IEEE European Symposium on Security and Privacy

IEEE Euro S&P Chair's Site

The following papers have been accepted to the 7th IEEE European Symposium on Security and Privacy to be held June 6-10, 2022 in Genoa, Italy.

List By Authors · Institutions · Papers by Topic · Papers with Artifacts · Open Papers · Posters

aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact]Md Imran Hossen, Xiali Hei
Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen
Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]McKenna McCall, Abhishek Bichhawat, Limin Jia
CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact]Yacov Manevich, Adi Akavia
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah
Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang
Dynamic Policies Revisited [Paper] [Artifact]Amir M. Ahmadian, Musard Balliu
EZEE: Epoch Parallel Zero Knowledge for ANSI CYibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery
Fuzzing with Data Dependency Information [Paper] [Artifact]Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns
HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang
Hide and Seek: Revisiting DNS-based User Tracking [Artifact]Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li
HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact]Kenneth G. Paterson, Mathilde Raynal
ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]Haoyu He, Yuede Ji, H. Howie Huang
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert
KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact]Payton Walker, Nitesh Saxena
Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact]Antreas Dionysiou, Elias Athanasopoulos
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]Mert Side, Fan Yao, Zhenkai Zhang
Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef
SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran
Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]Steven Sprecher, Christoph Kerschbaumer, Engin Kirda
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
SoK: Oblivious Pseudorandom Functions [Paper]Sílvia Casacuberta, Julia Hesse, Anja Lehmann
SoK: Privacy-Preserving Computing in the Blockchain Era [Paper]Ghada Almashaqbeh, Ravital Solomon
SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact]Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci
Towards Fair and Robust Classification [Artifact]Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu
Transformer-based Extraction of Deep Image Models [Artifact]Verena Battis, Alexander Penner
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact]Jason Liu, Anant Kandikuppa, Adam Bates
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang
Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]Dandan Yuan, Shujie Cui, Giovanni Russello
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi