Results

Title Badge Artifact URL
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents Artifact
Accurately Measuring Global Risk of Amplification Attacks using AmpMap
Adversarial Policy Training against Deep Reinforcement Learning Artifact
Blind Backdoors in Deep Learning Models Artifact
Blind In/On-Path Attacks and Applications to VPNs Artifact
CADE: Detecting and Explaining Concept Drift Samples for Security Applications Artifact
Card Brand Mixup Attack: Billions of EMV Cards Pwned Artifact
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning Artifact
Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi Artifact
DOLMA: Securing Speculation with the Principle of Transient Non-Observability Artifact
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption Artifact
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets Artifact
Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend Artifact
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain Artifact
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical Artifact
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation Artifact
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design Artifact
Muse: Secure CNN Inference for Malicious Clients Artifact
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation Artifact
Osiris: Automated Discovery Of Microarchitectural Side Channels Artifact
PACStack: an Authenticated Call Stack Artifact
PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks Artifact
Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists Artifact
SEApp: Bringing Mandatory Access Control to Android Apps Artifact
SELECTIVETAINT: Efficient Data Flow Tracking With Static Binary Rewriting Artifact
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations Artifact
SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset
Undo Workarounds for Kernel Bugs Artifact
Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context Artifact
YarIx: Scalable YARA-based Malware Intelligence Artifact