default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 262 matches
- 2024
- Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. SP 2024: 91-109 - Bhupendra Acharya, Muhammad Saad, Antonio Emanuele Cinà, Lea Schönherr, Hoang Dai Nguyen, Adam Oest, Phani Vadrevu, Thorsten Holz:
Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. SP 2024: 17-35 - Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim:
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models. SP 2024: 1122-1140 - Jannik Albrecht, Sébastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Azzurra Marson, Julian Willingmann:
Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security. SP 2024: 2161-2179 - Martin R. Albrecht, Benjamin Dowling, Daniel Jones:
Device-Oriented Group Messaging: A Formal Cryptographic Analysis of Matrix' Core. SP 2024: 2666-1685 - Fritz Alder, Lesly-Ann Daniel, David F. Oswald, Frank Piessens, Jo Van Bulck:
Pandora: Principled Symbolic Validation of Intel SGX Enclave Runtimes. SP 2024: 4163-4181 - Sabrina Amft, Sandra Höltervennhoff, Rebecca Panskus, Karola Marky, Sascha Fahl:
Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. SP 2024: 1065-1082 - Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing. SP 2024: 3979-3997 - Max Ammann, Lucca Hirschi, Steve Kremer:
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing. SP 2024: 1481-1499 - Narges Ashena, Oana Inel, Badrie L. Persaud, Abraham Bernstein:
Casual Users and Rational Choices within Differential Privacy. SP 2024: 932-950 - André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono:
SoK: Security and Privacy of Blockchain Interoperability. SP 2024: 3840-3865 - Weihao Bai, Long Chen, Qianwen Gao, Zhenfeng Zhang:
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography. SP 2024: 578-596 - Osama Bajaber, Bo Ji, Peng Gao:
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF. SP 2024: 4610-4628 - Philipp Beer, Marco Squarcina, Lorenzo Veronese, Martina Lindorfer:
Tabbed Out: Subverting the Android Custom Tab Security Model. SP 2024: 4591-4609 - Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. SP 2024: 635-654 - Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif:
CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers. SP 2024: 1345-1364 - Eleanor Birrell, Jay Rodolitz, Angel Ding, Jenna Lee, Emily McReynolds, Jevan A. Hutson, Ada Lerner:
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations. SP 2024: 673-696 - William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang:
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization. SP 2024: 4554-4572 - Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. SP 2024: 503-522 - Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories. SP 2024: 2067-2085 - Jiaxun Cao, Abhinaya S. B., Anupam Das, Pardis Emami Naeini:
Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtual Reality. SP 2024: 1554-1572 - Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum S. Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr:
Poisoning Web-Scale Training Datasets is Practical. SP 2024: 407-425 - Saiid El Hajj Chehade, Sandra Siby, Carmela Troncoso:
SINBAD: Saliency-informed detection of breakage caused by ad blocking. SP 2024: 258-276 - Weiteng Chen, Yu Hao, Zheng Zhang, Xiaochen Zou, Dhilung Kirat, Shachee Mishra, Douglas Lee Schales, Jiyong Jang, Zhiyun Qian:
SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing. SP 2024: 4661-4677 - Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. SP 2024: 2255-2272 - Yuanliang Chen, Fuchen Ma, Yuanhang Zhou, Ming Gu, Qing Liao, Yu Jiang:
Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay. SP 2024: 1939-1955 - Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. SP 2024: 3961-3978 - Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han:
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance. SP 2024: 3533-3551 - Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. SP 2024: 1703-1721 - Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. SP 2024: 1628-1645
skipping 232 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 09:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint