Results
Paper | Avail. | Funct. | Repro. | Available At |
---|---|---|---|---|
The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM |
|
|
|
π¦ Artifact π Appendix |
"Iβm trying to learn. . . and Iβm shooting myself in the foot": Beginnersβ Struggles When Solving Binary Exploitation Exercises |
|
|
|
π¦ Artifact π Appendix |
"Threat modeling is very formal, itβs very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects |
|
π¦ Artifact |
||
A Comprehensive Formal Security Analysis of OPC UA |
|
|
|
π¦ Artifact π Appendix |
A Formal Analysis of Appleβs iMessage PQ3 Protocol |
|
|
|
π¦ Artifact π Appendix |
A Framework for Designing Provably Secure Steganography |
|
|
π¦ Artifact π Appendix |
|
A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features |
|
π¦ Artifact |
||
A limited technical background is sufο¬cient for attack-defense tree acceptability |
|
|
|
π¦ Artifact π Appendix |
AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification |
|
π¦ Artifact |
||
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication |
|
π¦ Artifact |
||
ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries |
|
|
π¦ Artifact π Appendix |
|
APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching |
|
|
π¦ Artifact π Appendix |
|
AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection |
|
π¦ Artifacts: 1, 2 |
||
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer |
|
|
π¦ Artifact π Appendix |
|
An Industry Interview Study of Software Signing for Supply Chain Security |
|
π¦ Artifact |
||
Analyzing the AI Nudification Application Ecosystem |
|
π¦ Artifact |
||
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity |
|
π¦ Artifact |
||
Artifacts for BarraCUDA: Edge GPUs do leak DNN weights |
|
π¦ Artifact |
||
Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting |
|
|
|
π¦ Artifact π Appendix |
Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond |
|
|
|
π¦ Artifact π Appendix |
Attacker Control and Bug Prioritization |
|
|
|
π¦ Artifact π Appendix |
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection |
|
π¦ Artifact |
||
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain |
|
π¦ Artifact |
||
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake |
|
|
|
π¦ Artifact π Appendix |
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines |
|
|
|
π¦ Artifact π Appendix |
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention |
|
π¦ Artifact |
||
BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding |
|
|
|
π¦ Artifact π Appendix |
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling |
|
π¦ Artifact |
||
BlueGuard: Accelerated Host and Guest Introspection Using DPUs |
|
π¦ Artifact |
||
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats |
|
|
|
π¦ Artifact π Appendix |
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions |
|
|
|
π¦ Artifact π Appendix |
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup |
|
π¦ Artifact |
||
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization |
|
|
|
π¦ Artifact π Appendix |
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers |
|
π¦ Artifact |
||
Catch-22: Uncovering Compromised Hosts using SSH Public Keys |
|
|
|
π¦ Artifact π Appendix |
CertPHash: Towards Certified Perceptual Hashing via Robust Training |
|
|
π¦ Artifact π Appendix |
|
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains |
|
π¦ Artifact |
||
Challenging Overreach: Addressing the Discrepancy Between Mobile App Privacy Practices and User Intention |
|
π¦ Artifact |
||
Characterizing and Detecting Propaganda-Spreading Accounts on Telegram |
|
|
π¦ Artifact π Appendix |
|
Characterizing the MrDeepFakes Sexual Deepfake Marketplace |
|
π¦ Artifact |
||
Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors |
|
|
|
π¦ Artifact π Appendix |
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago |
|
π¦ Artifact |
||
CoVault: Secure, Scalable Analytics of Personal Data |
|
|
|
π¦ Artifact π Appendix |
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks |
|
|
π¦ Artifact π Appendix |
|
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments |
|
|
π¦ Artifact π Appendix |
|
Cyber-Physical Deception Through Coordinated IoT Honeypots |
|
π¦ Artifact |
||
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers |
|
|
π¦ Artifact π Appendix |
|
DISPATCH: Unraveling Security Patches from Entangled Code Changes |
|
π¦ Artifact |
||
DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram |
|
π¦ Artifact |
||
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning |
|
π¦ Artifact |
||
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI |
|
π¦ Artifact |
||
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data |
|
π¦ Artifact |
||
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs |
|
π¦ Artifacts: 1, 2, 3 |
||
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments |
|
π¦ Artifacts: 1, 2 |
||
Detecting Compromise of Passkey Storage on the Cloud |
|
π¦ Artifact |
||
DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of Β΅m-level HDD Vibrations |
|
π¦ Artifact |
||
Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses |
|
|
|
π¦ Artifact π Appendix |
Distributed Private Aggregation in Graph Neural Networks |
|
|
π¦ Artifact π Appendix |
|
Distributional Private Information Retrieval |
|
|
|
π¦ Artifact π Appendix |
Dorami: Privilege Separating Security Monitor on RISC-V TEEs |
|
π¦ Artifact |
||
Dormant: Defending against Pose-driven Human Image Animation |
|
π¦ Artifact |
||
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers |
|
|
|
π¦ Artifact π Appendix |
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience |
|
|
|
π¦ Artifact π Appendix |
Easy As Childβs Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps |
|
|
π¦ Artifact π Appendix |
|
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection |
|
|
π¦ Artifact π Appendix |
|
Efficient 2PC for Constant Round Secure Equality Testing and Comparisons |
|
π¦ Artifact |
||
Efficient Ranking, Order Statistics, and Sorting under CKKS |
|
|
|
π¦ Artifact π Appendix |
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability |
|
π¦ Artifacts: 1, 2 |
||
Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures |
|
|
|
π¦ Artifact π Appendix |
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection |
|
|
|
π¦ Artifact π Appendix |
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking |
|
|
π¦ Artifact π Appendix |
|
Endangered Privacy: Large-Scale Monitoring of Video Streaming Services |
|
|
|
π¦ Artifact π Appendix |
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption |
|
|
|
π¦ Artifact π Appendix |
Enhanced Label-Only Membership Inference Attacks with Fewer Queries |
|
|
|
π¦ Artifact π Appendix |
Evaluating LLM-based Personal Information Extraction and Countermeasures |
|
|
π¦ Artifact π Appendix |
|
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models |
|
|
|
π¦ Artifact π Appendix |
EvilEDR: Repurposing EDR as an Offensive Tool |
|
|
|
π¦ Artifact π Appendix |
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges |
|
π¦ Artifact |
||
Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALLΒ·E Text-to-Image Pipelines |
|
|
|
π¦ Artifact π Appendix |
FIXX: FInding eXploits from eXamples |
|
|
|
π¦ Artifact π Appendix |
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions |
|
π¦ Artifact |
||
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios |
|
|
π¦ Artifact π Appendix |
|
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection |
|
π¦ Artifact |
||
Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling |
|
π¦ Artifact |
||
Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting |
|
|
|
π¦ Artifact π Appendix |
Following Devilsβ Footprint: Towards Real-time Detection of Price Manipulation Attacks |
|
π¦ Artifact |
||
From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification |
|
|
π¦ Artifact π Appendix |
|
From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models |
|
π¦ Artifact |
||
Further Study on Frequency Estimation under Local Differential Privacy |
|
|
|
π¦ Artifact π Appendix |
Fuzzing the PHP Interpreter via Dataflow Fusion |
|
π¦ Artifact |
||
GNSS-WASP: GNSS Wide Area SPoofing |
|
π¦ Artifact |
||
GPC Web Crawler |
|
|
π¦ Artifact π Appendix |
|
GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection |
|
|
|
π¦ Artifact π Appendix |
GenHuzz: An Efficient Generative Hardware Fuzzer |
|
π¦ Artifact |
||
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data |
|
|
π¦ Artifact π Appendix |
|
Gotta Detect βEm All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks |
|
|
π¦ Artifact π Appendix |
|
GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency |
|
|
|
π¦ Artifact π Appendix |
Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack |
|
π¦ Artifact |
||
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM |
|
|
|
π¦ Artifact π Appendix |
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System |
|
|
π¦ Artifact π Appendix |
|
HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns |
|
|
|
π¦ Artifact π Appendix |
HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning |
|
|
|
π¦ Artifact π Appendix |
High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts |
|
|
|
π¦ Artifact π Appendix |
How Researchers De-identify Data in Practice |
|
π¦ Artifact |
||
HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web |
|
|
π¦ Artifact π Appendix |
|
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection |
|
|
π¦ Artifact π Appendix |
|
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation |
|
|
|
π¦ Artifact π Appendix |
LLMmap: Fingerprinting for Large Language Models |
|
π¦ Artifact |
||
Learning from Functionality Outputs: Private Join and Compute in the Real World |
|
|
|
π¦ Artifact π Appendix |
Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement |
|
π¦ Artifact |
||
LightShed: Defeating Perturbation-based Image Copyright Protections |
|
π¦ Artifact |
||
Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps |
|
|
|
π¦ Artifact π Appendix |
Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators |
|
π¦ Artifact |
||
MAESTRO: Multi-party AES using Lookup Tables |
|
|
|
π¦ Artifact π Appendix |
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers |
|
π¦ Artifact |
||
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents |
|
π¦ Artifact |
||
Membership Inference Attacks Against Vision-Language Models |
|
π¦ Artifact |
||
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink |
|
π¦ Artifact |
||
Misty Registry: An Empirical Study of Flawed Domain Registry Operation |
|
π¦ Artifact |
||
More is Less: Extra Features in Contactless Payments Break Security |
|
π¦ Artifact |
||
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines |
|
π¦ Artifact |
||
Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation |
|
|
π¦ Artifact π Appendix |
|
Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives |
|
|
|
π¦ Artifact π Appendix |
OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments |
|
|
π¦ Artifact π Appendix |
|
ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems |
|
π¦ Artifacts: 1, 2 |
||
Oblivious Digital Tokens |
|
|
|
π¦ Artifact π Appendix |
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts |
|
π¦ Artifact |
||
OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token |
|
π¦ Artifact |
||
PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs |
|
π¦ Artifact |
||
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics |
|
|
|
π¦ Artifact π Appendix |
Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments |
|
π¦ Artifact |
||
Persistent Backdoor Attacks in Continual Learning |
|
π¦ Artifact |
||
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks |
|
|
|
π¦ Artifact π Appendix |
Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System |
|
π¦ Artifact |
||
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning |
|
π¦ Artifact |
||
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands |
|
|
|
π¦ Artifact π Appendix |
Practical Keyword Private Information Retrieval from Key-to-Index Mappings |
|
|
|
π¦ Artifact π Appendix |
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption |
|
π¦ Artifact |
||
Pretender: Universal Active Defense against Diffusion Finetuning Attacks |
|
π¦ Artifact |
||
Principled and Automated Approach for Investigating AR/VR Attacks |
|
π¦ Artifact |
||
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run |
|
π¦ Artifact |
||
Provably Robust Multi-bit Watermarking for AI-generated Text |
|
π¦ Artifact |
||
Qelect: Lattice-based Single Secret Leader Election Made Practical |
|
|
|
π¦ Artifact π Appendix |
Questionnaire Data β Digital Security Perceptions & Practices in 12 Countries |
|
π¦ Artifact |
||
RangeSanitizer: Detecting Memory Errors with Efficient Range Checks |
|
|
|
π¦ Artifact π Appendix |
Recover from Excessive Faults in Partially-Synchronous BFT SMR |
|
|
π¦ Artifact π Appendix |
|
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks |
|
|
|
π¦ Artifact π Appendix |
Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback |
|
|
π¦ Artifact π Appendix |
|
Robustifying ML-powered Network Classifiers with PANTS |
|
|
|
π¦ Artifact π Appendix |
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis |
|
|
π¦ Artifact π Appendix |
|
Secure Caches for Compartmentalized Software |
|
π¦ Artifact |
||
Secure Information Embedding in Forensic 3D Fingerprinting |
|
π¦ Artifact |
||
Security Implications of Malicious G-Codes in 3D Printing |
|
π¦ Artifact |
||
Security and Privacy Advice for UPI Users in India |
|
π¦ Artifact |
||
Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls |
|
|
|
π¦ Artifact π Appendix |
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner |
|
π¦ Artifact |
||
Serverless Functions Made Confidential and Efficient with Split Containers |
|
|
|
π¦ Artifact π Appendix |
Shadowed Realities: An Investigation of UI Attacks in WebXR |
|
π¦ Artifact |
||
Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption |
|
|
π¦ Artifact π Appendix |
|
SoK: Come Together β Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework |
|
π¦ Artifact |
||
SoK: On Gradient Leakage in Federated Learning |
|
π¦ Artifact |
||
SoK: Towards Effective Security Patch Generation |
|
π¦ Artifact |
||
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice |
|
|
π¦ Artifact π Appendix |
|
Software Availability Protection in Cyber-Physical Systems |
|
|
π¦ Artifact π Appendix |
|
Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis |
|
|
π¦ Artifact π Appendix |
|
Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation |
|
|
|
π¦ Artifact π Appendix |
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets |
|
|
|
π¦ Artifact π Appendix |
Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning |
|
|
|
π¦ Artifact π Appendix |
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer |
|
|
|
π¦ Artifact π Appendix |
Synthesis of Code-Reuse Attacks from p-code Programs |
|
|
|
π¦ Artifact π Appendix |
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications |
|
π¦ Artifact |
||
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System |
|
|
|
π¦ Artifact π Appendix |
Systematic Evaluation of Randomized Cache Designs against Occupancy Attack |
|
|
π¦ Artifact π Appendix |
|
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models |
|
π¦ Artifact |
||
TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms |
|
|
|
π¦ Artifact π Appendix |
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network |
|
|
π¦ Artifact π Appendix |
|
TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs |
|
|
|
π¦ Artifact π Appendix |
The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks |
|
|
|
π¦ Artifact π Appendix |
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing |
|
π¦ Artifact |
||
Third Party Private Set Operations |
|
π¦ Artifact |
||
TockOwl: Asynchronous Consensus with Fault and Network Adaptability |
|
π¦ Artifact |
||
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea |
|
π¦ Artifact |
||
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation |
|
π¦ Artifact |
||
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models |
|
π¦ Artifact |
||
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification |
|
π¦ Artifact |
||
Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges |
|
|
|
π¦ Artifact π Appendix |
Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites |
|
π¦ Artifact |
||
Trust but Verify: An Assessment of Vulnerability Tagging Services |
|
|
π¦ Artifact π Appendix |
|
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails |
|
π¦ Artifact |
||
Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms |
|
π¦ Artifact |
||
V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads |
|
|
|
π¦ Artifact π Appendix |
VoiceWukong: Benchmarking Deepfake Voice Detection |
|
π¦ Artifact |
||
Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses? |
|
|
|
π¦ Artifact π Appendix |
Voting-Bloc Entropy: A New Metric for DAO Decentralization |
|
|
|
π¦ Artifact π Appendix |
Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation |
|
π¦ Artifact |
||
Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models |
|
π¦ Artifact |
||
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs |
|
π¦ Artifact |
||
Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements |
|
|
π¦ Artifact π Appendix |
|
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks |
|
|
|
π¦ Artifact π Appendix |
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs |
|
π¦ Artifact |
||
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems |
|
|
π¦ Artifact π Appendix |
|
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems |
|
|
|
π¦ Artifact π Appendix |
X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates |
|
|
|
π¦ Artifact π Appendix |
ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference |
|
π¦ Artifact |
||
zk-promises: Anonymous Moderation, Reputation, and Blocking |
|
π¦ Artifact |
||
βThatβs my perspective from 30 years of doing thisβ: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code |
|
π¦ Artifact |