Results
| Paper | Avail. | Funct. | Repro. | Available At |
|---|---|---|---|---|
| The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM |
|
|
|
π¦ Artifact π Appendix |
| "Iβm trying to learn. . . and Iβm shooting myself in the foot": Beginnersβ Struggles When Solving Binary Exploitation Exercises |
|
|
|
π¦ Artifact π Appendix |
| "Threat modeling is very formal, itβs very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects |
|
π¦ Artifact |
||
| A Comprehensive Formal Security Analysis of OPC UA |
|
|
|
π¦ Artifact π Appendix |
| A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks |
|
|
|
π¦ Artifact π Appendix |
| A First Look at Governments Enterprise Security Guidance |
|
|
|
π¦ Artifact π Appendix |
| A Formal Analysis of Appleβs iMessage PQ3 Protocol |
|
|
|
π¦ Artifact π Appendix |
| A Framework for Designing Provably Secure Steganography |
|
|
π¦ Artifact π Appendix |
|
| A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features |
|
π¦ Artifact |
||
| A Tale of Two Worlds, a Formal Story of WireGuard Hybridization |
|
|
|
π¦ Artifact π Appendix |
| A limited technical background is sufο¬cient for attack-defense tree acceptability |
|
|
|
π¦ Artifact π Appendix |
| AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification |
|
π¦ Artifact |
||
| AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication |
|
π¦ Artifact |
||
| ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries |
|
|
π¦ Artifact π Appendix |
|
| APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching |
|
|
π¦ Artifact π Appendix |
|
| AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection |
|
π¦ Artifacts: 1, 2 |
||
| AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps |
|
|
π¦ Artifact π Appendix |
|
| Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer |
|
|
π¦ Artifact π Appendix |
|
| Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense |
|
π¦ Artifact |
||
| Addressing Sensitivity Distinction in Local Differential Privacy : A General Utility-Optimized Framework |
|
|
|
π¦ Artifact π Appendix |
| Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants |
|
|
|
π¦ Artifact π Appendix |
| AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features |
|
π¦ Artifact |
||
| An Industry Interview Study of Software Signing for Supply Chain Security |
|
π¦ Artifact |
||
| Analyzing the AI Nudification Application Ecosystem |
|
π¦ Artifact |
||
| Approve Once, Regret Forever: On the Exploitation of Ethereumβs Approve-TransferFrom Ecosystem |
|
π¦ Artifact |
||
| Approximation Enforced Execution of Untrusted Linux Kernel Extensions |
|
|
|
π¦ Artifact π Appendix |
| Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity |
|
π¦ Artifact |
||
| Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model |
|
|
π¦ Artifact π Appendix |
|
| Ares: Comprehensive Path Hijacking Detection via Routing Tree |
|
|
|
π¦ Artifact π Appendix |
| Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android |
|
|
π¦ Artifact π Appendix |
|
| Artifacts for BarraCUDA: Edge GPUs do leak DNN weights |
|
π¦ Artifact |
||
| Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting |
|
|
|
π¦ Artifact π Appendix |
| Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond |
|
|
|
π¦ Artifact π Appendix |
| Attacker Control and Bug Prioritization |
|
|
|
π¦ Artifact π Appendix |
| AudioMarkNet: Audio Watermarking for Deepfake Speech Detection |
|
π¦ Artifact |
||
| Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain |
|
π¦ Artifact |
||
| AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation |
|
π¦ Artifacts: 1, 2, 3, 4 |
||
| Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems |
|
π¦ Artifact |
||
| Automated Soundness and Completeness Vetting of Polygon zkEVM |
|
π¦ Artifact |
||
| Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake |
|
|
|
π¦ Artifact π Appendix |
| Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines |
|
|
|
π¦ Artifact π Appendix |
| BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention |
|
π¦ Artifact |
||
| BGP Vortex: Update Message Floods Can Create Internet Instabilities |
|
|
|
π¦ Artifact π Appendix |
| BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding |
|
|
|
π¦ Artifact π Appendix |
| BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks |
|
|
|
π¦ Artifact π Appendix |
| Backdooring Bias ((B^2)) into Diffusion Models |
|
π¦ Artifact |
||
| Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification |
|
|
|
π¦ Artifact π Appendix |
| Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling |
|
π¦ Artifact |
||
| Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants |
|
|
π¦ Artifact π Appendix |
|
| Blockchain Address Poisoning |
|
π¦ Artifact |
||
| BlueGuard: Accelerated Host and Guest Introspection Using DPUs |
|
π¦ Artifact |
||
| Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings |
|
π¦ Artifact |
||
| Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats |
|
|
|
π¦ Artifact π Appendix |
| Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions |
|
|
|
π¦ Artifact π Appendix |
| Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions |
|
|
|
π¦ Artifact π Appendix |
| Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis |
|
π¦ Artifact |
||
| Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC |
|
π¦ Artifact |
||
| Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities |
|
π¦ Artifact |
||
| BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup |
|
π¦ Artifact |
||
| CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization |
|
|
|
π¦ Artifact π Appendix |
| Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers |
|
π¦ Artifact |
||
| Catch-22: Uncovering Compromised Hosts using SSH Public Keys |
|
|
|
π¦ Artifact π Appendix |
| Censorship Evasion with Unidentified Protocol Generation |
|
π¦ Artifact |
||
| CertPHash: Towards Certified Perceptual Hashing via Robust Training |
|
|
π¦ Artifact π Appendix |
|
| CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis |
|
|
|
π¦ Artifact π Appendix |
| ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains |
|
π¦ Artifact |
||
| Challenging Overreach: Addressing the Discrepancy Between Mobile App Privacy Practices and User Intention |
|
π¦ Artifact |
||
| Characterizing and Detecting Propaganda-Spreading Accounts on Telegram |
|
|
π¦ Artifact π Appendix |
|
| Characterizing the MrDeepFakes Sexual Deepfake Marketplace |
|
π¦ Artifact |
||
| Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors |
|
|
|
π¦ Artifact π Appendix |
| ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago |
|
π¦ Artifact |
||
| Cloak, Honey, Trap: Proactive Defenses Against LLM Agents |
|
|
π¦ Artifact π Appendix |
|
| CloudFlow Framework and CloudBench Suite |
|
|
|
π¦ Artifact π Appendix |
| CoVault: Secure, Scalable Analytics of Personal Data |
|
|
|
π¦ Artifact π Appendix |
| CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts |
|
|
|
π¦ Artifact π Appendix |
| Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures |
|
|
|
π¦ Artifact π Appendix |
| Confusing Value with Enumeration: Studying the Use of CVEs in Academia |
|
π¦ Artifact |
||
| Context Matters: Qualitative Insights into Developers Approaches and Challenges with Software Composition Analysis |
|
π¦ Artifact |
||
| CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks |
|
|
π¦ Artifact π Appendix |
|
| Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models |
|
π¦ Artifact |
||
| Current Affairs: A Security Measurement Study of CCS EV Charging Deployments |
|
|
π¦ Artifact π Appendix |
|
| Cyber-Physical Deception Through Coordinated IoT Honeypots |
|
π¦ Artifact |
||
| DFS: Delegation-friendly zkSNARK and Private Delegation of Provers |
|
|
π¦ Artifact π Appendix |
|
| DISPATCH: Unraveling Security Patches from Entangled Code Changes |
|
π¦ Artifact |
||
| DNS FLaRE: A Flush-Reload Attack on DNS Forwarders |
|
π¦ Artifact |
||
| DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram |
|
π¦ Artifact |
||
| Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning |
|
π¦ Artifact |
||
| Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI |
|
π¦ Artifact |
||
| DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data |
|
π¦ Artifact |
||
| DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs |
|
π¦ Artifacts: 1, 2, 3 |
||
| Demystifying the (In)Security of QR Code-based Login in Real-world Deployments |
|
π¦ Artifacts: 1, 2 |
||
| Depth Gives a False Sense of Privacy: LLM Internal States Inversion |
|
π¦ Artifact |
||
| Detecting Compromise of Passkey Storage on the Cloud |
|
π¦ Artifact |
||
| DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of Β΅m-level HDD Vibrations |
|
π¦ Artifact |
||
| Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses |
|
|
|
π¦ Artifact π Appendix |
| Distributed Private Aggregation in Graph Neural Networks |
|
|
π¦ Artifact π Appendix |
|
| Distributional Private Information Retrieval |
|
|
|
π¦ Artifact π Appendix |
| Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus |
|
|
|
π¦ Artifact π Appendix |
| Dorami: Privilege Separating Security Monitor on RISC-V TEEs |
|
π¦ Artifact |
||
| Dormant: Defending against Pose-driven Human Image Animation |
|
π¦ Artifact |
||
| Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers |
|
|
|
π¦ Artifact π Appendix |
| Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
| Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience |
|
|
|
π¦ Artifact π Appendix |
| ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory |
|
π¦ Artifact |
||
| EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS |
|
|
π¦ Artifact π Appendix |
|
| Easy As Childβs Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps |
|
|
π¦ Artifact π Appendix |
|
| EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar |
|
π¦ Artifact |
||
| Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection |
|
|
π¦ Artifact π Appendix |
|
| Effective PII Extraction from LLMs through Augmented Few-Shot Learning |
|
π¦ Artifact |
||
| Efficient 2PC for Constant Round Secure Equality Testing and Comparisons |
|
π¦ Artifact |
||
| Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV |
|
π¦ Artifact |
||
| Efficient Ranking, Order Statistics, and Sorting under CKKS |
|
|
|
π¦ Artifact π Appendix |
| Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability |
|
π¦ Artifacts: 1, 2 |
||
| EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models |
|
|
|
π¦ Artifact π Appendix |
| Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures |
|
|
|
π¦ Artifact π Appendix |
| Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection |
|
|
|
π¦ Artifact π Appendix |
| Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking |
|
|
π¦ Artifact π Appendix |
|
| Endangered Privacy: Large-Scale Monitoring of Video Streaming Services |
|
|
|
π¦ Artifact π Appendix |
| Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption |
|
|
|
π¦ Artifact π Appendix |
| Enhanced Label-Only Membership Inference Attacks with Fewer Queries |
|
|
|
π¦ Artifact π Appendix |
| Evaluating LLM-based Personal Information Extraction and Countermeasures |
|
|
π¦ Artifact π Appendix |
|
| Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach |
|
π¦ Artifact |
||
| Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models |
|
|
|
π¦ Artifact π Appendix |
| EvilEDR: Repurposing EDR as an Offensive Tool |
|
|
|
π¦ Artifact π Appendix |
| Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges |
|
π¦ Artifact |
||
| Exploiting Inaccurate Branch History in Side-Channel Attacks |
|
|
|
π¦ Artifact π Appendix |
| Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs |
|
π¦ Artifact |
||
| Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health |
|
π¦ Artifact |
||
| Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers |
|
|
|
π¦ Artifact π Appendix |
| Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China |
|
|
|
π¦ Artifact π Appendix |
| Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALLΒ·E Text-to-Image Pipelines |
|
|
|
π¦ Artifact π Appendix |
| FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC |
|
|
|
π¦ Artifact π Appendix |
| FIXX: FInding eXploits from eXamples |
|
|
|
π¦ Artifact π Appendix |
| FLOP: Breaking the Apple M3 CPU via False Load Output Predictions |
|
π¦ Artifact |
||
| Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios |
|
|
π¦ Artifact π Appendix |
|
| FastLloyd: Federated, Accurate, Secure, and Tunable kk-Means Clustering with Differential Privacy |
|
π¦ Artifacts: 1, 2 |
||
| Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection |
|
π¦ Artifact |
||
| Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling |
|
π¦ Artifact |
||
| Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting |
|
|
|
π¦ Artifact π Appendix |
| Following Devilsβ Footprint: Towards Real-time Detection of Price Manipulation Attacks |
|
π¦ Artifact |
||
| Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks |
|
|
|
π¦ Artifact π Appendix |
| Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods |
|
π¦ Artifact |
||
| From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification |
|
|
π¦ Artifact π Appendix |
|
| From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems |
|
|
|
π¦ Artifact π Appendix |
| From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models |
|
π¦ Artifact |
||
| From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components |
|
|
|
π¦ Artifacts: 1, 2, 3 π Appendix |
| From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning |
|
π¦ Artifact |
||
| From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception |
|
|
|
π¦ Artifact π Appendix |
| Further Study on Frequency Estimation under Local Differential Privacy |
|
|
|
π¦ Artifact π Appendix |
| Fuzzing the PHP Interpreter via Dataflow Fusion |
|
π¦ Artifact |
||
| GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays |
|
|
|
π¦ Artifact π Appendix |
| GNSS-WASP: GNSS Wide Area SPoofing |
|
π¦ Artifact |
||
| GPC Web Crawler |
|
|
π¦ Artifact π Appendix |
|
| GPUHammer: Rowhammer Attacks on GPU Memories are Practical |
|
|
|
π¦ Artifact π Appendix |
| Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms |
|
|
|
π¦ Artifact π Appendix |
| GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection |
|
|
|
π¦ Artifact π Appendix |
| GenHuzz: An Efficient Generative Hardware Fuzzer |
|
π¦ Artifact |
||
| General-Purpose ff-DP Estimation and Auditing in a Black-Box Setting |
|
|
|
π¦ Artifact π Appendix |
| Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data |
|
|
π¦ Artifact π Appendix |
|
| GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection |
|
π¦ Artifact |
||
| Gotta Detect βEm All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks |
|
|
π¦ Artifact π Appendix |
|
| GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors |
|
|
|
π¦ Artifact π Appendix |
| GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency |
|
|
|
π¦ Artifact π Appendix |
| Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack |
|
π¦ Artifact |
||
| H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM |
|
|
|
π¦ Artifact π Appendix |
| Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System |
|
|
π¦ Artifact π Appendix |
|
| HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns |
|
|
|
π¦ Artifact π Appendix |
| Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts |
|
|
π¦ Artifact π Appendix |
|
| HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning |
|
|
|
π¦ Artifact π Appendix |
| Hercules Droidot and the murder on the JNI Express |
|
|
|
π¦ Artifact π Appendix |
| High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts |
|
|
|
π¦ Artifact π Appendix |
| Hobbit: Space-Efficient zkSNARK with Optimal Prover Time |
|
π¦ Artifact |
||
| How Researchers De-identify Data in Practice |
|
π¦ Artifact |
||
| How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices |
|
|
|
π¦ Artifact π Appendix |
| How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol |
|
|
|
π¦ Artifact π Appendix |
| HubBub: Contention-Based Side-channel Attacks on USB Hubs |
|
π¦ Artifact |
||
| HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web |
|
|
π¦ Artifact π Appendix |
|
| Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving |
|
π¦ Artifact |
||
| I Cannot Write This Because It Violates Our Content Policy: Understanding Content Moderation Policies and User Experiences in Generative AI Products |
|
π¦ Artifact |
||
| I have no idea how to make it safer: Studying Security and Privacy Mindsets of Browser Extension Developers |
|
|
π¦ Artifact π Appendix |
|
| I wasnβt sure if this is indeed a security risk: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages |
|
π¦ Artifact |
||
| IDFuzz: Intelligent Directed Grey-box Fuzzing |
|
π¦ Artifact |
||
| IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran |
|
π¦ Artifact |
||
| ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
| ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
| Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs |
|
π¦ Artifact |
||
| Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection |
|
|
π¦ Artifact π Appendix |
|
| JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation |
|
|
|
π¦ Artifact π Appendix |
| Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems |
|
|
|
π¦ Artifact π Appendix |
| LEMIX: Enabling Testing of Embedded Applications as Linux Applications |
|
π¦ Artifact |
||
| LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites |
|
π¦ Artifact |
||
| LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers |
|
π¦ Artifact |
||
| LLMmap: Fingerprinting for Large Language Models |
|
π¦ Artifact |
||
| LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models |
|
|
π¦ Artifact π Appendix |
|
| Lancet: A Formalization Framework for Crash and Exploit Pathology |
|
|
|
π¦ Artifact π Appendix |
| Learning from Functionality Outputs: Private Join and Compute in the Real World |
|
|
|
π¦ Artifact π Appendix |
| Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement |
|
π¦ Artifact |
||
| Lets Move2EVM |
|
|
|
π¦ Artifact π Appendix |
| Levenshtein-trinary: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell |
|
|
π¦ Artifact π Appendix |
|
| LightShed: Defeating Perturbation-based Image Copyright Protections |
|
π¦ Artifact |
||
| Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis |
|
|
|
π¦ Artifact π Appendix |
| Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps |
|
|
|
π¦ Artifact π Appendix |
| Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators |
|
π¦ Artifact |
||
| MAESTRO: Multi-party AES using Lookup Tables |
|
|
|
π¦ Artifact π Appendix |
| MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers |
|
π¦ Artifact |
||
| Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents |
|
π¦ Artifact |
||
| Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents |
|
π¦ Artifact |
||
| MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem |
|
π¦ Artifact |
||
| Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information |
|
π¦ Artifact |
||
| McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis |
|
|
|
π¦ Artifact π Appendix |
| Membership Inference Attacks Against Vision-Language Models |
|
π¦ Artifact |
||
| Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMsβ Ethical Boundaries |
|
π¦ Artifact |
||
| Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink |
|
π¦ Artifact |
||
| Misty Registry: An Empirical Study of Flawed Domain Registry Operation |
|
π¦ Artifact |
||
| Mitigating Injection Attacks against Encrypted Applications via View-Based Partitioning |
|
π¦ Artifact |
||
| More is Less: Extra Features in Contactless Payments Break Security |
|
π¦ Artifact |
||
| My ZIP isnβt your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers |
|
|
|
π¦ Artifact π Appendix |
| NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage |
|
|
|
π¦ Artifact π Appendix |
| NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines |
|
π¦ Artifact |
||
| Narrowbeer: A Practical Replay Attack Against the Widevine DRM |
|
|
|
π¦ Artifact π Appendix |
| Navigating Cookie Consent Violations Across the Globe |
|
π¦ Artifact |
||
| Navigating Security and Privacy Threats in Homeless Service Provision |
|
π¦ Artifact |
||
| No Way to Sign Out? Unpacking Non-Compliance with Google Playβs App Account Deletion Requirements |
|
|
π¦ Artifact π Appendix |
|
| No, I Cant Be a Security Personnel on Your Phone: Security and Privacy Threats From Sharing Infrastructure in Rural Ghana |
|
π¦ Artifact |
||
| Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation |
|
|
π¦ Artifact π Appendix |
|
| Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives |
|
|
|
π¦ Artifact π Appendix |
| OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments |
|
|
π¦ Artifact π Appendix |
|
| ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems |
|
π¦ Artifacts: 1, 2 |
||
| Oblivious Digital Tokens |
|
|
|
π¦ Artifact π Appendix |
| On the Atomicity and Efficiency Blockchain Payment Channels |
|
π¦ Artifact |
||
| On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts |
|
π¦ Artifact |
||
| OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token |
|
π¦ Artifact |
||
| OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries |
|
|
|
π¦ Artifact π Appendix |
| PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs |
|
π¦ Artifact |
||
| PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics |
|
|
|
π¦ Artifact π Appendix |
| PRSA: Prompt Stealing Attacks against Real-World Prompt Services |
|
π¦ Artifact |
||
| Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges |
|
π¦ Artifact |
||
| Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments |
|
π¦ Artifact |
||
| Password Guessing Using Large Language Models |
|
π¦ Artifact |
||
| PatchAgent: A Practical Program Repair Agent Mimicking Human Expertise |
|
π¦ Artifact |
||
| Persistent Backdoor Attacks in Continual Learning |
|
π¦ Artifact |
||
| Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks |
|
|
|
π¦ Artifact π Appendix |
| Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System |
|
π¦ Artifact |
||
| Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations |
|
π¦ Artifact |
||
| Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1 |
|
|
|
π¦ Artifact π Appendix |
| Please donβt send that bot anything: Mixed-methods Study of Personal Impersonation Attacks to Steal Digital Payments on Social Media |
|
π¦ Artifacts: 1, 2 |
||
| PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning |
|
π¦ Artifact |
||
| PolySys: an Algebraic Leakage Attack Engine |
|
π¦ Artifact |
||
| Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands |
|
|
|
π¦ Artifact π Appendix |
| Practical Keyword Private Information Retrieval from Key-to-Index Mappings |
|
|
|
π¦ Artifact π Appendix |
| Practical Mempool Privacy via One-time Setup Batched Threshold Encryption |
|
π¦ Artifact |
||
| Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
| Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction |
|
|
π¦ Artifact π Appendix |
|
| Pretender: Universal Active Defense against Diffusion Finetuning Attacks |
|
π¦ Artifact |
||
| Preventing Automated Monitoring on Voice Data |
|
|
|
π¦ Artifact π Appendix |
| Principled and Automated Approach for Investigating AR/VR Attacks |
|
π¦ Artifact |
||
| PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity |
|
π¦ Artifact |
||
| Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run |
|
π¦ Artifact |
||
| Privacy Solution or Menace? Investigating Perceptions of Radio Frequency Sensing |
|
π¦ Artifact |
||
| PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty |
|
π¦ Artifact |
||
| Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts |
|
|
|
π¦ Artifact π Appendix |
| Prompt Obfuscation for Large Language Models |
|
|
|
π¦ Artifact π Appendix |
| Provably Robust Multi-bit Watermarking for AI-generated Text |
|
π¦ Artifact |
||
| Qelect: Lattice-based Single Secret Leader Election Made Practical |
|
|
|
π¦ Artifact π Appendix |
| Questionnaire Data β Digital Security Perceptions & Practices in 12 Countries |
|
π¦ Artifact |
||
| REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding |
|
π¦ Artifacts: 1, 2, 3, 4 |
||
| RangeSanitizer: Detecting Memory Errors with Efficient Range Checks |
|
|
|
π¦ Artifact π Appendix |
| Recover from Excessive Faults in Partially-Synchronous BFT SMR |
|
|
π¦ Artifact π Appendix |
|
| Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective |
|
π¦ Artifact |
||
| Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems |
|
|
|
π¦ Artifact π Appendix |
| Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning |
|
π¦ Artifact |
||
| Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models |
|
|
|
π¦ Artifact π Appendix |
| Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act |
|
π¦ Artifact |
||
| Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels |
|
|
|
π¦ Artifact π Appendix |
| Replication Package of ELFuzz |
|
|
π¦ Artifact π Appendix |
|
| Revisiting Training-Inference Trigger Intensity in Backdoor Attacks |
|
|
|
π¦ Artifact π Appendix |
| Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback |
|
|
π¦ Artifact π Appendix |
|
| Robustifying ML-powered Network Classifiers with PANTS |
|
|
|
π¦ Artifact π Appendix |
| RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect |
|
π¦ Artifacts: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 |
||
| Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs |
|
|
|
π¦ Artifact π Appendix |
| S/MINE: Collecting and Analyzing S/MIME Certificates at Scale |
|
|
|
π¦ Artifact π Appendix |
| SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution |
|
|
|
π¦ Artifact π Appendix |
| SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference |
|
π¦ Artifact |
||
| SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data |
|
π¦ Artifact |
||
| SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR |
|
|
|
π¦ Artifact π Appendix |
| SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks |
|
π¦ Artifact |
||
| STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets |
|
|
|
π¦ Artifact π Appendix |
| SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis |
|
|
π¦ Artifact π Appendix |
|
| Save what must be saved: Secure context switching with Sailor |
|
|
|
π¦ Artifact π Appendix |
| Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation |
|
|
|
π¦ Artifact π Appendix |
| Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks |
|
π¦ Artifact |
||
| Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication |
|
|
|
π¦ Artifact π Appendix |
| Secure Caches for Compartmentalized Software |
|
π¦ Artifact |
||
| Secure Information Embedding in Forensic 3D Fingerprinting |
|
π¦ Artifact |
||
| Security Implications of Malicious G-Codes in 3D Printing |
|
π¦ Artifact |
||
| Security and Privacy Advice for UPI Users in India |
|
π¦ Artifact |
||
| Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls |
|
|
|
π¦ Artifact π Appendix |
| Self-interpreting Adversarial Images |
|
|
|
π¦ Artifact π Appendix |
| SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner |
|
π¦ Artifact |
||
| Serverless Functions Made Confidential and Efficient with Split Containers |
|
|
|
π¦ Artifact π Appendix |
| Shadowed Realities: An Investigation of UI Attacks in WebXR |
|
π¦ Artifact |
||
| Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption |
|
|
|
π¦ Artifact π Appendix |
| Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles |
|
π¦ Artifact |
||
| Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption |
|
|
π¦ Artifact π Appendix |
|
| Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism |
|
π¦ Artifact |
||
| Shortcut Measurement Codes |
|
|
|
π¦ Artifact π Appendix |
| SoK: Automated TTP Extraction from CTI Reports β Are We There Yet? |
|
|
|
π¦ Artifact π Appendix |
| SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments |
|
π¦ Artifact |
||
| SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation |
|
π¦ Artifact |
||
| SoK: Come Together β Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework |
|
π¦ Artifact |
||
| SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark |
|
π¦ Artifact |
||
| SoK: Efficiency Robustness of Dynamic Deep Learning Systems |
|
π¦ Artifact |
||
| SoK: Machine Learning for Misinformation Detection |
|
|
|
π¦ Artifact π Appendix |
| SoK: On Gradient Leakage in Federated Learning |
|
π¦ Artifact |
||
| SoK: So, You Think You Know All About Secure Randomized Caches? |
|
|
|
π¦ Artifact π Appendix |
| SoK: Towards Effective Security Patch Generation |
|
π¦ Artifact |
||
| SoK: Towards a Unified Approach of Applied Replicability for Computer Security |
|
π¦ Artifact |
||
| SoK: Understanding zk-SNARKs: The Gap Between Research and Practice |
|
|
π¦ Artifact π Appendix |
|
| Software Availability Protection in Cyber-Physical Systems |
|
|
π¦ Artifact π Appendix |
|
| Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems |
|
|
π¦ Artifact π Appendix |
|
| Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis |
|
|
π¦ Artifact π Appendix |
|
| Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation |
|
|
|
π¦ Artifact π Appendix |
| SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
| Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets |
|
|
|
π¦ Artifact π Appendix |
| Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning |
|
|
|
π¦ Artifact π Appendix |
| Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer |
|
|
|
π¦ Artifact π Appendix |
| Synthesis of Code-Reuse Attacks from p-code Programs |
|
|
|
π¦ Artifact π Appendix |
| Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications |
|
π¦ Artifact |
||
| System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System |
|
|
|
π¦ Artifact π Appendix |
| Systematic Evaluation of Randomized Cache Designs against Occupancy Attack |
|
|
π¦ Artifact π Appendix |
|
| TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis |
|
π¦ Artifact |
||
| TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX |
|
π¦ Artifact |
||
| TEEcorrelate: An Information-Preserving Defense against Performance Counter Attacks on TEEs |
|
|
|
π¦ Artifact π Appendix |
| TETD: Trusted Execution in Trust Domains |
|
π¦ Artifact |
||
| THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models |
|
π¦ Artifact |
||
| TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms |
|
|
|
π¦ Artifact π Appendix |
| TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network |
|
|
π¦ Artifact π Appendix |
|
| TRex: Practical Type Reconstruction for Binary Code |
|
|
|
π¦ Artifact π Appendix |
| TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs |
|
|
|
π¦ Artifact π Appendix |
| Tady: A Neural Disassembler without Structural Constraint Violations |
|
|
|
π¦ Artifact π Appendix |
| TapTrap: Animation-Driven Tapjacking on Android |
|
|
|
π¦ Artifact π Appendix |
| The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks |
|
|
|
π¦ Artifact π Appendix |
| The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study |
|
π¦ Artifact |
||
| The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing |
|
π¦ Artifact |
||
| Third Party Private Set Operations |
|
π¦ Artifact |
||
| TockOwl: Asynchronous Consensus with Fault and Network Adaptability |
|
π¦ Artifact |
||
| Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea |
|
π¦ Artifact |
||
| Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models |
|
|
|
π¦ Artifact π Appendix |
| Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation |
|
π¦ Artifact |
||
| Towards Internet-Based State Learning of TLS State Machines |
|
|
|
π¦ Artifact π Appendix |
| Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models |
|
π¦ Artifact |
||
| Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness |
|
π¦ Artifact |
||
| Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict |
|
|
|
π¦ Artifact π Appendix |
| Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification |
|
π¦ Artifact |
||
| Towards a Re-evaluation of Data Forging Attacks in Practice |
|
π¦ Artifact |
||
| TracLLM: A Generic Framework for Attributing Long Context LLMs |
|
π¦ Artifact |
||
| Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges |
|
|
|
π¦ Artifact π Appendix |
| Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites |
|
π¦ Artifact |
||
| Transparent Attested DNS for Confidential Computing Services |
|
|
|
π¦ Artifact π Appendix |
| Treebeard: A Scalable and Fault Tolerant ORAM Datastore |
|
|
π¦ Artifact π Appendix |
|
| Trust but Verify: An Assessment of Vulnerability Tagging Services |
|
|
π¦ Artifact π Appendix |
|
| TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts |
|
|
|
π¦ Artifact π Appendix |
| URL Inspection Tasks: Helping Users Detect Phishing Links in Emails |
|
π¦ Artifact |
||
| USD: NSFW Content Detection for Text-to-Image Models via Scene Graph |
|
π¦ Artifact |
||
| Understanding How Users Prepare for and React to Smartphone Theft |
|
π¦ Artifact |
||
| Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms |
|
π¦ Artifact |
||
| Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs |
|
|
|
π¦ Artifact π Appendix |
| Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search |
|
|
π¦ Artifact π Appendix |
|
| V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads |
|
|
|
π¦ Artifact π Appendix |
| VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
| VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization |
|
π¦ Artifact |
||
| Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust |
|
|
|
π¦ Artifact π Appendix |
| VoiceWukong: Benchmarking Deepfake Voice Detection |
|
π¦ Artifact |
||
| Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses? |
|
|
|
π¦ Artifact π Appendix |
| Voting-Bloc Entropy: A New Metric for DAO Decentralization |
|
|
|
π¦ Artifact π Appendix |
| Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions |
|
|
|
π¦ Artifact π Appendix |
| Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation |
|
π¦ Artifact |
||
| Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem |
|
π¦ Artifact |
||
| Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models |
|
π¦ Artifact |
||
| We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs |
|
π¦ Artifact |
||
| Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements |
|
|
π¦ Artifact π Appendix |
|
| When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks |
|
|
|
π¦ Artifact π Appendix |
| When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs |
|
π¦ Artifact |
||
| When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems |
|
|
π¦ Artifact π Appendix |
|
| Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems |
|
|
|
π¦ Artifact π Appendix |
| X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates |
|
|
|
π¦ Artifact π Appendix |
| XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing |
|
π¦ Artifact |
||
| Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation |
|
|
|
π¦ Artifact π Appendix |
| ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency |
|
π¦ Artifact |
||
| ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference |
|
π¦ Artifact |
||
| eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem |
|
π¦ Artifact |
||
| zk-promises: Anonymous Moderation, Reputation, and Blocking |
|
π¦ Artifact |
||
| βHelps me Take the Post With a Grain of Salt:β Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X |
|
|
|
π¦ Artifact π Appendix |
| βItβs not my responsibility to write themβ: An Empirical Study of Software Product Managers and Security Requirements |
|
π¦ Artifact |
||
| βThatβs my perspective from 30 years of doing thisβ: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code |
|
π¦ Artifact |