


default search action
EuroS&P 2022: Genoa, Italy
- 7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022. IEEE 2022, ISBN 978-1-6654-1614-6

- Kristen Moore

, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey:
Modelling direct messaging networks with multiple recipients for cyber deception. 1-19 - Giovanni Apruzzese

, Pavel Laskov, Aliya Tastemirova:
SoK: The Impact of Unlabelled Data in Cyberthreat Detection. 20-42 - Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:

SIERRA: Ranking Anomalous Activities in Enterprise Networks. 44-59 - Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert:

Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection. 60-73 - Haoyu He, Yuede Ji, H. Howie Huang

:
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. 74-89 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider

, Amos Treiber, Michael Yonli:
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. 90-108 - Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery:

EZEE: Epoch Parallel Zero Knowledge for ANSI C. 109-123 - Ghada Almashaqbeh, Ravital Solomon:

SoK: Privacy-Preserving Computing in the Blockchain Era. 124-139 - Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:

CostCO: An automatic cost modeling framework for secure multi-party computation. 140-153 - Kenneth G. Paterson, Mathilde Raynal:

HyperLogLog: Exponentially Bad in Adversarial Settings. 154-170 - Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu:

Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers. 171-187 - Deliang Chang, Joann Qiongna Chen, Zhou Li

, Xing Li:
Hide and Seek: Revisiting DNS-based User Tracking. 188-205 - Steven Sprecher, Christoph Kerschbaumer, Engin Kirda:

SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. 206-222 - Antreas Dionysiou

, Elias Athanasopoulos:
Lethe: Practical Data Breach Detection with Zero Persistent Secret State. 223-235 - David Klein

, Thomas Barber
, Souphiane Bensalim, Ben Stock
, Martin Johns
:
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions. 236-250 - Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps:

Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. 251-269 - Mert Side, Fan Yao, Zhenkai Zhang:

LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit. 270-285 - Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti:

Fuzzing with Data Dependency Information. 286-302 - Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot:

Unrolling SGD: Understanding Factors Influencing Machine Unlearning. 303-319 - Verena Battis, Alexander Penner:

Transformer-based Extraction of Deep Image Models. 320-336 - Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah:

DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices. 337-355 - Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang

:
Towards Fair and Robust Classification. 356-376 - Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic:

WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch. 377-391 - Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. 392-409 - Mathias Humbert, Didier Dupertuis, Mauro Cherubini

, Kévin Huguenin
:
KGP Meter: Communicating Kin Genomic Privacy to the Masses. 410-429 - Md. Imran Hossen

, Xiali Hei
:
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA. 430-447 - Amir M. Ahmadian

, Musard Balliu:
Dynamic Policies Revisited. 448-466 - McKenna McCall

, Abhishek Bichhawat, Limin Jia
:
Compositional Information Flow Monitoring for Reactive Programs. 467-486 - Jason Liu, Anant Kandikuppa, Adam Bates

:
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control. 487-501 - Lukas Bernhard, Michael Rodler

, Thorsten Holz, Lucas Davi:
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. 502-519 - Jiameng Shi, Le Guan, Wenqiang Li

, Dayou Zhang, Ping Chen, Ning Zhang:
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers. 520-536 - Payton Walker, Nitesh Saxena:

Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. 537-554 - Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci

:
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations. 555-571 - Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:

SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. 572-586 - Dandan Yuan, Shujie Cui, Giovanni Russello:

We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. 587-605 - Yacov Manevich, Adi Akavia:

Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments. 606-625 - Sílvia Casacuberta, Julia Hesse

, Anja Lehmann:
SoK: Oblivious Pseudorandom Functions. 625-646 - Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont

, Berk Sunar:
Signature Correction Attack on Dilithium Signature Scheme. 647-663 - Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash

:
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems. 664-683 - Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:

TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. 684-702 - Ahmed Salem, Rui Wen

, Michael Backes, Shiqing Ma, Yang Zhang
:
Dynamic Backdoor Attacks Against Machine Learning Models. 703-718 - Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet

, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. 719-735

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














