default search action
EuroS&P 2022: Genoa, Italy
- 7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022. IEEE 2022, ISBN 978-1-6654-1614-6
- Kristen Moore, Cody James Christopher, David Liebowitz, Surya Nepal, Renee Selvey:
Modelling direct messaging networks with multiple recipients for cyber deception. 1-19 - Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova:
SoK: The Impact of Unlabelled Data in Cyberthreat Detection. 20-42 - Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:
SIERRA: Ranking Anomalous Activities in Enterprise Networks. 44-59 - Victor Cochard, Damian Pfammatter, Chi Thang Duong, Mathias Humbert:
Investigating Graph Embedding Methods for Cross-Platform Binary Code Similarity Detection. 60-73 - Haoyu He, Yuede Ji, H. Howie Huang:
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. 74-89 - Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. 90-108 - Yibin Yang, David Heath, Vladimir Kolesnikov, David Devecsery:
EZEE: Epoch Parallel Zero Knowledge for ANSI C. 109-123 - Ghada Almashaqbeh, Ravital Solomon:
SoK: Privacy-Preserving Computing in the Blockchain Era. 124-139 - Vivian Fang, Lloyd Brown, William Lin, Wenting Zheng, Aurojit Panda, Raluca Ada Popa:
CostCO: An automatic cost modeling framework for secure multi-party computation. 140-153 - Kenneth G. Paterson, Mathilde Raynal:
HyperLogLog: Exponentially Bad in Adversarial Settings. 154-170 - Huikai Xu, Miao Yu, Yanhao Wang, Yue Liu, Qinsheng Hou, Zhenbang Ma, Haixin Duan, Jianwei Zhuge, Baojun Liu:
Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers. 171-187 - Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li:
Hide and Seek: Revisiting DNS-based User Tracking. 188-205 - Steven Sprecher, Christoph Kerschbaumer, Engin Kirda:
SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward. 206-222 - Antreas Dionysiou, Elias Athanasopoulos:
Lethe: Practical Data Breach Detection with Zero Persistent Secret State. 223-235 - David Klein, Thomas Barber, Souphiane Bensalim, Ben Stock, Martin Johns:
Hand Sanitizers in the Wild: A Large-scale Study of Custom JavaScript Sanitizer Functions. 236-250 - Mohannad Alhanahnah, Rithik Jain, Vaibhav Rastogi, Somesh Jha, Thomas W. Reps:
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization. 251-269 - Mert Side, Fan Yao, Zhenkai Zhang:
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit. 270-285 - Alessandro Mantovani, Andrea Fioraldi, Davide Balzarotti:
Fuzzing with Data Dependency Information. 286-302 - Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot:
Unrolling SGD: Understanding Factors Influencing Machine Unlearning. 303-319 - Verena Battis, Alexander Penner:
Transformer-based Extraction of Deep Image Models. 320-336 - Kartik Patwari, Syed Mahbub Hafiz, Han Wang, Houman Homayoun, Zubair Shafiq, Chen-Nee Chuah:
DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices. 337-355 - Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang:
Towards Fair and Robust Classification. 356-376 - Jack Sturgess, Simon Eberz, Ivo Sluganovic, Ivan Martinovic:
WatchAuth: User Authentication and Intent Recognition in Mobile Payments using a Smartwatch. 377-391 - Elsa Turcios Rodriguez, Max Fukkink, Simon Parkin, Michel van Eeten, Carlos Gañán:
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware. 392-409 - Mathias Humbert, Didier Dupertuis, Mauro Cherubini, Kévin Huguenin:
KGP Meter: Communicating Kin Genomic Privacy to the Masses. 410-429 - Md. Imran Hossen, Xiali Hei:
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA. 430-447 - Amir M. Ahmadian, Musard Balliu:
Dynamic Policies Revisited. 448-466 - McKenna McCall, Abhishek Bichhawat, Limin Jia:
Compositional Information Flow Monitoring for Reactive Programs. 467-486 - Jason Liu, Anant Kandikuppa, Adam Bates:
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control. 487-501 - Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi:
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. 502-519 - Jiameng Shi, Le Guan, Wenqiang Li, Dayou Zhang, Ping Chen, Ning Zhang:
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers. 520-536 - Payton Walker, Nitesh Saxena:
Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space. 537-554 - Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci:
SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations. 555-571 - Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. 572-586 - Dandan Yuan, Shujie Cui, Giovanni Russello:
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. 587-605 - Yacov Manevich, Adi Akavia:
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments. 606-625 - Sílvia Casacuberta, Julia Hesse, Anja Lehmann:
SoK: Oblivious Pseudorandom Functions. 625-646 - Saad Islam, Koksal Mus, Richa Singh, Patrick Schaumont, Berk Sunar:
Signature Correction Attack on Dilithium Signature Scheme. 647-663 - Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash:
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems. 664-683 - Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. 684-702 - Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. 703-718 - Ilias Tsingenopoulos, Davy Preuveneers, Lieven Desmet, Wouter Joosen:
Captcha me if you can: Imitation Games with Reinforcement Learning. 719-735
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.