Computer security paper
Paper list
Paper list
268
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Federated Learning
Differential privacy
ML
269
The Droid is in the Details: Environment-aware Evasion of Android Sandboxes
Android
Smartphone
Sandboxes
Malware
Sandbox-evasion techniques
281
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS)
Fake news
Privacy
Messaging systems
284
Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase
Privacy
Cyber-physical
Vehicle
294
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
Android
Smartphone
Java
Privacy
486
Kalεido: Real-Time Privacy Control for Eye-Tracking Systems
Privacy
Eye-tracking
550
Data Poisoning Attacks to Local Differential Privacy Protocols
Differential Privacy
565
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript
JavaScript
570
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Apple
AirDrop
Privacy
Authentication
Smartphone
iOS
Bluetooth
BLE
572
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
Web
JavaScript
Web Browser
622
Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data
Voice Assistant
VA
Privacy
User study
1766
Adversarial Attacks on Camera-LiDAR Models for 3D Car Detection
Autonomous Vehicle
manualSet
Camera
LiDAR
MSF
KITTI
YOLOv3
EPNet
PointRCNN
Module-level
Virtual evaluation