IEEE European Symposium on Security and Privacy

IEEE EuroS&P 2022 - Institutions

Papers · Authors · Papers by Topic

Insitutions affiliated with authors of papers in the 7th IEEE European Symposium on Security and Privacy.

Aroki Systems
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Beijing National Research Center for Information Science and Technology
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Brown University
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Carnegie Mellon University
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Chinese Academy of Sciences
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
CISPA Helmholtz Center for Information Security
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Clemson University
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
Concordia University
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
CSIRO's Data61
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Cyber Security CRC
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Cyber-Defence Campus
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
Delft University of Technology
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper]
EPFL
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact]
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact]
ETH Zurich
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact]
EURECOM
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact]
Facebook
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Fraunhofer Institute SIT | ATHENE
Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact]
Fudan University
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
George Washington University
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]
Georgia Tech
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C
Harvard University
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
Hasso-Plattner-Institute, University of Potsdam
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
The Hong Kong Polytechnic University
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
IBM Research Europe - Zurich
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper]
imec-DistriNet, KU Leuven
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact]
Indian Institute of Technology Gandhinagar
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact]
Institute for Infocomm Research - A*STAR
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Institute for Network Science and Cyberspace, Tsinghua University
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
KTH Royal Institute of Technology
Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact]
Microsoft Research
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
Mohammed-VI Polytechnic University
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
Monash University
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]
Mozilla Corporation
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]
NIO Inc.
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
North Carolina State University
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
Northeastern University
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact]
Northwestern Univeristy
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
NYU
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
Pennsylvania State University
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]
Penten
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Qi An Xin Group Corp.
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Ruhr University Bochum
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
Rutgers University
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact]
SAP Security Research
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Shandong University
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Shopee
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Southeast University
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
Stevens Institute of Technology
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact]
Sunscreen
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper]
Technische Universität Braunschweig
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact]
Texas A&M University
Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact]
Texas Tech University
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
Trustwave
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper]
Tsinghua University
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact]
TU Darmstadt
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact]
UC Berkeley
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact]
The University of Auckland
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact]
University of California, Davis
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact]
University of California, Irvine
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact]
University of Central Florida
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact]
University of Connecticut
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper]
University of Cyprus
Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact]
University of Duisburg-Essen
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact]
University of Florida
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact]
University of Georgia
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact]
University of Haifa
Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact]
University of Illinois at Urbana-Champaign
Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact]
University of Lausanne
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact]
University of Liechtenstein
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact]
University of Louisiana at Lafayette
Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact]
University of Michigan
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
University of North Texas
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact]
University of Oxford
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact]
University of Toronto & Vector Institute
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
University of Wisconsin
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact]
Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact]
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact]
UNSW Sydney
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact]
Washington University in St. Louis
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact]
Worcester Polytechnic Institute
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact]
Zhejiang University
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact]