default search action
19th AsiaCCS 2024: Singapore
- Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas:
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024. ACM 2024
Keynote 1
- Robert H. Deng:
Toward Practical Client-Side Encryption in Cloud Computing.
Network Security
- Arthur Drichel, Marc Meyer, Ulrike Meyer:
Towards Robust Domain Generation Algorithm Classification. - Lars Prehn, Pawel Foremski, Oliver Gasser:
Kirin: Hitting the Internet with Distributed BGP Announcements. - Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphaël Troncy:
X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory. - Udesh Kumarasinghe, Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel, Charitha Elvitigala, Preslav Nakov:
Semantic Ranking for Automated Adversarial Technique Annotation in Security Text. - Junjian Ye, Xavier de Carné de Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu, Wei Zhang:
Exposed by Default: A Security Analysis of Home Router Default Settings. - Sebastian Zillien, Tobias Schmidbauer, Mario Kubek, Jörg Keller, Steffen Wendzel:
Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION. - Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen:
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments. - Ali Davanian, Michalis Faloutsos, Martina Lindorfer:
C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers.
Side Channels
- Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss:
Generic and Automated Drive-by GPU Cache Attacks from the Browser. - Torsten Krauß, Jasper Stang, Alexandra Dmitrienko:
Cloud-Based Machine Learning Models as Covert Communication Channels. - Ethan Ferguson, Adam Wilson, Hoda Naghibijouybari:
WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks. - William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu:
SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters? - Kartik Ramkrishnan, Stephen McCamant, Antonia Zhai, Pen-Chung Yew:
Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses. - Tiziano Marinaro, Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati:
Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization. - Lorenz Hetterich, Markus Bauer, Michael Schwarz, Christian Rossow:
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8. - Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina:
ABBY: Automating leakage modelling for side-channel analysis.
Privacy-Preserving Protocols
- Xiaowei Ge, Guanxiong Ha, Chunfu Jia, Zhen Su:
Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud. - Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo:
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication. - Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li:
SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing. - Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu:
zkMatrix: Batched Short Proof for Committed Matrix Multiplication. - Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem. - Minghua Zhao:
Honest Majority Multiparty Computation over Rings with Constant Online Communication. - Yunqi Li, Kyle Soska, Zhen Huang, Sylvain Bellemare, Mikerah Quintyne-Collins, Lun Wang, Xiaoyuan Liu, Dawn Song, Andrew Miller:
Ratel: MPC-extensions for Smart Contracts.
Wireless and Mobile Security
- Senlin Liu, Tong Gao, Yijian Liu, Xianhui Lu:
Physical-Layer Public Key Encryption Through Massive MIMO. - Anne Josiane Kouam, Aline Carneiro Viana, Alain Tchana:
Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud? - Antonio Ruggia, Dario Nisi, Savino Dambra, Alessio Merlo, Davide Balzarotti, Simone Aonzo:
Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware. - Shanghao Shi, Yang Xiao, Changlai Du, Yi Shi, Chonggang Wang, Robert Gazda, Y. Thomas Hou, Eric William Burger, Luiz A. DaSilva, Wenjing Lou:
TriSAS: Toward Dependable Inter-SAS Coordination with Auditability. - Wei Wang, Xin Liu, Zicheng Chi, Stuart Ray, Ting Zhu:
Key Establishment for Secure Asymmetric Cross-Technology Communication.
Hardware Security
- Florian Frank, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong, Tolga Arul, Stefan Katzenbeisser:
Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs. - Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. - Jubayer Mahmod, Matthew Hicks:
SRAM Imprinting for System Protection and Differentiation. - Andrew J. Adiletta, M. Caner Tol, Yarkin Doröz, Berk Sunar:
Mayhem: Targeted Corruption of Register and Stack Variables. - Moritz Peters, Nicolas Gaudin, Jan Philipp Thoma, Vianney Lapôtre, Pascal Cotret, Guy Gogniat, Tim Güneysu:
On The Effect of Replacement Policies on The Security of Randomized Cache Architectures. - Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
Post Quantum
- Bo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang, Fan Zhang:
HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning. - Poulami Das, Andreas Erwig, Michael Meyer, Patrick Struck:
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies. - Samuel Pagliarini, Aikata, Malik Imran, Sujoy Sinha Roy:
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography. - Mingyao Shao, Yuejun Liu, Yongbin Zhou:
Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. - Andre Esser, Javier A. Verbel, Floyd Zweydinger, Emanuele Bellini:
SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness Estimation. - Lena Heimberger, Tobias Hennerbichler, Fredrik Meisingseth, Sebastian Ramacher, Christian Rechberger:
OPRFs from Isogenies: Designs and Analysis.
Measurements
- Nethanel Gelernter, Haya Schulmann, Michael Waidner:
External Attack-Surface of Modern Organizations. - Jenny Blessing, Michael A. Specter, Daniel J. Weitzner:
Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries. - Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou:
Username Squatting on Online Social Networks: A Study on X. - Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi:
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
IoT and Voice Assistants
- Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu:
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform. - Hyojin Kim, Minji Jo, Jiwoo Hong, Hosung Kang, Nate Mathews, Se Eun Oh:
WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting. - Mehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen:
SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms. - Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers.
Formal Methods
- Binghan Wang, Hui Li, Jingjing Guan:
A Formal Analysis of Data Distribution Service Security. - Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang:
Formal Verification and Solutions for Estonian E-Voting. - Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. - Zilin Shen, Imtiaz Karim, Elisa Bertino:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode.
Web Security
- Eric Olsson, Benjamin Eriksson, Pablo Picazo-Sanchez, Lukas Andersson, Andrei Sabelfeld:
FakeX: A Framework for Detecting Fake Reviews of Browser Extensions. - Sheryl Hsu, Manda Tran, Aurore Fass:
What is in the Chrome Web Store? - Xuhang Gu, Qingyang Wang, Qiben Yan, Jianshu Liu, Calton Pu:
Sync-Millibottleneck Attack on Microservices Cloud Architecture. - Merve Sahin, Noemi Daniele:
Towards Understanding and Improving Security-Relevant Web Application Logging. - Chao Wang, Yue Zhang, Zhiqiang Lin:
RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop. - Jannis Rautenstrauch, Ben Stock:
Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact. - Woonghee Lee, Junbeom Hur, Doowon Kim:
Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites.
Cyber-Physical Systems
- Piet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik:
The SA4P Framework: Sensing and Actuation as a Privilege. - Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, Ahmad Mohammad:
ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles. - Maryna Veksler, Kemal Akkaya, A. Selcuk Uluagac:
Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol. - Pritam Dash, Guanpeng Li, Mehdi Karimibiuki, Karthik Pattabiraman:
Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks. - Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. - Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang:
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. - Eric Wagner, David Heye, Martin Serror, Ike Kunze, Klaus Wehrle, Martin Henze:
Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication. - Khaled Sarieddine, Mohammad Ali Sayed, Sadegh Torabi, Ribal Attallah, Danial Jafarigiv, Chadi Assi, Mourad Debbabi:
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
Crypto and Privacy
- Amir Sabbagh Molahosseini, Hans Vandierendonck:
Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption. - Xinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun, Jingwei Hu:
Efficient Unbalanced Quorum PSI from Homomorphic Encryption. - Afonso Arriaga, Peter Y. A. Ryan, Marjan Skrobot:
SweetPAKE: Key exchange with decoy passwords. - Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu:
MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning. - Han Xia, Mingsheng Wang:
LightPIR: Single-Server PIR via FHE without Gaussian Noise. - Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen:
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. - Amit Singh Bhati, Antonin Dufka, Elena Andreeva, Arnab Roy, Bart Preneel:
Skye: An Expanding PRF based Fast KDF and its Applications. - Chaojie Lv, Xiaokui Xiao, Lan Zhang, Ting Yu:
Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy.
Keynote 2
- Alexandra Dmitrienko:
Federated Learning Security: From Dusk to Dawn.
Keynote 3
- XiaoFeng Wang:
Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research.
Software Security
- Jonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck:
Cross-Language Differential Testing of JSON Parsers. - Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves:
VFCFinder: Pairing Security Advisories and Patches. - Alwin Maier, Felix Weißberg, Konrad Rieck:
On the Role of Pre-trained Embeddings in Binary Code Analysis. - Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel, Sergej Proskurin, Michalis Polychronakis, Vasileios P. Kemerlis:
ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels. - Andreas Hager-Clukas, Konrad Hohentanner:
DMTI: Accelerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging Extension. - Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. - Nozima Murodova, Hyungjoon Koo:
BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary. - Lukas Maar, Pascal Nasahl, Stefan Mangard:
Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI.
Machine Learning
- Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang:
Model Extraction Attacks Revisited. - Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra:
A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference. - Thirasara Ariyarathna, Meisam Mohammady, Hye-Young Paik, Salil S. Kanhere:
VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models. - Oshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa, Vincent Bindschaedler, Subodha Charles:
Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks. - Kane Walter, Meisam Mohammady, Surya Nepal, Salil S. Kanhere:
Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity. - Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar:
An Investigation into Misuse of Java Security APIs by Large Language Models. - Bocheng Chen, Nikolay Ivanov, Guangjing Wang, Qiben Yan:
Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models. - Linkang Du, Quan Yuan, Min Chen, Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang:
PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems.
Distributed and Decentralized Systems
- Giacomo Giuliari, Alberto Sonnino, Marc Frei, Fabio Streun, Lefteris Kokoris-Kogias, Adrian Perrig:
An Empirical Study of Consensus Protocols' DoS Resilience. - Jamal Mosakheil, Kan Yang:
SilentProof: Anonymous Authentication with Blockchain-Backed Offloading. - Kanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka:
Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains. - Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu:
SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks. - Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim:
zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. - Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang:
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. - Chenke Wang, Zhonghui Ge, Yu Long, Xian Xu, Shi-Feng Sun, Dawu Gu:
BlindShuffler: Universal and Trustless Mixing for Confidential Transactions. - Emrah Sariboz, Reza Tourani, Roopa Vishwanathan, Satyajayant Misra:
PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge.
Fuzzing
- Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere:
Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler. - Gwangmu Lee, Duo Xu, Solmaz Salimi, Byoungyoung Lee, Mathias Payer:
SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer. - Shashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry:
Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection. - Taewook Kim, Seokhyun Hong, Yeongpil Cho:
AIMFuzz: Automated Function-Level In-Memory Fuzzing on Binaries. - Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert:
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications. - Felix Weissberg, Jonas Möller, Tom Ganz, Erik Imgrund, Lukas Pirch, Lukas Seidel, Moritz Schloegel, Thorsten Eisenhofer, Konrad Rieck:
SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing.
Trusted Execution Environments and Enclaves
- Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu:
ESem: To Harden Process Synchronization for Servers. - Jonas Röckl, Nils Bernsdorf, Tilo Müller:
TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs. - Md. Armanuzzaman, Ahmad-Reza Sadeghi, Ziming Zhao:
Building Your Own Trusted Execution Environments Using FPGA. - Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang:
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments. - Simon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch, Vijayanand Nayani, Jan-Erik Ekberg:
MultiTEE: Distributing Trusted Execution Environments. - Yurak Choe, Hyungseok Yu, Taeho Kim, Shinjae Lee, Hojoon Lee, Hyoungshick Kim:
(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices.
ORAM and Searchable Encryption
- William L. Holland, Olga Ohrimenko, Anthony Wirth:
Single Round-trip Hierarchical ORAM via Succinct Indices. - Fuyi Wang, Zekai Chen, Lei Pan, Leo Yu Zhang, Jianying Zhou:
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments. - Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. - Arnab Bag, Sikhar Patranabis, Debdeep Mukhopadhyay:
Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy. - Samuel Jaques, Hart Montgomery, Michael Lodder:
ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations. - Xiangfu Song, Yu Zheng, Jianli Bai, Changyu Dong, Zheli Liu, Ee-Chien Chang:
DISCO: Dynamic Searchable Encryption with Constant State.
Usability
- Ryo Iijima, Tatsuya Takehisa, Tetsushi Ohki, Tatsuya Mori:
The Catcher in the Eye: Recognizing Users by their Blinks. - Ritik Roongta, Rachel Greenstadt:
From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions. - Berend Kloeg, Aaron Yi Ding, Sjoerd Pellegrom, Yury Zhauniarovich:
Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach. - Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:
SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations.
Authentication and Signatures
- Wei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta:
Delegating FIDO Credentials Using Single-use ECDSA Signatures. - Douglas Stebila, Spencer Wilson:
Quantum-Safe Account Recovery for WebAuthn. - Quentin Kniep, Roger Wattenhofer:
Byzantine Fault-Tolerant Aggregate Signatures. - Guy Zyskind, Avishay Yanai, Alex Pentland:
Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications.
Payment Channel Networks and Ticket Payments
- Mohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan:
Auroch: Auction-Based Multipath Routing for Payment Channel Networks. - Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra:
SPRITE: Secure and Private Routing in Payment Channel Networks. - Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan:
RACED: Routing in Payment Channel Networks Using Distributed Hash Tables. - Pascal Lafourcade, Dhekra Mahmoud, Gaël Marcadet, Charles Olivier-Anclin:
Transferable, Auditable and Anonymous Ticketing Protocol.
POSTER SESSION: Posters
- Somin Song, Ashish Kundu, Byungchul Tak:
POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT-assisted Test Code Generation. - Jongkil Jay Jeong, Lu-Xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, Keerthivasan Viswanathan:
POSTER: Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets. - Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran:
Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning. - Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran:
POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization. - Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors. - Sushree Padhan, Ashok Kumar Turuk:
POSTER: Defense against False Data Injection Attack in a Cyber-Physical System. - Siyi Wang, Alex Jin, Suman Deb, Tarun Dutta, Manas Mukherjee, Anupam Chattopadhyay:
POSTER: MalaQ - A Malware Against Quantum Computer. - Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran:
POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. - Woomin Lee, Taehun Kim, Youngjoo Shin:
POSTER: On the Feasibility of Inferring SGX Execution through PMU. - Van Tong, Cuong Dao, Thep Dong, Hai Anh Tran, Duc Tran, Truong X. Tran:
POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts. - Anand Agrawal, Rajib Ranjan Maiti:
POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.