


default search action
30th CCS 2023: Copenhagen, Denmark
- Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023
Session 1: Cryptography for Anonymity
- Alexander Bienstock

, Paul Rösler
, Yi Tang
:
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. 1-15 - Ward Beullens

, Vadim Lyubashevsky
, Ngoc Khanh Nguyen
, Gregor Seiler
:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 16-29 - Omid Mir

, Balthazar Bauer
, Scott Griffy
, Anna Lysyanskaya
, Daniel Slamanig
:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. 30-44 - Julia Kastner

, Julian Loss
, Omar Renawi
:
Concurrent Security of Anonymous Credentials Light, Revisited. 45-59
Session 2: Machine Learning Applications I
- Savino Dambra

, Yufei Han
, Simone Aonzo
, Platon Kotzias
, Antonino Vitale
, Juan Caballero
, Davide Balzarotti
, Leyla Bilge
:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. 60-74 - Cong Shi

, Tianfang Zhang
, Zhaoyi Xu
, Shuping Li
, Donglin Gao
, Changming Li
, Athina P. Petropulu
, Chung-Tse Michael Wu
, Yingying Chen
:
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. 75-89 - Ping He

, Yifan Xia
, Xuhong Zhang
, Shouling Ji
:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. 90-104 - Francesco Marchiori

, Mauro Conti
:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. 105-119
Session 3: Attacks & Threats
- Bowen He

, Yuan Chen
, Zhuo Chen
, Xiaohui Hu
, Yufeng Hu
, Lei Wu
, Rui Chang
, Haoyu Wang
, Yajin Zhou
:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. 120-134 - Aviv Yaish

, Gilad Stern
, Aviv Zohar
:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. 135-149 - Chao Li

, Balaji Palanisamy
, Runhua Xu
, Li Duan
, Jiqiang Liu
, Wei Wang
:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. 150-164 - Zihao Li

, Jianfeng Li
, Zheyuan He
, Xiapu Luo
, Ting Wang
, Xiaoze Ni
, Wenwu Yang
, Xi Chen
, Ting Chen
:
Demystifying DeFi MEV Activities in Flashbots Bundle. 165-179
Session 4: Usable Privacy
- Tinhinane Medjkoune

, Oana Goga
, Juliette Senechal
:
Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects. 180-194 - Maryam Mustafa

, Abdul Moeed Asad
, Shehrbano Hassan
, Urooj Haider
, Zainab Durrani
, Katharina Krombholz
:
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. 195-209 - Bailey Kacsmar

, Vasisht Duddu
, Kyle Tilbury
, Blase Ur
, Florian Kerschbaum
:
Comprehension from Chaos: Towards Informed Consent for Private Computation. 210-224 - Emiram Kablo

, Patricia Arias Cabarcos
:
Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. 225-238
Session 5: Side-Channels
- Jingyang Hu

, Hongbo Wang
, Tianyue Zheng
, Jingzhi Hu
, Zhe Chen, Hongbo Jiang, Jun Luo
:
Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. 239-252 - Tao Ni

, Xiaokuan Zhang
, Qingchuan Zhao
:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. 253-267 - Ben Nassi

, Ofek Vayner
, Etay Iluz
, Dudi Nassi
, Jan Jancar
, Daniel Genkin
, Eran Tromer
, Boris Zadov
, Yuval Elovici
:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 268-280 - Zihao Wang

, Jiale Guan
, XiaoFeng Wang
, Wenhao Wang
, Luyi Xing
, Fares Fahad S. Alharbi
:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. 281-295
Session 6: Cryptography & DNS
- Fenglu Zhang

, Baojun Liu
, Eihal Alowaisheq
, Jianjun Chen
, Chaoyi Lu
, Linjian Song
, Yong Ma
, Ying Liu
, Haixin Duan
, Min Yang
:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. 296-310 - Wei Xu

, Xiang Li
, Chaoyi Lu
, Baojun Liu
, Haixin Duan
, Jia Zhang
, Jianjun Chen
, Tao Wan
:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. 311-325 - Zhenrui Zhang, Geng Hong, Xiang Li

, Zhuoqun Fu
, Jia Zhang
, Mingxuan Liu
, Chuhan Wang
, Jianjun Chen
, Baojun Liu
, Haixin Duan
, Chao Zhang
, Min Yang
:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. 326-340 - Boyang Ma

, Yilin Yang
, Jinku Li
, Fengwei Zhang
, Wenbo Shen
, Yajin Zhou
, Jianfeng Ma
:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. 341-355
Session 7: Digital Signatures
- Sourav Das

, Philippe Camacho
, Zhuolun Xiang
, Javier Nieto
, Benedikt Bünz
, Ling Ren
:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 356-370 - Sihang Pu

, Sri Aravinda Krishnan Thyagarajan
, Nico Döttling
, Lucjan Hanzlik
:
Post Quantum Fuzzy Stealth Signatures and Applications. 371-385 - Nils Fleischhacker

, Gottfried Herold
, Mark Simkin
, Zhenfei Zhang
:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. 386-400 - Seongkwang Kim

, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee
, Sangyub Lee
, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. 401-415
Session 8: Machine Learning Applications II
- Yiling He

, Jian Lou
, Zhan Qin
, Kui Ren
:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. 416-430 - Jinwen He

, Kai Chen
, Guozhu Meng
, Jiangshan Zhang
, Congyi Li
:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. 431-445 - Tianfang Zhang

, Zhengkun Ye
, Ahmed Tanvir Mahdad
, Md Mojibur Rahman Redoy Akanda
, Cong Shi
, Yan Wang
, Nitesh Saxena
, Yingying Chen
:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. 446-459 - Zhiyuan Yu

, Shixuan Zhai
, Ning Zhang
:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. 460-474
Session 9: Consensus Protocols
- Mahimna Kelkar

, Soubhik Deb
, Sishan Long
, Ari Juels
, Sreeram Kannan
:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. 475-489 - Dahlia Malkhi

, Atsuki Momose
, Ling Ren
:
Towards Practical Sleepy BFT. 490-503 - Xiaohai Dai

, Bolin Zhang
, Hai Jin
, Ling Ren
:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 504-518 - Erica Blum

, Jonathan Katz
, Julian Loss
, Kartik Nayak
, Simon Ochsenreither
:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 519-533
Session 10: Language-Based Security
- Yuyang Sang

, Ning Luo
, Samuel Judson
, Ben Chaimberg
, Timos Antonopoulos
, Xiao Wang
, Ruzica Piskac
, Zhong Shao
:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 534-548 - Benjamin Eriksson

, Amanda Stjerna
, Riccardo De Masellis
, Philipp Rümmer
, Andrei Sabelfeld
:
Black Ostrich: Web Application Scanning with String Solvers. 549-563 - Théophile Wallez

, Jonathan Protzenko
, Karthikeyan Bhargavan
:
Comparse: Provably Secure Formats for Cryptographic Protocols. 564-578
Session 11: Quantum & Space
- Chuanqi Xu

, Ferhat Erata
, Jakub Szefer
:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. 579-593 - Chuanqi Xu

, Jessie Chen
, Allen Mi
, Jakub Szefer
:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. 594-607 - Joshua Smailes

, Sebastian Köhler
, Simon Birnbach
, Martin Strohmeier
, Ivan Martinovic
:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. 608-621 - Kyungho Joo

, Dong Hoon Lee
, Yeonseon Jeong
, Wonsuk Choi
:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. 622-635
Session 12: IoT: Attacks, Vulnerabilities, & Everything
- Daniele Antonioli

:
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. 636-650 - Yan He

, Qiuye He
, Song Fang
, Yao Liu
:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. 651-665 - Mujtahid Akon

, Tianchang Yang
, Yilu Dong
, Syed Rafiul Hussain
:
Formal Analysis of Access Control Mechanism of 5G Core Network. 666-680 - David Schmidt

, Carlotta Tagliaro
, Kevin Borgolte
, Martina Lindorfer
:
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. 681-695
Session 13: Homomorphic Encryption I
- Jung Hee Cheon

, Wonhee Cho
, Jaehyung Kim
, Damien Stehlé
:
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. 696-710 - Sylvain Chatel

, Christian Mouchet
, Ali Utkan Sahin
, Apostolos Pyrgelis
, Carmela Troncoso
, Jean-Pierre Hubaux
:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 711-725 - Taechan Kim

, Hyesun Kwak
, Dongwon Lee
, Jinyeong Seo
, Yongsoo Song
:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 726-740 - Michiel Van Beirendonck

, Jan-Pieter D'Anvers
, Furkan Turan
, Ingrid Verbauwhede
:
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. 741-755
Session 14: Machine Learning Attacks I
- Yue Qin

, Zhuoqun Fu
, Chuyun Deng
, Xiaojing Liao
, Jia Zhang
, Haixin Duan
:
Stolen Risks of Models with Security Properties. 756-770 - Yi Zeng

, Minzhou Pan
, Hoang Anh Just
, Lingjuan Lyu
, Meikang Qiu
, Ruoxi Jia
:
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. 771-785 - Ryan Feng

, Ashish Hooda
, Neal Mangaokar
, Kassem Fawaz
, Somesh Jha
, Atul Prakash
:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. 786-800 - Vibha Belavadi

, Yan Zhou
, Murat Kantarcioglu
, Bhavani Thuraisingham
:
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. 801-814
Session 15: Cryptographic Constructs & Models
- Sisi Duan

, Xin Wang
, Haibin Zhang
:
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. 815-829 - Erica Blum

, Derek Leung
, Julian Loss
, Jonathan Katz
, Tal Rabin
:
Analyzing the Real-World Security of the Algorand Blockchain. 830-844 - Peter Gazi

, Aggelos Kiayias
, Alexander Russell
:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. 845-858 - Erkan Tairi

, Pedro Moreno-Sanchez
, Clara Schneidewind
:
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. 859-873
Session 16: Defenses
- Kha Dinh Duy

, Kyuwon Cho
, Taehyun Noh
, Hojoon Lee
:
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. 874-888 - Martin Unterguggenberger

, David Schrammel
, Lukas Lamster
, Pascal Nasahl
, Stefan Mangard
:
Cryptographically Enforced Memory Safety. 889-903 - Hanwen Lei

, Ziqi Zhang
, Shaokun Zhang
, Peng Jiang
, Zhineng Zhong
, Ningyu He
, Ding Li
, Yao Guo
, Xiangqun Chen
:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. 904-918 - Jiali Xu

, Mengyao Xie
, Chenggang Wu
, Yinqian Zhang
, Qijing Li
, Xuan Huang
, Yuanming Lai
, Yan Kang
, Wei Wang
, Qiang Wei
, Zhe Wang
:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. 919-933
Session 17: Secure Hardware
- Qinhan Tan

, Yonathan Fisseha
, Shibo Chen
, Lauren Biernacki
, Jean-Baptiste Jeannin
, Sharad Malik
, Todd M. Austin
:
Security Verification of Low-Trust Architectures. 945-959 - Zhenkai Zhang

, Tyler N. Allen
, Fan Yao
, Xing Gao
, Rong Ge
:
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. 960-974 - Till Schlüter

, Amit Choudhari
, Lorenz Hetterich
, Leon Trampert
, Hamed Nemati
, Ahmad Ibrahim
, Michael Schwarz
, Christian Rossow
, Nils Ole Tippenhauer
:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. 975-989 - Jakob Feldtkeller

, Tim Güneysu
, Thorben Moos
, Jan Richter-Brockmann
, Sayandeep Saha
, Pascal Sasdrich
, François-Xavier Standaert
:
Combined Private Circuits - Combined Security Refurbished. 990-1004
Session 18: Traffic Analysis
- Chuanpu Fu

, Qi Li
, Ke Xu
, Jianping Wu
:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. 1005-1019 - Peiyang Li

, Ye Wang
, Qi Li
, Zhuotao Liu
, Ke Xu
, Ju Ren
, Zhiying Liu
, Ruilin Lin
:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. 1020-1034 - Alireza Bahramali

, Ardavan Bozorgi
, Amir Houmansadr
:
Realistic Website Fingerprinting By Augmenting Network Traces. 1035-1049 - Zhaoxin Jin

, Tianbo Lu
, Shuang Luo
, Jiaze Shang
:
Transformer-based Model for Multi-tab Website Fingerprinting Attack. 1050-1064
Session 19: Advanced Public Key Encryption
- Noemi Glaeser

, Dimitris Kolonelos
, Giulio Malavolta
, Ahmadreza Rahimi
:
Efficient Registration-Based Encryption. 1065-1079 - Matthew Green

, Abhishek Jain
, Gijs Van Laer
:
Efficient Set Membership Encryption and Applications. 1080-1092 - Rachit Garg

, George Lu
, Brent Waters
, David J. Wu
:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. 1093-1107 - Joël Alwen

, Dominik Hartmann
, Eike Kiltz
, Marta Mularczyk
, Peter Schwabe
:
Post-Quantum Multi-Recipient Public Key Encryption. 1108-1122
Session 20: Machine Learning Attacks II
- Tejas Kannan

, Nick Feamster
, Henry Hoffmann
:
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. 1123-1137 - Teodora Baluta

, Ivica Nikolic
, Racchit Jain
, Divesh Aggarwal
, Prateek Saxena
:
Unforgeability in Stochastic Gradient Descent. 1138-1152 - Lingshuo Meng

, Yijie Bai
, Yanjiao Chen
, Yutong Hu
, Wenyuan Xu
, Haiqin Weng
:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. 1153-1167 - Zhengyuan Jiang

, Jinghuai Zhang
, Neil Zhenqiang Gong
:
Evading Watermark based Detection of AI-Generated Content. 1168-1181
Session 21: Defenses & Smart Contract Security
- Fuchen Ma

, Yuanliang Chen
, Yuanhang Zhou
, Jingxuan Sun
, Zhuo Su, Yu Jiang
, Jiaguang Sun
, Huizhong Li
:
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. 1182-1196 - Sven Smolka

, Jens-Rene Giesen
, Pascal Winkler
, Oussama Draissi
, Lucas Davi
, Ghassan Karame
, Klaus Pohl
:
Fuzz on the Beach: Fuzzing Solana Smart Contracts. 1197-1211 - Kushal Babel

, Mojan Javaheripi
, Yan Ji
, Mahimna Kelkar
, Farinaz Koushanfar
, Ari Juels
:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. 1212-1226 - Nirvan Tyagi

, Arasu Arun
, Cody Freitag
, Riad S. Wahby
, Joseph Bonneau
, David Mazières
:
Riggs: Decentralized Sealed-Bid Auctions. 1227-1241
Session 22: Fuzzing I
- Yinxi Liu

, Wei Meng
:
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. 1242-1256 - Yunhang Zhang

, Chengbin Pang
, Stefan Nagy
, Xun Chen
, Jun Xu
:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. 1257-1271 - Peng Deng

, Zhemin Yang
, Lei Zhang
, Guangliang Yang, Wenzheng Hong
, Yuan Zhang
, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. 1272-1286 - Qingkai Shi

, Junyang Shao
, Yapeng Ye
, Mingwei Zheng
, Xiangyu Zhang
:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. 1287-1301
Session 23: IoT & Embedded Security
- Shilin Xiao

, Xiaoyu Ji
, Chen Yan
, Zhicong Zheng
, Wenyuan Xu
:
MicPro: Microphone-based Voice Privacy Protection. 1302-1316 - Yi Zhu

, Chenglin Miao
, Hongfei Xue
, Zhengxiong Li
, Yunnan Yu
, Wenyao Xu
, Lu Su
, Chunming Qiao
:
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving. 1317-1331 - Xi Tan

, Ziming Zhao
:
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. 1332-1346 - Sashidhar Jakkamsetti

, Youngil Kim
, Gene Tsudik
:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. 1347-1361
Session 24: Formal Analysis of Cryptographic Protocols
- Faezeh Nasrabadi

, Robert Künnemann
, Hamed Nemati
:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. 1362-1376 - Linard Arquint

, Malte Schwerhoff
, Vaibhav Mehta
, Peter Müller
:
A Generic Methodology for the Modular Verification of Security Protocol Implementations. 1377-1391 - Sergiu Bursuc

, Ross Horne
, Sjouke Mauw
, Semen Yurkov
:
Provably Unlinkable Smart Card-based Payments. 1392-1406 - Lea Salome Brugger

, Laura Kovács
, Anja Petkovic Komel
, Sophie Rain
, Michael Rawson
:
CheckMate: Automated Game-Theoretic Security Reasoning. 1407-1421
Session 25: Zero Knowledge Proofs
- Alexandre Belling

, Azam Soleimanian
, Olivier Bégassat
:
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. 1422-1436 - David Balbás

, Dario Fiore
, María Isabel González Vasco
, Damien Robissout
, Claudio Soriente
:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. 1437-1451 - Yibin Yang

, David Heath
, Carmit Hazay
, Vladimir Kolesnikov
, Muthuramakrishnan Venkitasubramaniam
:
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. 1452-1466 - Diego F. Aranha

, Carsten Baum
, Kristian Gjøsteen
, Tjerand Silde
:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 1467-1481
Session 26: Federated Learning
- Marco Arazzi

, Mauro Conti
, Antonino Nocera
, Stjepan Picek
:
Turning Privacy-preserving Mechanisms against Federated Learning. 1482-1495 - Qi Li, Zhuotao Liu, Qi Li, Ke Xu:

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. 1496-1510 - Chulin Xie

, Yunhui Long
, Pin-Yu Chen
, Qinbin Li
, Sanmi Koyejo
, Bo Li
:
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks. 1511-1525 - Torsten Krauß

, Alexandra Dmitrienko
:
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. 1526-1540
Session 27: Interoperability & 2nd Layer Solutions
- Zhonghui Ge

, Jiayuan Gu
, Chenke Wang
, Yu Long
, Xian Xu
, Dawu Gu
:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. 1541-1555 - Andrei Tonkikh

, Pavel Ponomarev
, Petr Kuznetsov
, Yvonne-Anne Pignolet
:
CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. 1556-1570 - Peiyao Sheng

, Xuechao Wang
, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. 1571-1584 - Ertem Nusret Tas

, Runchao Han
, David Tse
, Mingchao Yu
:
Interchain Timestamping for Mesh Security. 1585-1599
Session 28: Fuzzing II
- Peng Chen

, Yuxuan Xie
, Yunlong Lyu
, Yuxiao Wang
, Hao Chen
:
Hopper: Interpretative Fuzzing for Libraries. 1600-1614 - Ruijie Meng

, George Pîrlea
, Abhik Roychoudhury
, Ilya Sergey
:
Greybox Fuzzing of Distributed Systems. 1615-1629 - Xin Tan

, Yuan Zhang
, Jiadong Lu
, Xin Xiong
, Zhuang Liu
, Min Yang
:
SyzDirect: Directed Greybox Fuzzing for Linux Kernel. 1630-1644 - Wen Li

, Haoran Yang
, Xiapu Luo
, Long Cheng
, Haipeng Cai
:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. 1645-1659
Session 29: Cryptography & Side-Channels
- Liu Liu

, Xinwen Fu
, Xiaodong Chen
, Jianpeng Wang
, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution. 1660-1674 - Saleh Khalaj Monfared

, Tahoura Mosavirik
, Shahin Tajik
:
LeakyOhm: Secret Bits Extraction using Impedance Analysis. 1675-1689 - Antoine Geimer

, Mathéo Vergnolle
, Frédéric Recoules
, Lesly-Ann Daniel
, Sébastien Bardin
, Clémentine Maurice
:
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. 1690-1704 - Daniel Lammers

, Amir Moradi
, Nicolai Müller
, Aein Rezaei Shahmirzadi
:
A Thorough Evaluation of RAMBAM. 1705-1717
Session 30: Information Flow & Differential Privacy
- Mário S. Alvim

, Natasha Fernandes
, Annabelle McIver
, Carroll Morgan
, Gabriel Henrique Nunes
:
A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow. 1718-1731 - McKenna McCall

, Abhishek Bichhawat
, Limin Jia
:
Tainted Secure Multi-Execution to Restrict Attacker Influence. 1732-1745 - Toby Murray

, Mukesh Tiwari
, Gidon Ernst
, David A. Naumann
:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications. 1746-1760 - Rohit Chadha

, A. Prasad Sistla
, Mahesh Viswanathan
, Bishnu Bhusal
:
Deciding Differential Privacy of Online Algorithms with Multiple Variables. 1761-1775
Session 31: Cryptography for Blockchains
- Aniket Kate

, Easwar Vivek Mangipudi
, Siva Maradana
, Pratyay Mukherjee
:
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. 1776-1790 - Renas Bacho

, Julian Loss
:
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons. 1791-1804 - Francesca Falzon

, Kaoutar Elkhiyaoui
, Yacov Manevich
, Angelo De Caro
:
Short Privacy-Preserving Proofs of Liabilities. 1805-1819 - Weijie Wang

, Yujie Lu
, Charalampos Papamanthou
, Fan Zhang
:
The Locality of Memory Checking. 1820-1834
Session 32: Language Models & Verification
- Ali Naseh

, Kalpesh Krishna
, Mohit Iyyer
, Amir Houmansadr
:
Stealing the Decoding Algorithms of Language Models. 1835-1849 - Stefano Calzavara

, Lorenzo Cazzaro
, Giulio Ermanno Pibiri
, Nicola Prezza
:
Verifiable Learning for Robust Tree Ensembles. 1850-1864 - Jingxuan He

, Martin T. Vechev
:
Large Language Models for Code: Security Hardening and Adversarial Testing. 1865-1879 - Sanjam Garg

, Aarushi Goel
, Somesh Jha
, Saeed Mahloujifar
, Mohammad Mahmoody
, Guru-Vamsi Policharla
, Mingyuan Wang
:
Experimenting with Zero-Knowledge Proofs of Training. 1880-1894
Session 33: Differential Privacy
- Johan Lokna

, Anouk Paradis
, Dimitar I. Dimitrov
, Martin T. Vechev
:
Group and Attack: Auditing Differential Privacy. 1905-1918 - Ari Biswas

, Graham Cormode
:
Interactive Proofs For Differentially Private Counting. 1919-1933 - Yuting Liang

, Ke Yi
:
Concentrated Geo-Privacy. 1934-1948 - Samuel Haney

, Michael Shoemate
, Grace Tian
, Salil P. Vadhan
, Andrew Vyrros
, Vicki Xu
, Wanrong Zhang
:
Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters. 1949-1963
Session 34: Kernel & System Calls
- Alexander J. Gaidis

, Vaggelis Atlidakis
, Vasileios P. Kemerlis
:
SysXCHG: Refining Privilege with Adaptive System Call Filters. 1964-1978 - Vidya Lakshmi Rajagopalan

, Konstantinos Kleftogiorgos
, Enes Göktas
, Jun Xu
, Georgios Portokalidis
:
SysPart: Automated Temporal System Call Filtering for Binaries. 1979-1993 - Zhenghao Hu

, Sangho Lee
, Marcus Peinado
:
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis. 1994-2008 - Pansilu Pitigalaarachchi

, Xuhua Ding
, Haiqing Qiu
, Haoxin Tu
, Jiaqi Hong
, Lingxiao Jiang
:
KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis. 2009-2023
Session 35: Speculative Execution & Information Flow
- Chongzhou Fang

, Ning Miao
, Han Wang
, Jiacheng Zhou
, Tyler Sheaves
, John Marty Emmert
, Avesta Sasan
, Houman Homayoun
:
Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication Links. 2024-2037 - Jason Kim

, Stephan van Schaik
, Daniel Genkin
, Yuval Yarom
:
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices. 2038-2052 - Rutvik Choudhary

, Alan Wang
, Zirui Neil Zhao
, Adam Morrison
, Christopher W. Fletcher
:
Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures. 2053-2067 - Drew Zagieboylo

, Charles Sherk
, Andrew C. Myers
, G. Edward Suh
:
SpecVerilog: Adapting Information Flow Control for Secure Speculation. 2068-2082
Session 36: Verified Cryptographic Implementations
- Sander Huyghebaert

, Steven Keuchel
, Coen De Roover
, Dominique Devriese
:
Formalizing, Verifying and Applying ISA Security Guarantees as Universal Contracts. 2083-2097 - Samuel Dittmer

, Karim Eldefrawy
, Stéphane Graham-Lengrand
, Steve Lu
, Rafail Ostrovsky
, Vitor Pereira
:
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge. 2098-2112 - Yi Zhou

, Sydney Gibson
, Sarah Cai
, Menucha Winchell
, Bryan Parno
:
Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares. 2113-2127 - Zilong Wang

, Gideon Mohr
, Klaus von Gleissenthall
, Jan Reineke
, Marco Guarnieri
:
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts. 2128-2142
Session 37: Multiparty Computation I
- Kyle Storrier

, Adithya Vadapalli
, Allan Lyons
, Ryan Henry
:
Grotto: Screaming fast (2+1)-PC or ℤ2n via (2, 2)-DPFs. 2143-2157 - Gabrielle Beck

, Aarushi Goel
, Aditya Hegde
, Abhishek Jain
, Zhengzhong Jin
, Gabriel Kaptchuk
:
Scalable Multiparty Garbling. 2158-2172 - S. Dov Gordon

, Phi Hung Le
, Daniel McVicker
:
Linear Communication in Malicious Majority MPC. 2173-2187 - Feng-Hao Liu

, En Zhang
, Leiyong Qin
:
Efficient Multiparty Probabilistic Threshold Private Set Intersection. 2188-2201
Session 38: Network Security
- Yue Qin

, Yue Xiao
, Xiaojing Liao
:
Vulnerability Intelligence Alignment via Masked Graph Attention Networks. 2202-2216 - Roman Beltiukov

, Wenbo Guo
, Arpit Gupta
, Walter Willinger
:
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems. 2217-2231 - Arezoo Rajabi

, Surudhi Asokraj
, Fengqing Jiang
, Luyao Niu
, Bhaskar Ramasubramanian
, James A. Ritcey
, Radha Poovendran
:
MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks. 2232-2246 - Enes Altinisik

, Fatih Deniz
, Hüsrev Taha Sencar
:
ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search. 2247-2261
Session 39: Privacy in Computation
- Chengkun Wei

, Ruijing Yu
, Yuan Fan
, Wenzhi Chen
, Tianhao Wang
:
Securely Sampling Discrete Gaussian Noise for Multi-Party Differential Privacy. 2262-2276 - Ji Guan

, Wang Fang
, Mingyu Huang
, Mingsheng Ying
:
Detecting Violations of Differential Privacy for Quantum Algorithms. 2277-2291 - Borja Balle

, James Bell
, Adrià Gascón
:
Amplification by Shuffling without Shuffling. 2292-2305 - Shashank Balla

, Farinaz Koushanfar
:
HELiKs: HE Linear Algebra Kernels for Secure Inference. 2306-2320
Session 40: Medley
- Song Liao

, Long Cheng
, Haipeng Cai
, Linke Guo
, Hongxin Hu
:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. 2321-2335 - Zongjie Li

, Chaozheng Wang
, Shuai Wang
, Cuiyun Gao
:
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks. 2336-2350 - Jaehyung Lee

, Woosuk Lee
:
Simplifying Mixed Boolean-Arithmetic Obfuscation by Program Synthesis and Term Rewriting. 2351-2365 - Su Yang

, Yang Xiao
, Zhengzi Xu
, Chengyi Sun
, Chen Ji
, Yuqing Zhang
:
Enhancing OSS Patch Backporting with Semantics. 2366-2380
Session 41: Measuring Security Deployments
- Dhruv Kuchhal

, Muhammad Saad
, Adam Oest
, Frank Li
:
Evaluating the Security Posture of Real-World FIDO2 Deployments. 2381-2395 - Feng Dong

, Shaofei Li
, Peng Jiang
, Ding Li
, Haoyu Wang
, Liangyi Huang
, Xusheng Xiao
, Jiedong Chen
, Xiapu Luo
, Yao Guo
, Xiangqun Chen
:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. 2396-2410 - Yue Zhang

, Yuqing Yang
, Zhiqiang Lin
:
Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs. 2411-2425 - Felix Fischer

, Jonas Höbenreich
, Jens Grossklags
:
The Effectiveness of Security Interventions on GitHub. 2426-2440
Session 42: Attacking the Web
- Jianjia Yu

, Song Li
, Junmin Zhu
, Yinzhi Cao
:
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation. 2441-2455 - Dominik Trevor Noß

, Lukas Knittel
, Christian Mainka
, Marcus Niemietz
, Jörg Schwenk
:
Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers. 2456-2470 - Chao Wang

, Yue Zhang
, Zhiqiang Lin
:
Uncovering and Exploiting Hidden APIs in Mobile Super Apps. 2471-2485 - Changqing Miao

, Jianan Feng
, Wei You
, Wenchang Shi
, Jianjun Huang
, Bin Liang
:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. 2486-2500
Session 43: Multiparty Computation II
- Jakob Burkhardt

, Ivan Damgård
, Tore Kasper Frederiksen
, Satrajit Ghosh
, Claudio Orlandi
:
Improved Distributed RSA Key Generation Using the Miller-Rabin Test. 2501-2515 - Yibin Yang

, Stanislav Peceny
, David Heath
, Vladimir Kolesnikov
:
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs). 2516-2530 - Benjamin Levy

, Muhammad Ishaq
, Benjamin Sherman
, Lindsey Kennard
, Ana L. Milanova
, Vassilis Zikas
:
COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation. 2531-2545 - Amit Singh Bhati

, Erik Pohle
, Aysajan Abidin
, Elena Andreeva
, Bart Preneel
:
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation. 2546-2560
Session 44: Machine Learning, Cryptography, & Cyber-Physical Systems
- Atsuki Momose

, Sourav Das
, Ling Ren
:
On the Security of KZG Commitment for VSS. 2561-2575 - Suman Maiti

, Anjana Balabhaskara
, Sunandan Adhikary
, Ipsita Koley
, Soumyajit Dey
:
Targeted Attack Synthesis for Smart Grid Vulnerability Analysis. 2576-2590 - Jinwen Wang

, Yujie Wang
, Ning Zhang
:
Secure and Timely GPU Execution in Cyber-physical Systems. 2591-2605 - Cathy Yuanchen Li

, Jana Sotáková
, Emily Wenger
, Mohamed Malhou
, Evrard Garcelon
, François Charton
, Kristin E. Lauter
:
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. 2606-2620
Session 45: Privacy in Machine Learning
- Chengkun Wei

, Minghu Zhao
, Zhikun Zhang
, Min Chen
, Wenlong Meng
, Bo Liu
, Yuan Fan
, Wenzhi Chen
:
DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. 2621-2635 - Hanshen Xiao

, Jun Wan
, Srinivas Devadas
:
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning. 2636-2650 - Xiaochen Zhu

, Vincent Y. F. Tan
, Xiaokui Xiao
:
Blink: Link Local Differential Privacy in Graph Neural Networks via Bayesian Estimation. 2651-2664 - Minxin Du

, Xiang Yue
, Sherman S. M. Chow
, Tianhao Wang
, Chenyu Huang
, Huan Sun
:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. 2665-2679
Session 46: Program Analysis & Instrumentation
- Nikita Yadav

, Vinod Ganapathy
:
Whole-Program Control-Flow Path Attestation. 2680-2694 - Yufei Du

, Omar Alrawi
, Kevin Z. Snow
, Manos Antonakakis
, Fabian Monrose
:
Improving Security Tasks Using Compiler Provenance Information Recovered At the Binary-Level. 2695-2709 - Yuanpeng Wang

, Ziqi Zhang
, Ningyu He
, Zhineng Zhong
, Shengjian Guo
, Qinkun Bao
, Ding Li
, Yao Guo
, Xiangqun Chen
:
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. 2710-2724 - Ziyi Lin

, Jinku Li
, Bowen Li
, Haoyu Ma
, Debin Gao
, Jianfeng Ma
:
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis. 2725-2739
Session 47: Security Professionals
- Jan H. Klemmer

, Marco Gutfleisch
, Christian Stransky
, Yasemin Acar
, M. Angela Sasse
, Sascha Fahl
:
"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication. 2740-2754 - Thomas Geras

, Thomas Schreck
:
Sharing Communities: The Good, the Bad, and the Ugly. 2755-2769 - Mathew Vermeer

, Natalia Kadenko
, Michel van Eeten
, Carlos Gañán
, Simon Parkin
:
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules. 2770-2784 - Neil Perry

, Megha Srivastava
, Deepak Kumar
, Dan Boneh
:
Do Users Write More Insecure Code with AI Assistants? 2785-2799
Session 48: Defending the Web
- Wenya Wang

, Xingwei Lin
, Jingyi Wang
, Wang Gao
, Dawu Gu
, Wei Lv
, Jiashui Wang
:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. 2800-2814 - Felix Linker

, David A. Basin
:
ADEM: An Authentic Digital EMblem. 2815-2829 - David A. Basin

, Juan Guarnizo
, Srdan Krstic
, Hoang Nguyen Phuoc Bao
, Martín Ochoa
:
Is Modeling Access Control Worth It? 2830-2844 - Zilun Wang

, Wei Meng
, Michael R. Lyu
:
Fine-Grained Data-Centric Content Protection Policy for Web Applications. 2845-2859
Session 49: Cryptographic Protocols
- Hien Chu

, Khue Do
, Lucjan Hanzlik
:
On the Security of Rate-limited Privacy Pass. 2871-2885 - Keegan Ryan

, Kaiwen He
, George Arnold Sullivan
, Nadia Heninger
:
Passive SSH Key Compromise via Lattices. 2886-2900 - Marc Fischlin

:
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3. 2901-2914 - Julia Len

, Melissa Chase
, Esha Ghosh
, Daniel Jost
, Balachandar Kesavan
, Antonio Marcedone
:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. 2915-2929
Session 50: Homomorphic Encryption II
- Song Bian

, Zhou Zhang
, Haowen Pan
, Ran Mao
, Zian Zhao
, Yier Jin
, Zhenyu Guan
:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. 2930-2944 - Rasoul Akhavan Mahdavi

, Haoyan Ni
, Dimitry Linkov
, Florian Kerschbaum
:
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. 2945-2958 - Binbin Tu

, Yu Chen
, Qi Liu
, Cong Zhang
:
Fast Unbalanced Private Set Union from Fully Homomorphic Encryption. 2959-2973 - Haiyang Xue

, Man Ho Au
, Mengling Liu
, Kwan Yin Chan
, Handong Cui
, Xiang Xie
, Tsz Hon Yuen
, Chengru Zhang
:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. 2974-2988
Session 51: Privacy in Systems
- Xueyuan Han

, James Mickens
, Siddhartha Sen
:
Splice: Efficiently Removing a User's Data from In-memory Application State. 2989-3002 - Lei Xu

, Leqian Zheng
, Chengzhi Xu
, Xingliang Yuan
, Cong Wang
:
Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption. 3003-3017 - Cláudio Correia

, Miguel Correia
, Luís E. T. Rodrigues
:
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. 3018-3032 - Elia Anzuoni

, Tommaso Gagliardoni
:
Shufflecake: Plausible Deniability for Multiple Hidden Filesystems on Linux. 3033-3047
Session 52: Attacks & Malware
- Nanzi Yang

, Wenbo Shen
, Jinku Li
, Xunqi Liu
, Xin Guo
, Jianfeng Ma
:
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. 3048-3062 - Zhi Li

, Weijie Liu
, XiaoFeng Wang
, Bin Yuan
, Hongliang Tian
, Hai Jin
, Shoumeng Yan
:
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation. 3063-3077 - Shijia Li

, Jiang Ming
, Pengda Qiu
, Qiyuan Chen
, Lanqing Liu
, Huaifeng Bao
, Qiang Wang
, Chunfu Jia
:
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection. 3078-3092 - Kyle Zeng

, Zhenpeng Lin
, Kangjie Lu
, Xinyu Xing
, Ruoyu Wang
, Adam Doupé
, Yan Shoshitaishvili
, Tiffany Bao
:
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. 3093-3107
Session 53: Usable Authentication
- Suood Alroomi

, Frank Li
:
Measuring Website Password Creation Policies At Scale. 3108-3122 - Collins W. Munyendo

, Peter Mayer
, Adam J. Aviv
:
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers. 3123-3137 - Sabrina Amft

, Sandra Höltervennhoff
, Nicolas Huaman
, Alexander Krause
, Lucy Simko
, Yasemin Acar
, Sascha Fahl
:
"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments. 3138-3152 - Easwar Vivek Mangipudi

, Udit Desai
, Mohsen Minaei
, Mainack Mondal
, Aniket Kate
:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. 3153-3167
Session 54: Measuring the Web
- Florian Hantke

, Stefano Calzavara
, Moritz Wilhelm
, Alvise Rabitti
, Ben Stock
:
You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements. 3168-3182 - Gibran Gómez

, Kevin van Liebergen
, Juan Caballero
:
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. 3183-3197 - Jeremy Rack

, Cristian-Alexandru Staicu
:
Jack-in-the-box: An Empirical Study of JavaScript Bundling on the Web and its Security Implications. 3198-3212 - Geng Hong

, Mengying Wu
, Pei Chen
, Xiaojing Liao
, Guoyi Ye
, Min Yang
:
Understanding and Detecting Abused Image Hosting Modules as Malicious Services. 3213-3227
Session 55: Security of Cryptographic Protocols & Implementations
- Diego F. Aranha

, Benjamin Salling Hvass
, Bas Spitters
, Mehdi Tibouchi
:
Faster Constant-time Evaluation of the Kronecker Symbol with Application to Elliptic Curve Hashing. 3228-3238 - Marc Fischlin

, Felix Günther
:
Verifiable Verification in Cryptographic Protocols. 3239-3253 - Sam A. Markelon

, Mia Filic
, Thomas Shrimpton
:
Compact Frequency Estimators in Adversarial Environments. 3254-3268 - Antonio de la Piedra

, Marloes Venema
, Greg Alpár
:
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra. 3269-3283
Session 56: Oblivious Algorithms & Data Structures
- Lennart Braun

, Mahak Pancholi
, Rahul Rachuri
, Mark Simkin
:
Ramen: Souper Fast Three-Party Computation for RAM Programs. 3284-3297 - Gilad Asharov

, Koki Hamada, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Junichi Tomida:
Secure Statistical Analysis on Multiple Datasets: Join and Group-By. 3298-3312 - Gilad Asharov

, Ilan Komargodski
, Yehuda Michelson
:
FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM. 3313-3327 - Sajin Sasy

, Aaron Johnson
, Ian Goldberg
:
Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks. 3328-3342
Session 57: Privacy in the Digital World
- David Klein

, Benny Rolle
, Thomas Barber
, Manuel Karl
, Martin Johns
:
General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications. 3343-3357 - Aloni Cohen

, Adam D. Smith
, Marika Swanberg
, Prashant Nalini Vasudevan
:
Control, Confidentiality, and the Right to be Forgotten. 3358-3372 - Anhao Xiang

, Weiping Pei
, Chuan Yue
:
PolicyChecker: Analyzing the GDPR Completeness of Mobile Apps' Privacy Policies. 3373-3387 - Kelsey Merrill

, Zachary Newman
, Santiago Torres-Arias
, Karen R. Sollins
:
Speranza: Usable, Privacy-friendly Software Signing. 3388-3402
Session 58: Measuring Machine Learning & Software Security
- Yiting Qu

, Xinyue Shen
, Xinlei He
, Michael Backes
, Savvas Zannettou
, Yang Zhang
:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. 3403-3417 - Zeyang Sha

, Zheng Li
, Ning Yu
, Yang Zhang
:
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models. 3418-3432 - Daniel Olszewski

, Allison Lu
, Carson Stillman
, Kevin Warren
, Cole Kitroser
, Alejandro Pascual
, Divyajyoti Ukirde
, Kevin R. B. Butler, Patrick Traynor
:
"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. 3433-3459 - Ita Ryan

, Utz Roedig
, Klaas-Jan Stol
:
Unhelpful Assumptions in Software Security Research. 3460-3474
Session 59: Tracking the Web
- Mohammad Ghasemisharif

, Jason Polakis
:
Read Between the Lines: Detecting Tracking JavaScript with Bytecode Classification. 3475-3489 - Shaoor Munir

, Sandra Siby
, Umar Iqbal
, Steven Englehardt
, Zubair Shafiq
, Carmela Troncoso
:
CookieGraph: Understanding and Detecting First-Party Tracking Cookies. 3490-3504 - Changmin Lee

, Sooel Son
:
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking. 3505-3518
Session 60: Poster Session
- Matías F. Gobbi

, Johannes Kinder
:
Poster: Using CodeQL to Detect Malware in npm. 3519-3521 - Mohammad M. Ahmadpanah

, Daniel Hedin
, Andrei Sabelfeld
:
Poster: Data Minimization by Construction for Trigger-Action Applications. 3522-3524 - Sylvain Chatel

, Christian Knabenhans
, Apostolos Pyrgelis
, Carmela Troncoso
, Jean-Pierre Hubaux
:
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation. 3525-3527 - Niklas Niere

, Sven Hebrok
, Juraj Somorovsky
, Robert Merget
:
Poster: Circumventing the GFW with TLS Record Fragmentation. 3528-3530 - Andres Molina-Markham

, Luis F. Robaina
, Akash H. Trivedi
, Derek G. Tsui
, Ahmad Ridley
:
Poster: Generating Experiences for Autonomous Network Defense. 3531-3533 - Rudolf Siegel

, Rafael Mrowczynski
, Maria Hellenthal
, Michael Schilling
:
Poster: From Hashes to Ashes - A Comparison of Transcription Services. 3534-3536 - Hattan Althebeiti

, Brett Fazio
, William Chen
, David Mohaisen
:
Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description. 3537-3539 - Xiaoyun Xu

, Stjepan Picek
:
Poster: Boosting Adversarial Robustness by Adversarial Pre-training. 3540-3542 - Christian van Sloun

, Klaus Wehrle
:
Poster: Vulcan - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation. 3543-3545 - Dominic Gold

, Koray Karabina
, Francis C. Motta
:
Poster: Computing the Persistent Homology of Encrypted Data. 3546-3548 - Arup Mondal

:
Poster: Attestor - Simple Proof-of-Storage-Time. 3549-3551 - Xianbo Mo

, Shunquan Tan
, Bin Li
, Jiwu Huang
:
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning. 3552-3554 - Depeng Chen

, Xiao Liu
, Jie Cui
, Hong Zhong
:
Poster: Membership Inference Attacks via Contrastive Learning. 3555-3557 - Kevin Li

, Zhaohui Wang
, Ye Wang
, Bo Luo
, Fengjun Li
:
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective. 3558-3560 - Shae McFadden

, Zeliang Kan
, Lorenzo Cavallaro
, Fabio Pierazzi
:
Poster: RPAL-Recovering Malware Classifiers from Data Poisoning using Active Learning. 3561-3563 - Jihyeon Yu

, Juhwan Kim
, Yeohoon Yun
, Joobeom Yun
:
Poster: Combining Fuzzing with Concolic Execution for IoT Firmware Testing. 3564-3566 - Ehud Aharoni

, Nir Drucker
, Gilad Ezov
, Eyal Kushnir
, Hayim Shaul
, Omri Soceanu
:
Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. 3567-3569 - Jing Xu

, Stjepan Picek
:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. 3570-3572 - Fabian Kaiser

, Haya Schulmann
, Michael Waidner
:
Poster: Longitudinal Analysis of DoS Attacks. 3573-3575 - Simon Koch

, Malte Wessels
, David Klein
, Martin Johns
:
Poster: The Risk of Insufficient Isolation of Database Transactions in Web Applications. 3576-3578 - Christopher Lenk

, Johannes Kinder
:
Poster: Privacy Risks from Misconfigured Android Content Providers. 3579-3581 - Johannes Lohmöller

, Eduard Vlad
, Markus Dahlmanns
, Klaus Wehrle
:
Poster: Bridging Trust Gaps: Data Usage Transparency in Federated Data Ecosystems. 3582-3584 - Kelong Cong

, Debajyoti Das
, Georgio Nicolas
, Jeongeun Park
:
Poster: Panacea - Stateless and Non-Interactive Oblivious RAM. 3585-3587 - Behrad Tajalli

, Gorka Abad
, Stjepan Picek
:
Poster: Backdoor Attack on Extreme Learning Machines. 3588-3590 - Roman Matzutt

, Jan Pennekamp
, Klaus Wehrle
:
Poster: Accountable Processing of Reported Street Problems. 3591-3593 - Rex Fernando

, Arnab Roy
:
Poster: WIP: Account ZK-Rollups from Sumcheck Arguments. 3594-3596 - Mario Yaksetig

, Alexander Havlin
:
Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures. 3597-3599 - David G. Balash

, Mir Masood Ali
, Monica Kodwani
, Xiaoyuan Wu
, Chris Kanich
, Adam J. Aviv
:
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem. 3600-3602 - Eric Burton Samuel Martin

, Hossein Shirazi
, Indrakshi Ray
:
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. 3603-3605 - Wyatt Sweat

, Danfeng (Daphne) Yao
:
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. 3606-3608 - Wentao Dong

, Cong Wang
:
Poster: Towards Lightweight TEE-Assisted MPC. 3609-3611 - Maximilian Noppel

, Christian Wressnegger
:
Poster: Fooling XAI with Explanation-Aware Backdoors. 3612-3614 - Peipei Jiang

, Qian Wang
, Yihao Wu
, Cong Wang
:
Poster: Metadata-private Messaging without Coordination. 3615-3617 - Sashidhar Jakkamsetti

, Youngil Kim
, Andrew Searles
, Gene Tsudik
:
Poster: Control-Flow Integrity in Low-end Embedded Devices. 3618-3620 - Betül Askin Özdemir

, Tim Beyne
:
Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers. 3621-3623 - Gowri R. Chandran

, Philipp-Florens Lehwalder
, Leandro Rometsch
, Thomas Schneider
:
Poster: Secure and Differentially Private kth Ranked Element. 3624-3626 - Matin Fallahi

, Patricia Arias Cabarcos
, Thorsten Strufe
:
Poster: Towards Practical Brainwave-based User Authentication. 3627-3629 - Wensheng Tian

, Lei Zhang
, Shuangxi Chen
, Hu Wang
, Xiao Luo
:
Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain. 3630-3632 - Jan-Philip van Acken

, Joost F. Gadellaa
, Slinger Jansen
, Katsiaryna Labunets
:
Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education. 3633-3635 - Ziming Zhao

, Zhaoxuan Li
, Tingting Li
, Zhuoxue Song
, Fan Zhang
, Rui Zhang
:
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. 3636-3638 - Gyungeun Yun

, Kyungho Joo
, Wonsuk Choi
, Dong Hoon Lee
:
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation. 3639-3641 - Ruei-Hau Hsu

, Hsuan-Cheng Su
, Yi-An Yu
:
Poster: Verifiable Data Valuation with Strong Fairness in Horizontal Federated Learning. 3642-3644
Session 61: Workshops
- Bart P. Knijnenburg

, Panagiotis Papadimitratos
:
WPES '23: 22nd Workshop on Privacy in the Electronic Society. 3645-3647 - Magnus Almgren

, Earlence Fernandes
:
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy. 3648-3650 - Michael Brenner

, Anamaria Costache
, Kurt Rohloff
:
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. 3651-3652 - Ning Zhang

, Qi Li
:
MTD '23: 10th ACM Workshop on Moving Target Defense. 3653-3654 - Zhiqiang Lin

, Xiaojing Liao
:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. 3655-3656 - Francesco Regazzoni

, Apostolos P. Fournaris
:
CCSW '23: Cloud Computing Security Workshop. 3657-3658 - Fraser Brown

, Klaus von Gleissenthall
:
PLAS: The 18th Workshop on Programming Languages and Analysis for Security. 3659 - Kaihua Qin

, Fan Zhang
:
DeFi '23: Workshop on Decentralized Finance and Security. 3660-3661 - Gregory Blanc

, Takeshi Takahashi
, Zonghua Zhang
:
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. 3662-3663 - Lejla Batina

, Chip-Hong Chang
, Domenic Forte
, Ulrich Rührmair
:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. 3664-3665 - Maura Pintor

, Florian Simon Tramèr
, Xinyun Chen
:
AISec '23: 16th ACM Workshop on Artificial Intelligence and Security. 3666-3668 - Ehud Aharoni

, Nir Drucker
, Hayim Shaul
:
Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML. 3669-3670 - Marcela S. Melara

, Santiago Torres-Arias
, Laurent Simon
:
SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 3671-3672
Session 62: Demos
- Yue Xu

, Wenjie Wang
:
Demo: Certified Robustness on Toolformer. 3673-3675 - Nicolas Anciaux

, Sabine Frittella
, Baptiste Joffroy
, Benjamin Nguyen
:
Demo: Data Minimization and Informed Consent in Administrative Forms. 3676-3678 - Yuechun Gu

, Sagar Sharma
, Keke Chen
:
Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning. 3679-3681

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














