“Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security |
Jonas Hielscher and Uta Menges,Ruhr University Bochum;Simon Parkin,TU Delft;Annette Kluge and M. Angela Sasse,Ruhr University Bochum |
PDF |
- |
video |
- |
“Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators |
Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Consolvo, and Kurt Thomas,Google |
PDF |
- |
video |
- |
“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry |
Jaron Mink,University of Illinois at Urbana-Champaign;Harjot Kaur,Leibniz University Hannover;Juliane Schmüser and Sascha Fahl,CISPA Helmholtz Center for Information Security;Yasemin Acar,Paderborn University and George Washington University |
PDF |
- |
video |
slides |
A Data-free Backdoor Injection Approach in Neural Networks |
Peizhuo Lv, Chang Yue, Ruigang Liang, and Yunfei Yang,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China;Shengzhi Zhang,Department of Computer Science, Metropolitan College, Boston University, USA;Hualong Ma,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China;Kai Chen,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China; Beijing Academy of Artificial Intelligence, China |
PDF |
- |
video |
slides |
A Large Scale Study of the Ethereum Arbitrage Ecosystem |
Robert McLaughlin, Christopher Kruegel, and Giovanni Vigna,University of California, Santa Barbara |
PDF |
code |
video |
slides |
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots |
Boyang Zhang and Xinlei He,CISPA Helmholtz Center for Information Security;Yun Shen,NetApp;Tianhao Wang,University of Virginia;Yang Zhang,CISPA Helmholtz Center for Information Security |
PDF |
code |
video |
- |
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse |
Sophie Stephenson and Majed Almansoori,University of Wisconsin--Madison;Pardis Emami-Naeini,Duke University;Danny Yuxing Huang,New York University;Rahul Chatterjee,University of Wisconsin--Madison |
PDF |
- |
video |
slides |
ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles |
Sangdon Park,Georgia Institute of Technology;Osbert Bastani,University of Pennsylvania;Taesoo Kim,Georgia Institute of Technology |
PDF |
- |
video |
slides |
Adversarial Training for Raw-Binary Malware Classifiers |
Keane Lucas, Samruddhi Pai, Weiran Lin, and Lujo Bauer,Carnegie Mellon University;Michael K. Reiter,Duke University;Mahmood Sharif,Tel Aviv University |
PDF |
- |
video |
- |
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks |
Jialai Wang,Tsinghua University;Ziyuan Zhang,Beijing University of Posts and Telecommunications;Meiqi Wang,Tsinghua University;Han Qiu,Tsinghua University and Zhongguancun Laboratory;Tianwei Zhang,Nanyang Technological University;Qi Li,Tsinghua University and Zhongguancun Laboratory;Zongpeng Li,Tsinghua University and Hangzhou Dianzi University;Tao Wei,Ant Group;Chao Zhang,Tsinghua University and Zhongguancun Laboratory |
PDF |
- |
video |
slides |
AIRS: Explanation for Deep Reinforcement Learning based Security Applications |
Jiahao Yu,Northwestern University;Wenbo Guo,Purdue University;Qi Qin,ShanghaiTech University;Gang Wang,University of Illinois at Urbana-Champaign;Ting Wang,The Pennsylvania State University;Xinyu Xing,Northwestern University |
PDF |
- |
video |
- |
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting |
Jian Qu, Xiaobo Ma, and Jianfeng Li,Xi’an Jiaotong University;Xiapu Luo,The Hong Kong Polytechnic University;Lei Xue,Sun Yat-sen University;Junjie Zhang,Wright State University;Zhenhua Li,Tsinghua University;Li Feng,Southwest Jiaotong University;Xiaohong Guan,Xi'an Jiaotong University |
PDF |
- |
video |
slides |
Araña: Discovering and Characterizing Password Guessing Attacks in Practice |
Mazharul Islam,University of Wisconsin–Madison;Marina Sanusi Bohuk,Cornell Tech;Paul Chung,University of Wisconsin–Madison;Thomas Ristenpart,Cornell Tech;Rahul Chatterjee,University of Wisconsin–Madison |
PDF |
- |
video |
slides |
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks |
Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, and Ahmad-Reza Sadeghi,Technical University of Darmstadt |
PDF |
- |
video |
slides |
ARI: Attestation of Real-time Mission Execution Integrity |
Jinwen Wang, Yujie Wang, and Ao Li,Washington University in St. Louis;Yang Xiao,University of Kentucky;Ruide Zhang, Wenjing Lou, and Y. Thomas Hou,Virginia Polytechnic Institute and State University;Ning Zhang,Washington University in St. Louis |
PDF |
- |
video |
- |
ARMore: Pushing Love Back Into Binaries |
Luca Di Bartolomeo, Hossein Moghaddas, and Mathias Payer,EPFL |
PDF |
- |
video |
slides |
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding |
Jietao Xiao and Nanzi Yang,State Key Lab of ISN, School of Cyber Engineering, Xidian University, China;Wenbo Shen,Zhejiang University, China;Jinku Li and Xin Guo,State Key Lab of ISN, School of Cyber Engineering, Xidian University, China;Zhiqiang Dong and Fei Xie,Tencent Security Yunding Lab, China;Jianfeng Ma,State Key Lab of ISN, School of Cyber Engineering, Xidian University, China |
PDF |
- |
video |
- |
AURC: Detecting Errors in Program Code and Documentation |
Peiwei Hu, Ruigang Liang, and Ying Cao,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, and School of Cyber Security, University of Chinese Academy of Sciences, China;Kai Chen,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences, China, and Beijing Academy of Artificial Intelligence, China;Runze Zhang,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, and School of Cyber Security, University of Chinese Academy of Sciences, China |
PDF |
- |
video |
slides |
Authenticated private information retrieval |
Simone Colombo,EPFL;Kirill Nikitin,Cornell Tech;Henry Corrigan-Gibbs,MIT;David J. Wu,UT Austin;Bryan Ford,EPFL |
PDF |
- |
video |
slides |
AutoFR: Automated Filter Rule Generation for Adblocking |
Hieu Le, Salma Elmalaki, and Athina Markopoulou,University of California, Irvine;Zubair Shafiq,University of California, Davis |
PDF |
- |
video |
slides |
autofz: Automated Fuzzer Composition at Runtime |
Yu-Fu Fu, Jaehyuk Lee, and Taesoo Kim,Georgia Institute of Technology |
PDF |
- |
video |
slides |
Automated Cookie Notice Analysis and Enforcement |
Rishabh Khandelwal and Asmit Nayak,University of Wisconsin—Madison;Hamza Harkous,Google, Inc.;Kassem Fawaz,University of Wisconsin—Madison |
PDF |
- |
video |
- |
Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing |
Bin Zhang, Jiongyi Chen, Runhao Li, Chao Feng, Ruilin Li, and Chaojing Tang,National University of Defense Technology |
PDF |
- |
video |
slides |
BalanceProofs: Maintainable Vector Commitments with Fast Aggregation |
Weijie Wang, Annie Ulichney, and Charalampos Papamanthou,Yale University |
PDF |
- |
video |
slides |
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages |
Cristian-Alexandru Staicu,CISPA Helmholtz Center for Information Security;Sazzadur Rahaman,University of Arizona;Ágnes Kiss and Michael Backes,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
slides |
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information |
Heng Li,Huazhong University of Science and Technology;Zhang Cheng,NSFOCUS Technologies Group Co., Ltd. and Huazhong University of Science and Technology;Bang Wu, Liheng Yuan, Cuiying Gao, and Wei Yuan,Huazhong University of Science and Technology;Xiapu Luo,The Hong Kong Polytechnic University |
PDF |
- |
video |
slides |
Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations |
Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, and Yu Jiang,Tsinghua University;Ting Chen,University of Electronic Science and Technology of China;Abhik Roychoudhury,National University of Singapore;Jiaguang Sun,Tsinghua University |
PDF |
- |
video |
slides |
BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing |
Mingi Cho, Dohyeon An, Hoyong Jin, and Taekyoung Kwon,Yonsei University |
PDF |
- |
video |
slides |
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem |
Omer Akgul,University of Maryland;Taha Eghtesad,Pennsylvania State University;Amit Elazari,University of California, Berkeley;Omprakash Gnawali,University of Houston;Jens Grossklags,Technical University of Munich;Michelle L. Mazurek,University of Maryland;Daniel Votipka,Tufts University;Aron Laszka,Pennsylvania State UniversityDistinguished Paper Award Winner |
PDF |
- |
video |
slides |
BunnyHop: Exploiting the Instruction Prefetcher |
Zhiyuan Zhang, Mingtian Tao, and Sioli O'Connell,The University of Adelaide;Chitchanok Chuengsatiansup,The University of Melbourne;Daniel Genkin,Georgia Tech;Yuval Yarom,The University of Adelaide |
PDF |
- |
video |
slides |
CAPatch: Physical Adversarial Patch against Image Captioning Systems |
Shibo Zhang,USSLAB, Zhejiang University;Yushi Cheng,BNRist, Tsinghua University;Wenjun Zhu, Xiaoyu Ji, and Wenyuan Xu,USSLAB, Zhejiang University |
PDF |
- |
video |
- |
Capstone: A Capability-based Foundation for Trustless Secure Memory Access |
Jason Zhijingcheng Yu,National University of Singapore;Conrad Watt,University of Cambridge;Aditya Badole, Trevor E. Carlson, and Prateek Saxena,National University of Singapore |
PDF |
- |
video |
slides |
CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing |
Dawei Wang, Ying Li, and Zhiyu Zhang,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China;Kai Chen,SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China; Beijing Academy of Artificial Intelligence, China |
PDF |
- |
video |
slides |
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion |
Jiangyi Deng, Yanjiao Chen, Yinan Zhong, and Qianhao Miao,Zhejiang University;Xueluan Gong,Wuhan University;Wenyuan Xu,Zhejiang University |
PDF |
- |
video |
slides |
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software |
Jan Wichelmann, Anna Pätschke, Luca Wilke, and Thomas Eisenbarth,University of Lübeck |
PDF |
- |
video |
slides |
Controlled Data Races in Enclaves: Attacks and Detection |
Sanchuan Chen,Fordham University;Zhiqiang Lin,The Ohio State University;Yinqian Zhang,Southern University of Science and Technology |
PDF |
- |
video |
- |
CSHER: A System for Compact Storage with HE-Retrieval |
Adi Akavia and Neta Oren,University of Haifa;Boaz Sapir and Margarita Vald,Intuit Israel Inc. |
PDF |
- |
video |
slides |
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing |
Ming Yuan and Bodong Zhao,Tsinghua University;Penghui Li,The Chinese University of Hong Kong;Jiashuo Liang and Xinhui Han,Peking University;Xiapu Luo,The Hong Kong Polytechnic University;Chao Zhang,Tsinghua University and Zhongguancun Lab |
PDF |
- |
video |
slides |
Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website’s User Experience |
Alexandra Nisenoff,University of Chicago and Carnegie Mellon University;Arthur Borem, Madison Pickering, Grant Nakanishi, Maya Thumpasery, and Blase Ur,University of Chicago |
PDF |
- |
video |
slides |
Design of Access Control Mechanisms in Systems-on-Chip with Formal Integrity Guarantees |
Dino Mehmedagić, Mohammad Rahmani Fadiheh, Johannes Müller, Anna Lena Duque Antón, Dominik Stoffel, and Wolfgang Kunz,Rheinland-Pfälzische Technische Universität (RPTU) Kaiserslautern-Landau, Germany |
PDF |
- |
video |
slides |
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes |
Haotian Chi,Shanxi University and Temple University;Qiang Zeng,George Mason University;Xiaojiang Du,Stevens Institute of Technology |
PDF |
- |
video |
- |
Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking |
Ilia Shevrin,Citi;Oded Margalit,Ben-Gurion University |
PDF |
- |
video |
slides |
Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool’s Monitoring System |
Jonghoon Kwon,ETH Zürich;Jeonggyu Song and Junbeom Hur,Korea University;Adrian Perrig,ETH Zürich |
PDF |
- |
video |
slides |
DiffSmooth: Certifiably Robust Learning via Diffusion Models and Local Smoothing |
Jiawei Zhang,UIUC;Zhongzhu Chen,University of Michigan, Ann Arbor;Huan Zhang,Carnegie Mellon University;Chaowei Xiao,Arizona State University;Bo Li,UIUC |
PDF |
- |
video |
slides |
Diving into Robocall Content with SnorCall |
Sathvik Prasad, Trevor Dunlap, Alexander Ross, and Bradley Reaves,North Carolina State University |
PDF |
- |
video |
slides |
Don’t be Dense: Efficient Keyword PIR for Sparse Databases |
Sarvar Patel and Joon Young Seo,Google;Kevin Yeo,Google and Columbia UniversityDistinguished Paper Award Winner |
PDF |
- |
video |
- |
Duoram: A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation |
Adithya Vadapalli,University of Waterloo;Ryan Henry,University of Calgary;Ian Goldberg,University of Waterloo |
PDF |
- |
video |
- |
Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring |
David G. Balash, Elena Korkes, Miles Grant, and Adam J. Aviv,The George Washington University;Rahel A. Fainchtein and Micah Sherr,Georgetown University |
PDF |
- |
video |
- |
ELASM: Error-Latency-Aware Scale Management for Fully Homomorphic Encryption |
Yongwoo Lee, Seonyoung Cheon, and Dongkwan Kim,Yonsei University;Dongyoon Lee,Stony Brook University;Hanjun Kim,Yonsei University |
PDF |
- |
video |
- |
Eos: Efficient Private Delegation of zkSNARK Provers |
Alessandro Chiesa,UC Berkeley and EPFL;Ryan Lehmkuhl,MIT;Pratyush Mishra,Aleo and University of Pennsylvania;Yinuo Zhang,UC Berkeley |
PDF |
- |
video |
slides |
Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks |
Hamid Mozaffari, Virat Shejwalkar, and Amir Houmansadr,University of Massachusetts Amherst |
PDF |
- |
video |
- |
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks |
Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, and Min Yang,Fudan University |
PDF |
- |
video |
slides |
Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions |
Young Min Kim and Byoungyoung Lee,Seoul National University |
PDF |
- |
video |
slides |
Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing |
Brian Jay Tang and Kang G. Shin,University of Michigan |
PDF |
- |
video |
slides |
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks |
Cyrill Krähenbühl, Marc Wyss, and David Basin,ETH Zürich;Vincent Lenders,armasuisse;Adrian Perrig,ETH Zürich;Martin Strohmeier,armasuisse |
PDF |
- |
video |
slides |
Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems |
Sahar Abdelnabi and Mario Fritz,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
slides |
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation |
Xiaoguang Li,Xidian University and Purdue University;Ninghui Li and Wenhai Sun,Purdue University;Neil Zhenqiang Gong,Duke University;Hui Li,Xidian University |
PDF |
- |
video |
slides |
Formal Analysis and Patching of BLE-SC Pairing |
Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, and Ruiying Du,Wuhan University |
PDF |
- |
video |
slides |
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations |
Cas Cremers,CISPA Helmholtz Center for Information Security;Charlie Jacomme,Inria Paris;Aurora Naska,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
- |
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2 |
Cas Cremers, Alexander Dax, and Aurora Naska,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
- |
Forming Faster Firmware Fuzzers |
Lukas Seidel,Qwiet AI;Dominik Maier,TU Berlin;Marius Muench,VU Amsterdam and University of Birmingham |
PDF |
- |
video |
slides |
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases |
Chong Fu, Xuhong Zhang, and Shouling Ji,Zhejiang University;Ting Wang,Pennsylvania State University;Peng Lin,Chinese Aeronautical Establishment;Yanghe Feng,National University of Defense Technology;Jianwei Yin,Zhejiang University |
PDF |
- |
video |
slides |
GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation |
Sina Sajadmanesh,Idiap Research Institute and EPFL;Ali Shahin Shamsabadi,Alan Turing Institute;Aurélien Bellet,Inria;Daniel Gatica-Perez,Idiap Research Institute and EPFL |
PDF |
- |
video |
slides |
Going through the motions: AR/VR keylogging from user head motions |
Carter Slocum, Yicheng Zhang, Nael Abu-Ghazaleh, and Jiasi Chen,University of California, Riverside |
PDF |
- |
video |
- |
HECO: Fully Homomorphic Encryption Compiler |
Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi,ETH Zurich |
PDF |
- |
video |
slides |
Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor Privacy Through Isolation and Amnesia |
Piet De Vaere and Adrian Perrig,ETH Zürich |
PDF |
- |
video |
slides |
Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All! |
Sindhu Reddy Kalathur Gopal and Diksha Shukla,University of Wyoming;James David Wheelock,University of Colorado Boulder;Nitesh Saxena,Texas A&M University, College Station |
PDF |
- |
video |
- |
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware |
Mingxuan Yao,Georgia Institute of Technology;Jonathan Fuller,United States Military Academy;Ranjita Pai Kasturi, Saumya Agarwal, Amit Kumar Sikder, and Brendan Saltaformaggio,Georgia Institute of Technology |
PDF |
- |
video |
slides |
High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption |
Xianglong Zhang and Wei Wang,Huazhong University of Science and Technology;Peng Xu,Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security;Laurence T. Yang,Huazhong University of Science and Technology and St. Francis Xavier University;Kaitai Liang,Delft University of Technology |
PDF |
- |
video |
slides |
HOLMES: Efficient Distribution Testing for Secure Collaborative Learning |
Ian Chang and Katerina Sotiraki,UC Berkeley;Weikeng Chen,UC Berkeley & DZK Labs;Murat Kantarcioglu,University of Texas at Dallas & UC Berkeley;Raluca Popa,UC Berkeley |
PDF |
- |
video |
slides |
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities |
Alan F. Luo, Noel Warford, and Samuel Dooley,University of Maryland;Rachel Greenstadt,New York University;Michelle L. Mazurek,University of Maryland;Nora McDonald,George Mason University |
PDF |
- |
video |
- |
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic |
Mingshi Wu,GFW Report;Jackson Sippe,University of Colorado Boulder;Danesh Sivakumar and Jack Burg,University of Maryland;Peter Anderson,Independent researcher;Xiaokang Wang,V2Ray Project;Kevin Bock,University of Maryland;Amir Houmansadr,University of Massachusetts Amherst;Dave Levin,University of Maryland;Eric Wustrow,University of Colorado Boulder |
PDF |
- |
video |
- |
How to Cover up Anomalous Accesses to Electronic Health Records |
Xiaojun Xu, Qingying Hao, Zhuolin Yang, and Bo Li,University of Illinois at Urbana-Champaign;David Liebovitz,Northwestern University;Gang Wang and Carl A. Gunter,University of Illinois at Urbana-Champaign |
PDF |
- |
video |
- |
ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs |
Prashant Hari Narayan Rajput,NYU Tandon School of Engineering;Constantine Doumanidis and Michail Maniatakos,New York University Abu Dhabi |
PDF |
- |
video |
slides |
Improving Real-world Password Guessing Attacks via Bi-directional Transformers |
Ming Xu and Jitao Yu,Fudan University;Xinyi Zhang,Facebook;Chuanwang Wang, Shenghao Zhang, Haoqi Wu, and Weili Han,Fudan University |
PDF |
- |
video |
slides |
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack |
Yu Chen and Yang Yu,Xuanwu Lab, Tencent;Lidong Zhai,Institute of Information Engineering, Chinese Academy of Sciences |
PDF |
- |
video |
slides |
Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance |
Jiwon Kim,Purdue University;Benjamin E. Ujcich,Georgetown University;Dave (Jing) Tian,Purdue University |
PDF |
- |
video |
slides |
It's all in your head(set): Side-channel attacks on AR/VR systems |
Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh,University of California, Riverside |
PDF |
- |
video |
slides |
IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks |
Neophytos Christou, Di Jin, and Vaggelis Atlidakis,Brown University;Baishakhi Ray,Columbia University;Vasileios P. Kemerlis,Brown University |
PDF |
- |
video |
slides |
Jinn: Hijacking Safe Programs with Trojans |
Komail Dharsee and John Criswell,University of Rochester |
PDF |
- |
video |
- |
KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations |
Tingting Yin,Tsinghua University and Ant Group;Zicong Gao,State Key Laboratory of Mathematical Engineering and Advanced Computing;Zhenghang Xiao,Hunan University;Zheyu Ma,Tsinghua University;Min Zheng,Ant Group;Chao Zhang,Tsinghua University and Zhongguancun Laboratory |
PDF |
- |
video |
slides |
Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale |
Michele Campobasso and Luca Allodi,Eindhoven University of Technology |
PDF |
- |
video |
slides |
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels |
Yue Xiao, Zhengyi Li, and Yue Qin,Indiana University Bloomington;Xiaolong Bai,Orion Security Lab, Alibaba Group;Jiale Guan, Xiaojing Liao, and Luyi Xing,Indiana University Bloomington |
PDF |
- |
video |
- |
Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys |
Daniel W. Woods,University of Edinburgh;Rainer Böhme,University of Innsbruck;Josephine Wolff,Tufts University;Daniel Schwarcz,University of Minnesota |
PDF |
- |
video |
slides |
Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem |
Allan Lyons,University of Calgary;Julien Gamba,IMDEA Networks Institute and Universidad Carlos III de Madrid;Austin Shawaga,University of Calgary;Joel Reardon,University of Calgary and AppCensus, Inc.;Juan Tapiador,Universidad Carlos III de Madrid;Serge Egelman,ICSI and UC Berkeley and AppCensus, Inc.;Narseo Vallina-Rodriguez,IMDEA Networks Institute and AppCensus, Inc. |
PDF |
- |
video |
slides |
Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications |
Thomas Yurek,University of Illinois at Urbana-Champaign, NTT Research, and IC3;Zhuolun Xiang,Aptos;Yu Xia,MIT CSAIL and NTT Research;Andrew Miller,University of Illinois at Urbana-Champaign and IC3 |
PDF |
- |
video |
- |
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants |
Gustavo Sandoval, Hammond Pearce, Teo Nys, Ramesh Karri, Siddharth Garg, and Brendan Dolan-Gavitt,New York University |
PDF |
- |
video |
slides |
Machine-checking Multi-Round Proofs of Shuffle: Terelius-Wikstrom and Bayer-Groth |
Thomas Haines,Australian National University;Rajeev Gore,Polish Academy of Science;Mukesh Tiwari,University of Cambridge |
PDF |
- |
video |
- |
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible |
Lorenz Kustosch and Carlos Gañán,TU Delft;Mattis van 't Schip,Radboud University;Michel van Eeten and Simon Parkin,TU Delft |
PDF |
- |
video |
slides |
Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning? |
Yi Zeng,Virginia Tech and SONY AI;Minzhou Pan, Himanshu Jahagirdar, and Ming Jin,Virginia Tech;Lingjuan Lyu,SONY AI;Ruoxi Jia,Virginia Tech |
PDF |
- |
video |
- |
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing |
Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, and Qinying Wang,Zhejiang University;Binbin Zhao,Georgia Institute of Technology;Gaoning Pan,Zhejiang University;Wei Cao and Peng Chen,Ant Group;Raheem Beyah,Georgia Institute of Technology |
PDF |
- |
video |
slides |
Minimalist: Semi-automated Debloating of PHP Web Applications through Static Analysis |
Rasoul Jahanshahi,Boston University;Babak Amin Azad and Nick Nikiforakis,Stony Brook University;Manuel Egele,Boston University |
PDF |
- |
video |
slides |
MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research |
Gabriel K. Gegenhuber,University of Vienna;Wilfried Mayer,SBA Research;Edgar Weippl,University of Vienna;Adrian Dabrowski,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
slides |
MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation |
Jinyan Xu and Yiyuan Liu,Zhejiang University;Sirui He,City University of Hong Kong;Haoran Lin and Yajin Zhou,Zhejiang University;Cong Wang,City University of Hong Kong |
PDF |
- |
video |
slides |
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries |
Xingman Chen,Tsinghua University;Yinghao Shi,Institute of Information Engineering, Chinese Academy of Sciences;Zheyu Jiang and Yuan Li,Tsinghua University;Ruoyu Wang,Arizona State University;Haixin Duan,Tsinghua University and Zhongguancun Laboratory;Haoyu Wang,Huazhong University of Science and Technology;Chao Zhang,Tsinghua University and Zhongguancun Laboratory |
PDF |
- |
video |
slides |
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management |
Vivek Nair and Dawn Song,University of California, Berkeley |
PDF |
- |
video |
slides |
Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis |
Bingyu Shen, Tianyi Shan, and Yuanyuan Zhou,University of California, San Diego |
PDF |
- |
video |
- |
NAUTILUS: Automated RESTful API Vulnerability Detection |
Gelei Deng,Nanyang Technological University;Zhiyi Zhang,CodeSafe Team, Qi An Xin Group Corp.;Yuekang Li, Yi Liu, Tianwei Zhang, and Yang Liu,Nanyang Technological University;Guo Yu,China Industrial Control Systems Cyber Emergency Response Team;Dongjin Wang,Institute of Scientific and Technical Information, China Academy of Railway Sciences |
PDF |
- |
video |
- |
Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone |
Qi Xia and Qian Chen,University of Texas at San Antonio;Shouhuai Xu,University of Colorado Colorado Springs |
PDF |
- |
video |
slides |
Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom |
Reethika Ramesh, Ram Sundara Raman, and Apurva Virkud,University of Michigan;Alexandra Dirksen,TU Braunschweig;Armin Huremagic,University of Michigan;David Fifield,unaffiliated;Dirk Rodenburg and Rod Hynes,Psiphon;Doug Madory,Kentik;Roya Ensafi,University of Michigan |
PDF |
- |
video |
slides |
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning |
Thorsten Eisenhofer,Ruhr University Bochum;Erwin Quiring,Ruhr University Bochum and International Computer Science Institute (ICSI) Berkeley;Jonas Möller,Technische Universität Berlin;Doreen Riepel,Ruhr University Bochum;Thorsten Holz,CISPA Helmholtz Center for Information Security;Konrad Rieck,Technische Universität Berlin |
PDF |
- |
video |
slides |
No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters |
Ding Wang, Xuan Shan, and Qiying Dong,Nankai University;Yaosheng Shen,Peking University;Chunfu Jia,Nankai University |
PDF |
- |
video |
slides |
NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers |
Yehuda Afek and Anat Bremler-Barr,Tel-Aviv University;Shani Stajnrod,Reichman University |
PDF |
- |
video |
- |
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones |
Elias Heftrig,ATHENE and Fraunhofer SIT;Haya Shulman,ATHENE, Fraunhofer SIT, and Goethe-Universität Frankfurt;Michael Waidner,ATHENE, Fraunhofer SIT, and Technische Universität Darmstadt |
PDF |
- |
video |
slides |
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles |
Savino Dambra, Leyla Bilge, and Platon Kotzias,Norton Research Group;Yun Shen,NetApp;Juan Caballero,IMDEA Software Institute |
PDF |
- |
video |
- |
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M |
Xhani Marvin Saß, Richard Mitev, and Ahmad-Reza Sadeghi,Technical University of Darmstadt |
PDF |
- |
video |
slides |
Panda: Security Analysis of Algorand Smart Contracts |
Zhiyuan Sun,The Hong Kong Polytechnic University and Southern University of Science and Technology;Xiapu Luo,The Hong Kong Polytechnic University;Yinqian Zhang,Southern University of Science and Technology |
PDF |
- |
video |
slides |
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords |
Ding Wang and Yunkai Zou,Nankai University;Yuan-An Xiao,Peking University;Siqi Ma,The University of New South Wales;Xiaofeng Chen,Xidian University |
PDF |
- |
video |
slides |
Password Guessing Using Random Forest |
Ding Wang and Yunkai Zou,Nankai University;Zijian Zhang,Peking University;Kedong Xiu,Nankai University |
PDF |
- |
video |
slides |
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis |
Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, and Yapeng Ye,Purdue University;Yaoxuan Wu,University of California, Los Angeles;Xiangyu Zhang,Purdue University |
PDF |
- |
video |
slides |
Place Your Locks Well: Understanding and Detecting Lock Misuse Bugs |
Yuandao Cai, Peisen Yao, Chengfeng Ye, and Charles Zhang,The Hong Kong University of Science and Technology |
PDF |
- |
video |
slides |
Pool-Party: Exploiting Browser Resource Pools for Web Tracking |
Peter Snyder,Brave Software;Soroush Karami,University of Illinois at Chicago;Arthur Edelstein,Brave Software;Benjamin Livshits,Imperial College London;Hamed Haddadi,Brave Software and Imperial College of London |
PDF |
- |
video |
- |
Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling |
Sourav Das,University of Illinois at Urbana-Champaign;Zhuolun Xiang,Aptos;Lefteris Kokoris-Kogias,IST Austria and Mysten Labs;Ling Ren,University of Illinois at Urbana-Champaign |
PDF |
- |
video |
- |
Prime Match: A Privacy-Preserving Inventory Matching System |
Antigoni Polychroniadou,J.P. Morgan;Gilad Asharov,Bar-Ilan University;Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, and Manuela Veloso,J.P. Morgan |
PDF |
- |
video |
slides |
PrivateFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation |
Yuchen Yang, Bo Hui, and Haolin Yuan,The Johns Hopkins University;Neil Gong,Duke University;Yinzhi Cao,The Johns Hopkins University |
PDF |
- |
video |
- |
PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding |
Fan Yang,The Chinese University of Hong Kong;Jiacen Xu,University of California, Irvine;Chunlin Xiong,Sangfor Technologies Inc.;Zhou Li,University of California, Irvine;Kehuan Zhang,The Chinese University of Hong Kong |
PDF |
- |
video |
slides |
ProSpeCT: Provably Secure Speculation for the Constant-Time Policy |
Lesly-Ann Daniel, Marton Bognar, and Job Noorman,imec-DistriNet, KU Leuven;Sébastien Bardin,CEA, LIST, Université Paris Saclay;Tamara Rezk,INRIA, Université Côte d’Azur, Sophia Antipolis;Frank Piessens,imec-DistriNet, KU Leuven |
PDF |
- |
video |
- |
PROVIDENCE: a Flexible Round-by-Round Risk-Limiting Audit |
Oliver Broadrick and Poorvi Vora,The George Washington University;Filip Zagórski,University of Wroclaw and Votifica |
PDF |
- |
video |
- |
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains |
William E Bodell III, Sajad Meisami, and Yue Duan,Illinois Institute of Technology |
PDF |
- |
video |
- |
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs |
Yudi Zhao, Yuan Zhang, and Min Yang,Fudan University |
PDF |
- |
video |
slides |
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation |
Yifan Yan, Xudong Pan, Mi Zhang, and Min Yang,Fudan University |
PDF |
- |
video |
slides |
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation |
Renjie Xie and Jiahao Cao,Tsinghua University;Enhuan Dong and Mingwei Xu,Tsinghua University and Quan Cheng Laboratory;Kun Sun,George Mason University;Qi Li and Licheng Shen,Tsinghua University;Menghao Zhang,Tsinghua University and Kuaishou Technology |
PDF |
- |
video |
slides |
SandDriller: A Fully-Automated Approach for Testing Language-Based JavaScript Sandboxes |
Abdullah AlHamdan and Cristian-Alexandru Staicu,CISPA Helmholtz Center for Information Security |
PDF |
- |
video |
slides |
Secure Floating-Point Training |
Deevashwer Rathee,University of California, Berkeley;Anwesh Bhattacharya, Divya Gupta, and Rahul Sharma,Microsoft Research;Dawn Song,University of California, Berkeley |
PDF |
- |
video |
- |
SHELTER: Extending Arm CCA with Isolation in User Space |
Yiming Zhang,Southern University of Science and Technology and The Hong Kong Polytechnic University;Yuxin Hu,Southern University of Science and Technology;Zhenyu Ning,Hunan University and Southern University of Science and Technology;Fengwei Zhang,Southern University of Science and Technology;Xiapu Luo,The Hong Kong Polytechnic University;Haoyang Huang,Southern University of Science and Technology;Shoumeng Yan and Zhengyu He,Ant Group |
PDF |
- |
video |
slides |
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning |
Yi Chen and Di Tang,Indiana University Bloomington;Yepeng Yao,{CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, CAS, and School of Cyber Security, University of Chinese Academy of Sciences;Mingming Zha and Xiaofeng Wang,Indiana University Bloomington;Xiaozhong Liu,Worcester Polytechnic Institute;Haixu Tang,Indiana University Bloomington;Baoxu Liu,{CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, CAS, and School of Cyber Security, University of Chinese Academy of Sciences |
PDF |
- |
video |
slides |
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs |
Jianhao Xu,Nanjing University;Kangjie Lu,University of Minnesota;Zhengjie Du, Zhu Ding, and Linke Li,Nanjing University;Qiushi Wu,University of Minnesota;Mathias Payer,EPFL;Bing Mao,Nanjing University |
PDF |
- |
video |
slides |
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree |
Wen-jie Lu and Zhicong Huang,Alibaba Group;Qizhi Zhang,Ant Group;Yuchen Wang,Alibaba Group;Cheng Hong,Ant Group |
PDF |
- |
video |
slides |
Subverting Website Fingerprinting Defenses with Robust Traffic Representation |
Meng Shen,School of Cyberspace Science and Technology, Beijing Institute of Technology;Kexin Ji and Zhenbo Gao,School of Computer Science, Beijing Institute of Technology;Qi Li,Institute for Network Sciences and Cyberspace, Tsinghua University;Liehuang Zhu,School of Cyberspace Science and Technology, Beijing Institute of Technology;Ke Xu,Department of Computer Science and Technology, Tsinghua University |
PDF |
- |
video |
slides |
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack |
Run Guo,Tsinghua University;Jianjun Chen,Tsinghua University and Zhongguancun Laboratory;Yihang Wang and Keran Mu,Tsinghua University;Baojun Liu,Tsinghua University and Zhongguancun Laboratory;Xiang Li,Tsinghua University;Chao Zhang,Tsinghua University and Zhongguancun Laboratory;Haixin Duan,Tsinghua University and Zhongguancun Laboratory and QI-ANXIN Technology Research Institute;Jianping Wu,Tsinghua University and Zhongguancun Laboratory |
PDF |
- |
video |
slides |
The Blockchain Imitation Game |
Kaihua Qin,Imperial College London, RDI;Stefanos Chaliasos,Imperial College London;Liyi Zhou,Imperial College London, RDI;Benjamin Livshits,Imperial College London;Dawn Song,UC Berkeley, RDI;Arthur Gervais,University College London, RDI |
PDF |
- |
video |
slides |
The Case for Learned Provenance Graph Storage Systems |
Hailun Ding, Juan Zhai, Dong Deng, and Shiqing Ma,Rutgers University |
PDF |
- |
video |
- |
The Gates of Time: Improving Cache Attacks with Transient Execution |
Daniel Katzman,Tel Aviv University;William Kosasih,The University of Adelaide;Chitchanok Chuengsatiansup,The University of Melbourne;Eyal Ronen,Tel Aviv University;Yuval Yarom,The University of Adelaide |
PDF |
- |
video |
- |
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders |
Willy R. Vasquez,The University of Texas at Austin;Stephen Checkoway,Oberlin College;Hovav Shacham,The University of Texas at Austin |
PDF |
- |
video |
slides |
The OK Is Not Enough: A Large Scale Study of Consent Dialogs in Smartphone Applications |
Simon Koch,TU Braunschweig;Benjamin Altpeter,Datenanfragen.de e.V.;Martin Johns,TU Braunschweig |
PDF |
- |
video |
- |
The Role of Professional Product Reviewers in Evaluating Security and Privacy |
Wentao Guo, Jason Walter, and Michelle L. Mazurek,University of Maryland |
PDF |
- |
video |
slides |
Three Lessons From Threema: Analysis of a Secure Messenger |
Kenneth G. Paterson, Matteo Scarlata, and Kien Tuong Truong,ETH Zurich |
PDF |
- |
video |
slides |
Downfall: Exploiting Speculative Data Gathering |
Daniel Moghimi,UCSD |
PDF |
- |
video |
- |
Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) |
Federico Cernera, Massimo La Morgia, Alessandro Mei, and Francesco Sassi,Sapienza University of Rome |
PDF |
- |
video |
slides |
TreeSync: Authenticated Group Management for Messaging Layer Security |
Théophile Wallez,Inria Paris;Jonathan Protzenko,Microsoft Research;Benjamin Beurdouche,Mozilla;Karthikeyan Bhargavan,Inria ParisDistinguished Paper Award Winner and Co-Winner of the 2023 Internet Defense Prize |
PDF |
- |
video |
slides |
TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks |
Zheng Yang, Joey Allen, and Matthew Landen,Georgia Institute of Technology;Roberto Perdisci,Georgia Tech and University of Georgia;Wenke Lee,Georgia Institute of Technology |
PDF |
- |
video |
slides |
Trojan Source: Invisible Vulnerabilities |
Nicholas Boucher,University of Cambridge;Ross Anderson,University of Cambridge and University of Edinburgh |
PDF |
- |
video |
slides |
TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code |
Inyoung Bang and Martin Kayondo,Seoul National University;Hyungon Moon,UNIST (Ulsan National Institute of Science and Technology);Yunheung Paek,Seoul National University |
PDF |
- |
video |
slides |
Tubes Among Us: Analog Attack on Automatic Speaker Identification |
Shimaa Ahmed and Yash Wani,University of Wisconsin-Madison;Ali Shahin Shamsabadi,Alan Turing Institute;Mohammad Yaghini,University of Toronto and Vector Institute;Ilia Shumailov,Vector Institute and University of Oxford;Nicolas Papernot,University of Toronto and Vector Institute;Kassem Fawaz,University of Wisconsin-Madison |
PDF |
- |
video |
slides |
Ultimate SLH: Taking Speculative Load Hardening to the Next Level |
Zhiyuan Zhang,The University of Adelaide;Gilles Barthe,MPI-SP and IMDEA Software Institute;Chitchanok Chuengsatiansup,The University of Melbourne;Peter Schwabe,MPI-SP and Radboud University;Yuval Yarom,The University of Adelaide |
PDF |
- |
video |
slides |
Understand Users' Privacy Perception and Decision of V2X Communication in Connected Autonomous Vehicles |
Zekun Cai and Aiping Xiong,The Pennsylvania State University |
PDF |
- |
video |
- |
User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers |
Alexandra Nisenoff,Carnegie Mellon University and University of Chicago;Ranya Sharma and Nick Feamster,University of Chicago |
PDF |
- |
video |
slides |
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques |
Seunghoon Woo, Eunjin Choi, Heejo Lee, and Hakjoo Oh,Korea University |
PDF |
- |
video |
slides |
VeriZexe: Decentralized Private Computation with Universal Setup |
Alex Luoyuan Xiong,Espresso Systems, National University of Singapore;Binyi Chen and Zhenfei Zhang,Espresso Systems;Benedikt Bünz,Espresso Systems, Stanford University;Ben Fisch,Espresso Systems, Yale University;Fernando Krell and Philippe Camacho,Espresso Systems |
PDF |
- |
video |
- |
Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers |
Noé Zufferey and Mathias Humbert,University of Lausanne, Switzerland;Romain Tavenard,University of Rennes, CNRS, LETG, France;Kévin Huguenin,University of Lausanne, Switzerland |
PDF |
- |
video |
- |
We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets |
Sven Hebrok,Paderborn University;Simon Nachtigall,Paderborn University and achelos GmbH;Marcel Maehren and Nurullah Erinola,Ruhr University Bochum;Robert Merget,Technology Innovation Institute and Ruhr University Bochum;Juraj Somorovsky,Paderborn University;Jörg Schwenk,Ruhr University Bochum |
PDF |
- |
video |
slides |
Work-From-Home and COVID-19: Trajectories of Endpoint Security Management in a Security Operations Center |
Kailani R. Jones and Dalton A. Brucker-Hahn,University of Kansas;Bradley Fidler,Independent Researcher;Alexandru G. Bardas,University of Kansas |
PDF |
- |
video |
slides |
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection |
Aishan Liu and Jun Guo,Beihang University;Jiakai Wang,Zhongguancun Laboratory;Siyuan Liang,Chinese Academy of Sciences;Renshuai Tao,Beihang University;Wenbo Zhou,University of Science and Technology of China;Cong Liu,iFLYTEK;Xianglong Liu,Beihang University, Zhongguancun Laboratory, and Hefei Comprehensive National Science Center;Dacheng Tao,JD Explore Academy |
PDF |
- |
video |
slides |
XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via Computing Tomography |
Zhiyuan Yu, Yuanhaur Chang, Shixuan Zhai, Nicholas Deily, and Tao Ju,Washington University in St. Louis;XiaoFeng Wang,Indiana University Bloomington;Uday Jammalamadaka,Rice University;Ning Zhang,Washington University in St. Louis |
PDF |
- |
video |
- |
ZBCAN: A Zero-Byte CAN Defense System |
Khaled Serag, Rohit Bhatia, Akram Faqih, and Muslum Ozgur Ozmen,Purdue University;Vireshwar Kumar,Indian Institute of Technology, Delhi;Z. Berkay Celik and Dongyan Xu,Purdue University |
PDF |
- |
video |
- |