Login / Signup
IEEE Symposium on Security and Privacy
1980
1995
2005
2022
1980
2022
Keyphrases
Publications
2022
Miranda Christ
,
Sarah Radway
,
Steven M. Bellovin
Differential Privacy and Swapping: Examining De-Identification's Impact on Minority Representation and Privacy Preservation in the U.S. Census.
IEEE Symposium on Security and Privacy
(2022)
Emma Dauterman
,
Mayank Rathee
,
Raluca Ada Popa
,
Ion Stoica
Waldo: A Private Time-Series Database from Function Secret Sharing.
IEEE Symposium on Security and Privacy
(2022)
Yan Jiang
,
Xiaoyu Ji
,
Kai Wang
,
Chen Yan
,
Richard Mitev
,
Ahmad-Reza Sadeghi
,
Wenyuan Xu
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
IEEE Symposium on Security and Privacy
(2022)
Jiska Classen
,
Francesco Gringoli
,
Michael Hermann
,
Matthias Hollick
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
IEEE Symposium on Security and Privacy
(2022)
Yanan Guo
,
Andrew Zigerelli
,
Youtao Zhang
,
Jun Yang
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks.
IEEE Symposium on Security and Privacy
(2022)
Nicola Ruaro
,
Fabio Pagani
,
Stefano Ortolani
,
Christopher Kruegel
,
Giovanni Vigna
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros.
IEEE Symposium on Security and Privacy
(2022)
Patrick Jattke
,
Victor van der Veen
,
Pietro Frigo
,
Stijn Gunter
,
Kaveh Razavi
BLACKSMITH: Scalable Rowhammering in the Frequency Domain.
IEEE Symposium on Security and Privacy
(2022)
Guanhong Tao
,
Yingqi Liu
,
Guangyu Shen
,
Qiuling Xu
,
Shengwei An
,
Zhuo Zhang
,
Xiangyu Zhang
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
IEEE Symposium on Security and Privacy
(2022)
Sonia Belaïd
,
Darius Mercadier
,
Matthieu Rivain
,
Abdul Rahman Taleb
IronMask: Versatile Verification of Masking Security.
IEEE Symposium on Security and Privacy
(2022)
Adnan Siraj Rakin
,
Md Hafizul Islam Chowdhuryy
,
Fan Yao
,
Deliang Fan
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.
IEEE Symposium on Security and Privacy
(2022)
Jun Zeng
,
Xiang Wang
,
Jiahao Liu
,
Yinfang Chen
,
Zhenkai Liang
,
Tat-Seng Chua
,
Zheng Leong Chua
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
IEEE Symposium on Security and Privacy
(2022)
Martin R. Albrecht
,
Lenka Mareková
,
Kenneth G. Paterson
,
Igors Stepanovs
Four Attacks and a Proof for Telegram.
IEEE Symposium on Security and Privacy
(2022)
Sacha Servan-Schreiber
,
Simon Langowski
,
Srinivas Devadas
Private Approximate Nearest Neighbor Search with Sublinear Communication.
IEEE Symposium on Security and Privacy
(2022)
Hadi Givehchian
,
Nishant Bhaskar
,
Eliana Rodriguez Herrera
,
Héctor Rodrigo López Soto
,
Christian Dameff
,
Dinesh Bharadia
,
Aaron Schulman
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.
IEEE Symposium on Security and Privacy
(2022)
Mengyuan Li
,
Luca Wilke
,
Jan Wichelmann
,
Thomas Eisenbarth
,
Radu Teodorescu
,
Yinqian Zhang
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
IEEE Symposium on Security and Privacy
(2022)
Albert Cheu
,
Maxim Zhilyaev
Differentially Private Histograms in the Shuffle Model from Fake Users.
IEEE Symposium on Security and Privacy
(2022)
Alyssa Milburn
,
Erik van der Kouwe
,
Cristiano Giuffrida
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.
IEEE Symposium on Security and Privacy
(2022)
Jie Liang
,
Mingzhe Wang
,
Chijin Zhou
,
Zhiyong Wu
,
Yu Jiang
,
Jianzhong Liu
,
Zhe Liu
,
Jiaguang Sun
PATA: Fuzzing with Path Aware Taint Analysis.
IEEE Symposium on Security and Privacy
(2022)
Yuxi Wu
,
W. Keith Edwards
,
Sauvik Das
SoK: Social Cybersecurity.
IEEE Symposium on Security and Privacy
(2022)
Alan Romano
,
Daniel Lehmann
,
Michael Pradel
,
Weihang Wang
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.
IEEE Symposium on Security and Privacy
(2022)
Zhi Li
,
Weijie Liu
,
Hongbo Chen
,
XiaoFeng Wang
,
Xiaojing Liao
,
Luyi Xing
,
Mingming Zha
,
Hai Jin
,
Deqing Zou
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
IEEE Symposium on Security and Privacy
(2022)
Collins W. Munyendo
,
Yasemin Acar
,
Adam J. Aviv
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya.
IEEE Symposium on Security and Privacy
(2022)
Pengfei Hu
,
Hui Zhuang
,
Panneer Selvam Santhalingam
,
Riccardo Spolaor
,
Parth H. Pathak
,
Guoming Zhang
,
Xiuzhen Cheng
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.
IEEE Symposium on Security and Privacy
(2022)
Yun Shen
,
Xinlei He
,
Yufei Han
,
Yang Zhang
Model Stealing Attacks Against Inductive Graph Neural Networks.
IEEE Symposium on Security and Privacy
(2022)
Chris Brzuska
,
Eric Cornelissen
,
Konrad Kohbrok
Security Analysis of the MLS Key Derivation.
IEEE Symposium on Security and Privacy
(2022)
Johnny So
,
Najmeh Miramirkhani
,
Michael Ferdman
,
Nick Nikiforakis
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust.
IEEE Symposium on Security and Privacy
(2022)
Iskander Sánchez-Rola
,
Matteo Dell'Amico
,
Davide Balzarotti
,
Pierre-Antoine Vervier
,
Leyla Bilge
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships.
IEEE Symposium on Security and Privacy
(2022)
Jianliang Wu
,
Ruoyu Wu
,
Dongyan Xu
,
Dave Jing Tian
,
Antonio Bianchi
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
IEEE Symposium on Security and Privacy
(2022)
Mustafa Abdallah
,
Daniel Woods
,
Parinaz Naghizadeh
,
Issa Khalil
,
Timothy N. Cason
,
Shreyas Sundaram
,
Saurabh Bagchi
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
IEEE Symposium on Security and Privacy
(2022)
Damiano Abram
,
Ariel Nof
,
Claudio Orlandi
,
Peter Scholl
,
Omer Shlomovits
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.
IEEE Symposium on Security and Privacy
(2022)
Alex Ozdemir
,
Fraser Brown
,
Riad S. Wahby
CirC: Compiler infrastructure for proof systems, software verification, and more.
IEEE Symposium on Security and Privacy
(2022)
Quoc Huy Do
,
Pedram Hosseyni
,
Ralf Küsters
,
Guido Schmitz
,
Nils Wenzler
,
Tim Würtele
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification.
IEEE Symposium on Security and Privacy
(2022)
Michael Rosenberg
,
Mary Maller
,
Ian Miers
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.
IEEE Symposium on Security and Privacy
(2022)
Adithya Vadapalli
,
Kyle Storrier
,
Ryan Henry
Sabre: Sender-Anonymous Messaging with Fast Audits.
IEEE Symposium on Security and Privacy
(2022)
Michele Marazzi
,
Patrick Jattke
,
Flavien Solt
,
Kaveh Razavi
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh.
IEEE Symposium on Security and Privacy
(2022)
Mohammad Ghasemisharif
,
Chris Kanich
,
Jason Polakis
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments.
IEEE Symposium on Security and Privacy
(2022)
Shixuan Zhao
,
Mengyuan Li
,
Yinqian Zhang
,
Zhiqiang Lin
vSGX: Virtualizing SGX Enclaves on AMD SEV.
IEEE Symposium on Security and Privacy
(2022)
Christian Stransky
,
Oliver Wiese
,
Volker Roth
,
Yasemin Acar
,
Sascha Fahl
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University.
IEEE Symposium on Security and Privacy
(2022)
Jiajun Gong
,
Wuqi Zhang
,
Charles Zhang
,
Tao Wang
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense.
IEEE Symposium on Security and Privacy
(2022)
Amit Seal Ami
,
Nathan Cooper
,
Kaushal Kafle
,
Kevin Moran
,
Denys Poshyvanyk
,
Adwait Nadkarni
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques.
IEEE Symposium on Security and Privacy
(2022)
Nicholas Boucher
,
Ilia Shumailov
,
Ross Anderson
,
Nicolas Papernot
Bad Characters: Imperceptible NLP Attacks.
IEEE Symposium on Security and Privacy
(2022)
Sophie Stephenson
,
Bijeeta Pal
,
Stephen Fan
,
Earlence Fernandes
,
Yuhang Zhao
,
Rahul Chatterjee
SoK: Authentication in Augmented and Virtual Reality.
IEEE Symposium on Security and Privacy
(2022)
Yingqi Liu
,
Guangyu Shen
,
Guanhong Tao
,
Shengwei An
,
Shiqing Ma
,
Xiangyu Zhang
Piccolo: Exposing Complex Backdoors in NLP Transformer Models.
IEEE Symposium on Security and Privacy
(2022)
Eric Pauley
,
Ryan Sheatsley
,
Blaine Hoak
,
Quinn Burke
,
Yohan Beugin
,
Patrick D. McDaniel
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.
IEEE Symposium on Security and Privacy
(2022)
Long Huang
,
Chen Wang
PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response.
IEEE Symposium on Security and Privacy
(2022)
Hammond Pearce
,
Baleegh Ahmad
,
Benjamin Tan
,
Brendan Dolan-Gavitt
,
Ramesh Karri
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions.
IEEE Symposium on Security and Privacy
(2022)
Ivan De Oliveira Nunes
,
Seoyeon Hwang
,
Sashidhar Jakkamsetti
,
Gene Tsudik
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
IEEE Symposium on Security and Privacy
(2022)
Maria Leonor Pacheco
,
Max von Hippel
,
Ben Weintraub
,
Dan Goldwasser
,
Cristina Nita-Rotaru
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
IEEE Symposium on Security and Privacy
(2022)
Samir Jordan Menon
,
David J. Wu
SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition.
IEEE Symposium on Security and Privacy
(2022)
Sourav Das
,
Thomas Yurek
,
Zhuolun Xiang
,
Andrew K. Miller
,
Lefteris Kokoris-Kogias
,
Ling Ren
Practical Asynchronous Distributed Key Generation.
IEEE Symposium on Security and Privacy
(2022)