Paper list
Paper list
- 1464 A Decentralized and Encrypted National Gun Registry
- 1465 A First Look at Zoombombing
- 1466 A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces
- 1467 A Secure and Formally Verified Linux KVM Hypervisor
- 1468 A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
- 1469 A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
- 1470 ARBITRAR : User-Guided API Misuse Detection
- 1471 Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
- 1472 Adversary Instantiation: Lower bounds for differentially private machine learning
- 1473 An I/O Separation Model for Formal Verification of Kernel Implementations
- 1474 An Interactive Prover for Protocol Verification in the Computational Model
- 1475 Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings
- 1476 BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
- 1477 Bitcoin-Compatible Virtual Channels
- 1478 Black Widow: Blackbox Data-driven Web Scanning
- 1479 Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
- 1480 Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
- 1481 Breaking the Specification: PDF Certification
- 1482 CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers
- 1483 CRYLOGGER: Detecting Crypto Misuses Dynamically
- 1484 CacheOut: Leaking Data on Intel CPUs via Cache Evictions
- 1485 CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- 1486 Co-Inflow: Coarse-Grained Information Flow Control for Java-like Languages
- 1487 Compact Certificates of Collective Knowledge
- 1488 Compositional Non-Interference for Fine-Grained Concurrent Programs
- 1489 Compositional Security for Reentrant Applications
- 1490 ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
- 1491 CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
- 1492 Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
- 1493 Cross-Domain Access Control Encryption -- Arbitrary-policy, Constant-size, Efficient
- 1494 CrossTalk: Speculative Data Leaks Across Cores Are Real
- 1495 CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
- 1496 DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
- 1497 DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
- 1498 DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs
- 1499 DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers
- 1500 Data Privacy in Trigger-Action Systems
- 1501 Defensive Technology Use by Political Activists During the Sudanese Revolution
- 1502 Detecting AI Trojans Using Meta Neural Analysis
- 1503 Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures
- 1504 Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
- 1505 Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
- 1506 Doing good by fighting fraud: Ethical anti-fraudsystems for mobile payments
- 1507 DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection
- 1508 Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
- 1509 Electromagnetic Covert Channels Can Be Super Resilient
- 1510 Epochal Signatures for Deniable Group Chats
- 1511 Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
- 1512 Good Bot, Bad Bot: Characterizing Automated Browsing Activity
- 1513 HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
- 1514 Happer: Unpacking Android Apps via a Hardware-Assisted Approach
- 1515 Hardware-Software Contracts for Secure Speculation
- 1516 Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
- 1517 High-Assurance Cryptography in the Spectre Era
- 1518 High-Frequency Trading on Decentralized On-Chain Exchanges
- 1519 How Did That Get In My Phone? Unwanted App Distribution on Android Devices
- 1520 Improving Password Guessing via Representation Learning
- 1521 Invisible Probe: Timing Attacks with PCIe Congestion Side-channel
- 1522 Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Autonomous Vehicle
MSF
Camera
LiDAR
Physical-World
Apollo
LGSVL
- 1523 Is Private Learning Possible with Instance Encoding?
- 1524 Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
- 1525 Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
- 1526 Learning Differentially Private Mechanisms
- 1527 Lightweight Techniques for Private Heavy Hitters
- 1528 Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
- 1529 Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures
- 1530 MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
- 1531 Machine Unlearning
- 1532 Manipulation Attacks in Local Differential Privacy
- 1533 Many-out-of-Many Proofs and Applications to Anonymous Zether
- 1534 Merkle^2: A Low-Latency Transparency Log System
- 1535 Method Confusion Attack on Bluetooth Pairing
- 1536 NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis
- 1537 OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
- 1538 On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
- 1539 On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
- 1540 One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation
- 1541 PLATYPUS: Software-based Power Side-Channel Attacks on x86
- 1542 Pegasus: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
- 1543 Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision
Autonomous Vehicle
Object detection
Camera
YOLO
Faster R-CNN
Apollo
BDD100K
KITTI
Physical-World
- 1544 Post-Quantum WireGuard
- 1545 Proactive Threshold Wallets with Offline Devices
- 1546 Proof-of-Learning: Definitions and Practice
- 1547 Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
- 1548 Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems
- 1549 Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
- 1550 Red Belly: A Secure, Fair and Scalable Open Blockchain
- 1551 Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
- 1552 Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities
- 1553 Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks
- 1554 SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically
- 1555 SIRNN: A Math Library for Secure RNN Inference
- 1556 STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
- 1557 Self-Supervised Euphemism Detection and Identification for Content Moderation
- 1558 SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
- 1559 SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask
- 1560 SoK: Computer-Aided Cryptography
- 1561 SoK: Fully Homomorphic Encryption Compilers
- 1562 SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
- 1563 SoK: Quantifying Cyber Risk
- 1564 SoK: Security and Privacy in the Age of Commercial Drones
- 1565 SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
- 1566 Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land
- 1567 Systematic Analysis of Randomization-Based Protected Cache Architectures
- 1568 The EMV Standard: Break, Fix, Verify
- 1569 The Provable Security of Ed25519: Theory and Practice
- 1570 They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites
- 1571 Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem
- 1572 Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization
- 1573 Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)
- 1574 When Function Signature Recovery Meets Compiler Optimization
- 1575 Which Privacy and Security Attributes Most Impact Consumersâ Risk Perception and Willingness to Purchase IoT Devices?
- 1576 Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
- 1577 Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
- 1578 Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs