


default search action
34th USENIX Security Symposium 2025: Seattle, WA, USA
- Lujo Bauer, Giancarlo Pellegrino:

34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025. USENIX Association 2025
Social Issues and Usable Security and Privacy
- Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin R. B. Butler, Patrick Traynor, Elissa M. Redmiles, Tadayoshi Kohno:

Analyzing the AI Nudification Application Ecosystem. 1-20 - Yifan Yao, Shawn McCollum, Zhibo Sun, Yue Zhang:

Easy As Child's Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps. 21-39 - Shirley Zhang, Paul Chung, Jacob Vervelde, Nishant Korapati, Rahul Chatterjee, Kassem Fawaz:

Abusability of Automation Apps in Intimate Partner Violence. 41-60 - Xiao Zhan, Juan Carlos Carrillo, William Seymour, Jose Such:

Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information. 61-80 - Kelechi G. Kalu, Tanmay Singla, Chinenye Okafor, Santiago Torres-Arias, James C. Davis:

An Industry Interview Study of Software Signing for Supply Chain Security. 81-100 - Adam Hastings, Simha Sethumadhavan:

Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What Minimizes Losses? 101-117 - Kimberly Ruth, Raymond Buernor Obu, Ifeoluwa Shode, Gavin Li, Carrie Gates, Grant Ho, Zakir Durumeric:

A First Look at Governments' Enterprise Security Guidance. 119-138 - Yunsung Chung, Yunbei Zhang, Nassir Marrouche, Jihun Hamm:

SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation. 139-159 - Klim Kireev, Yevhen Mykhno, Carmela Troncoso, Rebekah Overdorf:

Characterizing and Detecting Propaganda-Spreading Accounts on Telegram. 161-180
LLM Security and Attacks
- Wenlong Meng, Shuguo Fan, Chengkun Wei, Min Chen, Yuwei Li, Yuanchao Zhang, Zhikun Zhang, Wenzhi Chen:

GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors. 181-200 - Wenjie Qu, Wengrui Zheng, Tianyang Tao, Dong Yin, Yanze Jiang, Zhihua Tian, Wei Zou, Jinyuan Jia, Jiaheng Zhang:

Provably Robust Multi-bit Watermarking for AI-generated Text. 201-220 - Xinyue Shen, Yixin Wu, Yiting Qu, Michael Backes, Savvas Zannettou, Yang Zhang:

HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns. 221-240 - Nan Yan, Yuqing Li, Xiong Wang, Jing Chen, Kun He, Bo Li:

EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models. 241-257 - Jiahao Yu, Haozheng Luo, Jerry Yao-Chieh Hu, Yan Chen, Wenbo Guo, Han Liu, Xinyu Xing:

Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs' Refusal Boundaries. 259-278 - Pengli Wang, Bingyou Dong, Yifeng Cai, Zheng Zhang, Junlin Liu, Huanran Xue, Ye Wu, Yao Zhang, Ziqi Zhang:

Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms. 279-298 - Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese:

LLMmap: Fingerprinting for Large Language Models. 299-318 - Minkyoo Song, Hanna Kim, Jaehan Kim, Seungwon Shin, Sooel Son:

Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models. 319-338 - Jiawen Zhang, Kejia Chen, Lipeng He, Jian Lou, Dan Li, Zunlei Feng, Mingli Song, Jian Liu, Kui Ren, Xiaohu Yang:

Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense. 339-358
Software Security 1
- Florian Roudot, Mohamed Sabt:

Narrowbeer: A Practical Replay Attack Against the Widevine DRM. 359-374 - Qinrun Dai, Kirby Linvill, Yueqi Chen, Gowtham Kaki:

Lancet: A Formalization Framework for Crash and Exploit Pathology. 375-394 - Mark DenHoed, Tom Melham:

Synthesis of Code-Reuse Attacks from p-code Programs. 395-411 - Yuxi Ling, Gokul Rajiv, Kiran Gopinathan, Ilya Sergey:

Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis. 413-429 - Yufan You, Jianjun Chen, Qi Wang, Haixin Duan:

My ZIP isn't your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers. 431-450 - Siliang Qin, Fengrui Yang, Hao Wang, Bolun Zhang, Zeyu Gao, Chao Zhang, Kai Chen:

Tady: A Neural Disassembler without Structural Constraint Violations. 451-468 - Daniel Olszewski, Tyler Tucker, Kevin R. B. Butler, Patrick Traynor:

SoK: Towards a Unified Approach to Applied Replicability for Computer Security. 469-488 - Ahmed Lekssays, Hamza Mouhcine, Khang Tran, Ting Yu, Issa Khalil:

LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models. 489-507 - Bing Shi, Wenchao Li, Yuchen Wang, Xiaolong Bai, Luyi Xing:

X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates. 509-528
System Security 1: Threat Detection, Exploitation, and Adaptive Defenses
- Chongqi Guan, Guohong Cao:

Cyber-Physical Deception Through Coordinated IoT Honeypots. 529-545 - Yihao Peng, Tongxin Zhang, Jieshao Lai, Yuxuan Zhang, Yiming Wu, Hai Wan, Xibin Zhao:

AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation. 547-566 - Roberta De Viti, Isaac Sheff, Noemi Glaeser, Baltasar Dinis, Rodrigo Rodrigues, Bobby Bhattacharjee, Anwar Hithnawi, Deepak Garg, Peter Druschel:

CoVault: Secure, Scalable Analytics of Personal Data. 567-586 - Kotaiba Alachkar, Dirk Gaastra, Eduardo Barbaro, Michel van Eeten, Yury Zhauniarovich:

EvilEDR: Repurposing EDR as an Offensive Tool. 587-605 - Bo Zhang, Yansong Gao, Changlong Yu, Boyu Kuang, Zhi Zhang, Hyoungshick Kim, Anmin Fu:

TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis. 607-624 - Nicolas Bailluet, Emmanuel Fleury, Isabelle Puaut, Erven Rohou:

Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives. 625-643 - Meni Orenbach, Rami Ailabouni, Nael Masalha, Thanh Nguyen, Ahmad Saleh, Frank Block, Fritz Alder, Ofir Arkin, Ahmad Atamli:

BlueGuard: Accelerated Host and Guest Introspection Using DPUs. 645-664 - Feng Qian, Lingfeng Zhang, Tao Luo, Shiqi Xu, Zhijun Yu, Wei Wang:

RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect. 665-684 - Jiaxu Zhao, Yuekang Li, Yanyan Zou, Yang Xiao, Naijia Jiang, Yeting Li, Nanyu Zhong, Bingwei Peng, Kunpeng Jian, Wei Huo:

From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems. 685-704
Network Security 1: Censorship, Evasion, and Trustworthy Infrastructure
- Jonas Tai, Karthik Nishanth Sengottuvelavan, Peter Whiting, Nguyen Phong Hoang:

IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran. 705-722 - Chuhan Wang, Chenkai Wang, Songyi Yang, Sophia Liu, Jianjun Chen, Haixin Duan, Gang Wang:

Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability. 723-742 - Keran Mu, Jianjun Chen, Jianwei Zhuge, Qi Li, Haixin Duan, Nick Feamster:

The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing. 743-762 - Ryan Wails, Rob Jansen, Aaron Johnson, Micah Sherr:

Censorship Evasion with Unidentified Protocol Generation. 763-782 - Ali Zohaib, Qiang Zao, Jackson Sippe, Abdulrahman Alaraj, Amir Houmansadr, Zakir Durumeric, Eric Wustrow:

Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China. 783-802 - Yinxiang Tao, Chengwan Zhang, Changqing An, Shuying Zhuang, Jilong Wang, Congcong Miao:

Ares: Comprehensive Path Hijacking Detection via Routing Tree. 803-821 - Szu-Chun Huang, Harm Griffioen, Max van der Horst, Georgios Smaragdakis, Michel van Eeten, Yury Zhauniarovich:

Trust but Verify: An Assessment of Vulnerability Tagging Services. 823-842 - Jungun Ahn, Sueun Jung, Seungwan Yoo, Jungheum Park, Sangjin Lee:

Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem. 843-860 - Cristian Munteanu, Georgios Smaragdakis, Anja Feldmann, Tobias Fiebig:

Catch-22: Uncovering Compromised Hosts using SSH Public Keys. 861-878
ML and AI Security 1: Images
- Yuyang Zhang, Kangjie Chen, Xudong Jiang, Jiahui Wen, Yihui Jin, Ziyou Liang, Yihao Huang, Run Wang, Lina Wang:

USD: NSFW Content Detection for Text-to-Image Models via Scene Graph. 879-895 - Corban Villa, Muhammad Shujaat Mirza, Christina Pöpper:

Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines. 897-916 - Yixin Wu, Ning Yu, Michael Backes, Yun Shen, Yang Zhang:

On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts. 917-936 - Wenjun Zhu, Xiaoyu Ji, Xinfeng Li, Qihang Chen, Kun Wang, Xinyu Li, Ruoyan Xu, Wenyuan Xu:

Neural Invisibility Cloak: Concealing Adversary in Images via Compromised AI-driven Image Signal Processing. 937-956 - Yiting Qu, Michael Backes, Yang Zhang:

Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities. 957-976 - Ali Naseh, Jaechul Roh, Eugene Bagdasarian, Amir Houmansadr:

Backdooring Bias (B^2) into Stable Diffusion Models. 977-996 - Changjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, Ting Wang:

Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models. 997-1016 - Zekun Sun, Zijian Liu, Shouling Ji, Chenhao Lin, Na Ruan:

Pretender: Universal Active Defense against Diffusion Finetuning Attacks. 1017-1036 - Tingwei Zhang, Collin Zhang, John X. Morris, Eugene Bagdasarian, Vitaly Shmatikov:

Self-interpreting Adversarial Images. 1037-1052
System Security 2: Trusted and Robust Computing
- Yumingzhi Pan, Zhen Ling, Yue Zhang, Hongze Wang, Guangchi Liu, Junzhou Luo, Xinwen Fu:

TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network. 1053-1072 - Giuseppe Raffa, Jorge Blasco, Daniel O'Keeffe, Santanu Kumar Dash:

CloudFlow: Identifying Security-sensitive Data Flows in Serverless Applications. 1073-1090 - Jiacheng Shi, Jinyu Gu, Yubin Xia, Haibo Chen:

Serverless Functions Made Confidential and Efficient with Split Containers. 1091-1110 - Zhaofeng Yu, Dongyang Zhan, Lin Ye, Haining Yu, Hongli Zhang, Zhihong Tian:

Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers. 1111-1128 - Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Manuel Costa, Sylvan Clebsch, Christoph M. Wintersteiger:

Transparent Attested DNS for Confidential Computing Services. 1129-1148 - Mark Kuhne, Stavros Volos, Shweta Shinde:

Dorami: Privilege Separating Security Monitor on RISC-V TEEs. 1149-1166 - Daan Vanoverloop, Andrés Sánchez, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck:

TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms. 1167-1186 - Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang, Ning Hu:

TETD: Trusted Execution in Trust Domains. 1187-1206 - Fabian Rauscher, Luca Wilke, Hannes Weissteiner, Thomas Eisenbarth, Daniel Gruss:

TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX. 1207-1222
Blockchain Security, Attacks, and Defenses
- Zheyuan He, Zihao Li, Jiahao Luo, Feng Luo, Junhan Duan, Jingwei Li, Shuwei Song, Xiapu Luo, Ting Chen, Xiaosong Zhang:

Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain. 1223-1242 - Taro Tsuchiya, Jin-Dong Dong, Kyle Soska, Nicolas Christin:

Blockchain Address Poisoning. 1243-1262 - Mingfei Zhang, Rujia Li, Xueqian Lu, Sisi Duan:

Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake. 1263-1280 - Nicola Ruaro, Fabio Gritti, Dongyu Meng, Robert McLaughlin, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:

Approve Once, Regret Forever: On the Exploitation of Ethereum's Approve-TransferFrom Ecosystem. 1281-1298 - Andrés Fábrega, Amy Zhao, Jay Yu, James Austgen, Sarah Allen, Kushal Babel, Mahimna Kelkar, Ari Juels:

Voting-Bloc Entropy: A New Metric for DAO Decentralization. 1299-1318 - Lioba Heimbach, Yann Vonlanthen, Juan Villacis, Lucianna Kiffer, Roger Wattenhofer:

Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue. 1319-1338 - Lorenzo Benetollo, Andreas Lackner, Matteo Maffei, Markus Scherer:

Let's Move2EVM. 1339-1355 - Kelvin Lubbertsen, Michel van Eeten, Rolf van Wegberg:

Ghost Clusters: Evaluating Attribution of Illicit Services through Cryptocurrency Tracing. 1357-1374 - Zuchao Ma, Muhui Jiang, Feng Luo, Xiapu Luo, Yajin Zhou:

Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer. 1375-1392
Usable Privacy and Security 1
- Md Mojibur Rahman Redoy Akanda, Amanda Lacy, Nitesh Saxena:

SoK: Inaccessible & Insecure: An Exposition of Authentication Challenges Faced by Blind and Visually Impaired Users in State-of-the-Art Academic Proposals. 1393-1413 - Marvin Kowalewski, Leona Lassak, Markus Dürmuth, Theodor Schnitzler:

Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks. 1415-1434 - Daniele Lain, Yoshimichi Nakatsuka, Kari Kostiainen, Gene Tsudik, Srdjan Capkun:

URL Inspection Tasks: Helping Users Detect Phishing Links in Emails. 1435-1454 - Franziska Herbert, Collins W. Munyendo, Jonas Hielscher, Steffen Becker, Yixin Zou:

Digital Security Perceptions and Practices Around the World: A WEIRD versus Non-WEIRD Comparison. 1455-1474 - Ali Teymourian, Andrew M. Webb, Taha Gharaibeh, Arushi Ghildiyal, Ibrahim Baggili:

SoK: Come Together - Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework. 1475-1492 - Takayuki Sasaki, Tomoya Inazawa, Youhei Yamaguchi, Simon Parkin, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:

Am I Infected? Lessons from Operating a Large-Scale IoT Security Diagnostic Service. 1493-1510 - Dañiel Gerhardt, Matthias Fassl, Carolyn Guthoff, Adrian Dabrowski, Katharina Krombholz:

AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features. 1511-1530 - Emiram Kablo, Melina Kleber, Patricia Arias Cabarcos:

PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity. 1531-1548 - Chandrika Mukherjee, Reham Mohamed, Arjun Arunasalam, Habiba Farrukh, Z. Berkay Celik:

Shadowed Realities: An Investigation of UI Attacks in WebXR. 1549-1568
LLM Privacy
- Ergute Bao, Yangfan Jiang, Fei Wei, Xiaokui Xiao, Zitao Li, Yaliang Li, Bolin Ding:

Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs. 1569-1588 - Yuke Hu, Zheng Li, Zhihao Liu, Yang Zhang, Zhan Qin, Kui Ren, Chun Chen:

Membership Inference Attacks Against Vision-Language Models. 1589-1608 - Yu He, Boheng Li, Liu Liu, Zhongjie Ba, Wei Dong, Yiming Li, Zhan Qin, Kui Ren, Chun Chen:

Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models. 1609-1628 - Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, Haojin Zhu:

Depth Gives a False Sense of Privacy: LLM Internal States Inversion. 1629-1648 - Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv:

I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference. 1649-1668 - Yupei Liu, Yuqi Jia, Jinyuan Jia, Neil Zhenqiang Gong:

Evaluating LLM-based Personal Information Extraction and Countermeasures. 1669-1688 - Yixin Wu, Ziqing Yang, Yun Shen, Michael Backes, Yang Zhang:

Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications. 1689-1708 - Dayong Ye, Tianqing Zhu, Shang Wang, Bo Liu, Leo Yu Zhang, Wanlei Zhou, Yang Zhang:

Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI. 1709-1727 - Hanna Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin, Kimin Lee:

When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs. 1729-1748
Embedded and Hardware Security
- Sahar Ghoflsaz Ghinani, Jingyao Zhang, Elaheh Sadredini:

Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures. 1749-1767 - Jianqiang Wang, Qinying Wang, Tobias Scharnowski, Li Shi, Simon Wörner, Thorsten Holz:

AidFuzzer: Adaptive Interrupt-Driven Firmware Fuzzing via Run-Time State Recognition. 1769-1786 - Lichao Wu, Mohamadreza Rostami, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:

GenHuzz: An Efficient Generative Hardware Fuzzer. 1787-1805 - Ao Li, Jinwen Wang, Ning Zhang:

Software Availability Protection in Cyber-Physical Systems. 1807-1825 - Tobias Scharnowski, Simeon Hoffmann, Moritz Bley, Simon Wörner, Daniel Klischies, Felix Buchmann, Nils Ole Tippenhauer, Thorsten Holz, Marius Muench:

GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays. 1827-1845 - Philipp Mackensen, Christian Niesler, Roberto Blanco, Lucas Davi, Veelasha Moonsamy:

Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems. 1847-1866 - Jost Rossel, Vladislav Mladenov, Nico Wördenweber, Juraj Somorovsky:

Security Implications of Malicious G-Codes in 3D Printing. 1867-1885 - Canran Wang, Jinwen Wang, Mi Zhou, Vinh Pham, Senyue Hao, Chao Zhou, Ning Zhang, Netanel Raviv:

Secure Information Embedding in Forensic 3D Fingerprinting. 1887-1906 - Jacob Harrison, Nathan Jessurun, Mark Tehranipoor:

SoK: A Security Architect's View of Printed Circuit Board Attacks. 1907-1924
Crypto 1: Zero Knowledge and Multi-Party Computation
- Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, Qiang Tang:

Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience. 1925-1944 - Zhengyuan Su, Qi Pang, Simon Beyzerov, Wenting Zheng:

FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC. 1945-1964 - Hiraku Morita, Erik Pohle, Kunihiko Sadakane, Peter Scholl, Kazunari Tozawa, Daniel Tschudi:

MAESTRO: Multi-Party AES Using Lookup Tables. 1965-1984 - Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren, Chun Chen:

Efficient 2PC for Constant Round Secure Equality Testing and Comparison. 1985-2004 - Minglang Dong, Cong Zhang, Yujie Bai, Yu Chen:

Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions. 2005-2024 - Xuanming Liu, Zhelei Zhou, Yinghao Wang, Yanxin Pang, Jinye He, Bingsheng Zhang, Xiaohu Yang, Jiaheng Zhang:

Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation. 2025-2044 - Wenjie Qu, Yijun Sun, Xuanming Liu, Tao Lu, Yanpei Guo, Kai Chen, Jiaheng Zhang:

zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference. 2045-2063 - Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang, Yu Yu, Yuwen Zhang:

DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. 2065-2084 - Junkai Liang, Daqi Hu, Pengfei Wu, Yunbo Yang, Qingni Shen, Zhonghai Wu:

SoK: Understanding zk-SNARKs: The Gap Between Research and Practice. 2085-2104
Usable Privacy and Security 2: Software and Experts
- Jessy Ayala, Yu-Jye Tung, Joshua Garcia:

A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features. 2105-2124 - Harjot Kaur, Carson Powers, Ronald E. Thompson III, Sascha Fahl, Daniel Votipka:

"Threat modeling is very formal, it's very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects. 2125-2144 - Rajdeep Ghosh, Shiladitya De, Mainack Mondal:

"I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages. 2145-2164 - Elizabeth Lin, Sparsha Gowda, William Enck, Dominik Wermke:

Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis. 2165-2183 - Aakanksha Saha, James Mattei, Jorge Blasco, Lorenzo Cavallaro, Daniel Votipka, Martina Lindorfer:

Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges. 2185-2204 - Wentao Guo, Paige Pepitone, Adam J. Aviv, Michelle L. Mazurek:

How Researchers De-Identify Data in Practice. 2205-2224 - Nathan Daniel Schiele, Olga Gadyatskaya:

A limited technical background is sufficient for attack-defense tree acceptability. 2225-2244 - Houda Naji, Felix Reichmann, Tobias Bruns, M. Angela Sasse, Alena Naiakshina:

"It's not my responsibility to write them": An Empirical Study of Software Product Managers and Security Requirements. 2245-2264 - Lorenz Kustosch, Carlos Gañán, Michel van Eeten, Simon Parkin:

Patching Up: Stakeholder Experiences of Security Updates for Connected Medical Devices. 2265-2281
LLM Security 2: Jailbreaking and Prompt Stealing
- Yong Yang, Changjiang Li, Qingming Li, Oubo Ma, Haoyu Wang, Zonghui Wang, Yandong Gao, Wenzhi Chen, Shouling Ji:

PRSA: Prompt Stealing Attacks against Real-World Prompt Services. 2283-2302 - Dayong Ye, Tianqing Zhu, Feng He, Bo Liu, Minhui Xue, Wanlei Zhou:

Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models. 2303-2322 - David Pape, Sina Mavali, Thorsten Eisenhofer, Lea Schönherr:

Prompt Obfuscation for Large Language Models. 2323-2342 - Torsten Krauß, Hamid Dashtbani, Alexandra Dmitrienko:

TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts. 2343-2362 - Lan Zhang, Xinben Gao, Liuyi Yao, Jinke Song, Yaliang Li:

Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs. 2363-2382 - Sizhe Chen, Julien Piet, Chawin Sitawarin, David A. Wagner:

StruQ: Defending Against Prompt Injection with Structured Queries. 2383-2400 - Xueluan Gong, Mingzhe Li, Yilin Zhang, Fengyuan Ran, Chen Chen, Yanjiao Chen, Qian Wang, Kwok-Yan Lam:

PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs. 2401-2420 - Mark Russinovich, Ahmed Salem, Ronen Eldan:

Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack. 2421-2440 - Xunguang Wang, Daoyuan Wu, Zhenlan Ji, Zongjie Li, Pingchuan Ma, Shuai Wang, Yingjiu Li, Yang Liu, Ning Liu, Juergen Rahmel:

SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner. 2441-2460
Hardware Security 1: Microarchitectures
- Anubhav Bhatla, Hari Rohit Bhavsar, Sayandeep Saha, Biswabandan Panda:

SoK: So, You Think You Know All About Secure Randomized Caches? 2461-2480 - Hannes Weissteiner, Fabian Rauscher, Robin Leander Schröder, Jonas Juffinger, Stefan Gast, Jan Wichelmann, Thomas Eisenbarth, Daniel Gruss, Thomas Eisenbarth:

TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs. 2481-2498 - Anirban Chakraborty, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay:

Systematic Evaluation of Randomized Cache Designs against Cache Occupancy. 2499-2518 - Yuhui Zhu, Alessandro Biondi:

Exploiting Inaccurate Branch History in Side-Channel Attacks. 2519-2538 - Alvise de Faveri Tron, Raphael Isemann, Hany Ragab, Cristiano Giuffrida, Klaus von Gleissenthall, Herbert Bos:

Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks. 2539-2556 - Yiming Zhu, Wenchao Huang, Yan Xiong:

Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1. 2557-2576 - Matej Bölcskei, Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi:

Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection. 2577-2593 - Jason Kim, Jalen Chuang, Daniel Genkin, Yuval Yarom:

FLOP: Breaking the Apple M3 CPU via False Load Output Predictions. 2595-2614 - Sandro Rüegge, Johannes Wikner, Kaveh Razavi:

Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions. 2615-2631
Privacy 1: Differential Privacy and Audit
- Jiping Yu, Kun Chen, Yunyi Chen, Xiaoyu Fan, Xiaowei Zhu, Cheng Hong, Wenguang Chen:

GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency. 2633-2652 - Tianshi Xu, Wen-jie Lu, Jiangrui Yu, Yi Chen, Chenqi Lin, Runsheng Wang, Meng Li:

Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC. 2653-2672 - Wenqiang Ruan, Xin Lin, Ruisheng Zhou, Guopeng Lin, Shui Yu, Weili Han:

HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning. 2673-2691 - Zihang Xiang, Tianhao Wang, Di Wang:

Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run. 2693-2711 - Önder Askin, Holger Dette, Martin Dunsche, Tim Kutta, Yun Lu, Yu Wei, Vassilis Zikas:

General-Purpose f-DP Estimation and Auditing in a Black-Box Setting. 2713-2732 - Abdulrahman Diaa, Thomas Humphries, Florian Kerschbaum:

FastLloyd: Federated, Accurate, Secure, and Tunable k-Means Clustering with Differential Privacy. 2733-2752 - Xingyu He, Youwen Zhu, Rongke Liu, Gaoning Pan, Changyu Dong:

Addressing Sensitivity Distinction in Local Differential Privacy: A General Utility-Optimized Framework. 2753-2769 - Huiyu Fang, Liquan Chen, Suhui Liu:

Further Study on Frequency Estimation under Local Differential Privacy. 2771-2787 - Shaowei Wang, Changyu Dong, Xiangfu Song, Jin Li, Zhili Zhou, Di Wang, Han Wu:

Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling. 2789-2808
Software Security and Usable Security
- Alfusainey Jallow, Sven Bugiel:

Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets. 2809-2828 - Brandon Lit, Edward Crowder, Hassan Khan, Daniel Vogel:

"I'm regretting that I hit run": In-situ Assessment of Potential Malware. 2829-2846 - Jinsong Chen, Mengying Wu, Geng Hong, Baichao An, Mingxuan Liu, Lei Zhang, Baojun Liu, Haixin Duan, Min Yang:

Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification. 2847-2866 - James Mattei, Christopher Pellegrini, Matthew Soto, Marina Sanusi Bohuk, Daniel Votipka:

"I'm trying to learn...and I'm shooting myself in the foot": Beginners' Struggles When Solving Binary Exploitation Exercises. 2867-2886 - Moritz Schloegel, Daniel Klischies, Simon Koch, David Klein, Lukas Gerlach, Malte Wessels, Leon Trampert, Martin Johns, Mathy Vanhoef, Michael Schwarz, Thorsten Holz, Jo Van Bulck:

Confusing Value with Enumeration: Studying the Use of CVEs in Academia. 2887-2906 - Alexander Krause, Harjot Kaur, Jan H. Klemmer, Oliver Wiese, Sascha Fahl:

"That's my perspective from 30 years of doing this": An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code. 2907-2926 - Shubham Agarwal, Rafael Mrowczynski, Maria Hellenthal, Ben Stock:

"I have no idea how to make it safer": Studying Security and Privacy Mindsets of Browser Extension Developers. 2927-2946 - Yiheng Zhang, Ming Wen, Shunjie Liu, Dongjie He, Hai Jin:

Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction. 2947-2964 - Andrés Fábrega, Samuel Breckenridge, Armin Namavari, Thomas Ristenpart:

Mitigating Injection Attacks against E2EE Applications via View-Based Partitioning. 2965-2984
ML and AI Privacy 1: Federated Learning and Protecting Data
- Mingyuan Fan, Fuyi Wang, Cen Chen, Jianying Zhou:

Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings. 2985-3004 - Mingyuan Fan, Cen Chen, Chengyu Wang, Xiaodan Li, Wenmeng Zhou:

Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning. 3005-3024 - Yizhong Liu, Zixiao Jia, Xiao Chen, Song Bian, Runhua Xu, Dawei Li, Yuan Lu:

Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants. 3025-3044 - Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Gong, Kui Ren, Chun Chen:

SoK: On Gradient Leakage in Federated Learning. 3045-3064 - Xiaolan Gu, Ming Li, Li Xiong:

DP-BREM: Differentially-Private and Byzantine-Robust Federated Learning with Client Momentum. 3065-3082 - Kevin Nam, Youyeon Joo, Seungjin Ha, Yunheung Paek:

SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data. 3083-3102 - Zihao Wang, Rui Zhu, Dongruo Zhou, Zhikun Zhang, XiaoFeng Wang, Haixu Tang:

Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles. 3103-3122 - Zhiqiang Wang, Jiahui Hou, Haifeng Sun, Jingmiao Zhang, Yunhao Yao, Haikuo Yu, Xiang-Yang Li:

Task-Oriented Training Data Privacy Protection for Cloud-based Model Training. 3123-3140 - Xiangrui Xu, Zhize Li, Yufei Han, Bin Wang, Jiqiang Liu, Wei Wang:

From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning. 3141-3160
Web and Mobile Security
- Xin Zhang, Xiaohan Zhang, Bo Zhao, Yuhong Nan, Zhichen Liu, Jianzhou Chen, Huijun Zhou, Min Yang:

Demystifying the (In)Security of QR Code-based Login in Real-world Deployments. 3161-3180 - Anish Chand, Nick Nikiforakis, Phani Vadrevu:

Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques. 3181-3200 - Fujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim:

Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models. 3201-3220 - Kaixuan Luo, Xianbo Wang, Adonis P. H. Fung, Wing Cheong Lau, Julien Lecomte:

Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms. 3221-3238 - Garrett Wilson, Geoffrey Goh, Yan Jiang, Ajay Gupta, Jiaxuan Wang, David Freeman, Francesco Dinuzzo:

Predictive Response Optimization: Using Reinforcement Learning to Fight Online Social Network Abuse. 3239-3256 - Luca Di Bartolomeo, Philipp Mao, Yu-Jye Tung, Jessy Ayala, Samuele Doria, Paolo Celada, Marcel Busch, Joshua Garcia, Eleonora Losiouk, Mathias Payer:

Hercules Droidot and the murder on the JNI Express. 3257-3275 - Jingwen Yan, Song Liao, Jin Ma, Mohammed Aldeen, Salish Kumar, Long Cheng:

No Way to Sign Out? Unpacking Non-Compliance with Google Play's App Account Deletion Requirements. 3277-3296 - Johnny So, Iskander Sánchez-Rola, Nick Nikiforakis:

Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps. 3297-3316 - Philipp Beer, Marco Squarcina, Sebastian Roth, Martina Lindorfer:

TapTrap: Animation-Driven Tapjacking on Android. 3317-3335
Crypto 2: Private Information Retrieval and Computation
- Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba:

BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. 3337-3356 - Zachary Espiritu, Seny Kamara, Tarik Moataz, Andrew Park:

PolySys: an Algebraic Leakage Attack Engine. 3357-3376 - Ryan Lehmkuhl, Alexandra Henzinger, Henry Corrigan-Gibbs:

Distributional Private Information Retrieval. 3377-3396 - Meng Hao, Weiran Liu, Liqiang Peng, Cong Zhang, Pengfei Wu, Lei Zhang, Hongwei Li, Robert H. Deng:

Practical Keyword Private Information Retrieval from Key-to-Index Mappings. 3397-3416 - Hao Guo, Zhaoqian Liu, Ximing Fu, Zhusen Liu:

SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference. 3417-3435 - Binbin Tu, Yujie Bai, Cong Zhang, Yang Cao, Yu Chen:

Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios. 3437-3456 - Jan Bormet, Sebastian Faust, Hussien Othman, Ziyan Qu:

BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention. 3457-3476 - Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, Mingyuan Wang:

Practical Mempool Privacy via One-time Setup Batched Threshold Encryption. 3477-3495 - Yanpei Guo, Xuanming Liu, Kexi Huang, Wenjie Qu, Tianyang Tao, Jiaheng Zhang:

DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs. 3497-3516
Network Security 2: Routing and DoS
- Shuhan Zhang, Shuai Wang, Li Chen, Dan Li, Baojun Liu:

Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation. 3517-3535 - Yehuda Afek, Harel Berger, Anat Bremler-Barr:

POPS: From History to Mitigation of DNS Cache Poisoning Attacks. 3537-3556 - Gilad Moav, Yehuda Afek, Anat Bremler-Barr, Amit Klein:

DNS FLaRE: A Flush-Reload Attack on DNS Forwarders. 3557-3576 - Wenhao Wu, Zhenyu Li, Xilai Liu, Zhaohua Wang, Heng Pan, Guangxing Zhang, Gaogang Xie:

Lemon: Network-Wide DDoS Detection with Routing-Oblivious Per-Flow Measurement. 3577-3594 - Anh V. Vu, Ben Collier, Daniel R. Thomas, John Kristoff, Richard Clayton, Alice Hutchings:

Assessing the Aftermath: the Effects of a Global Takedown against DDoS-for-hire Services. 3595-3612 - Felix Stöger, Henry Birge-Lee, Giacomo Giuliari, Jordi Subirà Nieto, Adrian Perrig:

BGP Vortex: Update Message Floods Can Create Internet Instabilities. 3613-3629 - Weitong Li, Yuze Li, Taejoong Chung:

ImpROV: Measurement and Practical Mitigation of Collateral Damage in RPKI Route Origin Validation. 3631-3647 - Donika Mirdita, Haya Schulmann, Michael Waidner:

SoK: An Introspective Analysis of RPKI Security. 3649-3665 - Jinseo Lee, Hobin Kim, Min Suk Kang:

Onions Got Puzzled: On the Challenges of Mitigating Denial-of-Service Problems in Tor Onion Services. 3667-3685
LLM Security 3
- Joseph Spracklen, Raveen Wijewickrama, A. H. M. Nazmus Sakib, Anindya Maiti, Bimal Viswanath, Murtuza Jadliwala:

We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs. 3687-3706 - Yining Wang, Mi Zhang, Junjie Sun, Chenyue Wang, Min Yang, Hui Xue, Jialing Tao, Ranjie Duan, Jiexi Liu:

Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink. 3707-3726 - Lan Gao, Oscar Chen, Rachel Lee, Nick Feamster, Chenhao Tan, Marshini Chetty:

"I Cannot Write This Because It Violates Our Content Policy": Understanding Content Moderation Policies and User Experiences in Generative AI Products. 3727-3746 - Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, Jin Song Dong:

Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model. 3747-3766 - Fengyu Liu, Yuan Zhang, Jiaqi Luo, Jiarun Dai, Tian Chen, Letian Yuan, Zhengmin Yu, Youkun Shi, Ke Li, Chengyuan Zhou, Hao Chen, Min Yang:

Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents. 3767-3786 - Avital Shafran, Roei Schuster, Vitaly Shmatikov:

Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents. 3787-3806 - Yuyang Gong, Zhuo Chen, Jiawei Liu, Miaokun Chen, Fengchang Yu, Wei Lu, XiaoFeng Wang, Xiaozhong Liu:

Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models. 3807-3826 - Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia:

PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models. 3827-3844 - Yanting Wang, Wei Zou, Runpeng Geng, Jinyuan Jia:

TracLLM: A Generic Framework for Attributing Long Context LLMs. 3845-3864
Hardware Security 2
- Arifu Onishi, S. Hrushikesh Bhupathiraju, Rishikesh Bhatt, Sara Rampazzi, Takeshi Sugawara:

Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation. 3865-3884 - Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, Limin Sun:

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves. 3885-3902 - Weiye Xu, Danli Wen, Jianwei Liu, Zixin Lin, Yuanqing Zheng, Xian Xu, Jinsong Han:

DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of μm-level HDD Vibrations. 3903-3920 - Junpeng Wan, Yanxiang Bi, Han Gao, Dave (Jing) Tian:

HubBub: Contention-Based Side-Channel Attacks on USB Hubs. 3921-3940 - Flavien Solt, Kaveh Razavi:

Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz. 3941-3958 - Doguhan Yeke, Kartik Anand Pant, Muslum Ozgur Ozmen, Hyungsub Kim, James M. Goppert, Inseok Hwang, Antonio Bianchi, Z. Berkay Celik:

Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems. 3959-3978 - Junqi Zhang, Shaoyin Cheng, Linqing Hu, Jie Zhang, Chengyu Shi, Xingshuo Han, Tianwei Zhang, Yueqiang Cheng, Weiming Zhang:

The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous Driving. 3979-3998 - Ruoyu Wu, Muqi Zou, Arslan Khan, Taegyu Kim, Dongyan Xu, Dave (Jing) Tian, Antonio Bianchi:

NeuroScope: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis. 3999-4016 - Péter Horváth, Lukasz Chmielewski, Léo Weissbart, Lejla Batina, Yuval Yarom:

BarraCUDA: Edge GPUs do Leak DNN Weights. 4017-4034
Blockchain Security 2: Infrastructure, Protocol Design, and Governance
- Yu Pan, Wanjing Han, Yue Duan, Mu Zhang:

CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts. 4035-4052 - Di Wu, Shoupeng Ren, Yuman Bai, Lipeng He, Jian Liu, Wu Wen, Kui Ren, Chun Chen:

On the Atomicity and Efficiency of Blockchain Payment Channels. 4053-4072 - Danlei Xiao, Chuan Zhang, Haotian Deng, Jinwen Liang, Licheng Wang, Liehuang Zhu:

Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges. 4073-4092 - Xinghao Peng, Zhiyuan Sun, Kunsong Zhao, Zuchao Ma, Zihao Li, Jinan Jiang, Xiapu Luo, Yinqian Zhang:

Automated Soundness and Completeness Vetting of Polygon zkEVM. 4093-4108 - Rujia Li, Jingyuan Ding, Qin Wang, Keting Jia, Haibin Zhang, Sisi Duan:

Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus. 4109-4125 - Bosi Zhang, Ningyu He, Xiaohui Hu, Kai Ma, Haoyu Wang:

Following Devils' Footprint: Towards Real-time Detection of Price Manipulation Attacks. 4127-4145 - Tiantian Gong, Gustavo Franco Camilo, Kartik Nayak, Andrew Lewis-Pye, Aniket Kate:

Recover from Excessive Faults in Partially-Synchronous BFT SMR. 4147-4166 - Minghang Li, Qianhong Wu, Zhipeng Wang, Bo Qin, Bohang Wei, Hang Ruan, Shihong Xiong, Zhenyang Ding:

TockOwl: Asynchronous Consensus with Fault and Network Adaptability. 4167-4186 - Zeta Avarikioti, Yuheng Wang, Yuyi Wang:

Thunderdome: Timelock-Free Rationally-Secure Virtual Channels. 4187-4204
System Security 3: Mobile Platforms
- Lukas Maar, Florian Draschbacher, Lorenz Schumm, Ernesto Martínez García, Stefan Mangard:

The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities. 4205-4224 - Philipp Mao, Marcel Busch, Mathias Payer:

NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage. 4225-4243 - Parjanya Vyas, Haseeb Ur Rehman Faheem, Yousra Aafer, N. Asokan:

Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android. 4245-4264 - Haochen Gong, Siyu Hong, Shenyi Yang, Rui Chang, Wenbo Shen, Ziqi Yuan, Chenyang Yu, Yajin Zhou:

Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System. 4265-4284 - Yuxin (Myles) Liu, Habiba Farrukh, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:

Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication. 4285-4304 - Seongbin Park, Alexander Vilesov, Jinghuai Zhang, Hossein Khalili, Yuan Tian, Achuta Kadambi, Nader Sehatbakhsh:

Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors. 4305-4324 - Muhammad Shoaib, Alex Suh, Wajih Ul Hassan:

Principled and Automated Approach for Investigating AR/VR Attacks. 4325-4344 - Junming Chen, Xiaoyue Ma, Lannan Luo, Qiang Zeng:

Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges. 4345-4362 - Florian Draschbacher, Lukas Maar, Mathias Oberhuber, Stefan Mangard:

ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago. 4363-4379
Software Security 2: Patching and Repair
- Zheng Yu, Ziyi Guo, Yuhang Wu, Jiahao Yu, Meng Xu, Dongliang Mu, Yan Chen, Xinyu Xing:

PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise. 4381-4400 - Youngjoon Kim, Sunguk Shin, Hyoungshick Kim, Jiwon Yoon:

Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis. 4401-4419 - Yiwei Hu, Zhen Li, Kedie Shu, Shenghua Guan, Deqing Zou, Shouhuai Xu, Bin Yuan, Hai Jin:

SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments. 4421-4440 - Ying Li, Faysal Hossain Shezan, Bomin Wei, Gang Wang, Yuan Tian:

SoK: Towards Effective Automated Vulnerability Repair. 4441-4462 - Yeting Li, Yecheng Sun, Zhiwu Xu, Haiming Chen, Xinyi Wang, Hengyu Yang, Huina Chao, Cen Zhang, Yang Xiao, Yanyan Zou, Feng Li, Wei Huo:

VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization. 4463-4479 - Yu Nong, Haoran Yang, Long Cheng, Hongxin Hu, Haipeng Cai:

APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching. 4481-4500 - Floris Gorter, Cristiano Giuffrida:

RangeSanitizer: Detecting Memory Errors with Efficient Range Checks. 4501-4519 - Shiyu Sun, Yunlong Xing, Xinda Wang, Shu Wang, Qi Li, Kun Sun:

DISPATCH: Unraveling Security Patches from Entangled Code Changes. 4521-4540 - Guilhem Lacombe, Sébastien Bardin:

Attacker Control and Bug Prioritization. 4541-4560
ML and AI Security 2
- Ziwei Yan, Yanjie Zhao, Haoyu Wang:

VoiceWukong: Benchmarking Deepfake Voice Detection. 4561-4580 - Zhisheng Zhang, Derui Wang, Qianyi Yang, Pengyang Huang, Junhan Pu, Yuxin Cao, Kai Ye, Jie Hao, Yixian Yang:

SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis. 4581-4600 - Hanqing Guo, Junfeng Guo, Bocheng Chen, Yuanda Wang, Xun Chen, Heng Huang, Qiben Yan, Li Xiao:

AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection. 4601-4620 - Marvin Büchel, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein, Giancarlo Guizzardi, Marco Caselli, Andrea Continella, Maarten van Steen, Andreas Peter, Thijs van Ede:

SoK: Automated TTP Extraction from CTI Reports - Are We There Yet? 4621-4641 - Weifei Jin, Yuxin Cao, Junjie Su, Derui Wang, Yedi Zhang, Minhui Xue, Jie Hao, Jin Song Dong, Yixian Yang:

Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems. 4643-4662 - Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Seyit Camtepe:

AudioMarkNet: Audio Watermarking for Deepfake Speech Detection. 4663-4682 - Ravishka Rathnasuriya, Tingxi Li, Zexin Xu, Zihe Song, Mirazul Haque, Simin Chen, Wei Yang:

SoK: Efficiency Robustness of Dynamic Deep Learning Systems. 4683-4702 - Yihan Ma, Xinyue Shen, Yiting Qu, Ning Yu, Michael Backes, Savvas Zannettou, Yang Zhang:

From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models. 4703-4722 - Haolin Wu, Chang Liu, Jing Chen, Ruiying Du, Kun He, Yu Zhang, Cong Wu, Tianwei Zhang, Qing Guo, Jie Zhang:

When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems. 4723-4740
Fraud, Malware, Spam
- Xingan Gao, Xiaobing Sun, Sicong Cao, Kaifeng Huang, Di Wu, Xiaolei Liu, Xingwei Lin, Yang Xiang:

MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem. 4741-4758 - Side Liu, Jiang Ming, Yilin Zhou, Jianming Fu, Guojun Peng:

VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness. 4759-4778 - Mingxuan Liu, Yunyi Zhang, Lijie Wu, Baojun Liu, Geng Hong, Yiming Zhang, Hui Jiang, Jia Zhang, Haixin Duan, Min Zhang, Wei Guan, Fan Shi, Min Yang:

NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines. 4779-4798 - Armin Sarabi, Ziyuan Huang, Chenlan Wang, Tai Karir, Mingyan Liu:

The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study. 4799-4818 - Max van der Horst, Ricky Kho, Olga Gadyatskaya, Michel Mollema, Michel van Eeten, Yury Zhauniarovich:

High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution. 4819-4838 - Sayak Saha Roy, Elham Pourabbas Vafa, Kobra Khanmohamaddi, Shirin Nilizadeh:

DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram. 4839-4858 - Hoang Dai Nguyen, Sumit Dhungana, Madhulika Itha, Phani Vadrevu:

"Please don't send that bot anything": A Mixed-methods Study of Personal Impersonation Attacks Targeting Digital Payments on Social Media. 4859-4878 - Sharad Agarwal, Emma Harvey, Enrico Mariconti, Guillermo Suarez-Tangil, Marie Vasek:

'Hey mum, I dropped my phone down the toilet': Investigating Hi Mum and Dad SMS Scams in the United Kingdom. 4879-4896 - Yinyuan Zhang, Cuiying Gao, Yueming Wu, Shihan Dou, Cong Wu, Ying Zhang, Wei Yuan, Yang Liu:

Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection. 4897-4916
Crypto 3: Formal Methods and Private Computation
- Christodoulos Pappas, Dimitrios Papadopoulos:

Hobbit: Space-Efficient zkSNARK with Optimal Prover Time. 4917-4936 - Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault, Abdul Rahman Taleb:

A Tale of Two Worlds, a Formal Story of WireGuard Hybridization. 4937-4956 - Hao Guo, Liqiang Peng, Haiyang Xue, Li Peng, Weiran Liu, Zhe Liu, Lei Hu:

Improved Secure Two-party Computation from a Geometric Perspective. 4957-4974 - Kerem Arikan, Huaxin Tang, Williams Zhang Cen, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:

Secure Caches for Compartmentalized Software. 4975-4994 - Maurice Shih, Michael Rosenberg, Hari Kailad, Ian Miers:

zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks. 4995-5014 - Felix Linker, Ralf Sasse, David A. Basin:

A Formal Analysis of Apple's iMessage PQ3 Protocol. 5015-5034 - Zhengyao Lin, Michael McLoughlin, Pratap Singh, Rory Brennan-Jones, Paul Hitchcox, Joshua Gancher, Bryan Parno:

Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict. 5035-5052 - Haobin Hiroki Chen, Hongbo Chen, Mingshen Sun, Chenghong Wang, XiaoFeng Wang:

PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics. 5053-5070 - Pratap Singh, Joshua Gancher, Bryan Parno:

OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries. 5071-5090
Social Issues and Security
- Mikaela Brough, Rikke Bjerg Jensen, Martin R. Albrecht:

On the Virtues of Information Security in the UK Climate Movement. 5091-5110 - Hans W. A. Hanley, Emily Okabe, Zakir Durumeric:

Tracking the Takes and Trajectories of English-Language News Narratives across Trustworthy and Worrisome Websites. 5111-5130 - Emmanuel Tweneboah, Collins W. Munyendo, Yixin Zou:

"No, I Can't Be a Security Personnel on Your Phone": Security and Privacy Threats From Sharing Infrastructure in Rural Ghana. 5131-5148 - Lorenz Kustosch, Carlos Gañán, Mattis van 't Schip, Michel van Eeten, Simon Parkin:

Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act. 5149-5168 - Catherine Han, Anne Li, Deepak Kumar, Zakir Durumeric:

Characterizing the MrDeepFakes Sexual Deepfake Marketplace. 5169-5188 - Jhih-Yi Hsieh, Aditi Raghunathan, Nihar B. Shah:

Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions. 5189-5208 - Jiachen Zhou, Mingsi Wang, Tianlin Li, Guozhu Meng, Kai Chen:

Dormant: Defending against Pose-driven Human Image Animation. 5209-5228 - Vincenzo Imperati, Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, Francesco Sassi:

The Conspiracy Money Machine: Uncovering Telegram's Conspiracy Channels and their Profit Model. 5229-5246 - Madelyne Xiao, Jonathan R. Mayer:

SoK: Machine Learning for Misinformation Detection. 5247-5266
Network Security 3: BLE and Cellular
- Tuan Dinh Hoang, Taekkyung Oh, CheolJun Park, Insu Yun, Yongdae Kim:

LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers. 5267-5286 - Jun Ho Huh, Hyejin Shin, Sunwoo Ahn, Hayoon Yi, Joonho Cho, Taewoo Kim, Minchae Lim, Nu-El Choi:

Preventing Artificially Inflated SMS Attacks through Large-Scale Traffic Inspection. 5405-5423 - Simon Erni, Martin Kotuliak, Richard Baker, Ivan Martinovic, Srdjan Capkun:

GLaDoS: Location-aware Denial-of-Service of Cellular Networks. 5307-5325 - Yang Yang, Guomin Yang, Yingjiu Li, Minming Huang, Zilin Shen, Imtiaz Karim, Ralf Sasse, David A. Basin, Elisa Bertino, Jian Weng, HweeHwa Pang, Robert H. Deng:

AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication. 5327-5345 - Xiaofeng Liu, Chaoshun Zuo, Qinsheng Hou, Pengcheng Ren, Jianliang Wu, Qingchuan Zhao, Shanqing Guo:

A Thorough Security Analysis of BLE Proximity Tracking Protocols. 5347-5364 - Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino:

Gotta Detect 'Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks. 5365-5384 - Shijie Luo, Matheus E. Garbelini, Sudipta Chattopadhyay, Jianying Zhou:

SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR. 5385-5404 - Yilu Dong, Tianchang Yang, Abdullah Al Ishtiaq, Syed Md. Mukit Rashid, Ali Ranjbar, Kai Tu, Tianwei Wu, Md. Sultan Mahmud, Syed Rafiul Hussain:

CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks. 5287-5306 - Maryam Motallebighomi, Jason Veara, Evangelos Bitsikas, Aanjhan Ranganathan:

eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem. 5425-5444
ML and AI Privacy 2
- Ehsanul Kabir, Lucas Craig, Shagufta Mehnaz:

Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses. 5445-5463 - Hao Li, Zheng Li, Siyuan Wu, Yutong Ye, Min Zhang, Dengguo Feng, Yang Zhang:

Enhanced Label-Only Membership Inference Attacks with Fewer Queries. 5465-5483 - Irtaza Shahid, Nirupam Roy:

For Human Ears Only: Preventing Automated Monitoring on Voice Data. 5485-5503 - Mohamed Suliman, Anisa Halimi, Swanand Ravindra Kadhe, Nathalie Baracaldo, Douglas J. Leith:

Towards a Re-evaluation of Data Forging Attacks in Practice. 5505-5524 - Joseph Pollock, Igor Shilov, Euodia Dodd, Yves-Alexandre de Montjoye:

Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods. 5525-5544 - Nima Naderloui, Shenao Yan, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong:

Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective. 5545-5564 - Juyang Bai, Md Hafizul Islam Chowdhuryy, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Deliang Fan:

Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System. 5565-5582 - Kevin Nam, Youyeon Joo, Dongju Lee, Seungjin Ha, Hyunyoung Oh, Hyungon Moon, Yunheung Paek:

LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or Accuracy. 5583-5600 - Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang:

SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark. 5601-5620
Hardware Security 3: Side-Channel and Fault Injection Attacks
- Patrick Jattke, Michele Marazzi, Flavien Solt, Max Wipfli, Stefan Gloor, Kaveh Razavi:

McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis. 5621-5640 - Ravan Nazaraliyev, Yicheng Zhang, Sankha Baran Dutta, Andrés Márquez, Kevin J. Barker, Nael B. Abu-Ghazaleh:

Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation. 5641-5660 - Finn de Ridder, Patrick Jattke, Kaveh Razavi:

Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands. 5661-5678 - Nureddin Kamadan, Walter Wang, Stephan van Schaik, Christina Garman, Daniel Genkin, Yuval Yarom:

ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory. 5679-5698 - Yuqin Yan, Wei Huang, Ilya Grishchenko, Gururaj Saileshwar, Aastha Mehta, David Lie:

Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels. 5699-5717 - Chris S. Lin, Joyce Qu, Gururaj Saileshwar:

GPUHammer: Rowhammer Attacks on GPU Memories are Practical. 5719-5738 - Daniel Weber, Lukas Gerlach, Leon Trampert, Youheng Lü, Jo Van Bulck, Michael Schwarz:

SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution. 5739-5758 - Wei Peng, Yinshuai Li, Yinqian Zhang:

Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption. 5759-5776 - Azade Rezaeezade, Trevor Yap, Dirmanto Jap, Shivam Bhasin, Stjepan Picek:

Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis. 5777-5796
Privacy 3: Attacks
- Kavous Salehzadeh Niksirat, Lev Velykoivanenko, Samuel Mätzler, Stephan Mulders, Aurelia Tamò-Larrieux, Marc-Olivier Boldi, Mathias Humbert, Kévin Huguenin:

Addressing the Address Books' (Interdependent) Privacy Issues. 6501-6520 - Malte Wessels, Simon Koch, Jan Drescher, Louis Bettels, David Klein, Martin Johns:

HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web. 6521-6539 - Yifeng Cai, Ziqi Zhang, Mengyu Yao, Junlin Liu, Xiaoke Zhao, Xinyi Fu, Ruoyu Li, Zhe Liu, Xiangqun Chen, Yao Guo, Ding Li:

I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-apps. 6541-6560 - Felix Weissberg, Jan Malte Hilgefort, Steve Grogorick, Daniel Arp, Thorsten Eisenhofer, Martin Eisemann, Konrad Rieck:

Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls. 6561-6580 - Martin Björklund, Romaric Duvignau:

Endangered Privacy: Large-Scale Monitoring of Video Streaming Services. 6581-6597 - Kai-Hsiang Chou, Yi-Min Lin, Yi-An Wang, Jonathan Weiping Li, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:

Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats. 6599-6618 - Xin Yao, Kecheng Huang, Yimin Chen, Jiawei Guo, Jie Tang, Ming Zhao:

EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar. 6619-6638 - Xiang Zhang, Jie Zhang, Huan Yan, Jinyang Huang, Zehua Ma, Bin Liu, Meng Li, Kejiang Chen, Qing Guo, Tianwei Zhang, Zhi Liu:

DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction. 6639-6658 - Saiid El Hajj Chehade, Ben Stock, Carmela Troncoso:

Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers. 6659-6678
Usable Privacy and Security 3
- Jan H. Klemmer, Juliane Schmüser, Fabian Fischer, Jacques Suray, Jan-Ulrich Holtgrave, Simon Lenau, Byron M. Lowens, Florian Schaub, Sascha Fahl:

How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices. 5967-5986 - Divyanshu Bhardwaj, Sumair Ijaz Hashmi, Katharina Krombholz, Maximilian Golla:

Understanding How Users Prepare for and React to Smartphone Theft. 5987-6005 - Jabari Kwesi, Jiaxun Cao, Riya Manchanda, Pardis Emami Naeini:

Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health. 6007-6024 - Jiliang Li, Nora Sinong Lu, Isaak Hanimann, Janice Jianing Si, Dazhao Cheng, Xiaobo Zhou, Kanye Ye Wang:

Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs. 6025-6044 - Maximiliane Windl, Omer Akgul, Nathan Malkin, Lorrie Faith Cranor:

Privacy Solution or Menace? Investigating Perceptions of Radio-Frequency Sensing. 6045-6064 - Yuxi Wu, Ruoxi Zhang, Shiyue Liu, Mufei He, Aidan Hong, Jeremy J. Northup, Calla Kainaroi, Fei Fang, Hong Shen:

Navigating Security and Privacy Threats in Homeless Service Provision. 6065-6084 - Deepthi Mungara, Harshini Sri Ramulu, Yasemin Acar:

Security and Privacy Advice for UPI Users in India. 6085-6103 - Omer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek:

As Advertised? Understanding the Impact of Influencer VPN Ads. 6125-6142
Software Security 3: Fuzzing
- Yuancheng Jiang, Chuqi Zhang, Bonan Ruan, Jiahao Liu, Manuel Rigger, Roland H. C. Yap, Zhenkai Liang:

Fuzzing the PHP Interpreter via Dataflow Fusion. 6143-6158 - Lingming Zhang, Binbin Zhao, Jiacheng Xu, Peiyu Liu, Qinge Xie, Yuan Tian, Jianhai Chen, Shouling Ji:

Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation. 6159-6178 - Xiangpu Song, Jianliang Wu, Yingpei Zeng, Hao Pan, Chaoshun Zuo, Qingchuan Zhao, Shanqing Guo:

MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers. 6179-6197 - Peng Deng, Lei Zhang, Yuchuan Meng, Zhemin Yang, Yuan Zhang, Zhemin Yang:

ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains. 6199-6218 - Yiyang Chen, Chao Zhang, Long Wang, Wenyu Zhu, Changhua Luo, Nuoqi Gui, Zheyu Ma, Xingjian Zhang, Bingkai Su:

IDFuzz: Intelligent Directed Grey-box Fuzzing. 6219-6238 - Jifan Xiao, Peng Jiang, Zixi Zhao, Ruizhe Huang, Junlin Liu, Ding Li:

Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback. 6239-6258 - Wei-Che Kao, Yen-Chia Chen, Yu-Sheng Lin, Yu-Cheng Yang, Chi-Yu Li, Chun-Ying Huang:

BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks. 6259-6278 - Chuyang Chen, Brendan Dolan-Gavitt, Zhiqiang Lin:

ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer Space. 6279-6298 - Yupeng Yang, Shenglong Yao, Jizhou Chen, Wenke Lee:

Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving. 6299-6318
ML and AI Security 3: Backdoors, Poisoning, Unlearning
- Xiang Li, Ying Meng, Junming Chen, Lannan Luo, Qiang Zeng:

Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs. 6319-6337 - Lijin Wang, Jingjing Wang, Tianshuo Cong, Xinlei He, Zhan Qin, Xinyi Huang:

From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components. 6339-6358 - Chenhao Lin, Chenyang Zhao, Shiwei Wang, Longtian Wang, Chao Shen, Zhengyu Zhao:

Revisiting Training-Inference Trigger Intensity in Backdoor Attacks. 6359-6378 - Zhen Guo, Abhinav Kumar, Reza Tourani:

Persistent Backdoor Attacks in Continual Learning. 6379-6397 - Dayong Ye, Tianqing Zhu, Jiayang Li, Kun Gao, Bo Liu, Leo Yu Zhang, Wanlei Zhou, Yang Zhang:

Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning. 6399-6418 - Dorde Popovic, Amin Sadeghi, Ting Yu, Sanjay Chawla, Issa Khalil:

DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data. 6419-6438 - Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento:

SoK: Gradient Inversion Attacks in Federated Learning. 6439-6459 - Xiaoyi Pang, Chenxu Zhao, Zhibo Wang, Jiahui Hu, Yinggui Wang, Lei Wang, Tao Wei, Kui Ren, Chun Chen:

PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning. 6461-6479 - Cheng-Long Wang, Qi Li, Zihang Xiang, Yinzhi Cao, Di Wang:

Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness. 6481-6500
Privacy 2: Consent, Compliance, and Provable Privacy
- Qinge Xie, Karthik Ramakrishnan, Frank Li:

Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach. 5797-5816 - Brian Tang, Duc Bui, Kang G. Shin:

Navigating Cookie Consent Violations Across the Globe. 5817-5836 - Katherine Hausladen, Oliver Wang, Sophie Eng, Jocelyn Wang, Francisca Wijaya, Matthew May, Sebastian Zimmeck:

Websites' Global Privacy Control Compliance at Scale and over Time. 5837-5856 - Tao Jing, Yao Li, Jingzhou Ye, Jie Wang, Xueqiang Wang:

Privacy Law Enforcement Under Centralized Governance: A Qualitative Analysis of Four Years' Special Privacy Rectification Campaigns. 5857-5874 - Julia Netter, Tim Nelson, Skyler Austen, Eva Lau, Colton Rusch, Malte Schwarzkopf, Kathi Fisler:

A Stakeholder-Based Framework to Highlight Tensions when Implementing Privacy Features. 5875-5892 - Charles Olivier-Anclin, Ioana Boureanu, Liqun Chen, Christopher J. P. Newton, Tom Chothia, Anna Clee, Andreas Kokkinis, Pascal Lafourcade:

Who Pays Whom? Anonymous EMV-Compliant Contactless Payments. 5893-5912 - Yushu Zhang, Yuanyuan Sun, Shuren Qi, Zhongyun Hua, Wenying Wen, Yuming Fang:

Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond. 5913-5930 - Jingmiao Zhang, Suyuan Liu, Jiahui Hou, Zhiqiang Wang, Haikuo Yu, Xiang-Yang Li:

SpeechGuard: Recoverable and Customizable Speech Privacy Protection. 5931-5948 - Minhao Bai, Kaiyi Pang, Guorui Liao, Jinshuai Yang, Yongfeng Huang:

Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism. 5949-5965
Crypto 4: Systems and Protocols
- Carolina Ortega Pérez, Alaa Daffalla:

Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking. 6679-6697 - Keitaro Hashimoto, Shuichi Katsumata, Guillermo Pascual-Perez:

Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable. 6699-6716 - Benedikt Auerbach, Yevgeniy Dodis, Daniel Jost, Shuichi Katsumata, Rolfe Schmidt:

How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol. 6717-6736 - Gurur Öndarö, Jonas Kaspereit, Samson Umezulike, Christoph Saatjohann, Fabian Ising, Sebastian Schinzel:

S/MINE: Collecting and Analyzing S/MIME Certificates at Scale. 6737-6756 - Junkai Liang, Zhi Zhang, Xin Zhang, Qingni Shen, Yansong Gao, Xingliang Yuan, Haiyang Xue, Pengfei Wu, Zhonghai Wu:

Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer. 6757-6776 - Keitaro Hashimoto, Shuichi Katsumata, Thom Wiggers:

Bundled Authenticated Key Exchange: A Concrete Treatment of Signal's Handshake Protocol and Post-Quantum Security. 6777-6796 - Shuichi Katsumata, Guilhem Niot, Ida Tucker, Thom Wiggers:

Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures. 6797-6816 - Yaofei Wang, Gang Pei, Kejiang Chen, Jinyang Ding, Chao Pan, Weilong Pang, Donghui Hu, Weiming Zhang:

SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling. 6817-6835 - Guorui Liao, Jinshuai Yang, Weizhi Shao, Yongfeng Huang:

A Framework for Designing Provably Secure Steganography. 6837-6856
Software Security 4: Fuzzing and Other Software Analysis
- Tongwei Ren, Ronghan Che, Guin Gilman, Lorenzo De Carli, Robert J. Walls:

REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding. 6857-6875 - Tristan Benoit, Yunru Wang, Moritz Dannehl, Johannes Kinder:

BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding. 6877-6896 - Jay Bosamiya, Maverick Woo, Bryan Parno:

TRex: Practical Type Reconstruction for Binary Code. 6897-6915 - Yi Cai, Pratap Singh, Zhengyao Lin, Jay Bosamiya, Joshua Gancher, Milijana Surbatovich, Bryan Parno:

Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust. 6917-6935 - Sai Ritvik Tanksalkar, Siddharth Muralee, Srihari Danduri, Paschal C. Amusuo, Antonio Bianchi, James C. Davis, Aravind Kumar Machiry:

LEMIX: Enabling Testing of Embedded Applications as Linux Applications. 6937-6956 - Hung-Mao Chen, Xu He, Shu Wang, Xiaokuan Zhang, Kun Sun:

TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs. 6957-6976 - Andrew Bao, Wenjia Zhao, Yanhao Wang, Yueqiang Cheng, Stephen McCamant, Pen-Chung Yew:

From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification. 6977-6997 - Kunpeng Zhang, Zongjie Li, Daoyuan Wu, Shuai Wang, Xin Xia:

Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators. 6999-7018 - Bocheng Xiang, Yuan Zhang, Fengyu Liu, Hao Huang, Zihan Lin, Min Yang:

Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations. 7019-7038
Network Security 4: Internet and Beyond
- Christopher Tibaldo, Harshad Sathaye, Giovanni Camurati, Srdjan Capkun:

GNSS-WASP: GNSS Wide Area SPoofing. 7039-7058 - Daniele Coppola, Arslan Mumtaz, Giovanni Camurati, Harshad Sathaye, Mridula Singh, Srdjan Capkun:

LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites. 7059-7075 - Vincent Diemunsch, Lucca Hirschi, Steve Kremer:

A Comprehensive Formal Security Analysis of OPC UA. 7077-7096 - Marcel Maehren, Nurullah Erinola, Robert Merget, Jörg Schwenk, Juraj Somorovsky:

Towards Internet-Based State Learning of TLS State Machines. 7097-7116 - Mingming Zhang, Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu:

Misty Registry: An Empirical Study of Flawed Domain Registry Operation. 7117-7134 - Angelos Beitis, Mathy Vanhoef:

Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts. 7135-7152 - Konrad Wolsing, Eric Wagner, Luisa Lux, Klaus Wehrle, Martin Henze:

GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection. 7153-7172 - Baoxiang Jiang, Tristan Bilot, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui, Shahrear Iqbal, Xueyuan Han, Thomas Pasquier:

ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems. 7173-7192 - Tristan Bilot, Baoxiang Jiang, Zefeng Li, Nour El Madhoun, Khaldoun Al Agha, Anis Zouaoui, Thomas Pasquier:

Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems. 7193-7212
ML and AI Security 4: Robustness
- Derui Wang, Kristen Moore, Diksha Goel, Minjune Kim, Gang Li, Yang Li, Robin Doss, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu:

CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization. 7213-7232 - Yijia Chang, Hanrui Jiang, Chao Lin, Xinyi Huang, Jian Weng:

Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification. 7233-7250 - Jiate Li, Binghui Wang:

AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification. 7251-7270 - Hanna Foerster, Sasha Behrouzi, Phillip Rieger, Murtuza Jadliwala, Ahmad-Reza Sadeghi:

LightShed: Defeating Perturbation-based Image Copyright Protections. 7271-7290 - Minhao Jin, Maria Apostolaki:

Robustifying ML-powered Network Classifiers with PANTS. 7291-7310 - Yujin Huang, Zhi Zhang, Qingchuan Zhao, Xingliang Yuan, Chunyang Chen:

THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models. 7311-7330 - Junhua Lin, Marc Juarez:

A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks. 7331-7348 - Jinzhu Yan, Zhuotao Liu, Yuyang Xie, Shiyu Liang, Lin Liu, Ke Xu:

CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis. 7349-7368 - Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka, Tatsuya Mori:

Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection. 7369-7386 - Chenyi Wang, Raymond Muller, Ruoyu Song, Jean-Philippe Monteuuis, Jonathan Petit, Yanmao Man, Ryan M. Gerdes, Z. Berkay Celik, Ming Li:

From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception. 7387-7406
System Security 4: Kernel and Low-Level System Security
- Marcos Bajo, Christian Rossow:

Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines. 7407-7426 - Jennifer Miller, Manas Ghandat, Kyle Zeng, Hongkai Chen, Abdelouahab Benchikh, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:

System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System. 7427-7446 - Lukas Maar, Lukas Giner, Daniel Gruss, Stefan Mangard:

When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks. 7447-7465 - Hao Sun, Zhendong Su:

Approximation Enforced Execution of Untrusted Linux Kernel Extensions. 7467-7485 - Jiaqin Yan, Qiujiang Chen, Shuai Zhou, Yuke Peng, Guoxing Chen, Yinqian Zhang:

EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS. 7487-7506 - Xinhui Shao, Zhen Ling, Yue Zhang, Huaiyu Yan, Yumeng Wei, Lan Luo, Zixia Liu, Junzhou Luo, Xinwen Fu:

The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks. 7507-7524 - Cheolwoo Myung, Sangho Lee, Byoungyoung Lee:

Subverting the Secure VM by Exploiting PCIe Devices. 7525-7540 - Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Zhen Yan, Hao Sun, Yu Jiang:

Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling. 7525-7543 - Neelu S. Kalani, Thomas Bourgeat, Guerney D. H. Hunt, Wojciech Ozga:

Save what must be saved: Secure context switching with Sailor. 7545-7561
Privacy 4: Privacy-Preserving Computation
- Tianyao Gu, Yilei Wang, Afonso Tinoco, Bingnan Chen, Ke Yi, Elaine Shi:

Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting. 7563-7582 - Amin Setayesh, Cheran Mahalingam, Emily Chen, Sujaya Maiyya:

Treebeard: A Scalable and Fault Tolerant ORAM Datastore. 7583-7602 - Francesca Falzon, Tianxin Tang:

Learning from Functionality Outputs: Private Join and Compute in the Real World. 7603-7622 - Longxiang Wang, Lei Xu, Yufei Chen, Ying Zou, Cong Wang:

ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries. 7623-7641 - Huanhuan Jia, Yuanbo Zhao, Kai Dong, Zhen Ling, Ming Yang, Junzhou Luo, Xinwen Fu:

Distributed Private Aggregation in Graph Neural Networks. 7643-7662 - Lushan Song, Qizhi Zhang, Yu Lin, Haoyu Niu, Daode Zhang, Zheng Qu, Weili Han, Jue Hong, Quanwei Cai, Ye Wu:

Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning. 7663-7682 - Mingyang Song, Zhongyun Hua, Yifeng Zheng, Tao Xiang, Guoai Xu, Xingliang Yuan:

Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting. 7683-7702 - Haris Smajlovic, David Froelicher, Ariya Shajii, Bonnie Berger, Hyunghoon Cho, Ibrahim Numanagic:

Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption. 7703-7722 - Foo Yee Yeo, Jason H. M. Ying:

Private Set Intersection and other Set Operations in the Third Party Setting. 7723-7742
Authentication
- Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Ke Coby Wang:

Detecting Compromise of Passkey Storage on the Cloud. 7743-7762 - Yihui Yan, Zhice Yang:

OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token. 7763-7780 - Haibo Cheng, Fugeng Huang, Jiahong Yang, Wenting Li, Ping Wang:

Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing. 7781-7798 - Yunkai Zou, Maoxiang An, Ding Wang:

Password Guessing Using Large Language Models. 7799-7818 - Alaa Daffalla, Arkaprabha Bhattacharya, Jacob Wilder, Rahul Chatterjee, Nicola Dell, Rosanna Bellini, Thomas Ristenpart:

A Framework for Abusability Analysis: The Case of Passkeys in Interpersonal Threat Models. 7819-7838 - Yuchen Yang, Qichang Liu, Christopher Brix, Huan Zhang, Yinzhi Cao:

CertPHash: Towards Certified Perceptual Hashing via Robust Training. 7839-7856 - Claudio Anliker, Daniele Lain, Srdjan Capkun:

Phishing Attacks against Password Manager Browser Extensions. 7857-7876 - Bowen Hu, Kuo Wang, Chip-Hong Chang:

Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems. 7877-7896
System Security 5: Securing Systems and Protocols
- Mihael Liskij, Xuhua Ding, Gene Tsudik, David A. Basin:

Oblivious Digital Tokens. 7897-7915 - Bo Zhang, Helei Cui, Xingliang Yuan, Zhiwen Yu, Bin Guo:

V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads. 7917-7936 - John Y. Kim, Chaoshun Zuo, Yanjie Zhao, Zhiqiang Lin:

AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps. 7937-7955 - Grace Jia, Alex Wong, Anurag Khandelwal:

Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks. 7957-7975 - George Pavlides, Anna Clee, Ioana Boureanu, Tom Chothia:

More is Less: Extra Features in Contactless Payments Break Security. 7977-7996 - Marcell Szakály, Sebastian Köhler, Ivan Martinovic:

Current Affairs: A Security Measurement Study of CCS EV Charging Deployments. 7997-8015 - Sven Hebrok, Tim Leonhard Storm, Felix Matthias Cramer, Maximilian Radoy, Juraj Somorovsky:

STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets. 8017-8034 - Taisic Yun, Suhwan Jeong, Yonghwa Lee, Seungjoo Kim, Hyoungshick Kim, Insu Yun, Yongdae Kim:

Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea. 8035-8054
Vulnerabilities in LLMs: Privacy, Safety, and Defense
- Zeren Luo, Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Jingyi Zheng, Xinlei He:

Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search. 8055-8074 - Atilla Akkus, Masoud Poorghaffar Aghdam, Mingjie Li, Junjie Chu, Michael Backes, Yang Zhang, Sinem Sav:

Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data. 8075-8093 - Daniel Ayzenshteyn, Roy Weiss, Yisroel Mirsky:

Cloak, Honey, Trap: Proactive Defenses Against LLM Agents. 8095-8114 - Yash Vekaria, Aurelio Loris Canino, Jonathan Levitsky, Alex Ciechonski, Patricia Callejo, Anna Maria Mandalari, Zubair Shafiq:

Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants. 8115-8134 - Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li:

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks. 8135-8154 - Shuai Cheng, Shu Meng, Haitao Xu, Haoran Zhang, Shuai Hao, Chuan Yue, Wenrui Ma, Meng Han, Fan Zhang, Zhao Li:

Effective PII Extraction from LLMs through Augmented Few-Shot Learning. 8155-8173 - Seongho Keum, Dongwon Shin, Leo Marchyok, Sanghyun Hong, Sooel Son:

Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts. 8175-8194 - Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao:

PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty. 8195-8214 - Shenyi Zhang, Yuchen Zhai, Keyan Guo, Hongxin Hu, Shengnan Guo, Zheng Fang, Lingchen Zhao, Chao Shen, Cong Wang, Qian Wang:

JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation. 8215-8234
Web Security
- Florian Hantke, Peter Snyder, Hamed Haddadi, Ben Stock:

Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements. 8235-8253 - Youkun Shi, Yuan Zhang, Tianhao Bai, Feng Xue, Jiarun Dai, Fengyu Liu, Lei Zhang, Xiapu Luo, Min Yang:

XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing. 8255-8272 - Xinyi Wang, Yeting Li, Jie Lu, Shizhe Cui, Chenghang Shi, Qin Mai, Yunpei Zhang, Yang Xiao, Feng Li, Wei Huo:

ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency. 8273-8291 - Zhengyu Liu, Theo Lee, Jianjia Yu, Zifeng Kang, Yinzhi Cao:

The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM. 8293-8312 - Neil P. Thimmaiah, Yashashvi J. Dave, Rigel Gjomemo, V. N. Venkatakrishnan:

FIXX: FInding eXploits from eXamples. 8313-8327 - Keke Lian, Lei Zhang, Haoran Zhao, Yinzhi Cao, Yongheng Liu, Fute Sun, Yuan Zhang, Min Yang:

Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers. 8329-8348 - Zihan Lin, Yuan Zhang, Jiarun Dai, Xinyou Huang, Bocheng Xiang, Guangliang Yang, Letian Yuan, Lei Zhang, Tian Chen, Min Yang:

Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection. 8349-8366 - Xinyou Huang, Lei Zhang, Yongheng Liu, Peng Deng, Yinzhi Cao, Yuan Zhang, Min Yang:

Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation. 8367-8384
Crypto 5: HE, MPC, Oblivious Computation
- Jelle Vos, Mauro Conti, Zekeriya Erkin:

Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV. 8385-8402 - Yijia Chang, Songze Li:

Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity. 8403-8422 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:

Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 8423-8440 - Song Bian, Haowen Pan, Jiaqi Hu, Zhou Zhang, Yunhao Fu, Jiafeng Hua, Yunyi Chen, Bo Zhang, Yier Jin, Jin Dong, Zhenyu Guan:

Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption. 8441-8460 - Yunhao Wang, Fan Zhang:

Qelect: Lattice-based Single Secret Leader Election Made Practical. 8461-8480 - Lakshmi Likhitha Mankali, Mohammed Nabeel, Faiq Raees, Michail Maniatakos, Ozgur Sinanoglu, Johann Knechtel:

GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection. 8481-8500 - Leqian Zheng, Zheng Zhang, Wentao Dong, Yao Zhang, Ye Wu, Cong Wang:

H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM. 8501-8520 - Apostolos Mavrogiannakis, Xian Wang, Ioannis Demertzis, Dimitrios Papadopoulos, Minos N. Garofalakis:

OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments. 8521-8540 - Federico Mazzone, Maarten H. Everts, Florian Hahn, Andreas Peter:

Efficient Ranking, Order Statistics, and Sorting under CKKS. 8541-8558

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














