek Bhaskar, Paul Pearce:

Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement. 449-464 - Michael Harrity, Kevin Bock, Frederick Sell, Dave Levin:

GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies. 465-483 - Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:

OpenVPN is Open to VPN Fingerprinting. 483-500
Differential Privacy
- Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye:

Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice. 501-518 - Yongji Wu, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data. 519-536 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:

Communication-Efficient Triangle Counting under Local Differential Privacy. 537-554 - Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:

Twilight: A Differentially Private Payment Channel Network. 555-570
Measurement II: Auditing & Best Practices
- Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney:

Watching the watchers: bias and vulnerability in remote proctoring software. 571-588 - J. Alex Halderman:

The Antrim County 2020 Election Incident: An Independent Forensic Investigation. 589-605 - Victor Le Pochat, Laura Edelson, Tom van Goethem, Wouter Joosen, Damon McCoy, Tobias Lauinger:

An Audit of Facebook's Political Ad Policy Enforcement. 607-624 - Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li:

Building an Open, Robust, and Stable Voting-Based Domain Top List. 625-642
Side Channels I: Hardware
- Moritz Lipp, Daniel Gruss, Michael Schwarz:

AMD Prefetch Attacks through Power and Time. 643-660 - Yi Han, Matthew Chan, Zahra Aref, Nils Ole Tippenhauer, Saman A. Zonouz:

Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring. 661-678 - Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. 679-697 - Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas:

Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker. 699-716
Web Security II: Fingerprinting
- Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, Jason Polakis:

The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. 717-733 - Soroush Karami, Faezeh Kalantari, Mehrnoosh Zaeifi, Xavier J. Maso, Erik Trickel, Panagiotis Ilia, Yan Shoshitaishvili, Adam Doupé, Jason Polakis:

Unleash the Simulacrum: Shifting Browser Realities for Robust Extension-Fingerprinting Prevention. 735-752 - Giovanni Cherubin, Rob Jansen, Carmela Troncoso:

Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. 753-770 - Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig:

QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. 771-789
Crypto II: Performance Improvements
- Mahimna Kelkar, Phi Hung Le, Mariana Raykova, Karn Seth:

Secure Poisson Regression. 791-808 - Zhicong Huang, Wen-jie Lu, Cheng Hong, Jiansheng Ding:

Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. 809-826 - Jean-Luc Watson, Sameer Wagh, Raluca Ada Popa:

Piranha: A GPU Platform for Secure Computation. 827-844 - Daniel J. Bernstein, Billy Bob Brumley, Ming-Shing Chen, Nicola Tuveri:

OpenSSLNTRU: Faster post-quantum TLS key exchange. 845-862
User Studies II: Sharing
- Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu, Luyi Xing:

How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion. 863-880 - Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, Sauvik Das:

"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams. 881-898 - Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum:

Caring about Sharing: User Perceptions of Multiparty Data Sharing. 899-916 - Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, Konstantin Beznosov:

Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones. 917-935
Hardware Security I: Attacks & Defenses
- David Schrammel, Samuel Weiser, Richard Sadek, Stefan Mangard:

Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. 936-952 - Gökçen Yilmaz Dayanikli, Sourav Sinha, Devaprakash Muniraj, Ryan M. Gerdes, Mazen Farhood, Mani Mina:

Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators. 953-970 - Enrico Barberis, Pietro Frigo, Marius Muench, Herbert Bos, Cristiano Giuffrida:

Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks. 971-988 - Andrei Tatar, Daniël Trujillo, Cristiano Giuffrida, Herbert Bos:

TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering. 989-1007
Fuzzing I: Networks
- Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee:

FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing. 1008-1023 - Matheus E. Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:

BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing. 1025-1042 - Johannes Krupp, Ilya Grishchenko, Christian Rossow:

AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities. 1043-1060 - Bahruz Jabiyev, Steven Sprecher, Anthony Gavazzi, Tommaso Innocenti, Kaan Onarlioglu, Engin Kirda:

FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies. 1061-1075
Smart Homes I
- Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian:

Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. 1077-1094 - Rahul Anand Sharma, Elahe Soltanaghaei, Anthony Rowe, Vyas Sekar:

Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment. 1095-1112 - Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng:

SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. 1113-1130 - Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:

"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. 1131-1148
Measurement III
- Xander Bouwman, Victor Le Pochat, Pawel Foremski, Tom van Goethem, Carlos Hernandez Gañán, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Wouter Joosen, Michel van Eeten:

Helping hands: Measuring the impact of a large threat intelligence sharing community. 1149-1165 - Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:

A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned. 1167-1184 - Chuhan Wang

, Kaiwen Shen, Minglei Guo, Yuxuan Zhao, Mingming Zhang, Jianjun Chen, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Yanzhong Lin, Qingfeng Pan:
A Large-scale and Longitudinal Measurement Study of DKIM Deployment. 1185-1201 - Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash

, Roya Ensafi:
A Large-scale Investigation into Geodifferences in Mobile Apps. 1203-1220
Fuzzing II: Low-Level
- Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele:

Morphuzz: Bending (Input) Space to Fuzz Virtual Devices. 1221-1238 - Tobias Scharnowski, Nils Bars, Moritz Schloegel, Eric Gustafson, Marius Muench, Giovanni Vigna, Christopher Kruegel, Thorsten Holz, Ali Abbasi:

Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing. 1239-1256 - Cheolwoo Myung, Gwangmu Lee, Byoungyoung Lee:

MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference. 1257-1274 - Zekun Shen, Ritik Roongta, Brendan Dolan-Gavitt:

Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds. 1275-1290
Wireless Security
- Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun:

LTrack: Stealthy Tracking of Mobile Phones in LTE. 1291-1306 - Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, Yongdae Kim:

Watching the Watchers: Practical Video Identification Attack in LTE Networks. 1307-1324 - CheolJun Park, Sangwook Bae, Beomseok Oh, Jiho Lee, Eunkyu Lee, Insu Yun, Yongdae Kim:

DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices. 1325-1342 - Patrick Leu, Giovanni Camurati, Alexander Heinrich, Marc Roeschlin, Claudio Anliker, Matthias Hollick, Srdjan Capkun, Jiska Classen:

Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging. 1343-1359
ML I: Federated Learning
- Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah:

SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. 1361-1378 - Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near:

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. 1379-1395 - Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang:

Label Inference Attacks Against Vertical Federated Learning. 1397-1414 - Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider:

FLAME: Taming Backdoors in Federated Learning. 1415-1432
Deanonymization
- Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. 1433-1450 - Theresa Stadler, Bristena Oprisanu, Carmela Troncoso:

Synthetic Data - Anonymisation Groundhog Day. 1451-1468 - Aloni Cohen:

Attacks on Deidentification's Defenses. 1469-1486 - Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, Yan Jia, Jin Li:

Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes. 1487-1504 - Mojtaba Zaheri, Yossi Oren, Reza Curtmola:

Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. 1505-1523
Mobile Security
- Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen:

FReD: Identifying File Re-Delegation in Android System Services. 1525-1542 - Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. 1543-1559 - Abdullah Imran, Habiba Farrukh, Muhammad Ibrahim, Z. Berkay Celik, Antonio Bianchi:

SARA: Secure Android Remote Authorization. 1561-1578 - Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma:

FOAP: Fine-Grained Open-World Android App Fingerprinting. 1579-1596 - Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang:

Identity Confusion in WebView-based Mobile App-in-app Ecosystems. 1597-1613
Web Security III: Bots & Authentication
- Cormac Herley:

Automated Detection of Automated Traffic. 1615-1632 - Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong:

Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. 1633-1650 - Xu Lin, Panagiotis Ilia, Saumya Solanki, Jason Polakis:

Phish in Sheep's Clothing: Exploring the Authentication Pitfalls of Browser Fingerprinting. 1651-1668 - Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang:

DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. 1669-1686 - Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:

Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. 1687-1704
Crypto III: Private Matching & Lookups
- Anunay Kulshrestha, Jonathan R. Mayer:

Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum. 1705-1722 - Rasoul Akhavan Mahdavi, Florian Kerschbaum:

Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators. 1723-1740 - Yiping Ma, Ke Zhong, Tal Rabin, Sebastian Angel:

Incremental Offline/Online PIR. 1741-1758 - Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider:

GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. 1759-1776 - Yiqing Hua, Armin Namavari, Kaishuo Cheng, Mor Naaman, Thomas Ristenpart:

Increasing Adversarial Uncertainty to Scale Private Similarity Testing. 1777-1794
Passwords
- Avinash Sudhodanan, Andrew Paverd:

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web. 1795-1812 - Asuman Senol, Gunes Acar, Mathias Humbert, Frederik J. Zuiderveen Borgesius:

Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. 1813-1830 - Bijeeta Pal, Mazharul Islam, Marina Sanusi Bohuk, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher A. Wood, Thomas Ristenpart, Rahul Chatterjee:

Might I Get Pwned: A Second Generation Compromised Credential Checking Service. 1831-1848 - Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv:

Why Users (Don't) Use Password Managers at a Large Educational Institution. 1849-1866 - Marina Sanusi Bohuk, Mazharul Islam, Suleman Ahmad, Michael M. Swift, Thomas Ristenpart, Rahul Chatterjee:

Gossamer: Securely Measuring Password-based Logins. 1867-1884
Smart Vehicles
- Ce Zhou, Qiben Yan, Yan Shi, Lichao Sun

:
DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems. 1885-1902 - R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic:

Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. 1903-1920 - Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. 1921-1938 - Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. 1939-1956 - Chen Yan, Zhijian Xu

, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. 1957-1974
Web Security IV: Defenses
- Jay Bosamiya, Wen Shih Lim, Bryan Parno:

Provably-Safe Multilingual Software Sandboxing using WebAssembly. 1975-1992 - Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang:

Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. 1993-2010 - Yunang Chen, Yue Gao, Nick Ceccio, Rahul Chatterjee, Kassem Fawaz, Earlence Fernandes:

Experimental Security Analysis of the App Model in Business Collaboration Platforms. 2011-2028 - Phakpoom Chinprutthiwong, Jianwei Huang, Guofei Gu:

SWAPP: A New Programmable Playground for Web Application Security. 2029-2046 - Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben Stock:

The Security Lottery: Measuring Client-Side Web Security Inconsistencies. 2047-2064
ML II
- Chong Xiang, Saeed Mahloujifar, Prateek Mittal:

PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier. 2065-2082 - Andrea Marcelli, Mariano Graziano, Xabier Ugarte-Pedrero, Yanick Fratantonio, Mohamad Mansouri, Davide Balzarotti:

How Machine Learning Is Solving the Binary Function Similarity Problem. 2099-2116 - Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. 2117-2134 - Ruoyu Wu, Taegyu Kim, Dave (Jing) Tian, Antonio Bianchi, Dongyan Xu:

DnD: A Cross-Architecture Deep Neural Network Decompiler. 2135-2152
Measurement IV
- Alejandro Cuevas, Fieke Miedema, Kyle Soska, Nicolas Christin, Rolf van Wegberg:

Measurement by Proxy: On the Accuracy of Online Marketplace Measurements. 2153-2170 - Andrew Chu, Arjun Arunasalam, Muslum Ozgur Ozmen, Z. Berkay Celik:

Behind the Tube: Exploitative Monetization of Content on YouTube. 2171-2188 - Savino Dambra, Iskander Sánchez-Rola, Leyla Bilge, Davide Balzarotti:

When Sally Met Trackers: Web Tracking From the Users' Perspective. 2189-2206 - George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn:

How to Peel a Million: Validating and Expanding Bitcoin Clusters. 2207-2223
Hardware Security II: Embedded
- Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. 2225-2242 - Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik:

GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices). 2243-2260 - David Cerdeira, José Martins, Nuno Santos, Sandro Pinto:

ReZone: Disarming TrustZone with TEE Privilege Reduction. 2261-2279 - Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, John Criswell:

Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. 2281-2298
Client-Side Security
- Nirvan Tyagi

, Julia Len, Ian Miers, Thomas Ristenpart:
Orca: Blocklisting in Sender-Anonymous Messaging. 2299-2316 - Shubham Jain, Ana-Maria Cretu, Yves-Alexandre de Montjoye:

Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning. 2317-2334 - Rawane Issa, Nicolas Alhaddad, Mayank Varia:

Hecate: Abuse Reporting in Secure Messengers with Sealed Sender. 2335-2352 - Long Chen, Ya-Nan Li, Qiang Tang, Moti Yung:

End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage. 2353-2370
Crypto IV: Databases & Logging
- Jiafan Wang, Sherman S. M. Chow:

Omnes pro uno: Practical Multi-Writer Encrypted Database. 2371-2388 - Viet Tung Hoang, Cong Wu, Xin Yuan:

Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. 2389-2406 - Simon Oya, Florian Kerschbaum:

IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. 2407-2424 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Mohammadamin Karbasforushan, Ioannis Demertzis

:
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions. 2425-2442
Software Forensics
- Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck:

ALASTOR: Reconstructing the Provenance of Serverless Intrusions. 2443-2460 - Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:

Back-Propagating System Dependency Impact for Attack Investigation. 2461-2478 - Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, Jun Xu:

Ground Truth for Binary Disassembly is Not Easy. 2479-2495 - Liang He, Hong Hu, Purui Su, Yan Cai, Zhenkai Liang:

FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries. 2497-2512
Information Flow
- Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai:

PolyCruise: A Cross-Language Dynamic Information Flow Analysis. 2513-2530 - Ju Chen, Wookhyun Han, Mingjun Yin, Haochen Zeng, Chengyu Song, Byoungyoung Lee, Heng Yin, Insik Shin:

SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis. 2531-2548 - Flavien Solt, Ben Gras, Kaveh Razavi:

CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. 2549-2566 - Kaihang Ji, Jun Zeng, Yuancheng Jiang, Zhenkai Liang, Zheng Leong Chua, Prateek Saxena, Abhik Roychoudhury:

FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation. 2567-2584
Network Security II: Infrastructure
- Jiarong Xing, Kuo-Feng Hsu, Yiming Qiu, Ziyang Yang, Hongyi Liu, Ang Chen:

Bedrock: Programmable Network Support for Secure RDMA Systems. 2585-2600 - Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun:

Creating a Secure Underlay for the Internet. 2601-2618 - Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. 2619-2636 - Katharina Kohls, Claudia Díaz:

VerLoc: Verifiable Localization in Decentralized Systems. 2637-2654
ML III
- Shimaa Ahmed, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz

:
Towards More Robust Keyword Spotting for Voice Assistants. 2655-2672 - Changjiang Li

, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. 2673-2690 - Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica O'Dell, Kevin R. B. Butler, Patrick Traynor:

Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. 2691-2708 - Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin:

DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly. 2709-2725
Security Practitioners & Behaviors
- Alessandro Mantovani, Simone Aonzo, Yanick Fratantonio, Davide Balzarotti:

RE-Mind: a First Look Inside the Mind of a Reverse Engineer. 2727-2745 - Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves, Alexandros Kapravelos, Aravind Machiry:

Characterizing the Security of Github CI Workflows. 2747-2763 - Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna:

Decomperson: How Humans Decompile and What We Can Learn From It. 2765-2782 - Bushra A. AlAhmadi, Louise Axon, Ivan Martinovic:

99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms. 2783-2800
Side Channels II
- Alejandro Cabrera Aldaya, Billy Bob Brumley:

HyperDegrade: From GHz to MHz Effective CPU Frequencies. 2801-2818 - Aastha Mehta, Mohamed Alzayat, Roberta De Viti, Björn B. Brandenburg, Peter Druschel, Deepak Garg:

Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud. 2819-2838 - Daniel Townley, Kerem Arikan, Yu David Liu, Dmitry Ponomarev, Oguz Ergin:

Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks. 2839-2856 - Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John D. McCalpin, Mengjia Yan:

Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. 2857-2874
Web Security V: Tracking
- Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso:

WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking. 2875-2892 - Dino Bollinger, Karel Kubicek, Carlos Cotrini, David A. Basin:

Automating Cookie Consent and GDPR Violation Detection. 2893-2910 - Umar Iqbal, Charlie Wolfe, Charles Nguyen, Steven Englehardt, Zubair Shafiq:

Khaleesi: Breaker of Advertising and Tracking Request Chains. 2911-2928 - Yunang Chen, Mohannad Alhanahnah, Andrei Sabelfeld, Rahul Chatterjee, Earlence Fernandes:

Practical Data Access Minimization in Trigger-Action Platforms. 2929-2945
Crypto V: Provers & Shuffling
- Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:

Shuffle-based Private Set Union: Faster and More Secure. 2947-2964 - Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang:

Polynomial Commitment with a One-to-Many Prover and Applications. 2965-2982 - Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Xiao Wang:

ppSAT: Towards Two-Party Private SAT Solving. 2983-3000 - Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, Yupeng Zhang:

Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments. 3001-3018
Security Analysis
- Fangming Gu, Qingli Guo, Lian Li, Zhiniang Peng, Wei Lin, Xiaobo Yang, Xiaorui Gong:

COMRace: Detecting Data Race Vulnerabilities in COM Objects. 3019-3036 - Seunghoon Woo, Hyunji Hong, Eunjin Choi, Heejo Lee:

MOVERY: A Precise Approach for Modified Vulnerable Code Clone Discovery from Modified Open-Source Software Components. 3037-3053 - Moritz Schloegel, Tim Blazytko, Moritz Contag, Cornelius Aschermann, Julius Basler, Thorsten Holz, Ali Abbasi:

Loki: Hardening Code Obfuscation Against Automated Attacks. 3055-3073 - Simon Rohlmann, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:

Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures. 3075-3092 - Chaoshun Zuo, Zhiqiang Lin:

Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games. 3093-3110
SGX I & Side Channels III
- Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss:

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX. 3111-3127 - Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, Haibo Chen:

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation. 3129-3145 - Tobias Cloosters, Johannes Willbold, Thorsten Holz, Lucas Davi:

SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. 3147-3164 - Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean M. Tullsen:

SecSMT: Securing SMT Processors against Contention-Based Covert Channels. 3165-3182 - Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao:

Rendering Contention Channel Made Practical in Web Browsers. 3183-3199
Fuzzing III
- Xiaochen Zou, Guoren Li, Weiteng Chen, Hang Zhang, Zhiyun Qian:

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel. 3201-3217 - Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Aakash Tyagi, Jeyavijayan Rajendran:

TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities. 3219-3236 - Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks:

Fuzzing Hardware Like Software. 3237-3254 - Jinsheng Ba

, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury:
Stateful Greybox Fuzzing. 3255-3272 - Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, Chao Zhang:

StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing. 3273-3289
Crypto VI
- Ange Albertini, Thai Duong, Shay Gueron, Stefan Kölbl, Atul Luykx, Sophie Schmieg:

How to Abuse and Fix Authenticated Encryption Without Key Commitment. 3291-3308 - Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov:

Private Signaling. 3309-3326 - Kinan Dak Albab, Rawane Issa, Mayank Varia, Kalman Graffi:

Batched Differentially Private Information Retrieval. 3327-3344 - Lawrence Roy, Stanislav Lyakhov, Yeongjin Jang, Mike Rosulek:

Practical Privacy-Preserving Authentication for SSH. 3345-3362 - Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras:

One-off Disclosure Control by Heterogeneous Generalization. 3363-3377
User Studies III: Privacy
- Vandit Sharma, Mainack Mondal:

Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data. 3379-3395 - David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, Adam J. Aviv:

Security and Privacy Perceptions of Third-Party Application Access for Google Accounts. 3397-3414 - Mohsen Minaei, Mainack Mondal, Aniket Kate:

Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures. 3415-3432 - Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, Katsiaryna Labunets:

Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. 3433-3450 - Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster:

How and Why People Use Virtual Private Networks. 3451-3465
Smart Homes II
- Zhiwei Wang, Yihui Yan, Yueli Yan, Huangxun Chen, Zhice Yang:

CamShield: Securing Smart Cameras through Physical Replication and Isolation. 3467-3484 - Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev:

SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. 3485-3501 - Harshad Sathaye, Martin Strohmeier, Vincent Lenders, Aanjhan Ranganathan:

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs. 3503-3520 - Sunil Manandhar, Kaushal Kafle, Benjamin Andow, Kapil Singh, Adwait Nadkarni:

Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage. 3521-3538 - Tohid Shekari, Alvaro A. Cárdenas, Raheem Beyah:

MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses. 3539-3556
ML IV: Attacks
- Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu, Chao Zhang:

AutoDA: Automated Decision-based Iterative Adversarial Attacks. 3557-3574 - Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. 3575-3592 - Yufei Chen, Chao Shen, Cong Wang, Yang Zhang:

Teacher Model Fingerprinting Attacks Against Transfer Learning. 3593-3610 - Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, Min Yang:

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. 3611-3628 - Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong:

PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning. 3629-3645
Fuzzing, OS, and Cloud Security
- Antoon Purnal, Furkan Turan, Ingrid Verbauwhede:

Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies. 3647-3664 - Sujaya Maiyya, Seif Ibrahim, Caitlin Scarberry, Divyakant Agrawal, Amr El Abbadi, Huijia Lin, Stefano Tessaro, Victor Zakhary:

QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore. 3665-3682 - Joppe W. Bos, Joost Renes, Christine van Vredendaal:

Post-Quantum Cryptography with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer. 3683-3697 - Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei:

FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing. 3699-3715 - Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min:

Tightly Seal Your Sensitive Pointers with PACTight. 3717-3734
Privacy, User Behaviors, and Attacks
- Bernd Prünster, Alexander Marsalek, Thomas Zefferer:

Total Eclipse of the Heart - Disrupting the InterPlanetary File System. 3735-3752 - Lun Wang, Usmann Khan

, Joseph P. Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song:
PrivGuard: Privacy Regulation Compliance Made Easier. 3753-3770 - Kaleigh Clary, Emma Tosch, Jeremiah Onaolapo, David D. Jensen:

Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks. 3771-3788 - Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou:

OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. 3789-3806
Hardware Security III
- Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss:

Half-Double: Hammering From the Next Row Over. 3807-3824 - Johannes Wikner, Kaveh Razavi:

RETBLEED: Arbitrary Speculative Code Execution with Return Instructions. 3825-3842 - Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo:

PISTIS: Trusted Computing Architecture for Low-end Embedded Systems. 3843-3860 - Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss:

Rapid Prototyping for Microarchitectural Attacks. 3861-3877
OS Security & Formalisms
- Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:

ProFactory: Improving IoT Security via Formalized Protocol Customization. 3879-3896 - Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Michael M. Swift:

Using Trātṛ to tame Adversarial Synchronization. 3897-3916 - Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz:

ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. 3917-3934 - Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:

SAPIC+: protocol verifiers of the world, unite! 3935-3952
ML V: Principles & Best Practices
- Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:

On the Security Risks of AutoML. 3953-3970 - Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:

Dos and Don'ts of Machine Learning in Computer Security. 3971-3988 - Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang:

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. 3989-4006 - Anvith Thudi, Hengrui Jia, Ilia Shumailov, Nicolas Papernot:

On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning. 4007-4022
User Studies IV: Policies & Best Practices
- Collins W. Munyendo, Philipp Markert, Alexandra Nisenoff, Miles Grant, Elena Korkes, Blase Ur, Adam J. Aviv:

"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits. 4023-4040 - Harjot Kaur, Sabrina Amft

, Daniel Votipka, Yasemin Acar, Sascha Fahl:
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. 4041-4058 - Karola Marky, Paul Gerber, Sebastian Günther, Mohamed Khamis, Maximilian Fries, Max Mühlhäuser:

Investigating State-of-the-Art Practices for Fostering Subjective Trust in Online Voting through Interviews. 4059-4076 - Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:

Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. 4077-4094
SGX II
- Guoxing Chen, Yinqian Zhang:

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. 4095-4110 - Jason Zhijingcheng Yu, Shweta Shinde

, Trevor E. Carlson, Prateek Saxena:
Elasticlave: An Efficient Memory Model for Enclaves. 4111-4128 - Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. 4129-4146 - Andreas Kogler, Daniel Gruss, Michael Schwarz:

Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. 4147-4164
Network Security III: DDoS
- Lenka Turonová, Lukás Holík, Ivan Homoliak, Ondrej Lengál, Margus Veanes, Tomás Vojnar:

Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. 4165-4182 - Yeting Li, Yecheng Sun, Zhiwu Xu, Jialun Cao, Yuekang Li, Rongchen Li, Haiming Chen, Shing-Chi Cheung, Yang Liu, Yang Xiao:

RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix. 4183-4200 - A. S. M. Rizvi, Leandro M. Bertholdo, João M. Ceron, John S. Heidemann:

Anycast Agility: Network Playbooks to Fight DDoS. 4201-4218 - Robert McLaughlin, Fabio Pagani, Noah Spahn, Christopher Kruegel, Giovanni Vigna:

Regulator: Dynamic Analysis to Detect ReDoS. 4219-4235
Zero Knowledge
- Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:

Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. 4237-4254 - Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish:

Zero-Knowledge Middleboxes. 4255-4272 - Sebastian Angel, Andrew J. Blumberg, Eleftherios Ioannidis, Jess Woods:

Efficient Representation of Numerical Optimization Problems for SNARKs. 4273-4290 - Alex Ozdemir, Dan Boneh:

Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. 4291-4308
Software Security
- Yu Liang, Song Liu, Hong Hu:

Detecting Logical Bugs of DBMS with Coverage-based Guidance. 4309-4326 - Qibin Chen, Jeremy Lacomis, Edward J. Schwartz, Claire Le Goues, Graham Neubig, Bogdan Vasilescu:

Augmenting Decompiler Output with Learned Variable Names and Types. 4327-4343 - Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, Jun Xu:

Debloating Address Sanitizer. 4345-4363 - Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:

Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 4365-4382
Side Channels IV
- Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng:

Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel. 4383-4400 - Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:

Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. 4401-4417 - Yuanyuan Yuan, Qi Pang, Shuai Wang:

Automated Side Channel Analysis of Media Software with Manifold Learning. 4419-4436 - Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer:

Lend Me Your Ear: Passive Remote Physical Side Channels on PCs. 4437-4454
Network Security IV
- Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:

Stalloris: RPKI Downgrade Attack. 4455-4471 - Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner:

XDRI Attacks - and - How to Enhance Resilience of Residential Routers. 4473-4490 - David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi:

V'CER: Efficient Certificate Validation in Constrained Networks. 4491-4508 - Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang:

Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS. 4509-4524
ML VI: Inference
- Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:

ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. 4525-4542 - Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:

Inference Attacks Against Graph Neural Networks. 4543-4560 - Xiaoyong Yuan, Lan Zhang:

Membership Inference Attacks and Defenses in Neural Network Pruning. 4561-4578 - Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:

Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. 4579-4596

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














