IEEE EuroS&P 2022 - Authors
Papers · Institutions · Papers by Topic
(KTH Royal Institute of Technology) | Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact] |
(University of Haifa) | Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact] |
(University of Wisconsin) | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] |
(University of Connecticut) | Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper] |
(University of Liechtenstein) | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact] |
(University of Cyprus) | Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact] |
(CISPA Helmholtz Center for Information Security) | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] |
(KTH Royal Institute of Technology) | Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact] |
(EURECOM) | Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact] |
(SAP Security Research) | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] |
(University of Illinois at Urbana-Champaign) | Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact] |
(Fraunhofer Institute SIT | ATHENE) | Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact] |
(SAP Security Research) | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] |
(Ruhr University Bochum) | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] |
(Indian Institute of Technology Gandhinagar) | McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] |
(UC Berkeley) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(University of Florida) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(Harvard University) | Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] |
(University of Wisconsin) | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] |
(Tsinghua University) | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] |
(University of Wisconsin) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] |
(University of California, Irvine) | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] |
(Fudan University) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(Zhejiang University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(University of Lausanne) | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] |
(CSIRO's Data61 / Cyber Security CRC) | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(Cyber-Defence Campus) | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] |
(Monash University) | Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] |
(University of Duisburg-Essen) | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] |
(imec-DistriNet, KU Leuven) | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] |
(Facebook) | Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C |
(University of Toronto & Vector Institute) | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] |
(University of Cyprus) | Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact] |
(Trustwave) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(Institute for Network Science and Cyberspace, Tsinghua University / Qi An Xin Group Corp.) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(EPFL) | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] |
(EPFL) | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] |
(University of Oxford) | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] |
(Delft University of Technology) | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] |
(Concordia University) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(UC Berkeley) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(University of Michigan) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] |
(University of Wisconsin) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] |
(EURECOM) | Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact] |
(Delft University of Technology) | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] |
(Zhejiang University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(Delft University of Technology) | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] |
(University of Georgia) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(George Washington University) | Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] |
(Georgia Tech) | Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C |
(University of Louisiana at Lafayette) | Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact] |
(IBM Research Europe - Zurich) | Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] |
(CISPA Helmholtz Center for Information Security) | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(University of Louisiana at Lafayette) | Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact] |
(Shandong University / Qi An Xin Group Corp.) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(George Washington University) | Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] |
(University of Lausanne) | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] |
(Cyber-Defence Campus) | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] |
(University of Lausanne) | Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] |
(Worcester Polytechnic Institute) | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] |
(University of Wisconsin) | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] |
(University of Wisconsin) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] |
(Zhejiang University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(University of North Texas) | Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] |
(Carnegie Mellon University) | McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] |
(Technische Universität Braunschweig) | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] |
(imec-DistriNet, KU Leuven) | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] |
(North Carolina State University) | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] |
(Brown University) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(University of Illinois at Urbana-Champaign) | Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact] |
(North Carolina State University) | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] |
(Mohammed-VI Polytechnic University) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(Mozilla Corporation) | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] |
(Northeastern University) | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] |
(Technische Universität Braunschweig) | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] |
(University of Florida) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(Georgia Tech) | Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C |
(University of Liechtenstein) | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact] |
(Trustwave) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(Hasso-Plattner-Institute, University of Potsdam) | Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] |
(Chinese Academy of Sciences) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(Tsinghua University) | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] |
(University of California, Irvine) | Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] |
(Penten / UNSW Sydney) | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] |
(UC Berkeley) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(Tsinghua University) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(University of Illinois at Urbana-Champaign) | Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact] |
(Southeast University / Qi An Xin Group Corp.) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(The Hong Kong Polytechnic University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(Rutgers University) | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] |
(Qi An Xin Group Corp.) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(University of Haifa) | Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact] |
(University of Michigan) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] |
(Concordia University) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(EURECOM) | Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact] |
(University of Oxford) | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] |
(Carnegie Mellon University) | McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] |
(Aroki Systems) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(CSIRO's Data61 / Cyber Security CRC) | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] |
(Worcester Polytechnic Institute) | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] |
(NYU) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(Pennsylvania State University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(University of Toronto & Vector Institute) | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] |
(Delft University of Technology) | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] |
(ETH Zurich) | Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(Fraunhofer Institute SIT | ATHENE) | Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact] |
(University of Georgia / Georgia Tech) | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] |
(Cyber-Defence Campus) | Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] |
(UC Berkeley) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(University of Michigan) | Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] |
(imec-DistriNet, KU Leuven) | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] |
(University of Wisconsin) | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] |
(EPFL) | Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact] |
(University of Wisconsin) | Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] |
(University of Duisburg-Essen) | Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] |
(Delft University of Technology) | Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] |
(The University of Auckland) | Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] |
(Trustwave) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(Microsoft Research) | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] |
(Texas A&M University) | Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact] |
(Worcester Polytechnic Institute) | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] |
(TU Darmstadt) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(CSIRO's Data61 / Cyber Security CRC) | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(University of Georgia) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(Texas Tech University) | Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] |
(Worcester Polytechnic Institute) | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] |
(University of Oxford) | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] |
(Sunscreen) | Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper] |
(Northeastern University) | Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] |
(CISPA Helmholtz Center for Information Security) | David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] |
(University of Oxford) | Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] |
(University of Georgia) | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] |
(Stevens Institute of Technology) | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] |
(Worcester Polytechnic Institute) | Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] |
(CSIRO's Data61 / Cyber Security CRC) | Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] |
(Trustwave) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(University of Liechtenstein) | Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact] |
(Institute for Infocomm Research - A*STAR) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(University of Toronto & Vector Institute) | Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] |
(TU Darmstadt) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(imec-DistriNet, KU Leuven) | Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] |
(Texas A&M University) | Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact] |
(University of California, Davis) | Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] |
(Pennsylvania State University) | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(Stevens Institute of Technology) | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] |
(NIO Inc.) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(CISPA Helmholtz Center for Information Security) | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] |
(University of Florida) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(Stevens Institute of Technology) | Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] |
(Pennsylvania State University) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(Institute for Network Science and Cyberspace, Tsinghua University) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(Georgia Tech) | Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C |
(University of Central Florida) | Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] |
(Shopee) | Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] |
(TU Darmstadt) | Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] |
(Concordia University) | Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] |
(Institute for Network Science and Cyberspace, Tsinghua University) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |
(The University of Auckland) | Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] |
(University of Georgia) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(Washington University in St. Louis) | Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] |
(CISPA Helmholtz Center for Information Security) | Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] |
(Northwestern Univeristy) | Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |
(Clemson University) | Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] |
(Carnegie Mellon University) | Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] |
(Institute for Network Science and Cyberspace, Tsinghua University / Beijing National Research Center for Information Science and Technology) | Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] |