Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis (English)
- New search for: She, Dongdong
- New search for: Shah, Abhishek
- New search for: Jana, Suman
- New search for: She, Dongdong
- New search for: Shah, Abhishek
- New search for: Jana, Suman
In:
2022 IEEE Symposium on Security and Privacy (SP)
;
2194-2211
;
2022
-
ISBN:
-
ISSN:
- Conference paper / Electronic Resource
-
Title:Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
-
Contributors:
-
Published in:2022 IEEE Symposium on Security and Privacy (SP) ; 2194-2211
-
Publisher:
- New search for: IEEE
-
Publication date:2022-05-01
-
Size:717463 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
PATA: Fuzzing with Path Aware Taint AnalysisLiang, Jie / Wang, Mingzhe / Zhou, Chijin / Wu, Zhiyong / Jiang, Yu / Liu, Jianzhong / Liu, Zhe / Sun, Jiaguang et al. | 2022
- 1
-
Title Page i| 2022
- 3
-
Title Page iii| 2022
- 4
-
Copyright Page| 2022
- 5
-
Table of Contents| 2022
- 6
-
Message from the Program Chairs| 2022
- 7
-
Organizing Committee| 2022
- 18
-
JIGSAW: Efficient and Scalable Path Constraints FuzzingChen, Ju / Wang, Jinghan / Song, Chengyu / Yin, Heng et al. | 2022
- 36
-
BEACON: Directed Grey-Box Fuzzing with Provable Path PruningHuang, Heqing / Guo, Yiyuan / Shi, Qingkai / Yao, Peisen / Wu, Rongxin / Zhang, Charles et al. | 2022
- 51
-
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification DocumentsPacheco, Maria Leonor / Hippel, Max von / Weintraub, Ben / Goldwasser, Dan / Nita-Rotaru, Cristina et al. | 2022
- 69
-
ProVerif with Lemmas, Induction, Fast Subsumption, and Much MoreBlanchet, Bruno / Cheval, Vincent / Cortier, Veronique et al. | 2022
- 87
-
Four Attacks and a Proof for TelegramAlbrecht, Martin R. / Marekova, Lenka / Paterson, Kenneth G. / Stepanovs, Igors et al. | 2022
- 107
-
Noise*: A Library of Verified High-Performance Secure Channel Protocol ImplementationsHo, Son / Protzenko, Jonathan / Bichhawat, Abhishek / Bhargavan, Karthikeyan et al. | 2022
- 125
-
A Logic and an Interactive Prover for the Computational Post-Quantum Security of ProtocolsCremers, Cas / Fontaine, Caroline / Jacomme, Charlie et al. | 2022
- 142
-
IronMask: Versatile Verification of Masking SecurityBelaid, Sonia / Mercadier, Darius / Rivain, Matthieu / Taleb, Abdul Rahman et al. | 2022
- 161
-
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in SecondsBose, Priyanka / Das, Dipanjan / Chen, Yanju / Feng, Yu / Kruegel, Christopher / Vigna, Giovanni et al. | 2022
- 179
-
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge ProofsSteffen, Samuel / Bichsel, Benjamin / Baumgartner, Roger / Vechev, Martin et al. | 2022
- 198
-
Quantifying Blockchain Extractable Value: How dark is the forest?Qin, Kaihua / Zhou, Liyi / Gervais, Arthur et al. | 2022
- 215
-
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and VerificationDo, Quoc Huy / Hosseyni, Pedram / Kusters, Ralf / Schmitz, Guido / Wenzler, Nils / Wurtele, Tim et al. | 2022
- 235
-
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution AttacksPonce-de-Leon, Hernan / Kinder, Johannes et al. | 2022
- 249
-
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent SystemsAbdallah, Mustafa / Woods, Daniel / Naghizadeh, Parinaz / Khalil, Issa / Cason, Timothy / Sundaram, Shreyas / Bagchi, Saurabh et al. | 2022
- 267
-
SoK: Authentication in Augmented and Virtual RealityStephenson, Sophie / Pal, Bijeeta / Fan, Stephen / Fernandes, Earlence / Zhao, Yuhang / Chatterjee, Rahul et al. | 2022
- 285
-
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference AttacksChi, Haotian / Fu, Chenglong / Zeng, Qiang / Du, Xiaojiang et al. | 2022
- 303
-
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart HomesJin, Haojian / Liu, Gram / Hwang, David / Kumar, Swarun / Agarwal, Yuvraj / Hong, Jason I. et al. | 2022
- 321
-
vSGX: Virtualizing SGX Enclaves on AMD SEVZhao, Shixuan / Li, Mengyuan / Zhangyz, Yinqian / Lin, Zhiqiang et al. | 2022
- 337
-
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNPLi, Mengyuan / Wilke, Luca / Wichelmann, Jan / Eisenbarth, Thomas / Teodorescu, Radu / Zhang, Yinqian et al. | 2022
- 352
-
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZoneWang, Jinwen / Li, Ao / Li, Haoran / Lu, Chenyang / Zhang, Ning et al. | 2022
- 370
-
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative VulnerabilitiesXia, Hongyan / Zhang, David / Liu, Wei / Haller, Istvan / Sherwin, Bruce / Chisnall, David et al. | 2022
- 386
-
Smile: Secure Memory Introspection for Live EnclaveZhou, Lei / Ding, Xuhua / Zhang, Fengwei et al. | 2022
- 402
-
Statistical Quantification of Differential Privacy: A Local ApproachAskin, Onder / Kutta, Tim / Dette, Holger et al. | 2022
- 422
-
Locally Differentially Private Sparse Vector AggregationZhou, Mingxun / Wang, Tianhao / Chan, T-H. Hubert / Fanti, Giulia / Shi, Elaine et al. | 2022
- 440
-
Differentially Private Histograms in the Shuffle Model from Fake UsersCheu, Albert / Zhilyaev, Maxim et al. | 2022
- 457
-
Differential Privacy and Swapping: Examining De-Identification’s Impact on Minority Representation and Privacy Preservation in the U.S. CensusChrist, Miranda / Radway, Sarah / Bellovin, Steven M. et al. | 2022
- 473
-
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy SystemsJin, Jiankai / McMurtry, Eleanor / Rubinstein, Benjamin I. P. / Ohrimenko, Olga et al. | 2022
- 489
-
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit RecordsZengy, Jun / Wang, Xiang / Liu, Jiahao / Chen, Yinfang / Liang, Zhenkai / Chua, Tat-Seng / Chua, Zheng Leong et al. | 2022
- 507
-
SIRAJ: A Unified Framework for Aggregation of Malicious Entity DetectorsThirumuruganathan, Saravanan / Nabeel, Mohamed / Choo, Euijin / Khalil, Issa / Yu, Ting et al. | 2022
- 522
-
DEEPCASE: Semi-Supervised Contextual Analysis of Security EventsEde, Thijs van / Aghakhani, Hojjat / Spahn, Noah / Bortolameotti, Riccardo / Cova, Marco / Continella, Andrea / Steen, Maarten van / Peter, Andreas / Kruegel, Christopher / Vigna, Giovanni et al. | 2022
- 540
-
DEPCOMM: Graph Summarization on System Audit Logs for Attack InvestigationXu, Zhiqiang / Fang, Pengcheng / Liu, Changlin / Xiao, Xusheng / Wen, Yu / Meng, Dan et al. | 2022
- 558
-
Measuring and Mitigating the Risk of IP Reuse on Public CloudsPauley, Eric / Sheatsley, Ryan / Hoak, Blaine / Burke, Quinn / Beugin, Yohan / McDaniel, Patrick et al. | 2022
- 576
-
SecFloat: Accurate Floating-Point meets Secure 2-Party ComputationRathee, Deevashwer / Bhattacharya, Anwesh / Sharma, Rahul / Gupta, Divya / Chandran, Nishanth / Rastogi, Aseem et al. | 2022
- 596
-
Multi-Server Verifiable Computation of Low-Degree PolynomialsZhang, Liang Feng / Wang, Huaxiong et al. | 2022
- 614
-
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection TechniquesAmi, Amit Seal / Cooper, Nathan / Kafle, Kaushal / Moran, Kevin / Poshyvanyk, Denys / Nadkarni, Adwait et al. | 2022
- 632
-
“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing AttacksJancar, Jan / Fourne, Marcel / Braga, Daniel De Almeida / Sabt, Mohamed / Schwabe, Peter / Barthe, Gilles / Fouque, Pierre-Alain / Acar, Yasemin et al. | 2022
- 650
-
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPKJin, Xuancheng / Xiao, Xuangan / Jia, Songlin / Gao, Wang / Gu, Dawu / Zhang, Hang / Ma, Siqi / Qian, Zhiyun / Li, Juanru et al. | 2022
- 666
-
SoK: Practical Foundations for Software Spectre DefensesCauligi, Sunjay / Disselkoen, Craig / Moghimi, Daniel / Barthe, Gilles / Stefan, Deian et al. | 2022
- 681
-
SpecHammer: Combining Spectre and Rowhammer for New Speculative AttacksTobah, Youssef / Kwong, Andrew / Kang, Ingab / Genkin, Daniel / Shin, Kang G. et al. | 2022
- 699
-
Spook.js: Attacking Chrome Strict Site Isolation via Speculative ExecutionAgarwal, Ayush / O'Connell, Sioli / Kim, Jason / Yehezkel, Shaked / Genkin, Daniel / Ronen, Eyal / Yarom, Yuval et al. | 2022
- 716
-
BLACKSMITH: Scalable Rowhammering in the Frequency DomainJattke, Patrick / Van Der Veen, Victor / Frigo, Pietro / Gunter, Stijn / Razavi, Kaveh et al. | 2022
- 735
-
ProTRR: Principled yet Optimal In-DRAM Target Row RefreshMarazzi, Michele / Jattke, Patrick / Solt, Flavien / Razavi, Kaveh et al. | 2022
- 754
-
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code ContributionsPearce, Hammond / Ahmad, Baleegh / Tan, Benjamin / Dolan-Gavitt, Brendan / Karri, Ramesh et al. | 2022
- 769
-
Spinning Language Models: Risks of Propaganda-As-A-Service and CountermeasuresBagdasaryan, Eugene / Shmatikov, Vitaly et al. | 2022
- 787
-
SoK: How Robust is Image Classification Deep Neural Network Watermarking?Lukas, Nils / Jiang, Edward / Li, Xinda / Kerschbaum, Florian et al. | 2022
- 805
-
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept DriftBarbero, Federico / Pendlebury, Feargus / Pierazzi, Fabio / Cavallaro, Lorenzo et al. | 2022
- 824
-
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning ModelsChen, Jialuo / Wang, Jingyi / Peng, Tinglan / Sun, Youcheng / Cheng, Peng / Ji, Shouling / Ma, Xingjun / Li, Bo / Song, Dawn et al. | 2022
- 842
-
Phishing in Organizations: Findings from a Large-Scale and Long-Term StudyLain, Daniele / Kostiainen, Kari / Capkun, Srdjan et al. | 2022
- 860
-
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire UniversityStransky, Christian / Wiese, Oliver / Roth, Volker / Acar, Yasemin / Fahl, Sascha et al. | 2022
- 876
-
Investigating Influencer VPN Ads on YouTubeAkgul, Omer / Roberts, Richard / Namara, Moses / Levin, Dave / Mazurek, Michelle L. et al. | 2022
- 893
-
How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview StudyGutfleisch, Marco / Klemmer, Jan H. / Busch, Niklas / Acar, Yasemin / Sasse, M. Angela / Fahl, Sascha et al. | 2022
- 911
-
Private Approximate Nearest Neighbor Search with Sublinear CommunicationServan-Schreiber, Sacha / Langowski, Simon / Devadas, Srinivas et al. | 2022
- 930
-
SPIRAL: Fast, High-Rate Single-Server PIR via FHE CompositionMenon, Samir Jordan / Wu, David J. et al. | 2022
- 948
-
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate ProofsRosenberg, Michael / Maller, Mary / Miers, Ian et al. | 2022
- 966
-
How to Attack and Generate HoneywordsWang, Ding / Zou, Yunkai / Dong, Qiying / Song, Yuanming / Huang, Xinyi et al. | 2022
- 984
-
WIGHT: Wired Ghost Touch Attack on Capacitive TouchscreensJiang, Yan / Ji, Xiaoyu / Wang, Kai / Yan, Chen / Mitev, Richard / Sadeghi, Ahmad-Reza / Xu, Wenyuan et al. | 2022
- 1002
-
Time-Print: Authenticating USB Flash Drives with Novel Timing FingerprintsCronin, Patrick / Gao, Xing / Wang, Haining / Cotton, Chase et al. | 2022
- 1018
-
Device Fingerprinting with Peripheral TimestampsMonaco, John V. et al. | 2022
- 1034
-
PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact ResponseHuang, Long / Wang, Chen et al. | 2022
- 1049
-
Mitigating Information Leakage Vulnerabilities with Type-based Data IsolationMilburn, Alyssa / Van Der Kouwe, Erik / Giuffrida, Cristiano et al. | 2022
- 1066
-
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 MacrosRuaro, Nicola / Pagani, Fabio / Ortolani, Stefano / Kruegel, Christopher / Vigna, Giovanni et al. | 2022
- 1082
-
HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware ImagesGritti, Fabio / Pagani, Fabio / Grishchenko, Ilya / Dresel, Lukas / Redini, Nilo / Kruegel, Christopher / Vigna, Giovanni et al. | 2022
- 1100
-
SoK: Demystifying Binary Lifters Through the Lens of Downstream ApplicationsLiu, Zhibo / Yuan, Yuanyuan / Wang, Shuai / Bao, Yuyan et al. | 2022
- 1120
-
Property Inference from PoisoningMahloujifar, Saeed / Ghosh, Esha / Chase, Melissa et al. | 2022
- 1138
-
Reconstructing Training Data with Informed AdversariesBalle, Borja / Cherubin, Giovanni / Hayes, Jamie et al. | 2022
- 1157
-
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in MemoriesRakin, Adnan Siraj / Chowdhuryy, Md Hafizul Islam / Yao, Fan / Fan, Deliang et al. | 2022
- 1175
-
Model Stealing Attacks Against Inductive Graph Neural NetworksShen, Yun / He, Xinlei / Han, Yufei / Zhang, Yang et al. | 2022
- 1193
-
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission SecurityCamurati, Giovanni / Francillon, Aurelien et al. | 2022
- 1211
-
mmSpy: Spying Phone Calls using mmWave RadarsBasak, Suryoday / Gowda, Mahanth et al. | 2022
- 1229
-
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege EscalationClassen, Jiska / Gringoli, Francesco / Hermann, Michael / Hollick, Matthias et al. | 2022
- 1246
-
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic DevicesShan, Haoqi / Zhang, Boyi / Zhan, Zihao / Sullivan, Dean / Wang, Shuo / Jin, Yier et al. | 2022
- 1263
-
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in BlockchainsHou, Ruomu / Yu, Haifeng / Saxena, Prateek et al. | 2022
- 1281
-
MatRiCT+: More Efficient Post-Quantum Private Blockchain PaymentsEsgin, Muhammed F. / Steinfeld, Ron / Zhao, Raymond K. et al. | 2022
- 1299
-
Universal Atomic Swaps: Secure Exchange of Coins Across All BlockchainsThyagarajan, Sri AravindaKrishnan / Malavolta, Giulio / Moreno-Sanchez, Pedro et al. | 2022
- 1317
-
Foundations of Dynamic BFTDuan, Sisi / Zhang, Haibin et al. | 2022
- 1335
-
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT ServicesVassantlal, Robin / Alchieri, Eduardo / Ferreira, Bernardo / Bessani, Alysson et al. | 2022
- 1354
-
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated LearningShejwalkar, Virat / Houmansadr, Amir / Kairouz, Peter / Ramage, Daniel et al. | 2022
- 1372
-
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better SecurityTao, Guanhong / Liu, Yingqi / Shen, Guangyu / Xu, Qiuling / An, Shengwei / Zhang, Zhuo / Zhang, Xiangyu et al. | 2022
- 1390
-
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition SystemsXie, Shangyu / Wang, Han / Kong, Yu / Hong, Yuan et al. | 2022
- 1408
-
“Adversarial Examples” for Proof-of-LearningZhang, Rui / Liu, Jian / Ding, Yuan / Wang, Zhibo / Wu, Qingbiao / Ren, Kui et al. | 2022
- 1423
-
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision SettingsMao, Yuhao / Fu, Chong / Wang, Saizhuo / Ji, Shouling / Zhang, Xuhong / Liu, Zhenguang / Zhou, Jun / Liu, Alex X. / Beyah, Raheem / Wang, Ting et al. | 2022
- 1440
-
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your NeighborsZhan, Zihao / Zhang, Zhenkai / Liang, Sisheng / Yao, Fan / Koutsoukos, Xenofon et al. | 2022
- 1458
-
Adversarial Prefetch: New Cross-Core Cache Side Channel AttacksGuo, Yanan / Zigerelli, Andrew / Zhang, Youtao / Yang, Jun et al. | 2022
- 1474
-
Finding and Exploiting CPU Features using MSR TemplatingKogler, Andreas / Weber, Daniel / Haubenwallner, Martin / Lipp, Moritz / Gruss, Daniel / Schwarz, Michael et al. | 2022
- 1491
-
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at RestVicarte, Jose Rodrigo Sanchez / Flanders, Michael / Paccagnella, Riccardo / Garrett-Grossman, Grant / Morrison, Adam / Fletcher, Christopher W. / Kohlbrenner, David et al. | 2022
- 1506
-
MeshUp: Stateless Cache Side-channel Attack on CPU MeshWan, Junpeng / Bi, Yanxiang / Zhou, Zhe / Li, Zhou et al. | 2022
- 1525
-
Timing-Based Browsing Privacy Vulnerabilities Via Site IsolationJin, Zihao / Kong, Ziqiao / Chen, Shuo / Duan, Haixin et al. | 2022
- 1540
-
WTAGRAPH: Web Tracking and Advertising Detection using Graph Neural NetworksYang, Zhiju / Pei, Weiping / Chen, Monchu / Yue, Chuan et al. | 2022
- 1558
-
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting DefenseGong, Jiajun / Zhang, Wuqi / Zhang, Charles / Wang, Tao et al. | 2022
- 1574
-
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssemblyRomano, Alan / Lehmann, Daniel / Pradel, Michael / Wang, Weihang et al. | 2022
- 1590
-
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite CookiesKhodayari, Soheil / Pellegrino, Giancarlo et al. | 2022
- 1608
-
IRQDebloat: Reducing Driver Attack Surface in Embedded DevicesHu, Zhenghao / Dolan-Gavitt, Brendan et al. | 2022
- 1623
-
Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static AnalysisYin, Jiawei / Li, Menghao / Wu, Wei / Sun, Dandan / Zhou, Jianhua / Huo, Wei / Xue, Jingling et al. | 2022
- 1638
-
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution ArchitecturesBognar, Marton / Van Bulck, Jo / Piessens, Frank et al. | 2022
- 1656
-
How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 ImplementationsSpeith, Julian / Schweins, Florian / Ender, Maik / Fyrbiak, Marc / May, Alexander / Paar, Christof et al. | 2022
- 1672
-
Hardening Circuit-Design IP Against Reverse-Engineering AttacksChhotaray, Animesh / Shrimpton, Thomas et al. | 2022
- 1690
-
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile DevicesGivehchian, Hadi / Bhaskar, Nishant / Herrera, Eliana Rodriguez / Soto, Hector Rodrigo Lopez / Dameff, Christian / Bharadia, Dinesh / Schulman, Aaron et al. | 2022
- 1705
-
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless SensingStaat, Paul / Mulzer, Simon / Roth, Stefan / Moonsamy, Veelasha / Heinrichs, Markus / Kronberger, Rainer / Sezgin, Aydin / Paar, Christof et al. | 2022
- 1722
-
Anti-Tamper Radio: System-Level Tamper Detection for Computing SystemsStaat, Paul / Tobisch, Johannes / Zenger, Christian / Paar, Christof et al. | 2022
- 1737
-
Practical EMV Relay ProtectionRadu, Andreea-Ina / Chothia, Tom / Newton, Christopher J.P. / Boureanu, Ioana / Chen, Liqun et al. | 2022
- 1757
-
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained VocabularyHu, Pengfei / Zhuang, Hui / Santhalingam, Panneer Selvam / Spolaor, Riccardo / Pathak, Parth / Zhang, Guoming / Cheng, Xiuzhen et al. | 2022
- 1774
-
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On DeploymentsGhasemisharif, Mohammad / Kanich, Chris / Polakis, Jason et al. | 2022
- 1791
-
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit DeviceAhmad, Adil / Lee, Sangho / Peinado, Marcus et al. | 2022
- 1808
-
SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm AlgorithmsJung, Chijung / Ahad, Ali / Jeon, Yuseok / Kwon, Yonghwi et al. | 2022
- 1826
-
PGPatch: Policy-Guided Logic Bug Patching for Robotic VehiclesKim, Hyungsub / Ozmen, Muslum Ozgur / Celik, Z. Berkay / Bianchi, Antonio / Xu, Dongyan et al. | 2022
- 1845
-
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security PapersSoneji, Ananta / Kokulu, Faris Bugra / Rubio-Medrano, Carlos / Bao, Tiffany / Wang, Ruoyu / Shoshitaishvili, Yan / Doupe, Adam et al. | 2022
- 1863
-
SoK: Social CybersecurityWu, Yuxi / Edwards, W. Keith / Das, Sauvik et al. | 2022
- 1880
-
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software ProjectsWermke, Dominik / Wohler, Noah / Klemmer, Jan H. / Fourne, Marcel / Acar, Yasemin / Fahl, Sascha et al. | 2022
- 1897
-
Membership Inference Attacks From First PrinciplesCarlini, Nicholas / Chien, Steve / Nasr, Milad / Song, Shuang / Terzis, Andreas / Tramer, Florian et al. | 2022
- 1915
-
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and AmplificationOh, Se Eun / Yang, Taiji / Mathews, Nate / Holland, James K / Rahman, Mohammad Saidur / Hopper, Nicholas / Wright, Matthew et al. | 2022
- 1933
-
ShorTor: Improving Tor Network Latency via Multi-hop Overlay RoutingHogan, Kyle / Servan-Schreiber, Sacha / Newman, Zachary / Weintraub, Ben / Nita-Rotaru, Cristina / Devadas, Srinivas et al. | 2022
- 1953
-
Sabre: Sender-Anonymous Messaging with Fast AuditsVadapalli, Adithya / Storrier, Kyle / Henry, Ryan et al. | 2022
- 1971
-
Security Foundations for Application-Based Covert Communication ChannelsIv, James K. Howes / Georgiou, Marios / Malozemoff, Alex J. / Shrimpton, Thomas et al. | 2022
- 1987
-
Bad Characters: Imperceptible NLP AttacksBoucher, Nicholas / Shumailov, Ilia / Anderson, Ross / Papernot, Nicolas et al. | 2022
- 2005
-
LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence AnalysisWu, Fan / Long, Yunhui / Zhang, Ce / Li, Bo et al. | 2022
- 2025
-
Piccolo: Exposing Complex Backdoors in NLP Transformer ModelsLiu, Yingqi / Shen, Guangyu / Tao, Guanhong / An, Shengwei / Ma, Shiqing / Zhang, Xiangyu et al. | 2022
- 2043
-
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised LearningJia, Jinyuan / Liu, Yupei / Gong, Neil Zhenqiang et al. | 2022
- 2060
-
Repairing DoS Vulnerability of Real-World RegexesChida, Nariyoshi / Terauchi, Tachio et al. | 2022
- 2078
-
GREBE: Unveiling Exploitation Potential for Linux Kernel BugsLin, Zhenpeng / Chen, Yueqi / Wu, Yuhang / Mu, Dongliang / Yu, Chensheng / Xing, Xinyu / Li, Kang et al. | 2022
- 2096
-
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation SynopsisLyu, Yunlong / Fang, Yi / Zhang, Yiwei / Sun, Qibin / Ma, Siqi / Bertino, Elisa / Lu, Kangjie / Li, Juanru et al. | 2022
- 2114
-
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction StrategyYang, Zhi / Yuan, Zhanhui / Jin, Shuyuan / Chen, Xingyuan / Sun, Lei / Du, Xuehui / Li, Wenfa / Zhang, Hongqi et al. | 2022
- 2130
-
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual TrustSo, Johnny / Miramirkhani, Najmeh / Ferdman, Michael / Nikiforakis, Nick et al. | 2022
- 2145
-
Scraping Sticky Leftovers: App User Information Left on Servers After Account DeletionSanthanam, Preethi / Dang, Hoang / Shan, Zhiyong / Neamtiu, Iulian et al. | 2022
- 2161
-
TrollMagnifier: Detecting State-Sponsored Troll Accounts on RedditSaeed, Mohammad Hammas / Ali, Shiza / Blackburn, Jeremy / Cristofaro, Emiliano De / Zannettou, Savvas / Stringhini, Gianluca et al. | 2022
- 2176
-
Analyzing Ground-Truth Data of Mobile Gambling ScamsHong, Geng / Yang, Zhemin / Yang, Sen / Liaoy, Xiaojing / Du, Xiaolin / Yang, Min / Duan, Haixin et al. | 2022
- 2194
-
Effective Seed Scheduling for Fuzzing with Graph Centrality AnalysisShe, Dongdong / Shah, Abhishek / Jana, Suman et al. | 2022
- 2212
-
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget StacksKim, Kyungtae / Kim, Taegyu / Warraich, Ertza / Lee, Byoungyoung / Butler, Kevin R. B. / Bianchi, Antonio / Jing Tian, Dave et al. | 2022
- 2230
-
Exploit the Last Straw That Breaks Android SystemsZhang, Lei / Lian, Keke / Xiao, Haoyu / Zhang, Zhibo / Liu, Peng / Zhang, Yuan / Yang, Min / Duan, Haixin et al. | 2022
- 2248
-
CirC: Compiler infrastructure for proof systems, software verification, and moreOzdemir, Alex / Brown, Fraser / Wahby, Riad S. et al. | 2022
- 2267
-
HAMRAZ: Resilient Partitioning and ReplicationLi, Xiao / Houshmand, Farzin / Lesani, Mohsen et al. | 2022
- 2285
-
Formal Model-Driven Discovery of Bluetooth Protocol Design VulnerabilitiesWu, Jianliang / Wu, Ruoyu / Xu, Dongyan / Tian, Dave Jing / Bianchi, Antonio et al. | 2022
- 2304
-
“Desperate Times Call for Desperate Measures”: User Concerns with Mobile Loan Apps in KenyaMunyendo, Collins W. / Acar, Yasemin / Aviv, Adam J. et al. | 2022
- 2320
-
SoK: The Dual Nature of Technology in Sexual AbuseObada-Obieh, Borke / Huang, Yue / Spagnolo, Lucrezia / Beznosov, Konstantin et al. | 2022
- 2344
-
SoK: A Framework for Unifying At-Risk User ResearchWarford, Noel / Matthews, Tara / Yang, Kaitlyn / Akgul, Omer / Consolvo, Sunny / Kelley, Patrick Gage / Malkin, Nathan / Mazurek, Michelle L. / Sleeper, Manya / Thomas, Kurt et al. | 2022
- 2361
-
Deployment of Source Address Validation by Network Operators: A Randomized Control TrialLone, Qasim / Frik, Alisa / Luckie, Matthew / Korczynski, Maciej / van Eeten, Michel / Ganan, Carlos et al. | 2022
- 2379
-
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management DevicesSasaki, Takayuki / Fujita, Akira / Ganan, Carlos H. / van Eeten, Michel / Yoshioka, Katsunari / Matsumoto, Tsutomu et al. | 2022
- 2397
-
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service PlatformsLi, Zhi / Liu, Weijie / Chen, Hongbo / Wang, XiaoFeng / Liao, Xiaojing / Xing, Luyi / Zha, Mingming / Jin, Hai / Zou, Deqing et al. | 2022
- 2413
-
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSADe Oliveira Nunes, Ivan / Hwang, Seoyeon / Jakkamsetti, Sashidhar / Tsudik, Gene et al. | 2022
- 2430
-
Publicly Accountable Robust Multi-Party ComputationRivinius, Marc / Reisert, Pascal / Rausch, Daniel / Kusters, Ralf et al. | 2022
- 2450
-
Waldo: A Private Time-Series Database from Function Secret SharingDauterman, Emma / Rathee, Mayank / Popa, Raluca Ada / Stoica, Ion et al. | 2022
- 2469
-
Hark: A Deep Learning System for Navigating Privacy Feedback at ScaleHarkous, Hamza / Peddinti, Sai Teja / Khandelwal, Rishabh / Srivastava, Animesh / Taft, Nina et al. | 2022
- 2487
-
Sphinx: Enabling Privacy-Preserving Online Learning over the CloudTian, Han / Zeng, Chaoliang / Ren, Zhenghang / Chai, Di / Zhang, Junxue / Chen, Kai / Yang, Qiang et al. | 2022
- 2502
-
Spurt: Scalable Distributed Randomness Beacon with Transparent SetupDas, Sourav / Krishnan, Vinith / Isaac, Irene Miriam / Ren, Ling et al. | 2022
- 2518
-
Practical Asynchronous Distributed Key GenerationDas, Sourav / Yurek, Thomas / Xiang, Zhuolun / Miller, Andrew / Kokoris-Kogias, Lefteris / Ren, Ling et al. | 2022
- 2535
-
Security Analysis of the MLS Key DerivationBrzuska, Chris / Cornelissen, Eric / Kohbrok, Konrad et al. | 2022
- 2554
-
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation GeneratorsAbram, Damiano / Nof, Ariel / Orlandi, Claudio / Scholl, Peter / Shlomovits, Omer et al. | 2022
- 2573
-
Author Index| 2022