![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
30th CCS 2024: Salt Lake City, UT, USA
- Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3
Keynote Talks
- Dan Boneh
:
Cryptography and Computer Security: A View From the Year 2100. 1 - Gene Tsudik
:
Staving off the IoT Armageddon. 2-3
Session 1-1: Verification, Secure Architectures, and Network Security
- Felix A. Wolf
, Peter Müller:
Verifiable Security Policies for Distributed Systems. 4-18 - Hans Winderix
, Marton Bognar
, Lesly-Ann Daniel
, Frank Piessens
:
Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors. 19-33 - Qiyuan Zhao
, George Pîrlea
, Karolina Grzeszkiewicz
, Seth Gilbert
, Ilya Sergey
:
Compositional Verification of Composite Byzantine Protocols. 34-48 - Jens Frieß
, Donika Mirdita
, Haya Schulmann
, Michael Waidner
:
Byzantine-Secure Relying Party for Resilient RPKI. 49-63
Session 1-2: HW & CPS: Microarchitectural Attacks and Side Channels
- Hyerean Jang
, Taehun Kim
, Youngjoo Shin
:
SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon. 64-78 - Luca Wilke
, Florian Sieck
, Thomas Eisenbarth
:
TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX. 79-93 - Fabian Rauscher
, Daniel Gruss
:
Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs. 94-108 - Gal Horowitz
, Eyal Ronen
, Yuval Yarom
:
Spec-o-Scope: Cache Probing at Cache Speed. 109-123
Session 1-3: ML and Security: Machine Learning for Security
- Keane Lucas
, Weiran Lin
, Lujo Bauer
, Michael K. Reiter
, Mahmood Sharif
:
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months. 124-138 - Mingqi Lv
, Hongzhe Gao
, Xuebo Qiu
, Tieming Chen
, Tiantian Zhu
, Jinyin Chen
, Shouling Ji
:
TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning. 139-152 - Tianfang Zhang
, Qiufan Ji
, Zhengkun Ye
, Md Mojibur Rahman Redoy Akanda
, Ahmed Tanvir Mahdad
, Cong Shi
, Yan Wang
, Nitesh Saxena
, Yingying Chen
:
SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures. 153-167 - Andy Zhou
, Xiaojun Xu
, Ramesh Raghunathan
, Alok Lal
, Xinze Guan
, Bin Yu
, Bo Li
:
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data. 168-182
Session 1-4: HW & CPS: (Micro)Architecture Security
- Stavros Volos
, Cédric Fournet, Jana Hofmann
, Boris Köpf
, Oleksii Oleksenko
:
Principled Microarchitectural Isolation on Cloud CPUs. 183-197 - Yongho Song
, Byeongsu Woo
, Youngkwang Han
, Brent ByungHoon Kang
:
Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software. 198-212 - Katharina Ceesay-Seitz
, Flavien Solt
, Kaveh Razavi
:
μCFI: Formal Verification of Microarchitectural Control-flow Integrity. 213-227 - Rei Ueno
, Hiromichi Haneda
, Naofumi Homma
, Akiko Inoue
, Kazuhiko Minematsu
:
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. 228-242
Session 1-5: Privacy and Anonymity: Privacy in Federated ML
- Shuangqing Xu
, Yifeng Zheng
, Zhongyun Hua
:
Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy. 243-257 - Bokang Zhang
, Yanglin Zhang
, Zhikun Zhang
, Jinglan Yang
, Lingying Huang
, Junfeng Wu
:
S2NeRF: Privacy-preserving Training Framework for NeRF. 258-272 - Johannes Liebenow
, Yara Schütt
, Tanya Braun
, Marcel Gehrke
, Florian Thaeter
, Esfandiar Mohammadi
:
$DPM: $ Clustering Sensitive Data through Separation. 273-287 - Thorsten Peinemann
, Moritz Kirschte
, Joshua Stock
, Carlos Cotrini
, Esfandiar Mohammadi
:
S-BDT: Distributed Differentially Private Boosted Decision Trees. 288-302
Session 1-6: Privacy and Anonymity: Differential Privacy I
- Junxu Liu
, Jian Lou
, Li Xiong
, Jinfei Liu
, Xiaofeng Meng
:
Cross-silo Federated Learning with Record-level Personalized Differential Privacy. 303-317 - Yucheng Fu
, Tianhao Wang
:
Benchmarking Secure Sampling Protocols for Differential Privacy. 318-332 - Yuting Liang
, Ke Yi
:
Smooth Sensitivity for Geo-Privacy. 333-347 - Jacob Imola
, Amrita Roy Chowdhury
, Kamalika Chaudhuri
:
Metric Differential Privacy at the User-Level via the Earth-Mover's Distance. 348-362
Session 1-7: Blockchains, Authentication, and Distributed Systems
- Lucianna Kiffer
, Joachim Neu
, Srivatsan Sridhar
, Aviv Zohar
, David Tse
:
Nakamoto Consensus under Bounded Processing Capacity. 363-377 - Sarisht Wadhwa
, Luca Zanolini
, Aditya Asgaonkar
, Francesco D'Amato
, Chengrui Fang
, Fan Zhang
, Kartik Nayak
:
Data Independent Order Policy Enforcement: Limitations and Solutions. 378-392 - Lukas Aumayr
, Zeta Avarikioti
, Matteo Maffei
, Subhra Mazumdar
:
Securing Lightning Channels against Rational Miners. 393-407 - Deepak Maram
, Mahimna Kelkar
, Ittay Eyal
:
Interactive Multi-Credential Authentication. 408-422
Session 2-1: Network Security: The Internet Infrastructure
- Xiyuan Zhao
, Xinhao Deng
, Qi Li
, Yunpeng Liu
, Zhuotao Liu
, Kun Sun
, Ke Xu
:
Towards Fine-Grained Webpage Fingerprinting at Scale. 423-436 - Abhishek Bhaskar
, Paul Pearce
:
Understanding Routing-Induced Censorship Changes Globally. 437-451 - Yuejia Liang
, Jianjun Chen
, Run Guo
, Kaiwen Shen
, Hui Jiang
, Man Hou
, Yue Yu
, Haixin Duan
:
Internet's Invisible Enemy: Detecting and Measuring Web Cache Poisoning in the Wild. 452-466 - Jiahe Zhang
, Jianjun Chen
, Qi Wang
, Hangyu Zhang
, Chuhan Wang
, Jianwei Zhuge
, Haixin Duan
:
Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors. 467-481 - Xiaofan Li
, Yacong Gu
, Chu Qiao
, Zhenkai Zhang
, Daiping Liu
, Lingyun Ying
, Haixin Duan
, Xing Gao
:
Toward Understanding the Security of Plugins in Continuous Integration Services. 482-496 - Elias Heftrig
, Haya Schulmann
, Niklas Vogel
, Michael Waidner
:
The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC. 497-510
Session 2-2: Web Security I
- Penghui Li
, Mingxue Zhang
:
FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache. 511-524 - Zidong Zhang
, Qinsheng Hou
, Lingyun Ying
, Wenrui Diao
, Yacong Gu
, Rui Li
, Shanqing Guo
, Haixin Duan
:
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs. 525-539 - Ronghai Yang
, Xianbo Wang
, Kaixuan Luo
, Xin Lei
, Ke Li
, Jiayuan Xin
, Wing Cheong Lau
:
SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks. 540-554 - Kailun Yan
, Xiaokuan Zhang
, Wenrui Diao
:
Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication. 555-569 - Changhua Luo
, Penghui Li
, Wei Meng
, Chao Zhang
:
Test Suites Guided Vulnerability Validation for Node.js Applications. 570-584 - Zhiyong Guo
, Mingqing Kang
, V. N. Venkatakrishnan
, Rigel Gjomemo
, Yinzhi Cao
:
ReactAppScan: Mining React Application Vulnerabilities via Component Graph. 585-599
Session 2-3: ML and Security: Machine Learning Attacks
- Hanbin Hong
, Xinyu Zhang
, Binghui Wang
, Zhongjie Ba
, Yuan Hong
:
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence. 600-614 - Jonathan Knauer
, Phillip Rieger
, Hossein Fereidooni
, Ahmad-Reza Sadeghi
:
Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning. 615-629 - Zheng Fang
, Tao Wang
, Lingchen Zhao
, Shenyi Zhang
, Bowen Li
, Yunjie Ge
, Qi Li
, Chao Shen
, Qian Wang
:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. 630-644 - Oubo Ma
, Yuwen Pu
, Linkang Du
, Yang Dai
, Ruo Wang
, Xiaolei Liu
, Yingcai Wu
, Shouling Ji
:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. 645-659 - Jiawen Shi
, Zenghui Yuan
, Yinuo Liu
, Yue Huang
, Pan Zhou
, Lichao Sun
, Neil Zhenqiang Gong
:
Optimization-based Prompt Injection Attack to LLM-as-a-Judge. 660-674 - Yifan Lu
, Wenxuan Li
, Mi Zhang
, Xudong Pan
, Min Yang
:
Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data. 675-689
Session 2-4: Software Security: Fuzzing I
- Lukas Bernhard
, Nico Schiller
, Moritz Schloegel
, Nils Bars
, Thorsten Holz
:
DarthShader: Fuzzing WebGPU Shader Translators & Compilers. 690-704 - Kelin Wang
, Mengda Chen
, Liang He
, Purui Su
, Yan Cai
, Jiongyi Chen
, Bin Zhang
, Chao Feng
, Chaojing Tang
:
OSmart: Whitebox Program Option Fuzzing. 705-719 - Ruijie Meng
, Gregory J. Duck
, Abhik Roychoudhury
:
Program Environment Fuzzing. 720-734 - Dawei Wang
, Geng Zhou
, Li Chen
, Dan Li
, Yukai Miao
:
ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model. 735-749 - Nils Bars
, Moritz Schloegel
, Nico Schiller
, Lukas Bernhard
, Thorsten Holz
:
No Peer, no Cry: Network Application Fuzzing via Fault Injection. 750-764 - Dongdong She
, Adam Storek
, Yuchong Xie
, Seoyoung Kweon
, Prashast Srivastava
, Suman Jana
:
FOX: Coverage-guided Fuzzing as Online Stochastic Control. 765-779
Session 2-5: Applied Crypto: MPC I
- Ruiyang Li
, Yiteng Sun
, Chun Guo
, François-Xavier Standaert, Weijia Wang
, Xiao Wang
:
Leakage-Resilient Circuit Garbling. 780-794 - Shuaishuai Li
, Cong Zhang
, Dongdai Lin
:
Secure Multiparty Computation with Lazy Sharing. 795-809 - Zhicong Huang
, Wen-jie Lu
, Yuchen Wang
, Cheng Hong
, Tao Wei
, Wenguang Chen
:
Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits. 810-824 - Yun Li
, Daniel Escudero
, Yufei Duan
, Zhicong Huang
, Cheng Hong
, Chao Zhang
, Yifan Song
:
Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z2k Without Ring Extensions. 825-839 - Stefan Dziembowski, Sebastian Faust, Tomasz Lizurej, Marcin Mielniczuk:
Secret Sharing with Snitching. 840-853 - Peizhao Zhou
, Xiaojie Guo
, Pinzhi Chen
, Tong Li
, Siyi Lv
, Zheli Liu
:
Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. 854-868
Session 2-6: Applied Crypto: Zero Knowledge Proofs I
- Aarushi Goel
, Mathias Hall-Andersen
, Gabriel Kaptchuk
:
Dora: A Simple Approach to Zero-Knowledge for RAM Programs. 869-883 - Chaya Ganesh
, Vineet Nair
, Ashish Sharma
:
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs. 884-898 - Zhikang Xie
, Mengling Liu
, Haiyang Xue
, Man Ho Au
, Robert H. Deng
, Siu-Ming Yiu
:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. 899-913 - Mingxun Zhou
, Giulia Fanti
, Elaine Shi
:
Conan: Distributed Proofs of Compliance for Anonymous Data Collection. 914-928 - Michael Rosenberg
, Tushar Mopuri
, Hossein Hafezi
, Ian Miers
, Pratyush Mishra
:
Hekaton: Horizontally-Scalable zkSNARKs Via Proof Aggregation. 929-940 - Renas Bacho
, Christoph Lenzen
, Julian Loss
, Simon Ochsenreither
, Dimitrios Papachristoudis
:
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity. 941-955
Session 2-7: Blockchain & Distributed Systems: Blockchain Attacks
- Cong Wu
, Jing Chen
, Ziming Zhao
, Kun He
, Guowen Xu
, Yueming Wu
, Haijun Wang
, Hongwei Li
, Yang Liu
, Yang Xiang
:
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. 956-970 - Zihao Li
, Xinghao Peng
, Zheyuan He
, Xiapu Luo
, Ting Chen
:
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup. 971-985 - Shixuan Guan
, Kai Li
:
Characterizing Ethereum Address Poisoning Attack. 986-1000 - Hongbo Wen
, Hanzhi Liu
, Jiaxin Song
, Yanju Chen
, Wenbo Guo
, Yu Feng
:
FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols. 1001-1015 - Feng Luo
, Huangkun Lin
, Zihao Li
, Xiapu Luo
, Ruijie Luo
, Zheyuan He
, Shuwei Song
, Ting Chen
, Wenxuan Luo
:
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models. 1016-1030 - Dimitris Karakostas
, Aggelos Kiayias
, Thomas Zacharias
:
Blockchain Bribing Attacks and the Efficacy of Counterincentives. 1031-1045
Session 3-1: Formal Methods and Programming Languages I
- Cas Cremers
, Alexander Dax
, Niklas Medinger
:
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols. 1046-1060 - Jérémy Thibault, Roberto Blanco
, Dongjae Lee
, Sven Argo
, Arthur Azevedo de Amorim
, Aïna Linn Georges, Catalin Hritcu
, Andrew Tolmach
:
SECOMP: Formally Secure Compilation of Compartmentalized C Programs. 1061-1075 - Gilles Barthe
, Marcel Böhme, Sunjay Cauligi
, Chitchanok Chuengsatiansup
, Daniel Genkin
, Marco Guarnieri
, David Mateos Romero
, Peter Schwabe
, David Wu
, Yuval Yarom
:
Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures. 1076-1090 - Davide Davoli
, Martin Avanzini
, Tamara Rezk
:
On Kernel's Safety in the Spectre Era (And KASLR is Formally Dead). 1091-1105 - Mário S. Alvim, Natasha Fernandes
, Annabelle McIver
, Gabriel H. Nunes
:
The Privacy-Utility Trade-off in the Topics API. 1106-1120 - Stella Lau
, Thomas Bourgeat
, Clément Pit-Claudel, Adam Chlipala
:
Specification and Verification of Strong Timing Isolation of Hardware Enclaves. 1121-1135
Session 3-2: ML and Security: Large Language Models
- Zhixuan Chu
, Yan Wang
, Longfei Li
, Zhibo Wang
, Zhan Qin
, Kui Ren
:
A Causal Explainable Guardrails for Large Language Models. 1136-1150 - Jialin Wu
, Jiangyi Deng
, Shengyuan Pang
, Yanjiao Chen
, Jiayang Xu
, Xinfeng Li
, Wenyuan Xu
:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. 1151-1165 - Zhongjie Ba
, Jieming Zhong
, Jiachen Lei
, Peng Cheng
, Qinglong Wang
, Zhan Qin
, Zhibo Wang
, Kui Ren
:
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. 1166-1180 - Peiran Wang
, Qiyu Li
, Longxuan Yu
, Ziyao Wang
, Ang Li
, Haojian Jin
:
Moderator: Moderating Text-to-Image Diffusion Models through Fine-grained Context-based Policies. 1181-1195 - Kunsheng Tang
, Wenbo Zhou
, Jie Zhang
, Aishan Liu
, Gelei Deng
, Shuai Li
, Peigui Qi
, Weiming Zhang
, Tianwei Zhang
, Nenghai Yu
:
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models. 1196-1210 - Wenxin Ding
, Cathy Y. Li
, Shawn Shan
, Ben Y. Zhao
, Hai-Tao Zheng
:
Understanding Implosion in Text-to-Image Generative Models. 1211-1225
Session 3-3: ML and Security: Inference Attacks
- Yu He
, Boheng Li
, Yao Wang
, Mengda Yang
, Juan Wang
, Hongxin Hu
, Xingyu Zhao
:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. 1226-1240 - Jie Zhu
, Jirong Zha
, Ding Li
, Leye Wang
:
A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability. 1241-1255 - Qiankun Zhang
, Di Yuan
, Boyu Zhang
, Bin Yuan
, Bingqian Du
:
Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense. 1256-1270 - Michael Aerni
, Jie Zhang
, Florian Tramèr
:
Evaluations of Machine Learning Privacy Defenses are Misleading. 1271-1284 - Xiaoyi Chen
, Siyuan Tang
, Rui Zhu
, Shijun Yan
, Lei Jin
, Zihao Wang
, Liya Su
, Zhikun Zhang
, Xiaofeng Wang
, Haixu Tang
:
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks. 1285-1299 - Zonghao Huang
, Neil Zhenqiang Gong
, Michael K. Reiter
:
A General Framework for Data-Use Auditing of ML Models. 1300-1314
Session 3-4: Software Security: Memory Safety and Error Detection
- Shuangpeng Bai
, Zhechang Zhang
, Hong Hu
:
CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel. 1315-1329 - Kaiming Huang
, Mathias Payer
, Zhiyun Qian
, Jack Sampson
, Gang Tan
, Trent Jaeger
:
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects. 1330-1344 - Marius Momeu
, Simon Schnückel, Kai Angnis
, Michalis Polychronakis
, Vasileios P. Kemerlis
:
Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys. 1345-1359 - Lorenzo Binosi
, Gregorio Barzasi
, Michele Carminati
, Stefano Zanero
, Mario Polino
:
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations. 1360-1374 - Ruizhe Wang
, Meng Xu
, N. Asokan
:
SeMalloc: Semantics-Informed Memory Allocator. 1375-1389 - Enriquillo Valdez
, Salman Ahmed
, Zhongshu Gu
, Christophe de Dinechin
, Pau-Chen Cheng
, Hani Jamjoom
:
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers. 1390-1404
Session 3-5: Applied Crypto: Private Information Retrieval & Private Set operations
- Ming Luo
, Feng-Hao Liu
, Han Wang
:
Faster FHE-Based Single-Server Private Information Retrieval. 1405-1419 - Ling Ren
, Muhammad Haris Mughees
, I Sun
:
Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy Subsets. 1420-1433 - Cong Zhang
, Yu Chen
, Weiran Liu
, Liqiang Peng
, Meng Hao
, Anyu Wang
, Xiaoyun Wang
:
Unbalanced Private Set Union with Reduced Computation and Communication. 1434-1447 - Ben Fisch
, Arthur Lazzaretti
, Zeyu Liu
, Charalampos Papamanthou
:
ThorPIR: Single Server PIR via Homomorphic Thorp Shuffles. 1448-1462 - Alexander Burton
, Samir Jordan Menon
, David J. Wu
:
Respire: High-Rate PIR for Databases with Small Records. 1463-1477 - Yunqing Sun
, Jonathan Katz
, Mariana Raykova
, Phillipp Schoppmann
, Xiao Wang
:
Actively Secure Private Set Intersection in the Client-Server Setting. 1478-1492
Session 3-6: Applied Crypto: Signatures, Proofs, Integrity Schemes
- Nikhil Vanjani
, Pratik Soni
, Sri Aravinda Krishnan Thyagarajan
:
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments. 1493-1507 - Ioanna Karantaidou
, Omar Renawi
, Foteini Baldimtsi
, Nikolaos Kamarinakis
, Jonathan Katz
, Julian Loss
:
Blind Multisignatures for Anonymous Tokens with Decentralized Issuance. 1508-1522 - Sven Argo
, Tim Güneysu, Corentin Jeudy
, Georg Land
, Adeline Roux-Langlois
, Olivier Sanders
:
Practical Post-Quantum Signatures for Privacy. 1523-1537 - Charalampos Papamanthou
, Shravan Srinivasan
, Nicolas Gailly
, Ismael Hishon-Rezaizadeh
, Andrus Salumets
, Stjepan Golemac
:
Reckle Trees: Updatable Merkle Batch Proofs with Applications. 1538-1551 - Sara Wrótniak, Hemi Leibowitz
, Ewa Syta
, Amir Herzberg
:
Provable Security for PKI Schemes. 1552-1566 - Brian Koziel
, S. Dov Gordon
, Craig Gentry
:
Fast Two-party Threshold ECDSA with Proactive Security. 1567-1580
Session 3-7: Usability and Measurement: Measuring and Understanding Privacy
- Shuai Li, Zhemin Yang, Yuhong Nan, Shutian Yu, Qirui Zhu, Min Yang:
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps. 1581-1595 - Georgi Ganev
, Kai Xu
, Emiliano De Cristofaro
:
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility. 1596-1610 - Wentao Guo
, Aditya Kishore
, Adam J. Aviv
, Michelle L. Mazurek
:
A Qualitative Analysis of Practical De-Identification Guides. 1611-1625 - Song Liao
, Long Cheng
, Xiapu Luo
, Zheng Song
, Haipeng Cai
, Danfeng (Daphne) Yao
, Hongxin Hu
:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. 1626-1640 - Yue Xiao
, Chaoqi Zhang
, Yue Qin
, Fares Fahad S. Alharbi
, Luyi Xing
, Xiaojing Liao
:
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines. 1641-1655 - Easton Kelso
, Ananta Soneji
, Sazzadur Rahaman
, Yan Shoshitaishvili
, Rakibul Hasan
:
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices. 1656-1670
Session 4-1: Usability and Measurement: Attack Measurements
- Xinyue Shen
, Zeyuan Chen
, Michael Backes
, Yun Shen
, Yang Zhang
:
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. 1671-1685 - Ahmed Tanvir Mahdad
, Mohammed Jubur
, Nitesh Saxena
:
Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators. 1686-1700 - Jeffrey Knockel
, Mona Wang
, Zoë Reichert:
The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols. 1701-1715 - Tong Liu
, Zizhuang Deng
, Guozhu Meng
, Yuekang Li
, Kai Chen
:
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. 1716-1730
Session 4-2: HW & CPS: Attacks and Defenses in Smart Devices
- Hanqiu Wang
, Zihao Zhan
, Haoqi Shan
, Siqi Dai
, Maximillian Panoff
, Shuo Wang
:
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices. 1731-1745 - Yuxia Zhan
, Yan Meng
, Lu Zhou
, Yichang Xiong
, Xiaokuan Zhang
, Lichuan Ma
, Guoxing Chen
, Qingqi Pei
, Haojin Zhu
:
VPVet: Vetting Privacy Policies of Virtual Reality Apps. 1746-1760 - Yue Zhang
, Zhen Ling
, Michael Cash
, Qiguang Zhang
, Christopher Morales-Gonzalez
, Qun Zhou Sun
, Xinwen Fu
:
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing. 1761-1775 - Qingsong Yao
, Yuming Liu
, Xiongjia Sun
, Xuewen Dong
, Xiaoyu Ji
, Jianfeng Ma
:
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz. 1776-1790
Session 4-3: Privacy and Anonymity & Applied Crypto: Privacy and Systems
- Yueshen Li
, Jianli Jin
, Kirill Levchenko
:
CAPSID: A Private Session ID System for Small UAVs. 1791-1805 - Yihui Yan
, Zhice Yang
:
MaskPrint: Take the Initiative in Fingerprint Protection to Mitigate the Harm of Data Breach. 1806-1818 - Erik Anderson
, Melissa Chase
, F. Betül Durak, Kim Laine
, Chenkai Weng
:
Precio: Private Aggregate Measurement via Oblivious Shuffling. 1819-1833 - Hanshen Xiao
, G. Edward Suh
, Srinivas Devadas
:
Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption. 1834-1848
Session 4-4: HW & CPS: Security of Autonomous Vehicles
- Pritam Dash
, Ethan Chan
, Karthik Pattabiraman
:
SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks. 1849-1863 - Xingshuo Han
, Haozhao Wang
, Kangqiao Zhao
, Gelei Deng
, Yuan Xu
, Hangcheng Liu
, Han Qiu
, Tianwei Zhang
:
VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice. 1864-1878 - Yuan Xu
, Gelei Deng
, Xingshuo Han
, Guanlin Li
, Han Qiu
, Tianwei Zhang
:
PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency. 1879-1893 - Zhaozhou Tang
, Khaled Serag
, Saman A. Zonouz
, Z. Berkay Celik
, Dongyan Xu
, Raheem Beyah
:
ERACAN: Defending Against an Emerging CAN Threat Model. 1894-1908
Session 4-5: Privacy and Anonymity: Differential Privacy II
- Jiankai Jin
, Chitchanok Chuengsatiansup
, Toby Murray
, Benjamin I. P. Rubinstein
, Yuval Yarom
, Olga Ohrimenko
:
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget. 1909-1923 - Nada Lahjouji
, Sameera Ghayyur
, Xi He
, Sharad Mehrotra
:
ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support. 1924-1938 - Wei Dong
, Qiyao Luo
, Giulia Fanti
, Elaine Shi
, Ke Yi
:
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. 1939-1953 - Naoise Holohan
, Stefano Braghin
, Mohamed Suliman
:
Securing Floating-Point Arithmetic for Noise Addition. 1954-1966
Session 4-6: Privacy and Anonymity: Anonymous Communication
- Elkana Tovey
, Jonathan Weiss
, Yossi Gilad
:
Distributed PIR: Scaling Private Messaging via the Users' Machines. 1967-1981 - Ellis Fenske
, Aaron Johnson
:
Bytes to Schlep? Use a FEP: Hiding Protocol Metadata with Fully Encrypted Protocols. 1982-1996 - Xinhao Deng
, Qi Li
, Ke Xu
:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. 1997-2011 - Yanxue Jia
, Varun Madathil
, Aniket Kate
:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. 2012-2026
Session 5-1: Network Security: Wireless Networks
- Nathaniel Bennett
, Weidong Zhu
, Benjamin Simon
, Ryon Kennedy
, William Enck
, Patrick Traynor
, Kevin R. B. Butler
:
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. 2027-2041 - David Adei
, Varun Madathil
, Sathvik Prasad
, Bradley Reaves
, Alessandra Scafuro
:
Jäger: Automated Telephone Call Traceback. 2042-2056 - Rabiah Alnashwan
, Yang Yang
, Yilu Dong
, Prosanta Gope
, Behzad Abdolmaleki
, Syed Rafiul Hussain
:
Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator. 2057-2071 - Xin'an Zhou
, Qing Deng
, Juefei Pu
, Keyu Man
, Zhiyun Qian
, Srikanth V. Krishnamurthy
:
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks. 2072-2086 - Xijia Che
, Yi He
, Xuewei Feng
, Kun Sun
, Ke Xu
, Qi Li
:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. 2087-2101 - Syed Md. Mukit Rashid
, Tianwei Wu
, Kai Tu
, Abdullah Al Ishtiaq
, Ridwanul Hasan Tanvir
, Yilu Dong
, Omar Chowdhury
, Syed Rafiul Hussain
:
State Machine Mutation-based Testing Framework for Wireless Communication Protocols. 2102-2116
Session 5-2: Web Security II
- Shubham Agarwal
, Aurore Fass
, Ben Stock
:
Peeking through the window: Fingerprinting Browser Extensions through Page-Visible Execution Traces and Interactions. 2117-2131 - Mingming Zha
, Zilong Lin
, Siyuan Tang
, Xiaojing Liao
, Yuhong Nan
, XiaoFeng Wang
:
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. 2132-2146 - Giovane C. M. Moura
, Thomas Daniels
, Maarten Bosteels
, Sebastian Castro
, Moritz Müller
, Thymen Wabeke
, Thijs van Den Hout
, Maciej Korczynski
, Georgios Smaragdakis
:
Characterizing and Mitigating Phishing Attacks at ccTLD Scale. 2147-2161 - Andrea Mengascini
, Ryan Aurelio
, Giancarlo Pellegrino
:
The Big Brother's New Playground: Unmasking the Illusion of Privacy in Web Metaverses from a Malicious User's Perspective. 2162-2176 - Abdul Haddi Amjad
, Shaoor Munir
, Zubair Shafiq
, Muhammad Ali Gulzar
:
Blocking Tracking JavaScript at the Function Granularity. 2177-2191 - Mir Masood Ali
, Peter Snyder
, Chris Kanich
, Hamed Haddadi
:
Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles. 2192-2206
Session 5-3: ML and Security: Generative Models
- Huiyu Xu
, Yaopeng Wang
, Zhibo Wang
, Zhongjie Ba
, Wenxin Liu
, Lu Jin
, Haiqin Weng
, Tao Wei
, Kui Ren
:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. 2207-2221 - Thien-Phuc Doan
, Hung Dinh-Xuan
, Taewon Ryu
, Inho Kim
, Woongjae Lee
, Kihun Hong
, Souhwan Jung
:
Trident of Poseidon: A Generalized Approach for Detecting Deepfake Voices. 2222-2235 - Zeyan Liu
, Zijun Yao
, Fengjun Li
, Bo Luo
:
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. 2236-2250 - Xinlei He
, Xinyue Shen
, Zeyuan Chen
, Michael Backes
, Yang Zhang
:
MGTBench: Benchmarking Machine-Generated Text Detection. 2251-2265 - Mahmoud Nazzal
, Issa Khalil
, Abdallah Khreishah
, NhatHai Phan
:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). 2266-2280 - Shu Wang
, Kun Sun
, Yan Zhai
:
Dye4AI: Assuring Data Boundary on Generative AI Services. 2281-2295
Session 5-4: Software Security: Embedded Systems and IoT Security
- Ayushi Sharma
, Shashank Sharma
, Sai Ritvik Tanksalkar
, Santiago Torres-Arias
, Aravind Machiry
:
Rust for Embedded Systems: Current State and Open Problems. 2296-2310 - Wenqiang Li
, Haohuang Wen
, Zhiqiang Lin
:
BaseMirror: Automatic Reverse Engineering of Baseband Commands from Android's Radio Interface Layer. 2311-2325 - Shenao Wang
, Feng Dong
, Hangfeng Yang
, Jingheng Xu
, Haoyu Wang
:
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments. 2326-2340 - Kaizheng Liu
, Ming Yang
, Zhen Ling
, Yue Zhang
, Chongqing Lei
, Junzhou Luo
, Xinwen Fu
:
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices. 2341-2354 - Abdullah Qasem
, Mourad Debbabi
, Andrei Soeanu
:
OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware. 2355-2369 - Mohsen Salehi
, Karthik Pattabiraman
:
AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices. 2370-2384
Session 5-5: Applied Crypto: Key management
- Felix Günther, Douglas Stebila
, Shannon Veitch
:
Obfuscated Key Exchange. 2385-2399 - Céline Chevalier, Guirec Lebrun
, Ange Martinelli
, Abdul Rahman Taleb
:
Quarantined-TreeKEM: A Continuous Group Key Agreement for MLS, Secure in Presence of Inactive Users. 2400-2414 - Mahimna Kelkar
, Kushal Babel
, Philip Daian
, James Austgen
, Vitalik Buterin
, Ari Juels
:
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. 2415-2429 - Julius Hermelink
, Kai-Chun Ning
, Richard Petri
, Emanuele Strieder
:
The Insecurity of Masked Comparisons: SCAs on ML-KEM's FO-Transform. 2430-2444 - Sebastian H. Faller
, Tobias Handirk
, Julia Hesse
, Máté Horváth, Anja Lehmann
:
Password-Protected Key Retrieval with(out) HSM Protection. 2445-2459 - F. Betül Durak, Laurane Marco
, Abdullah Talayhan
, Serge Vaudenay
:
Non-Transferable Anonymous Tokens by Secret Binding. 2460-2474
Session 5-6: Applied Crypto: Homomorphic Encryption
- Wenxu Tang, Fangyu Zheng, Guang Fan, Tian Zhou, Jingqiang Lin, Jiwu Jing:
DPad-HE: Towards Hardware-friendly Homomorphic Evaluation using 4-Directional Manipulation. 2475-2489 - Jiaxing He
, Kang Yang
, Guofeng Tang
, Zhangjie Huang
, Li Lin
, Changzheng Wei
, Ying Yan
, Wei Wang
:
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference. 2490-2504 - Jung Hee Cheon
, Hyeongmin Choe
, Alain Passelègue
, Damien Stehlé
, Elias Suvanto
:
Attacks Against the IND-CPAD Security of Exact FHE Schemes. 2505-2519 - Sylvain Chatel
, Christian Knabenhans
, Apostolos Pyrgelis
, Carmela Troncoso
, Jean-Pierre Hubaux
:
VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption. 2520-2534 - Jaehyung Kim
, Jinyeong Seo
, Yongsoo Song
:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. 2535-2546 - Loris Bergerat
, Ilaria Chillotti
, Damien Ligier
, Jean-Baptiste Orfila
, Adeline Roux-Langlois
, Samuel Tap
:
New Secret Keys for Enhanced Performance in (T)FHE. 2547-2561
Session 5-7: Blockchain and Distributed Systems: Distributed Ledger Scalability
- Ben Weintraub
, Satwik Prabhu Kumble
, Cristina Nita-Rotaru
, Stefanie Roos
:
Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. 2562-2576 - Zhiyuan Sun
, Zihao Li
, Xinghao Peng
, Xiapu Luo
, Muhui Jiang
, Hao Zhou
, Yinqian Zhang
:
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back. 2577-2590 - Christof Ferreira Torres
, Albin Mamuti
, Ben Weintraub
, Cristina Nita-Rotaru
, Shweta Shinde
:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups. 2591-2605 - Sam Blackshear
, Andrey Chursin
, George Danezis
, Anastasios Kichidis
, Lefteris Kokoris-Kogias
, Xun Li
, Mark Logan
, Ashok Menon
, Todd Nowacki
, Alberto Sonnino
, Brandon Williams
, Lu Zhang
:
Sui Lutris: A Blockchain Combining Broadcast and Consensus. 2606-2620 - Akhil Bandarupalli
, Adithya Bhat
, Saurabh Bagchi
, Aniket Kate
, Michael K. Reiter
:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. 2621-2635 - Hanwen Feng
, Tiancheng Mai
, Qiang Tang
:
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing. 2636-2650
Session 6-1: Usability and Measurement: Usable Security
- Philip Klostermeyer
, Sabrina Amft
, Sandra Höltervennhoff
, Alexander Krause
, Niklas Busch
, Sascha Fahl
:
Skipping the Security Side Quests: A Qualitative Study on Security Practices and Challenges in Game Development. 2651-2665 - Jonas Hielscher
, Markus Schöps
, Jens Opdenbusch
, Felix Reichmann
, Marco Gutfleisch
, Karola Marky
, Simon Parkin
:
Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' Promises. 2666-2680 - Lucy Simko
, Adryana Hutchinson
, Alvin Isaac
, Evan Fries
, Micah Sherr
, Adam J. Aviv
:
"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring Evasion. 2681-2695 - Kevin Warren
, Tyler Tucker
, Anna Crowder
, Daniel Olszewski
, Allison Lu
, Caroline Fedele
, Magdalena Pasternak
, Seth Layton
, Kevin R. B. Butler, Carrie Gates
, Patrick Traynor
:
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors. 2696-2710 - Ece Gumusel
, Yue Xiao
, Yue Qin
, Jiaxin Qin
, Xiaojing Liao
:
Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting. 2711-2725 - Jan H. Klemmer
, Stefan Albert Horstmann
, Nikhil Patnaik
, Cordelia Ludden
, Cordell Burton Jr.
, Carson Powers
, Fabio Massacci
, Akond Rahman
, Daniel Votipka
, Heather Richter Lipford
, Awais Rashid
, Alena Naiakshina
, Sascha Fahl
:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. 2726-2740
Session 6-2: Formal Methods and Programming Languages II
- Kevin Morio
, Robert Künnemann
:
SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols. 2741-2755 - Adwait Godbole
, Yatin A. Manerkar
, Sanjit A. Seshia
:
SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security. 2756-2770 - Miguel Ambrona
, Pooya Farshim
, Patrick Harasser
:
Block Ciphers in Idealized Models: Automated Proofs and New Security Results. 2771-2785 - Freek Verbeek
, Nico Naus
, Binoy Ravindran
:
Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly. 2786-2798 - Jana Hofmann
, Cédric Fournet, Boris Köpf
, Stavros Volos
:
Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring. 2799-2813 - David Baelde
, Adrien Koutsos
, Justine Sauvage
:
Foundations for Cryptographic Reductions in CCSA Logics. 2814-2828
Session 6-3: ML and Security: Federated Learning
- Yuxin Yang
, Qiang Li
, Jinyuan Jia
, Yuan Hong
, Binghui Wang
:
Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses. 2829-2843 - Yufei Zhou
, Peijia Zheng
, Xiaochun Cao
, Jiwu Huang
:
Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning. 2844-2858 - Kunal Talwar
, Shan Wang
, Audra McMillan
, Vitaly Feldman
, Pansy Bansal
, Bailey Basile
, Áine Cahill
, Yi Sheng Chan
, Mike Chatzidakis
, Junye Chen
, Oliver R. A. Chick
, Mona Chitnis
, Suman Ganta
, Yusuf Goren
, Filip Granqvist
, Kristine Guo
, Frederic Jacobs
, Omid Javidbakht
, Albert Liu
, Richard Low
, Dan Mascenik
, Steve Myers
, David Park
, Wonhee Park
, Gianni Parsa
, Tommy Pauly
, Christian Priebe
, Rehan Rishi
, Guy N. Rothblum
, Congzheng Song
, Linmao Song
, Karl Tarbe
, Sebastian Vogt
, Shundong Zhou
, Vojta Jina
, Michael Scaria
, Luke Winstrom
:
Samplable Anonymous Aggregation for Private Federated Data Analysis. 2859-2873 - Minghong Fang
, Zifan Zhang
, Hairi
, Prashant Khanduri
, Jia Liu
, Songtao Lu
, Yuchen Liu
, Neil Gong
:
Byzantine-Robust Decentralized Federated Learning. 2874-2888 - Yurong Hao
, Xihui Chen
, Xiaoting Lyu
, Jiqiang Liu
, Yongsheng Zhu
, Zhiguo Wan
, Sjouke Mauw
, Wei Wang
:
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation. 2889-2903 - Guanzhong Chen
, Zhenghan Qin
, Mingxin Yang
, Yajie Zhou
, Tao Fan
, Tianyu Du
, Zenglin Xu
:
Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack. 2904-2918
Session 6-4: Software Security: Access Control and Data Protection
- Juhee Kim
, Jinbum Park
, Yoochan Lee
, Chengyu Song
, Taesoo Kim
, Byoungyoung Lee
:
PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux. 2919-2933 - Yongheng Huang
, Chenghang Shi
, Jie Lu
, Haofeng Li
, Haining Meng
, Lian Li
:
Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications. 2934-2948 - Tamjid Al Rahat
, Yu Feng
, Yuan Tian
:
AuthSaber: Automated Safety Verification of OpenID Connect Programs. 2949-2962 - Tong Zhu
, Chaofan Shou
, Zhen Huang
, Guoxing Chen
, Xiaokuan Zhang
, Yan Meng
, Shuang Hao
, Haojin Zhu
:
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications. 2963-2977 - Yuexi Zhang
, Bingyu Li
, Jingqiang Lin
, Linghui Li
, Jiaju Bai
, Shijie Jia
, Qianhong Wu
:
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem. 2978-2992 - Hajeong Lim
, Jaeyoon Kim
, Hojoon Lee
:
uMMU: Securing Data Confidentiality with Unobservable Memory Subsystem. 2993-3007
Session 6-5: Applied Crypto: MPC II
- Nuttapong Attrapadung
, Kota Isayama
, Kunihiko Sadakane
, Kazunari Tozawa
:
Secure Parallel Computation with Oblivious State Transitions. 3008-3022 - Amit Agarwal
, Elette Boyle
, Nishanth Chandran
, Niv Gilboa
, Divya Gupta
, Yuval Ishai
, Mahimna Kelkar
, Yiping Ma
:
Secure Sorting and Selection via Function Secret Sharing. 3023-3037 - Christian Mouchet
, Sylvain Chatel
, Apostolos Pyrgelis
, Carmela Troncoso
:
Helium: Scalable MPC among Lightweight Participants and under Churn. 3038-3052 - Nikolaos Makriyannis
, Oren Yomtov
, Arik Galansky
:
Practical Key-Extraction Attacks in Leading MPC Wallets. 3053-3064 - Sarvar Patel
, Giuseppe Persiano
, Joon Young Seo
, Kevin Yeo
:
Efficient Secret Sharing for Large-Scale Applications. 3065-3079 - Ananya Appan
, David Heath
, Ling Ren
:
Oblivious Single Access Machines - A New Model for Oblivious Computation. 3080-3094
Session 6-6: Applied Crypto: Zero Knowledge Proofs II
- Yibin Yang
, David Heath
, Carmit Hazay
, Vladimir Kolesnikov
, Muthuramakrishnan Venkitasubramaniam
:
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction. 3095-3109 - Christodoulos Pappas
, Dimitrios Papadopoulos
:
Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees. 3110-3124 - Vadim Lyubashevsky
, Gregor Seiler
, Patrick Steuer
:
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy. 3125-3137 - Antonio Faonio
, Dario Fiore
, Luigi Russo
:
Real-World Universal zkSNARKs are Non-Malleable. 3138-3151 - Rui Gao
, Zhiguo Wan
, Yuncong Hu
, Huaqun Wang
:
A Succinct Range Proof for Polynomial-based Vector Commitment. 3152-3166 - Ron Steinfeld
, Amin Sakzad
, Muhammed F. Esgin
, Veronika Kuchta
, Mert Yassi
, Raymond K. Zhao
:
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices. 3167-3181
Session 6-7: Blockchain and Distributed Systems: Privacy and Consensus
- Foteini Baldimtsi
, Konstantinos Kryptos Chalkias
, Yan Ji
, Jonas Lindstrøm
, Deepak Maram
, Ben Riva
, Arnab Roy
, Mahdi Sedaghat
, Joy Wang
:
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials. 3182-3196 - Josh Beal
, Ben Fisch
:
Derecho: Privacy Pools with Proof-Carrying Disclosures. 3197-3211 - Nicolas Mohnblatt
, Alberto Sonnino
, Kobi Gurkan
, Philipp Jovanovic
:
Arke: Scalable and Byzantine Fault Tolerant Privacy-Preserving Contact Discovery. 3212-3226 - Ertem Nusret Tas
, István András Seres, Yinuo Zhang
, Márk Melczer, Mahimna Kelkar
, Joseph Bonneau
, Valeria Nikolaenko
:
Atomic and Fair Data Exchange via Blockchain. 3227-3241 - Sourav Das
, Sisi Duan
, Shengqi Liu
, Atsuki Momose
, Ling Ren
, Victor Shoup
:
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography. 3242-3256 - Marwa Mouallem
, Ittay Eyal
:
Asynchronous Authentication. 3257-3271
Session 7-1: Security of Cyber-physical Systems
- Chenglu Jin
, Chao Yin
, Marten van Dijk
, Sisi Duan
, Fabio Massacci
, Michael K. Reiter
, Haibin Zhang
:
PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. 3272-3286 - Lingjing Yu
, Jingli Hao
, Jun Ma
, Yong Sun
, Yijun Zhao
, Bo Luo
:
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. 3287-3301 - Yue Li, Zhenxiong Yan, Wenqiang Jin, Zhenyu Ning, Daibo Liu, Zheng Qin, Yu Liu, Huadi Zhu, Ming Li:
GPSBuster: Busting out Hidden GPS Trackers via MSoC Electromagnetic Radiations. 3302-3316 - Haoyu Xiao
, Yuan Zhang
, Minghang Shen
, Chaoyang Lin
, Can Zhang
, Shengli Liu
, Min Yang
:
Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware. 3317-3331
Session 7-2: HW & CPS 5: Attacks in the Physical World
- Chenghan Jiang
, Jinjiang Yang
, Xinyi Li
, Qi Li
, Xinyu Zhang
, Ju Ren
:
RISiren: Wireless Sensing System Attacks via Metasurface. 3332-3345 - Ye Wang
, Zeyan Liu
, Bo Luo
, Rongqing Hui
, Fengjun Li
:
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. 3346-3360 - Penghao Wang
, Jingzhi Hu
, Chao Liu
, Jun Luo
:
RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound Reflection. 3361-3375 - Yuqiao Yang
, Zhongjie Wu
, Yongzhao Zhang
, Ting Chen
, Jun Li
, Jie Yang
, Wenhao Liu
, Xiaosong Zhang
, Ruicong Shi
, Jingwei Li
, Yu Jiang
, Zhuo Su
:
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips. 3376-3390
Session 7-3: HW & CPS: Security of Circuit Design and FPGAs
- Simon Klix
, Nils Albartus
, Julian Speith
, Paul Staat
, Alice Verstege
, Annika Wilde
, Daniel Lammers
, Jörn Langheinrich, Christian Kison
, Sebastian Sester-Wehle
, Daniel E. Holcomb
, Christof Paar
:
Stealing Maggie's Secrets-On the Challenges of IP Theft Through FPGA Reverse Engineering. 3391-3405 - Zhenda Zhang
, Svetla Petkova-Nikova
, Ventzislav Nikov
:
Glitch-Stopping Circuits: Hardware Secure Masking without Registers. 3406-3420 - Florian Hirner, Michael Streibl, Florian Krieger, Ahmet Can Mert, Sujoy Sinha Roy:
Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms. 3421-3435 - Jianfeng Wang
, Huazhong Yang
, Shuwen Deng
, Xueqing Li
:
CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses. 3436-3450
Session 7-4: Privacy and Anonymity: Membership Inference Attacks
- Bozhidar Stevanoski
, Ana-Maria Cretu
, Yves-Alexandre de Montjoye
:
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems. 3451-3465 - Zhuohang Li
, Andrew Lowy
, Jing Liu
, Toshiaki Koike-Akino
, Kieran Parsons
, Bradley A. Malin
, Ye Wang
:
Analyzing Inference Privacy Risks Through Gradients In Machine Learning. 3466-3480 - Rui Wen
, Zheng Li
, Michael Backes
, Yang Zhang
:
Membership Inference Attacks Against In-Context Learning. 3481-3495 - Hao Li
, Zheng Li
, Siyuan Wu
, Chengrui Hu
, Yutong Ye
, Min Zhang
, Dengguo Feng
, Yang Zhang
:
SeqMIA: Sequential-Metric Based Membership Inference Attack. 3496-3510
Session 7-5: Privacy and Anonymity: Privacy Attacks Meet ML
- Ruixuan Liu
, Tianhao Wang
, Yang Cao
, Li Xiong
:
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps. 3511-3524 - Xinguo Feng
, Zhongkui Ma
, Zihan Wang
, Eu Joe Chegne
, Mengyao Ma
, Alsharif Abuadbba
, Guangdong Bai
:
Uncovering Gradient Inversion Risks in Practical Language Model Training. 3525-3539 - Shiming Wang
, Liyao Xiang
, Bowei Cheng
, Zhe Ji
, Tianran Sun
, Xinbing Wang
:
Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power. 3540-3554 - Wei Tong
, Haoyu Chen
, Jiacheng Niu
, Sheng Zhong
:
Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. 3555-3569
Session 7-6: Privacy: Defenses and Attacks
- Yihao Zheng
, Haocheng Xia
, Junyuan Pang
, Jinfei Liu
, Kui Ren
, Lingyang Chu
, Yang Cao
, Li Xiong
:
TabularMark: Watermarking Tabular Datasets for Machine Learning. 3570-3584 - Xinfeng Li
, Kai Li
, Yifan Zheng
, Chen Yan
, Xiaoyu Ji
, Wenyuan Xu
:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. 3585-3599 - Bo Hui
, Haolin Yuan
, Neil Gong
, Philippe Burlina
, Yinzhi Cao
:
PLeak: Prompt Leaking Attacks against Large Language Model Applications. 3600-3614 - Zachary Ratliff
, Salil Vadhan
:
A Framework for Differential Privacy Against Timing Attacks. 3615-3629
Session 8-1: Network Security: Traffic Analysis and Exploits
- Ben Weintraub
, Jiwon Kim
, Ran Tao
, Cristina Nita-Rotaru
, Hamed Okhravi
, Dave (Jing) Tian
, Benjamin E. Ujcich
:
Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking. 3630-3644 - Zhe Ren
, Xinghua Li
, Yinbin Miao
, Mengyao Zhu
, Shunjie Yuan
, Robert H. Deng
:
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks. 3645-3658 - Chuanpu Fu
, Qi Li
, Meng Shen
, Ke Xu
:
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. 3659-3673 - Ryan Pickren
, Animesh Chhotaray
, Frank Li
, Saman A. Zonouz
, Raheem Beyah
:
Release the Hounds! Automated Inference and Empirical Security Evaluation of Field-Deployed PLCs Using Active Network Data. 3674-3688 - Jiayi Jiang
, Xiyuan Zhang
, Chengcheng Wan
, Haoyi Chen
, Haiying Sun
, Ting Su
:
BinPRE: Enhancing Field Inference in Binary Analysis Based Protocol Reverse Engineering. 3689-3703 - Mingming Chen
, Thomas La Porta
, Teryl Taylor
, Frederico Araujo
, Trent Jaeger
:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. 3704-3718
Session 8-2: Software Security: Fuzzing II
- Arvind S. Raj
, Wil Gibbs
, Fangzhou Dong
, Jayakrishna Menon Vadayath
, Michael Tompkins
, Steven Wirsz
, Yibo Liu
, Zhenghao Hu
, Chang Zhu
, Gokulkrishna Praveen Menon
, Brendan Dolan-Gavitt
, Adam Doupé
, Ruoyu Wang
, Yan Shoshitaishvili
, Tiffany Bao
:
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. 3719-3733 - Haoran Xu
, Zhiyuan Jiang
, Yongjun Wang
, Shuhui Fan
, Shenglin Xu
, Peidai Xie, Shaojing Fu
, Mathias Payer
:
Fuzzing JavaScript Engines with a Graph-based IR. 3734-3748 - Jiaxun Zhu
, Minghao Lin
, Tingting Yin
, Zechao Cai
, Yu Wang
, Rui Chang
, Wenbo Shen
:
CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon. 3749-3762 - Jianzhong Liu
, Yuheng Shen
, Yiru Xu
, Yu Jiang
:
Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing. 3763-3777 - Yutong Zhou
, Fan Yang
, Zirui Song
, Ke Zhang
, Jiongyi Chen
, Kehuan Zhang
:
LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPT. 3778-3792 - Yunlong Lyu
, Yuxuan Xie
, Peng Chen
, Hao Chen
:
Prompt Fuzzing for Fuzz Driver Generation. 3793-3807
Session 8-3: ML and Security: Protection Methods in Machine Learning
- Yijie Bai
, Zhongming Ma
, Yanjiao Chen
, Jiangyi Deng
, Shengyuan Pang
, Yan Liu
, Wenyuan Xu
:
Alchemy: Data-Free Adversarial Training. 3808-3822 - Zijin Lin
, Yue Zhao
, Kai Chen
, Jinwen He
:
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors. 3823-3837 - Xueluan Gong
, Rubin Wei
, Ziyao Wang
, Yuchen Sun
, Jiawen Peng
, Yanjiao Chen
, Qian Wang
:
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions. 3838-3852 - Zhiyuan Yu
, Ao Li
, Ruoyao Wen
, Yijia Chen
, Ning Zhang
:
PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning. 3853-3867 - Eugene Bagdasarian
, Ren Yi
, Sahra Ghalebikesabi
, Peter Kairouz
, Marco Gruteser
, Sewoong Oh
, Borja Balle
, Daniel Ramage
:
AirGapAgent: Protecting Privacy-Conscious Conversational Agents. 3868-3882 - Yuke Hu
, Jian Lou
, Jiaqi Liu
, Wangze Ni
, Feng Lin
, Zhan Qin
, Kui Ren
:
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach. 3883-3897
Session 8-4: Software Security: Program Analysis and Security Enhancement
- Chuqi Zhang
, Jun Zeng
, Yiming Zhang
, Adil Ahmad
, Fengwei Zhang
, Hai Jin
, Zhenkai Liang
:
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches. 3898-3912 - Neophytos Christou
, Alexander J. Gaidis
, Vaggelis Atlidakis
, Vasileios P. Kemerlis
:
Eclipse: Preventing Speculative Memory-error Abuse with Artificial Data Dependencies. 3913-3927 - Chaoyuan Peng
, Muhui Jiang
, Lei Wu
, Yajin Zhou
:
Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing. 3928-3942 - Yingquan Zhao
, Zan Wang
, Junjie Chen
, Ruifeng Fu
, Yanzhou Lu
, Tianchang Gao
, Haojie Ye
:
Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing. 3943-3957 - Kaifeng Huang
, Chenhao Lu
, Yiheng Cao
, Bihuan Chen
, Xin Peng
:
VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching. 3958-3972 - Dongjia Zhang
, Andrea Fioraldi
, Davide Balzarotti
:
On Understanding and Forecasting Fuzzers Performance with Static Analysis. 3973-3987
Session 8-5: Applied Crypto: Crypto Applied to cloud computing and machine learning
- Jonas Hofmann
, Kien Tuong Truong
:
End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem. 3988-4001 - Kai Du
, Jianfeng Wang
, Jiaojiao Wu
, Yunling Wang
:
Scalable Equi-Join Queries over Encrypted Database. 4002-4016 - Nishat Koti
, Varsha Bhat Kukkala
, Arpita Patra
, Bhavish Raj Gopal
:
Graphiti: Secure Graph Computation Made More Scalable. 4017-4031 - Zhenhua Zou
, Zhuotao Liu
, Jinyong Shan
, Qi Li
, Ke Xu
, Mingwei Xu
:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. 4032-4046 - Francesca Falzon
, Esha Ghosh
, Kenneth G. Paterson
, Roberto Tamassia
:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. 4047-4061 - Chaya Ganesh
, Shreyas Gupta
, Bhavana Kanukurthi
, Girisha Shankar
:
Secure Vickrey Auctions with Rational Parties. 4062-4076
Session 8-6: Applied Crypto: ZKPs, Private set operations, Digital Currencies
- Moumita Dutta
, Chaya Ganesh
, Sikhar Patranabis
, Shubh Prakash
, Nitin Singh
:
Batching-Efficient RAM using Updatable Lookup Arguments. 4077-4091 - Daniel Escudero
, Antigoni Polychroniadou
, Yifan Song
, Chenkai Weng
:
Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers. 4092-4106 - Sofía Celi
, Alex Davidson
:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. 4107-4121 - Adrià Gascón, Yuval Ishai
, Mahimna Kelkar
, Baiyu Li
, Yiping Ma
, Mariana Raykova
:
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model. 4122-4136 - Ying Gao
, Yuanchao Luo
, Longxin Wang
, Xiang Liu
, Lin Qi
, Wei Wang
, Mengmeng Zhou
:
Efficient Scalable Multi-Party Private Set Intersection(-Variants) from Bicentric Zero-Sharing. 4137-4151 - Guy Zyskind
, Avishay Yanai
, Alex 'Sandy' Pentland
:
High-Throughput Three-Party DPFs with Applications to ORAM and Digital Currencies. 4152-4166
Session 8-7: Usability and Measurement: Phishing, Deepfakes, and Other Risks
- Katharina Schiller
, Florian Adamsky
, Christian Eichenmüller
, Matthias Reimert
, Zinaida Benenson
:
Employees' Attitudes towards Phishing Simulations: "It's like when a child reaches onto the hot hob". 4167-4181 - Daniele Lain
, Tarek Jost
, Sinisa Matetic
, Kari Kostiainen
, Srdjan Capkun
:
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training. 4182-4196 - Kevin Childs
, Cassidy Gibson
, Anna Crowder
, Kevin Warren
, Carson Stillman
, Elissa M. Redmiles
, Eakta Jain
, Patrick Traynor
, Kevin R. B. Butler
:
"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing Applications. 4197-4211 - Yue Zhang
, Melih Sirlanci
, Ruoyu Wang
, Zhiqiang Lin
:
When Compiler Optimizations Meet Symbolic Execution: An Empirical Study. 4212-4225 - Sébastien Andreina, Tobias Cloosters
, Lucas Davi
, Jens-Rene Giesen
, Marco Gutfleisch
, Ghassan Karame
, Alena Naiakshina
, Houda Naji
:
Defying the Odds: Solana's Unexpected Resilience in Spite of the Security Challenges Faced by Developers. 4226-4240 - Yuqi Hu
, Suood Alroomi
, Sena Sahin
, Frank Li
:
Unmasking the Security and Usability of Password Masking. 4241-4255
Session 9-1: Applied Crypto: Integrity and Authentication
- Guofeng Tang
, Shuai Han
, Li Lin
, Changzheng Wei
, Ying Yan
:
Batch Range Proof: How to Make Threshold ECDSA More Efficient. 4256-4270 - Victor Youdom Kemmoe
, Anna Lysyanskaya
:
RSA-Based Dynamic Accumulator without Hashing into Primes. 4271-4285 - Aniket Kate
, Easwar Vivek Mangipudi
, Pratyay Mukherjee
, Hamza Saleem
, Sri Aravinda Krishnan Thyagarajan
:
Non-interactive VSS using Class Groups and Application to DKG. 4286-4300 - Evan Laufer
, Alex Ozdemir
, Dan Boneh
:
zkPi: Proving Lean Theorems in Zero-Knowledge. 4301-4315 - Kasra Abbaszadeh
, Christodoulos Pappas
, Jonathan Katz
, Dimitrios Papadopoulos
:
Zero-Knowledge Proofs of Training for Deep Neural Networks. 4316-4330 - Xiangyang Zhang
, Yaobin Shen
, Lei Wang
:
Multi-User Security of CCM Authenticated Encryption Mode. 4331-4345
Session 9-2: ML and Security: Model Security
- Yuanyuan Yuan
, Zhibo Liu
, Sen Deng
, Yanzuo Chen
, Shuai Wang
, Yinqian Zhang
, Zhendong Su
:
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels. 4346-4360 - Jae Hyung Ju
, Jaiyoung Park
, Jongmin Kim
, Minsik Kang
, Donghwan Kim
, Jung Hee Cheon
, Jung Ho Ahn
:
NeuJeans: Private Neural Network Inference with Joint Optimization of Convolution and FHE Bootstrapping. 4361-4375 - Guopeng Lin
, Weili Han
, Wenqiang Ruan
, Ruisheng Zhou
, Lushan Song
, Bingshuai Li
, Yunfeng Shao
:
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization. 4376-4390 - Wonhee Cho
, Guillaume Hanrot
, Taeseong Kim
, Minje Park
, Damien Stehlé
:
Fast and Accurate Homomorphic Softmax Evaluation. 4391-4404 - Haochen Sun
, Jason Li
, Hongyang Zhang
:
zkLLM: Zero Knowledge Proofs for Large Language Models. 4405-4419 - Truong Son Nguyen
, Lun Wang
, Evgenios M. Kornaropoulos
, Ni Trieu
:
AITIA: Efficient Secure Computation of Bivariate Causal Discovery. 4420-4434
Session 9-3: ML and Security: Backdoors, Side Channel Attakcs, and Anomaly Detection in Machine Learning
- Nazmul Karim
, Abdullah Al Arafat
, Adnan Siraj Rakin
, Zhishan Guo
, Nazanin Rahnavard
:
Fisher Information guided Purification against Backdoor Attacks. 4435-4449 - Jinghuai Zhang
, Jianfeng Chi
, Zheng Li
, Kunlin Cai
, Yang Zhang
, Yuan Tian
:
BadMerging: Backdoor Attacks Against Model Merging. 4450-4464 - Hua Ma
, Shang Wang
, Yansong Gao
, Zhi Zhang
, Huming Qiu
, Minhui Xue
, Alsharif Abuadbba
, Anmin Fu
, Surya Nepal
, Derek Abbott
:
Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense. 4465-4479 - Eugene Bagdasarian
, Vitaly Shmatikov
:
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines. 4480-4494 - Zhibo Liu, Yuanyuan Yuan, Yanzuo Chen, Sihang Hu, Tianxiang Li, Shuai Wang:
DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables. 4495-4508 - Dongqi Han
, Zhiliang Wang
, Ruitao Feng
, Minghui Jin
, Wenqi Chen
, Kai Wang
, Su Wang
, Jiahai Yang
, Xingang Shi
, Xia Yin
, Yang Liu
:
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. 4509-4523
Session 9-4: Software Security: Attacks and Defenses
- Hao Xiang
, Zehui Cheng
, Jinku Li
, Jianfeng Ma
, Kangjie Lu
:
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness. 4524-4538 - Ruijie Li
, Chenyang Zhang
, Huajun Chai
, Lingyun Ying
, Haixin Duan
, Jun Tao
:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. 4539-4553 - Danning Xie
, Zhuo Zhang
, Nan Jiang
, Xiangzhe Xu
, Lin Tan
, Xiangyu Zhang
:
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries. 4554-4568 - Samuel Mergendahl
, Stephen Fickas
, Boyana Norris
, Richard Skowyra
:
Manipulative Interference Attacks. 4569-4583 - YongGang Li, ShunRong Jiang
, Yu Bao
, Pengpeng Chen
, Yong Zhou
, Yeh-Ching Chung
:
Isolate and Detect the Untrusted Driver with a Virtual Box. 4584-4597 - Dmitrii Kuvaiskii
, Dimitrios Stavrakakis
, Kailun Qin
, Cedric Xing
, Pramod Bhatotia
, Mona Vij
:
Gramine-TDX: A Lightweight OS Kernel for Confidential VMs. 4598-4612
Session 9-5: Applied Crypto: Advanced Encryption schemes and their applications
- Zhou Zhang
, Song Bian
, Zian Zhao
, Ran Mao
, Haoyi Zhou
, Jiafeng Hua
, Yier Jin
, Zhenyu Guan
:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. 4613-4627 - Doreen Riepel
, Marloes Venema
, Tanya Verma
:
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. 4628-4642 - Mohammad Hassan Ameri
, Jeremiah Blocki
:
Conditional Encryption with Applications to Secure Personalized Password Typo Correction. 4643-4657 - Yunling Wang
, Shi-Feng Sun
, Jianfeng Wang
, Xiaofeng Chen
, Joseph K. Liu
, Dawu Gu
:
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. 4658-4672 - Divyanshu Bhardwaj
, Sandhya Saravanan
, Nishanth Chandran
, Divya Gupta
:
Securely Training Decision Trees Efficiently. 4673-4687 - Long Meng
, Liqun Chen
, Yangguang Tian
, Mark Manulis
:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. 4688-4702
Session 9-6: Applied Crypto: Customized cryptographic solutions
- Tushar M. Jois
, Gabrielle Beck
, Gabriel Kaptchuk
:
Pulsar: Secure Steganography for Diffusion Models. 4703-4717 - Emanuele Di Giandomenico
, Yong Li
, Sven Schäge
:
Protoss: Protocol for Tight Optimal Symmetric Security. 4718-4731 - Christian Badertscher
, Fabio Banfi
, Jesus Diaz
:
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging. 4732-4746 - Daniel Collins
, Doreen Riepel
, Si An Oliver Tran
:
On the Tight Security of the Double Ratchet. 4747-4761 - Marc Fischlin
, Olga Sanina
:
Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication. 4762-4776 - Evangelia Anna Markatou
, Roberto Tamassia
:
Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs. 4777-4791
Session 9-7: Usability and Measurement: AI Risks
- Xinyao Ma
, Chaoqi Zhang
, Huadi Zhu
, L. Jean Camp
, Ming Li
, Xiaojing Liao
:
Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks. 4792-4806 - Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. 4807-4821 - Anna Yoo Jeong Ha
, Josephine Passananti
, Ronik Bhaskar
, Shawn Shan
, Reid Southen
, Hai-Tao Zheng
, Ben Y. Zhao
:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? 4822-4836 - Yixin Wu
, Yun Shen
, Michael Backes
, Yang Zhang
:
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. 4837-4851 - Zeyang Sha
, Yicong Tan
, Mingjie Li
, Michael Backes
, Yang Zhang
:
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models. 4852-4866
Workshop Session I
- William Yurcik
, Gregory Pluta
, Toan Luong
, Luis Garcia
:
HealthSec '24: First ACM CCS Workshop on Cybersecurity in Healthcare. 4882-4883 - Neil Gong
, Qi Li
, Xiaoli Zhang
:
AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. 4884-4885 - Zhiqiang Lin
, Luyi Xing
:
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Superapps. 4886-4887 - Bo Li
, Wenyuan Xu
, Jieshan Chen
, Yang Zhang
, Minhui Xue
, Shuo Wang
, Guangdong Bai
, Xingliang Yuan
:
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis. 4888-4889 - Erman Ayday
, Jaideep Vaidya
:
WPES '24: 23rd Workshop on Privacy in the Electronic Society (WPES). 4893 - Ruimin Sun
, Mu Zhang
:
RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with Security. 4894-4895 - Lesly-Ann Daniel
, Vineet Rajani
:
The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024). 4896-4897
Workshop Session II
- Ryan Craven
, Matthew S. Mickelson
:
FEAST'24: Sixth Workshop on Forming an Ecosystem Around Software Transformation. 4898-4899 - Apostolos P. Fournaris
, Paolo Palmieri
:
CCSW 2024 - Cloud Computing Security Workshop. 4900 - Sebastian Schrittwieser
, Michele Ianni
:
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. 4901-4902 - Kassem Fawaz
, Magnus Almgren
:
CPSIoTSec'24: Sixth Workshop on CPS&IoT Security and Privacy. 4903-4904 - Maura Pintor
, Matthew Jagielski
, Xinyun Chen
:
AISec '24: 17th ACM Workshop on Artificial Intelligence and Security. 4905-4906 - Liyi Zhou
, Kaihua Qin
:
DeFi '24: Workshop on Decentralized Finance and Security. 4907-4908 - Lejla Batina
, Chip-Hong Chang
, Ulrich Rührmair
, Jakub Szefer
:
ASHES '24: Workshop on Attacks and Solutions in Hardware Security. 4909-4910 - Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou:
AutonomousCyber '24 - Workshop on Autonomous Cybersecurity. 4911-4913 - Mario Fritz
, Christoph Krauß
, Hans-Joachim Hof
:
CSCS '24 - Cyber Security in CarS Workshop. 4914-4916 - Santiago Torres-Arias
, Marcela S. Melara
:
SCORED '24: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 4917-4918
Poster Session
- Zander Chown
, Aarathi Prasad
:
Poster: Privacy Norms for Fertility Data in the Roe v. Wade era. 4919-4921 - Louis Cattepoel
, Donika Mirdita
, Haya Schulmann
, Michael Waidner
:
Poster: Kill Krill or Proxy RPKI. 4922-4924 - Kevin Nsieyanji Tchokodeu
, Haya Schulmann
, Gil Sobol
, Michael Waidner
:
Poster: Security of Login Interfaces in Modern Organizations. 4925-4927 - Yuchen Ji
, Ting Dai
, Yutian Tang
, Jingzhu He
:
Poster: Whether We Are Good Enough to Detect Server-Side Request Forgeries in PHP-native Applications? 4928-4930 - Thomas Szymkowiak
, Endrit Isufi
, Markku-Juhani O. Saarinen
:
Poster: Marian: An Open Source RISC-V Processor with Zvk Vector Cryptography Extensions. 4931-4933 - Wenhao Li
, Duohe Ma
, Zhaoxuan Li
, Huaifeng Bao
, Shuai Wang
, Huamin Jin
, Xiao-Yu Zhang
:
Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector. 4934-4936 - Oliver Jacobsen
, Haya Schulmann
:
Poster: Patching NSEC3-Encloser: The Good, the Bad, and the Ugly. 4937-4939 - Di Xue
, Gang Zhao
, Zhongqi Fan
, Wei Li
, Yahong Xu
, Zhen Liu
, Yin Liu
, Zhongliang Yuan
:
Poster: An Exploration of Large Language Models in Malicious Source Code Detection. 4940-4942 - Tomasz Hyla
, Natalia Wawrzyniak
:
Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code. 4943-4945 - Tong Xin
, Ying He
, Efpraxia D. Zamani
, Cunjin Luo
:
Poster: Cyber Security Economics Model (CYSEM). 4946-4948 - Yuni Lai
, Kai Zhou
:
Poster: AuditVotes: A Framework towards Deployable Certified Robustness for GNNs. 4949-4951 - Alex Berke
, Tobin South
, Robert Mahari
, Kent Larson
, Alex Pentland
:
Poster: zkTax: A Pragmatic Way to Support Zero-Knowledge Tax Disclosures. 4952-4954 - Keiichi Ochiai
, Masayuki Terada
:
Poster: End-to-End Privacy-Preserving Vertical Federated Learning using Private Cross-Organizational Data Collaboration. 4955-4957 - Yuan Chang
, Chun-Chia Huang
, Tatsuya Mori
, Hsu-Chun Hsiao
:
Poster: YFuzz: Data-Driven Fuzzing. 4958-4960 - Elisa Zhang
, Shiyu Sun
, Yunlong Xing
, Kun Sun
:
Poster: Repairing Bugs with the Introduction of New Variables: A Multi-Agent Large Language Model. 4961-4963 - Seyed Mohammad Hadi Mirsadeghi
:
Poster: In-switch Defense against DNS Amplification DDoS Attacks. 4964-4966 - Bo Chen
, Caleb Rother
, Josh Dafoe
:
Poster: A Full-stack Secure Deletion Framework for Modern Computing Devices. 4967-4969 - Yizhi Li
, Jiang Li
, Jiahao Cao
, Renjie Xie
, Yangyang Wang
, Mingwei Xu
:
Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training. 4970-4972 - Nico Naus
, Freek Verbeek
, Sagar Atla
, Binoy Ravindran
:
Poster: Formally Verified Binary Lifting to P-Code. 4973-4975 - Gabriele Digregorio
, Roberto Alessandro Bertolini
, Francesco Panebianco
, Mario Polino
:
Poster: libdebug, Build Your Own Debugger for a Better (Hello) World. 4976-4978 - Qiaoran Meng
, Nay Oo
, Yuning Jiang
, Hoon Wei Lim
, Biplab Sikdar
:
Poster: M2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping. 4979-4981 - Andrew J. Kaizer
, Will Naciri
, Swapneel Sheth
:
Poster: Synchronization Concerns of DNS Integrations. 4982-4984 - Seoksu Lee
, Hyeongchang Jeon
, Eun-Sun Cho
:
Poster: E-Graphs and Equality Saturation for Term-Rewriting in MBA Deobfuscation: An Empirical Study. 4985-4987 - Sachin Shukla
, Omid Mirzaei
:
Poster: Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection. 4988-4990 - Jasmine Vang
, Matthew Revelle
:
Poster: Formalizing Cognitive Biases for Cybersecurity Defenses. 4991-4993 - Huan Bui
, Harper Lienerth
, Chenglong Fu
, Meera Sridhar
:
Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models. 4994-4996 - Joel Osher
, James K. Holland
, Nicholas Hopper
:
Poster: Gift or Curse? Safety Slider Settings in Tor Website Fingerprinting. 4997-4999 - Seok Min Hong
, Beom Heyn Kim
, Mohammad Mannan
:
Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks. 5000-5002 - Christian Mouchet
, Sylvain Chatel
, Lea Nürnberger
, Wouter Lueks
:
Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption. 5003-5005 - Jheng-Jia Huang
, Guan-Yu Chen
, Nai-Wei Lo
:
Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key. 5006-5008 - Arnaldo Sgueglia
, Rocco Addabbo
, Andrea Di Sorbo
, Stanislav Dashevskyi
, Daniel Ricardo dos Santos, Corrado Aaron Visaggio
:
Poster: A Multi-step Approach for Classification of Malware Samples. 5009-5011 - Jiawen Diao
, Shengmin Zhao
, Jianguo Xie
, Rongna Xie
, Guozhen Shi
:
Poster: DoHunter: A feature fusion-based LLM for DoH tunnel detection. 5012-5014 - Oliver Jacobsen
, Haya Schulmann
, Niklas Vogel
, Michael Waidner
:
Poster: From Fort to Foe: The Threat of RCE in RPKI. 5015-5017 - Shubham Malaviya
, Manish Shukla
, Saurabh Anand
, Sachin Lodha
:
Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks. 5018-5020 - Abdul Haddi Amjad
, Muhammad Ali Gulzar
:
Poster: How Do Visually Impaired Users Navigate Accessibility Challenges in an Ad-Driven Web? 5021-5023 - Wanpeng Li
, Yuejun Guo
:
Poster: Automated Dependency Mapping for Web API Security Testing Using Large Language Models. 5024-5026 - Peter Chen
, Guannan Liu
, Haining Wang
:
Poster: Acoustic Side-Channel Attack on Robot Vacuums. 5027-5029 - Jielun Wu
, Qingkai Shi
:
Poster: Protecting Source Code Privacy When Hunting Bugs. 5030-5032 - Faqi Zhao
, Duohe Ma
, Wenhao Li
, Feng Liu
, Wen Wang
:
Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation. 5033-5035 - Andreas Athanasiou
, Kangsoo Jung
, Catuscia Palamidessi
:
Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling. 5036-5038 - Abdulrahman Alhaidari
, Balaji Palanisamy
, Prashant Krishnamurthy
:
Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi. 5039-5041 - Sevval Simsek
, Zhenpeng Shi
, Howell Xia
, David Sastre Medina
, David Starobinski
:
Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database. 5042-5044 - Sin Tai Liu
, Jiayuan Yu
, Jacob Steeves
:
Poster: Solving the Free-rider Problem in Bittensor. 5045-5047 - Zhaoxiang Liu
, Ning Luo
, Samuel Judson
, Raj Gautam Dutta
, Xiaolong Guo
, Mark Santolucito
:
Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users. 5048-5050 - Jelena Mirkovic
, David M. Balenson
, Brian Kocoloski
, Geoff Lawler
, Chris Tran
, Joseph Barnes
, Yuri Pradkin
, Terry Benzel
, Srivatsan Ravi
, Ganesh Sankaran
, Alba Regalado
, David R. Choffnes
, Daniel J. Dubois
, Luis Garcia
:
Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE). 5051-5053 - Donghoon Kim
, Andrew Booth
, Euijin Choo
, Doosung Hwang
:
Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor. 5054-5056 - Yvo Desmedt
, Alireza Kavousi
, Aydin Abadi
:
Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations. 5057-5059 - Weimin Fu
, Yifang Zhao
, Yier Jin
, Xiaolong Guo
:
Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience. 5060-5062 - Huaifeng Bao
, Wenhao Li
, Zhaoxuan Li
, Han Miao
, Wen Wang
, Feng Liu
:
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. 5063-5065 - Manish Shukla
, Shubham Malaviya
, Sachin Lodha
:
Poster: Context-Based Effective Password Detection in Plaintext. 5066-5068 - Pankaj Dayama
, Vinayaka Pandit
, Sikhar Patranabis
, Abhishek Singh
, Nitin Singh
:
Poster: A Secure Multiparty Computation Platform for Squeaky-Clean Data Rooms. 5069-5071
Demonstration Session
- Zhaoxuan Li
, Ziming Zhao
, Wenhao Li
, Rui Zhang
, Rui Xue
, Siqi Lu
, Fan Zhang
:
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution. 5072-5074 - Yuechun Gu
, Jiajie He
, Keke Chen
:
Demo: FT-PrivacyScore: Personalized Privacy Scoring Service for Machine Learning Participation. 5075-5077 - Khiem Ton
, Nhi Nguyen
, Mahmoud Nazzal
, Abdallah Khreishah
, Cristian Borcea
, NhatHai Phan
, Ruoming Jin
, Issa Khalil
, Yelong Shen
:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. 5078-5080 - Solayman Ayoubi
, Sébastien Tixeuil, Gregory Blanc
, Houda Jmila
:
Demo: Towards Reproducible Evaluations of ML-Based IDS Using Data-Driven Approaches. 5081-5083 - Xianglan Huang
, Qiang Zhou
, Liangmin Wang
, Weiqi Yu
, Wenjin Wang
, Shi Shen
:
Demo: An End-to-End Anonymous Traffic Analysis System. 5084-5086
Doctoral Symposium
- Gabriela F. Ciocarlie
, Xinming Ou
:
ACM CCS 2024 Doctoral Symposium. 5087-5088 - Theodoros Trochatos
:
Trusted Execution Environments for Quantum Computers. 5089-5091 - Adam Caulfield
:
Towards Secure Runtime Auditing of Remote Embedded System Software. 5092-5094 - Nathan Reitinger
:
Understanding and Addressing Online Tracking: Online Privacy's Regulatory Turn. 5095-5097 - Zitao Chen
:
Catch Me if You Can: Detecting Unauthorized Data Use in Training Deep Learning Models. 5098-5100 - Mingming Chen
:
Evolving Network Security in the Era of Network Programmability. 5101-5103 - Pansilu Pitigalaarachchi
:
Symbolic Execution for Dynamic Kernel Analysis. 5104-5106 - Hyeongmin Choe
:
Toward Practical Threshold FHE: Low Communication, Computation and Interaction. 5107-5109 - Jiayuan Ye
:
Privacy Analyses in Machine Learning. 5110-5112 - Sayanton V. Dibbo
:
Novel Privacy Attacks and Defenses Against Neural Networks. 5113-5115 - Weidong Zhu
:
Leveraging Storage Semantics to Enhance Data Security and Privacy. 5116-5118 - Efrén López-Morales:
Securing Cyber-Physical Systems via Advanced Cyber Threat Intelligence Methods. 5119-5121 - Jialun Zhang
:
Language-based Sandboxing. 5122-5124 - Bhavish Raj Gopal
:
Privacy-Preserving Graph Analysis. 5125-5127 - Zhiyuan Yu
:
Towards Proactive Protection against Unauthorized Speech Synthesis. 5128-5130
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.