A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents
|
|
Artifact
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap
|
|
|
Adversarial Policy Training against Deep Reinforcement Learning
|
|
Artifact
|
Blind Backdoors in Deep Learning Models
|
|
Artifact
|
Blind In/On-Path Attacks and Applications to VPNs
|
|
Artifact
|
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
|
|
Artifact
|
Card Brand Mixup Attack: Billions of EMV Cards Pwned
|
|
Artifact
|
Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
|
|
Artifact
|
Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi
|
|
Artifact
|
DOLMA: Securing Speculation with the Principle of Transient Non-Observability
|
|
Artifact
|
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption
|
|
Artifact
|
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets
|
|
Artifact
|
Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor
|
|
|
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
|
|
Artifact
|
Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain
|
|
Artifact
|
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical
|
|
Artifact
|
MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
|
|
Artifact
|
MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design
|
|
Artifact
|
Muse: Secure CNN Inference for Malicious Clients
|
|
Artifact
|
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State
|
|
|
Once is Never Enough: Foundations for Sound Statistical Inference in Tor Network Experimentation
|
|
Artifact
|
Osiris: Automated Discovery Of Microarchitectural Side Channels
|
|
Artifact
|
PACStack: an Authenticated Call Stack
|
|
Artifact
|
PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling
|
|
|
Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks
|
|
Artifact
|
Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists
|
|
Artifact
|
SEApp: Bringing Mandatory Access Control to Android Apps
|
|
Artifact
|
SELECTIVETAINT: Efficient Data Flow Tracking With Static Binary Rewriting
|
|
Artifact
|
SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
|
|
Artifact
|
SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart Contracts through Language Model-Guided Symbolic Execution
|
|
|
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset
|
|
|
Undo Workarounds for Kernel Bugs
|
|
Artifact
|
Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context
|
|
Artifact
|
YarIx: Scalable YARA-based Malware Intelligence
|
|
Artifact
|