Orca: Blocklisting in Sender-Anonymous Messaging
|
|
|
|
Artifact
|
Appendix
|
PrivGuard: Privacy Regulation Compliance Made Easier
|
|
|
|
Artifact
|
Appendix
|
OpenSSLNTRU: Faster post-quantum TLS key exchange
|
|
|
|
Artifact
|
Appendix
|
Midas: Systematic Kernel TOCTTOU Protection
|
|
|
|
Artifact
|
Appendix
|
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
|
|
|
|
Artifact
|
Appendix
|
Back-Propagating System Dependency Impact for Attack Investigation
|
|
|
|
Artifact
|
Appendix
|
Automated Side Channel Analysis of Media Software with Manifold Learning
|
|
|
|
Artifact
|
Appendix
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query
|
|
|
|
Artifact
|
Appendix
|
Bedrock: Programmable Network Support for Secure RDMA Systems
|
|
|
|
Artifact
|
Appendix
|
Polynomial Commitment with a One-to-Many Prover and Applications
|
|
|
|
Artifact
|
Appendix
|
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
|
|
|
|
Artifact
|
Appendix
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
|
|
|
|
Artifact
|
Appendix
|
OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR
|
|
|
|
Artifact
|
Appendix
|
How to Abuse and Fix Authenticated Encryption Without Key Commitment
|
|
|
|
Artifact
|
Appendix
|
Synthetic Data – Anonymisation Groundhog Day
|
|
|
|
Artifact
|
Appendix
|
HyperDegrade: From GHz to MHz Effective CPU Frequencies
|
|
|
|
Artifact
|
Appendix
|
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies
|
|
|
|
Artifact
|
Appendix
|
On the Security Risks of AutoML
|
|
|
|
Artifact
|
Appendix
|
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
|
|
|
|
Artifact
|
Appendix
|
A Large-scale Investigation into Geodifferences in Mobile Apps
|
|
|
|
Artifact
|
Appendix
|
Debloating Address Sanitizer
|
|
|
|
Artifact
|
Appendix
|
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel
|
|
|
|
Artifact
|
Appendix
|
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
|
|
|
|
|
Appendix
|
Incremental Offline/Online PIR
|
|
|
|
Artifact
|
Appendix
|
Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
|
|
|
|
Artifact
|
Appendix
|
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild
|
|
|
|
Artifact
|
Appendix
|
SecSMT: Securing SMT Processors against Contention-Based Covert Channels
|
|
|
|
Artifact
|
Appendix
|
Regulator: Dynamic Analysis to Detect ReDoS
|
|
|
|
Artifact
|
Appendix
|
DeepDi: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly
|
|
|
|
Artifact
|
Appendix
|
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
|
|
|
|
Artifact
|
Appendix
|
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning
|
|
|
|
|
Appendix
|
Automating Cookie Consent and GDPR Violation Detection
|
|
|
|
Artifact
|
Appendix
|
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
|
|
|
|
Artifact
|
Appendix
|
Elasticlave: An Efficient Memory Model for Enclaves
|
|
|
|
Artifact
|
Appendix
|
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
|
|
|
|
Artifact
|
Appendix
|
Caring about Sharing: User Perceptions of Multiparty Data Sharing
|
|
|
|
Artifact
|
Appendix
|
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
|
|
|
|
Artifact
|
Appendix
|
Membership Inference Attacks and Defenses in Neural Network Pruning
|
|
|
|
Artifact
|
Appendix
|
PolyCruise: A Cross-Language Dynamic Information Flow Analysis
|
|
|
|
Artifact
|
Appendix
|
Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks
|
|
|
|
Artifact
|
Appendix
|
Khaleesi: Breaker of Advertising and Tracking Request Chains
|
|
|
|
Artifact
|
Appendix
|
Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
|
|
|
|
Artifact
|
Appendix
|
Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability
|
|
|
|
Artifact
|
Appendix
|
Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies
|
|
|
|
Artifact
|
Appendix
|
Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games
|
|
|
|
|
Appendix
|
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
|
|
|
|
Artifact
|
Appendix
|
Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
|
|
|
|
Artifact
|
Appendix
|
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
|
|
|
|
Artifact
|
Appendix
|
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage
|
|
|
|
Artifact
|
Appendix
|
Provably-Safe Multilingual Software Sandboxing using WebAssembly
|
|
|
|
Artifact
|
Appendix
|
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
|
|
|
|
Artifact
|
Appendix
|
PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier
|
|
|
|
Artifact
|
Appendix
|
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts
|
|
|
|
Artifact
|
Appendix
|
Transferring Adversarial Robustness Through Robust Representation Matching
|
|
|
|
Artifact
|
Appendix
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
|
|
|
|
|
Appendix
|
Efficient Representation of Numerical Optimization Problems for SNARKs
|
|
|
|
Artifact
|
Appendix
|
ppSAT: Towards Two-Party Private SAT Solving
|
|
|
|
Artifact
|
Appendix
|
Anycast Agility: Network Playbooks to Fight DDoS
|
|
|
|
Artifact
|
Appendix
|
Practical Data Access Minimization in Trigger-Action Platforms
|
|
|
|
Artifact
|
Appendix
|
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier
|
|
|
|
Artifact
|
Appendix
|
Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud
|
|
|
|
Artifact
|
Appendix
|
Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
|
|
|
|
Artifact
|
Appendix
|
Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures
|
|
|
|
Artifact
|
Appendix
|
Zero-Knowledge Middleboxes
|
|
|
|
Artifact
|
Appendix
|
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators
|
|
|
|
Artifact
|
Appendix
|
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
|
|
|
|
Artifact
|
Appendix
|
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
|
|
|
|
Artifact
|
Appendix
|
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
|
|
|
|
Artifact
|
Appendix
|
Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum
|
|
|
|
Artifact
|
Appendix
|
FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing
|
|
|
|
Artifact
|
Appendix
|
Ground Truth for Binary Disassembly is Not Easy
|
|
|
|
Artifact
|
Appendix
|
CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL
|
|
|
|
Artifact
|
Appendix
|
Stateful Greybox Fuzzing
|
|
|
|
Artifact
|
Appendix
|
The Security Lottery: Measuring Client-Side Web Security Inconsistencies
|
|
|
|
Artifact
|
Appendix
|
SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis
|
|
|
|
Artifact
|
Appendix
|
Twilight: A Differentially Private Payment Channel Network
|
|
|
|
Artifact
|
Appendix
|
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework
|
|
|
|
Artifact
|
Appendix
|
Might I Get Pwned: A Second Generation Compromised Credential Checking Service
|
|
|
|
Artifact
|
Appendix
|
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
|
|
|
|
Artifact
|
Appendix
|
Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds
|
|
|
|
Artifact
|
Appendix
|
Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects
|
|
|
|
Artifact
|
Appendix
|
TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
|
|
|
|
Artifact
|
Appendix
|
Building an Open, Robust, and Stable Voting-Based Domain Top List
|
|
|
|
Artifact
|
Appendix
|
One-off Disclosure Control by Heterogeneous Generalization
|
|
|
|
Artifact
|
Appendix
|
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
|
|
|
|
Artifact
|
Appendix
|
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture
|
|
|
|
Artifact
|
Appendix
|
Detecting Logical Bugs of DBMS with Coverage-based Guidance
|
|
|
|
Artifact
|
Appendix
|
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher
|
|
|
|
Artifact
|
Appendix
|
Half-Double: Hammering From the Next Row Over
|
|
|
|
Artifact
|
Appendix
|
How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes
|
|
|
|
Artifact
|
Appendix
|
SAPIC+: protocol verifiers of the world, unite!
|
|
|
|
Artifact
|
Appendix
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation
|
|
|
|
|
Appendix
|
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation
|
|
|
|
Artifact
|
Appendix
|
BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
|
|
|
|
Artifact
|
Appendix
|
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
|
|
|
|
Artifact
|
Appendix
|
Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots
|
|
|
|
Artifact
|
Appendix
|
AutoDA: Automated Decision-based Iterative Adversarial Attacks
|
|
|
|
Artifact
|
Appendix
|
AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities
|
|
|
|
Artifact
|
Appendix
|
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples
|
|
|
|
Artifact
|
Appendix
|
SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing
|
|
|
|
Artifact
|
Appendix
|
PISTIS: Trusted Computing Architecture for Low-end Embedded Systems
|
|
|
|
Artifact
|
Appendix
|
Loki: Hardening Code Obfuscation Against Automated Attacks
|
|
|
|
Artifact
|
Appendix
|
WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking
|
|
|
|
Artifact
|
Appendix
|
Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
|
|
|
|
|
Appendix
|
Measurement by Proxy: On the Accuracy of Online Marketplace Measurements
|
|
|
|
Artifact
|
Appendix
|
Why Users (Don't) Use Password Managers at a Large Educational Institution
|
|
|
|
Artifact
|
Appendix
|
RETBLEED: Arbitrary Speculative Code Execution with Return Instructions
|
|
|
|
Artifact
|
Appendix
|
Piranha: A GPU Platform for Secure Computation
|
|
|
|
Artifact
|
Appendix
|
Batched Differentially Private Information Retrieval
|
|
|
|
Artifact
|
Appendix
|
TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries
|
|
|
|
Artifact
|
Appendix
|
SWAPP: A New Programmable Playground for Web Application Security
|
|
|
|
Artifact
|
Appendix
|
"They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers
|
|
|
|
Artifact
|
Appendix
|
Creating a Secure Underlay for the Internet
|
|
|
|
Artifact
|
Appendix
|
GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
|
|
|
|
Artifact
|
Appendix
|