IEEE European Symposium on Security and Privacy

IEEE EuroS&P 2022 - Authors

Papers · Institutions · Papers by Topic

Amir M. Ahmadian (KTH Royal Institute of Technology)
Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact]
Adi Akavia (University of Haifa)
Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact]
Mohannad Alhanahnah (University of Wisconsin)
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Ghada Almashaqbeh (University of Connecticut)
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper]
Giovanni Apruzzese (University of Liechtenstein)
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact]
Elias Athanasopoulos (University of Cyprus)
Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact]
Michael Backes (CISPA Helmholtz Center for Information Security)
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Musard Balliu (KTH Royal Institute of Technology)
Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact]
Davide Balzarotti (EURECOM)
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact]
Thomas Barber (SAP Security Research)
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Adam Bates (University of Illinois at Urbana-Champaign)
Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact]
Verena Battis (Fraunhofer Institute SIT | ATHENE)
Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact]
Souphiane Bensalim (SAP Security Research)
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Lukas Bernhard (Ruhr University Bochum)
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Abhishek Bichhawat (Indian Institute of Technology Gandhinagar)
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]
Lloyd Brown (UC Berkeley)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Kevin R. B. Butler (University of Florida)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Sílvia Casacuberta (Harvard University)
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
Varun Chandrasekaran (University of Wisconsin)
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
Deliang Chang (Tsinghua University)
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
Jiefeng Chen (University of Wisconsin)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Joann Qiongna Chen (University of California, Irvine)
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
Ping Chen (Fudan University)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Peng Cheng (Zhejiang University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Mauro Cherubini (University of Lausanne)
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
Cody Christopher (CSIRO's Data61 / Cyber Security CRC)
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Chen-Nee Chuah (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Victor Cochard (Cyber-Defence Campus)
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
Shujie Cui (Monash University)
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]
Lucas Davi (University of Duisburg-Essen)
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Lieven Desmet (imec-DistriNet, KU Leuven)
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]
David Devecsery (Facebook)
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Gabriel Deza (University of Toronto & Vector Institute)
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
Antreas Dionysiou (University of Cyprus)
Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact]
Dinil Mon Divakaran (Trustwave)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University / Qi An Xin Group Corp.)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Chi Thang Duong (EPFL)
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
Didier Dupertuis (EPFL)
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
Simon Eberz (University of Oxford)
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]
Michel van Eeten (Delft University of Technology)
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
Mounir Elgharabawy (Concordia University)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Vivian Fang (UC Berkeley)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Ryan Feng (University of Michigan)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Earlence Fernandes (University of Wisconsin)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Andrea Fioraldi (EURECOM)
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact]
Max Fukkink (Delft University of Technology)
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
Xiangshan Gao (Zhejiang University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Carlos Gañán (Delft University of Technology)
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
Le Guan (University of Georgia)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Syed Mahbub Hafiz (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Haoyu He (George Washington University)
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]
David Heath (Georgia Tech)
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Xiali Hei (University of Louisiana at Lafayette)
Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact]
Julia Hesse (IBM Research Europe - Zurich)
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
Thorsten Holz (CISPA Helmholtz Center for Information Security)
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Houman Homayoun (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Md Imran Hossen (University of Louisiana at Lafayette)
Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact]
Qinsheng Hou (Shandong University / Qi An Xin Group Corp.)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
H. Howie Huang (George Washington University)
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]
Kévin Huguenin (University of Lausanne)
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
Mathias Humbert (Cyber-Defence Campus)
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
Mathias Humbert (University of Lausanne)
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
Saad Islam (Worcester Polytechnic Institute)
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Rithik Jain (University of Wisconsin)
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Somesh Jha (University of Wisconsin)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Shouling Ji (Zhejiang University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Yuede Ji (University of North Texas)
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]
Limin Jia (Carnegie Mellon University)
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]
Martin Johns (Technische Universität Braunschweig)
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Wouter Joosen (imec-DistriNet, KU Leuven)
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]
Jordan Jueckstock (North Carolina State University)
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Seny Kamara (Brown University)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Anant Kandikuppa (University of Illinois at Urbana-Champaign)
Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact]
Alexandros Kapravelos (North Carolina State University)
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Abdelkarim Kati (Mohammed-VI Polytechnic University)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Christoph Kerschbaumer (Mozilla Corporation)
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]
Engin Kirda (Northeastern University)
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]
David Klein (Technische Universität Braunschweig)
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Blas Kojusner (University of Florida)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Vladimir Kolesnikov (Georgia Tech)
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Pavel Laskov (University of Liechtenstein)
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact]
Jehyun Lee (Trustwave)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam)
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
Wenqiang Li (Chinese Academy of Sciences)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Xing Li (Tsinghua University)
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
Zhou Li (University of California, Irvine)
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
David Liebowitz (Penten / UNSW Sydney)
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
William Lin (UC Berkeley)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Baojun Liu (Tsinghua University)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Jason Liu (University of Illinois at Urbana-Champaign)
Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact]
Yue Liu (Southeast University / Qi An Xin Group Corp.)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Xiapu Luo (The Hong Kong Polytechnic University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Shiqing Ma (Rutgers University)
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Zhenbang Ma (Qi An Xin Group Corp.)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Yacov Manevich (University of Haifa)
Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact]
Neal Mangaokar (University of Michigan)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Mohammad Mannan (Concordia University)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Alessandro Mantovani (EURECOM)
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact]
Ivan Martinovic (University of Oxford)
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]
McKenna McCall (Carnegie Mellon University)
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]
Tarik Moataz (Aroki Systems)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Kristen Moore (CSIRO's Data61 / Cyber Security CRC)
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Koksal Mus (Worcester Polytechnic Institute)
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Aurojit Panda (NYU)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Ren Pang (Pennsylvania State University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Nicolas Papernot (University of Toronto & Vector Institute)
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
Simon Parkin (Delft University of Technology)
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
Kenneth G. Paterson (ETH Zurich)
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact]
Kartik Patwari (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Alexander Penner (Fraunhofer Institute SIT | ATHENE)
Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact]
Roberto Perdisci (University of Georgia / Georgia Tech)
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Damian Pfammatter (Cyber-Defence Campus)
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
Raluca Ada Popa (UC Berkeley)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Atul Prakash (University of Michigan)
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
Davy Preuveneers (imec-DistriNet, KU Leuven)
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]
Vaibhav Rastogi (University of Wisconsin)
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Mathilde Raynal (EPFL)
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact]
Thomas Reps (University of Wisconsin)
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Michael Rodler (University of Duisburg-Essen)
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Elsa Rodríguez (Delft University of Technology)
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
Giovanni Russello (The University of Auckland)
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]
Mitch Rybczynski (Trustwave)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Ahmed Salem (Microsoft Research)
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Nitesh Saxena (Texas A&M University)
Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact]
Patrick Schaumont (Worcester Polytechnic Institute)
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Thomas Schneider (TU Darmstadt)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Renee Selvey (CSIRO's Data61 / Cyber Security CRC)
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Zubair Shafiq (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Jiameng Shi (University of Georgia)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Mert Side (Texas Tech University)
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
Richa Singh (Worcester Polytechnic Institute)
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Ivo Sluganovic (University of Oxford)
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]
Ravital Solomon (Sunscreen)
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper]
Steven Sprecher (Northeastern University)
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]
Ben Stock (CISPA Helmholtz Center for Information Security)
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Jack Sturgess (University of Oxford)
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]
Karthika Subramani (University of Georgia)
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Haipei Sun (Stevens Institute of Technology)
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Berk Sunar (Worcester Polytechnic Institute)
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Nepal Surya (CSIRO's Data61 / Cyber Security CRC)
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Farren Tang (Trustwave)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Aliya Tastemirova (University of Liechtenstein)
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact]
Phyo May Thet (Institute for Infocomm Research - A*STAR)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Anvith Thudi (University of Toronto & Vector Institute)
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
Amos Treiber (TU Darmstadt)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Ilias Tsingenopoulos (imec-DistriNet, KU Leuven)
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]
Payton Walker (Texas A&M University)
Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact]
Han Wang (University of California, Davis)
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
Ting Wang (Pennsylvania State University)
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Wendy Hui Wang (Stevens Institute of Technology)
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Yanhao Wang (NIO Inc.)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Rui Wen (CISPA Helmholtz Center for Information Security)
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Byron Williams (University of Florida)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Kun Wu (Stevens Institute of Technology)
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Zhaohan Xi (Pennsylvania State University)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Huikai Xu (Institute for Network Science and Cyberspace, Tsinghua University)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Yibin Yang (Georgia Tech)
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Fan Yao (University of Central Florida)
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
Desmond Yeoh (Shopee)
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Michael Yonli (TU Darmstadt)
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Amr Youssef (Concordia University)
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
Miao Yu (Institute for Network Science and Cyberspace, Tsinghua University)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Dandan Yuan (The University of Auckland)
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]
Dayou Zhang (University of Georgia)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Ning Zhang (Washington University in St. Louis)
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Yang Zhang (CISPA Helmholtz Center for Information Security)
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Zheng Zhang (Northwestern Univeristy)
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Zhenkai Zhang (Clemson University)
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
Wenting Zheng (Carnegie Mellon University)
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Jianwei Zhuge (Institute for Network Science and Cyberspace, Tsinghua University / Beijing National Research Center for Information Science and Technology)
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]