| Title | Author |
|---|---|
| A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks | Karel Dhondt (imec-DistriNet; KU Leuven); Victor Le Pochat (imec-DistriNet; KU Leuven); Alexios Voulimeneas (imec-DistriNet; KU Leuven); Wouter Joosen (imec-DistriNet; KU Leuven); Stijn Volckaert (imec-DistriNet; KU Leuven) |
| A Scalable and Dynamic ACL System for In-Network Defense | Changhun Jung (Ewha Womans University); Sian Kim (Ewha Womans University); RhongHo Jang (Wayne State University); David Mohaisen (University of Central Florida); DaeHun Nyang (Ewha Womans University) |
| A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello | Karthikeyan Bhargavan (Inria); Vincent Cheval (Inria); Christopher Wood (Cloudflare) |
| A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music | Anomadarshi Barua (University of California; Irvine); Yonatan Gizachew Achamyeleh (University of California; Irvine); Mohammad Abdullah Al Faruque (University of California; Irvine) |
| AI/ML for Network Security: The Emperor has no Clothes | Arthur S. Jacobs (UFRGS); Roman Beltiukov (UCSB); Walter Willinger (NIKSUN Inc.); Ronaldo A. Ferreira (UFMS); Arpit Gupta (UCSB); Lisandro Z. Granville (UFRGS) |
| ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning | Vasudev Gohil (Texas A&M University); Hao Guo (Texas A&M University); Satwik Patnaik (Texas A&M University); Jeyavijayan Rajendran (Texas A&M University) |
| Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities | Yinxi Liu (The Chinese University of Hong Kong); Wei Meng (The Chinese University of Hong Kong) |
| Adversarial Correctness and Privacy for Probabilistic Data Structures | Mia Filić (ETH Zurich); Kenneth G. Paterson (ETH Zurich); Anupama Unnikrishnan (ETH Zurich); Fernando Virdia (Intel Labs) |
| Am I Private and If So, how Many? Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats | Daniel Franzen (Freie Universität Berlin); Saskia Nuñez von Voigt (Technische Universität Berlin); Peter Sörries (Freie Universität Berlin); Florian Tschorsch (Technische Universität Berlin; Humboldt-Universität zu Berlin); Claudia Müller-Birn (Freie Universität Berlin) |
| An Extensive Study of Residential Proxies in China | Mingshuo Yang (Shandong University); Yunnan Yu (University at Buffalo); Xianghang Mi (University of Science and Technology of China); Shujun Tang (QI-ANXIN Technology Research Institute); Shanqing Guo (Shandong University); Yilin Li (Shandong University); Xiaofeng Zheng (Tsinghua University); Haixin Duan (Tsinghua University) |
| AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication | Chenkai Weng (Northwestern University); Kang Yang (State Key Laboratory of Cryptology); Zhaomin Yang (Shanghai Key Laboratory of Privacy-Preserving Computation and MatrixElements Technologies); Xiang Xie (Shanghai Key Laboratory of Privacy-Preserving Computation and MatrixElements Technologies); Xiao Wang (Northwestern University) |
| Are Attribute Inference Attacks Just Imputation? | Bargav Jayaraman (University of Virginia); David Evans (University of Virginia) |
| Auditing Membership Leakages of Multi-Exit Networks | Zheng Li (CISPA Helmholtz Center for Information Security); Yiyong Liu (CISPA Helmholtz Center for Information Security); Xinlei He (CISPA Helmholtz Center for Information Security); Ning Yu (Salesforce Research); Michael Backes (CISPA Helmholtz Center for Information Security); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| Automatic Detection of Fake Key Attacks in Secure Messaging | Tarun Kumar Yadav (Brigham Young University); Devashish Gosain (Max Planck Institute for Informatics); Amir Herzberg (University of Connecticut); Daniel Zappala (Brigham Young University); Kent Seamons (Brigham Young University) |
| Automatic Detection of Speculative Execution Combinations | Xaver Fabian (CISPA Helmholtz Center for Information Security); Marco Guarnieri (IMDEA Software Institute); Marco Patrignani (University of Trento) |
| Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators | Shravan Srinivasan (University of Maryland); Ioanna Karantaidou (George Mason University); Foteini Baldimtsi (George Mason University); Charalampos Papamanthou (Yale University) |
| Behind the Scenes of RPKI | Tomas Hlavacek (Fraunhofer SIT; ATHENE); Philipp Jeitner (Fraunhofer SIT; ATHENE); Donika Mirdita (Technische Universität Darmstadt; Fraunhofer SIT; ATHENE); Haya Shulman (Goethe-Universität Frankfurt; Fraunhofer SIT; ATHENE); Michael Waidner (Technische Universität Darmstadt; Fraunhofer SIT; ATHENE) |
| Blacktooth: Breaking through the Defense of Bluetooth in Silence | Mingrui Ai (University of Science and Technology of China); Kaiping Xue (University of Science and Technology of China); Bo Luo (University of Kansas); Lutong Chen (University of Science and Technology of China); Nenghai Yu (University of Science and Technology of China); Qibin Sun (University of Science and Technology of China); Feng Wu (University of Science and Technology of China) |
| Blazing Fast PSI from Improved OKVS and Subfield VOLE | Srinivasan Raghuraman (Visa Research); Peter Rindal (Visa Research) |
| Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT | Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhenliang Lu (The University of Sydney); Qiang Tang (The University of Sydney) |
| Bullshark: DAG BFT Protocols Made Practical | Alexander Spiegelman (Aptos); Neil Giridharan (Berkeley); Alberto Sonnino (Mesten Labs); Lefteris Kokoris-Kogias (IST Austria) |
| C2C: Fine-grained Configuration-driven System Call Filtering | Seyedhamed Ghavamnia (Stony Brook University); Tapti Palit (Purdue University); Michalis Polychronakis (Stony Brook University) |
| CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks | Alvise De Faveri Tron (Politecnico di Milano); Stefano Longari (Politecnico di Milano); Michele Carminati (Politecnico di Milano); Mario Polino (Politecnico di Milano); Stefano Zanero (Politecnico di Milano) |
| CERBERUS: Exploring Federated Prediction of Security Events | Mohammad Naseri (University College London); Yufei Han (Inria Rennes); Enrico Mariconti (University College London); Yun Shen (NetApp); Gianluca Stringhini (Boston University); Emiliano De Cristofaro (University College London) |
| CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation | Mengyao Xie (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Chenggang Wu (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences & Zhongguancun Laboratory); Yinqian Zhang (Research Institute of Trustworthy Autonomous Systems; Southern University of Science and Technology & Department of Computer Science and Engineering; Southern University of Science and Technology); Jiali Xu (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Yuanming Lai (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Yan Kang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Wei Wang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences); Zhe Wang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & Zhongguancun Laboratory) |
| CINI MINIS: Domain Isolation for Fault and Combined Security | Jakob Feldtkeller (Ruhr University Bochum); Jan Richter-Brockmann (Ruhr University Bochum); Pascal Sasdrich (Ruhr University Bochum); Tim Güneysu (Ruhr University Bochum) |
| Cache Refinement Type for Side-Channel Detection of Cryptographic Software | Ke Jiang (Nanyang Technological University); Yuyan Bao (University of Waterloo); Shuai Wang (Hong Kong University of Science and Technology); Zhibo Liu (Hong Kong University of Science and Technology); Tianwei Zhang (Nanyang Technological University) |
| Caulk: Lookup Arguments in Sublinear Time | Arantxa Zapico (Universitat Pompeu Fabra); Vitalik Buterin (Ethereum Foundation); Dmitry Khovratovich (Ethereum Foundation); Mary Maller (Ethereum Foundation); Anca Nitulescu (Protocol Labs); Mark Simkin (Ethereum Foundation) |
| Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing | Dayeol Lee (University of California; Berkeley); Kevin Cheang (University of California; Berkeley); Alexander Thomas (University of California; Berkeley); Catherine Lu (University of California; Berkeley); Pranav Gaddamadugu (University of California; Berkeley); Anjo Vahldiek-Oberwagner (Intel Labs); Mona Vij (Intel Labs); Dawn Song (University of California; Berkeley); Sanjit A. Seshia (University of California; Berkeley); Krste Asanović (University of California; Berkeley) |
| Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations | Tamjid Al Rahat (University of California; Los Angeles); Yu Feng (University of California; Santa Barbara); Yuan Tian (University of California; Los Angeles) |
| Chaghri - An FHE-friendly Block Cipher | Tomer Ashur (Eindhoven University of Technology; KU Leuven); Mohammad Mahzoun (Eindhoven University of Technology); Dilara Toprakhisar (KU Leuven) |
| Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks | Tengfei Zheng (National University of Defense Technology); Tongqing Zhou (National University of Defense Technology); Qiang Liu (National University of Defense Technology); Kui Wu (University of Victoria); Zhiping Cai (National University of Defense Technology) |
| Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam | Siyuan Tang (Indiana University Bloomington); Xianghang Mi (University of Science and Technology of China); Ying Li (Institute of Information Engineering; Chinese Academy of Sciences); XiaoFeng Wang (Indiana University Bloomington); Kai Chen (Institute of Information Engineering; Chinese Academy of Sciences & University of Chinese Academy of Sciences; School of Cyber Security) |
| Collect Responsibly But Deliver Arbitrarily? A Study on Cross-User Privacy Leakage in Mobile Apps | Shuai Li (Fudan University); Zhemin Yang (Fudan University); Nan Hua (Fudan University); Peng Liu (The Pennsylvania State University); Xiaohan Zhang (Fudan University); Guangliang Yang (Fudan University); Min Yang (Fudan University) |
| Constant Latency in Sleepy Consensus | Atsuki Momose (University of Illinois at Urbana-Champaign); Ling Ren (University of Illinois at Urbana-Champaign) |
| Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection | Yuqing Yang (The Ohio State University); Yue Zhang (The Ohio State University); Zhiqiang Lin (The Ohio State University) |
| DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On | Louis Jannett (Ruhr University Bochum); Vladislav Mladenov (Ruhr University Bochum); Christian Mainka (Ruhr University Bochum); Jörg Schwenk (Ruhr University Bochum) |
| DPIS: an Enhanced Mechanism for Differentially Private SGD with Importance Sampling | Jianxin Wei (National University of Singapore); Ergute Bao (National University of Singapore); Xiaokui Xiao (National University of Singapore); Yin Yang (Hamad Bin Khalifa University) |
| DangZero: Efficient Use-After-Free Detection via Direct Page Table Access | Floris Gorter (Vrije Universiteit Amsterdam); Koen Koning (Vrije Universiteit Amsterdam); Herbert Bos (Vrije Universiteit Amsterdam); Cristiano Giuffrida (Vrije Universiteit Amsterdam) |
| Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems | Jie Lu (SKLP; Institute of Computing Technology; CAS); Haofeng Li (SKLP; Institute of Computing Technology; CAS); Chen Liu (SKLP; Institute of Computing Technology; CAS); Lian Li (SKLP; Institute of Computing Technology; CAS); Kun Cheng (Huawei Technologies Co. Ltd) |
| Detecting and Measuring Misconfigured Manifest in Android Apps | Yuqing Yang (The Ohio State University); Mohamed Elsabagh (Kryptowire); Chaoshun Zuo (The Ohio State University); Ryan Johnson (Kryptowire); Angelos Stavrou (Kryptowire); Zhiqiang Lin (The Ohio State University) |
| Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model | Jacob Imola (UC San Diego); Takao Murakami (AIST); Kamalika Chaudhuri (UC San Diego) |
| DirtyCred: Escalating Privilege in Linux Kernel | Zhenpeng Lin (Northwestern University); Yuhang Wu (Northwestern University); Xinyu Xing (Northwestern University) |
| Discovering IoT Physical Channel Vulnerabilities | Muslum Ozgur Ozmen (Purdue University); Xuansong Li (Nanjing University of Science and Technology & Nanjing University); Andrew Chu (University of Chicago); Z. Berkay Celik (Purdue University); Bardh Hoxha (Toyota Research Institute North America); Xiangyu Zhang (Purdue University) |
| Distributed, Private, Sparse Histograms in the Two-Server Model | James Bell (Google); Adria Gascon (Google); Badih Ghazi (Google); Ravi Kumar (Google); Pasin Manurangsi (Google); Mariana Raykova (Google); Phillipp Schoppmann (Google) |
| Do Opt-Outs Really Opt Me Out? | Duc Bui (University of Michigan); Brian Tang (University of Michigan); Kang G. Shin (University of Michigan) |
| Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee | Xian Wang (University of Texas at Dallas); Shuang Hao (University of Texas at Dallas) |
| DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing | Seulbae Kim (Georgia Institute of Technology); Major Liu (University of Texas at Dallas); Junghwan "John" Rhee (University of Central Oklahoma); Yuseok Jeon (UNIST); Yonghwi Kwon (University of Virginia); Chung Hwan Kim (University of Texas at Dallas) |
| Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency | Yingzi Gao (Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences); Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhenliang Lu (The University of Sydney); Qiang Tang (The University of Sydney); Jing Xu (Institute of Software Chinese Academy of Sciences); Zhenfeng Zhang (Institute of Software Chinese Academy of Sciences) |
| EIFFeL: Ensuring Integrity for Federated Learning | Amrita Roy Chowdhury (University of Wisconsin-Madison); Chuan Guo (Meta AI); Somesh Jha (University of Wisconsin-Madison); Laurens van der Maaten (Meta AI) |
| ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes | Weili Wang (Southern University of Science and Technology); Sen Deng (Southern University of Science and Technology); Jianyu Niu (Southern University of Science and Technology); Michael K. Reiter (Duke University); Yinqian Zhang (Southern University of Science and Technology) |
| EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices | Cong Wu (Wuhan University); Jing Chen (Wuhan University); Kun He (Wuhan University); Ziming Zhao (University at Buffalo); Ruiying Du (Wuhan University); Chen Zhang (Wuhan University) |
| Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters | Gilad Asharov (Bar-Ilan University); Koki Hamada (NTT Corporation); Dai Ikarashi (NTT Corporation); Ryo Kikuchi (NTT Corporation); Ariel Nof (Technion); Benny Pinkas (Bar-Ilan University); Katsumi Takahashi (NTT Corporation); Junichi Tomida (NTT Corporation) |
| Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams | Dario Fiore (IMDEA Software Institute); Ida Tucker (IMDEA Software Institute) |
| Eluding Secure Aggregation in Federated Learning via Model Inconsistency | Dario Pasquini (SPRING Lab; EPFL); Danilo Francati (Aarhus University); Giuseppe Ateniese (George Mason University) |
| Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security | Yulin Liu (SciEcon CIC); Yuxuan Lu (Peking University); Kartik Nayak (Duke University); Fan Zhang (Yale University); Luyao Zhang (Duke Kunshan University); Yinhong Zhao (Duke University) |
| Enforcing Fine-grained Constant-time Policies | Basavesh Ammanaghatta Shivakumar (MPI-SP); Gilles Barthe (MPI-SP and IMDEA Software Institute); Benjamin Gregoire (Inria and Université Côte d'Azur); Vincent Laporte (Université de Lorraine & CNRS & Inria & LORIA); Swarn Priya (Inria & Université Côte d'Azur) |
| Enhanced Membership Inference Attacks against Machine Learning Models | Jiayuan Ye (National University of Singapore (NUS)); Aadyaa Maddi (National University of Singapore (NUS)); Sasi Kumar Murakonda (Privitar Labs); Vincent Bindschaedler (University of Florida); Reza Shokri (National University of Singapore (NUS)) |
| Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications | Konstantinos Solomos (University of Illinois at Chicago); Panagiotis Ilia (University of Illinois at Chicago); Nick Nikiforakis (Stony Brook University); Jason Polakis (University of Illinois at Chicago) |
| Evocatio: Conjuring Bug Capabilities from a Single PoC | Zhiyuan Jiang (National University of Defense Technology); Shuitao Gan (SKL-MEAC; Tsinghua University); Adrian Herrera (Australian National University); Flavio Toffalini (EPFL); Lucio Romerio (EPFL); Chaojing Tang (National University of Defense Technology); Manuel Egele (Boston University); Chao Zhang (Tsinghua University; BNRist Zhongguancun Lab); Mathias Payer (EPFL) |
| Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection | Priyanka Dodia (Qatar Computing Research Institute); Mashael AlSabah (Qatar Computing Research Institute); Omar Alrawi (Georgia Institute of Technology); Tao Wang (Simon Fraser University) |
| FABEO: Fast Attribute-Based Encryption with Optimal Security | Doreen Riepel (Ruhr-Universität Bochum); Hoeteck Wee (NTT Research) |
| Fast Fully Oblivious Compaction and Shuffling | Sajin Sasy (University of Waterloo); Aaron Johnson (U.S. Naval Research Laboratory); Ian Goldberg (University of Waterloo) |
| Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority | Anders Dalskov (Partisia); Daniel Escudero (J.P. Morgan AI Research); Ariel Nof (Technion) |
| FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs | Fabian Schwarz (CISPA Helmholtz Center for Information Security); Khue Do (CISPA Helmholtz Center for Information Security); Gunnar Heide (CISPA Helmholtz Center for Information Security); Lucjan Hanzlik (CISPA Helmholtz Center for Information Security); Christian Rossow (CISPA Helmholtz Center for Information Security) |
| Feature Inference Attack on Shapley Values | Xinjian Luo (National University of Singapore); Yangfan Jiang (National University of Singapore); Xiaokui Xiao (National University of Singapore) |
| Federated Boosted Decision Trees with Differential Privacy | Samuel Maddock (University of Warwick); Graham Cormode (Meta AI); Tianhao Wang (University of Virginia); Carsten Maple (University of Warwick); Somesh Jha (University of Wisconsin-Madison) |
| FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems | Jiangyi Deng (Zhejiang University); Yanjiao Chen (Zhejiang University); Wenyuan Xu (Zhejiang University) |
| Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs | Carsten Baum (Aarhus University); Robin Jadoul (KU Leuven); Emmanuela Orsini (KU Leuven); Peter Scholl (Aarhus University); Nigel P. Smart (KU Leuven) |
| Finding MNEMON: Reviving Memories of Node Embeddings | Yun Shen (NetApp); Yufei Han (Inria); Zhikun Zhang (CISPA Helmholtz Center for Information Security); Min Chen (CISPA Helmholtz Center for Information Security); Ting Yu (QCRI); Michael Backes (CISPA Helmholtz Center for Information Security); Yang Zhang (CISPA Helmholtz Center for Information Security); Gianluca Stringhini (Boston University) |
| Foundations of Coin Mixing Services | Noemi Glaeser (University of Maryland & Max Planck Institute for Security and Privacy); Matteo Maffei (TU Wien & Christian Doppler Laboratory Blockchain Technologies for the Internet of Things); Giulio Malavolta (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute); Erkan Tairi (TU Wien & Christian Doppler Laboratory Blockchain Technologies for the Internet of Things); Sri Aravinda Krishnan Thyagarajan (Carnegie Mellon University) |
| Freely Given Consent? Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps | Trung Tin Nguyen (CISPA Helmholtz Center for Information Security; Saarland University); Michael Backes (CISPA Helmholtz Center for Information Security); Ben Stock (CISPA Helmholtz Center for Information Security) |
| Frequency Estimation in the Shuffle Model with Almost a Single Message | Qiyao Luo (Hong Kong University of Science and Technology); Yilei Wang (Alibaba Group); Ke YI (Hong Kong University of Science and Technology) |
| Frequency Throttling Side-Channel Attack | Chen Liu (Intel Corporation); Abhishek Chakraborty (Intel Corporation); Nikhil Chawla (Intel Corporation); Neer Roggel (Intel Corporation) |
| GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy | Bernardo David (ITU); Bernardo Magri (The University of Manchester); Christian Matt (Concordium); Jesper Buus Nielsen (Concordium Blockchain Research Center; Aarhus University); Daniel Tschudi (Concordium) |
| Graph Unlearning | Min Chen (CISPA Helmholtz Center for Information Security); Zhikun Zhang (CISPA Helmholtz Center for Information Security); Tianhao Wang (University of Virginia); Michael Backes (CISPA Helmholtz Center for Information Security); Mathias Humbert (University of Lausanne); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing | Junxian Shen (Tsinghua University & Zhongguancun Laboratory); Han Zhang (Tsinghua University & Zhongguancun Laboratory); Yantao Geng (Tsinghua University & Zhongguancun Laboratory); Jiawei Li (Tsinghua University); Jilong Wang (Tsinghua University & Peng Cheng Laboratory); Mingwei Xu (Tsinghua University & Peng Cheng Laboratory) |
| Group Property Inference Attacks Against Graph Neural Networks | Xiuling Wang (Stevens Institute of Technology); Wendy Hui Wang (Stevens Institute of Technology) |
| HammerScope: Observing DRAM Power Consumption Using Rowhammer | Yaakov Cohen (Ben-Gurion University of the Negev & Intel Corporation); Kevin Sam Tharayil (Georgia Institute of Technology); Arie Haenel (Jerusalem College of Technology & Intel Corporation); Daniel Genkin (Georgia Institute of Technology); Angelos D. Keromytis (Georgia Institute of Technology); Yossi Oren (Ben-Gurion University of the Negev & Intel Corporation); Yuval Yarom (University of Adelaide) |
| Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies | James Larisch (Harvard University); Waqar Aqeel (Duke University); Michael Lum (University of Maryland); Yaelle Goldschlag (University of Maryland); Leah Kannan (University of Maryland); Kasra Torshizi (University of Maryland); Yujie Wang (University of Maryland); Taejoong Chung (Virginia Tech); Dave Levin (University of Maryland); Bruce M. Maggs (Duke University & Emerald Innovations); Alan Mislove (Northeastern University); Bryan Parno (Carnegie Mellon University); Christo Wilson (Northeastern University) |
| Harnessing Perceptual Adversarial Patches for Crowd Counting | Shunchang Liu (Beihang University); Jiakai Wang (Zhongguancun Laboratory); Aishan Liu (Beihang University); Yingwei Li (Johns Hopkins University); Yijie Gao (Beihang University); Xianglong Liu (Beihang University); Dacheng Tao (JD Explore Academy & The University of Sydney) |
| HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions | Zhiyuan Yu (Washington University in St. Louis); Zhuohang Li (University of Tennessee; Knoxville); Yuanhaur Chang (Washington University in St. Louis); Skylar Fong (Washington University in St. Louis); Jian Liu (University of Tennessee; Knoxville); Ning Zhang (Washington University in St. Louis) |
| Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud | Xinyang Ge (Microsoft Research); Hsuan-Chi Kuo (University of Illinois Urbana-Champaign); Weidong Cui (Microsoft Research) |
| Helping or Hindering? How Browser Extensions Undermine Security | Shubham Agarwal (CISPA Helmholtz Center for Information Security) |
| Hidden in Plain Sight: Exploring Encrypted Channels in Android apps | Sajjad Pourali (Concordia University); Nayanamana Samarasinghe (Concordia University); Mohammad Mannan (Concordia University) |
| How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum | Keitaro Hashimoto (Tokyo Institute of Technology & AIST); Shuichi Katsumata (AIST & PQShield Ltd.); Thomas Prest (PQShield SAS) |
| HyperDbg: Reinventing Hardware-Assisted Debugging | Mohammad Sina Karvandi (Institute For Research In Fundamental Sciences (IPM)); MohammadHosein Gholamrezaei (Chosun University); Saleh Khalaj Monfared (Worcester Polytechnic Institute); Soroush Meghdadizanjani (Stony Brook University); Behrooz Abbassi (HyperDbg Organization); Ali Amini (HyperDbg Organization); Reza Mortazavi (Damghan University); Saeid Gorgin (Chosun University); Dara Rahmati (Shahid Beheshti University); Michael Schwarz (CISPA Helmholtz Center for Information Security) |
| I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior | Penghui Zhang (Arizona State University); Zhibo Sun (Drexel University); Sukwha Kyung (Arizona State University); Hans Walter Behrens (Arizona State University); Zion Leonahenahe Basque (Arizona State University); Haehyun Cho (Soongsil University); Adam Oest (PayPal; Inc.); Ruoyu Wang (Arizona State University); Tiffany Bao (Arizona State University); Yan Shoshitaishvili (Arizona State University); Gail-Joon Ahn (Arizona State University); Adam Doupé (Arizona State University) |
| Ibex: Privacy-preserving Ad Conversion Tracking and Bidding | Ke Zhong (University of Pennsylvania); Yiping Ma (University of Pennsylvania); Sebastian Angel (University of Pennsylvania & Microsoft Research) |
| Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation | Zayd Hammoudeh (University of Oregon); Daniel Lowd (University of Oregon) |
| Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One | Samuel Dittmer (Stealth Software Technologies; Inc.); Yuval Ishai (Technion - Israel Institute of Technology); Steve Lu (Stealth Software Technologies; Inc.); Rafail Ostrovsky (University of California; Los Angeles) |
| InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution | Shihan Lin (Duke University); Rui Xin (Duke University); Aayush Goel (Cupertino High School); Xiaowei Yang (Duke University) |
| JIT-Picking: Differential Fuzzing of JavaScript Engines | Lukas Bernhard (Ruhr University Bochum); Tobias Scharnowski (Ruhr University Bochum); Moritz Schloegel (Ruhr University Bochum); Tim Blazytko (Ruhr University Bochum); Thorsten Holz (CISPA Helmholtz Center for Information Security) |
| Kryvos: Publicly Tally-Hiding Verifiable E-Voting | Nicolas Huber (University of Stuttgart); Ralf Küsters (University of Stuttgart); Toomas Krips (University of Tartu); Julian Liedtke (University of Stuttgart); Johannes Müller (University of Luxembourg); Daniel Rausch (University of Stuttgart); Pascal Reisert (University of Stuttgart); Andreas Vogt (University of Applied Sciences and Arts Northwestern Switzerland) |
| L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response | Han Wang (Illinois Institute of Technology); Hanbin Hong (Illinois Institute of Technology); Li Xiong (Emory University); Zhan Qin (Zhejiang University); Yuan Hong (Illinois Institute of Technology & University of Connecticut) |
| LPGNet: Link Private Graph Networks for Node Classification | Aashish Kolluri (National University of Singapore); Teodora Baluta (National University of Singapore); Bryan Hooi (National University of Singapore); Prateek Saxena (National University of Singapore) |
| Laconic Private Set-Intersection From Pairings | Diego F. Aranha (Aarhus University); Chuanwei Lin (Aarhus University); Claudio Orlandi (Aarhus University); Mark Simkin (Ethereum Foundation) |
| Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption | Evgenios M. Kornaropoulos (George Mason University); Nathaniel Moyer (George Mason University); Charalampos Papamanthou (Yale University); Alexandros Psomas (Purdue University) |
| Leakage and Tamper Resilient Permutation-Based Cryptography | Christoph Dobraunig (Graz University of Technology and Lamarr Security Research); Bart Mennink (Digital Security Group; Radboud University); Robert Primas (Graz University of Technology) |
| LibAFL: A Framework to Build Modular and Reusable Fuzzers | Andrea Fioraldi (EURECOM); Dominik Maier (Google Inc.); Dongjia Zhang (The University of Tokyo); Davide Balzarotti (EURECOM) |
| Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API | Xiao Han (University of South Florida); Junjie Xiong (University of South Florida); Wenbo Shen (Zhejiang University); Zhuo Lu (University of South Florida); Yao Liu (University of South Florida) |
| LoneNeuron: a Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks | Zeyan Liu (The University of Kansas); Fengjun Li (The University of Kansas); Zhu Li (University of Missouri-Kansas City); Bo Luo (The University of Kansas) |
| Low-Latency Hardware Private Circuits | David Knichel (Ruhr University Bochum); Amir Moradi (University of Cologne) |
| MC^2: Rigorous and Efficient Directed Greybox Fuzzing | Abhishek Shah (Columbia University); Dongdong She (Columbia University); Samanway Sadhu (Columbia University); Krish Singal (Columbia University); Peter Coffman (Columbia University); Suman Jana (Columbia University) |
| META-BTS: Bootstrapping Precision Beyond the Limit | Youngjin Bae (CryptoLab. Inc.); Jung Hee Cheon (The Seoul National University/CryptoLab. Inc.); Wonhee Cho (The Seoul National University); Jaehyung Kim (CryptoLab. Inc.); Taekyung Kim (CryptoLab. Inc.) |
| Matproofs: Maintainable Matrix Commitment with Efficient Aggregation | Jing Liu (ShanghaiTech University); Liang Feng Zhang (ShanghaiTech University) |
| Membership Inference Attacks and Generalization: A Causal Perspective | Teodora Baluta (National University of Singapore); Shiqi Shen (National University of Singapore); S. Hitarth (National University of Singapore); Shruti Tople (National University of Singapore); Prateek Saxena (National University of Singapore) |
| Membership Inference Attacks by Exploiting Loss Trajectory | Yiyong Liu (CISPA Helmholtz Center for Information Security); Zhengyu Zhao (CISPA Helmholtz Center for Information Security); Michael Backes (CISPA Helmholtz Center for Information Security); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware | Zitai Chen (University of Birmingham); Sam L. Thomas (BINARLY); Flavio D. Garcia (University of Birmingham) |
| Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels | Ahmad Ibrahim (CISPA Helmholtz Center for Information Security); Hamed Nemati (Stanford University and CISPA Helmholtz Center for Information Security); Till Schlüter (CISPA Helmholtz Center for Information Security); Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security); Christian Rossow (CISPA Helmholtz Center for Information Security) |
| Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications | Jan Wichelmann (University of Lübeck); Florian Sieck (University of Lübeck); Anna Pätschke (University of Lübeck); Thomas Eisenbarth (University of Lübeck) |
| Minotaur: Multi-Resource Blockchain Consensus | Matthias Fitzi (IOG); Xuechao Wang (University of Illinois Urbana-Champaign); Sreeram Kannan (University of Washington; Seattle); Aggelos Kiayias (University of Edinburgh and IOG); Nikos Leonardos (University of Athens); Pramod Viswanath (Princeton University); Gerui Wang (Beijing Academy of Blockchain and Edge Computing) |
| NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms | Xiaoyu Fan (Tsinghua University); Kun Chen (Tsingjiao Information Technology Co. Ltd.); Guosai Wang (Tsingjiao Information Technology Co. Ltd.); Mingchun Zhuang (Beijing University of Posts and Telecommunications); Yi Li (Tsingjiao Information Technology Co. Ltd.); Wei Xu (Tsinghua University) |
| NTRU-u-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus | Kamil Kluczniak (CISPA Helmholtz Center for Information Security) |
| Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud | Jianyu Niu (Southern University of Science and Technology); Wei Peng (Southern University of Science and Technology); Xiaokuan Zhang (George Mason University); Yinqian Zhang (Southern University of Science and Technology) |
| NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications | Konstantin Taranov (ETH Zurich); Benjamin Rothenberger (ETH Zurich); Daniele De Sensi (ETH Zurich); Adrian Perrig (ETH Zurich); Torsten Hoefler (ETH Zurich) |
| Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs | Qingyang Zhou (University of Minnesota); Qiushi Wu (University of Minnesota); Dinghao Liu (Zhejiang University); Shouling Ji (Zhejiang University); Kangjie Lu (University of Minnesota) |
| On the (In)Security of Secure ROS2 | Gelei Deng (Nanyang Technological University); Guowen Xu (Nanyang Technological University); Yuan Zhou (Nanyang Technological University); Tianwei Zhang (Nanyang Technological University); Yang Liu (Nanyang Technological University) |
| On the Adaptive Security of the Threshold BLS Signature Scheme | Renas Bacho (CISPA Helmoltz Center for Information Security); Julian Loss (CISPA Helmoltz Center for Information Security) |
| On the Privacy Risks of Cell-Based NAS Architectures | Hai Huang (CISPA Helmholtz Center for Information Security); Zhikun Zhang (CISPA Helmholtz Center for Information Security); Yun Shen (NetApp); Michael Backes (CISPA Helmholtz Center for Information Security); Qi Li (Tsinghua University; Zhongguancun Lab); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| On the Success Rate of Side-Channel Attacks on Masked Implementations | Akira Ito (NTT Social Informatics Laboratories); Rei Ueno (Tohoku University); Naofumi Homma (Tohoku University) |
| Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models | Jiawei Liu (Wuhan University); Yangyang Kang (Alibaba Group); Di Tang (Indiana University Bloomington); Kaisong Song (Northeastern University & Alibaba Group); Changlong Sun (Alibaba Group); Xiaofeng Wang (Indiana University Bloomington); Wei Lu (Wuhan University); Xiaozhong Liu (Worcester Polytechnic Institute) |
| Overo: Sharing Private Audio Recordings | Jaemin Lim (Hanyang University); Kiyeon Kim (Hanyang University); Hyunwoo Yu (Hanyang University); Suk-Bok Lee (Hanyang University) |
| P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies | Ze Jin (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Indiana University Bloomington); Luyi Xing (Indiana University Bloomington); Yiwei Fang (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Indiana University Bloomington); Yan Jia (Nankai University); Bin Yuan (HuaZhong University of Science and Technology); Qixu Liu (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences) |
| PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement | Haibin Zhang (Beijing Institute of Technology); Sisi Duan (Tsinghua University) |
| PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication | Yuan Li (Tsinghua University); Wende Tan (Tsinghua University); Zhizheng Lv (Tsinghua University); Songtao Yang (Tsinghua University); Mathias Payer (EPFL); Ying Liu (Tsinghua University; Zhongguancun Lab); Chao Zhang (Tsinghua University; Zhongguancun Lab; BNRist) |
| PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies | Aggelos Kiayias (The University of Edinburgh & IOG); Markulf Kohlweiss (The University of Edinburgh & IOG); Amirreza Sarencheh (The University of Edinburgh & IOG) |
| PSI from Ring-OLE | Wutichai Chongchitmate (Chulalongkorn University); Yuval Ishai (Technion); Steve Lu (Stealth Software Technologies; Inc.); Rafail Ostrovsky (University of California; Los Angeles) |
| PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability | Jun Zeng (National University of Singapore); Chuqi Zhang (National University of Singapore); Zhenkai Liang (National University of Singapore) |
| PentaGOD: Stepping beyond Traditional GOD with Five Parties | Nishat Koti (Indian Institute of Science); Varsha Bhat Kukkala (Indian Institute of Science); Arpita Patra (Indian Institute of Science); Bhavish Raj Gopal (Indian Institute of Science) |
| Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception | Rui Duan (University of South Florida); Zhe Qu (University of South Florida); Shangqing Zhao (University of Oklahoma); Leah Ding (American University); Yao Liu (University of South Florida); Zhuo Lu (University of South Florida) |
| Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT | Xin'an Zhou (University of California; Riverside); Jiale Guan (Indiana University Bloomington); Luyi Xing (Indiana University Bloomington); Zhiyun Qian (University of California; Riverside) |
| Phishing URL Detection: A Network-based Approach Robust to Evasion | Taeri Kim (Hanyang University); Noseong Park (Yonsei University); Jiwon Hong (Hanyang University); Sang-Wook Kim (Hanyang University) |
| Physical Hijacking Attacks against Object Trackers | Raymond Muller (Purdue University); Yanmao Man (University of Arizona); Z. Berkay Celik (Purdue University); Ming Li (University of Arizona); Ryan Gerdes (Virginia Tech) |
| Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation | Karl Wüst (CISPA Helmholtz Center for Information Security); Kari Kostiainen (ETH Zurich); Noah Delius (ETH Zurich); Srdjan Capkun (ETH Zurich) |
| Poirot: Probabilistically Recommending Protections for the Android Framework | Zeinab El-Rewini (University of Waterloo); Zhuo Zhang (Purdue University); Yousra Aafer (University of Waterloo) |
| Post Quantum Noise | Yawning Angel (Oasis Labs); Benjamin Dowling (University of Sheffield); Andreas Hülsing (TU Eindhoven); Peter Schwabe (MPI-SP); Florian Weber (TU Eindhoven) |
| Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models | Shawn Shan (University of Chicago); Wenxin Ding (University of Chicago); Emily Wenger (University of Chicago); Haitao Zheng (University of Chicago); Ben Y. Zhao (University of Chicago) |
| Power Contracts: Provably Complete Power Leakage Models for Processors | Roderick Bloem (Graz University of Technology); Barbara Gigerl (Graz University of Technology); Marc Gourjon (Hamburg University of Technology); Vedad Hadžić (Graz University of Technology); Stefan Mangard (Graz University of Technology); Robert Primas (Graz University of Technology) |
| Practical Settlement Bounds for Proof-of-Work Blockchains | Peter Gaži (IOG); Ling Ren (University of Illinois at Urbana-Champaign); Alexander Russell (University of Connecticut & IOG) |
| Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond | Jianfeng Wang (Xidian University); Shi-Feng Sun (Shanghai Jiao Tong University); Tianci Li (Xidian University); Saiyu Qi (Xi’an Jiao Tong University); Xiaofeng Chen (Xidian University) |
| Practical, Round-Optimal Lattice-Based Blind Signatures | Shweta Agrawal (IIT Madras); Elena Kirshanova (Technology Innovation Institute; I. Kant BFU); Damien Stehlé (ENS de Lyon and Institut Universitaire de France); Anshu Yadav (IIT Madras) |
| Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC | Alex Berke (MIT Media Lab); Dan Calacci (MIT Media Lab) |
| Private and Reliable Neural Network Inference | Nikola Jovanović (ETH Zurich); Marc Fischer (ETH Zurich); Samuel Steffen (ETH Zurich); Martin Vechev (ETH Zurich) |
| Proof-of-Possession for KEM Certificates using Verifiable Generation | Tim Güneysu (Ruhr University Bochum; Horst Görtz Institute for IT-Security & DFKI GmbH; Cyber-Physical Systems); Philip Hodges (University of Waterloo); Georg Land (Ruhr University Bochum; Horst Görtz Institute for IT-Security & DFKI GmbH; Cyber-Physical Systems); Mike Ounsworth (Entrust); Douglas Stebila (University of Waterloo); Greg Zaverucha (Microsoft Research) |
| Protecting Critical Inter-Domain Communication through Flyover Reservations | Marc Wyss (ETH Zurich); Giacomo Giuliari (ETH Zurich); Jonas Mohler (ETH Zurich); Adrian Perrig (ETH Zurich) |
| Proving UNSAT in Zero Knowledge | Ning Luo (Yale University); Timos Antonopoulos (Yale University); William R. Harris (Google LLC); Ruzica Piskac (Yale University); Eran Tromer (Columbia University); Xiao Wang (Northwestern University) |
| QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems | Ana-Maria Crețu (Imperial College London); Florimond Houssiau (The Alan Turing Institute); Antoine Cully (Imperial College London); Yves-Alexandre de Montjoye (Imperial College London) |
| ROAST: Robust Asynchronous Schnorr Threshold Signatures | Tim Ruffing (Blockstream); Viktoria Ronge (Friedrich-Alexander-Universität Erlangen-Nürnberg); Elliott Jin (Blockstream); Jonas Schneider-Bensch (CISPA Helmholtz Center for Information Security); Dominique Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg) |
| Ready Raider One: Exploring the Misuse of Cloud Gaming Services | Guannan Liu (Virginia Tech); Daiping Liu (Palo Alto Networks; Inc. ); Shuai Hao (Old Dominion University); Xing Gao (University of Delaware); Kun Sun (George Mason University); Haining Wang (Virginia Tech) |
| RedShift: Transparent SNARKs from List Polynomial Commitments | Assimakis A. Kattis (New York University); Konstantin Panarin (Matter Labs); Alexander Vlasov (Matter Labs) |
| Reinforced Concrete: A Fast Hash Function for Verifiable Computation | Lorenzo Grassi (Radboud University); Dmitry Khovratovich (Dusk Network); Reinhard Lüftenegger (Graz University of Technology); Christian Rechberger (Graz University of Technology); Markus Schofnegger (Graz University of Technology); Roman Walch (Graz University of Technology;Know-Center GmbH) |
| SFuzz: Slice-based Fuzzing for Real-Time Operating Systems | Libo Chen (Shandong University); Quanpu Cai (Shanghai Jiao Tong University); Zhenbang Ma (QI-ANXIN Technology Research Institute); Yanhao Wang (QI-ANXIN Technology Research Institute); Hong Hu (Pennsylvania State University); Minghang Shen (Tencent Security Xuanwu Lab); Yue Liu (QI-ANXIN Technology Research Institute); Shanqing Guo (Shandong University); Haixin Duan (Tsinghua University); Kaida Jiang (Shanghai Jiao Tong University); Zhi Xue (Shanghai Jiao Tong University) |
| SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders | Tianshuo Cong (Institute for Advanced Study; BNRist; Tsinghua University); Xinlei He (CISPA Helmholtz Center for Information Security); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| STAR: Secret Sharing for Private Threshold Aggregation Reporting | Alex Davidson (Brave Software); Peter Snyder (Brave Software); E. B. Quirk (Brave Software); Joseph Genereux (Brave Software); Benjamin Livshits (Imperial College); Hamed Haddadi (Brave Software & Imperial College) |
| Second-Order Low-Randomness d+1 Hardware Sharing of the AES | Siemen Dhooghe (KU Leuven/ COSIC-imec); Aein Rezaei Shahmirzadi (Ruhr University Bochum; Horst Gortz Institute for IT Security); Amir Moradi (Ruhr University Bochum; Horst Gortz Institute for IT Security) |
| Secret-Shared Joins with Multiplicity from Aggregation Trees | Saikrishna Badrinarayanan (Snap); Sourav Das (UIUC); Gayathri Garimella (Oregon State University); Srinivasan Raghuraman (Visa Research); Peter Rindal (Visa Research) |
| Secure Auctions in the Presence of Rational Adversaries | Chaya Ganesh (Indian Institute of Science); Bhavana Kanukurthi (Indian Institute of Science); Girisha Shankar (Indian Institute of Science) |
| Secure Parallel Computation on Privately Partitioned Data and Applications | Nuttapong Attrapadung (AIST); Hiraku Morita (University of St. Gallen); Kazuma Ohara (AIST); Jacob C. N. Schuldt (AIST); Tadanori Teruya (AIST); Kazunari Tozawa (University of Tokyo) |
| Securing Reset Operations in NISQ Quantum Computers | Allen Mi (Yale University); Shuwen Deng (Yale University); Jakub Szefer (Yale University) |
| Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics | Thomas Humphries (University of Waterloo); Rasoul Akhavan Mahdavi (University of Waterloo); Shannon Veitch (University of Waterloo); Florian Kerschbaum (University of Waterloo) |
| Server-Aided Continuous Group Key Agreement | Joël Alwen (AWS-Wickr); Dominik Hartmann (Ruhr University Bochum); Eike Kiltz (Ruhr University Bochum); Marta Mularczyk (AWS-Wickr) |
| Sharp: Short Relaxed Range Proofs | Geoffroy Couteau (CNRS; IRIF; Université Paris Cité); Dahmun Goudarzi (Unaffiliated); Michael Klooß (Karlsruhe Institute of Technology; KASTEL); Michael Reichle (DIENS; École normale supérieure; PSL University; CNRS; INRIA) |
| Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy | Juanru Fang (Hong Kong University of Science and Technology); Wei Dong (Hong Kong University of Science and Technology); Ke Yi (Hong Kong University of Science and Technology) |
| Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto | Christoph Dobraunig (Lamarr Security Research); Daniel Kales (Graz University of Technology); Christian Rechberger (Graz University of Technology); Markus Schofnegger (Graz University of Technology); Greg Zaverucha (Microsoft Research) |
| Sigstore: Software Signing for Everybody | Zachary Newman (Chainguard); John Speed Meyers (Chainguard); Santiago Torres-Arias (Purdue University) |
| Sleepy Channels: Bi-directional Payment Channels without Watchtowers | Lukas Aumayr (TU Wien); Sri AravindaKrishnan Thyagarajan (Carnegie Mellon University); Giulio Malavolta (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute); Matteo Maffei (Christian Doppler Laboratory Blockchain Technologies for the Internet of Things & TU Wien) |
| SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering | Kelong Cong (KU Leuven); Debajyoti Das (KU Leuven); Jeongeun Park (KU Leuven); Hilder V.L. Pereira (KU Leuven) |
| SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities | Jaewon Hur (Seoul National University); Suhwan Song (Seoul National University); Sunwoo Kim (Samsung Research); Byoungyoung Lee (Seoul National University) |
| SpecPatch: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition | Hanqing Guo (Michigan State University); Yuanda Wang (Michigan State University); Nikolay Ivanov (Michigan State University); Li Xiao (Michigan State University); Qiben Yan (Michigan State University) |
| Squirrel: Efficient Synchronized Multi-Signatures from Lattices | Nils Fleischhacker (Ruhr University Bochum); Mark Simkin (Ethereum Foundation); Zhenfei Zhang (Ethereum Foundation) |
| StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning | Yupei Liu (Duke University); Jinyuan Jia (Duke University); Hongbin Liu (Duke University); Neil Gong (Duke University) |
| Strengthening Order Preserving Encryption with Differential Privacy | Amrita Roy Chowdhury (University of Wisconsin-Madison); Bolin Ding (Alibaba Group); Somesh Jha (University of Wisconsin-Madison); Weiran Liu (Alibaba Group); Jingren Zhou (Alibaba Group) |
| StrongBox: A GPU TEE on Arm Endpoints | Yunjie Deng (Southern University of Science and Technology); Chenxu Wang (Southern University of Science and Technology; The Hong Kong Polytechnic University); Shunchang Yu (Southern University of Science and Technology); Shiqing Liu (Southern University of Science and Technology); Zhenyu Ning (Hunan University; Southern University of Science and Technology); Kevin Leach (Vanderbilt University); Jin Li (Guangzhou University); Shoumeng Yan (Ant Group); Zhengyu He (Ant Group); Jiannong Cao (The Hong Kong Polytechnic University); Fengwei Zhang (Southern University of Science and Technology) |
| Succinct Zero Knowledge for Floating Point Computations | Sanjam Garg (UC Berkeley & NTT Research); Abhishek Jain (Johns Hopkins University); Zhengzhong Jin (Johns Hopkins University); Yinuo Zhang (UC Berkeley) |
| Succinct Zero-Knowledge Batch Proofs for Set Accumulators | Matteo Campanelli (Protocol Labs); Dario Fiore (IMDEA Software Institute); Semin Han (Hanyang University); Jihye Kim (Kookmin University); Dimitris Kolonelos (IMDEA Software Institute & Universidad Politécnica de Madrid); Hyunok Oh (Hanyang University) |
| SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings | Xin Jin (The Ohio State University); Kexin Pei (Columbia University); Jun Yeon Won (The Ohio State University); Zhiqiang Lin (The Ohio State University) |
| TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications | Changhua Luo (The Chinese University of Hong Kong); Penghui Li (The Chinese University of Hong Kong); Wei Meng (The Chinese University of Hong Kong) |
| TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities | Wooseok Kang (KAIST); Byoungho Son (POSTECH); Kihong Heo (KAIST) |
| The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning | Chris McMahon Stone (University of Birmingham); Sam L. Thomas (BINARLY); Mathy Vanhoef (KU Leuven); James Henderson (University of Birmingham); Nicolas Bailluet (École Normale Supérieure); Tom Chothia (University of Birmingham) |
| The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols | Sandro Coretti (IOG); Aggelos Kiayias (University of Edinburgh & IOG); Alexander Russell (University of Connecticut & IOG); Cristopher Moore (Santa Fe Institute) |
| The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES | Yusuke Naito (Mitsubishi Electric Corporation); Yu Sasaki (NTT Social Informatics Laboratories); Takeshi Sugawara (The University of Electro-Communications); Kan Yasuda (NTT Social Informatics Laboratories) |
| Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability | Mikael Bougon (IDEMIA); Hervé Chabanne (IDEMIA); Véronique Cortier (Université de Lorraine; Inria; CNRS); Alexandre Debant (Université de Lorraine; Inria; CNRS); Emmanuelle Dottax (IDEMIA); Jannik Dreier (Université de Lorraine; Inria; CNRS); Pierrick Gaudry (Université de Lorraine; Inria; CNRS); Mathieu Turuani (Université de Lorraine; Inria; CNRS) |
| Thora: Atomic and Privacy-Preserving Multi-Channel Updates | Lukas Aumayr (TU Wien); Kasra Abbaszadeh (University of Maryland); Matteo Maffei (Christian Doppler Laboratory Blockchain Technologies for the Internet of Things & TU Wien) |
| Threshold Cryptography as a Service (in the Multiserver and YOSO Models) | Fabrice Benhamouda (Algorand Foundation); Shai Halevi (Algorand Foundation); Hugo Krawczyk (Algorand Foundation); Alex Miao (Unaffiliated); Tal Rabin (Algorand Foundation) |
| TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals | Soundarya Ramesh (National University of Singapore); Ghozali Suhariyanto Hadi (National University of Singapore); Sihun Yang (Yonsei University); Mun Choon Chan (National University of Singapore); Jun Han (Yonsei University) |
| Tidy: Symbolic Verification of Timed Cryptographic Protocols | Gilles Barthe (MPI-SP & IMDEA Software Institute); Ugo Dal Lago (University of Bologna & INRIA Sophia Antipolis); Giulio Malavolta (MPI-SP); Itsaka Rakotonirina (MPI-SP) |
| Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications | Yue Duan (Illinois Institute of Technology); Xin Zhao (Nanjing University); Yu Pan (University of Utah); Shucheng Li (Nanjing University); Minghao Li (Harvard University); Fengyuan Xu (National Key Lab for Novel Software Technology; Nanjing University); Mu Zhang (University of Utah) |
| Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets | Florian Tramer (ETH Zürich); Reza Shokri (National University of Singapore); Ayrton San Joaquin (Yale-NUS College); Hoang Le (Oregon State University); Matthew Jagielski (Google); Sanghyun Hong (Oregon State University); Nicholas Carlini (Google) |
| TurboPack: Honest Majority MPC with Constant Online Communication | Daniel Escudero (J.P. Morgan AI Research); Vipul Goyal (Carnegie Mellon University); Antigoni Polychroniadou (J.P. Morgan AI Research); Yifan Song (Carnegie Mellon University) |
| Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection | Paola de Perthuis (Cosmian; DIENS; ENS/PSL; CNRS; INRIA); David Pointcheval (DIENS; ENS/PSL; CNRS; INRIA) |
| Uncovering Intent based Leak of Sensitive Data in Android Framework | Hao Zhou (The Hong Kong Polytechnic University); Xiapu Luo (The Hong Kong Polytechnic University); Haoyu Wang (Huazhong University of Science and Technology); Haipeng Cai (Washington State University; Pullman) |
| Understanding IoT Security from a Market-Scale Perspective | Xin Jin (The Ohio State University); Sunil Manandhar (IBM T.J. Watson Research Center); Kaushal Kafle (William & Mary); Zhiqiang Lin (The Ohio State University); Adwait Nadkarni (William & Mary) |
| Understanding Real-world Threats to Deep Learning Models in Android Apps | Zizhuang Deng (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Kai Chen (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Beijing Academy of Artificial Intelligence); Guozhu Meng (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Xiaodong Zhang (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Ke Xu (Huawei International Pte Ltd); Yao Cheng (Huawei International Pte Ltd) |
| Understanding Security Issues in the NFT Ecosystem | Dipanjan Das (University of California; Santa Barbara); Priyanka Bose (University of California; Santa Barbara); Nicola Ruaro (University of California; Santa Barbara); Christopher Kruegel (University of California; Santa Barbara); Giovanni Vigna (University of California; Santa Barbara) |
| Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem | Feng Xiao (Georgia Institute of Technology); Zheng Yang (Georgia Institute of Technology); Joey Allen (Georgia Institute of Technology); Guangliang Yang (Fudan University); Grant Williams (Georgia Institute of Technology); Wenke Lee (Georgia Institute of Technology) |
| Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition | Kelsey R. Fulton (University of Maryland); Daniel Votipka (Tufts University); Desiree Abrokwa (University of Maryland); Michelle L. Mazurek (University of Maryland); Michael Hicks (University of Maryland and Amazon); James Parker (Galois; Inc.) |
| Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security | Calvin Abou Haidar (Inria; ENS Lyon); Benoit Libert (CNRS; ENS Lyon); Alain Passelègue (Inria; ENS Lyon) |
| VOProof: Efficient zkSNARKs Generation for Algebra Dummies | Yuncong Zhang (Shanghai Jiao Tong University); Alan Szepeniec (Nervos); Ren Zhang (Cryptape Co. Ltd. and Nervos); Shi-Feng Sun (Shanghai Jiao Tong University); Geng Wang (Shanghai Jiao Tong University); Dawu Gu (Shanghai Jiao Tong University) |
| VRust: Automated Vulnerability Detection for Solana Smart Contracts | Siwei Cui (Texas A&M University); Gang Zhao (Texas A&M University); Yifei Gao (Texas A&M University); Tien Tavu (Texas A&M University); Jeff Huang (Texas A&M University) |
| VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries | Nirvan Tyagi (Cornell University); Ben Fisch (Yale University); Andrew Zitek (New York University); Joseph Bonneau (New York University); Stefano Tessaro (University of Washington) |
| Victory by KO: Attacking OpenPGP Using Key Overwriting | Lara Bruseghini (ETH Zurich & Proton AG); Daniel Huigens (Proton AG); Kenneth G. Paterson (ETH Zurich) |
| Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls | Chengjun Cai (City University of Hong Kong Dongguan Research Institute); Yichen Zang (City University of Hong Kong); Cong Wang (City University of Hong Kong); Xiaohua Jia (City University of Hong Kong); Qian Wang (Wuhan University) |
| WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis | Edwin Yang (University of Oklahoma); Qiuye He (University of Oklahoma); Song Fang (University of Oklahoma) |
| Watch Out for Race Condition Attacks When Using Android External Storage | Shaoyong Du (State Key Laboratory of Mathematical Engineering and Advanced Computing); Xin Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing); Guoqing Lai (State Key Laboratory of Mathematical Engineering and Advanced Computing); Xiangyang Luo (State Key Laboratory of Mathematical Engineering and Advanced Computing) |
| Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration | Gibran Gomez (IMDEA Software Institute & Universidad Politécnica de Madrid); Pedro Moreno-Sanchez (IMDEA Software Institute); Juan Caballero (IMDEA Software Institute) |
| What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation | Wei Zhou (Huazhong University of Science&University of Chinese Academy of Sciences and Technology); Lan Zhang (College of Information Sciences and Technology; The Pennsylvania State University); Le Guan (School of Computing; University of Georgia); Peng Liu (College of Information Sciences and Technology; The Pennsylvania State University); Yuqing Zhang (National Computer Network Intrusion Protection Center; University of Chinese Academy of Sciences) |
| When Evil Calls: Targeted Adversarial Voice over IP Network | Han Liu (Washington University in St. Louis); Zhiyuan Yu (Washington University in St. Louis); Mingming Zha (Indiana University Bloomington); XiaoFeng Wang (Indiana University Bloomington); William Yeoh (Washington University in St. Louis); Yevgeniy Vorobeychik (Washington University in St. Louis); Ning Zhang (Washington University in St. Louis) |
| When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer | Michael Fahr (University of Arkansas); Hunter Kippen (University of Maryland); Andrew Kwong (University of Michigan); Thinh Dang (George Washington University); Jacob Lichtinger (NIST); Dana Dachman-Soled (University of Maryland); Daniel Genkin (Georgia Institute of Technology); Alexander H. Nelson (University of Arkansas); Ray Perlner (NIST); Arkady Yerukhimovich (George Washington University); Daniel Apon (The MITRE Corporation) |
| When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure | Yue Zhang (The Ohio State University); Zhiqiang Lin (The Ohio State University) |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Wai Man Si (CISPA Helmholtz Center for Information Security); Michael Backes (CISPA Helmholtz Center for Information Security); Jeremy Blackburn (Binghamton University); Emiliano De Cristofaro (University College London); Gianluca Stringhini (Boston University); Savvas Zannettou (TU Delft); Yang Zhang (CISPA Helmholtz Center for Information Security) |
| Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It | Sílvia Casacuberta (Harvard University); Michael Shoemate (Harvard University); Salil Vadhan (Harvard University); Connor Wagaman (Boston University) |
| Zapper: Smart Contracts with Data and Identity Privacy | Samuel Steffen (ETH Zurich); Benjamin Bichsel (ETH Zurich); Martin Vechev (ETH Zurich) |
| ``Is your explanation stable?': A Robustness Evaluation Framework for Feature Attribution | Yuyou Gan (Zhejiang University); Yuhao Mao (Zhejiang University); Xuhong Zhang (Zhejiang University); Shouling Ji (Zhejiang University); Yuwen Pu (Zhejiang University); Meng Han (Zhejiang University); Jianwei Yin (Zhejiang University); Ting Wang (The Pennsylvania State University) |
| i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? | Leemon Baird (Swirlds Labs); Pratyay Mukherjee (Swirlds Labs); Rohit Sinha (Swirlds Labs) |
| pMPL: A Robust Multi-Party Learning Framework with a Privileged Party | Lushan Song (Fudan University); Jiaxuan Wang (Fudan University); Zhexuan Wang (Fudan University); Xinyu Tu (Fudan University); Guopeng Lin (Fudan University); Wenqiang Ruan (Fudan University); Haoqi Wu (Fudan University); Weili Han (Fudan University) |
| zkBridge: Trustless Cross-chain Bridges Made Practical | Tiancheng Xie (University of California; Berkeley); Jiaheng Zhang (University of California; Berkeley); Zerui Cheng (Tsinghua University); Fan Zhang (Yale University); Yupeng Zhang (Texas A&M University); Yongzheng Jia (Overeality Labs); Dan Boneh (Stanford University); Dawn Song (University of California; Berkeley) |
| Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement | ChangSeok Oh (Georgia Institute of Technology); Chris Kanich (University of Illinois Chicago); Damon McCoy (NYU); Paul Pearce (Georgia Institute of Technology) |