IEEE Euro S&P Chair's Site
The following papers have been accepted to the 7th IEEE European Symposium on Security and Privacy to be held June 6-10, 2022 in Genoa, Italy.
List By Authors · Institutions · Papers by Topic · Papers with Artifacts · Open Papers · Posters
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact] | Md Imran Hossen, Xiali Hei |
Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen |
Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] | McKenna McCall, Abhishek Bichhawat, Limin Jia |
CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa |
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact] | Yacov Manevich, Adi Akavia |
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán |
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah |
Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang |
Dynamic Policies Revisited [Paper] [Artifact] | Amir M. Ahmadian, Musard Balliu |
EZEE: Epoch Parallel Zero Knowledge for ANSI C | Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery |
Fuzzing with Data Dependency Information [Paper] [Artifact] | Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti |
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash |
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns |
HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang |
Hide and Seek: Revisiting DNS-based User Tracking [Artifact] | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li |
HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact] | Kenneth G. Paterson, Mathilde Raynal |
ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] | Haoyu He, Yuede Ji, H. Howie Huang |
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert |
KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin |
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact] | Payton Walker, Nitesh Saxena |
Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact] | Antreas Dionysiou, Elias Athanasopoulos |
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps |
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] | Mert Side, Fan Yao, Zhenkai Zhang |
Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey |
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef |
SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran |
Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar |
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda |
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli |
SoK: Oblivious Pseudorandom Functions [Paper] | Sílvia Casacuberta, Julia Hesse, Anja Lehmann |
SoK: Privacy-Preserving Computing in the Blockchain Era [Paper] | Ghada Almashaqbeh, Ravital Solomon |
SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact] | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova |
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci |
Towards Fair and Robust Classification [Artifact] | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang |
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu |
Transformer-based Extraction of Deep Image Models [Artifact] | Verena Battis, Alexander Penner |
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact] | Jason Liu, Anant Kandikuppa, Adam Bates |
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang |
Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot |
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic |
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] | Dandan Yuan, Shujie Cui, Giovanni Russello |
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi |