Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge
|
|
|
|
Artifact
Appendix
|
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications
|
|
|
|
Artifact
Appendix
|
Improving Logging to Reduce Permission Over-Granting Mistakes
|
|
|
|
Artifact
Appendix
|
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
|
|
|
|
Artifact
Appendix
|
FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
|
|
|
|
Artifact
Appendix
|
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
|
|
|
|
Artifact
Appendix
|
Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser
|
|
|
|
Artifact
Appendix
|
Security and Privacy Failures in Popular 2FA Apps
|
|
|
|
Artifact
Appendix
|
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
|
|
|
|
Artifact
Appendix
|
Linear Private Set Union from Multi-Query Reverse Private Membership Test
|
|
|
|
Artifact
Appendix
|
Device Tracking via Linux's New TCP Source Port Selection Algorithm
|
|
|
|
Artifact
Appendix
|
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
|
|
|
|
Artifact
Appendix
|
Automated Security Analysis of Exposure Notification Systems
|
|
|
|
Artifact
Appendix
|
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
|
|
|
|
Appendix
|
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
|
|
|
|
Artifact
Appendix
|
Decompiling x86 Deep Neural Network Executables
|
|
|
|
Artifact
Appendix
|
PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
|
|
|
|
Artifact
Appendix
|
Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
|
|
|
|
Artifact
Appendix
|
Reassembly is Hard: A Reflection on Challenges and Strategies
|
|
|
|
Artifact
Appendix
|
A comprehensive, formal and automated analysis of the EDHOC protocol
|
|
|
|
Artifact
Appendix
|
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management
|
|
|
|
Artifact
Appendix
|
HOLMES: Efficient Distribution Testing for Secure Collaborative Learning
|
|
|
|
Artifact
Appendix
|
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
|
|
|
|
Artifact
Appendix
|
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
|
|
|
|
Artifact
Appendix
|
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
|
|
|
|
Artifact
Appendix
|
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking
|
|
|
|
Artifact
Appendix
|
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
|
|
|
|
Artifact
Appendix
|
Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js
|
|
|
|
Artifact
Appendix
|
Eos: Efficient Private Delegation of zkSNARK Provers
|
|
|
|
Artifact
Appendix
|
Trojan Source: Invisible Vulnerabilities
|
|
|
|
Artifact
Appendix
|
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
|
|
|
|
Artifact
Appendix
|
Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring
|
|
|
|
Artifact
Appendix
|
Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks
|
|
|
|
Artifact
Appendix
|
Side-Channel Attacks on Optane Persistent Memory
|
|
|
|
Artifact
Appendix
|
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
|
|
|
|
Artifact
Appendix
|
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis
|
|
|
|
Artifact
Appendix
|
An Efficient Design of Intelligent Network Data Plane
|
|
|
|
Artifact
Appendix
|
AutoFR: Automated Filter Rule Generation for Adblocking
|
|
|
|
Artifact
Appendix
|
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
|
|
|
|
Artifact
Appendix
|
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
|
|
|
|
Artifact
Appendix
|
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs
|
|
|
|
Artifact
Appendix
|
Capstone: A Capability-based Foundation for Trustless Secure Memory Access
|
|
|
|
Artifact
Appendix
|
ARMore: Pushing Love Back Into Binaries
|
|
|
|
Artifact
Appendix
|
USLH: Taking Speculative Load Hardening to the Next Level
|
|
|
|
Artifact
Appendix
|
BunnyHop: Exploiting the Instruction Prefetcher
|
|
|
|
Artifact
Appendix
|
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
|
|
|
|
Artifact
Appendix
|
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2
|
|
|
|
Artifact
Appendix
|
VeriZexe: Decentralized Private Computation with Universal Setup
|
|
|
|
Artifact
Appendix
|
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks
|
|
|
|
Artifact
Appendix
|
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling
|
|
|
|
Artifact
Appendix
|
FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules
|
|
|
|
Artifact
Appendix
|
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants
|
|
|
|
Artifact
Appendix
|
Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
|
|
|
|
Artifact
Appendix
|
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research
|
|
|
|
Artifact
Appendix
|
ACon2: Adaptive Conformal Consensus for Provable Blockchain Oracles
|
|
|
|
Artifact
Appendix
|
autofz: Automated Fuzzer Composition at Runtime
|
|
|
|
Artifact
Appendix
|
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware
|
|
|
|
Artifact
Appendix
|
Authenticated private information retrieval
|
|
|
|
Artifact
Appendix
|
Understand Users’ Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles
|
|
|
|
Artifact
Appendix
|
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale
|
|
|
|
Artifact
Appendix
|
Controlled Data Races in Enclaves: Attacks and Detection
|
|
|
|
Artifact
Appendix
|
Prime Match: A Privacy Preserving Inventory Matching System
|
|
|
|
Appendix
|
The Gates of Time: Improving Cache Attacks with Transient Execution
|
|
|
|
Artifact
Appendix
|
TreeSync: Authenticated Group Management for Messaging Layer Security
|
|
|
|
Artifact
Appendix
|
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs
|
|
|
|
Artifact
Appendix
|
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy
|
|
|
|
Artifact
Appendix
|
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
|
|
|
|
Artifact
Appendix
|
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation
|
|
|
|
Artifact
Appendix
|
TAP: Transparent and Privacy-Preserving Data Services
|
|
|
|
Artifact
Appendix
|
SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution
|
|
|
|
Artifact
Appendix
|
PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel
|
|
|
|
Artifact
Appendix
|
HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches
|
|
|
|
Artifact
Appendix
|
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets
|
|
|
|
Artifact
Appendix
|
Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
|
|
|
|
Artifact
Appendix
|
Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting
|
|
|
|
Artifact
Appendix
|
Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet
|
|
|
|
Artifact
Appendix
|
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
|
|
|
|
Artifact
Appendix
|
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
|
|
|
|
Artifact
Appendix
|
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions
|
|
|
|
Artifact
Appendix
|
PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
|
|
|
|
Artifact
Appendix
|
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3
|
|
|
|
Artifact
Appendix
|
Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs
|
|
|
|
Artifact
Appendix
|
SANDDRILLER: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes
|
|
|
|
Artifact
Appendix
|
Unique Identification of 50,000+ Virtual Reality Users from Head & Hand Motion Data
|
|
|
|
Artifact
Appendix
|
Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs
|
|
|
|
Artifact
Appendix
|
Mitigating Security Risks in Linux with KLAUS -- A Method for Evaluating Patch Correctness
|
|
|
|
Artifact
Appendix
|
A Verified Confidential Computing as a Service Framework for Privacy Preservation
|
|
|
|
Artifact
Appendix
|
DAFL: Directed Grey-box Fuzzing guided by Data Dependency
|
|
|
|
Artifact
Appendix
|
WaterBear: Asynchronous BFT with Information-Theoretic Security and Quantum Security
|
|
|
|
Artifact
Appendix
|
Forming Faster Firmware Fuzzers
|
|
|
|
Artifact
Appendix
|
A Bug's Life: Analyzing the Lifecycle and Mitigation Process of Content Security Policy Bugs
|
|
|
|
Artifact
Appendix
|
ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation
|
|
|
|
Artifact
Appendix
|
Remote Direct Memory Introspection
|
|
|
|
Artifact
Appendix
|
BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing
|
|
|
|
Artifact
Appendix
|
CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing
|
|
|
|
Artifact
Appendix
|
ARI: Attestation of Real-time Mission Execution Integrity
|
|
|
|
Artifact
Appendix
|
Guarding Serverless Applications with Kalium
|
|
|
|
Artifact
Appendix
|
Uncontained: Uncovering Container Confusion in the Linux Kernel
|
|
|
|
Artifact
Appendix
|
HECO: Fully Homomorphic Encryption Compiler
|
|
|
|
Artifact
Appendix
|
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories
|
|
|
|
Artifact
Appendix
|
Systematic Assessment of Fuzzers using Mutation Analysis
|
|
|
|
Artifact
Appendix
|
Powering Privacy: On the Energy Demand and Feasibility of Anonymity Networks on Smartphones
|
|
|
|
Artifact
Appendix
|
Inception: Exposing New Attack Surfaces with Training in Transient Execution
|
|
|
|
Artifact
Appendix
|
FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
|
|
|
|
Artifact
Appendix
|
Cookie Crumbles: Breaking and Fixing Web Session Integrity
|
|
|
|
Artifact
Appendix
|
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
|
|
|
|
Artifact
Appendix
|
Precise and Generalized Robustness Certification for Neural Networks
|
|
|
|
Artifact
Appendix
|
URET: Universal Robustness Evaluation Toolkit (for Evasion)
|
|
|
|
Artifact
Appendix
|
PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation
|
|
|
|
Artifact
Appendix
|
How Effective is Multiple-Vantage-Point Domain Control Validation?
|
|
|
|
Artifact
Appendix
|
SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning
|
|
|
|
Artifact
Appendix
|
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
|
|
|
|
Artifact
Appendix
|
TVA: A multi-party computation system for secure and expressive time series analytics
|
|
|
|
Artifact
Appendix
|
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
|
|
|
|
Artifact
Appendix
|
Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation
|
|
|
|
Artifact
Appendix
|
McFIL: Model Counting Functionality-Inherent Leakage
|
|
|
|
Artifact
Appendix
|
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship
|
|
|
|
Artifact
Appendix
|
Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning
|
|
|
|
Artifact
Appendix
|
EnigMap: External-Memory Oblivious Map for Secure Enclaves
|
|
|
|
Artifact
Appendix
|
Erebus: Access Control for Augmented Reality Systems
|
|
|
|
Artifact
Appendix
|
Towards Targeted Obfuscation of Adversarial Unsafe Images using Reconstruction and Counterfactual Super Region Attribution Explainability
|
|
|
|
Artifact
Appendix
|
VulChecker: Graph-based Vulnerability Localization in Source Code
|
|
|
|
Artifact
Appendix
|
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions
|
|
|
|
Artifact
Appendix
|
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
|
|
|
|
Artifact
Appendix
|
Smart Learning to Find Dumb Contracts
|
|
|
|
Artifact
Appendix
|
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities
|
|
|
|
Artifact
Appendix
|
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications
|
|
|
|
Artifact
Appendix
|
A Peek into the Metaverse: Detecting 3D Model Clones in Mobile Games
|
|
|
|
Artifact
Appendix
|
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography
|
|
|
|
Artifact
Appendix
|
SMACK: Semantically Meaningful Adversarial Audio Attack
|
|
|
|
Artifact
Appendix
|
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat
|
|
|
|
Artifact
Appendix
|
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software
|
|
|
|
Artifact
Appendix
|
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks
|
|
|
|
Artifact
Appendix
|
Security Analysis of MongoDB Queryable Encryption
|
|
|
|
Artifact
Appendix
|
Evading Provenance-Based ML Detectors with Adversarial System Actions
|
|
|
|
Artifact
Appendix
|
BotScreen: Trust Everybody, but Cut the Aimbots Yourself
|
|
|
|
Artifact
Appendix
|
GigaDORAM: Breaking the Billion Address Barrier
|
|
|
|
Artifact
Appendix
|
SAFER: Efficient and Error-Tolerant Binary Instrumentation
|
|
|
|
Artifact
Appendix
|
Curve Trees: Practical and Transparent Zero-Knowledge Accumulators
|
|
|
|
Artifact
Appendix
|
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
|
|
|
|
Artifact
Appendix
|