


default search action
32nd NDSS 2025: San Diego, CA, USA
- 32nd Annual Network and Distributed System Security Symposium, NDSS 2025, San Diego, California, USA, February 24-28, 2025. The Internet Society 2025
Summer Cycle
- Miaomiao Wang, Guang Hua, Sheng Li, Guorui Feng:
A Key-Driven Framework for Identity-Preserving Face Anonymization. - Zitao Chen, Karthik Pattabiraman:
A Method to Facilitate Membership Inference Attacks in Deep Learning Models. - Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss:
A Systematic Evaluation of Novel and Existing Cache Side Channels. - Qi Xia, Qian Chen:
AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight. - Xin Zhang, Xiaohan Zhang, Zhichen Liu, Bo Zhao, Zhemin Yang, Min Yang:
An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps. - Yue Qin, Yue Xiao, Xiaojing Liao:
Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification. - Yunpeng Tian, Feng Dong, Haoyi Liu, Meng Xu, Zhiniang Peng, Zesen Ye, Shenghui Li, Xiapu Luo, Haoyu Wang:
Be Careful of What You Embed: Demystifying OLE Vulnerabilities. - Yan Pang, Tianhao Wang:
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models. - Yinggang Guo, Zicheng Wang, Weiheng Bai, Qingkai Zeng, Kangjie Lu:
BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS. - Wen-jie Lu, Zhicong Huang, Zhen Gu, Jingyu Li, Jian Liu, Cheng Hong, Kui Ren, Tao Wei, Wenguang Chen:
BumbleBee: Secure Two-party Inference Framework for Large Transformers. - Shang Ma, Chaoran Chen, Shao Yang, Shifu Hou, Toby Jia-Jun Li, Xusheng Xiao, Tao Xie, Yanfang Ye:
Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph. - Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz:
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting. - Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Bruno Ribeiro, Shengwei An, Pin-Yu Chen, Xiangyu Zhang, Ninghui Li:
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling. - Sirus Shahini, Robert Ricci:
CHAOS: Exploiting Station Time Synchronization in 802.11 Networks. - Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji:
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. - Yanzuo Chen, Zhibo Liu, Yuanyuan Yuan, Sihang Hu, Tianxiang Li, Shuai Wang:
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables. - Pinji Chen, Jianjun Chen, Mingming Zhang, Qi Wang, Yiming Zhang, Mingwei Xu, Haixin Duan:
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange. - Xiaochen Li, Zhan Qin, Kui Ren, Chen Gong, Shuya Feng, Yuan Hong, Tianhao Wang:
Delay-allowed Differentially Private Data Stream Release. - Yuefeng Peng, Ali Naseh, Amir Houmansadr:
Diffence: Fencing Membership Privacy With Diffusion Models. - Zhuo Chen, Yufeng Hu, Bowen He, Dong Luo, Lei Wu, Yajin Zhou:
Dissecting Payload-based Transaction Phishing on Ethereum. - He Shuang, Lianying Zhao, David Lie:
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector. - Lingbo Zhao, Yuhui Zhang, Zhilu Wang, Fengkai Yuan, Rui Hou:
ERW-Radar: An Adaptive Detection System against Evasive Ransomware by Contextual Behavior Detection and Fine-grained Content Analysis. - Xiangyu Guo, Akshay Kawlay, Eric Liu, David Lie:
EvoCrawl: Exploring Web Application Code and State using Evolutionary Search. - Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren:
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution. - Jinghua Liu, Yi Yang, Kai Chen, Miaoqian Lin:
Generating API Parameter Security Rules with LLM for API Misuse Detection. - Yuejie Wang, Qiutong Men, Yongting Chen, Jiajin Liu, Gengyu Chen, Ying Zhang, Guyue Liu, Vyas Sekar:
Heimdall: Towards Risk-Aware Network Management Outsourcing. - Anqi Tian, Peifang Ni, Yingzi Gao, Jing Xu:
Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments. - Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen:
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection. - Yizhong Liu, Andi Liu, Yuan Lu, Zhuocheng Pan, Yinuo Li, Jianwei Liu, Song Bian, Mauro Conti:
Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead. - Maryam Rostamipoor, Seyedhamed Ghavamnia, Michalis Polychronakis:
LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms. - Jung-Woo Chang, Ke Sun, Nasimeh Heydaribeni, Seira Hidano, Xinyu Zhang, Farinaz Koushanfar:
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems. - Ammar Askar, Fabian Fleischer, Christopher Kruegel, Giovanni Vigna, Taesoo Kim:
MALintent: Coverage Guided Intent Fuzzing Framework for Android. - Chunjiang Che, Songze Li, Xuechao Wang:
Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding. - René Helmke, Elmar Padilla, Nils Aschenbruck:
Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research. - Shaoke Xi, Tianyi Fu, Kai Bu, Chunling Yang, Zhihua Chang, Wenzhi Chen, Zhou Ma, Chongjie Chen, Yongsheng Shen, Kui Ren:
MineShark: Cryptomining Traffic Detection at Scale. - Zhibo Zhang, Lei Zhang, Zhangyue Zhang, Geng Hong, Yuan Zhang, Min Yang:
Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service. - Joonkyo Jung, Jisoo Jang, Yongwan Jo, Jonas Vinck, Alexios Voulimeneas, Stijn Volckaert, Dokyung Song:
Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States. - Dongwei Xiao, Zhibo Liu, Yiteng Peng, Shuai Wang:
MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers. - Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. - Takami Sato, Ryo Suzuki, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Ryo Yoshida, Qi Alfred Chen, Kentaro Yoshioka:
On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance. - Xiaochen Zhu, Xinjian Luo, Yuncheng Wu, Yangfan Jiang, Xiaokui Xiao, Beng Chin Ooi:
Passive Inference Attacks on Split Learning via Adversarial Regularization. - Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. - Yan Jiang, Xiaoyu Ji, Yancheng Jiang, Kai Wang, Chenren Xu, Wenyuan Xu:
PowerRadio: Manipulate Sensor Measurement via Power GND Radiation. - Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. - Shichen Zhang, Qijun Wang, Maolin Gan, Zhichao Cao, Huacheng Zeng:
RadSee: See Your Handwriting Through Walls Using FMCW Radar. - Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu:
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. - Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue:
Reinforcement Unlearning. - Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters. - Yutong Ye, Tianhao Wang, Min Zhang, Dengguo Feng:
Revisiting EM-based Estimation for Locally Differentially Private Protocols. - Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo, Kaidi Xu, Qi Alfred Chen:
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective. - Xuanji Meng, Xiao Sui, Zhaoxin Yang, Kang Rong, Wenbo Xu, Shenglong Chen, Ying Yan, Sisi Duan:
Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon. - Yiming Zhang, Fengwei Zhang, Xiapu Luo, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan, Tao Wei, Zhengyu He:
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone. - Jonas Juffinger, Fabian Rauscher, Giuseppe La Manna, Daniel Gruss:
Secret Spilling Drive: Leaking User Behavior through SSD Contention. - Eric Pauley, Kyle Domico, Blaine Hoak, Ryan Sheatsley, Quinn Burke, Yohan Beugin, Engin Kirda, Patrick D. McDaniel:
Secure IP Address Allocation at Cloud Scale. - Jiawen Zhang, Xinpeng Yang, Lipeng He, Kejia Chen, Wen-jie Lu, Yinghao Wang, Xiaoyang Hou, Jian Liu, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. - Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, Jiahao Cao:
Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection. - Maria Hellenthal, Lena Gotsche, Rafael Mrowczynski, Sarah Kugel, Michael Schilling, Ben Stock:
The (Un)usual Suspects - Studying Reasons for Lacking Updates in WordPress. - Yi Yang, Jinghua Liu, Kai Chen, Miaoqian Lin:
The Midas Touch: Triggering the Capability of LLMs for RM-API Misuse Detection. - Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu:
The Philosopher's Stone: Trojaning Plugins of Large Language Models. - Yusra Elbitar, Alexander Hart, Sven Bugiel:
The Power of Words: A Comprehensive Analysis of Rationales and Their Effects on Users' Permission Decisions. - Yizhe Shi, Zhemin Yang, Kangwei Zhong, Guangliang Yang, Yifan Yang, Xiaohan Zhang, Min Yang:
The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps. - Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang:
THEMIS: Regulating Textual Inversion for Personalized Concept Censorship. - Yangtao Deng, Qian Wu, Zeqi Lai, Chenwei Gu, Hewu Li, Yuanjie Li, Jun Liu:
Time-varying Bottleneck Links in LEO Satellite Networks: Identification, Exploits, and Countermeasures. - Hengkai Ye, Hong Hu:
Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems. - Chen Gong, Kecen Li, Jin Yao, Tianhao Wang:
TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents. - Xiaoyuan Wu, Lydia Hu, Eric Zeng, Hana Habib, Lujo Bauer:
Transparency or Information Overload? Evaluating Users' Comprehension and Perceptions of the iOS App Privacy Report. - Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao:
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding. - Nicolas Badoux, Flavio Toffalini, Yuseok Jeon, Mathias Payer:
type++: Prohibiting Type Confusion with Inline Type Information. - Rui Wen, Michael Backes, Yang Zhang:
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? - Yuqing Yang, Yue Zhang, Zhiqiang Lin:
Understanding Miniapp Malware: Identification, Dissection, and Characterization. - Hongwei Wu, Jianliang Wu, Ruoyu Wu, Ayushi Sharma, Aravind Machiry, Antonio Bianchi:
VeriBin: Adaptive Verification of Patches at the Binary Level. - Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, Eric Wustrow:
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China. - Weili Wang, Honghan Ji, Peixuan He, Yao Zhang, Ye Wu, Yinqian Zhang:
WAVEN: WebAssembly Memory Virtualization for Enclaves. - Abdullah AlHamdan, Cristian-Alexandru Staicu:
Welcome to Jurassic Park: A Comprehensive Study of Security Risks in Deno and its Ecosystem.
Fall Cycle
- Tongxin Wei, Ding Wang, Yutong Li, Yuehuan Wang:
"Who is Trying to Access My Account?" Exploring User Perceptions and Reactions to Risk-based Authentication Notifications. - Jens Opdenbusch, Jonas Hielscher, M. Angela Sasse:
"Where Are We On Cyber?" - A Qualitative Study On Boards' Cybersecurity Risk Decision Making. - Jianqiang Wang, Meng Wang, Qinying Wang, Nils Langius, Li Shi, Ali Abbasi, Thorsten Holz:
A Comprehensive Memory Safety Analysis of Bootloaders. - Ganxiang Yang, Chenyang Liu, Zhen Huang, Guoxing Chen, Hongfei Fu, Yuanyuan Zhang, Haojin Zhu:
A Formal Approach to Multi-Layered Privileges for Enclaves. - Stijn Pletinckx, Christopher Kruegel, Giovanni Vigna:
A Large-Scale Measurement Study of the PROXY Protocol and its Security Implications. - Ka Fun Tang, Che Wei Tu, Sui Ling Angela Mak, Sze Yiu Chau:
A Multifaceted Study on the Use of TLS and Auto-detect in Email Ecosystems. - Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren:
A New PPML Paradigm for Quantized Models. - Giulia Scaffino, Lukas Aumayr, Mahsa Bastankhah, Zeta Avarikioti, Matteo Maffei:
Alba: The Dawn of Scalable Bridges for Blockchains. - Kevin van Liebergen, Gibran Gómez, Srdjan Matic, Juan Caballero:
All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks. - Myungsuk Moon, Minhee Kim, Joonkyo Jung, Dokyung Song:
ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments. - Jan-Ulrich Holtgrave, Kay Friedrich, Fabian Fischer, Nicolas Huaman, Niklas Busch, Jan H. Klemmer, Marcel Fourné, Oliver Wiese, Dominik Wermke, Sascha Fahl:
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security. - Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan, Xiapu Luo:
Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation. - Shushang Wen, Yiming Zhang, Yuxiang Shen, Bingyu Li, Haixin Duan, Jingqiang Lin:
Automatic Insecurity: Exploring Email Auto-configuration in the Wild. - Jiayi Lin, Qingyu Zhang, Junzhe Li, Chenxin Sun, Hao Zhou, Changhua Luo, Chenxiong Qian:
Automatic Library Fuzzing through API Relation Evolvement. - Leona Lassak, Hanna Püschel, Oliver D. Reithmaier, Tobias Gostomzyk, Markus Dürmuth:
Balancing Privacy and Data Utilization: A Comparative Vignette Study on User Acceptance of Data Trustees in Germany and the US. - Hanlei Zhang, Yijie Bai, Yanjiao Chen, Zhongming Ma, Wenyuan Xu:
BARBIE: Robust Backdoor Detection Based on Latent Separability. - Linxi Jiang, Xin Jin, Zhiqiang Lin:
Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs. - Yongpan Wang, Hong Li, Xiaojie Zhu, Siyuan Li, Chaopeng Dong, Shouguo Yang, Kangyuan Qin:
BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search. - Yanzuo Chen, Yuanyuan Yuan, Zhibo Liu, Sihang Hu, Tianxiang Li, Shuai Wang:
BitShield: Defending Against Bit-Flip Attacks on DNN Executables. - Yong-Hao Zou, Jia-Ju Bai, Zu-Ming Jiang, Ming Zhao, Diyu Zhou:
Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning. - Caihua Li, Seung-Seob Lee, Lin Zhong:
Blindfold: Confidential Memory Management by Untrusted Operating System. - Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng:
CASPR: Context-Aware Security Policy Recommendation. - Zhanpeng Liu, Yi Rong, Chenyang Li, Wende Tan, Yuan Li, Xinhui Han, Songtao Yang, Chao Zhang:
CCTAG: Configurable and Combinable Tagged Architecture. - Magdalena Pasternak, Kevin Warren, Daniel Olszewski, Susan Nittrouer, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant. - Stefan Gast, Hannes Weissteiner, Robin Leander Schröder, Daniel Gruss:
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP. - Navnil Choudhury, Chaithanya Naik Mude, Sanjay Das, Preetham Chandra Tikkireddi, Swamit Tannu, Kanad Basu:
Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers. - Platon Kotzias, Michalis Pachilakis, Javier Aldana-Iuit, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge:
Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams. - Christopher Ellis, Yue Zhang, Mohit Kumar Jangid, Shixuan Zhao, Zhiqiang Lin:
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation. - Jing Shang, Jian Wang, Kailun Wang, Jiqiang Liu, Nan Jiang, Md. Armanuzzaman, Ziming Zhao:
Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks. - Jianwen Tian, Wei Kong, Debin Gao, Tong Wang, Taotao Gu, Kefan Qiu, Zhi Wang, Xiaohui Kuang:
Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors. - Tyler Tucker, Nathaniel Bennett, Martin Kotuliak, Simon Erni, Srdjan Capkun, Kevin R. B. Butler, Patrick Traynor:
Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in Cellular Traffic. - Christian van Sloun, Vincent Woeste, Konrad Wolsing, Jan Pennekamp, Klaus Wehrle:
Detecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach. - Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell:
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More. - Pengzhi Xing, Hongwei Li, Meng Hao, Hanxiao Chen, Jia Hu, Dongxiao Liu:
Distributed Function Secret Sharing and Applications. - Jaewon Hur, Juheon Yi, Cheolwoo Myung, Sangyun Kim, Youngki Lee, Byoungyoung Lee:
DLBox: New Model Training Framework for Protecting Training Data. - Soheil Khodayari, Kai Glauber, Giancarlo Pellegrino:
Do (Not) Follow the White Rabbit: Challenging the Myth of Harmless Open Redirection. - Minghong Fang, Seyedsina Nabavirazavi, Zhuqing Liu, Wei Sun, Sundaraja Sitharama Iyengar, Haibo Yang:
Do We Really Need to Design New Byzantine-robust Aggregation Rules? - Hao Yu, Chuan Ma, Xinhang Wan, Jun Wang, Tao Xiang, Meng Shen, Xinwang Liu:
DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning. - Liam Wachter, Julian Gremminger, Christian Wressnegger, Mathias Payer, Flavio Toffalini:
DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing. - Hangtian Liu, Lei Zheng, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Yishun Zeng, Zhiyuan Jiang, Jiahai Yang:
EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis. - Ruisheng Shi, Zhiyuan Peng, Lina Lan, Yulian Ge, Peng Liu, Qin Wang, Juan Wang:
Eclipse Attacks on Monero's Peer-to-Peer Network. - Wenhao Li, Jiahao Wang, Guoming Zhang, Yanni Yang, Riccardo Spolaor, Xiuzhen Cheng, Pengfei Hu:
EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side Channel. - Shangzhi Xu, Jialiang Dong, Weiting Cai, Juanru Li, Arash Shaghaghi, Nan Sun, Siqi Ma:
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis. - Eman Maali, Omar Alrawi, Julie A. McCann:
Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications. - Molly Zhuangtong Huang, Rui Jiang, Tanusree Sharma, Kanye Ye Wang:
Exploring User Perceptions of Security Auditing in the Web3 Ecosystem. - Jie Lin, David Mohaisen:
From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection. - Connor Glosner, Aravind Machiry:
FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2. - Qi Ling, Yujun Liang, Yi Ren, Baris Kasikci, Shuwen Deng:
GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of Speculative Gadgets. - Haotian Zhu, Shuchao Pang, Zhigang Lu, Yongbin Zhou, Minhui Xue:
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization. - Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference. - Ruixuan Li, Chaoyi Lu, Baojun Liu, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao:
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists. - Haoqiang Wang, Yiwei Fang, Yichen Liu, Ze Jin, Emma Delph, Xiaojiang Du, Qixu Liu, Luyi Xing:
Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller. - Runze Zhang, Mingxuan Yao, Haichuan Xu, Omar Alrawi, Jeman Park, Brendan Saltaformaggio:
Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code Deployment Reuse. - Guanlong Wu, Zheng Zhang, Yao Zhang, Weili Wang, Jianyu Niu, Ye Wu, Yinqian Zhang:
I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving. - Yong Zhuang, Keyan Guo, Juan Wang, Yiheng Jing, Xiaoyang Xu, Wenzhe Yi, Mengda Yang, Bo Zhao, Hongxin Hu:
I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models. - Corban Villa, Constantine Doumanidis, Hithem Lamri, Prashant Hari Narayan Rajput, Michail Maniatakos:
ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems. - Zhongming Wang, Tao Xiang, Xiaoguo Li, Biwen Chen, Guomin Yang, Chuan Ma, Robert H. Deng:
Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems. - Shuguang Wang, Qian Zhou, Kui Wu, Jinghuai Deng, Dapeng Wu, Wei-Bin Lee, Jianping Wang:
Interventional Root Cause Analysis of Failures in Multi-Sensor Fusion Perception Systems. - Angeliki Aktypi, Kasper Rasmussen:
Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer Networks. - Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal:
IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic Systems. - Yue Xiao, Dhilung Kirat, Douglas Lee Schales, Jiyong Jang, Luyi Xing, Xiaojing Liao:
JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs. - Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard:
KernelSnitch: Side Channel-Attacks on Kernel Data Structures. - Taifeng Liu, Yang Liu, Zhuo Ma, Tong Yang, Xinjing Liu, Teng Li, Jianfeng Ma:
L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target. - Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis:
LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm. - Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz:
LAMP: Lightweight Approaches for Latency Minimization in Mixnets with Practical Deployment Considerations. - Rui Xiao, Xiankai Chen, Yinghui He, Jun Han, Jinsong Han:
Lend Me Your Beam: Privacy Implications of Plaintext Beamforming Feedback in WiFi. - Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference. - Vasudev Gohil, Matthew DeLorenzo, Veera Vishwa Achuta Sai Venkat Nallam, Joey See, Jeyavijayan Rajendran:
LLMPirate: LLMs for Black-box Hardware IP Piracy. - Cheng Zhang, Yang Xu, Jianghao Tan, Jiajie An, Wenqiang Jin:
MingledPie: A Cluster Mingling Approach for Mitigating Preference Profiling in CFL. - Kushal Babel, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Arun Koshy, Alberto Sonnino, Mingwei Tian:
Mysticeti: Reaching the Latency Limits with Uncertified DAGs. - Darion Cassel, Nuno Sabino, Min-Chien Hsu, Ruben Martins, Limin Jia:
NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities. - Tao Ni, Yuefeng Du, Qingchuan Zhao, Cong Wang:
Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via Infrared Side Channel. - Robert Dumitru, Thorben Moos, Andrew Wabnitz, Yuval Yarom:
On Borrowed Time - Preventing Static Side-Channel Analysis. - Xiaoguang Li, Zitao Li, Ninghui Li, Wenhai Sun:
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks. - Matthew Gregoire, Margaret Pierce, Saba Eskandarian:
Onion Franking: Abuse Reports for Mix-Based Private Messaging. - Shixin Song, Joseph Zhang, Mengjia Yan:
Oreo: Protecting ASLR Against Microarchitectural Attacks. - Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach:
PBP: Post-training Backdoor Purification for Malware Classifiers. - Andrick Adhikari, Sanchari Das, Rinku Dewri:
PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy Comprehension. - Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard:
Power-Related Side-Channel Attacks using the Android Sensor Framework. - Daniel J. Bernstein, Tanja Lange, Jonathan Levin, Bo-Yin Yang:
PQConnect: Automated Post-Quantum End-to-End Tunnels. - Aydin Abadi, Vishnu Asutosh Dasu, Sumanta Sarkar:
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models. - Ruyi Ding, Tong Zhou, Lili Su, Aidong Adam Ding, Xiaolin Xu, Yunsi Fei:
Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing. - Ye Liu, Yue Xue, Daoyuan Wu, Yuqiang Sun, Yi Li, Miaolei Shi, Yang Liu:
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation. - Derui Wang, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu:
Provably Unlearnable Data Examples. - Ziwen Liu, Jian Mao, Jun Zeng, Jiawei Li, Qixiao Lin, Jiahao Liu, Jianwei Zhuge, Zhenkai Liang:
ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs. - Matteo Marini, Daniele Cono D'Elia, Mathias Payer, Leonardo Querzoni:
QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing. - Dzung Pham, Shreyas Kulkarni, Amir Houmansadr:
RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation. - Qihang Zhou, Wenzhuo Cao, Xiaoqi Jia, Peng Liu, Shengzhi Zhang, Jiayun Chen, Shaowen Xu, Zhenyu Song:
RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives. - Eduardo Chielle, Michail Maniatakos:
Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE. - Maximilian von Tschirschnitz, Ludwig Peuckert, Moritz Buhl, Jens Grossklags:
Rediscovering Method Confusion in Proposed Security Fixes for Bluetooth. - Xin Jin, Shiqing Ma, Zhiqiang Lin:
Repurposing Neural Networks for Efficient Cryptographic Computation. - Aditya Sirish A Yelgundhalli, Patrick Zielinski, Reza Curtmola, Justin Cappos:
Rethinking Trust in Forge-Based Git Security. - Chenke Luo, Jiang Ming, Mengfei Xie, Guojun Peng, Jianming Fu:
Retrofitting XoM for Stripped Binaries without Embedded Data Relocation. - Mengying Wu, Geng Hong, Jinsong Chen, Qi Liu, Shujun Tang, Youhao Li, Baojun Liu, Haixin Duan, Min Yang:
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration. - Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real Drifted Malware with Minimal Samples. - Wentao Dong, Peipei Jiang, Huayi Duan, Cong Wang, Lingchen Zhao, Qian Wang:
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle. - Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer, Ahmad-Reza Sadeghi:
SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning. - Yichen Gong, Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Xiaoyun Wang:
Safety Misalignment Against Large Language Models. - Shanghao Shi, Ning Wang, Yang Xiao, Chaoyu Zhang, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction. - Marzieh Bitaab, Alireza Karimi, Zhuoer Lyu, Adam Oest, Dhruv Kuchhal, Muhammad Saad, Gail-Joon Ahn, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé:
SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns. - Zeyu Lei, Güliz Seray Tuncay, Beatrice Carissa Williem, Z. Berkay Celik, Antonio Bianchi:
ScopeVerif: Analyzing the Security of Android's Scoped Storage via Differential Analysis. - Byeongwook Kim, Jaewon Hur, Adil Ahmad, Byoungyoung Lee:
Secure Data Analytics in Apache Spark with Fine-grained Policy Enforcement and Isolated Execution. - Justin Furuness, Cameron Morris, Reynaldo Morillo, Arvind Kasiliya, Bing Wang, Amir Herzberg:
Securing BGP ASAP: ASPA and other Post-ROV Defenses. - Andes Y. L. Kei, Sherman S. M. Chow:
SHAFT: Secure, Handy, Accurate and Fast Transformer Inference. - Fangming Gu, Qingli Guo, Jie Lu, Qinghe Xie, Beibei Zhao, Kangjie Lu, Hong Li, Xiaorui Gong:
Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote IPC. - Xinqian Wang, Xiaoning Liu, Shangqi Lai, Xun Yi, Xingliang Yuan:
SIGuard: Guarding Secure Inference with Post Data Privacy. - Yunbo Yang, Yuejia Cheng, Kailun Wang, Xiaoguo Li, Jianfei Sun, Jiachen Shen, Xiaolei Dong, Zhenfu Cao, Guomin Yang, Robert H. Deng:
Siniel: Distributed Privacy-Preserving zkSNARK. - Sian Kim, Seyed Mohammad Mehdi Mirnajafizadeh, Bara Kim, Rhongho Jang, DaeHun Nyang:
SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data Plane. - Jingwen Yan, Song Liao, Mohammed Aldeen, Luyi Xing, Danfeng Yao, Long Cheng:
SKILLPoV: Towards Accessible and Effective Privacy Notice for Amazon Alexa Skills. - Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu:
SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers. - Philipp Mackensen, Paul Staat, Stefan Roth, Aydin Sezgin, Christof Paar, Veelasha Moonsamy:
Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces. - Derin Cayir, Reham Mohamed Aburas, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z. Berkay Celik, A. Selcuk Uluagac:
Speak Up, I'm Listening: Extracting Speech from Zero-Permission VR Sensors. - Jiska Classen, Alexander Heinrich, Fabian Portner, Felix Rohrbach, Matthias Hollick:
Starshields for iOS: Navigating the Security Cosmos in Satellite Communication. - Hang Zhang, Jangha Kim, Chuhong Yuan, Zhiyun Qian, Taesoo Kim:
Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel. - Diwen Xue, Robert Stanley, Piyush Kumar, Roya Ensafi:
The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic. - Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame:
The Forking Way: When TEEs Meet Consensus. - Boladji Vinny Adjibi, Athanasios Avgetidis, Manos Antonakakis, Michael D. Bailey, Fabian Monrose:
The Guardians of Name Street: Studying the Defensive Registration Practices of the Fortune 500. - Elijah Robert Bouma-Sims, Lily Klucinec, Mandy Lanyon, Julie Downs, Lorrie Faith Cranor:
The Kids Are All Right: Investigating the Susceptibility of Teens and Adults to YouTube Giveaway Scams. - Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
The Road to Trust: Building Enclaves within Confidential VMs. - Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, Stefan Mangard:
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption. - Yan Pang, Aiping Xiong, Yang Zhang, Tianhao Wang:
Towards Understanding Unsafe Video Generation. - Ruishi Li, Bo Wang, Tianyu Li, Prateek Saxena, Ashish Kundu:
Translating C To Rust: Lessons from a User Study. - Zheyu Ma, Qiang Liu, Zheming Li, Tingting Yin, Wende Tan, Chao Zhang, Mathias Payer:
Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices. - Yansong Gao, Huaibing Peng, Hua Ma, Zhi Zhang, Shuo Wang, Rayne Holland, Anmin Fu, Minhui Xue, Derek Abbott:
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! - Matteo Leonelli, Addison Crump, Meng Wang, Florian Bauckholt, Keno Hassler, Ali Abbasi, Thorsten Holz:
TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks. - Zelun Kong, Minkyung Park, Le Guan, Ning Zhang, Chung Hwan Kim:
TZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based Compartmentalization. - Jiawei Li, Jiahao Liu, Jian Mao, Jun Zeng, Zhenkai Liang:
UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications. - Miaoqian Lin, Kai Chen, Yi Yang, Jinghua Liu:
Uncovering the iceberg from the tip: Generating API Specifications for Bug Detection via Specification Propagation Analysis. - Xiangzhe Xu, Zhuo Zhang, Zian Su, Ziyang Huang, Shiwei Feng, Yapeng Ye, Nan Jiang, Danning Xie, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary. - Duanyi Yao, Songze Li, Xueluan Gong, Sizai Hou, Gaoning Pan:
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning. - Kavita Kumari, Maryam Abbasihafshejani, Alessandro Pegoraro, Phillip Rieger, Kamyar Arshi, Murtuza Jadliwala, Ahmad-Reza Sadeghi:
VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis. - Daniel Klischies, Philipp Mackensen, Veelasha Moonsamy:
Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets. - Yuan Li, Chao Zhang, Jinhao Zhu, Penghui Li, Chenyang Li, Songtao Yang, Wende Tan:
VulShield: Protecting Vulnerable Code Before Deploying Patches. - Sena Sahin, Burak Sahin, Frank Li:
Was This You? Investigating the Design Considerations for Suspicious Login Notifications. - Chang Yue, Kai Chen, Zhixiu Guo, Jun Dai, Xiaoyan Sun, Yi Yang:
What's Done Is Not What's Claimed: Detecting and Interpreting Inconsistencies in App Behaviors. - Inon Kaplan, Ron Even, Amit Klein:
You Can Rand but You Can't Hide: A Holistic Security Analysis of Google Fuchsia's (and gVisor's) Network Stack. - Aleksei Stafeev, Tim Recktenwald, Gianluca De Stefano, Soheil Khodayari, Giancarlo Pellegrino:
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.