Skip to content

Latest commit

 

History

History
222 lines (221 loc) · 88.5 KB

2022.md

File metadata and controls

222 lines (221 loc) · 88.5 KB

ACM Conference on Computer and Communications Security (CCS) 2022

Title Authors Paper Code Presentation
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security. Calvin Abou Haidar, Benoît Libert, Alain Passelègue PDF - -
Helping or Hindering?: How Browser Extensions Undermine Security. Shubham Agarwal PDF - -
Practical, Round-Optimal Lattice-Based Blind Signatures. Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav PDF - -
Blacktooth: Breaking through the Defense of Bluetooth in Silence. Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu PDF - -
Server-Aided Continuous Group Key Agreement. Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk PDF - -
Enforcing Fine-grained Constant-time Policies. Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya PDF - -
Post Quantum Noise. Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, Florian Weber PDF - -
Laconic Private Set-Intersection From Pairings. Diego F. Aranha, Chuanwei Lin, Claudio Orlandi, Mark Simkin PDF - -
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. Gilad Asharov, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida PDF - -
Chaghri - A FHE-friendly Block Cipher. Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar PDF - -
Secure Parallel Computation on Privately Partitioned Data and Applications. Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa PDF - -
Thora: Atomic and Privacy-Preserving Multi-Channel Updates. Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei PDF - -
Sleepy Channels: Bi-directional Payment Channels without Watchtowers. Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei PDF - -
On the Adaptive Security of the Threshold BLS Signature Scheme. Renas Bacho, Julian Loss PDF - -
Secret-Shared Joins with Multiplicity from Aggregation Trees. Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal PDF - -
META-BTS: Bootstrapping Precision Beyond the Limit. Youngjin Bae, Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Taekyung Kim PDF - -
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Leemon Baird, Pratyay Mukherjee, Rohit Sinha PDF - -
Membership Inference Attacks and Generalization: A Causal Perspective. Teodora Baluta, Shiqi Shen, S. Hitarth, Shruti Tople, Prateek Saxena PDF - -
Tidy: Symbolic Verification of Timed Cryptographic Protocols. Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina PDF - -
A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music. Anomadarshi Barua, Yonatan Gizachew Achamyeleh, Mohammad Abdullah Al Faruque PDF - -
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. Carsten Baum, Robin Jadoul, Emmanuela Orsini, Peter Scholl, Nigel P. Smart PDF - -
Distributed, Private, Sparse Histograms in the Two-Server Model. James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann PDF - -
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin PDF - -
Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC. Alex Berke, Dan Calacci PDF - -
JIT-Picking: Differential Fuzzing of JavaScript Engines. Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel, Tim Blazytko, Thorsten Holz PDF - -
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. Karthikeyan Bhargavan, Vincent Cheval, Christopher A. Wood PDF - -
Power Contracts: Provably Complete Power Leakage Models for Processors. Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard, Robert Primas PDF - -
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani PDF - -
Victory by KO: Attacking OpenPGP Using Key Overwriting. Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson PDF - -
Do Opt-Outs Really Opt Me Out? Duc Bui, Brian Tang, Kang G. Shin PDF - -
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. Chengjun Cai, Yichen Zang, Cong Wang, Xiaohua Jia, Qian Wang PDF - -
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh PDF - -
Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It. Sílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman PDF - -
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue PDF - -
Graph Unlearning. Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang PDF - -
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. Zitai Chen, Sam L. Thomas, Flavio D. Garcia PDF - -
PSI from Ring-OLE. Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky PDF - -
HammerScope: Observing DRAM Power Consumption Using Rowhammer. Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom PDF - -
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering. Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira PDF - -
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. Tianshuo Cong, Xinlei He, Yang Zhang PDF - -
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell PDF - -
Sharp: Short Relaxed Range Proofs. Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß, Michael Reichle PDF - -
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye PDF - -
VRust: Automated Vulnerability Detection for Solana Smart Contracts. Siwei Cui, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang PDF - -
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. Anders P. K. Dalskov, Daniel Escudero, Ariel Nof PDF - -
Understanding Security Issues in the NFT Ecosystem. Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna PDF - -
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. Bernardo David, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi PDF - -
STAR: Secret Sharing for Private Threshold Aggregation Reporting. Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi PDF - -
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. Alvise de Faveri Tron, Stefano Longari, Michele Carminati, Mario Polino, Stefano Zanero PDF - -
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection. Paola de Perthuis, David Pointcheval PDF - -
On the (In)Security of Secure ROS2. Gelei Deng, Guowen Xu, Yuan Zhou, Tianwei Zhang, Yang Liu PDF - -
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. Jiangyi Deng, Yanjiao Chen, Wenyuan Xu PDF - -
StrongBox: A GPU TEE on Arm Endpoints. Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang PDF - -
Understanding Real-world Threats to Deep Learning Models in Android Apps. Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng PDF - -
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. Karel Dhondt, Victor Le Pochat, Alexios Voulimeneas, Wouter Joosen, Stijn Volckaert PDF - -
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES. Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi PDF - -
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky PDF - -
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha PDF - -
Leakage and Tamper Resilient Permutation-Based Cryptography. Christoph Dobraunig, Bart Mennink, Robert Primas PDF - -
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection. Priyanka Dodia, Mashael AlSabah, Omar Alrawi, Tao Wang PDF - -
Watch Out for Race Condition Attacks When Using Android External Storage. Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo PDF - -
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu PDF - -
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang PDF - -
Poirot: Probabilistically Recommending Protections for the Android Framework. Zeinab El-Rewini, Zhuo Zhang, Yousra Aafer PDF - -
TurboPack: Honest Majority MPC with Constant Online Communication. Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song PDF - -
Automatic Detection of Speculative Execution Combinations. Xaver Fabian, Marco Guarnieri, Marco Patrignani PDF - -
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon PDF - -
NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu PDF - -
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. Juanru Fang, Wei Dong, Ke Yi PDF - -
CINI MINIS: Domain Isolation for Fault and Combined Security. Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu PDF - -
Adversarial Correctness and Privacy for Probabilistic Data Structures. Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia PDF - -
LibAFL: A Framework to Build Modular and Reusable Fuzzers. Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti PDF - -
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. Dario Fiore, Ida Tucker PDF - -
Minotaur: Multi-Resource Blockchain Consensus. Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang PDF - -
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. Nils Fleischhacker, Mark Simkin, Zhenfei Zhang PDF - -
Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats. Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn PDF - -
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker PDF - -
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang PDF - -
Secure Auctions in the Presence of Rational Adversaries. Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar PDF - -
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang PDF - -
Succinct Zero Knowledge for Floating Point Computations. Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang PDF - -
Practical Settlement Bounds for Proof-of-Work Blockchains. Peter Gazi, Ling Ren, Alexander Russell PDF - -
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui PDF - -
C2C: Fine-grained Configuration-driven System Call Filtering. Seyedhamed Ghavamnia, Tapti Palit, Michalis Polychronakis PDF - -
Foundations of Coin Mixing Services. Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan PDF - -
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran PDF - -
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration. Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero PDF - -
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. Floris Gorter, Koen Koning, Herbert Bos, Cristiano Giuffrida PDF - -
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch PDF - -
Proof-of-Possession for KEM Certificates using Verifiable Generation. Tim Güneysu, Philip W. Hodges, Georg Land, Mike Ounsworth, Douglas Stebila, Greg Zaverucha PDF - -
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan PDF - -
Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation. Zayd Hammoudeh, Daniel Lowd PDF - -
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu PDF - -
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest PDF - -
Behind the Scenes of RPKI. Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner PDF - -
On the Privacy Risks of Cell-Based NAS Architectures. Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang PDF - -
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke, Johannes Müller, Daniel Rausch, Pascal Reisert, Andreas Vogt PDF - -
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum PDF - -
SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities. Jaewon Hur, Suhwan Song, Sunwoo Kim, Byoungyoung Lee PDF - -
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer, Christian Rossow PDF - -
Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model. Jacob Imola, Takao Murakami, Kamalika Chaudhuri PDF - -
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. Akira Ito, Rei Ueno, Naofumi Homma PDF - -
AI/ML for Network Security: The Emperor has no Clothes. Arthur Selle Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, Lisandro Z. Granville PDF - -
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. Louis Jannett, Vladislav Mladenov, Christian Mainka, Jörg Schwenk PDF - -
Are Attribute Inference Attacks Just Imputation? Bargav Jayaraman, David Evans PDF - -
Cache Refinement Type for Side-Channel Detection of Cryptographic Software. Ke Jiang, Yuyan Bao, Shuai Wang, Zhibo Liu, Tianwei Zhang PDF - -
Evocatio: Conjuring Bug Capabilities from a Single PoC. Zhiyuan Jiang, Shuitao Gan, Adrian Herrera, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer PDF - -
Understanding IoT Security from a Market-Scale Perspective. Xin Jin, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni PDF - -
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. Xin Jin, Kexin Pei, Jun Yeon Won, Zhiqiang Lin PDF - -
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu PDF - -
Private and Reliable Neural Network Inference. Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev PDF - -
A Scalable and Dynamic ACL System for In-Network Defense. Changhun Jung, Sian Kim, Rhongho Jang, David Mohaisen, DaeHun Nyang PDF - -
TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities. Wooseok Kang, Byoungho Son, Kihong Heo PDF - -
HyperDbg: Reinventing Hardware-Assisted Debugging. Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz PDF - -
RedShift: Transparent SNARKs from List Polynomial Commitments. Assimakis A. Kattis, Konstantin Panarin, Alexander Vlasov PDF - -
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. Aggelos Kiayias, Markulf Kohlweiss, Amirreza Sarencheh PDF - -
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. Seulbae Kim, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim PDF - -
Phishing URL Detection: A Network-based Approach Robust to Evasion. Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim PDF - -
NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. Kamil Kluczniak PDF - -
Low-Latency Hardware Private Circuits. David Knichel, Amir Moradi PDF - -
LPGNet: Link Private Graph Networks for Node Classification. Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena PDF - -
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption. Evgenios M. Kornaropoulos, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas PDF - -
PentaGOD: Stepping beyond Traditional GOD with Five Parties. Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal PDF - -
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson PDF - -
Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing. Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic PDF - -
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang PDF - -
PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang PDF - -
Auditing Membership Leakages of Multi-Exit Networks. Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang PDF - -
Overo: Sharing Private Audio Recordings. Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee PDF - -
InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution. Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang PDF - -
DirtyCred: Escalating Privilege in Linux Kernel. Zhenpeng Lin, Yuhang Wu, Xinyu Xing PDF - -
Frequency Throttling Side-Channel Attack. Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel PDF - -
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang PDF - -
When Evil Calls: Targeted Adversarial Voice over IP Network. Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang PDF - -
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu PDF - -
Matproofs: Maintainable Matrix Commitment with Efficient Aggregation. Jing Liu, Liang Feng Zhang PDF - -
Harnessing Perceptual Adversarial Patches for Crowd Counting. Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao PDF - -
Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities. Yinxi Liu, Wei Meng PDF - -
Membership Inference Attacks by Exploiting Loss Trajectory. Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang PDF - -
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. Yulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, Yinhong Zhao PDF - -
StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning. Yupei Liu, Jinyuan Jia, Hongbin Liu, Neil Zhenqiang Gong PDF - -
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo PDF - -
Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems. Jie Lu, Haofeng Li, Chen Liu, Lian Li, Kun Cheng PDF - -
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. Yuan Lu, Zhenliang Lu, Qiang Tang PDF - -
TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. Changhua Luo, Penghui Li, Wei Meng PDF - -
Proving UNSAT in Zero Knowledge. Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac, Eran Tromer, Xiao Wang PDF - -
Frequency Estimation in the Shuffle Model with Almost a Single Message. Qiyao Luo, Yilei Wang, Ke Yi PDF - -
Feature Inference Attack on Shapley Values. Xinjian Luo, Yangfan Jiang, Xiaokui Xiao PDF - -
Federated Boosted Decision Trees with Differential Privacy. Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha PDF - -
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia PDF - -
Securing Reset Operations in NISQ Quantum Computers. Allen Mi, Shuwen Deng, Jakub Szefer PDF - -
Constant Latency in Sleepy Consensus. Atsuki Momose, Ling Ren PDF - -
Physical Hijacking Attacks against Object Trackers. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes PDF - -
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. Yusuke Naito, Yu Sasaki, Takeshi Sugawara, Kan Yasuda PDF - -
CERBERUS: Exploring Federated Prediction of Security Events. Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro PDF - -
Sigstore: Software Signing for Everybody. Zachary Newman, John Speed Meyers, Santiago Torres-Arias PDF - -
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. Trung Tin Nguyen, Michael Backes, Ben Stock PDF - -
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang PDF - -
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. ChangSeok Oh, Chris Kanich, Damon McCoy, Paul Pearce PDF - -
Discovering IoT Physical Channel Vulnerabilities. Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang PDF - -
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. Dario Pasquini, Danilo Francati, Giuseppe Ateniese PDF - -
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan PDF - -
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. Tamjid Al Rahat, Yu Feng, Yuan Tian PDF - -
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals. Soundarya Ramesh, Ghozali Suhariyanto Hadi, Sihun Yang, Mun Choon Chan, Jun Han PDF - -
FABEO: Fast Attribute-Based Encryption with Optimal Security. Doreen Riepel, Hoeteck Wee PDF - -
Blazing Fast PSI from Improved OKVS and Subfield VOLE. Srinivasan Raghuraman, Peter Rindal PDF - -
Strengthening Order Preserving Encryption with Differential Privacy. Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou PDF - -
EIFFeL: Ensuring Integrity for Federated Learning. Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten PDF - -
ROAST: Robust Asynchronous Schnorr Threshold Signatures. Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder PDF - -
Fast Fully Oblivious Compaction and Shuffling. Sajin Sasy, Aaron Johnson, Ian Goldberg PDF - -
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs. Fabian Schwarz, Khue Do, Gunnar Heide, Lucjan Hanzlik, Christian Rossow PDF - -
MC2: Rigorous and Efficient Directed Greybox Fuzzing. Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana PDF - -
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao PDF - -
Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing. Junxian Shen, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu PDF - -
Finding MNEMON: Reviving Memories of Node Embeddings. Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini PDF - -
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang PDF - -
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. Konstantinos Solomos, Panagiotis Ilia, Nick Nikiforakis, Jason Polakis PDF - -
pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han PDF - -
Bullshark: DAG BFT Protocols Made Practical. Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias PDF - -
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. Shravan Srinivasan, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou PDF - -
Zapper: Smart Contracts with Data and Identity Privacy. Samuel Steffen, Benjamin Bichsel, Martin T. Vechev PDF - -
Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen PDF - -
NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler PDF - -
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets. Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini PDF - -
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro PDF - -
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. Han Wang, Hanbin Hong, Li Xiong, Zhan Qin, Yuan Hong PDF - -
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. Jianfeng Wang, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen PDF - -
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang PDF - -
Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. Xian Wang, Shuang Hao PDF - -
Group Property Inference Attacks Against Graph Neural Networks. Xiuling Wang, Wendy Hui Wang PDF - -
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang PDF - -
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, Xiao Wang PDF - -
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. Jan Wichelmann, Florian Sieck, Anna Pätschke, Thomas Eisenbarth PDF - -
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang PDF - -
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun PDF - -
Protecting Critical Inter-Domain Communication through Flyover Reservations. Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig PDF - -
Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee PDF - -
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang PDF - -
zkBridge: Trustless Cross-chain Bridges Made Practical. Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song PDF - -
Automatic Detection of Fake Key Attacks in Secure Messaging. Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons PDF - -
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. Edwin Yang, Qiuye He, Song Fang PDF - -
An Extensive Study of Residential Proxies in China. Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan PDF - -
Detecting and Measuring Misconfigured Manifests in Android Apps. Yuqing Yang, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou, Zhiqiang Lin PDF - -
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. Yuqing Yang, Yue Zhang, Zhiqiang Lin PDF - -
Enhanced Membership Inference Attacks against Machine Learning Models. Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri PDF - -
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. Zhiyuan Yu, Zhuohang Li, Yuanhaur Chang, Skylar Fong, Jian Liu, Ning Zhang PDF - -
Caulk: Lookup Arguments in Sublinear Time. Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin PDF - -
PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. Jun Zeng, Chuqi Zhang, Zhenkai Liang PDF - -
PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. Haibin Zhang, Sisi Duan PDF - -
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé PDF - -
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. Yue Zhang, Zhiqiang Lin PDF - -
VOProof: Efficient zkSNARKs from Vector Oracle Compilers. Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shifeng Sun, Geng Wang, Dawu Gu PDF - -
Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks. Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai PDF - -
Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. Ke Zhong, Yiping Ma, Sebastian Angel PDF - -
Uncovering Intent based Leak of Sensitive Data in Android Framework. Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai PDF - -
Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu PDF - -
What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang PDF - -
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. Xin'an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian PDF - -