Results
Paper | Avail. | Funct. | Repro. | Available At |
---|---|---|---|---|
The DOMino Effect: Detecting and Exploiting DOM Clobbering Gadgets via Concolic Execution with Symbolic DOM |
|
|
|
π¦ Artifact π Appendix |
"Iβm trying to learn. . . and Iβm shooting myself in the foot": Beginnersβ Struggles When Solving Binary Exploitation Exercises |
|
|
|
π¦ Artifact π Appendix |
"Threat modeling is very formal, itβs very technical, and also very hard to do correctly": Investigating Threat Modeling Practices in Open-Source Software Projects |
|
π¦ Artifact |
||
A Comprehensive Formal Security Analysis of OPC UA |
|
|
|
π¦ Artifact π Appendix |
A Crack in the Bark: Leveraging Public Knowledge to Remove Tree-Ring Watermarks |
|
|
|
π¦ Artifact π Appendix |
A First Look at Governments Enterprise Security Guidance |
|
|
|
π¦ Artifact π Appendix |
A Formal Analysis of Appleβs iMessage PQ3 Protocol |
|
|
|
π¦ Artifact π Appendix |
A Framework for Designing Provably Secure Steganography |
|
|
π¦ Artifact π Appendix |
|
A Mixed-Methods Study of Open-Source Software Maintainers On Vulnerability Management and Platform Security Features |
|
π¦ Artifact |
||
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization |
|
|
|
π¦ Artifact π Appendix |
A limited technical background is sufο¬cient for attack-defense tree acceptability |
|
|
|
π¦ Artifact π Appendix |
AGNNCert: Defending Graph Neural Networks against Arbitrary Perturbations with Deterministic Certification |
|
π¦ Artifact |
||
AKMA+: Security and Privacy-Enhanced and Standard-Compatible AKMA for 5G Communication |
|
π¦ Artifact |
||
ALERT: Machine Learning-Enhanced Risk Estimation for Databases Supporting Encrypted Queries |
|
|
π¦ Artifact π Appendix |
|
APPATCH: Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching |
|
|
π¦ Artifact π Appendix |
|
AUDIO WATERMARK: Dynamic and Harmless Watermark for Black-box Voice Dataset Copyright Protection |
|
π¦ Artifacts: 1, 2 |
||
AUTOVR: Automated UI Exploration for Detecting Sensitive Data Flow Exposures in Virtual Reality Apps |
|
|
π¦ Artifact π Appendix |
|
Achilles: A Formal Framework of Leaking Secrets from Signature Schemes via Rowhammer |
|
|
π¦ Artifact π Appendix |
|
Activation Approximations Can Incur Safety Vulnerabilities in Aligned LLMs: Comprehensive Analysis and Defense |
|
π¦ Artifact |
||
Addressing Sensitivity Distinction in Local Differential Privacy : A General Utility-Optimized Framework |
|
|
|
π¦ Artifact π Appendix |
Aion: Robust and Efficient Multi-Round Single-Mask Secure Aggregation Against Malicious Participants |
|
|
|
π¦ Artifact π Appendix |
AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features |
|
π¦ Artifact |
||
An Industry Interview Study of Software Signing for Supply Chain Security |
|
π¦ Artifact |
||
Analyzing the AI Nudification Application Ecosystem |
|
π¦ Artifact |
||
Approve Once, Regret Forever: On the Exploitation of Ethereumβs Approve-TransferFrom Ecosystem |
|
π¦ Artifact |
||
Approximation Enforced Execution of Untrusted Linux Kernel Extensions |
|
|
|
π¦ Artifact π Appendix |
Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity |
|
π¦ Artifact |
||
Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model |
|
|
π¦ Artifact π Appendix |
|
Ares: Comprehensive Path Hijacking Detection via Routing Tree |
|
|
|
π¦ Artifact π Appendix |
Ariadne: Navigating through the Labyrinth of Data-Driven Customization Inconsistencies in Android |
|
|
π¦ Artifact π Appendix |
|
Artifacts for BarraCUDA: Edge GPUs do leak DNN weights |
|
π¦ Artifact |
||
Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting |
|
|
|
π¦ Artifact π Appendix |
Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond |
|
|
|
π¦ Artifact π Appendix |
Attacker Control and Bug Prioritization |
|
|
|
π¦ Artifact π Appendix |
AudioMarkNet: Audio Watermarking for Deepfake Speech Detection |
|
π¦ Artifact |
||
Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain |
|
π¦ Artifact |
||
AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation |
|
π¦ Artifacts: 1, 2, 3, 4 |
||
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems |
|
π¦ Artifact |
||
Automated Soundness and Completeness Vetting of Polygon zkEVM |
|
π¦ Artifact |
||
Available Attestation: Towards a Reorg-Resilient Solution for Ethereum Proof-of-Stake |
|
|
|
π¦ Artifact π Appendix |
Await() a Second: Evading Control Flow Integrity by Hijacking C++ Coroutines |
|
|
|
π¦ Artifact π Appendix |
BEAT-MEV: Epochless Approach to Batched Threshold Encryption for MEV Prevention |
|
π¦ Artifact |
||
BGP Vortex: Update Message Floods Can Create Internet Instabilities |
|
|
|
π¦ Artifact π Appendix |
BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding |
|
|
|
π¦ Artifact π Appendix |
BLuEMan: A Stateful Simulation-based Fuzzing Framework for Open-Source RTOS Bluetooth Low Energy Protocol Stacks |
|
|
|
π¦ Artifact π Appendix |
Backdooring Bias ((B^2)) into Diffusion Models |
|
π¦ Artifact |
||
Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification |
|
|
|
π¦ Artifact π Appendix |
Beyond Statistical Estimation: Differentially Private Individual Computation via Shuffling |
|
π¦ Artifact |
||
Big Help or Big Brother? Auditing Tracking, Profiling, and Personalization in Generative AI Assistants |
|
|
π¦ Artifact π Appendix |
|
Blockchain Address Poisoning |
|
π¦ Artifact |
||
BlueGuard: Accelerated Host and Guest Introspection Using DPUs |
|
π¦ Artifact |
||
Boosting Gradient Leakage Attacks: Data Reconstruction in Realistic FL Settings |
|
π¦ Artifact |
||
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats |
|
|
|
π¦ Artifact π Appendix |
Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions |
|
|
|
π¦ Artifact π Appendix |
Breaking Free: Efficient Multi-Party Private Set Union Without Non-Collusion Assumptions |
|
|
|
π¦ Artifact π Appendix |
Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis |
|
π¦ Artifact |
||
Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC |
|
π¦ Artifact |
||
Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities |
|
π¦ Artifact |
||
BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup |
|
π¦ Artifact |
||
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization |
|
|
|
π¦ Artifact π Appendix |
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers |
|
π¦ Artifact |
||
Catch-22: Uncovering Compromised Hosts using SSH Public Keys |
|
|
|
π¦ Artifact π Appendix |
Censorship Evasion with Unidentified Protocol Generation |
|
π¦ Artifact |
||
CertPHash: Towards Certified Perceptual Hashing via Robust Training |
|
|
π¦ Artifact π Appendix |
|
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis |
|
|
|
π¦ Artifact π Appendix |
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains |
|
π¦ Artifact |
||
Challenging Overreach: Addressing the Discrepancy Between Mobile App Privacy Practices and User Intention |
|
π¦ Artifact |
||
Characterizing and Detecting Propaganda-Spreading Accounts on Telegram |
|
|
π¦ Artifact π Appendix |
|
Characterizing the MrDeepFakes Sexual Deepfake Marketplace |
|
π¦ Artifact |
||
Chimera: Creating Digitally Signed Fake Photos by Fooling Image Recapture and Deepfake Detectors |
|
|
|
π¦ Artifact π Appendix |
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago |
|
π¦ Artifact |
||
Cloak, Honey, Trap: Proactive Defenses Against LLM Agents |
|
π¦ Artifact |
||
CloudFlow Framework and CloudBench Suite |
|
|
|
π¦ Artifact π Appendix |
CoVault: Secure, Scalable Analytics of Personal Data |
|
|
|
π¦ Artifact π Appendix |
CollisionRepair: First-Aid and Automated Patching for Storage Collision Vulnerabilities in Smart Contracts |
|
|
|
π¦ Artifact π Appendix |
Comprehensive Deniability Analysis of Signal Handshake Protocols: X3DH, PQXDH to Fully Post-Quantum with Deniable Ring Signatures |
|
|
|
π¦ Artifact π Appendix |
Confusing Value with Enumeration: Studying the Use of CVEs in Academia |
|
π¦ Artifact |
||
Context Matters: Qualitative Insights into Developers Approaches and Challenges with Software Composition Analysis |
|
π¦ Artifact |
||
CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks |
|
|
π¦ Artifact π Appendix |
|
Cross-Modal Prompt Inversion: Unifying Threats to Text and Image Generative AI Models |
|
π¦ Artifact |
||
Current Affairs: A Security Measurement Study of CCS EV Charging Deployments |
|
|
π¦ Artifact π Appendix |
|
Cyber-Physical Deception Through Coordinated IoT Honeypots |
|
π¦ Artifact |
||
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers |
|
|
π¦ Artifact π Appendix |
|
DISPATCH: Unraveling Security Patches from Entangled Code Changes |
|
π¦ Artifact |
||
DNS FLaRE: A Flush-Reload Attack on DNS Forwarders |
|
π¦ Artifact |
||
DarkGram: A Large-Scale Analysis of Cybercriminal Activity Channels on Telegram |
|
π¦ Artifact |
||
Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning |
|
π¦ Artifact |
||
Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI |
|
π¦ Artifact |
||
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data |
|
π¦ Artifact |
||
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs |
|
π¦ Artifacts: 1, 2, 3 |
||
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments |
|
π¦ Artifacts: 1, 2 |
||
Depth Gives a False Sense of Privacy: LLM Internal States Inversion |
|
π¦ Artifact |
||
Detecting Compromise of Passkey Storage on the Cloud |
|
π¦ Artifact |
||
DiskSpy: Exploring a Long-Range Covert-Channel Attack via mmWave Sensing of Β΅m-level HDD Vibrations |
|
π¦ Artifact |
||
Disparate Privacy Vulnerability: Targeted Attribute Inference Attacks and Defenses |
|
|
|
π¦ Artifact π Appendix |
Distributed Private Aggregation in Graph Neural Networks |
|
|
π¦ Artifact π Appendix |
|
Distributional Private Information Retrieval |
|
|
|
π¦ Artifact π Appendix |
Does Finality Gadget Finalize Your Block? A Case Study of Binance Consensus |
|
|
|
π¦ Artifact π Appendix |
Dorami: Privilege Separating Security Monitor on RISC-V TEEs |
|
π¦ Artifact |
||
Dormant: Defending against Pose-driven Human Image Animation |
|
π¦ Artifact |
||
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers |
|
|
|
π¦ Artifact π Appendix |
Doubly Dangerous: Evading Phishing Reporting Systems by Leveraging Email Tracking Techniques |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience |
|
|
|
π¦ Artifact π Appendix |
ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory |
|
π¦ Artifact |
||
EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS |
|
|
π¦ Artifact π Appendix |
|
Easy As Childβs Play: An Empirical Study on Age Verification of Adult-Oriented Android Apps |
|
|
π¦ Artifact π Appendix |
|
EchoLLM: LLM-Augmented Acoustic Eavesdropping Attack on Bone Conduction Headphones with mmWave Radar |
|
π¦ Artifact |
||
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection |
|
|
π¦ Artifact π Appendix |
|
Effective PII Extraction from LLMs through Augmented Few-Shot Learning |
|
π¦ Artifact |
||
Efficient 2PC for Constant Round Secure Equality Testing and Comparisons |
|
π¦ Artifact |
||
Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV |
|
π¦ Artifact |
||
Efficient Ranking, Order Statistics, and Sorting under CKKS |
|
|
|
π¦ Artifact π Appendix |
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability |
|
π¦ Artifacts: 1, 2 |
||
EmbedX: Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models |
|
|
|
π¦ Artifact π Appendix |
Enabling Low-Cost Secure Computing on Untrusted In-Memory Architectures |
|
|
|
π¦ Artifact π Appendix |
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection |
|
|
|
π¦ Artifact π Appendix |
Encrypted Access Logging for Online Accounts: Device Attributions without Device Tracking |
|
|
π¦ Artifact π Appendix |
|
Endangered Privacy: Large-Scale Monitoring of Video Streaming Services |
|
|
|
π¦ Artifact π Appendix |
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption |
|
|
|
π¦ Artifact π Appendix |
Enhanced Label-Only Membership Inference Attacks with Fewer Queries |
|
|
|
π¦ Artifact π Appendix |
Evaluating LLM-based Personal Information Extraction and Countermeasures |
|
|
π¦ Artifact π Appendix |
|
Evaluating Privacy Policies under Modern Privacy Laws At Scale: An LLM-Based Automated Approach |
|
π¦ Artifact |
||
Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models |
|
|
|
π¦ Artifact π Appendix |
EvilEDR: Repurposing EDR as an Offensive Tool |
|
|
|
π¦ Artifact π Appendix |
Expert Insights into Advanced Persistent Threats: Analysis, Attribution, and Challenges |
|
π¦ Artifact |
||
Exploiting Inaccurate Branch History in Side-Channel Attacks |
|
|
|
π¦ Artifact π Appendix |
Exploiting Task-Level Vulnerabilities: An Automatic Jailbreak Attack and Defense Benchmarking for LLMs |
|
|||
Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health |
|
π¦ Artifact |
||
Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers |
|
|
|
π¦ Artifact π Appendix |
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China |
|
|
|
π¦ Artifact π Appendix |
Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALLΒ·E Text-to-Image Pipelines |
|
|
|
π¦ Artifact π Appendix |
FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC |
|
|
|
π¦ Artifact π Appendix |
FIXX: FInding eXploits from eXamples |
|
|
|
π¦ Artifact π Appendix |
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions |
|
π¦ Artifact |
||
Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios |
|
|
π¦ Artifact π Appendix |
|
FastLloyd: Federated, Accurate, Secure, and Tunable kk-Means Clustering with Differential Privacy |
|
π¦ Artifacts: 1, 2 |
||
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection |
|
π¦ Artifact |
||
Finding Metadata Inconsistencies in Distributed File Systems via Cross-Node Operation Modeling |
|
π¦ Artifact |
||
Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting |
|
|
|
π¦ Artifact π Appendix |
Following Devilsβ Footprint: Towards Real-time Detection of Price Manipulation Attacks |
|
π¦ Artifact |
||
Found in Translation: A Generative Language Modeling Approach to Memory Access Pattern Attacks |
|
|
|
π¦ Artifact π Appendix |
Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods |
|
π¦ Artifact |
||
From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification |
|
|
π¦ Artifact π Appendix |
|
From Constraints to Cracks: Constraint Semantic Inconsistencies as Vulnerability Beacons for Embedded Systems |
|
|
|
π¦ Artifact π Appendix |
From Meme to Threat: On the Hateful Meme Understanding and Induced Hateful Content Generation in Open-Source Vision Language Models |
|
π¦ Artifact |
||
From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components |
|
|
|
π¦ Artifacts: 1, 2, 3 π Appendix |
From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning |
|
π¦ Artifact |
||
From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception |
|
|
|
π¦ Artifact π Appendix |
Further Study on Frequency Estimation under Local Differential Privacy |
|
|
|
π¦ Artifact π Appendix |
Fuzzing the PHP Interpreter via Dataflow Fusion |
|
π¦ Artifact |
||
GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays |
|
|
|
π¦ Artifact π Appendix |
GNSS-WASP: GNSS Wide Area SPoofing |
|
π¦ Artifact |
||
GPC Web Crawler |
|
|
π¦ Artifact π Appendix |
|
GPUHammer: Rowhammer Attacks on GPU Memories are Practical |
|
|
|
π¦ Artifact π Appendix |
Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms |
|
|
|
π¦ Artifact π Appendix |
GeCos Replacing Experts: Generalizable and Comprehensible Industrial Intrusion Detection |
|
|
|
π¦ Artifact π Appendix |
GenHuzz: An Efficient Generative Hardware Fuzzer |
|
π¦ Artifact |
||
General-Purpose ff-DP Estimation and Auditing in a Black-Box Setting |
|
|
|
π¦ Artifact π Appendix |
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data |
|
|
π¦ Artifact π Appendix |
|
GlitchFHE: Attacking Fully Homomorphic Encryption Using Fault Injection |
|
π¦ Artifact |
||
Gotta Detect βEm All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks |
|
|
π¦ Artifact π Appendix |
|
GradEscape: A Gradient-Based Evader Against AI-Generated Text Detectors |
|
|
|
π¦ Artifact π Appendix |
GraphAce: Secure Two-Party Graph Analysis Achieving Communication Efficiency |
|
|
|
π¦ Artifact π Appendix |
Great, Now Write an Article About That: The Crescendo Multi-Turn LLM Jailbreak Attack |
|
π¦ Artifact |
||
H2O2RAM: A High-Performance Hierarchical Doubly Oblivious RAM |
|
|
|
π¦ Artifact π Appendix |
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System |
|
|
π¦ Artifact π Appendix |
|
HateBench: Benchmarking Hate Speech Detectors on LLM-Generated Content and Hate Campaigns |
|
|
|
π¦ Artifact π Appendix |
Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts |
|
|
π¦ Artifact π Appendix |
|
HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning |
|
|
|
π¦ Artifact π Appendix |
Hercules Droidot and the murder on the JNI Express |
|
|
|
π¦ Artifact π Appendix |
High Stakes, Low Certainty: Evaluating the Efficacy of High-Level Indicators of Compromise in Ransomware Attribution: Artifacts |
|
|
|
π¦ Artifact π Appendix |
Hobbit: Space-Efficient zkSNARK with Optimal Prover Time |
|
π¦ Artifact |
||
How Researchers De-identify Data in Practice |
|
π¦ Artifact |
||
How Transparent is Usable Privacy and Security Research? A Meta-Study on Current Research Transparency Practices |
|
|
|
π¦ Artifact π Appendix |
How to Compare Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol |
|
|
|
π¦ Artifact π Appendix |
HubBub: Contention-Based Side-channel Attacks on USB Hubs |
|
π¦ Artifact |
||
HyTrack: Resurrectable and Persistent Tracking Across Android Apps and the Web |
|
|
π¦ Artifact π Appendix |
|
Hybrid Language Processor Fuzzing via LLM-Based Constraint Solving |
|
π¦ Artifact |
||
I Cannot Write This Because It Violates Our Content Policy: Understanding Content Moderation Policies and User Experiences in Generative AI Products |
|
π¦ Artifact |
||
I have no idea how to make it safer: Studying Security and Privacy Mindsets of Browser Extension Developers |
|
|
π¦ Artifact π Appendix |
|
I wasnβt sure if this is indeed a security risk: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages |
|
π¦ Artifact |
||
IDFuzz: Intelligent Directed Grey-box Fuzzing |
|
π¦ Artifact |
||
IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran |
|
π¦ Artifact |
||
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
ImpROV: Measuring and Mitigating Collateral Damage of Route Origin Validation in RPKI |
|
π¦ Artifact |
||
Investigating the Impact of Online Community Involvement on Safety Practices and Perceived Risks Among People Who Use Drugs |
|
π¦ Artifact |
||
Invisible but Detected: Physical Adversarial Shadow Attack and Defense on LiDAR Object Detection |
|
|
π¦ Artifact π Appendix |
|
JBShield: Defending Large Language Models from Jailbreak Attacks through Activated Concept Analysis and Manipulation |
|
|
|
π¦ Artifact π Appendix |
Kintsugi: Secure Hotpatching for Code-Shadowing Real-Time Embedded Systems |
|
|
|
π¦ Artifact π Appendix |
LEMIX: Enabling Testing of Embedded Applications as Linux Applications |
|
π¦ Artifact |
||
LEO-Range: Physical Layer Design for Secure Ranging with Low Earth Orbiting Satellites |
|
π¦ Artifact |
||
LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers |
|
π¦ Artifact |
||
LLMmap: Fingerprinting for Large Language Models |
|
π¦ Artifact |
||
LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models |
|
|
π¦ Artifact π Appendix |
|
Lancet: A Formalization Framework for Crash and Exploit Pathology |
|
|
|
π¦ Artifact π Appendix |
Learning from Functionality Outputs: Private Join and Compute in the Real World |
|
|
|
π¦ Artifact π Appendix |
Lemon: Network-wide DDoS Detection with Routing-Oblivious Per-flow Measurement |
|
π¦ Artifact |
||
Lets Move2EVM |
|
|
|
π¦ Artifact π Appendix |
Levenshtein-trinary: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell |
|
|
π¦ Artifact π Appendix |
|
LightShed: Defeating Perturbation-based Image Copyright Protections |
|
π¦ Artifact |
||
Logs In, Patches Out: Automated Vulnerability Repair via Tree-of-Thought LLM Analysis |
|
|
|
π¦ Artifact π Appendix |
Lost in the Mists of Time: Expirations in DNS Footprints of Mobile Apps |
|
|
|
π¦ Artifact π Appendix |
Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators |
|
π¦ Artifact |
||
MAESTRO: Multi-party AES using Lookup Tables |
|
|
|
π¦ Artifact π Appendix |
MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers |
|
π¦ Artifact |
||
Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents |
|
π¦ Artifact |
||
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents |
|
π¦ Artifact |
||
MalGuard: Towards Real-Time, Accurate, and Actionable Detection of Malicious Packages in PyPI Ecosystem |
|
π¦ Artifact |
||
Malicious LLM-Based Conversational AI Makes Users Reveal Personal Information |
|
π¦ Artifact |
||
McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis |
|
|
|
π¦ Artifact π Appendix |
Membership Inference Attacks Against Vision-Language Models |
|
π¦ Artifact |
||
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMsβ Ethical Boundaries |
|
π¦ Artifact |
||
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink |
|
π¦ Artifact |
||
Misty Registry: An Empirical Study of Flawed Domain Registry Operation |
|
π¦ Artifact |
||
Mitigating Injection Attacks against Encrypted Applications via View-Based Partitioning |
|
π¦ Artifact |
||
More is Less: Extra Features in Contactless Payments Break Security |
|
π¦ Artifact |
||
My ZIP isnβt your ZIP: Identifying and Exploiting Semantic Gaps Between ZIP Parsers |
|
|
|
π¦ Artifact π Appendix |
NASS: Fuzzing All Native Android System Services with Interface Awareness and Coverage |
|
|
|
π¦ Artifact π Appendix |
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines |
|
π¦ Artifact |
||
Narrowbeer: A Practical Replay Attack Against the Widevine DRM |
|
|
|
π¦ Artifact π Appendix |
Navigating Cookie Consent Violations Across the Globe |
|
π¦ Artifact |
||
Navigating Security and Privacy Threats in Homeless Service Provision |
|
π¦ Artifact |
||
No Way to Sign Out? Unpacking Non-Compliance with Google Playβs App Account Deletion Requirements |
|
|
π¦ Artifact π Appendix |
|
No, I Cant Be a Security Personnel on Your Phone: Security and Privacy Threats From Sharing Infrastructure in Rural Ghana |
|
π¦ Artifact |
||
Not so Refreshing: Attacking GPUs using RFM Rowhammer Mitigation |
|
|
π¦ Artifact π Appendix |
|
Nothing is Unreachable: Automated Synthesis of Robust Code-Reuse Gadget Chains for Arbitrary Exploitation Primitives |
|
|
|
π¦ Artifact π Appendix |
OBLIVIATOR: OBLIVIous Parallel Joins and other OperATORs in Shared Memory Environments |
|
|
π¦ Artifact π Appendix |
|
ORTHRUS: Achieving High Quality of Attribution in Provenance-based Intrusion Detection Systems |
|
π¦ Artifacts: 1, 2 |
||
Oblivious Digital Tokens |
|
|
|
π¦ Artifact π Appendix |
On the Atomicity and Efficiency Blockchain Payment Channels |
|
π¦ Artifact |
||
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts |
|
π¦ Artifact |
||
OneTouch: Effortless 2FA Scheme to Secure Fingerprint Authentication with Wearable OTP Token |
|
π¦ Artifact |
||
OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries |
|
|
|
π¦ Artifact π Appendix |
PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs |
|
π¦ Artifact |
||
PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics |
|
|
|
π¦ Artifact π Appendix |
PRSA: Prompt Stealing Attacks against Real-World Prompt Services |
|
π¦ Artifact |
||
Parallelizing Universal Atomic Swaps for Multi-Chain Cryptocurrency Exchanges |
|
π¦ Artifact |
||
Passkeys in Interpersonal Threat Models: Abusability Analysis of Early Deployments |
|
π¦ Artifact |
||
Password Guessing Using Large Language Models |
|
π¦ Artifact |
||
PatchAgent: A Practical Program Repair Agent Mimicking Human Expertise |
|
π¦ Artifact |
||
Persistent Backdoor Attacks in Continual Learning |
|
π¦ Artifact |
||
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks |
|
|
|
π¦ Artifact π Appendix |
Phantom: Privacy-Preserving Deep Neural Network Model Obfuscation in Heterogeneous TEE and GPU System |
|
π¦ Artifact |
||
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations |
|
π¦ Artifact |
||
Place Protections at the Right Place: Targeted Hardening for Cryptographic Code against Spectre v1 |
|
|
|
π¦ Artifact π Appendix |
Please donβt send that bot anything: Mixed-methods Study of Personal Impersonation Attacks to Steal Digital Payments on Social Media |
|
π¦ Artifacts: 1, 2 |
||
PoiSAFL: Scalable Poisoning Attack Framework to Byzantine-resilient Semi-asynchronous Federated Learning |
|
π¦ Artifact |
||
PolySys: an Algebraic Leakage Attack Engine |
|
π¦ Artifact |
||
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands |
|
|
|
π¦ Artifact π Appendix |
Practical Keyword Private Information Retrieval from Key-to-Index Mappings |
|
|
|
π¦ Artifact π Appendix |
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption |
|
π¦ Artifact |
||
Practically Secure Honey Password Vaults: New Design and New Evaluation against Online Guessing |
|
|
|
π¦ Artifacts: 1, 2 π Appendix |
Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction |
|
|
π¦ Artifact π Appendix |
|
Pretender: Universal Active Defense against Diffusion Finetuning Attacks |
|
π¦ Artifact |
||
Preventing Automated Monitoring on Voice Data |
|
|
|
π¦ Artifact π Appendix |
Principled and Automated Approach for Investigating AR/VR Attacks |
|
π¦ Artifact |
||
PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity |
|
π¦ Artifact |
||
Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run |
|
π¦ Artifact |
||
Privacy Solution or Menace? Investigating Perceptions of Radio Frequency Sensing |
|
π¦ Artifact |
||
PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty |
|
π¦ Artifact |
||
Private Investigator: Extracting Personally Identifiable Information from Large Language Models Using Optimized Prompts |
|
|
|
π¦ Artifact π Appendix |
Prompt Obfuscation for Large Language Models |
|
|
|
π¦ Artifact π Appendix |
Provably Robust Multi-bit Watermarking for AI-generated Text |
|
π¦ Artifact |
||
Qelect: Lattice-based Single Secret Leader Election Made Practical |
|
|
|
π¦ Artifact π Appendix |
Questionnaire Data β Digital Security Perceptions & Practices in 12 Countries |
|
π¦ Artifact |
||
REVDECODE: Enhancing Binary Function Matching with Context-Aware Graph Representations and Relevance Decoding |
|
π¦ Artifacts: 1, 2, 3, 4 |
||
RangeSanitizer: Detecting Memory Errors with Efficient Range Checks |
|
|
|
π¦ Artifact π Appendix |
Recover from Excessive Faults in Partially-Synchronous BFT SMR |
|
|
π¦ Artifact π Appendix |
|
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective |
|
π¦ Artifact |
||
Red Bleed: A Pragmatic Near-Infrared Presentation Attack on Facial Biometric Authentication Systems |
|
|
|
π¦ Artifact π Appendix |
Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning |
|
π¦ Artifact |
||
Refusal Is Not an Option: Unlearning Safety Alignment of Large Language Models |
|
|
|
π¦ Artifact π Appendix |
Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act |
|
π¦ Artifact |
||
Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels |
|
|
|
π¦ Artifact π Appendix |
Replication Package of ELFuzz |
|
|
π¦ Artifact π Appendix |
|
Revisiting Training-Inference Trigger Intensity in Backdoor Attacks |
|
|
|
π¦ Artifact π Appendix |
Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback |
|
|
π¦ Artifact π Appendix |
|
Robustifying ML-powered Network Classifiers with PANTS |
|
|
|
π¦ Artifact π Appendix |
RollingEvidence: Autoregressive Video Evidence via Rolling Shutter Effect |
|
π¦ Artifacts: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 |
||
Rowhammer-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs |
|
|
|
π¦ Artifact π Appendix |
S/MINE: Collecting and Analyzing S/MIME Certificates at Scale |
|
|
|
π¦ Artifact π Appendix |
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution |
|
|
|
π¦ Artifact π Appendix |
SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference |
|
π¦ Artifact |
||
SLOTHE : Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data |
|
π¦ Artifact |
||
SNI5GECT: A Practical Approach to Inject aNRchy into 5G NR |
|
|
|
π¦ Artifact π Appendix |
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks |
|
π¦ Artifact |
||
STEK Sharing is Not Caring: Bypassing TLS Authentication in Web Servers using Session Tickets |
|
|
|
π¦ Artifact π Appendix |
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis |
|
|
π¦ Artifact π Appendix |
|
Save what must be saved: Secure context switching with Sailor |
|
|
|
π¦ Artifact π Appendix |
Scalable Collaborative zk-SNARK and Its Application to Fully Distributed Proof Delegation |
|
|
|
π¦ Artifact π Appendix |
Scanned and Scammed: Insecurity by ObsQRity? Measuring User Susceptibility and Awareness of QR Code-Based Attacks |
|
π¦ Artifact |
||
Scoop: Mitigation of Recapture Attacks on Provenance-Based Media Authentication |
|
|
|
π¦ Artifact π Appendix |
Secure Caches for Compartmentalized Software |
|
π¦ Artifact |
||
Secure Information Embedding in Forensic 3D Fingerprinting |
|
π¦ Artifact |
||
Security Implications of Malicious G-Codes in 3D Printing |
|
π¦ Artifact |
||
Security and Privacy Advice for UPI Users in India |
|
π¦ Artifact |
||
Seeing Through: Analyzing and Attacking Virtual Backgrounds in Video Calls |
|
|
|
π¦ Artifact π Appendix |
Self-interpreting Adversarial Images |
|
|
|
π¦ Artifact π Appendix |
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner |
|
π¦ Artifact |
||
Serverless Functions Made Confidential and Efficient with Split Containers |
|
|
|
π¦ Artifact π Appendix |
Shadowed Realities: An Investigation of UI Attacks in WebXR |
|
π¦ Artifact |
||
Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption |
|
|
|
π¦ Artifact π Appendix |
Sharpness-Aware Initialization: Improving Differentially Private Machine Learning from First Principles |
|
π¦ Artifact |
||
Shechi: A Secure Distributed Computation Compiler Based on Multiparty Homomorphic Encryption |
|
|
π¦ Artifact π Appendix |
|
Shimmer: a Provably Secure Steganography Based on Entropy Collecting Mechanism |
|
π¦ Artifact |
||
Shortcut Measurement Codes |
|
|
|
π¦ Artifact π Appendix |
SoK: Automated TTP Extraction from CTI Reports β Are We There Yet? |
|
|
|
π¦ Artifact π Appendix |
SoK: Automated Vulnerability Repair: Methods, Tools, and Assessments |
|
π¦ Artifact |
||
SoK: Can Synthetic Images Replace Real Data? A Survey of Utility and Privacy of Synthetic Image Generation |
|
π¦ Artifact |
||
SoK: Come Together β Unifying Security, Information Theory, and Cognition for a Mixed Reality Deception Attack Ontology & Analysis Framework |
|
π¦ Artifact |
||
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark |
|
π¦ Artifact |
||
SoK: Efficiency Robustness of Dynamic Deep Learning Systems |
|
π¦ Artifact |
||
SoK: Machine Learning for Misinformation Detection |
|
|
|
π¦ Artifact π Appendix |
SoK: On Gradient Leakage in Federated Learning |
|
π¦ Artifact |
||
SoK: So, You Think You Know All About Secure Randomized Caches? |
|
|
|
π¦ Artifact π Appendix |
SoK: Towards Effective Security Patch Generation |
|
π¦ Artifact |
||
SoK: Towards a Unified Approach of Applied Replicability for Computer Security |
|
π¦ Artifact |
||
SoK: Understanding zk-SNARKs: The Gap Between Research and Practice |
|
|
π¦ Artifact π Appendix |
|
Software Availability Protection in Cyber-Physical Systems |
|
|
π¦ Artifact π Appendix |
|
Sometimes Simpler is Better: A Comprehensive Analysis of State-of-the-Art Provenance-Based Intrusion Detection Systems |
|
|
π¦ Artifact π Appendix |
|
Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis |
|
|
π¦ Artifact π Appendix |
|
Sound of Interference: Electromagnetic Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation |
|
|
|
π¦ Artifact π Appendix |
SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
Stack Overflow Meets Replication: Security Research Amid Evolving Code Snippets |
|
|
|
π¦ Artifact π Appendix |
Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning |
|
|
|
π¦ Artifact π Appendix |
Surviving in Dark Forest: Towards Evading the Attacks from Front-Running Bots in Application Layer |
|
|
|
π¦ Artifact π Appendix |
Synthesis of Code-Reuse Attacks from p-code Programs |
|
|
|
π¦ Artifact π Appendix |
Synthetic Artifact Auditing: Tracing LLM-Generated Synthetic Data Usage in Downstream Applications |
|
π¦ Artifact |
||
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System |
|
|
|
π¦ Artifact π Appendix |
Systematic Evaluation of Randomized Cache Designs against Occupancy Attack |
|
|
π¦ Artifact π Appendix |
|
TAPAS: An Efficient Online APT Detection with Task-guided Process Provenance Graph Segmentation and Analysis |
|
π¦ Artifact |
||
TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX |
|
π¦ Artifact |
||
TEEcorrelate: An Information-Preserving Defense against Performance Counter Attacks on TEEs |
|
|
|
π¦ Artifact π Appendix |
TETD: Trusted Execution in Trust Domains |
|
π¦ Artifact |
||
THEMIS: Towards Practical Intellectual Property Protection for Post-Deployment On-Device Deep Learning Models |
|
π¦ Artifact |
||
TLBlur: Compiler-Assisted Automated Hardening against Controlled Channels on Off-the-Shelf Intel SGX Platforms |
|
|
|
π¦ Artifact π Appendix |
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network |
|
|
π¦ Artifact π Appendix |
|
TRex: Practical Type Reconstruction for Binary Code |
|
|
|
π¦ Artifact π Appendix |
TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs |
|
|
|
π¦ Artifact π Appendix |
Tady: A Neural Disassembler without Structural Constraint Violations |
|
|
|
π¦ Artifact π Appendix |
TapTrap: Animation-Driven Tapjacking on Android |
|
|
|
π¦ Artifact π Appendix |
The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks |
|
|
|
π¦ Artifact π Appendix |
The Ransomware Decade: The Creation of a Fine-Grained Dataset and a Longitudinal Study |
|
π¦ Artifact |
||
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing |
|
π¦ Artifact |
||
Third Party Private Set Operations |
|
π¦ Artifact |
||
TockOwl: Asynchronous Consensus with Fault and Network Adaptability |
|
π¦ Artifact |
||
Too Much of a Good Thing: (In-)Security of Mandatory Security Software for Financial Services in South Korea |
|
π¦ Artifact |
||
Topic-FlipRAG: Topic-Orientated Adversarial Opinion Manipulation Attacks to Retrieval-Augmented Generation Models |
|
|
|
π¦ Artifact π Appendix |
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation |
|
π¦ Artifact |
||
Towards Internet-Based State Learning of TLS State Machines |
|
|
|
π¦ Artifact π Appendix |
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models |
|
π¦ Artifact |
||
Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Unlearning Completeness |
|
π¦ Artifact |
||
Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict |
|
|
|
π¦ Artifact π Appendix |
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification |
|
π¦ Artifact |
||
Towards a Re-evaluation of Data Forging Attacks in Practice |
|
π¦ Artifact |
||
TracLLM: A Generic Framework for Attributing Long Context LLMs |
|
π¦ Artifact |
||
Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple AirTag Without Root Privileges |
|
|
|
π¦ Artifact π Appendix |
Tracking the Takes and Trajectories of News Narratives from Trustworthy and Worrisome Websites |
|
π¦ Artifact |
||
Transparent Attested DNS for Confidential Computing Services |
|
|
|
π¦ Artifact π Appendix |
Treebeard: A Scalable and Fault Tolerant ORAM Datastore |
|
|
π¦ Artifact π Appendix |
|
Trust but Verify: An Assessment of Vulnerability Tagging Services |
|
|
π¦ Artifact π Appendix |
|
TwinBreak: Jailbreaking LLM Security Alignments based on Twin Prompts |
|
|
|
π¦ Artifact π Appendix |
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails |
|
π¦ Artifact |
||
USD: NSFW Content Detection for Text-to-Image Models via Scene Graph |
|
π¦ Artifact |
||
Understanding How Users Prepare for and React to Smartphone Theft |
|
π¦ Artifact |
||
Universal Cross-app Attacks: Exploiting and Securing OAuth 2.0 in Integration Platforms |
|
π¦ Artifact |
||
Unlocking the Power of Differentially Private Zeroth-order Optimization for Fine-tuning LLMs |
|
|
|
π¦ Artifact π Appendix |
Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search |
|
|
π¦ Artifact π Appendix |
|
V-ORAM: A Versatile and Adaptive ORAM Framework with Service Transformation for Dynamic Workloads |
|
|
|
π¦ Artifact π Appendix |
VAPD: An Anomaly Detection Model for PDF Malware Forensics with Adversarial Robustness |
|
|
π¦ Artifacts: 1, 2 π Appendix |
|
VULCANBOOST: Boosting ReDoS Fixes through Symbolic Representation and Feature Normalization |
|
π¦ Artifact |
||
Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust |
|
|
|
π¦ Artifact π Appendix |
VoiceWukong: Benchmarking Deepfake Voice Detection |
|
π¦ Artifact |
||
Voluntary Investment, Mandatory Minimums, or Cyber Insurance: What minimizes losses? |
|
|
|
π¦ Artifact π Appendix |
Voting-Bloc Entropy: A New Metric for DAO Decentralization |
|
|
|
π¦ Artifact π Appendix |
Vulnerability of Text-Matching in ML/AI Conference Reviewer Assignments to Collusions |
|
|
|
π¦ Artifact π Appendix |
Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation |
|
π¦ Artifact |
||
Watch Out Your TV Box: Reversing and Blocking a P2P-based Illegal Streaming Ecosystem |
|
π¦ Artifact |
||
Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models |
|
π¦ Artifact |
||
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs |
|
π¦ Artifact |
||
Web Execution Bundles: Reproducible, Accurate, and Archivable Web Measurements |
|
|
π¦ Artifact π Appendix |
|
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks |
|
|
|
π¦ Artifact π Appendix |
When LLMs Go Online: The Emerging Threat of Web-Enabled LLMs |
|
π¦ Artifact |
||
When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems |
|
|
π¦ Artifact π Appendix |
|
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems |
|
|
|
π¦ Artifact π Appendix |
X.509DoS: Exploiting and Detecting Denial-of-Service Vulnerabilities in Cryptographic Libraries using Crafted X.509 Certificates |
|
|
|
π¦ Artifact π Appendix |
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing |
|
π¦ Artifact |
||
Your Shield is My Sword: A Persistent Denial-of-Service Attack via the Reuse of Unvalidated Caches in DNSSEC Validation |
|
|
|
π¦ Artifact π Appendix |
ZIPPER: Static Taint Analysis for PHP Applications with Precision and Efficiency |
|
π¦ Artifact |
||
ZK-GPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference |
|
π¦ Artifact |
||
eSIMplicity or eSIMplification? Privacy and Security Risks in the eSIM Ecosystem |
|
π¦ Artifact |
||
zk-promises: Anonymous Moderation, Reputation, and Blocking |
|
π¦ Artifact |
||
βHelps me Take the Post With a Grain of Salt:β Soft Moderation Effects on Accuracy Perceptions and Sharing Intentions of Inauthentic Political Content on X |
|
|
|
π¦ Artifact π Appendix |
βItβs not my responsibility to write themβ: An Empirical Study of Software Product Managers and Security Requirements |
|
π¦ Artifact |
||
βThatβs my perspective from 30 years of doing thisβ: An Interview Study on Practices, Experiences, and Challenges of Updating Cryptographic Code |
|
π¦ Artifact |