default search action
EuroS&P 2023: Delft, Netherlands
- 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023. IEEE 2023, ISBN 978-1-6654-6512-0
- Antonio Ruggia, Andrea Possemato, Alessio Merlo, Dario Nisi, Simone Aonzo:
Android, Notify Me When It Is Time To Go Phishing. 1-17 - Jienan Liu, Pooja Pun, Phani Vadrevu, Roberto Perdisci:
Understanding, Measuring, and Detecting Modern Technical Support Scams. 18-38 - Wentao Chen, Fuzhou Wang, Matthew Edwards:
Active Countermeasures for Email Fraud. 39-55 - Vivek Nair, Dawn Song:
Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. 56-72 - Deepika Natarajan, Andrew D. Loveless, Wei Dai, Ronald G. Dreslinski:
Chex-Mix: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud. 73-91 - Owen Millwood, Meltem Kurt Pehlivanoglu, Aryan Mohammadi Pasikhani, Jack Miskelly, Prosanta Gope, Elif Bilge Kavun:
A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs. 92-106 - Vincent Cheval, José Moreira, Mark Ryan:
Automatic verification of transparency protocols. 107-121 - Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song:
SoK: Data Sovereignty. 122-143 - Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad:
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. 144-159 - Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. 160-174 - Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot:
When the Curious Abandon Honesty: Federated Learning Is Not Private. 175-199 - Wenjie Qu, Youqi Li, Binghui Wang:
A Certified Radius-Guided Attack Framework to Image Segmentation Models. 200-220 - Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer:
SoK: Explainable Machine Learning for Computer Security Applications. 221-240 - Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot:
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation. 241-257 - Vijayanta Jain, Sepideh Ghanavati, Sai Teja Peddinti, Collin McMillan:
Towards Fine-Grained Localization of Privacy Behaviors. 258-277 - Tim Van hamme, Giuseppe Garofalo, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. 278-291 - Thore Tiemann, Sebastian Berndt, Thomas Eisenbarth, Maciej Liskiewicz:
"Act natural!": Exchanging Private Messages on Public Blockchains. 292-308 - Ravital Solomon, Rick Weber, Ghada Almashaqbeh:
smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption. 309-331 - Jiaqi Chen, Yibo Wang, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. 332-351 - Rongwu Xu, Sen Yang, Fan Zhang, Zhixuan Fang:
MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments. 352-372 - Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. 373-391 - Yoshimasa Akimoto, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma:
Privformer: Privacy-preserving Transformer with MPC. 392-410 - Mengxia Ren, Chuan Yue:
Coverage and Secure Use Analysis of Content Security Policies via Clustering. 411-428 - Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert:
CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs. 429-448 - Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi:
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation. 449-471 - Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:
Fuzzing SGX Enclaves via Host Program Mutations. 472-488 - Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves:
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. 489-505 - Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:
Code Vulnerability Detection via Signal-Aware Learning. 506-523 - Tom Ganz, Philipp Rall, Martin Härterich, Konrad Rieck:
Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery. 524-541 - Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Zhili Sun, Hemant Zope:
Systematic Improvement of Access-Stratum Security in Mobile Networks. 542-557 - Jonas Bushart, Christian Rossow:
Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives. 558-575 - Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, Matthias Wählisch:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. 576-591 - Giovanni Apruzzese, Pavel Laskov, Johannes Schneider:
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. 592-614 - Andrea Agiollo, Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. 615-630 - Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström:
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations. 631-650 - Marton Bognar, Hans Winderix, Jo Van Bulck, Frank Piessens:
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling. 651-670 - Alyssa Milburn, Ke Sun, Henrique Kawakami:
You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks. 671-686 - Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. 687-706 - Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque, Karthikeyan Bhargavan:
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. 707-723 - Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Recurring Contingent Service Payment. 724-756 - Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji:
SIM: Secure Interval Membership Testing and Applications to Secure Comparison. 757-772 - Felix Günther, Marc Ilunga Tshibumbu Mukendi:
Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol. 773-796 - Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot:
Proof-of-Learning is Currently More Broken Than You Think. 797-816 - Stijn Pletinckx, Thanh-Dat Nguyen, Tobias Fiebig, Christopher Kruegel, Giovanni Vigna:
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. 817-831 - José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador:
Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. 832-846 - Daniel Kirkman, Kami Vaniea, Daniel W. Woods:
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs. 847-867 - Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh:
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice. 868-895 - Jack P. K. Ma, Sherman S. M. Chow:
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). 896-912 - Pantelina Ioannou, Elias Athanasopoulos:
Been Here Already? Detecting Synchronized Browsers in the Wild. 913-927 - Nick Frymann, Daniel Gardham, Mark Manulis:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. 928-941 - Theo von Arx, Muoi Tran, Laurent Vanbever:
Revelio: A Network-Level Privacy Attack in the Lightning Network. 942-957 - Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:
Conjunctive Searchable Symmetric Encryption from Hard Lattices. 958-978 - John Henry Castellanos, Mohamed Maghenem, Alvaro A. Cárdenas, Ricardo G. Sanfelice, Jianying Zhou:
Provable Adversarial Safety in Cyber-Physical Systems. 979-1012 - Anrin Chakraborti, Michael K. Reiter:
Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. 1013-1029 - Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. 1030-1046 - Muhammad Ibrahim, Andrea Continella, Antonio Bianchi:
AoT - Attack on Things: A security analysis of IoT firmware updates. 1047-1064 - Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. 1065-1081 - Yuan Xu, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu, Tianwei Zhang:
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View. 1082-1100 - Darion Cassel, Wai Tuck Wong, Limin Jia:
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. 1101-1127 - Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert:
faulTPM: Exposing AMD fTPMs' Deepest Secrets. 1128-1142 - Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald, Frank Piessens, Dominique Devriese:
CHERI-TrEE: Flexible enclaves on capability machines. 1143-1159 - Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed:
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities. 1160-1178 - Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. 1179-1197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.