"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
|
|
|
|
📦 Artifact
📄 Appendix
|
"These results must be false": A usability evaluation of constant-time analysis tools
|
|
|
|
📦 Artifact
📄 Appendix
|
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers
|
|
|
|
📦 Artifact
📄 Appendix
|
ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation
|
|
|
|
📦 Artifact
📄 Appendix
|
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
|
|
|
|
📦 Artifact
📄 Appendix
|
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing
|
|
|
|
📦 Artifact
📄 Appendix
|
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation
|
|
|
|
📦 Artifact
📄 Appendix
|
CAMP: Compiler and Allocator-based Heap Memory Protection
|
|
|
|
📦 Artifact
📄 Appendix
|
Cascade: CPU Fuzzing via Intricate Program Generation
|
|
|
|
📦 Artifact
📄 Appendix
|
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection
|
|
|
|
📦 Artifact
📄 Appendix
|
D-Helix: A Generic Decompiler Testing Framework Using Symbolic Differentiation
|
|
|
|
📦 Artifact
📄 Appendix
|
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
|
|
|
|
📦 Artifact
📄 Appendix
|
ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
|
|
|
|
📦 Artifact
📄 Appendix
|
Enabling Developers, Protecting Users: Investigating Harassment and Safety in VR
|
|
|
|
📦 Artifact
📄 Appendix
|
False Claims against Model Ownership Resolution
|
|
|
|
📦 Artifact
📄 Appendix
|
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing
|
|
|
|
📦 Artifact
📄 Appendix
|
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition
|
|
|
|
📦 Artifact
📄 Appendix
|
InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2
|
|
|
|
📦 Artifact
📄 Appendix
|
Inference of Error Specifications and Bug Detection Using Structural Similarities
|
|
|
|
📦 Artifact
📄 Appendix
|
Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers
|
|
|
|
📦 Artifact
📄 Appendix
|
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks
|
|
|
|
📦 Artifact
📄 Appendix
|
ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks
|
|
|
|
📦 Artifact
📄 Appendix
|
NetShaper: A Differentially Private Network Side-Channel Mitigation System
|
|
|
|
📦 Artifact
📄 Appendix
|
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators
|
|
|
|
📦 Artifact
📄 Appendix
|
Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services
|
|
|
|
📦 Artifact
📄 Appendix
|
PerfOMR: Oblivious Message Retrieval with Reduced Communication and Computation
|
|
|
|
📦 Artifact
📄 Appendix
|
Practical Data-Only Attack Generation
|
|
|
|
📦 Artifact
📄 Appendix
|
RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users
|
|
|
|
📦 Artifact
📄 Appendix
|
SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching
|
|
|
|
📦 Artifact
📄 Appendix
|
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
|
|
|
|
📦 Artifact
📄 Appendix
|
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
|
|
|
|
📦 Artifact
📄 Appendix
|
SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
|
|
|
|
📦 Artifact
📄 Appendix
|
SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice
|
|
|
|
📦 Artifact
📄 Appendix
|
Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation
|
|
|
|
📦 Artifact
📄 Appendix
|
Towards Privacy-Preserving Social-Media SDKs on Android
|
|
|
|
📦 Artifact
📄 Appendix
|
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
|
|
|
|
📦 Artifact
📄 Appendix
|
VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
|
|
|
|
📦 Artifact
📄 Appendix
|
Web Platform Threats: Automated Detection of Web Security Issues With WPT
|
|
|
|
📦 Artifact
📄 Appendix
|
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality
|
|
|
|
📦 Artifact
📄 Appendix
|
With Great Power Come Great Side Channels: Statistical Timing Side-Channel Analyses with Bounded Type-1 Errors
|
|
|
|
📦 Artifact
📄 Appendix
|
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
|
|
|
|
📦 Artifact
📄 Appendix
|
ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
|
|
|
|
📦 Artifact
📄 Appendix
|