Efficient Zero-Knowledge Arguments For Paillier Cryptosystem
Borui Gong (The Hong Kong Polytechnic University), Wang Fat Lau (The Hong Kong Polytechnic University), Man Ho Au (The Hong Kong Polytechnic University), Rupeng Yang (University of Wollongong), Haiyang Xue (The Hong Kong Polytechnic University), Lichun Li (Ant Group)
Investigating Voter Perceptions of Printed Physical Audit Trails for Online Voting
Karola Marky (Ruhr-University Bochum), Nina Gerber (TU Darmstadt), Henry J Krumb (TU Darmstadt), Mohamed Khamis (University of Glasgow), Max Mühlhäuser (TU Darmstadt)
Prune+PlumTree - Finding Eviction Sets at Scale
Tom Kessous (Ben-Gurion University of the Negev), Niv Gilboa (Ben-Gurion University of the Negev)
A Systematic Study of Physical Sensor Attack Hardness
Hyungsub Kim (Purdue University), Rwitam Bandyopadhyay (Purdue University), Muslum Ozgur Ozmen (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University), Yongdae Kim (KAIST), Dongyan Xu (Purdue University)
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay
Yuanliang Chen (Tsinghua University), Fuchen Ma (Tsinghua University), Yuanhang Zhou (Tsinghua University), Ming Gu (Tsinghua University), Qing Liao (Harbin Institute of Technology), Yu Jiang (Tsinghua University)
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF
Osama Bajaber (Virginia Tech), Bo Ji (Virginia Tech), Peng Gao (Virginia Tech)
Where Are the Red Lines? Towards Ethical Server-Side Scans in Security and Privacy Research
Florian Hantke (CISPA Helmholtz Center for Information Security), Sebastian Roth (TU Wien), Rafael Mrowczynski (CISPA Helmholtz Center for Information Security), Christine Utz (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)
Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference
Heqing Huang (The Hong Kong University of Science and Technology), Anshunkang Zhou (The Hong Kong University of Science and Technology), Mathias Payer (EPFL), Charles Zhang (The Hong Kong University of Science and Technology)
Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference
Sarabjeet Singh (University of Utah), Shreyas Singh (University of Utah), Sumanth Gudaparthi (University of Utah), Xiong Fan (Rutgers University), Rajeev Balasubramonian (University of Utah)
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing
Max Ammann (Independent Researcher, Trail of Bits), Lucca Hirschi (Inria Nancy), Steve Kremer (Inria Nancy)
Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation
Mathà© Hertogh (Vrije Universiteit Amsterdam), Sander Wiebing (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam)
SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing
Weiteng Chen (Microsoft Research, Redmond), Yu Hao (UC Riverside), Zheng Zhang (UC Riverside), Xiaochen Zou (UC Riverside), Dhilung Kirat (IBM Research), Shachee Mishra (IBM Research), Douglas Schales (IBM Research), Jiyong Jang (IBM Research), Zhiyun Qian (UC Riverside)
Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials
David Klein (Technische Universität Braunschweig), Martin Johns (Technische Universität Braunschweig)
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations
Wei Liu (Tsinghua University), Yuanjie Li (Tsinghua University), Hewu Li (Tsinghua University), Yimei Chen (Tsinghua University), Yufeng Wang (Tsinghua University), Jingyi Lan (Tsinghua University), Jianping Wu (Tsinghua University), Qian Wu (Tsinghua University), Jun Liu (Tsinghua University), Zeqi Lai (Tsinghua University)
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web
Soheil Khodayari (CISPA Helmholtz Center for Information Security), Thomas Barber (SAP Security Research), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
Soo-jin Moon (Carnegie Mellon University), Milind Srivastava (Carnegie Mellon University), Yves Bieri (Compass Security), Ruben Martins (Carnegie Mellon University), Vyas Sekar (Carnegie Mellon University)
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured By Standard Video Cameras
Ben Nassi (Cornell Tech), Etay Iluz (Ben-Gurion University of the Negev), Or Cohen (Ben-Gurion University of the Negev), Ofek Vayner (Ben-Gurion University of the Negev), Dudi Nassi (Ben-Gurion University of the Negev), Boris Zadov (Ben-Gurion University of the Negev), Yuval Elovici (Ben-Gurion University of the Negev), Ben Nassi (Cornell Tech)
BULKOR: Enabling Bulk Loading for Path ORAM
Xiang Li (Tsinghua University), Yunqian Luo (Tsinghua University), Mingyu Gao (Tsinghua University)
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses
Xiang Li (Tsinghua University), Dashuai Wu (Tsinghua University), Haixin Duan (Tsinghua University), Qi Li (Tsinghua University)
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Xingyu Xie (Tsinghua University; RealAI), Yifei Li (Tsinghua University), Wei Zhang (Tsinghua University), Tuowei Wang (Tsinghua University), Shizhen Xu (RealAI), Jun Zhu (Tsinghua University; RealAI), Yifan Song (Tsinghua University)
Poisoning Web-Scale Training Datasets is Practical
Nicholas Carlini (Google DeepMind), Matthew Jagielski (Google DeepMind), Christopher A. Choquette-Choo (Google DeepMind), Daniel Paleka (ETH Zurich), Will Pearce (NVIDIA), Hyrum Anderson (Robust Intelligence), Andreas Terzis (Google DeepMind), Kurt Thomas (Google), Florian Tramer (ETH Zurich)
Protecting Label Distribution in Cross-Silo Federated Learning
Yangfan Jiang (National University of Singapore), Xinjian Luo (National University of Singapore), Yuncheng Wu (National University of Singapore), Xiaokui Xiao (National University of Singapore), Beng Chin Ooi (National University of Singapore)
TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake
Yepeng Pan (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for Information Security)
Specular: Towards Secure, Trust-minimized Optimistic Blockchain Execution
Zhe Ye (UC Berkeley), Ujval Misra (UC Berkeley), Jiajun Cheng (ShanghaiTech University), Andy Zhou (Cambridge University), Dawn Song (UC Berkeley)
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services
Dario Pasquini (SPRING lab, EPFL), Danilo Francati (Aarhus University), Giuseppe Ateniese (George Mason University), Evgenios M. Kornaropoulos (George Mason University)
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater
Andreas Brüggemann (Technical University of Darmstadt, Germany), Oliver Schick (Technical University of Darmstadt, Germany), Thomas Schneider (Technical University of Darmstadt, Germany), Ajith Suresh (Technology Innovation Institute, Abu Dhabi), Hossein Yalame (Technical University of Darmstadt, Germany)
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
Weihao Bai (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Long Chen (Institute of Software, Chinese Academy of Sciences), Qianwen Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Zhenfeng Zhang (Institute of Software, Chinese Academy of Sciences)
Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network
Takayuki Sasaki (Yokohama National University), Takaya Noma (Yokohama National University), Yudai Morii (Yokohama National University), Toshiya Shimura (Yokohama National University), Michel van Eeten (TU Delft/Yokohama National University), Katsunari Yoshioka (Yokohama National University), Tsutomu Matsumoto (Yokohama National University)
Optimal Flexible Consensus and its Application to Ethereum
Joachim Neu (Stanford University), Srivatsan Sridhar (Stanford University), Lei Yang (MIT), David Tse (Stanford University)
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
Jiahe Lan (Xidian University), Jie Wang (Xidian University), Baochen Yan (Xidian University), Zheng Yan (Xidian University), Elisa Bertino (Purdue University)
MetaFly: Wireless Backhaul Interception via Aerial Wavefront Manipulation
Zhambyl Shaikhanov (Rice University), Sherif Badran (Northeastern University), Hichem Guerboukha (Brown University), Josep M. Jornet (Northeastern University), Daniel M. Mittleman (Brown University), Edward W. Knightly (Rice University), Hichem Guerboukha (Brown University)
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams
Bhupendra Acharya (CISPA), Muhammad Saad (PayPal), Antonio Emanuele Cinà (CISPA), Lea Schönherr (CISPA), Hoang Dai Nguyen (Louisiana State University), Adam Oest (Paypal, Inc.), Phani Vadrevu (Louisiana State University), Thorsten Holz (CISPA)
LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices
Hangtian Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing), Shuitao Gan (Tsinghua University), Chao Zhang (Tsinghua University), Zicong Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing), Hongqi Zhang (Henan Key Laboratory of Information Security), Xiangzhi Wang (University of Electronic Science and Technology of China), Guangming Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing)
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models
Nishant Vishwamitra (University of Texas at San Antonio), Keyan Guo (University at Buffalo), Farhan Tajwar Romit (University of Texas at San Antonio), Isabelle Ondracek (University at Buffalo), Long Cheng (Clemson University), Ziming Zhao (University at Buffalo), Hongxin Hu (University at Buffalo)
NURGLE: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation
Zheyuan He (University of Electronic Science and Technology of China), Zihao Li (The Hong Kong Polytechnic University), Ao Qiao (University of Electronic Science and Technology of China), Xiapu Luo (The Hong Kong Polytechnic University), Xiaosong Zhang (University of Electronic Science and Technology of China), Ting Chen (University of Electronic Science and Technology of China), Shuwei Song (University of Electronic Science and Technology of China), Dijun Liu (Ant Group), Weina Niu (University of Electronic Science and Technology of China)
Nebula: A Privacy-First Platform for Data Backhaul
Jean-Luc Watson (UC Berkeley), Tess Despres (UC Berkeley), Alvin Tan (UC Berkeley), Shishir G. Patil (UC Berkeley), Prabal Dutta (UC Berkeley), Raluca Ada Popa (UC Berkeley)
Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale
Hans Hanley (Stanford University), Zakir Durumeric (Stanford University), Deepak Kumar (Stanford University)
SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations
Borui Yang (Shanghai Jiao Tong University), Wei Li (Shanghai Jiao Tong University), Liyao Xiang (Shanghai Jiao Tong University), Bo Li (Hong Kong University of Science and Technology)
DrSec: Flexible Distributed Representations for Efficient Endpoint Security
Mahmood Sharif (Tel Aviv University and VMware Research), Pubali Datta (University of Illinois Urbana-Champaign), Andy Riddle (University of Illinois Urbana-Champaign), Kim Westfall (University of Illinois Urbana-Champaign), Adam Bates (University of Illinois Urbana-Champaign), Vijay Ganti (Google), Matthew Lentz (Duke University and VMware Research), David Ott (VMware Research)
A Representative Study on Human Detection of Artificially Generated Media Across Countries
Joel Frank (Ruhr-Universität Bochum), Franziska Herbert (Ruhr-Universität Bochum), Jonas Ricker (Ruhr-Universität Bochum), Lea Schönherr (CISPA Helmholtz Center for Information Security), Thorsten Eisenhofer (TU Berlin), Asja Fischer (Ruhr-Universität Bochum), Markus Dürmuth (Leibniz Universität Hannover), Thorsten Holz (CISPA Helmholtz Center for Information Security)
SneakyPrompt: Jailbreaking Text-to-image Generative Models
Yuchen Yang (Johns Hopkins University), Bo Hui (Johns Hopkins University), Haolin Yuan (Johns Hopkins University), Neil Gong (Duke University), Yinzhi Cao (Johns Hopkins University)
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator
Jianshuo Liu (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Hong Li (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Mengjie Sun (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Haining Wang (Department of Electrical and Computer Engineering, Virginia Tech, USA), Hui Wen (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Zhi Li (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Limin Sun (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
Transferable Multimodal Attack on Vision-Language Pre-training Models
Haodi Wang (Southeast University), Kai Dong (Southeast University), Zhilei Zhu (Data Space Research Institute of Hefei Comprehensive National Science Centre), Haotong Qin (Beihang University), Aishan Liu (Beihang University), Xiaolin Fang (Southeast University), Jiakai Wang (Zhongguancun Laboratory), Xianglong Liu (Beihang University)
Group Oblivious Message Retrieval
Zeyu Liu (Yale University), Eran Tromer (Boston University), Yunhao Wang (Columbia University)
Scalable Verification of Zero-Knowledge Protocols
Miguel Isabel (Universidad Complutense de Madrid), Clara Rodràguez-Nàºñez (Universidad Complutense de Madrid), Albert Rubio (Universidad Complutense de Madrid)
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts
Wuqi Zhang (The Hong Kong University of Science and Technology), Zhuo Zhang (Purdue University), Qingkai Shi (Purdue University), Lu Liu (The Hong Kong University of Science and Technology), Lili Wei (McGill University), Yepang Liu (Southern University of Science and Technology), Xiangyu Zhang (Purdue University), Shing-Chi Cheung (The Hong Kong University of Science and Technology)
CONJUNCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks
Sushant Dinesh (University of Illinois Urbana-Champaign), Madhusudan Parthasarathy (University of Illinois Urbana-Champaign), Christopher W. Fletcher (University of Illinois Urbana-Champaign)
Scalable Mixed-Mode MPC
Radhika (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)
SoK: SGX.Fail: How Stuff Gets eXposed
Stephan van Schaik (University of Michigan), Alex Seto (Purdue University), Thomas Yurek (UIUC), Adam Batori (University of Michigan), Bader AlBassam (Purdue University), Daniel Genkin (Georgia Institute of Technology), Andrew Miller (UIUC), Eyal Ronen (Tel Aviv University), Yuval Yarom (Ruhr University Bochum), Christina Garman (Purdue University)
SMARTINV: Multimodal Learning for Smart Contract Invariant Inference
Sally Junsong Wang (Columbia University), Kexin Pei (Columbia University), Junfeng Yang (Columbia University), Sally Junsong Wang (Columbia University)
AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection
Xiangtao Meng (Shandong University), Li Wang (Shandong University), Shanqing Guo (Shandong University), Lei Ju (Shandong University), Qingchuan Zhao (City University of Hong Kong)
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption
Xiaoguo LI (School of Computing and Information Systems, Singapore Management University, Singapore), Guomin Yang (School of Computing and Information Systems, Singapore Management University, Singapore), Tao Xiang (College of Computer Science, Chongqing University), Shengmin Xu (College of Computer and Cyber Security, Fujian Normal University), Bowen Zhao (Guangzhou Institute of Technology, Xidian University), HweeHwa Pang (School of Computing and Information Systems, Singapore Management University, Singapore), Robert H. Deng (School of Computing and Information Systems, Singapore Management University, Singapore)
Tabbed Out: Subverting the Android Custom Tab Security Model
Philipp Beer (TU Wien), Marco Squarcina (TU Wien), Lorenzo Veronese (TU Wien), Martina Lindorfer (TU Wien)
Thwarting Last-Minute Voter Coercion
Rosario Giustolisi (IT University of Copenhagen), Maryam Sheikhi (IT University of Copenhagen), Carsten Schuermann (IT University of Copenhagen)
Threshold ECDSA in Three Rounds
Jack Doerner (Technion), Yashvanth Kondi (Aarhus University), abhi shelat (Northeastern University)
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services
Yacong Gu (Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS), Lingyun Ying (QI-ANXIN Technology Research Institute), Huajun Chai (QI-ANXIN Technology Research Institute), Yingyuan Pu (QI-ANXIN Technology Research Institute), Haixin Duan (BNRist & Institute for Network Science and Cyberspace, Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS), Xing Gao (University of Delaware)
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems
Sunpill Kim (Hanyang University and Institute for Infocomm Research (I2R), A*STAR, Singapore), Yong Kiam Tan (Institute for Infocomm Research (I2R), A*STAR, Singapore), Bora Jeong (Hanyang University and Institute for Infocomm Research (I2R), A*STAR, Singapore), Soumik Mondal (Institute for Infocomm Research (I2R), A*STAR, Singapore), Khin Mi Mi Aung (Institute for Infocomm Research (I2R), A*STAR, Singapore), Jae Hong Seo (Hanyang University)
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics
Xiaoxing Mo (Deakin University), Yechao Zhang (Huazhong University of Science and Technology), Leo Yu Zhang (Griffith University), Wei Luo (Deakin University), Nan Sun (University of New South Wales Canberra), Shengshan Hu (Huazhong University of Science and Technology), Shang Gao (Deakin University), Yang Xiang (Swinburne University of Technology)
Securing Graph Neural Networks in MLaaS: A Comprehensive Realisation of Query-based Integrity Verification
Bang Wu (CSIRO's Data61/Monash University), Xingliang Yuan (Monash University), Shuo Wang (Shanghai Jiao Tong University), Qi Li (Tsinghua University), Minhui Xue (CSIRO's Data61), Shirui Pan (Griffith University)
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields
Jean Paul Degabriele (Technology Innovation Institute), Jan Gilcher (ETH Zurich), Jérôme Govinden (Technical University of Darmstadt), Kenneth G. Paterson (ETH Zurich)
Communication-efficient, Fault Tolerant PIR over Erasure Coded Storage
Andrew Park (Carnegie Mellon University), Trevor Leong (Carnegie Mellon University), Francisco Maturana (Carnegie Mellon University), Wenting Zheng (Carnegie Mellon University), Rashmi Vinayak (Carnegie Mellon University)
Eureka: A General Framework for Black-box Differential Privacy Estimators
Yun Lu (University of Victoria), Malik Magdon-Ismail (Rensselaer Polytechnic Institute), Yu Wei (Purdue University), Vassilis Zikas (Purdue University)
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites
Kaushal Kafle (William & Mary), Prianka Mandal (William & Mary), Kapil Singh (IBM T.J. Watson Research Center), Benjamin Andow (Google), Adwait Nadkarni (William & Mary)
Asterisk: Super-fast MPC with a Friend
Banashri Karmakar (Indian Institute of Science, Bangalore), Nishat Koti (Indian Institute of Science, Bangalore), Arpita Patra (Indian Institute of Science, Bangalore), Sikhar Patranabis (IBM Research - India), Protik Paul (Indian Institute of Science, Bangalore), Divya Ravi (Aarhus University), Sikhar Patranabis (IBM Research India)
On SMS Phishing Tactics and Infrastructure
Aleksandr Nahapetyan (North Carolina State University), Sathvik Prasad (North Carolina State University), Kevin Childs (North Carolina State University), Adam Oest (Paypal, Inc.), Yeganeh Ladwig (Paypal, Inc.), Alexandros Kapravelos (North Carolina State University), Brad Reaves (North Carolina State University)
Casual Users and Rational Choices within Differential Privacy
Narges Ashena (University of Zurich), Oana Inel (University of Zurich), Badrie L. Persaud (UBS), Abraham Bernstein (University of Zurich)
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning
Kuntal Kumar Pal (Arizona State University), Ati Priya Bajaj (Arizona State University), Pratyay Banerjee (Arizona State University), Audrey Dutcher (Arizona State University), Mutsumi Nakamura (Arizona State University), Zion Leonahenahe Basque (Arizona State University), Himanshu Gupta (Arizona State University), Saurabh Arjun Sawant (Arizona State University), Ujjwala Anantheswaran (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupe (Arizona State University), Chitta Baral (Arizona State University), Ruoyu Wang (Arizona State University)
Targeted and Troublesome: Tracking and Advertising on Children's Websites
Zahra Moti (Radboud University), Asuman Senol (KU Leuven), Hamid Bostani (Radboud University), Frederik Zuiderveen Borgesius (Radboud University), Veelasha Moonsamy (Ruhr University Bochum), Arunesh Mathur (Independent Researcher), Gunes Acar (Radboud University)
FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
Mati Ur Rehman (University of Virginia), Hadi Ahmadi (Corvic Inc.), Wajih Ul Hassan (University of Virginia)
Undefined-oriented Programming: Detecting and Chaining Prototype Pollution Gadgets in Node.js Template Engines for Malicious Consequences
Zhengyu Liu (Johns Hopkins University), Kecheng An (Johns Hopkins University), Yinzhi Cao (Johns Hopkins University), Kecheng An (Johns Hopkins University)
TROJANPUZZLE: Covertly Poisoning Code-Suggestion Models
Hojjat Aghakhani (University of California, Santa Barbara), Wei Dai (Microsoft Corporation), Andre Manoel (Microsoft Corporation), Xavier Fernandes (Microsoft Corporation), Anant Kharkar (Microsoft Corporation), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), David Evans (University of Virginia), Benjamin Zorn (Microsoft Corporation), Robert Sim (Microsoft Corporation)
Lower Bounds for Rényi Differential Privacy in a Black-Box Setting
Tim Kutta (Ruhr-University Bochum), à–nder Askin (Ruhr-University Bochum), Martin Dunsche (Ruhr-University Bochum)
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes
Fritz Alder (DistriNet, KU Leuven), Lesly-Ann Daniel (DistriNet, KU Leuven), David Oswald (University of Birmingham), Frank Piessens (DistriNet, KU Leuven), Jo Van Bulck (DistriNet, KU Leuven), Frank Piessens (imec-DistriNet, KU Leuven)
FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks
Ehsanul Kabir (Penn State University), Zeyu Song (Penn State University), Md Rafi Ur Rashid (Penn State University), Shagufta Mehnaz (Penn State University)
PriDe CT: Towards Public Consensus, Private Transactions, and Forward Secrecy in Decentralized Payments
Yue Guo (JP Morgan AI Research), Harish Karthikeyan (JP Morgan AI Research), Antigoni Polychroniadou (JP Morgan AI Research), Chaddy Huussin (JP Morgan AI Research)
A Tale of Two Industroyers: It was the Season of Darkness
Luis Salazar (University of California, Santa Cruz), Sebastian Castro (University of California, Santa Cruz), Juan Lozano (University of California, Santa Cruz), Keerthi Koneru (University of California, Santa Cruz), Emmanuele Zambon (Eindhoven University of Technology), Bing Huang (University of Texas), Ross Baldick (University of Texas), Marina Krotofil (ISSP), Alonso Rojas (Axon Group), Alvaro Cardenas (University of California, Santa Cruz)
Understanding and Benchmarking the Commonality of Adversarial Examples
Ruiwen He (Zhejiang University), Yushi Cheng (Zhejiang University), Junning Ze (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University)
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning
Qiao Zhang (Chongqing University), Tao Xiang (Chongqing University), Chunsheng Xin (Old Dominion University), Hongyi Wu (University of Arizona)
Holepunch: Fast, Secure File Deletion with Crash Consistency
Zachary Ratliff (Harvard), Wittmann Goh (Harvard), Abe Wieland (Harvard), James Mickens (Harvard), Ryan Williams (Northeastern University)
Bounded and Unbiased Composite Differential Privacy
Kai Zhang (Swinburne University of Technology), Yanjun Zhang (University of Technology Sydney and CSIRO's Data61), Ruoxi Sun (CSIRO's Data61), Pei-Wei Tsai (Swinburne University of Technology), Muneeb Ul Hassan (Deakin University), Xin Yuan (CSIRO's Data61), Minhui Xue (CSIRO's Data61), Jinjun Chen (Swinburne University of Technology)
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack
Han Liu (Washington University in St. Louis), Yuhao Wu (Washington University in St. Louis), Zhiyuan Yu (Washington University in St. Louis), Ning Zhang (Washington University in St. Louis)
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors
Sandra Rivera Pérez (Delft University of Technology), Michel van Eeten (Delft University of Technology), Carlos H. Gañán (Delft University of Technology)
Pudding: Private User Discovery in Anonymity Networks
Ceren Kocaogullar (University of Cambridge), Daniel Hugenroth (University of Cambridge), Martin Kleppmann (TU Munich), Alastair R. Beresford (University of Cambridge), Martin Kleppmann (University of Cambridge)
More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR
Tiantian Gong (Purdue University), Ryan Henry (University of Calgary), Alexandros Psomas (Purdue University), Aniket Kate (Purdue University / Supra Research)
MEA-Defender: A Robust Watermark against Model Extraction Attack
Peizhuo Lv (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Hualong Ma (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jiachen Zhou (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston University, USA), Ruigang Liang (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Shenchen Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Pan Li (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Yingjun Zhang (Institute of Software, Chinese Academy of Sciences, China), Peizhuo Lv (Institute of Information Engineering, Chinese Academy of Sciences)
Cohere: Managing Differential Privacy in Large Scale Systems
Nicolas Küchler (ETH Zurich), Emanuel Opel (ETH Zurich), Hidde Lycklama (ETH Zurich), Alexander Viand (Intel Labs), Anwar Hithnawi (ETH Zurich)
Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution
Kasra EdalatNejad (EPFL), Wouter Lueks (CISPA Helmholtz Center for Information Security), Justinas Sukaitis (ICRC), Vincent Graf Narbel (ICRC), Massimo Marelli (ICRC), Carmela Troncoso (EPFL)
Break the Wall from bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls
Qi Wang (Tsinghua University), Jianjun Chen (Tsinghua University and Zhongguancun Laboratory), Zheyu Jiang (Tsinghua University), Run Guo (Tsinghua University), Ximeng Liu (Fuzhou University), Chao Zhang (Tsinghua University and Zhongguancun Laboratory), Haixin Duan (Tsinghua University and Zhongguancun Laboratory)
To Auth or Not To Auth? A Comparative Analysis of the Pre- and Post-Login Security Landscape
Jannis Rautenstrauch (CISPA Helmholtz Center for Information Security), Metodi Mitkov (CISPA Helmholtz Center for Information Security), Thomas Helbrecht (CISPA Helmholtz Center for Information Security), Lorenz Hetterich (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)
From Principle to Practice: Vertical Data Minimization for Machine Learning
Robin Staab (ETH Zurich), Nikola Jovanovic (ETH Zurich), Mislav Balunovic (ETH Zurich), Martin Vechev (ETH Zurich)
Can we cast a ballot as intended and be receipt free?
Henri Devillez (UCLouvain), Olivier Pereira (MSR and UCLouvain), Thomas Peters (UClouvain), Quentin Yang (INRIA Nancy)
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction
Bofei Chen (Fudan University), Lei Zhang (Fudan University), Xinyou Huang (Fudan University), Yinzhi Cao (Johns Hopkins University), Keke Lian (Fudan University), Yuan Zhang (Fudan University), Min Yang (Fudan University)
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity
Xinming Wei (Peking University), Jiaxi Zhang (Peking University), Guojie Luo (Peking University)
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers
Qi Pang (Carnegie Mellon University), Jinhao Zhu (University of California, Berkeley), Helen Möllering (Technical University of Darmstadt), Wenting Zheng (Carnegie Mellon University), Thomas Schneider (Technical University of Darmstadt), Qi Pang (Carnegie Mellon University)
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification
Hongwei Yao (Zhejiang University), Jian Lou (ZJU-Hangzhou Global Scientific and Technological Innovation Center), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University)
Distributed & Scalable Oblivious Sorting and Shuffling
Nicholas Ngai (University of California, Berkeley), Ioannis Demertzis (University of California, Santa Cruz), Javad Ghareh Chamani (Hong Kong University of Science and Technology), Dimitrios Papadopoulos (The Hong Kong University of Science and Technology)
ODSCAN: Backdoor Scanning for Object Detection Models
Siyuan Cheng (Purdue University), Guangyu Shen (Purdue University), Guanhong Tao (Purdue University), Kaiyuan Zhang (Purdue University), Zhuo Zhang (Purdue University), Shengwei An (Purdue University), Xiangzhe Xu (Purdue University), Yingqi Liu (Purdue University), Shiqing Ma (University of Massachusetts, Amherst), Xiangyu Zhang (Purdue University)
Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers' Coding Practices with Insecure Suggestions from Poisoned AI Models
Sanghak Oh (Sungkyunkwan University), Kiho Lee (Sungkyunkwan University), Seonhye Park (Sungkyunkwan University), Doowon Kim (University of Tennessee), Hyoungshick Kim (Sungkyunkwan University)
DPI: Ensuring Strict Differential Privacy for Infinite Data Streaming
Shuya Feng (University of Connecticut), Meisam Mohammady (Iowa State University), Han Wang (University of Kansas), Xiaochen Li (Zhejiang University), Zhan Qin (Zhejiang University), Yuan Hong (University of Connecticut)
SoK: Prudent Evaluation Practices for Fuzzing
Moritz Schloegel (CISPA Helmholtz Center for Information Security), Nils Bars (CISPA Helmholtz Center for Information Security), Nico Schiller (CISPA Helmholtz Center for Information Security), Lukas Bernhard (CISPA Helmholtz Center for Information Security), Tobias Scharnowski (CISPA Helmholtz Center for Information Security), Addison Crump (CISPA Helmholtz Center for Information Security), Arash Ale Ebrahim (CISPA Helmholtz Center for Information Security), Nicolai Bissantz (Ruhr University Bochum), Marius Muench (University of Birmingham), Thorsten Holz (CISPA Helmholtz Center for Information Security)