Login / Signup
CCS
1993
2003
2013
2023
1993
2023
Keyphrases
Publications
2023
Till Schlüter
,
Amit Choudhari
,
Lorenz Hetterich
,
Leon Trampert
,
Hamed Nemati
,
Ahmad Ibrahim
,
Michael Schwarz
,
Christian Rossow
,
Nils Ole Tippenhauer
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
CCS
(2023)
Sylvain Chatel
,
Christian Knabenhans
,
Apostolos Pyrgelis
,
Carmela Troncoso
,
Jean-Pierre Hubaux
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
CCS
(2023)
Omid Mir
,
Balthazar Bauer
,
Scott Griffy
,
Anna Lysyanskaya
,
Daniel Slamanig
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
CCS
(2023)
Matthew Green
,
Abhishek Jain
,
Gijs Van Laer
Efficient Set Membership Encryption and Applications.
CCS
(2023)
Jakob Feldtkeller
,
Tim Güneysu
,
Thorben Moos
,
Jan Richter-Brockmann
,
Sayandeep Saha
,
Pascal Sasdrich
,
François-Xavier Standaert
Combined Private Circuits - Combined Security Refurbished.
CCS
(2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
,
Jiqiang Liu
,
Wei Wang
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
CCS
(2023)
Yuechun Gu
,
Sagar Sharma
,
Keke Chen
Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning.
CCS
(2023)
Peiyao Sheng
,
Xuechao Wang
,
Sreeram Kannan
,
Kartik Nayak
,
Pramod Viswanath
TrustBoost: Boosting Trust among Interoperable Blockchains.
CCS
(2023)
Xin Tan
,
Yuan Zhang
,
Jiadong Lu
,
Xin Xiong
,
Zhuang Liu
,
Min Yang
SyzDirect: Directed Greybox Fuzzing for Linux Kernel.
CCS
(2023)
Borja Balle
,
James Bell
,
Adrià Gascón
Amplification by Shuffling without Shuffling.
CCS
(2023)
Changqing Miao
,
Jianan Feng
,
Wei You
,
Wenchang Shi
,
Jianjun Huang
,
Bin Liang
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
CCS
(2023)
Mohammad M. Ahmadpanah
,
Daniel Hedin
,
Andrei Sabelfeld
Poster: Data Minimization by Construction for Trigger-Action Applications.
CCS
(2023)
Qi Li
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CCS
(2023)
Gabrielle Beck
,
Aarushi Goel
,
Aditya Hegde
,
Abhishek Jain
,
Zhengzhong Jin
,
Gabriel Kaptchuk
Scalable Multiparty Garbling.
CCS
(2023)
Roman Beltiukov
,
Wenbo Guo
,
Arpit Gupta
,
Walter Willinger
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems.
CCS
(2023)
Xianbo Mo
,
Shunquan Tan
,
Bin Li
,
Jiwu Huang
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
CCS
(2023)
Tao Ni
,
Xiaokuan Zhang
,
Qingchuan Zhao
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel.
CCS
(2023)
Yuanpeng Wang
,
Ziqi Zhang
,
Ningyu He
,
Zhineng Zhong
,
Shengjian Guo
,
Qinkun Bao
,
Ding Li
,
Yao Guo
,
Xiangqun Chen
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
CCS
(2023)
Daniel Lammers
,
Amir Moradi
,
Nicolai Müller
,
Aein Rezaei Shahmirzadi
A Thorough Evaluation of RAMBAM.
CCS
(2023)
Joël Alwen
,
Dominik Hartmann
,
Eike Kiltz
,
Marta Mularczyk
,
Peter Schwabe
Post-Quantum Multi-Recipient Public Key Encryption.
CCS
(2023)
Maryam Mustafa
,
Abdul Moeed Asad
,
Shehrbano Hassan
,
Urooj Haider
,
Zainab Durrani
,
Katharina Krombholz
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
CCS
(2023)
Gowri R. Chandran
,
Philipp-Florens Lehwalder
,
Leandro Rometsch
,
Thomas Schneider
Poster: Secure and Differentially Private kth Ranked Element.
CCS
(2023)
Yan He
,
Qiuye He
,
Song Fang
,
Yao Liu
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription.
CCS
(2023)
Liu Liu
,
Xinwen Fu
,
Xiaodong Chen
,
Jianpeng Wang
,
Zhongjie Ba
,
Feng Lin
,
Li Lu
,
Kui Ren
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
CCS
(2023)
Cong Shi
,
Tianfang Zhang
,
Zhaoyi Xu
,
Shuping Li
,
Donglin Gao
,
Changming Li
,
Athina P. Petropulu
,
Chung-Tse Michael Wu
,
Yingying Chen
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO.
CCS
(2023)
Shijia Li
,
Jiang Ming
,
Pengda Qiu
,
Qiyuan Chen
,
Lanqing Liu
,
Huaifeng Bao
,
Qiang Wang
,
Chunfu Jia
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection.
CCS
(2023)
Kelong Cong
,
Debajyoti Das
,
Georgio Nicolas
,
Jeongeun Park
Poster: Panacea - Stateless and Non-Interactive Oblivious RAM.
CCS
(2023)
Alireza Bahramali
,
Ardavan Bozorgi
,
Amir Houmansadr
Realistic Website Fingerprinting By Augmenting Network Traces.
CCS
(2023)
Su Yang
,
Yang Xiao
,
Zhengzi Xu
,
Chengyi Sun
,
Chen Ji
,
Yuqing Zhang
Enhancing OSS Patch Backporting with Semantics.
CCS
(2023)
Drew Zagieboylo
,
Charles Sherk
,
Andrew C. Myers
,
G. Edward Suh
SpecVerilog: Adapting Information Flow Control for Secure Speculation.
CCS
(2023)
Rutvik Choudhary
,
Alan Wang
,
Zirui Neil Zhao
,
Adam Morrison
,
Christopher W. Fletcher
Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures.
CCS
(2023)
Rex Fernando
,
Arnab Roy
Poster: WIP: Account ZK-Rollups from Sumcheck Arguments.
CCS
(2023)
Sven Smolka
,
Jens-Rene Giesen
,
Pascal Winkler
,
Oussama Draissi
,
Lucas Davi
,
Ghassan Karame
,
Klaus Pohl
Fuzz on the Beach: Fuzzing Solana Smart Contracts.
CCS
(2023)
Kyungho Joo
,
Dong Hoon Lee
,
Yeonseon Jeong
,
Wonsuk Choi
Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
CCS
(2023)
Dahlia Malkhi
,
Atsuki Momose
,
Ling Ren
Towards Practical Sleepy BFT.
CCS
(2023)
Jan-Philip van Acken
,
Joost F. Gadellaa
,
Slinger Jansen
,
Katsiaryna Labunets
Poster: The Unknown Unknown: Cybersecurity Threats of Shadow IT in Higher Education.
CCS
(2023)
Renas Bacho
,
Julian Loss
Adaptively Secure (Aggregatable) PVSS and Application to Distributed Randomness Beacons.
CCS
(2023)
Nikita Yadav
,
Vinod Ganapathy
Whole-Program Control-Flow Path Attestation.
CCS
(2023)
Zilong Wang
,
Gideon Mohr
,
Klaus von Gleissenthall
,
Jan Reineke
,
Marco Guarnieri
Specification and Verification of Side-channel Security for Open-source Processors via Leakage Contracts.
CCS
(2023)
Mario Yaksetig
,
Alexander Havlin
Poster: Signer Discretion is Advised: On the Insecurity of Vitalik's Threshold Hash-based Signatures.
CCS
(2023)
Betül Askin Özdemir
,
Tim Beyne
Poster: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers.
CCS
(2023)
Chao Wang
,
Yue Zhang
,
Zhiqiang Lin
Uncovering and Exploiting Hidden APIs in Mobile Super Apps.
CCS
(2023)
Zhi Li
,
Weijie Liu
,
XiaoFeng Wang
,
Bin Yuan
,
Hongliang Tian
,
Hai Jin
,
Shoumeng Yan
Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation.
CCS
(2023)
Diego F. Aranha
,
Carsten Baum
,
Kristian Gjøsteen
,
Tjerand Silde
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
CCS
(2023)
McKenna McCall
,
Abhishek Bichhawat
,
Limin Jia
Tainted Secure Multi-Execution to Restrict Attacker Influence.
CCS
(2023)
Ben Nassi
,
Ofek Vayner
,
Etay Iluz
,
Dudi Nassi
,
Jan Jancar
,
Daniel Genkin
,
Eran Tromer
,
Boris Zadov
,
Yuval Elovici
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
CCS
(2023)
David Klein
,
Benny Rolle
,
Thomas Barber
,
Manuel Karl
,
Martin Johns
General Data Protection Runtime: Enforcing Transparent GDPR Compliance for Existing Applications.
CCS
(2023)
Minxin Du
,
Xiang Yue
,
Sherman S. M. Chow
,
Tianhao Wang
,
Chenyu Huang
,
Huan Sun
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
CCS
(2023)
Gyungeun Yun
,
Kyungho Joo
,
Wonsuk Choi
,
Dong Hoon Lee
Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
CCS
(2023)
Torsten Krauß
,
Alexandra Dmitrienko
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
CCS
(2023)