Paper list
Paper list
- 782 Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
- 783 Oracle simulation: a technique for protocol composition with long term shared secrets
- 784 PPE Circuits: Formal Definition to Software Automation
- 785 Gotta CatchâEm All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
- 786 A Qualitative Study of Dependency Management and Its Security Implications
- 787 VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity
- 788 A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks
- 789 Security Analysis and Implementation of Relay-Resistant Contactless Payments
- 790 MuSig-DN: Two-Round Schnorr Multi-Signatures with Verifiably Deterministic Nonces
- 791 LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction
- 792 GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models
- 793 DECO: Liberating Web Data Using Decentralized Oracles for TLS
- 794 PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
- 795 TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs
- 796 Private Summation in the Multi-Message Shuffle Model
- 797 ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
- 798 Pointproofs: Aggregating Proofs for Multiple Vector Commitments
- 799 Bypassing Tor Exit Blocking with Exit Bridge Onion Services
- 800 InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
- 801 BDoS: Blockchain Denial-of-Service Attacks
- 802 Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP
- 803 Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles
- 804 eThor: Practical and Provably Sound Static Analysis of Ethereum Smart Contracts
- 805 Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries
- 806 Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks
- 807 A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models
- 808 When the Differences in Frequency Domain are Compensated: Understanding and
Defeating Modulated Replay Attacks on Automatic Speech Recognition
- 809 Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems
- 810 Exaggerated Error Handling Hurts! An In-Depth Study and Context-Aware Detection
- 811 Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China
- 812 Text Captcha Is Dead? A Large Scale Deployment and Empirical Study
- 813 R^2DP: A Universal and Automated Approach to Optimizing the Randomization
Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions
- 814 SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
- 815 Blinder -- Scalable, Robust Anonymous Committed Broadcast
- 816 Dumbo: Faster Asynchronous BFT Protocols
- 817 Verifiable Timed Signatures Made Practical
- 818 A Performant, Misuse-Resistant API for Primality Testing
- 819 TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA
- 820 Threshold Password-Hardened Encryption Services
- 821 Privaros: A Framework for Privacy-Compliant Delivery Drones
- 822 PMForce: Systematically Analyzing postMessage Handlers at Scale
- 823 Forensic Analysis in Access Control: Foundations and a Case-Study from Practice
- 824 DeepDyve: Dynamic Verification for Deep Neural Networks
- 825 LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
- 826 Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms
- 827 Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks
- 828 FREEDOM: Engineering a State-of-the-Art DOM Fuzzer
- 829 Zombie Awakening: Stealthy Hijacking of Active Domains Through DNS Hosting Referral
- 830 VAHunt: Warding Off New Repackaged Android Malware in App-Virtualizationâs Clothing
- 831 PatchScope: Memory Object Centric Patch Diffing
- 832 Slimium: Debloating the Chromium Browser with Feature Subsetting
- 833 Youâve Changed: Detecting Malicious Browser Extensions through their Update Deltas
- 834 Implementing the Exponential Mechanism with Base-2 Differential Privacy
- 835 FirmRay: Detecting BLE Link Layer Vulnerabilities from Configurations in Bare-Metal Firmware
- 836 Finding Cracks in Shields: On the Security of Control Flow Integrity Mechanisms
- 837 The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures
- 838 Information Leakage in Embedding Models
- 839 The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws
- 840 Deploying Android Security Updates: An Extensive Study Involving Manufacturers, Carriers, and End Users
- 841 Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill
- 842 QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme
- 843 Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions
- 844 Usage Patterns of Privacy-Enhancing Technologies
- 845 AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations
- 846 Security of Streaming Encryption in Google's Tink Library
- 847 CrypTFlow2: Practical 2-Party Secure Inference
- 848 ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams
- 849 MP-SPDZ: A Versatile Framework for Multi-Party Computation
- 850 Full Database Reconstruction in Two Dimensions
- 851 Post-quantum TLS without handshake signatures
- 852 Ferret: Fast Extension for Correlated OT with Small Communication
- 853 Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC
- 854 Examining Mirai's Battle over the Internet of Things
- 855 A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet
- 856 Zero Knowledge Proofs for Decision Tree Predictions and Accuracy
- 857 TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting
- 858 HACLÃN: Verified Generic SIMD Crypto (for all your favourite platforms)
- 859 Mitigation of Attacks on Email End-to-End Encryption
- 860 CLAPS: Client-Location-Aware Path Selection in Tor
- 861 Analyzing Information Leakage of Updates to Natural Language Models
- 862 A Systematic Study of Elastic Objects in Kernel Exploitation
- 863 Definitive recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blacklist requirements
- 864 Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice
- 865 DNS Cache Poisoning Attack Reloaded: Revolutions With Side Channels
- 866 Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism
- 867 CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples
- 868 Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
- 869 A 2.1 KHz Zero-Knowledge Processor with BubbleRAM
- 870 On the Optimality of Optimistic Responsiveness
- 871 More Efficient MPC from Improved Triple Generation and Authenticated Garbling
- 872 Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System
- 873 Off-Path TCP Exploits of the Mixed IPID Assignment
- 874 Secure Single-Server Aggregation with (Poly)Logarithmic Overhead
- 875 Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments
- 876 HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
- 877 T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices
- 878 iDEA: Towards Static Analysis on the Security of Apple Kernel Drivers
- 879 Fast Database Joins and PSI for Secret Shared Data
- 880 Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks
Autonomous Vehicle
Camera
Tesla
Mobileye
- 881 Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
- 882 RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection
- 883 Deterministic Wallets in a Quantum World
- 884 Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features
- 885 The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption
- 886 Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing
- 887 Speculative Probing: Hacking Blind in the Spectre Era
- 888 Estimating g-Leakage via Machine Learning
- 889 Asynchronous Distributed Key Generation for Computationally Secure Randomness, Consensus, and Threshold Signatures
- 890 WI is almost enough: Contingent (Service) Payment all over again
- 891 SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis
- 892 BlackMirror: Preventing Wallhacks in 3D Online FPS Games
- 893 Everything is a Race and Nakamoto Always Wins
- 894 Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
- 895 Tight Consistency Bounds for Bitcoin
- 896 Déjà vu: Side-channel analysis of Mozillaâs NSS
- 897 Asynchronous Remote Key Generation: An Analysis of Yubicoâs Proposal for W3C WebAuthn
- 898 Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale
- 899 Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC
- 900 Ligero++: A New Optimized Sublinear IOP
- 901 Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations
- 902 UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts