IEEE EuroS&P 2022 - Institutions
Papers · Authors · Papers by Topic
Insitutions affiliated with authors of papers in the 7th IEEE European Symposium on Security and Privacy.
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] | |
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] | |
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] | |
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] | |
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] | |
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] | |
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] | |
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] | |
Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] | |
Elsa Rodríguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán. Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware [Paper] | |
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact] Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert. Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection [Artifact] | |
Kenneth G. Paterson, Mathilde Raynal. HyperLogLog: Exponentially Bad in Adversarial Settings [Paper] [Artifact] | |
Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti. Fuzzing with Data Dependency Information [Paper] [Artifact] | |
Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C | |
Verena Battis, Alexander Penner. Transformer-based Extraction of Deep Image Models [Artifact] | |
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] | |
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] | |
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery. EZEE: Epoch Parallel Zero Knowledge for ANSI C | |
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] | |
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] | |
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] | |
Sílvia Casacuberta, Julia Hesse, Anja Lehmann. SoK: Oblivious Pseudorandom Functions [Paper] | |
Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen. Captcha me if you can: Imitation Games with Reinforcement Learning [Artifact] | |
McKenna McCall, Abhishek Bichhawat, Limin Jia. Compositional Information Flow Monitoring for Reactive Programs [Paper] [Artifact] | |
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Amir M. Ahmadian, Musard Balliu. Dynamic Policies Revisited [Paper] [Artifact] | |
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] | |
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] | |
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] | |
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] | |
Steven Sprecher, Christoph Kerschbaumer, Engin Kirda. SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward [Artifact] | |
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] | |
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] | |
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] | |
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] | |
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang. Dynamic Backdoor Attacks Against Machine Learning Models [Paper] [Artifact] | |
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] | |
Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classification [Artifact] | |
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper] | |
David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns. Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions [Artifact] | |
Payton Walker, Nitesh Saxena. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space [Artifact] | |
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] | |
Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran. SIERRA: Ranking Anomalous Activities in Enterprise Networks [Paper] | |
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu. Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers [Artifact] | |
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data [Paper] [Artifact] | |
Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa. CostCO: An automatic cost modeling framework for secure multi-party computation [Artifact] | |
Dandan Yuan, Shujie Cui, Giovanni Russello. We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption [Paper] [Artifact] | |
Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah. DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices [Artifact] | |
Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li. Hide and Seek: Revisiting DNS-based User Tracking [Artifact] | |
Mert Side, Fan Yao, Zhenkai Zhang. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit [Artifact] | |
Ghada Almashaqbeh, Ravital Solomon. SoK: Privacy-Preserving Computing in the Blockchain Era [Paper] | |
Antreas Dionysiou, Elias Athanasopoulos. Lethe: Practical Data Breach Detection with Zero Persistent Secret State [Artifact] | |
Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 [Paper] [Artifact] | |
Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr Youssef. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android [Paper] [Artifact] | |
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci. SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations [Artifact] | |
Yacov Manevich, Adi Akavia. Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments [Artifact] | |
Jason Liu, Anant Kandikuppa, Adam Bates. Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control [Artifact] | |
Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin. KGP Meter: Communicating Kin Genomic Privacy to the Masses [Paper] [Artifact] | |
Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova. SoK: The Impact of Unlabelled Data in Cyberthreat Detection [Artifact] | |
Md Imran Hossen, Xiali Hei. aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA [Paper] [Artifact] | |
Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] | |
Haoyu He, Yuede Ji, H. Howie Huang. ILLUMINATI: Towards Explaining Graph Neural Networks for Cybersecurity Analysis [Artifact] | |
Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic. WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch [Artifact] | |
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] | |
Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot. Unrolling SGD: Understanding Factors Influencing Machine Unlearning [Paper] [Artifact] Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas Reps. Lightweight, Multi-Stage, Compiler-Assisted Application Specialization [Paper] [Artifact] Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash. GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems [Paper] [Artifact] | |
Kristen Moore, Cody Christopher, David Liebowitz, Nepal Surya, Renee Selvey. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception [Paper] [Artifact] | |
Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang. HARM: Hardware-assisted Continuous Re-randomization for Microcontrollers [Artifact] | |
Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar. Signature Correction Attack on Dilithium Signature Scheme [Paper] [Artifact] | |
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang. TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [Paper] [Artifact] |