default search action
30th CCS 2023: Copenhagen, Denmark
- Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023
Session 1: Cryptography for Anonymity
- Alexander Bienstock, Paul Rösler, Yi Tang:
ASMesh: Anonymous and Secure Messaging in Mesh Networks Using Stronger, Anonymous Double Ratchet. 1-15 - Ward Beullens, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal. 16-29 - Omid Mir, Balthazar Bauer, Scott Griffy, Anna Lysyanskaya, Daniel Slamanig:
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials. 30-44 - Julia Kastner, Julian Loss, Omar Renawi:
Concurrent Security of Anonymous Credentials Light, Revisited. 45-59
Session 2: Machine Learning Applications I
- Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. 60-74 - Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen:
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. 75-89 - Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. 90-104 - Francesco Marchiori, Mauro Conti:
Your Battery Is a Blast! Safeguarding Against Counterfeit Batteries with Authentication. 105-119
Session 3: Attacks & Threats
- Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. 120-134 - Aviv Yaish, Gilad Stern, Aviv Zohar:
Uncle Maker: (Time)Stamping Out The Competition in Ethereum. 135-149 - Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. 150-164 - Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. 165-179
Session 4: Usable Privacy
- Tinhinane Medjkoune, Oana Goga, Juliette Senechal:
Marketing to Children Through Online Targeted Advertising: Targeting Mechanisms and Legal Aspects. 180-194 - Maryam Mustafa, Abdul Moeed Asad, Shehrbano Hassan, Urooj Haider, Zainab Durrani, Katharina Krombholz:
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space. 195-209 - Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: Towards Informed Consent for Private Computation. 210-224 - Emiram Kablo, Patricia Arias Cabarcos:
Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. 225-238
Session 5: Side-Channels
- Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, Jun Luo:
Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping. 239-252 - Tao Ni, Xiaokuan Zhang, Qingchuan Zhao:
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel. 253-267 - Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. 268-280 - Zihao Wang, Jiale Guan, XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Fahad S. Alharbi:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. 281-295
Session 6: Cryptography & DNS
- Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. 296-310 - Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. 311-325 - Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. 326-340 - Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. 341-355
Session 7: Digital Signatures
- Sourav Das, Philippe Camacho, Zhuolun Xiang, Javier Nieto, Benedikt Bünz, Ling Ren:
Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold. 356-370 - Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik:
Post Quantum Fuzzy Stealth Signatures and Applications. 371-385 - Nils Fleischhacker, Gottfried Herold, Mark Simkin, Zhenfei Zhang:
Chipmunk: Better Synchronized Multi-Signatures from Lattices. 386-400 - Seongkwang Kim, Jincheol Ha, Mincheol Son, ByeongHak Lee, Dukjae Moon, Joohee Lee, Sangyub Lee, Jihoon Kwon, Jihoon Cho, Hyojin Yoon, Jooyoung Lee:
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security. 401-415
Session 8: Machine Learning Applications II
- Yiling He, Jian Lou, Zhan Qin, Kui Ren:
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis. 416-430 - Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li:
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing. 431-445 - Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. 446-459 - Zhiyuan Yu, Shixuan Zhai, Ning Zhang:
AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis. 460-474
Session 9: Consensus Protocols
- Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. 475-489 - Dahlia Malkhi, Atsuki Momose, Ling Ren:
Towards Practical Sleepy BFT. 490-503 - Xiaohai Dai, Bolin Zhang, Hai Jin, Ling Ren:
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path. 504-518 - Erica Blum, Jonathan Katz, Julian Loss, Kartik Nayak, Simon Ochsenreither:
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus. 519-533
Session 10: Language-Based Security
- Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, Zhong Shao:
Ou: Automating the Parallelization of Zero-Knowledge Protocols. 534-548 - Benjamin Eriksson, Amanda Stjerna, Riccardo De Masellis, Philipp Rümmer, Andrei Sabelfeld:
Black Ostrich: Web Application Scanning with String Solvers. 549-563 - Théophile Wallez, Jonathan Protzenko, Karthikeyan Bhargavan:
Comparse: Provably Secure Formats for Cryptographic Protocols. 564-578
Session 11: Quantum & Space
- Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. 579-593 - Chuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. 594-607 - Joshua Smailes, Sebastian Köhler, Simon Birnbach, Martin Strohmeier, Ivan Martinovic:
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting. 608-621 - Kyungho Joo, Dong Hoon Lee, Yeonseon Jeong, Wonsuk Choi:
Protecting HRP UWB Ranging System Against Distance Reduction Attacks. 622-635
Session 12: IoT: Attacks, Vulnerabilities, & Everything
- Daniele Antonioli:
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses. 636-650 - Yan He, Qiuye He, Song Fang, Yao Liu:
When Free Tier Becomes Free to Enter: A Non-Intrusive Way to Identify Security Cameras with no Cloud Subscription. 651-665 - Mujtahid Akon, Tianchang Yang, Yilu Dong, Syed Rafiul Hussain:
Formal Analysis of Access Control Mechanism of 5G Core Network. 666-680 - David Schmidt, Carlotta Tagliaro, Kevin Borgolte, Martina Lindorfer:
IoTFlow: Inferring IoT Device Behavior at Scale through Static Mobile Companion App Analysis. 681-695
Session 13: Homomorphic Encryption I
- Jung Hee Cheon, Wonhee Cho, Jaehyung Kim, Damien Stehlé:
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption. 696-710 - Sylvain Chatel, Christian Mouchet, Ali Utkan Sahin, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux:
PELTA - Shielding Multiparty-FHE against Malicious Adversaries. 711-725 - Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. 726-740 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede:
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption. 741-755
Session 14: Machine Learning Attacks I
- Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. 756-770 - Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia:
Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. 771-785 - Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. 786-800 - Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani Thuraisingham:
Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts. 801-814
Session 15: Cryptographic Constructs & Models
- Sisi Duan, Xin Wang, Haibin Zhang:
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. 815-829 - Erica Blum, Derek Leung, Julian Loss, Jonathan Katz, Tal Rabin:
Analyzing the Real-World Security of the Algorand Blockchain. 830-844 - Peter Gazi, Aggelos Kiayias, Alexander Russell:
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees. 845-858 - Erkan Tairi, Pedro Moreno-Sanchez, Clara Schneidewind:
LedgerLocks: A Security Framework for Blockchain Protocols Based on Adaptor Signatures. 859-873
Session 16: Defenses
- Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, Hojoon Lee:
Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. 874-888 - Martin Unterguggenberger, David Schrammel, Lukas Lamster, Pascal Nasahl, Stefan Mangard:
Cryptographically Enforced Memory Safety. 889-903 - Hanwen Lei, Ziqi Zhang, Shaokun Zhang, Peng Jiang, Zhineng Zhong, Ningyu He, Ding Li, Yao Guo, Xiangqun Chen:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. 904-918 - Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. 919-933
Session 17: Secure Hardware
- Qinhan Tan, Yonathan Fisseha, Shibo Chen, Lauren Biernacki, Jean-Baptiste Jeannin, Sharad Malik, Todd M. Austin:
Security Verification of Low-Trust Architectures. 945-959 - Zhenkai Zhang, Tyler N. Allen, Fan Yao, Xing Gao, Rong Ge:
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. 960-974 - Till Schlüter, Amit Choudhari, Lorenz Hetterich, Leon Trampert, Hamed Nemati, Ahmad Ibrahim, Michael Schwarz, Christian Rossow, Nils Ole Tippenhauer:
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers. 975-989 - Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, François-Xavier Standaert:
Combined Private Circuits - Combined Security Refurbished. 990-1004
Session 18: Traffic Analysis
- Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. 1005-1019 - Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. 1020-1034 - Alireza Bahramali, Ardavan Bozorgi, Amir Houmansadr:
Realistic Website Fingerprinting By Augmenting Network Traces. 1035-1049 - Zhaoxin Jin, Tianbo Lu, Shuang Luo, Jiaze Shang:
Transformer-based Model for Multi-tab Website Fingerprinting Attack. 1050-1064
Session 19: Advanced Public Key Encryption
- Noemi Glaeser, Dimitris Kolonelos, Giulio Malavolta, Ahmadreza Rahimi:
Efficient Registration-Based Encryption. 1065-1079 - Matthew Green, Abhishek Jain, Gijs Van Laer:
Efficient Set Membership Encryption and Applications. 1080-1092 - Rachit Garg, George Lu, Brent Waters, David J. Wu:
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory. 1093-1107 - Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. 1108-1122
Session 20: Machine Learning Attacks II
- Tejas Kannan, Nick Feamster, Henry Hoffmann:
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. 1123-1137 - Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena:
Unforgeability in Stochastic Gradient Descent. 1138-1152 - Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. 1153-1167 - Zhengyuan Jiang, Jinghuai Zhang, Neil Zhenqiang Gong:
Evading Watermark based Detection of AI-Generated Content. 1168-1181
Session 21: Defenses & Smart Contract Security
- Fuchen Ma, Yuanliang Chen, Yuanhang Zhou, Jingxuan Sun, Zhuo Su, Yu Jiang, Jiaguang Sun, Huizhong Li:
Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos. 1182-1196 - Sven Smolka, Jens-Rene Giesen, Pascal Winkler, Oussama Draissi, Lucas Davi, Ghassan Karame, Klaus Pohl:
Fuzz on the Beach: Fuzzing Solana Smart Contracts. 1197-1211 - Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. 1212-1226 - Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. 1227-1241
Session 22: Fuzzing I
- Yinxi Liu, Wei Meng:
DSFuzz: Detecting Deep State Bugs with Dependent State Exploration. 1242-1256 - Yunhang Zhang, Chengbin Pang, Stefan Nagy, Xun Chen, Jun Xu:
Profile-guided System Optimizations for Accelerated Greybox Fuzzing. 1257-1271 - Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. 1272-1286 - Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. 1287-1301
Session 23: IoT & Embedded Security
- Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. 1302-1316 - Yi Zhu, Chenglin Miao, Hongfei Xue, Zhengxiong Li, Yunnan Yu, Wenyao Xu, Lu Su, Chunming Qiao:
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving. 1317-1331 - Xi Tan, Ziming Zhao:
SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems. 1332-1346 - Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. 1347-1361
Session 24: Formal Analysis of Cryptographic Protocols
- Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. 1362-1376 - Linard Arquint, Malte Schwerhoff, Vaibhav Mehta, Peter Müller:
A Generic Methodology for the Modular Verification of Security Protocol Implementations. 1377-1391 - Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov:
Provably Unlinkable Smart Card-based Payments. 1392-1406 - Lea Salome Brugger, Laura Kovács, Anja Petkovic Komel, Sophie Rain, Michael Rawson:
CheckMate: Automated Game-Theoretic Security Reasoning. 1407-1421
Session 25: Zero Knowledge Proofs
- Alexandre Belling, Azam Soleimanian, Olivier Bégassat:
Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification. 1422-1436 - David Balbás, Dario Fiore, María Isabel González Vasco, Damien Robissout, Claudio Soriente:
Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing. 1437-1451 - Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam:
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK. 1452-1466 - Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. 1467-1481
Session 26: Federated Learning
- Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. 1482-1495 - Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. 1496-1510 - Chulin Xie, Yunhui Long, Pin-Yu Chen, Qinbin Li, Sanmi Koyejo, Bo Li:
Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks. 1511-1525 - Torsten Krauß, Alexandra Dmitrienko:
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. 1526-1540
Session 27: Interoperability & 2nd Layer Solutions
- Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. 1541-1555 - Andrei Tonkikh, Pavel Ponomarev, Petr Kuznetsov, Yvonne-Anne Pignolet:
CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared Accounts. 1556-1570 - Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath:
TrustBoost: Boosting Trust among Interoperable Blockchains. 1571-1584 - Ertem Nusret Tas, Runchao Han, David Tse, Mingchao Yu:
Interchain Timestamping for Mesh Security. 1585-1599
Session 28: Fuzzing II
- Peng Chen, Yuxuan Xie, Yunlong Lyu, Yuxiao Wang, Hao Chen:
Hopper: Interpretative Fuzzing for Libraries. 1600-1614 - Ruijie Meng, George Pîrlea, Abhik Roychoudhury, Ilya Sergey:
Greybox Fuzzing of Distributed Systems. 1615-1629 - Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang:
SyzDirect: Directed Greybox Fuzzing for Linux Kernel. 1630-1644 - Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. 1645-1659