30th CCS 2024: Salt Lake City, UT, USA

Refine list

showing all ?? records

Keynote Talks

Session 1-1: Verification, Secure Architectures, and Network Security

Session 1-2: HW & CPS: Microarchitectural Attacks and Side Channels

Session 1-3: ML and Security: Machine Learning for Security

Session 1-4: HW & CPS: (Micro)Architecture Security

Session 1-5: Privacy and Anonymity: Privacy in Federated ML

Session 1-6: Privacy and Anonymity: Differential Privacy I

Session 1-7: Blockchains, Authentication, and Distributed Systems

Session 2-1: Network Security: The Internet Infrastructure

Session 2-2: Web Security I

Session 2-3: ML and Security: Machine Learning Attacks

Session 2-4: Software Security: Fuzzing I

Session 2-5: Applied Crypto: MPC I

Session 2-6: Applied Crypto: Zero Knowledge Proofs I

Session 2-7: Blockchain & Distributed Systems: Blockchain Attacks

Session 3-1: Formal Methods and Programming Languages I

Session 3-2: ML and Security: Large Language Models

Session 3-3: ML and Security: Inference Attacks

Session 3-4: Software Security: Memory Safety and Error Detection

Session 3-5: Applied Crypto: Private Information Retrieval & Private Set operations

Session 3-6: Applied Crypto: Signatures, Proofs, Integrity Schemes

Session 3-7: Usability and Measurement: Measuring and Understanding Privacy

Session 4-1: Usability and Measurement: Attack Measurements

Session 4-2: HW & CPS: Attacks and Defenses in Smart Devices

Session 4-3: Privacy and Anonymity & Applied Crypto: Privacy and Systems

Session 4-4: HW & CPS: Security of Autonomous Vehicles

Session 4-5: Privacy and Anonymity: Differential Privacy II

Session 4-6: Privacy and Anonymity: Anonymous Communication

Session 5-1: Network Security: Wireless Networks

Session 5-2: Web Security II

Session 5-3: ML and Security: Generative Models

Session 5-4: Software Security: Embedded Systems and IoT Security

Session 5-5: Applied Crypto: Key management

Session 5-6: Applied Crypto: Homomorphic Encryption

Session 5-7: Blockchain and Distributed Systems: Distributed Ledger Scalability

Session 6-1: Usability and Measurement: Usable Security

Session 6-2: Formal Methods and Programming Languages II

Session 6-3: ML and Security: Federated Learning

Session 6-4: Software Security: Access Control and Data Protection

Session 6-5: Applied Crypto: MPC II

Session 6-6: Applied Crypto: Zero Knowledge Proofs II

Session 6-7: Blockchain and Distributed Systems: Privacy and Consensus

Session 7-1: Security of Cyber-physical Systems

Session 7-2: HW & CPS 5: Attacks in the Physical World

Session 7-3: HW & CPS: Security of Circuit Design and FPGAs

Session 7-4: Privacy and Anonymity: Membership Inference Attacks

Session 7-5: Privacy and Anonymity: Privacy Attacks Meet ML

Session 7-6: Privacy: Defenses and Attacks

Session 8-1: Network Security: Traffic Analysis and Exploits

Session 8-2: Software Security: Fuzzing II

Session 8-3: ML and Security: Protection Methods in Machine Learning

Session 8-4: Software Security: Program Analysis and Security Enhancement

Session 8-5: Applied Crypto: Crypto Applied to cloud computing and machine learning

Session 8-6: Applied Crypto: ZKPs, Private set operations, Digital Currencies

Session 8-7: Usability and Measurement: Phishing, Deepfakes, and Other Risks

Session 9-1: Applied Crypto: Integrity and Authentication

Session 9-2: ML and Security: Model Security

Session 9-3: ML and Security: Backdoors, Side Channel Attakcs, and Anomaly Detection in Machine Learning

Session 9-4: Software Security: Attacks and Defenses

Session 9-5: Applied Crypto: Advanced Encryption schemes and their applications

Session 9-6: Applied Crypto: Customized cryptographic solutions

Session 9-7: Usability and Measurement: AI Risks

Workshop Session I

Workshop Session II

Poster Session

Demonstration Session

Doctoral Symposium

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy