


default search action
29th CCS 2022: Los Angeles, CA, USA
- Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi:

Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. ACM 2022, ISBN 978-1-4503-9450-5
Keynote Talks
- Srinivas Devadas, Simon Langowski, Nikola Samardzic, Sacha Servan-Schreiber, Daniel Sánchez:

Designing Hardware for Cryptography and Cryptography for Hardware. 1-4 - Michelle L. Mazurek:

We Are the Experts, and We Are the Problem: The Security Advice Fiasco. 7 - Patrick Drew McDaniel:

Sustainability is a Security Problem. 9-10
Full Papers
- Calvin Abou Haidar, Benoît Libert, Alain Passelègue:

Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security. 11-22 - Shubham Agarwal

:
Helping or Hindering?: How Browser Extensions Undermine Security. 23-37 - Shweta Agrawal, Elena Kirshanova, Damien Stehlé, Anshu Yadav:

Practical, Round-Optimal Lattice-Based Blind Signatures. 39-53 - Mingrui Ai, Kaiping Xue

, Bo Luo
, Lutong Chen, Nenghai Yu, Qibin Sun, Feng Wu:
Blacktooth: Breaking through the Defense of Bluetooth in Silence. 55-68 - Joël Alwen, Dominik Hartmann

, Eike Kiltz
, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. 69-82 - Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Swarn Priya

:
Enforcing Fine-grained Constant-time Policies. 83-96 - Yawning Angel, Benjamin Dowling

, Andreas Hülsing, Peter Schwabe, Florian Weber:
Post Quantum Noise. 97-109 - Diego F. Aranha

, Chuanwei Lin
, Claudio Orlandi, Mark Simkin
:
Laconic Private Set-Intersection From Pairings. 111-124 - Gilad Asharov

, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Ariel Nof, Benny Pinkas, Katsumi Takahashi, Junichi Tomida:
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters. 125-138 - Tomer Ashur

, Mohammad Mahzoun, Dilara Toprakhisar
:
Chaghri - A FHE-friendly Block Cipher. 139-150 - Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa:

Secure Parallel Computation on Privately Partitioned Data and Applications. 151-164 - Lukas Aumayr, Kasra Abbaszadeh, Matteo Maffei:

Thora: Atomic and Privacy-Preserving Multi-Channel Updates. 165-178 - Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan

, Giulio Malavolta
, Pedro Moreno-Sanchez, Matteo Maffei:
Sleepy Channels: Bi-directional Payment Channels without Watchtowers. 179-192 - Renas Bacho, Julian Loss:

On the Adaptive Security of the Threshold BLS Signature Scheme. 193-207 - Saikrishna Badrinarayanan, Sourav Das, Gayathri Garimella, Srinivasan Raghuraman, Peter Rindal:

Secret-Shared Joins with Multiplicity from Aggregation Trees. 209-222 - Youngjin Bae, Jung Hee Cheon, Wonhee Cho

, Jaehyung Kim
, Taekyung Kim:
META-BTS: Bootstrapping Precision Beyond the Limit. 223-234 - Leemon Baird, Pratyay Mukherjee, Rohit Sinha:

i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? 235-248 - Teodora Baluta

, Shiqi Shen, S. Hitarth
, Shruti Tople, Prateek Saxena:
Membership Inference Attacks and Generalization: A Causal Perspective. 249-262 - Gilles Barthe, Ugo Dal Lago, Giulio Malavolta

, Itsaka Rakotonirina:
Tidy: Symbolic Verification of Timed Cryptographic Protocols. 263-276 - Anomadarshi Barua, Yonatan Gizachew Achamyeleh

, Mohammad Abdullah Al Faruque:
A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music. 277-291 - Carsten Baum, Robin Jadoul

, Emmanuela Orsini
, Peter Scholl, Nigel P. Smart:
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs. 293-306 - James Bell, Adrià Gascón, Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Mariana Raykova, Phillipp Schoppmann:

Distributed, Private, Sparse Histograms in the Two-Server Model. 307-321 - Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:

Threshold Cryptography as a Service (in the Multiserver and YOSO Models). 323-336 - Alex Berke, Dan Calacci

:
Privacy Limitations of Interest-based Advertising on The Web: A Post-mortem Empirical Analysis of Google's FLoC. 337-349 - Lukas Bernhard, Tobias Scharnowski, Moritz Schloegel

, Tim Blazytko, Thorsten Holz:
JIT-Picking: Differential Fuzzing of JavaScript Engines. 351-364 - Karthikeyan Bhargavan, Vincent Cheval

, Christopher A. Wood:
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. 365-379 - Roderick Bloem, Barbara Gigerl, Marc Gourjon, Vedad Hadzic, Stefan Mangard

, Robert Primas:
Power Contracts: Provably Complete Power Leakage Models for Processors. 381-395 - Mikael Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani:

Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. 397-410 - Lara Bruseghini, Daniel Huigens, Kenneth G. Paterson:

Victory by KO: Attacking OpenPGP Using Key Overwriting. 411-423 - Duc Bui, Brian Tang, Kang G. Shin:

Do Opt-Outs Really Opt Me Out? 425-439 - Chengjun Cai

, Yichen Zang
, Cong Wang, Xiaohua Jia, Qian Wang:
Vizard: A Metadata-hiding Data Analytic System with End-to-End Policy Controls. 441-454 - Matteo Campanelli

, Dario Fiore, Semin Han
, Jihye Kim
, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. 455-469 - Sílvia Casacuberta, Michael Shoemate, Salil P. Vadhan, Connor Wagaman:

Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It. 471-484 - Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu

, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. 485-498 - Min Chen

, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang
:
Graph Unlearning. 499-513 - Zitai Chen

, Sam L. Thomas, Flavio D. Garcia:
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. 515-529 - Wutichai Chongchitmate, Yuval Ishai, Steve Lu, Rafail Ostrovsky

:
PSI from Ring-OLE. 531-545 - Yaakov Cohen

, Kevin Sam Tharayil, Arie Haenel
, Daniel Genkin, Angelos D. Keromytis, Yossi Oren
, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. 547-561 - Kelong Cong

, Debajyoti Das
, Jeongeun Park
, Hilder V. L. Pereira:
SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering. 563-577 - Tianshuo Cong, Xinlei He, Yang Zhang

:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. 579-593 - Sandro Coretti, Aggelos Kiayias, Cristopher Moore, Alexander Russell

:
The Generals' Scuttlebutt: Byzantine-Resilient Gossip Protocols. 595-608 - Geoffroy Couteau, Dahmun Goudarzi, Michael Klooß

, Michael Reichle
:
Sharp: Short Relaxed Range Proofs. 609-622 - Ana-Maria Cretu

, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye:
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. 623-637 - Siwei Cui

, Gang Zhao, Yifei Gao, Tien Tavu, Jeff Huang:
VRust: Automated Vulnerability Detection for Solana Smart Contracts. 639-652 - Anders P. K. Dalskov

, Daniel Escudero, Ariel Nof:
Fast Fully Secure Multi-Party Computation over Any Ring with Two-Thirds Honest Majority. 653-666 - Dipanjan Das, Priyanka Bose, Nicola Ruaro

, Christopher Kruegel, Giovanni Vigna:
Understanding Security Issues in the NFT Ecosystem. 667-681 - Bernardo David, Bernardo Magri, Christian Matt

, Jesper Buus Nielsen, Daniel Tschudi:
GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy. 683-696 - Alex Davidson

, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi:
STAR: Secret Sharing for Private Threshold Aggregation Reporting. 697-710 - Alvise de Faveri Tron, Stefano Longari, Michele Carminati

, Mario Polino, Stefano Zanero:
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks. 711-723 - Paola de Perthuis, David Pointcheval:

Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection. 725-737 - Gelei Deng, Guowen Xu, Yuan Zhou

, Tianwei Zhang, Yang Liu
:
On the (In)Security of Secure ROS2. 739-753 - Jiangyi Deng, Yanjiao Chen, Wenyuan Xu:

FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. 755-767 - Yunjie Deng

, Chenxu Wang
, Shunchang Yu, Shiqing Liu, Zhenyu Ning
, Kevin Leach, Jin Li, Shoumeng Yan
, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. 769-783 - Zizhuang Deng

, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng:
Understanding Real-world Threats to Deep Learning Models in Android Apps. 785-799 - Karel Dhondt, Victor Le Pochat

, Alexios Voulimeneas
, Wouter Joosen, Stijn Volckaert:
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks. 801-814 - Siemen Dhooghe

, Aein Rezaei Shahmirzadi
, Amir Moradi
:
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES. 815-828 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky

:
Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One. 829-841 - Christoph Dobraunig

, Daniel Kales
, Christian Rechberger, Markus Schofnegger, Greg Zaverucha
:
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. 843-857 - Christoph Dobraunig

, Bart Mennink, Robert Primas:
Leakage and Tamper Resilient Permutation-Based Cryptography. 859-873 - Priyanka Dodia, Mashael AlSabah, Omar Alrawi

, Tao Wang:
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection. 875-889 - Shaoyong Du, Xin Liu, Guoqing Lai, Xiangyang Luo

:
Watch Out for Race Condition Attacks When Using Android External Storage. 891-904 - Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding

, Yao Liu, Zhuo Lu:
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception. 905-919 - Yue Duan

, Xin Zhao, Yu Pan, Shucheng Li
, Minghao Li, Fengyuan Xu, Mu Zhang
:
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. 921-935 - Zeinab El-Rewini, Zhuo Zhang

, Yousra Aafer:
Poirot: Probabilistically Recommending Protections for the Android Framework. 937-950 - Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:

TurboPack: Honest Majority MPC with Constant Online Communication. 951-964 - Xaver Fabian, Marco Guarnieri, Marco Patrignani

:
Automatic Detection of Speculative Execution Combinations. 965-978 - Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. 979-993 - Xiaoyu Fan, Kun Chen, Guosai Wang, Mingchun Zhuang, Yi Li, Wei Xu:

NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms. 995-1008 - Juanru Fang, Wei Dong

, Ke Yi:
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. 1009-1022 - Jakob Feldtkeller

, Jan Richter-Brockmann
, Pascal Sasdrich
, Tim Güneysu
:
CINI MINIS: Domain Isolation for Fault and Combined Security. 1023-1036 - Mia Filic

, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia
:
Adversarial Correctness and Privacy for Probabilistic Data Structures. 1037-1050 - Andrea Fioraldi, Dominik Christian Maier, Dongjia Zhang, Davide Balzarotti:

LibAFL: A Framework to Build Modular and Reusable Fuzzers. 1051-1065 - Dario Fiore, Ida Tucker:

Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams. 1067-1080 - Matthias Fitzi, Xuechao Wang

, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang
:
Minotaur: Multi-Resource Blockchain Consensus. 1095-1108 - Nils Fleischhacker, Mark Simkin

, Zhenfei Zhang:
Squirrel: Efficient Synchronized Multi-Signatures from Lattices. 1109-1123 - Daniel Franzen

, Saskia Nuñez von Voigt, Peter Sörries
, Florian Tschorsch, Claudia Müller-Birn:
Am I Private and If So, how Many?: Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats. 1125-1139 - Kelsey R. Fulton

, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. 1141-1155 - Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. 1157-1171 - Chaya Ganesh, Bhavana Kanukurthi, Girisha Shankar:

Secure Auctions in the Presence of Rational Adversaries. 1173-1186 - Yingzi Gao, Yuan Lu, Zhenliang Lu

, Qiang Tang
, Jing Xu, Zhenfeng Zhang:
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency. 1187-1201 - Sanjam Garg

, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang:
Succinct Zero Knowledge for Floating Point Computations. 1203-1216 - Peter Gazi, Ling Ren, Alexander Russell

:
Practical Settlement Bounds for Proof-of-Work Blockchains. 1217-1230 - Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui:

Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. 1231-1242 - Seyedhamed Ghavamnia, Tapti Palit

, Michalis Polychronakis
:
C2C: Fine-grained Configuration-driven System Call Filtering. 1243-1257 - Noemi Glaeser, Matteo Maffei, Giulio Malavolta

, Pedro Moreno-Sanchez, Erkan Tairi
, Sri Aravinda Krishnan Thyagarajan
:
Foundations of Coin Mixing Services. 1259-1273 - Vasudev Gohil

, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran:
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning. 1275-1289 - Gibran Gómez

, Pedro Moreno-Sanchez, Juan Caballero:
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration. 1291-1305 - Floris Gorter

, Koen Koning
, Herbert Bos
, Cristiano Giuffrida
:
DangZero: Efficient Use-After-Free Detection via Direct Page Table Access. 1307-1322 - Lorenzo Grassi

, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Reinforced Concrete: A Fast Hash Function for Verifiable Computation. 1323-1335 - Tim Güneysu

, Philip W. Hodges, Georg Land
, Mike Ounsworth, Douglas Stebila
, Greg Zaverucha
:
Proof-of-Possession for KEM Certificates using Verifiable Generation. 1337-1351 - Hanqing Guo

, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. 1353-1366 - Zayd Hammoudeh, Daniel Lowd:

Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation. 1367-1381 - Xiao Han

, Junjie Xiong
, Wenbo Shen, Zhuo Lu, Yao Liu:
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. 1383-1397 - Keitaro Hashimoto

, Shuichi Katsumata, Thomas Prest:
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. 1399-1412 - Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner:

Behind the Scenes of RPKI. 1413-1426 - Hai Huang

, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang
:
On the Privacy Risks of Cell-Based NAS Architectures. 1427-1441 - Nicolas Huber, Ralf Küsters, Toomas Krips, Julian Liedtke

, Johannes Müller
, Daniel Rausch, Pascal Reisert
, Andreas Vogt:
Kryvos: Publicly Tally-Hiding Verifiable E-Voting. 1443-1457 - Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum:

Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. 1459-1472 - Jaewon Hur, Suhwan Song

, Sunwoo Kim, Byoungyoung Lee
:
SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities. 1473-1487 - Ahmad Ibrahim, Hamed Nemati, Till Schlüter, Nils Ole Tippenhauer

, Christian Rossow:
Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels. 1489-1503 - Jacob Imola, Takao Murakami, Kamalika Chaudhuri:

Differentially Private Triangle and 4-Cycle Counting in the Shuffle Model. 1505-1519 - Akira Ito, Rei Ueno, Naofumi Homma:

On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. 1521-1535 - Arthur Selle Jacobs, Roman Beltiukov

, Walter Willinger, Ronaldo A. Ferreira
, Arpit Gupta, Lisandro Z. Granville
:
AI/ML for Network Security: The Emperor has no Clothes. 1537-1551 - Louis Jannett

, Vladislav Mladenov, Christian Mainka, Jörg Schwenk:
DISTINCT: Identity Theft using In-Browser Communications in Dual-Window Single Sign-On. 1553-1567 - Bargav Jayaraman, David Evans

:
Are Attribute Inference Attacks Just Imputation? 1569-1582 - Ke Jiang, Yuyan Bao

, Shuai Wang, Zhibo Liu, Tianwei Zhang:
Cache Refinement Type for Side-Channel Detection of Cryptographic Software. 1583-1597 - Zhiyuan Jiang, Shuitao Gan, Adrian Herrera

, Flavio Toffalini, Lucio Romerio, Chaojing Tang, Manuel Egele, Chao Zhang, Mathias Payer:
Evocatio: Conjuring Bug Capabilities from a Single PoC. 1599-1613 - Xin Jin

, Sunil Manandhar, Kaushal Kafle, Zhiqiang Lin, Adwait Nadkarni:
Understanding IoT Security from a Market-Scale Perspective. 1615-1629 - Xin Jin

, Kexin Pei, Jun Yeon Won, Zhiqiang Lin:
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings. 1631-1645 - Ze Jin, Luyi Xing, Yiwei Fang

, Yan Jia
, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. 1647-1661 - Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin T. Vechev:

Private and Reliable Neural Network Inference. 1663-1677 - Changhun Jung, Sian Kim, Rhongho Jang

, David Mohaisen
, DaeHun Nyang:
A Scalable and Dynamic ACL System for In-Network Defense. 1679-1693 - Wooseok Kang, Byoungho Son, Kihong Heo:

TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities. 1695-1708 - Mohammad Sina Karvandi, MohammadHosein Gholamrezaei, Saleh Khalaj Monfared, Soroush Meghdadi Zanjani, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz:

HyperDbg: Reinventing Hardware-Assisted Debugging. 1709-1723 - Assimakis A. Kattis, Konstantin Panarin, Alexander Vlasov:

RedShift: Transparent SNARKs from List Polynomial Commitments. 1725-1737 - Aggelos Kiayias, Markulf Kohlweiss

, Amirreza Sarencheh:
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies. 1739-1752 - Seulbae Kim

, Major Liu, Junghwan John Rhee, Yuseok Jeon, Yonghwi Kwon, Chung Hwan Kim
:
DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing. 1753-1767 - Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim:

Phishing URL Detection: A Network-based Approach Robust to Evasion. 1769-1782 - Kamil Kluczniak:

NTRU-v-um: Secure Fully Homomorphic Encryption from NTRU with Small Modulus. 1783-1797 - David Knichel, Amir Moradi

:
Low-Latency Hardware Private Circuits. 1799-1812 - Aashish Kolluri, Teodora Baluta

, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. 1813-1827 - Evgenios M. Kornaropoulos

, Nathaniel Moyer, Charalampos Papamanthou, Alexandros Psomas:
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption. 1829-1842 - Nishat Koti

, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
PentaGOD: Stepping beyond Traditional GOD with Five Parties. 1843-1856 - James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson

:
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. 1857-1870 - Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanovic:

Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing. 1871-1885 - Shuai Li

, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. 1887-1900 - Yuan Li

, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, Chao Zhang:
PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication. 1901-1915 - Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang

:
Auditing Membership Leakages of Multi-Exit Networks. 1917-1931 - Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee:

Overo: Sharing Private Audio Recordings. 1933-1946 - Shihan Lin, Rui Xin, Aayush Goel, Xiaowei Yang:

InviCloak: An End-to-End Approach to Privacy and Performance in Web Content Distribution. 1947-1961 - Zhenpeng Lin, Yuhang Wu, Xinyu Xing:

DirtyCred: Escalating Privilege in Linux Kernel. 1963-1976 - Chen Liu, Abhishek Chakraborty, Nikhil Chawla

, Neer Roggel:
Frequency Throttling Side-Channel Attack. 1977-1991 - Guannan Liu

, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang:
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. 1993-2007 - Han Liu

, Zhiyuan Yu
, Mingming Zha, XiaoFeng Wang, William Yeoh
, Yevgeniy Vorobeychik, Ning Zhang:
When Evil Calls: Targeted Adversarial Voice over IP Network. 2009-2023 - Jiawei Liu

, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu:
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models. 2025-2039 - Jing Liu, Liang Feng Zhang:

Matproofs: Maintainable Matrix Commitment with Efficient Aggregation. 2041-2054 - Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao

:
Harnessing Perceptual Adversarial Patches for Crowd Counting. 2055-2069 - Yinxi Liu

, Wei Meng:
Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities. 2071-2084 - Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang

:
Membership Inference Attacks by Exploiting Loss Trajectory. 2085-2098 - Yulin Liu, Yuxuan Lu

, Kartik Nayak, Fan Zhang
, Luyao Zhang
, Yinhong Zhao
:
Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. 2099-2113 - Yupei Liu, Jinyuan Jia, Hongbin Liu, Neil Zhenqiang Gong:

StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning. 2115-2128 - Zeyan Liu

, Fengjun Li, Zhu Li, Bo Luo
:
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. 2129-2143 - Jie Lu, Haofeng Li

, Chen Liu, Lian Li, Kun Cheng:
Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems. 2145-2158 - Yuan Lu, Zhenliang Lu

, Qiang Tang
:
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT. 2159-2173 - Changhua Luo

, Penghui Li, Wei Meng:
TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. 2175-2188 - Ning Luo, Timos Antonopoulos, William R. Harris, Ruzica Piskac

, Eran Tromer, Xiao Wang
:
Proving UNSAT in Zero Knowledge. 2203-2217 - Qiyao Luo

, Yilei Wang
, Ke Yi:
Frequency Estimation in the Shuffle Model with Almost a Single Message. 2219-2232 - Xinjian Luo

, Yangfan Jiang, Xiaokui Xiao:
Feature Inference Attack on Shapley Values. 2233-2247 - Samuel Maddock

, Graham Cormode
, Tianhao Wang, Carsten Maple, Somesh Jha:
Federated Boosted Decision Trees with Differential Privacy. 2249-2263 - Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef

, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. 2265-2278 - Allen Mi

, Shuwen Deng, Jakub Szefer
:
Securing Reset Operations in NISQ Quantum Computers. 2279-2293 - Atsuki Momose, Ling Ren:

Constant Latency in Sleepy Consensus. 2295-2308 - Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:

Physical Hijacking Attacks against Object Trackers. 2309-2322 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. 2323-2336 - Mohammad Naseri, Yufei Han, Enrico Mariconti

, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
CERBERUS: Exploring Federated Prediction of Security Events. 2337-2351 - Zachary Newman

, John Speed Meyers, Santiago Torres-Arias
:
Sigstore: Software Signing for Everybody. 2353-2367 - Trung Tin Nguyen, Michael Backes, Ben Stock

:
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. 2369-2383 - Jianyu Niu, Wei Peng

, Xiaokuan Zhang, Yinqian Zhang:
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. 2385-2399 - ChangSeok Oh

, Chris Kanich, Damon McCoy, Paul Pearce:
Cart-ology: Intercepting Targeted Advertising via Ad Network Identity Entanglement. 2401-2414 - Muslum Ozgur Ozmen, Xuansong Li

, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. 2415-2428 - Dario Pasquini

, Danilo Francati
, Giuseppe Ateniese
:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. 2429-2443 - Sajjad Pourali

, Nayanamana Samarasinghe, Mohammad Mannan:
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. 2445-2458 - Tamjid Al Rahat

, Yu Feng
, Yuan Tian:
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. 2459-2473 - Soundarya Ramesh, Ghozali Suhariyanto Hadi

, Sihun Yang
, Mun Choon Chan, Jun Han:
TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals. 2475-2489 - Doreen Riepel

, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. 2491-2504 - Srinivasan Raghuraman, Peter Rindal:

Blazing Fast PSI from Improved OKVS and Subfield VOLE. 2505-2517 - Amrita Roy Chowdhury, Bolin Ding, Somesh Jha, Weiran Liu, Jingren Zhou:

Strengthening Order Preserving Encryption with Differential Privacy. 2519-2533 - Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten:

EIFFeL: Ensuring Integrity for Federated Learning. 2535-2549 - Tim Ruffing, Viktoria Ronge, Elliott Jin, Jonas Schneider-Bensch, Dominique Schröder:

ROAST: Robust Asynchronous Schnorr Threshold Signatures. 2551-2564 - Sajin Sasy, Aaron Johnson, Ian Goldberg:

Fast Fully Oblivious Compaction and Shuffling. 2565-2579 - Fabian Schwarz

, Khue Do
, Gunnar Heide, Lucjan Hanzlik, Christian Rossow:
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs. 2581-2594 - Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana:

MC2: Rigorous and Efficient Directed Greybox Fuzzing. 2595-2609 - Shawn Shan, Wenxin Ding, Emily Wenger

, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. 2611-2625 - Junxian Shen

, Han Zhang, Yantao Geng, Jiawei Li, Jilong Wang, Mingwei Xu:
Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing. 2627-2641 - Yun Shen, Yufei Han, Zhikun Zhang, Min Chen

, Ting Yu, Michael Backes, Yang Zhang
, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. 2643-2657 - Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang

:
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. 2659-2673 - Konstantinos Solomos

, Panagiotis Ilia
, Nick Nikiforakis, Jason Polakis:
Escaping the Confines of Time: Continuous Browser Extension Fingerprinting Through Ephemeral Modifications. 2675-2688 - Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han:

pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. 2689-2703 - Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, Lefteris Kokoris-Kogias:

Bullshark: DAG BFT Protocols Made Practical. 2705-2718 - Shravan Srinivasan

, Ioanna Karantaidou, Foteini Baldimtsi, Charalampos Papamanthou:
Batching, Aggregation, and Zero-Knowledge Proofs in Bilinear Accumulators. 2719-2733 - Samuel Steffen, Benjamin Bichsel, Martin T. Vechev:

Zapper: Smart Contracts with Data and Identity Privacy. 2735-2749 - Siyuan Tang, Xianghang Mi, Ying Li, XiaoFeng Wang, Kai Chen:

Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam. 2751-2764 - Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler:

NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications. 2765-2778 - Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini:

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets. 2779-2792 - Nirvan Tyagi

, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro:
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. 2793-2807 - Han Wang, Hanbin Hong, Li Xiong, Zhan Qin

, Yuan Hong
:
L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response. 2809-2823 - Jianfeng Wang

, Shifeng Sun, Tianci Li, Saiyu Qi, Xiaofeng Chen:
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. 2825-2839 - Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:

ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. 2841-2855 - Xian Wang, Shuang Hao:

Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee. 2857-2870 - Xiuling Wang, Wendy Hui Wang

:
Group Property Inference Attacks Against Graph Neural Networks. 2871-2884 - Jianxin Wei

, Ergute Bao
, Xiaokui Xiao, Yin Yang:
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling. 2885-2899 - Chenkai Weng

, Kang Yang, Zhaomin Yang, Xiang Xie
, Xiao Wang
:
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. 2901-2914 - Jan Wichelmann, Florian Sieck, Anna Pätschke

, Thomas Eisenbarth
:
Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications. 2915-2929 - Cong Wu, Jing Chen, Kun He, Ziming Zhao

, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. 2931-2945 - Karl Wüst, Kari Kostiainen, Noah Delius, Srdjan Capkun:

Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation. 2947-2960 - Marc Wyss

, Giacomo Giuliari, Jonas Mohler, Adrian Perrig:
Protecting Critical Inter-Domain Communication through Flyover Reservations. 2961-2974 - Feng Xiao, Zheng Yang, Joey Allen, Guangliang Yang, Grant Williams, Wenke Lee:

Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem. 2975-2988 - Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:

CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. 2989-3002 - Tiancheng Xie, Jiaheng Zhang, Zerui Cheng

, Fan Zhang
, Yupeng Zhang, Yongzheng Jia
, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. 3003-3017 - Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons

:
Automatic Detection of Fake Key Attacks in Secure Messaging. 3019-3032 - Edwin Yang, Qiuye He

, Song Fang:
WINK: Wireless Inference of Numerical Keystrokes via Zero-Training Spatiotemporal Analysis. 3033-3047 - Mingshuo Yang, Yunnan Yu, Xianghang Mi, Shujun Tang

, Shanqing Guo, Yilin Li, Xiaofeng Zheng, Haixin Duan:
An Extensive Study of Residential Proxies in China. 3049-3062 - Yuqing Yang

, Mohamed Elsabagh, Chaoshun Zuo, Ryan Johnson, Angelos Stavrou
, Zhiqiang Lin:
Detecting and Measuring Misconfigured Manifests in Android Apps. 3063-3077 - Yuqing Yang

, Yue Zhang
, Zhiqiang Lin:
Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection. 3079-3092 - Jiayuan Ye, Aadyaa Maddi

, Sasi Kumar Murakonda, Vincent Bindschaedler
, Reza Shokri:
Enhanced Membership Inference Attacks against Machine Learning Models. 3093-3106 - Zhiyuan Yu

, Zhuohang Li, Yuanhaur Chang
, Skylar Fong, Jian Liu
, Ning Zhang:
HeatDeCam: Detecting Hidden Spy Cameras via Thermal Emissions. 3107-3120 - Arantxa Zapico, Vitalik Buterin, Dmitry Khovratovich, Mary Maller, Anca Nitulescu, Mark Simkin

:
Caulk: Lookup Arguments in Sublinear Time. 3121-3134 - Jun Zeng, Chuqi Zhang, Zhenkai Liang:

PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability. 3135-3149 - Haibin Zhang, Sisi Duan:

PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. 3151-3164 - Penghui Zhang, Zhibo Sun

, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn
, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. 3165-3179 - Yue Zhang

, Zhiqiang Lin:
When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. 3181-3194 - Yuncong Zhang

, Alan Szepieniec, Ren Zhang
, Shifeng Sun, Geng Wang, Dawu Gu:
VOProof: Efficient zkSNARKs from Vector Oracle Compilers. 3195-3208 - Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai:

Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks. 3209-3222 - Ke Zhong, Yiping Ma, Sebastian Angel:

Ibex: Privacy-preserving Ad Conversion Tracking and Bidding. 3223-3237 - Hao Zhou

, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. 3239-3252 - Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, Kangjie Lu:

Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs. 3253-3267 - Wei Zhou, Lan Zhang, Le Guan, Peng Liu, Yuqing Zhang:

What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation. 3269-3283 - Xin'an Zhou

, Jiale Guan, Luyi Xing, Zhiyun Qian:
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT. 3285-3299
Poster Presentations
- Gorka Abad

, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. 3315-3317 - Akshit Aggarwal, Srinibas Swain:

Poster: Correctness of n-parties ECDSA By the Claim of Byzantine Agreement. 3319-3321 - Lamya Alkhariji, Suparna De, Omer F. Rana

, Charith Perera:
Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems. 3323-3325 - Andrea Basso

:
Poster: A Post-Quantum Oblivious PRF from Isogenies. 3327-3329 - Andreas Brüggemann

, Thomas Schneider
, Ajith Suresh, Hossein Yalame:
Poster: Efficient Three-Party Shuffling Using Precomputation. 3331-3333 - Niusen Chen, Josh Dafoe, Bo Chen

:
Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction. 3335-3337 - Kohei Doi, Takeshi Sugawara

:
Poster: Inaudible Acoustic Noise from Silicon Capacitors for Voice-Command Injection. 3339-3341 - Anirudh Ekambaranathan, Jun Zhao, Max Van Kleek:

Poster: An Analysis of Privacy Features in 'Expert-Approved' Kids' Apps. 3343-3345 - Mafalda Ferreira

, Tiago Brito
, José Fragoso Santos, Nuno Santos:
Poster: A Systems Approach to GDPR Compliance-by-Design in Web Development Stacks. 3347-3349 - Daniel Günther

, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider
, Ajith Suresh:
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. 3351-3353 - Roger A. Hallman

:
Poster EveGAN: Using Generative Deep Learning for Cryptanalysis. 3355-3357 - Nur Imtiazul Haque, Maurice Ngouen, Yazen Al-Wahadneh, Mohammad Ashiqur Rahman

:
Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System. 3359-3361 - Elias Heftrig, Haya Schulmann, Michael Waidner:

Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. 3363-3365 - Can Huang, Cheng Li

, Jiashuo Liang, Xinhui Han:
Poster: MSILDiffer - A Security Patch Analysis Framework Based on Microsoft Intermediate Language for Large Software. 3367-3369 - Pranav Jangir, Nishat Koti

, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Poster: Vogue: Faster Computation of Private Heavy Hitters. 3371-3373 - Ioannis Kaklamanis, Lei Yang, Mohammad Alizadeh:

Poster: Coded Broadcast for Scalable Leader-Based BFT Consensus. 3375-3377 - Nishat Koti

, Shravani Patil, Arpita Patra, Ajith Suresh
:
Poster MPClan: : Protocol Suite for Privacy-Conscious Computations. 3379-3381 - Immanuel Kunz, Angelika Schneider, Christian Banse, Konrad Weiss, Andreas Binder:

Poster: Patient Community - A Test Bed for Privacy Threat Analysis. 3383-3385 - Kiho Lee

, Sanghak Oh, Hyoungshick Kim:
Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks. 3387-3389 - Levi Taiji Li, Mu Zhang

:
Poster: EOSDFA: Data Flow Analysis of EOSIO Smart Contracts. 3391-3393 - Bingyu Liu, Rujia Wang, Zhongjie Ba, Shanglin Zhou, Caiwen Ding, Yuan Hong

:
Poster: Cryptographic Inferences for Video Deep Neural Networks. 3395-3397 - Daniela Lopes, Pedro Medeiros, Jin-Dong Dong, Diogo Barradas, Bernardo Portela

, João Vinagre
, Bernardo Ferreira
, Nicolas Christin
, Nuno Santos:
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale? 3399-3401 - Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal:

Poster: Investigating QUIC's Potential Impact on Censorship Circumvention. 3403-3405 - Xiaofeng Lu, Renyu Pang, Pietro Liò:

Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device Authentication. 3407-3409 - Yunpeng Luo, Ziwen Wan, Qi Alfred Chen:

Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications. 3411-3413 - Salman Manzoor, Antonios Gouglidis, Matthew Bradbury

, Neeraj Suri
:
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. 3415-3417 - Salman Manzoor, Antonios Gouglidis, Matthew Bradbury

, Neeraj Suri
:
Poster: Multi-Layer Threat Analysis of the Cloud. 3419-3421 - Donika Mirdita, Haya Schulmann, Michael Waidner:

Poster: RPKI Kill Switch. 3423-3425 - Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap:

Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. 3427-3429 - Chuyen Nguyen, Caleb Morgan, Sudip Mittal:

Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. 3431-3433 - Rajvardhan Oak:

Poster - Towards Authorship Obfuscation with Language Models. 3435-3437 - Leo Hyun Park, Jaewoo Park, Soochang Chung, Jaeuk Kim, Myung Gyo Oh, Taekyoung Kwon:

Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification. 3439-3441 - Yili Ren

, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Poster: A WiFi Vision-based Approach to Person Re-identification. 3443-3445 - Shadi Sadeghpour

, Natalija Vlajic:
Poster: ReMouse Dataset: Measuring Similarity of Human-Generated Trajectories as an Important Step in Dealing with Session-Replay Bots. 3447-3449 - Mohsen Salehi, Karthik Pattabiraman:

Poster AutoPatch: Automatic Hotpatching of Real-Time Embedded Devices. 3451-3453 - Davide Sanvito, Giuseppe Siracusano, Roberto Gonzalez, Roberto Bifulco:

Poster: MUSTARD - Adaptive Behavioral Analysis for Ransomware Detection. 3455-3457 - Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki

, Kentaro Yoshioka, Qi Alfred Chen:
Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection. 3459-3461 - Martin Serror, Lennart Bader, Martin Henze

, Arne Schwarze, Kai Nürnberger:
Poster: INSIDE - Enhancing Network Intrusion Detection in Power Grids with Automated Facility Monitoring. 3463-3465 - Haya Schulmann, Niklas Vogel, Michael Waidner:

Poster: Insights into Global Deployment of RPKI Validation. 3467-3469 - Haya Schulmann, Michael Waidner

:
Poster: DNS in Routers Considered Harmful. 3471-3473 - Leon Visscher, Mohammed Alghazwi, Dimka Karastoyanova, Fatih Turkmen

:
Poster: Privacy-preserving Genome Analysis using Verifiable Off-Chain Computation. 3475-3477 - Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen:

Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving. 3479-3481 - Yibo Wang, Yuzhe Tang:

Poster: Enabling Cost-Effective Blockchain Applications via Workload-Adaptive Transaction Execution. 3483-3485 - Zi Wang, Yilin Wang, Yingying Chen, Jie Yang:

Poster: Fingerprint-Face Friction Based Earable Authentication. 3487-3489 - Jing Xu

, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. 3491-3493 - Yibin Xu

, Tijs Slaats, Boris Düdder
:
Poster: Unanimous-Majority - Pushing Blockchain Sharding Throughput to its Limit. 3495-3497 - Tarun Kumar Yadav, Justin Hales, Kent E. Seamons:

Poster: User-controlled System-level Encryption for all Applications. 3499-3501 - Kyeongseok Yang, Sudharssan Mohan, Yonghwi Kwon, Heejo Lee, Chung Hwan Kim

:
Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles. 3503-3505 - Ruiguo Yang, Jiajin Cai, Xinhui Han:

Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules. 3507-3509 - Yingao Elaine Yao, Pritam Dash, Karthik Pattabiraman:

Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms. 3511-3513
Demonstrations
- Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:

Demo: End-to-End Wireless Disruption of CCS EV Charging. 3515-3517 - Thomas Sandholm, Sayandev Mukherjee, Bernardo A. Huberman:

Demo - SPoKE: Secure Polling and Knowledge Exchange. 3519-3521 - Chandra Thapa

, Seyit Camtepe
, Raj Gaire, Surya Nepal
, Seung Ick Jang
:
Demo - MaLFraDA: A Machine Learning Framework with Data Airlock. 3523-3525 - Xiangan Tian, Vlasis Koutsos, Lijia Wu, Yijian Wu, Dimitrios Papadopoulos:

Demo: VaxPass - A Scalable and Verifiable Platform for COVID-19 Records. 3527-3529
Pre Conference Workshop Summaries
- Michael Brenner, Anamaria Costache, Kurt Rohloff:

WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 3531-3532 - Earlence Fernandes, Cristina Alcaraz:

CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy. 3533-3534 - Yuan Hong

, Lingyu Wang:
WPES '22: 21st Workshop on Privacy in the Electronic Society. 3535-3537 - Hamed Okhravi

, Cliff Wang:
MTD '22: 9th ACM Workshop on Moving Target Defense. 3539-3540 - Marten van Dijk, Francesco Regazzoni

:
CCSW '22: The 2022 Cloud Computing Security Workshop. 3541-3542 - Jorge M. Soares, Dawn Song, Marko Vukolic:

ConsensusDay '22: ACM Workshop on Developments in Consensus. 3543-3544
Post Conference Workshop Summaries
- Chip-Hong Chang, Domenic Forte

, Debdeep Mukhopadhyay, Ulrich Rührmair:
ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security. 3545-3547 - Ambra Demontis, Xinyun Chen, Florian Tramèr:

AISec '22: 15th ACM Workshop on Artificial Intelligence and Security. 3549-3551 - Golden G. Richard III, Tim Blazytko:

Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks. 3553-3554 - Santiago Torres-Arias, Marcela S. Melara, Laurent Simon:

SCORED '22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 3555-3556 - Mark Yampolskiy, Moti Yung:

AMSec'22: ACM CCS Workshop on Additive Manufacturing (3D Printing) Security. 3557-3558 - Fan Zhang, Patrick McCorry:

DeFi '22: ACM CCS Workshop on Decentralized Finance and Security. 3559-3560

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














