


default search action
EuroS&P 2023: Delft, Netherlands
- 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023. IEEE 2023, ISBN 978-1-6654-6512-0

- Antonio Ruggia, Andrea Possemato, Alessio Merlo, Dario Nisi, Simone Aonzo:

Android, Notify Me When It Is Time To Go Phishing. 1-17 - Jienan Liu, Pooja Pun, Phani Vadrevu

, Roberto Perdisci
:
Understanding, Measuring, and Detecting Modern Technical Support Scams. 18-38 - Wentao Chen, Fuzhou Wang

, Matthew Edwards
:
Active Countermeasures for Email Fraud. 39-55 - Vivek Nair, Dawn Song:

Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. 56-72 - Deepika Natarajan, Andrew D. Loveless, Wei Dai

, Ronald G. Dreslinski:
Chex-Mix: Combining Homomorphic Encryption with Trusted Execution Environments for Oblivious Inference in the Cloud. 73-91 - Owen Millwood, Meltem Kurt Pehlivanoglu

, Aryan Mohammadi Pasikhani
, Jack Miskelly
, Prosanta Gope, Elif Bilge Kavun:
A Generic Obfuscation Framework for Preventing ML-Attacks on Strong-PUFs through Exploitation of DRAM-PUFs. 92-106 - Vincent Cheval

, José Moreira, Mark Ryan:
Automatic verification of transparency protocols. 107-121 - Jens Ernstberger, Jan Lauinger, Fatima Elsheimy, Liyi Zhou, Sebastian Steinhorst

, Ran Canetti, Andrew Miller, Arthur Gervais, Dawn Song:
SoK: Data Sovereignty. 122-143 - Nafis Tanveer Islam

, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad:
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. 144-159 - Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:

Protecting Voice-Controllable Devices Against Self-Issued Voice Commands. 160-174 - Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot:

When the Curious Abandon Honesty: Federated Learning Is Not Private. 175-199 - Wenjie Qu, Youqi Li, Binghui Wang:

A Certified Radius-Guided Attack Framework to Image Segmentation Models. 200-220 - Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer:

SoK: Explainable Machine Learning for Computer Security Applications. 221-240 - Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot:

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation. 241-257 - Vijayanta Jain, Sepideh Ghanavati

, Sai Teja Peddinti, Collin McMillan:
Towards Fine-Grained Localization of Privacy Behaviors. 258-277 - Tim Van hamme, Giuseppe Garofalo

, Davy Preuveneers, Wouter Joosen:
Masterkey attacks against free-text keystroke dynamics and security implications of demographic factors. 278-291 - Thore Tiemann

, Sebastian Berndt, Thomas Eisenbarth
, Maciej Liskiewicz:
"Act natural!": Exchanging Private Messages on Public Blockchains. 292-308 - Ravital Solomon, Rick Weber, Ghada Almashaqbeh:

smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption. 309-331 - Jiaqi Chen, Yibo Wang

, Yuxuan Zhou, Wanning Ding, Yuzhe Tang, XiaoFeng Wang, Kai Li
:
Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild. 332-351 - Rongwu Xu, Sen Yang

, Fan Zhang
, Zhixuan Fang:
MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments. 352-372 - Enze Liu

, Gautam Akiwate
, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage:
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy. 373-391 - Yoshimasa Akimoto, Kazuto Fukuchi, Youhei Akimoto, Jun Sakuma:

Privformer: Privacy-preserving Transformer with MPC. 392-410 - Mengxia Ren, Chuan Yue:

Coverage and Secure Use Analysis of Content Security Policies via Clustering. 411-428 - Andreas Erwig, Sebastian Faust, Siavash Riahi, Tobias Stöckert:

CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs. 429-448 - Michael Rodler

, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi:
EF↯CF: High Performance Smart Contract Fuzzing for Exploit Generation. 449-471 - Arslan Khan, Muqi Zou, Kyungtae Kim, Dongyan Xu, Antonio Bianchi, Dave Jing Tian:

Fuzzing SGX Enclaves via Host Program Mutations. 472-488 - Trevor Dunlap, Seaver Thorn, William Enck

, Bradley Reaves:
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. 489-505 - Sahil Suneja, Yufan Zhuang, Yunhui Zheng, Jim Laredo, Alessandro Morari, Udayan Khurana:

Code Vulnerability Detection via Signal-Aware Learning. 506-523 - Tom Ganz, Philipp Rall, Martin Härterich, Konrad Rieck:

Hunting for Truth: Analyzing Explanation Methods in Learning-based Vulnerability Discovery. 524-541 - Rhys Miller, Ioana Boureanu

, Stephan Wesemeyer, Zhili Sun
, Hemant Zope:
Systematic Improvement of Access-Stratum Security in Mobile Networks. 542-557 - Jonas Bushart, Christian Rossow:

Anomaly-based Filtering of Application-Layer DDoS Against DNS Authoritatives. 558-575 - Marcin Nawrocki, John Kristoff

, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt
, Matthias Wählisch
:
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. 576-591 - Giovanni Apruzzese

, Pavel Laskov, Johannes Schneider:
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection. 592-614 - Andrea Agiollo, Enkeleda Bardhi

, Mauro Conti
, Riccardo Lazzeretti, Eleonora Losiouk
, Andrea Omicini:
GNN4IFA: Interest Flooding Attack Detection With Graph Neural Networks. 615-630 - Nadja Ramhöj Holtryd, Madhavan Manivannan, Per Stenström:

SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations. 631-650 - Marton Bognar

, Hans Winderix
, Jo Van Bulck
, Frank Piessens:
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling. 651-670 - Alyssa Milburn, Ke Sun, Henrique Kawakami:

You Cannot Always Win the Race: Analyzing mitigations for branch target prediction attacks. 671-686 - Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:

Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. 687-706 - Daniel De Almeida Braga

, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque
, Karthikeyan Bhargavan:
From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake. 707-723 - Aydin Abadi

, Steven J. Murdoch
, Thomas Zacharias
:
Recurring Contingent Service Payment. 724-756 - Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji:

SIM: Secure Interval Membership Testing and Applications to Secure Comparison. 757-772 - Felix Günther, Marc Ilunga Tshibumbu Mukendi:

Careful with MAc-then-SIGn: A Computational Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol. 773-796 - Congyu Fang, Hengrui Jia, Anvith Thudi, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Varun Chandrasekaran, Nicolas Papernot:

Proof-of-Learning is Currently More Broken Than You Think. 797-816 - Stijn Pletinckx

, Thanh-Dat Nguyen, Tobias Fiebig
, Christopher Kruegel, Giovanni Vigna:
Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance. 817-831 - José Miguel Moreno

, Narseo Vallina-Rodriguez
, Juan Tapiador:
Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. 832-846 - Daniel Kirkman, Kami Vaniea

, Daniel W. Woods:
DarkDialogs: Automated detection of 10 dark patterns on cookie dialogs. 847-867 - Mohit Singhal, Chen Ling, Pujan Paudel, Poojitha Thota, Nihal Kumarswamy, Gianluca Stringhini, Shirin Nilizadeh:

SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice. 868-895 - Jack P. K. Ma

, Sherman S. M. Chow
:
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). 896-912 - Pantelina Ioannou, Elias Athanasopoulos:

Been Here Already? Detecting Synchronized Browsers in the Wild. 913-927 - Nick Frymann, Daniel Gardham, Mark Manulis

:
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices. 928-941 - Theo von Arx

, Muoi Tran, Laurent Vanbever:
Revelio: A Network-Level Privacy Attack in the Lightning Network. 942-957 - Debadrita Talapatra, Sikhar Patranabis, Debdeep Mukhopadhyay:

Conjunctive Searchable Symmetric Encryption from Hard Lattices. 958-978 - John Henry Castellanos, Mohamed Maghenem, Alvaro A. Cárdenas

, Ricardo G. Sanfelice, Jianying Zhou:
Provable Adversarial Safety in Cyber-Physical Systems. 979-1012 - Anrin Chakraborti, Michael K. Reiter:

Privately Evaluating Region Overlaps with Applications to Collaborative Sensor Output Validation. 1013-1029 - Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian

, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. 1030-1046 - Muhammad Ibrahim, Andrea Continella

, Antonio Bianchi:
AoT - Attack on Things: A security analysis of IoT firmware updates. 1047-1064 - Lennart Bader, Martin Serror, Olav Lamberts

, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze
:
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. 1065-1081 - Yuan Xu

, Xingshuo Han, Gelei Deng, Jiwei Li, Yang Liu
, Tianwei Zhang:
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View. 1082-1100 - Darion Cassel, Wai Tuck Wong, Limin Jia

:
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. 1101-1127 - Hans Niklas Jacob, Christian Werling, Robert Buhren, Jean-Pierre Seifert:

faulTPM: Exposing AMD fTPMs' Deepest Secrets. 1128-1142 - Thomas Van Strydonck, Job Noorman, Jennifer Jackson, Leonardo Alves Dias, Robin Vanderstraeten, David F. Oswald

, Frank Piessens, Dominique Devriese
:
CHERI-TrEE: Flexible enclaves on capability machines. 1143-1159 - Muhammad Ahsan, Muhammad Haris Rais, Irfan Ahmed

:
SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities. 1160-1178 - Jing Xu

, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. 1179-1197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














