default search action
43rd SP 2022: San Francisco, CA, USA - Workshops
- 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022. IEEE 2022, ISBN 978-1-6654-9643-8
SecWeb: Workshop on Designing Security for the Web
- Peter Stolz, Sebastian Roth, Ben Stock:
To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. 1-12 - Moritz Birghan, Thyla van der Merwe:
A Client-Side Seat to TLS Deployment. 13-19 - Tom van Goethem, Wouter Joosen:
Towards Improving the Deprecation Process of Web Features through Progressive Web Security. 20-30 - Merve Sahin, Tolga Ünlü, Cédric Hébert, Lynsay A. Shepherd, Natalie Coull, Colin McLean:
Measuring Developers' Web Security Awareness from Attack and Defense Perspectives. 31-43 - Emanuel von Zezschwitz, Serena Chen, Emily Stark:
"It builds trust with the customers" - Exploring User Perceptions of the Padlock Icon in Browser UI. 44-50 - Dashmeet Kaur Ajmani, Igibek Koishybayev, Alexandros Kapravelos:
yoU aRe a Liar: //A Unified Framework for Cross-Testing URL Parsers. 51-58
DLS: Deep Learning and Security Workshop
- Vera Wesselkamp, Konrad Rieck, Daniel Arp, Erwin Quiring:
Misleading Deep-Fake Detection with GAN Fingerprints. 59-65 - Johannes Schneider, Giovanni Apruzzese:
Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike. 66-72 - Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati:
Ares: A System-Oriented Wargame Framework for Adversarial ML. 73-79 - Sihui Dai, Saeed Mahloujifar, Prateek Mittal:
Parameterizing Activation Functions for Adversarial Robustness. 80-87
LangSec: The 8th Workshop on Language-theoretic Security and Applications
- Alexander Grushin, Walt Woods:
Anomaly Detection with Neural Parsers That Never Reject. 88-97 - Michael Robinson, Cory Anderson, Letitia W. Li, Steve Huntsman:
Statistical detection of format dialects using the weighted Dowker complex. 98-112 - John Sarracino, Gang Tan, Greg Morrisett:
Certified Parsing of Dependent Regular Grammars. 113-123 - Sameed Ali, Sean W. Smith:
A Secure Parser Generation Framework for IoT Protocols on Microcontrollers. 124-135 - Prashant Anantharaman, Steven Cheung, Nicholas Boorman, Michael E. Locasto:
A Format-Aware Reducer for Scriptable Rewriting of PDF Files. 136-151 - Mark Tullsen, William Harris, Peter Wyatt:
Research Report: Strengthening Weak Links in the PDF Trust Chain. 152-167 - Tim Allison, Wayne Burke, Dustin Graf, Chris Mattmann, Anastasija Mensikova, Mike Milano, Philip Southam, Ryan Stonebraker:
Research Report: Progress on Building a File Observatory for Secure Parser Development. 168-175 - Vijay H. Kothari, Prashant Anantharaman, Sean W. Smith, Briland Hitaj, Prashanth Mundkur, Natarajan Shankar, Letitia W. Li, Iavor Diatchki, William Harris:
Capturing the iccMAX calculatorElement: A Case Study on Format Design. 176-197 - Wayne Wang, Peter C. Johnson:
Research Report: On the Feasibility of Retrofitting Operating Systems with Generated Protocol Parsers. 198-207
SafeThings: Workshop on the Internet of Safe Things
- Jimmy Briggs, Christine Geeng:
BLE-Doubt: Smartphone-Based Detection of Malicious Bluetooth Trackers. 208-214 - Klaudia Krawiecka, Simon Birnbach, Simon Eberz, Ivan Martinovic:
Biometric Identification System based on Object Interactions in Internet of Things Environments. 215-221 - Nikos Fotiou, Vasilios A. Siris, George C. Polyzos, Yki Kortesniemi, Dmitrij Lagutin:
Capabilities-based access control for IoT devices using Verifiable Credentials. 222-228 - Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu:
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception. 229-235 - Haoda Wang, Christophe Hauser, Luis Garcia:
AutoCPS: Control Software Dataset Generation for Semantic Reverse Engineering. 236-242 - Xi Qin, Martin Rosso, Alvaro A. Cárdenas, Sandro Etalle, Jerry den Hartog, Emmanuele Zambon:
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network. 243-250 - Abdullah Zubair Mohammed, Alok K. Singh, Gökçen Yilmaz Dayanikli, Ryan M. Gerdes, Mani Mina, Ming Li:
Towards Wireless Spiking of Smart Locks. 251-257 - Pavan Srihari Darbha, Mauro Conti, Eleonora Losiouk, Rajib Ranjan Maiti:
Face Recognition Systems: Are you sure they only consider your face? 258-264
WOOT: Workshop on Offensive Technologies
- Daniel Marth, Clemens Hlauschek, Christian Schanes, Thomas Grechenig:
Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits. 265-276 - Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque:
Exploring Widevine for Fun and Profit. 277-288 - Jordy Gennissen, Daniel O'Keeffe:
Hack the Heap: Heap Layout Manipulation made Easy. 289-300 - Thomas Roth, Fabian Freyer, Matthias Hollick, Jiska Classen:
AirTag of the Clones: Shenanigans with Liberated Item Finders. 301-311 - Sisheng Liang, Zihao Zhan, Fan Yao, Long Cheng, Zhenkai Zhang:
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance. 312-322 - Anish Saxena, Biswabandan Panda:
DABANGG: A Case for Noise Resilient Flush-Based Cache Attacks. 323-334 - Keith O'Neal, Scott Yilek:
Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending. 335-341 - Hendrik Siewert, Martin Kretschmer, Marcus Niemietz, Juraj Somorovsky:
On the Security of Parsing Security-Relevant HTTP Headers in Modern Browsers. 342-352 - Daniele Antonioli, Mathias Payer:
On the Insecurity of Vehicles Against Protocol-Level Bluetooth Threats. 353-362
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.