<?xml version="1.0" encoding="UTF-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>S&amp;P</title><link>https://www.ieee-security.org/TC/SP-Index.html</link><atom:link href="http://rsshub.umzzz.com/ieee-security/security-privacy" rel="self" type="application/rss+xml"></atom:link><description>IEEE Symposium on Security and Privacy Accepted Papers - Powered by RSSHub</description><generator>RSSHub</generator><webMaster>contact@rsshub.app (RSSHub)</webMaster><language>en</language><lastBuildDate>Fri, 15 May 2026 19:49:47 GMT</lastBuildDate><ttl>5</ttl><item><title>FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Xiaoyu Cao (Duke University), Jinyuan Jia (Duke University), Zaixi Zhang (University of Science and Technology of China), Neil Zhenqiang Gong (Duke University)</author></item><item><title>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Soheil Khodayari (CISPA Helmholtz Center for Information Security Germany), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security Germany)</author></item><item><title>Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Wenqiang Ruan (Fudan University China), Mingxin Xu (Fudan University China), Wenjing Fnag (Ant Group China), Li Wang (Ant Group China), Lei Wang (Ant Group China), Weili Han (Fudan University China)</author></item><item><title>D-DAE: Defense-Penetrating Model Extraction Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Yanjiao Chen (Zhejiang University), Rui Guan (Wuhan University), Xueluan Gong (Wuhan University), Jianshuo Dong (Wuhan University), Meng Xue (Wuhan University)</author></item><item><title>Examining Zero-Shot Vulnerability Repair with Large Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Hammond Pearce (New York University), Benjamin Tan (University of Calgary), Baleegh Ahmad (New York University), Ramesh Karri (New York University), Brendan Dolan-Gavitt (New York University)</author></item><item><title>Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Erik Trickel (Arizona State University), Fabio Pagani (UC Santa Barbra), Chang Zhu (Arizona State University), Lukas Dresel (UC Santa Barbra), Giovanni Vigna (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Ruoyu Wang (Arizona State University), Tiffany Bao (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupe (Arizona State University)</author></item><item><title>WeRLman: To Tackle Whale (Transactions), Go Deep (RL)</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Roi Bar-Zur (Technion IC3), Ameer Abu-Hanna (Technion), Ittay Eyal (Technion IC3), Aviv Tamar (Technion)</author></item><item><title>Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Kelsey R. Fulton (University of Maryland), Samantha Katcher (Tufts University), Kevin Song (University of Chicago), Marshini Chetty (University of Chicago), Michelle L. Mazurek (University of Maryland), Daniel Votipka (Tufts University), Chloé Messdaghi (Impactive Consulting)</author></item><item><title>SQUIP: Exploiting the Scheduler Queue Contention Side Channel</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Stefan Gast (Lamarr Security Research Graz University of Technology), Jonas Juffinger (Lamarr Security Research Graz University of Technology), Martin Schwarzl (Graz University of Technology), Gururaj Saileshwar (Georgia Institute of Technology), Andreas Kogler (Graz University of Technology), Simone Franza (Graz University of Technology), Markus Köstl (Graz University of Technology), Daniel Gruss (Lamarr Security Research Graz University of Technology)</author></item><item><title>SoK: Taxonomy of Attacks on Open-Source Software Supply Chains</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Piergiorgio Ladisa (SAP Security Research Université de Rennes 1), Henrik Plate (SAP Security Research), Matias Martinez (Université Polytechnique Hauts-de-France), Olivier Barais (Université de Rennes 1 Inria IRISA)</author></item><item><title>SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Muhammad Adil Inam (University of Illinois at Urbana-Champaign), Yinfang Chen (University of Illinois at Urbana-Champaign), Akul Goyal (University of Illinois at Urbana-Champaign), Jason Liu (University of Illinois at Urbana-Champaign), Jaron Mink (University of Illinois at Urbana-Champaign), Noor Michael (University of Illinois at Urbana-Champaign), Sneha Gaur (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign), Wajih Ul Hassan (University of Virginia)</author></item><item><title>No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Stephanie de Smale (National Cyber Security Centre The Netherlands &amp;amp; Delft University of Technology The Netherlands), Rik van Dijk (National Cyber Security Centre The Netherlands), Xander Bouwman (Delft University of Technology The Netherlands), Jeroen van der Ham (National Cyber Security Centre The Netherlands &amp;amp; University of Twente The Netherlands), Michel van Eeten (Delft University of Technology The Netherlands)</author></item><item><title>Rethinking Searchable Symmetric Encryption</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Zichen Gui (ETH Zurich Switzerland), Kenneth G. Paterson (ETH Zurich Switzerland), Sikhar Patranabis (IBM Research India)</author></item><item><title>SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Nate Mathews (Rochester Institute of Technology), James K Holland (University of Minnesota), Se Eun Oh (Ewha Womans University), Mohammad Saidur Rahman (Rochester Institute of Technology), Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology)</author></item><item><title>SoK: Certified Robustness for Deep Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Linyi Li (University of Illinois Urbana-Champaign USA), Tao Xie (Key Laboratory of High Confidence Software Technologies MoE (Peking University) China), Bo Li (University of Illinois Urbana-Champaign USA)</author></item><item><title>GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Shu Wang (George Mason University USA), Xinda Wang (George Mason University USA), Kun Sun (George Mason University USA), Sushil Jajodia (George Mason University USA), Haining Wang (Virginia Tech USA), Qi Li (Tsinghua University China)</author></item><item><title>AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Zheyue Jiang (Fudan University), Yuan Zhang (Fudan University), Jun Xu (University of Utah), Xinqian Sun (Fudan University), Zhuang Liu (Fudan University), Min Yang (Fudan University)</author></item><item><title>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Xuewei Feng (Tsinghua University China), Qi Li (Tsinghua University and Zhongguancun Lab China), Kun Sun (George Mason University USA), Yuxiang Yang (Tsinghua University), Ke Xu (Tsinghua University and Zhongguancun Lab China)</author></item><item><title>Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Donghui Dai (The Hong Kong Polytechnic University China), Zhenlin An (The Hong Kong Polytechnic University China), Lei Yang (The Hong Kong Polytechnic University China)</author></item><item><title>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Erik Rye (University of Maryland), Robert Beverly (CMAND)</author></item><item><title>SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Moses Ike (Georgia Institute of Technology USA), Kandy Phan (Sandia National Labs USA), Keaton Sadoski (Sandia National Labs USA), Romuald Valme (Sandia National Labs USA), Wenke Lee (Georgia Institute of Technology USA)</author></item><item><title>Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Miranda Wei (University of Washington USA), Pardis Emami-Naeini (Duke University USA), Franziska Roesner (University of Washington USA), Tadayoshi Kohno (University of Washington USA)</author></item><item><title>PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Zizhi Jin (Zhejiang University), Ji Xiaoyu (Zhejiang University), Yushi Cheng (Tsinghua University), Bo Yang (Zhejiang University), Chen Yan (Zhejiang University), Wenyuan Xu (Zhejiang University)</author></item><item><title>Towards a Rigorous Statistical Analysis of Empirical Password Datasets</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Jeremiah Blocki (Purdue University USA), Peiyuan Liu (Purdue University USA)</author></item><item><title>Spectre Declassified: Reading from the Right Place at the Wrong Time</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Basavesh Ammanaghatta Shivakumar (Max Planck Institute for Security and Privacy Germany), Jack Barnes (The University of Adelaide Australia), Gilles Barthe (Max Planck Institute for Security and Privacy Germany; IMDEA Software Institute Spain), Sunjay Cauligi (Max Planck Institute for Security and Privacy Germany), Chitchanok Chuengsatiansup (The University of Adelaide Australia), Daniel Genkin (Georgia Institute of Technology USA), Sioli O&#39;Connell (The University of Adelaide Australia), Peter Schwabe (Max Planck Institute for Security and Privacy Germany; Radboud University Netherlands), Rui Qi Sim (The University of Adelaide Australia), Yuval Yarom (The University of Adelaide Australia)</author></item><item><title>CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Jonas Juffinger (Lamarr Security Research Graz University of Technology Austria), Lukas Lamster (Graz University of Technology Austria), Andreas Kogler (Graz University of Technology Austria), Maria Eichlseder (Graz University of Technology Austria), Moritz Lipp (Amazon Web Services Austria), Daniel Gruss (Graz University of Technology Austria)</author></item><item><title>Blue&#39;s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Tyler Tucker (University of Florida), Hunter Searle (University of Florida), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</author></item><item><title>D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Yapeng Ye (Purdue University USA), Zhuo Zhang (Purdue University USA), Qingkai Shi (Purdue University USA), Yousra Aafer (University of Waterloo Canada), Xiangyu Zhang (Purdue University USA)</author></item><item><title>UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Bokdeuk Jeong (Samsung Research Republic of Korea), Joonun Jang (Samsung Research Republic of Korea), Hayoon Yi (Samsung Research Republic of Korea), Jiin Moon (Samsung Research Republic of Korea), Junsik Kim (Samsung Research Republic of Korea), Intae Jeon (Samsung Research Republic of Korea), Taesoo Kim (Samsung Research Republic of Korea; Georgia Institute of Technology USA), WooChul Shim (Samsung Research Republic of Korea), Yong Ho Hwang (Samsung Research Republic of Korea)</author></item><item><title>MEGA: Malleable Encryption Goes Awry</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Matilda Backendal (ETH Zurich), Haller Miro (ETH Zurich), Kenneth G. Paterson (ETH Zurich)</author></item><item><title>DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Ruochen Zhou (Zhejiang University), Xiaoyu Ji (Zhejiang University), Chen Yan (Zhejiang University), Yi-Chao Chen (Shanghai Jiao Tong University; Microsoft Research Asia), Wenyuan Xu (Zhejiang University), Chaohao Li (Zhejiang University)</author></item><item><title>Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Brian Singer (Carnegie Mellon University), Amritanshu Pandey (Carnegie Mellon University), Shimiao Li (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Craig Miller (Carnegie Mellon University), Lawrence Pileggi (Carnegie Mellon University), Vyas Sekar (Carnegie Mellon University)</author></item><item><title>FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Nina Bindel (SandboxAQ), Cas Cremers (CISPA Helmholtz Center for Information Security), Mang Zhao (CISPA Helmholtz Center for Information Security)</author></item><item><title>Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Kushal Babel (Cornell Tech), Philip Daian (Cornell Tech), Mahimna Kelkar (Cornell Tech), Ari Juels (Cornell Tech)</author></item><item><title>Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Harm Griffioen (Hasso Plattner Institute for Digital Engineering University of Potsdam), Christian Doerr (Hasso Plattner Institute for Digital Engineering University of Potsdam)</author></item><item><title>Detection of Inconsistencies in Privacy Practices of Browser Extensions</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Duc Bui (University of Michigan United States of America), Brian Tang (University of Michigan United States of America), Kang G. Shin (University of Michigan United States of America)</author></item><item><title>RAB: Provable Robustness Against Backdoor Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Maurice Weber (ETH Zurich Switzerland), Xiaojun Xu (University of Illinois at Urbana-Champaign USA), Bojan Karlas (ETH Zurich Switzerland), Ce Zhang (ETH Zurich Switzerland), Bo Li (University of Illinois at Urbana-Champaign USA)</author></item><item><title>SoK: Anti-Facial Recognition Technology</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Emily Wenger (University of Chicago), Shawn Shan (University of Chicago), Haitao Zheng (University of Chicago), Ben Y. Zhao (University of Chicago)</author></item><item><title>Deepfake Text Detection: Limitations and Opportunities</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Jiameng Pu (Virginia Tech USA), Zain Sarwar (University Of Chicago USA), Sifat Muhammad Abdullah (Virginia Tech USA), Abdullah Rehman (Virginia Tech USA), Yoonjin Kim (Virginia Tech USA), Parantapa Bhattacharya (University Of Virginia USA), Mobin Javed (LUMS Pakistan), Bimal Viswanath (Virginia Tech USA)</author></item><item><title>PCspooF: Compromising the Safety of Time-Triggered Ethernet</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Andrew Loveless (University of Michigan; NASA Johnson Space Center), Linh Thi Xuan Phan (University of Pennsylvania), Ronald Dreslinski (University of Michigan), Baris Kasikci (University of Michigan)</author></item><item><title>&quot;It&#39;s up to the Consumer to be Smart&quot;: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Jingjie Li (University of Wisconsin-Madison USA), Kaiwen Sun (University of Michigan USA), Brittany Skye Huff (University of Wisconsin-Madison USA), Anna Marie Bierley (University of Wisconsin-Madison USA), Younghyun Kim (University of Wisconsin-Madison USA), Florian Schaub (University of Michigan USA), Kassem Fawaz (University of Wisconsin-Madison USA)</author></item><item><title>TEEzz: Fuzzing Trusted Applications on COTS Android Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Marcel Busch (EPFL), Aravind Machiry (Purdue University), Chad Spensky (Allthenticate), Giovanni Vigna (University of California Santa Barbara), Christopher Kruegel (University of California Santa Barbara), Mathias Payer (EPFL)</author></item><item><title>&quot;How technical do you get? I&#39;m an English teacher&quot;: Teaching and Learning Cybersecurity and AI Ethics in High School</title><description></description><link>https://www.ieee-security.org/TC/SP2026/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2026/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</guid><pubDate>Wed, 31 Dec 2025 16:00:00 GMT</pubDate><author>Zachary Kilhoffer (University of Illinois at Urbana-Champaign USA), Zhixuan Zhou (University of Illinois at Urbana-Champaign USA), Firmiana Wang (University of Illinois Laboratory High School USA), Fahad Tamton (University of Illinois at Urbana-Champaign USA), Yun Huang (University of Illinois at Urbana-Champaign USA), Pilyoung Kim (University of Denver USA), Tom Yeh (University of Colorado Boulder USA), Yang Wang (University of Illinois at Urbana-Champaign USA)</author></item><item><title>FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Xiaoyu Cao (Duke University), Jinyuan Jia (Duke University), Zaixi Zhang (University of Science and Technology of China), Neil Zhenqiang Gong (Duke University)</author></item><item><title>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Soheil Khodayari (CISPA Helmholtz Center for Information Security Germany), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security Germany)</author></item><item><title>Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Wenqiang Ruan (Fudan University China), Mingxin Xu (Fudan University China), Wenjing Fnag (Ant Group China), Li Wang (Ant Group China), Lei Wang (Ant Group China), Weili Han (Fudan University China)</author></item><item><title>D-DAE: Defense-Penetrating Model Extraction Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Yanjiao Chen (Zhejiang University), Rui Guan (Wuhan University), Xueluan Gong (Wuhan University), Jianshuo Dong (Wuhan University), Meng Xue (Wuhan University)</author></item><item><title>Examining Zero-Shot Vulnerability Repair with Large Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Hammond Pearce (New York University), Benjamin Tan (University of Calgary), Baleegh Ahmad (New York University), Ramesh Karri (New York University), Brendan Dolan-Gavitt (New York University)</author></item><item><title>Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Erik Trickel (Arizona State University), Fabio Pagani (UC Santa Barbra), Chang Zhu (Arizona State University), Lukas Dresel (UC Santa Barbra), Giovanni Vigna (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Ruoyu Wang (Arizona State University), Tiffany Bao (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupe (Arizona State University)</author></item><item><title>WeRLman: To Tackle Whale (Transactions), Go Deep (RL)</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Roi Bar-Zur (Technion IC3), Ameer Abu-Hanna (Technion), Ittay Eyal (Technion IC3), Aviv Tamar (Technion)</author></item><item><title>Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Kelsey R. Fulton (University of Maryland), Samantha Katcher (Tufts University), Kevin Song (University of Chicago), Marshini Chetty (University of Chicago), Michelle L. Mazurek (University of Maryland), Daniel Votipka (Tufts University), Chloé Messdaghi (Impactive Consulting)</author></item><item><title>SQUIP: Exploiting the Scheduler Queue Contention Side Channel</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Stefan Gast (Lamarr Security Research Graz University of Technology), Jonas Juffinger (Lamarr Security Research Graz University of Technology), Martin Schwarzl (Graz University of Technology), Gururaj Saileshwar (Georgia Institute of Technology), Andreas Kogler (Graz University of Technology), Simone Franza (Graz University of Technology), Markus Köstl (Graz University of Technology), Daniel Gruss (Lamarr Security Research Graz University of Technology)</author></item><item><title>SoK: Taxonomy of Attacks on Open-Source Software Supply Chains</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Piergiorgio Ladisa (SAP Security Research Université de Rennes 1), Henrik Plate (SAP Security Research), Matias Martinez (Université Polytechnique Hauts-de-France), Olivier Barais (Université de Rennes 1 Inria IRISA)</author></item><item><title>SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Muhammad Adil Inam (University of Illinois at Urbana-Champaign), Yinfang Chen (University of Illinois at Urbana-Champaign), Akul Goyal (University of Illinois at Urbana-Champaign), Jason Liu (University of Illinois at Urbana-Champaign), Jaron Mink (University of Illinois at Urbana-Champaign), Noor Michael (University of Illinois at Urbana-Champaign), Sneha Gaur (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign), Wajih Ul Hassan (University of Virginia)</author></item><item><title>No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Stephanie de Smale (National Cyber Security Centre The Netherlands &amp;amp; Delft University of Technology The Netherlands), Rik van Dijk (National Cyber Security Centre The Netherlands), Xander Bouwman (Delft University of Technology The Netherlands), Jeroen van der Ham (National Cyber Security Centre The Netherlands &amp;amp; University of Twente The Netherlands), Michel van Eeten (Delft University of Technology The Netherlands)</author></item><item><title>Rethinking Searchable Symmetric Encryption</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Zichen Gui (ETH Zurich Switzerland), Kenneth G. Paterson (ETH Zurich Switzerland), Sikhar Patranabis (IBM Research India)</author></item><item><title>SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Nate Mathews (Rochester Institute of Technology), James K Holland (University of Minnesota), Se Eun Oh (Ewha Womans University), Mohammad Saidur Rahman (Rochester Institute of Technology), Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology)</author></item><item><title>SoK: Certified Robustness for Deep Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Linyi Li (University of Illinois Urbana-Champaign USA), Tao Xie (Key Laboratory of High Confidence Software Technologies MoE (Peking University) China), Bo Li (University of Illinois Urbana-Champaign USA)</author></item><item><title>GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Shu Wang (George Mason University USA), Xinda Wang (George Mason University USA), Kun Sun (George Mason University USA), Sushil Jajodia (George Mason University USA), Haining Wang (Virginia Tech USA), Qi Li (Tsinghua University China)</author></item><item><title>AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Zheyue Jiang (Fudan University), Yuan Zhang (Fudan University), Jun Xu (University of Utah), Xinqian Sun (Fudan University), Zhuang Liu (Fudan University), Min Yang (Fudan University)</author></item><item><title>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Xuewei Feng (Tsinghua University China), Qi Li (Tsinghua University and Zhongguancun Lab China), Kun Sun (George Mason University USA), Yuxiang Yang (Tsinghua University), Ke Xu (Tsinghua University and Zhongguancun Lab China)</author></item><item><title>Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Donghui Dai (The Hong Kong Polytechnic University China), Zhenlin An (The Hong Kong Polytechnic University China), Lei Yang (The Hong Kong Polytechnic University China)</author></item><item><title>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Erik Rye (University of Maryland), Robert Beverly (CMAND)</author></item><item><title>SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Moses Ike (Georgia Institute of Technology USA), Kandy Phan (Sandia National Labs USA), Keaton Sadoski (Sandia National Labs USA), Romuald Valme (Sandia National Labs USA), Wenke Lee (Georgia Institute of Technology USA)</author></item><item><title>Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Miranda Wei (University of Washington USA), Pardis Emami-Naeini (Duke University USA), Franziska Roesner (University of Washington USA), Tadayoshi Kohno (University of Washington USA)</author></item><item><title>PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Zizhi Jin (Zhejiang University), Ji Xiaoyu (Zhejiang University), Yushi Cheng (Tsinghua University), Bo Yang (Zhejiang University), Chen Yan (Zhejiang University), Wenyuan Xu (Zhejiang University)</author></item><item><title>Towards a Rigorous Statistical Analysis of Empirical Password Datasets</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Jeremiah Blocki (Purdue University USA), Peiyuan Liu (Purdue University USA)</author></item><item><title>Spectre Declassified: Reading from the Right Place at the Wrong Time</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Basavesh Ammanaghatta Shivakumar (Max Planck Institute for Security and Privacy Germany), Jack Barnes (The University of Adelaide Australia), Gilles Barthe (Max Planck Institute for Security and Privacy Germany; IMDEA Software Institute Spain), Sunjay Cauligi (Max Planck Institute for Security and Privacy Germany), Chitchanok Chuengsatiansup (The University of Adelaide Australia), Daniel Genkin (Georgia Institute of Technology USA), Sioli O&#39;Connell (The University of Adelaide Australia), Peter Schwabe (Max Planck Institute for Security and Privacy Germany; Radboud University Netherlands), Rui Qi Sim (The University of Adelaide Australia), Yuval Yarom (The University of Adelaide Australia)</author></item><item><title>CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Jonas Juffinger (Lamarr Security Research Graz University of Technology Austria), Lukas Lamster (Graz University of Technology Austria), Andreas Kogler (Graz University of Technology Austria), Maria Eichlseder (Graz University of Technology Austria), Moritz Lipp (Amazon Web Services Austria), Daniel Gruss (Graz University of Technology Austria)</author></item><item><title>Blue&#39;s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Tyler Tucker (University of Florida), Hunter Searle (University of Florida), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</author></item><item><title>D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Yapeng Ye (Purdue University USA), Zhuo Zhang (Purdue University USA), Qingkai Shi (Purdue University USA), Yousra Aafer (University of Waterloo Canada), Xiangyu Zhang (Purdue University USA)</author></item><item><title>UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Bokdeuk Jeong (Samsung Research Republic of Korea), Joonun Jang (Samsung Research Republic of Korea), Hayoon Yi (Samsung Research Republic of Korea), Jiin Moon (Samsung Research Republic of Korea), Junsik Kim (Samsung Research Republic of Korea), Intae Jeon (Samsung Research Republic of Korea), Taesoo Kim (Samsung Research Republic of Korea; Georgia Institute of Technology USA), WooChul Shim (Samsung Research Republic of Korea), Yong Ho Hwang (Samsung Research Republic of Korea)</author></item><item><title>MEGA: Malleable Encryption Goes Awry</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Matilda Backendal (ETH Zurich), Haller Miro (ETH Zurich), Kenneth G. Paterson (ETH Zurich)</author></item><item><title>DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Ruochen Zhou (Zhejiang University), Xiaoyu Ji (Zhejiang University), Chen Yan (Zhejiang University), Yi-Chao Chen (Shanghai Jiao Tong University; Microsoft Research Asia), Wenyuan Xu (Zhejiang University), Chaohao Li (Zhejiang University)</author></item><item><title>Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Brian Singer (Carnegie Mellon University), Amritanshu Pandey (Carnegie Mellon University), Shimiao Li (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Craig Miller (Carnegie Mellon University), Lawrence Pileggi (Carnegie Mellon University), Vyas Sekar (Carnegie Mellon University)</author></item><item><title>FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Nina Bindel (SandboxAQ), Cas Cremers (CISPA Helmholtz Center for Information Security), Mang Zhao (CISPA Helmholtz Center for Information Security)</author></item><item><title>Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Kushal Babel (Cornell Tech), Philip Daian (Cornell Tech), Mahimna Kelkar (Cornell Tech), Ari Juels (Cornell Tech)</author></item><item><title>Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Harm Griffioen (Hasso Plattner Institute for Digital Engineering University of Potsdam), Christian Doerr (Hasso Plattner Institute for Digital Engineering University of Potsdam)</author></item><item><title>Detection of Inconsistencies in Privacy Practices of Browser Extensions</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Duc Bui (University of Michigan United States of America), Brian Tang (University of Michigan United States of America), Kang G. Shin (University of Michigan United States of America)</author></item><item><title>RAB: Provable Robustness Against Backdoor Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Maurice Weber (ETH Zurich Switzerland), Xiaojun Xu (University of Illinois at Urbana-Champaign USA), Bojan Karlas (ETH Zurich Switzerland), Ce Zhang (ETH Zurich Switzerland), Bo Li (University of Illinois at Urbana-Champaign USA)</author></item><item><title>SoK: Anti-Facial Recognition Technology</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Emily Wenger (University of Chicago), Shawn Shan (University of Chicago), Haitao Zheng (University of Chicago), Ben Y. Zhao (University of Chicago)</author></item><item><title>Deepfake Text Detection: Limitations and Opportunities</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Jiameng Pu (Virginia Tech USA), Zain Sarwar (University Of Chicago USA), Sifat Muhammad Abdullah (Virginia Tech USA), Abdullah Rehman (Virginia Tech USA), Yoonjin Kim (Virginia Tech USA), Parantapa Bhattacharya (University Of Virginia USA), Mobin Javed (LUMS Pakistan), Bimal Viswanath (Virginia Tech USA)</author></item><item><title>PCspooF: Compromising the Safety of Time-Triggered Ethernet</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Andrew Loveless (University of Michigan; NASA Johnson Space Center), Linh Thi Xuan Phan (University of Pennsylvania), Ronald Dreslinski (University of Michigan), Baris Kasikci (University of Michigan)</author></item><item><title>&quot;It&#39;s up to the Consumer to be Smart&quot;: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Jingjie Li (University of Wisconsin-Madison USA), Kaiwen Sun (University of Michigan USA), Brittany Skye Huff (University of Wisconsin-Madison USA), Anna Marie Bierley (University of Wisconsin-Madison USA), Younghyun Kim (University of Wisconsin-Madison USA), Florian Schaub (University of Michigan USA), Kassem Fawaz (University of Wisconsin-Madison USA)</author></item><item><title>TEEzz: Fuzzing Trusted Applications on COTS Android Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Marcel Busch (EPFL), Aravind Machiry (Purdue University), Chad Spensky (Allthenticate), Giovanni Vigna (University of California Santa Barbara), Christopher Kruegel (University of California Santa Barbara), Mathias Payer (EPFL)</author></item><item><title>&quot;How technical do you get? I&#39;m an English teacher&quot;: Teaching and Learning Cybersecurity and AI Ethics in High School</title><description></description><link>https://www.ieee-security.org/TC/SP2025/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2025/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</guid><pubDate>Tue, 31 Dec 2024 16:00:00 GMT</pubDate><author>Zachary Kilhoffer (University of Illinois at Urbana-Champaign USA), Zhixuan Zhou (University of Illinois at Urbana-Champaign USA), Firmiana Wang (University of Illinois Laboratory High School USA), Fahad Tamton (University of Illinois at Urbana-Champaign USA), Yun Huang (University of Illinois at Urbana-Champaign USA), Pilyoung Kim (University of Denver USA), Tom Yeh (University of Colorado Boulder USA), Yang Wang (University of Illinois at Urbana-Champaign USA)</author></item><item><title>FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Xiaoyu Cao (Duke University), Jinyuan Jia (Duke University), Zaixi Zhang (University of Science and Technology of China), Neil Zhenqiang Gong (Duke University)</author></item><item><title>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Soheil Khodayari (CISPA Helmholtz Center for Information Security Germany), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security Germany)</author></item><item><title>Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Wenqiang Ruan (Fudan University China), Mingxin Xu (Fudan University China), Wenjing Fnag (Ant Group China), Li Wang (Ant Group China), Lei Wang (Ant Group China), Weili Han (Fudan University China)</author></item><item><title>D-DAE: Defense-Penetrating Model Extraction Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Yanjiao Chen (Zhejiang University), Rui Guan (Wuhan University), Xueluan Gong (Wuhan University), Jianshuo Dong (Wuhan University), Meng Xue (Wuhan University)</author></item><item><title>Examining Zero-Shot Vulnerability Repair with Large Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Hammond Pearce (New York University), Benjamin Tan (University of Calgary), Baleegh Ahmad (New York University), Ramesh Karri (New York University), Brendan Dolan-Gavitt (New York University)</author></item><item><title>Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Erik Trickel (Arizona State University), Fabio Pagani (UC Santa Barbra), Chang Zhu (Arizona State University), Lukas Dresel (UC Santa Barbra), Giovanni Vigna (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Ruoyu Wang (Arizona State University), Tiffany Bao (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupe (Arizona State University)</author></item><item><title>WeRLman: To Tackle Whale (Transactions), Go Deep (RL)</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Roi Bar-Zur (Technion IC3), Ameer Abu-Hanna (Technion), Ittay Eyal (Technion IC3), Aviv Tamar (Technion)</author></item><item><title>Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Kelsey R. Fulton (University of Maryland), Samantha Katcher (Tufts University), Kevin Song (University of Chicago), Marshini Chetty (University of Chicago), Michelle L. Mazurek (University of Maryland), Daniel Votipka (Tufts University), Chloé Messdaghi (Impactive Consulting)</author></item><item><title>SQUIP: Exploiting the Scheduler Queue Contention Side Channel</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Stefan Gast (Lamarr Security Research Graz University of Technology), Jonas Juffinger (Lamarr Security Research Graz University of Technology), Martin Schwarzl (Graz University of Technology), Gururaj Saileshwar (Georgia Institute of Technology), Andreas Kogler (Graz University of Technology), Simone Franza (Graz University of Technology), Markus Köstl (Graz University of Technology), Daniel Gruss (Lamarr Security Research Graz University of Technology)</author></item><item><title>SoK: Taxonomy of Attacks on Open-Source Software Supply Chains</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Piergiorgio Ladisa (SAP Security Research Université de Rennes 1), Henrik Plate (SAP Security Research), Matias Martinez (Université Polytechnique Hauts-de-France), Olivier Barais (Université de Rennes 1 Inria IRISA)</author></item><item><title>SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Muhammad Adil Inam (University of Illinois at Urbana-Champaign), Yinfang Chen (University of Illinois at Urbana-Champaign), Akul Goyal (University of Illinois at Urbana-Champaign), Jason Liu (University of Illinois at Urbana-Champaign), Jaron Mink (University of Illinois at Urbana-Champaign), Noor Michael (University of Illinois at Urbana-Champaign), Sneha Gaur (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign), Wajih Ul Hassan (University of Virginia)</author></item><item><title>No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Stephanie de Smale (National Cyber Security Centre The Netherlands &amp;amp; Delft University of Technology The Netherlands), Rik van Dijk (National Cyber Security Centre The Netherlands), Xander Bouwman (Delft University of Technology The Netherlands), Jeroen van der Ham (National Cyber Security Centre The Netherlands &amp;amp; University of Twente The Netherlands), Michel van Eeten (Delft University of Technology The Netherlands)</author></item><item><title>Rethinking Searchable Symmetric Encryption</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Zichen Gui (ETH Zurich Switzerland), Kenneth G. Paterson (ETH Zurich Switzerland), Sikhar Patranabis (IBM Research India)</author></item><item><title>SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Nate Mathews (Rochester Institute of Technology), James K Holland (University of Minnesota), Se Eun Oh (Ewha Womans University), Mohammad Saidur Rahman (Rochester Institute of Technology), Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology)</author></item><item><title>SoK: Certified Robustness for Deep Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Linyi Li (University of Illinois Urbana-Champaign USA), Tao Xie (Key Laboratory of High Confidence Software Technologies MoE (Peking University) China), Bo Li (University of Illinois Urbana-Champaign USA)</author></item><item><title>GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Shu Wang (George Mason University USA), Xinda Wang (George Mason University USA), Kun Sun (George Mason University USA), Sushil Jajodia (George Mason University USA), Haining Wang (Virginia Tech USA), Qi Li (Tsinghua University China)</author></item><item><title>AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Zheyue Jiang (Fudan University), Yuan Zhang (Fudan University), Jun Xu (University of Utah), Xinqian Sun (Fudan University), Zhuang Liu (Fudan University), Min Yang (Fudan University)</author></item><item><title>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Xuewei Feng (Tsinghua University China), Qi Li (Tsinghua University and Zhongguancun Lab China), Kun Sun (George Mason University USA), Yuxiang Yang (Tsinghua University), Ke Xu (Tsinghua University and Zhongguancun Lab China)</author></item><item><title>Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Donghui Dai (The Hong Kong Polytechnic University China), Zhenlin An (The Hong Kong Polytechnic University China), Lei Yang (The Hong Kong Polytechnic University China)</author></item><item><title>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Erik Rye (University of Maryland), Robert Beverly (CMAND)</author></item><item><title>SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Moses Ike (Georgia Institute of Technology USA), Kandy Phan (Sandia National Labs USA), Keaton Sadoski (Sandia National Labs USA), Romuald Valme (Sandia National Labs USA), Wenke Lee (Georgia Institute of Technology USA)</author></item><item><title>Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Miranda Wei (University of Washington USA), Pardis Emami-Naeini (Duke University USA), Franziska Roesner (University of Washington USA), Tadayoshi Kohno (University of Washington USA)</author></item><item><title>PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Zizhi Jin (Zhejiang University), Ji Xiaoyu (Zhejiang University), Yushi Cheng (Tsinghua University), Bo Yang (Zhejiang University), Chen Yan (Zhejiang University), Wenyuan Xu (Zhejiang University)</author></item><item><title>Towards a Rigorous Statistical Analysis of Empirical Password Datasets</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Jeremiah Blocki (Purdue University USA), Peiyuan Liu (Purdue University USA)</author></item><item><title>Spectre Declassified: Reading from the Right Place at the Wrong Time</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Basavesh Ammanaghatta Shivakumar (Max Planck Institute for Security and Privacy Germany), Jack Barnes (The University of Adelaide Australia), Gilles Barthe (Max Planck Institute for Security and Privacy Germany; IMDEA Software Institute Spain), Sunjay Cauligi (Max Planck Institute for Security and Privacy Germany), Chitchanok Chuengsatiansup (The University of Adelaide Australia), Daniel Genkin (Georgia Institute of Technology USA), Sioli O&#39;Connell (The University of Adelaide Australia), Peter Schwabe (Max Planck Institute for Security and Privacy Germany; Radboud University Netherlands), Rui Qi Sim (The University of Adelaide Australia), Yuval Yarom (The University of Adelaide Australia)</author></item><item><title>CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Jonas Juffinger (Lamarr Security Research Graz University of Technology Austria), Lukas Lamster (Graz University of Technology Austria), Andreas Kogler (Graz University of Technology Austria), Maria Eichlseder (Graz University of Technology Austria), Moritz Lipp (Amazon Web Services Austria), Daniel Gruss (Graz University of Technology Austria)</author></item><item><title>Blue&#39;s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Tyler Tucker (University of Florida), Hunter Searle (University of Florida), Kevin Butler (University of Florida), Patrick Traynor (University of Florida)</author></item><item><title>D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Yapeng Ye (Purdue University USA), Zhuo Zhang (Purdue University USA), Qingkai Shi (Purdue University USA), Yousra Aafer (University of Waterloo Canada), Xiangyu Zhang (Purdue University USA)</author></item><item><title>UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Bokdeuk Jeong (Samsung Research Republic of Korea), Joonun Jang (Samsung Research Republic of Korea), Hayoon Yi (Samsung Research Republic of Korea), Jiin Moon (Samsung Research Republic of Korea), Junsik Kim (Samsung Research Republic of Korea), Intae Jeon (Samsung Research Republic of Korea), Taesoo Kim (Samsung Research Republic of Korea; Georgia Institute of Technology USA), WooChul Shim (Samsung Research Republic of Korea), Yong Ho Hwang (Samsung Research Republic of Korea)</author></item><item><title>MEGA: Malleable Encryption Goes Awry</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Matilda Backendal (ETH Zurich), Haller Miro (ETH Zurich), Kenneth G. Paterson (ETH Zurich)</author></item><item><title>DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Ruochen Zhou (Zhejiang University), Xiaoyu Ji (Zhejiang University), Chen Yan (Zhejiang University), Yi-Chao Chen (Shanghai Jiao Tong University; Microsoft Research Asia), Wenyuan Xu (Zhejiang University), Chaohao Li (Zhejiang University)</author></item><item><title>Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Brian Singer (Carnegie Mellon University), Amritanshu Pandey (Carnegie Mellon University), Shimiao Li (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Craig Miller (Carnegie Mellon University), Lawrence Pileggi (Carnegie Mellon University), Vyas Sekar (Carnegie Mellon University)</author></item><item><title>FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Nina Bindel (SandboxAQ), Cas Cremers (CISPA Helmholtz Center for Information Security), Mang Zhao (CISPA Helmholtz Center for Information Security)</author></item><item><title>Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Kushal Babel (Cornell Tech), Philip Daian (Cornell Tech), Mahimna Kelkar (Cornell Tech), Ari Juels (Cornell Tech)</author></item><item><title>Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Harm Griffioen (Hasso Plattner Institute for Digital Engineering University of Potsdam), Christian Doerr (Hasso Plattner Institute for Digital Engineering University of Potsdam)</author></item><item><title>Detection of Inconsistencies in Privacy Practices of Browser Extensions</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Duc Bui (University of Michigan United States of America), Brian Tang (University of Michigan United States of America), Kang G. Shin (University of Michigan United States of America)</author></item><item><title>RAB: Provable Robustness Against Backdoor Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Maurice Weber (ETH Zurich Switzerland), Xiaojun Xu (University of Illinois at Urbana-Champaign USA), Bojan Karlas (ETH Zurich Switzerland), Ce Zhang (ETH Zurich Switzerland), Bo Li (University of Illinois at Urbana-Champaign USA)</author></item><item><title>SoK: Anti-Facial Recognition Technology</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Emily Wenger (University of Chicago), Shawn Shan (University of Chicago), Haitao Zheng (University of Chicago), Ben Y. Zhao (University of Chicago)</author></item><item><title>Deepfake Text Detection: Limitations and Opportunities</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Jiameng Pu (Virginia Tech USA), Zain Sarwar (University Of Chicago USA), Sifat Muhammad Abdullah (Virginia Tech USA), Abdullah Rehman (Virginia Tech USA), Yoonjin Kim (Virginia Tech USA), Parantapa Bhattacharya (University Of Virginia USA), Mobin Javed (LUMS Pakistan), Bimal Viswanath (Virginia Tech USA)</author></item><item><title>PCspooF: Compromising the Safety of Time-Triggered Ethernet</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Andrew Loveless (University of Michigan; NASA Johnson Space Center), Linh Thi Xuan Phan (University of Pennsylvania), Ronald Dreslinski (University of Michigan), Baris Kasikci (University of Michigan)</author></item><item><title>&quot;It&#39;s up to the Consumer to be Smart&quot;: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#%22It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart%22:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Jingjie Li (University of Wisconsin-Madison USA), Kaiwen Sun (University of Michigan USA), Brittany Skye Huff (University of Wisconsin-Madison USA), Anna Marie Bierley (University of Wisconsin-Madison USA), Younghyun Kim (University of Wisconsin-Madison USA), Florian Schaub (University of Michigan USA), Kassem Fawaz (University of Wisconsin-Madison USA)</author></item><item><title>TEEzz: Fuzzing Trusted Applications on COTS Android Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Marcel Busch (EPFL), Aravind Machiry (Purdue University), Chad Spensky (Allthenticate), Giovanni Vigna (University of California Santa Barbara), Christopher Kruegel (University of California Santa Barbara), Mathias Payer (EPFL)</author></item><item><title>&quot;How technical do you get? I&#39;m an English teacher&quot;: Teaching and Learning Cybersecurity and AI Ethics in High School</title><description></description><link>https://www.ieee-security.org/TC/SP2024/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2024/program-papers.html#%22How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher%22:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</guid><pubDate>Sun, 31 Dec 2023 16:00:00 GMT</pubDate><author>Zachary Kilhoffer (University of Illinois at Urbana-Champaign USA), Zhixuan Zhou (University of Illinois at Urbana-Champaign USA), Firmiana Wang (University of Illinois Laboratory High School USA), Fahad Tamton (University of Illinois at Urbana-Champaign USA), Yun Huang (University of Illinois at Urbana-Champaign USA), Pilyoung Kim (University of Denver USA), Tom Yeh (University of Colorado Boulder USA), Yang Wang (University of Illinois at Urbana-Champaign USA)</author></item><item><title>Space Odyssey: An Experimental Software Security Analysis of Satellites</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Space%20Odyssey:%20An%20Experimental%20Software%20Security%20Analysis%20of%20Satellites</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Space%20Odyssey:%20An%20Experimental%20Software%20Security%20Analysis%20of%20Satellites</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Johannes Willbold ( Ruhr University Bochum ), Moritz Schloegel ( Ruhr University Bochum ), Manuel Vögele ( Ruhr University Bochum ), Maximilian Gerhardt ( Ruhr University Bochum ), Thorsten Holz ( CISPA Helmholtz Center for Information Security ), Ali Abbasi ( CISPA Helmholtz Center for Information Security )</author></item><item><title>SCAPHY: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SCAPHY:%20Detecting%20Modern%20ICS%20Attacks%20by%20Correlating%20Behaviors%20in%20SCADA%20and%20PHYsical</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Moses Ike ( Georgia Institute of Technology, USA ), Kandy Phan ( Sandia National Labs, USA ), Keaton Sadoski ( Sandia National Labs, USA ), Romuald Valme ( Sandia National Labs, USA ), Wenke Lee ( Georgia Institute of Technology, USA )</author></item><item><title>Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Shedding%20Light%20on%20Inconsistencies%20in%20Grid%20Cybersecurity:%20Disconnects%20and%20Recommendations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Brian Singer ( Carnegie Mellon University ), Amritanshu Pandey ( Carnegie Mellon University ), Shimiao Li ( Carnegie Mellon University ), Lujo Bauer ( Carnegie Mellon University ), Craig Miller ( Carnegie Mellon University ), Lawrence Pileggi ( Carnegie Mellon University ), Vyas Sekar ( Carnegie Mellon University )</author></item><item><title>Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Red%20Team%20vs.%20Blue%20Team:%20A%20Real-World%20Hardware%20Trojan%20Detection%20Case%20Study%20Across%20Four%20Modern%20CMOS%20Technology%20Generations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Red%20Team%20vs.%20Blue%20Team:%20A%20Real-World%20Hardware%20Trojan%20Detection%20Case%20Study%20Across%20Four%20Modern%20CMOS%20Technology%20Generations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Endres Puschner ( Max Planck Institute for Security and Privacy, Germany ), Thorben Moos ( Université catholique de Louvain, Belgium ), Steffen Becker ( Ruhr University Bochum, Germany &amp;amp; Max Planck Institute for Security and Privacy, Germany ), Christian Kison ( Bundeskriminalamt, Germany ), Amir Moradi ( Ruhr University Bochum, Germany ), Christof Paar ( Max Planck Institute for Security and Privacy, Germany )</author></item><item><title>SoK: Distributed Randomness Beacons</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Distributed%20Randomness%20Beacons</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Distributed%20Randomness%20Beacons</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kevin Choi ( New York University, USA ), Aathira Manoj ( New York University, USA ), Joseph Bonneau ( New York University, USA and a16z crypto research, USA )</author></item><item><title>WeRLman: To Tackle Whale (Transactions), Go Deep (RL)</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#WeRLman:%20To%20Tackle%20Whale%20(Transactions),%20Go%20Deep%20(RL)</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Roi Bar-Zur ( Technion, IC3 ), Ameer Abu-Hanna ( Technion ), Ittay Eyal ( Technion, IC3 ), Aviv Tamar ( Technion )</author></item><item><title>Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Three%20Birds%20with%20One%20Stone:%20Efficient%20Partitioning%20Attacks%20on%20Interdependent%20Cryptocurrency%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Three%20Birds%20with%20One%20Stone:%20Efficient%20Partitioning%20Attacks%20on%20Interdependent%20Cryptocurrency%20Networks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Muhammad Saad ( PayPal ), David Mohaisen ( University of Central Florida )</author></item><item><title>Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Bitcoin-Enhanced%20Proof-of-Stake%20Security:%20Possibilities%20and%20Impossibilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Bitcoin-Enhanced%20Proof-of-Stake%20Security:%20Possibilities%20and%20Impossibilities</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ertem Nusret Tas ( Stanford University ), David Tse ( Stanford University ), Fangyu Gai ( BabylonChain Inc. ), Sreeram Kannan ( University of Washington, Seattle ), Mohammad Ali Maddah-Ali ( University of Minnesota ), Fisher Yu ( BabylonChain Inc. )</author></item><item><title>MEGA: Malleable Encryption Goes Awry</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#MEGA:%20Malleable%20Encryption%20Goes%20Awry</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Matilda Backendal ( ETH Zurich ), Haller Miro ( ETH Zurich ), Kenneth G. Paterson ( ETH Zurich )</author></item><item><title>Practically-exploitable Cryptographic Vulnerabilities in Matrix</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Practically-exploitable%20Cryptographic%20Vulnerabilities%20in%20Matrix</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Practically-exploitable%20Cryptographic%20Vulnerabilities%20in%20Matrix</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Martin R. Albrecht ( King’s College London ), Sofía Celi ( Brave Software ), Benjamin Dowling ( Security of Advanced Systems Group, University of Sheffield ), Daniel Jones ( Information Security Group, Royal Holloway, University of London )</author></item><item><title>DBREACH: Stealing from Databases Using Compression Side-Channels</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#DBREACH:%20Stealing%20from%20Databases%20Using%20Compression%20Side-Channels</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#DBREACH:%20Stealing%20from%20Databases%20Using%20Compression%20Side-Channels</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mathew Hogan ( Stanford University ), Yan Michalevsky ( Anjuna Security, Inc and Cryptosat, Inc. ), Saba Eskandarian ( UNC Chapel Hill )</author></item><item><title>Weak Fiat-Shamir Attacks on Modern Proof Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Weak%20Fiat-Shamir%20Attacks%20on%20Modern%20Proof%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Weak%20Fiat-Shamir%20Attacks%20on%20Modern%20Proof%20Systems</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Quang Dao ( Carnegie Mellon University ), Jim Miller ( Trail of Bits ), Opal Wright ( Trail of Bits ), Paul Grubbs ( University of Michigan )</author></item><item><title>Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Attitudes%20towards%20Client-Side%20Scanning%20for%20CSAM,%20Terrorism,%20Drug%20Trafficking,%20Drug%20Use%20and%20Tax%20Evasion%20in%20Germany</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Attitudes%20towards%20Client-Side%20Scanning%20for%20CSAM,%20Terrorism,%20Drug%20Trafficking,%20Drug%20Use%20and%20Tax%20Evasion%20in%20Germany</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lisa Geierhaas ( University of Bonn ), Fabian Otto ( OmniQuest ), Maximilian Häring ( University of Bonn ), Matthew Smith ( University of Bonn, Fraunhofer FKIE )</author></item><item><title>Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Deep%20perceptual%20hashing%20algorithms%20with%20hidden%20dual%20purpose:%20when%20client-side%20scanning%20does%20facial%20recognition</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Deep%20perceptual%20hashing%20algorithms%20with%20hidden%20dual%20purpose:%20when%20client-side%20scanning%20does%20facial%20recognition</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Shubham Jain ( Imperial College London, United Kingdom ), Ana-Maria Cretu ( Imperial College London, United Kingdom ), Antoine Cully ( Imperial College London, United Kingdom ), Yves-Alexandre de Montjoye ( Imperial College London, United Kingdom )</author></item><item><title>Public Verification for Private Hash Matching</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Public%20Verification%20for%20Private%20Hash%20Matching</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Public%20Verification%20for%20Private%20Hash%20Matching</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sarah Scheffler ( Princeton University ), Anunay Kulshrestha ( Princeton University ), Jonathan Mayer ( Princeton University )</author></item><item><title>Is Cryptographic Deniability Sufficient? Non-Expert Perceptions of Deniability in Secure Messaging</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Is%20Cryptographic%20Deniability%20Sufficient?%20Non-Expert%20Perceptions%20of%20Deniability%20in%20Secure%20Messaging</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Is%20Cryptographic%20Deniability%20Sufficient?%20Non-Expert%20Perceptions%20of%20Deniability%20in%20Secure%20Messaging</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Nathan Reitinger ( University of Maryland, United States ), Nathan Malkin ( University of Maryland, United States ), Omer Akgul ( University of Maryland, United States ), Michelle L Mazurek ( University of Maryland, United States ), Ian Miers ( University of Maryland, United States )</author></item><item><title>On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20the%20Evolution%20of%20(Hateful)%20Memes%20by%20Means%20of%20Multimodal%20Contrastive%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20the%20Evolution%20of%20(Hateful)%20Memes%20by%20Means%20of%20Multimodal%20Contrastive%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yiting Qu ( CISPA Helmholtz Center for Information Security, Germany ), Xinlei He ( CISPA Helmholtz Center for Information Security, Germany ), Shannon Pierson ( London School of Economics and Political Science, UK ), Michael Backes ( CISPA Helmholtz Center for Information Security, Germany ), Yang Zhang ( CISPA Helmholtz Center for Information Security, Germany ), Savvas Zannettou ( Delft University of Technology, Netherlands )</author></item><item><title>LAMBRETTA: Learning to Rank for Twitter Soft Moderation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#LAMBRETTA:%20Learning%20to%20Rank%20for%20Twitter%20Soft%20Moderation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#LAMBRETTA:%20Learning%20to%20Rank%20for%20Twitter%20Soft%20Moderation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Pujan Paudel ( Boston University ), Jeremy Blackburn ( Binghamton University ), Emiliano De Cristofaro ( University College London ), Savvas Zannettou ( Delft University of Technology ), Gianluca Stringhini ( Boston University )</author></item><item><title>SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Let%20the%20Privacy%20Games%20Begin!%20A%20Unified%20Treatment%20of%20Data%20Inference%20Privacy%20in%20Machine%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Let%20the%20Privacy%20Games%20Begin!%20A%20Unified%20Treatment%20of%20Data%20Inference%20Privacy%20in%20Machine%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ahmed Salem ( Microsoft, United Kingdom ), Giovanni Cherubin ( Microsoft, United Kingdom ), David Evans ( University of Virginia, United States ), Boris Koepf ( Microsoft, United Kingdom ), Andrew Paverd ( Microsoft, United Kingdom ), Anshuman Suri ( University of Virginia, United States ), Shruti Tople ( Microsoft, United Kingdom ), Santiago Zanella-Beguelin ( Microsoft, United Kingdom )</author></item><item><title>Analyzing Leakage of Personally Identifiable Information in Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Analyzing%20Leakage%20of%20Personally%20Identifiable%20Information%20in%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Analyzing%20Leakage%20of%20Personally%20Identifiable%20Information%20in%20Language%20Models</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Nils Lukas ( University of Waterloo ), Ahmed Salem ( Microsoft Research ), Robert Sim ( Microsoft Research ), Shruti Tople ( Microsoft Research ), Lukas Wutschitz ( Microsoft Research ), Santiago Zanella-Béguelin ( Microsoft Research )</author></item><item><title>Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Accuracy-Privacy%20Trade-off%20in%20Deep%20Ensemble:%20A%20Membership%20Inference%20Perspective</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Accuracy-Privacy%20Trade-off%20in%20Deep%20Ensemble:%20A%20Membership%20Inference%20Perspective</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Shahbaz Rezaei ( University of California at Davis ), Zubair Shafiq ( University of California at Davis ), Xin Liu ( University of California at Davis )</author></item><item><title>D-DAE: Defense-Penetrating Model Extraction Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#D-DAE:%20Defense-Penetrating%20Model%20Extraction%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yanjiao Chen ( Zhejiang University ), Rui Guan ( Wuhan University ), Xueluan Gong ( Wuhan University ), Jianshuo Dong ( Wuhan University ), Meng Xue ( Wuhan University )</author></item><item><title>SNAP: Efficient Extraction of Private Properties with Poisoning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SNAP:%20Efficient%20Extraction%20of%20Private%20Properties%20with%20Poisoning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SNAP:%20Efficient%20Extraction%20of%20Private%20Properties%20with%20Poisoning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Harsh Chaudhari ( Northeastern University ), John Abascal ( Northeastern University ), Alina Oprea ( Northeastern University ), Matthew Jagielski ( Google Research ), Florian Tramèr ( ETH Zurich ), Jonathan Ullman ( Northeastern University )</author></item><item><title>On the (In)security of Peer-to-Peer Decentralized Machine Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20the%20(In)security%20of%20Peer-to-Peer%20Decentralized%20Machine%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20the%20(In)security%20of%20Peer-to-Peer%20Decentralized%20Machine%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Dario Pasquini ( SPRING Lab; EPFL, Switzerland ), Mathilde Raynal ( SPRING Lab; EPFL, Switzerland ), Carmela Troncoso ( SPRING Lab; EPFL, Switzerland )</author></item><item><title>Vectorized Batch Private Information Retrieval</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Vectorized%20Batch%20Private%20Information%20Retrieval</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Vectorized%20Batch%20Private%20Information%20Retrieval</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Muhammad Haris Mughees ( University of Illinois Urbana-Champaign, United States ), Ling Ren ( University of Illinois Urbana-Champaign, United States )</author></item><item><title>RoFL: Robustness of Secure Federated Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#RoFL:%20Robustness%20of%20Secure%20Federated%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#RoFL:%20Robustness%20of%20Secure%20Federated%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hidde Lycklama ( ETH Zurich ), Lukas Burkhalter ( ETH Zurich ), Alexander Viand ( ETH Zurich ), Nicolas Küchler ( ETH Zurich ), Anwar Hithnawi ( ETH Zurich )</author></item><item><title>Flamingo: Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Flamingo:%20Multi-Round%20Single-Server%20Secure%20Aggregation%20with%20Applications%20to%20Private%20Federated%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Flamingo:%20Multi-Round%20Single-Server%20Secure%20Aggregation%20with%20Applications%20to%20Private%20Federated%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yiping Ma ( University of Pennsylvania ), Jess Woods ( University of Pennsylvania ), Sebastian Angel ( University of Pennsylvania, Microsoft Research ), Antigoni Polychroniadou ( JP Morgan AI Research ), Tal Rabin ( University of Pennsylvania )</author></item><item><title>SoK: Cryptographic Neural-Network Computation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Cryptographic%20Neural-Network%20Computation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Cryptographic%20Neural-Network%20Computation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lucien K. L ( Georgia Institute of Technology ), Sherman S. M. Chow ( Chinese University of Hong Kong )</author></item><item><title>FLUTE: Fast and Secure Lookup Table Evaluations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#FLUTE:%20Fast%20and%20Secure%20Lookup%20Table%20Evaluations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#FLUTE:%20Fast%20and%20Secure%20Lookup%20Table%20Evaluations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Andreas Brüggemann ( Technical University of Darmstadt ), Robin Hundt ( Technical University of Darmstadt ), Thomas Schneider ( Technical University of Darmstadt ), Ajith Suresh ( Technical University of Darmstadt ), Hossein Yalame ( Technical University of Darmstadt )</author></item><item><title>Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Bicoptor:%20Two-round%20Secure%20Three-party%20Non-linear%20Computation%20without%20Preprocessing%20for%20Privacy-preserving%20Machine%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Bicoptor:%20Two-round%20Secure%20Three-party%20Non-linear%20Computation%20without%20Preprocessing%20for%20Privacy-preserving%20Machine%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lijing Zhou ( Huawei Technology, China ), Ziyu Wang ( Huawei Technology, China ), Hongrui Cui ( Shanghai Jiao Tong University, China ), Qingrui Song ( Huawei Technology, China ), Yu Yu ( Shanghai Jiao Tong University, China )</author></item><item><title>Investigating the Password Policy Practices of Website Administrators</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Investigating%20the%20Password%20Policy%20Practices%20of%20Website%20Administrators</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Investigating%20the%20Password%20Policy%20Practices%20of%20Website%20Administrators</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sena Sahin ( Georgia Institute of Technology, USA ), Suood Al Roomi ( Georgia Institute of Technology, USA ; Kuwait University, Kuwait ), Tara Poteat ( Georgia Institute of Technology, USA ), Frank Li ( Georgia Institute of Technology, USA )</author></item><item><title>“In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#%E2%80%9CIn%20Eighty%20Percent%20of%20the%20Cases,%20I%20Select%20the%20Password%20for%20Them%E2%80%9D:%20Security%20and%20Privacy%20Challenges,%20Advice,%20and%20Opportunities%20at%20Cybercafes%20in%20Kenya</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#%E2%80%9CIn%20Eighty%20Percent%20of%20the%20Cases,%20I%20Select%20the%20Password%20for%20Them%E2%80%9D:%20Security%20and%20Privacy%20Challenges,%20Advice,%20and%20Opportunities%20at%20Cybercafes%20in%20Kenya</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Collins W. Munyendo ( The George Washington University ), Yasemin Acar ( Paderborn University ), Adam J. Aviv ( The George Washington University )</author></item><item><title>Perceptions of Distributed Ledger Technology Key Management – An Interview Study with Finance Professionals</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Perceptions%20of%20Distributed%20Ledger%20Technology%20Key%20Management%20%E2%80%93%20An%20Interview%20Study%20with%20Finance%20Professionals</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Perceptions%20of%20Distributed%20Ledger%20Technology%20Key%20Management%20%E2%80%93%20An%20Interview%20Study%20with%20Finance%20Professionals</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Carolyn Guthoff ( CISPA Helmholtz Center for Information Security, Germany, and Saarland University, Germany ), Simon Anell ( CISPA Helmholtz Center for Information Security, Germany, and Saarland University, Germany ), Johann Hainzinger ( Plutoneo Consulting GmbH, Germany ), Adrian Dabrowski ( CISPA Helmholtz Center for Information Security, Germany ), Katharina Krombholz ( CISPA Helmholtz Center for Information Security, Germany )</author></item><item><title>Towards a Rigorous Statistical Analysis of Empirical Password Datasets</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Towards%20a%20Rigorous%20Statistical%20Analysis%20of%20Empirical%20Password%20Datasets</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jeremiah Blocki ( Purdue University, USA ), Peiyuan Liu ( Purdue University, USA )</author></item><item><title>Confident Monte Carlo: Rigorous Analysis of Guessing Curves for Probabilistic Password Models</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Confident%20Monte%20Carlo:%20Rigorous%20Analysis%20of%20Guessing%20Curves%20for%20Probabilistic%20Password%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Confident%20Monte%20Carlo:%20Rigorous%20Analysis%20of%20Guessing%20Curves%20for%20Probabilistic%20Password%20Models</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Peiyuan Liu ( Purdue University, USA ), Jeremiah Blocki ( Purdue University, USA ), Wenjie Bai ( Purdue University, USA )</author></item><item><title>Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Not%20Yet%20Another%20Digital%20ID:%20Privacy-preserving%20Humanitarian%20Aid%20Distribution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Not%20Yet%20Another%20Digital%20ID:%20Privacy-preserving%20Humanitarian%20Aid%20Distribution</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Boya Wang ( EPFL ), Wouter Lueks ( CISPA Helmholtz Center for Information Security ), Justinas Sukaitis ( International Committee for the Red Cross ), Vincent Graf Narbel ( International Committee for the Red Cross ), Carmela Troncoso ( EPFL )</author></item><item><title>Disguising Attacks with Explanation-Aware Backdoors</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Disguising%20Attacks%20with%20Explanation-Aware%20Backdoors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Disguising%20Attacks%20with%20Explanation-Aware%20Backdoors</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Maximilian Noppel ( KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany ), Lukas Peter ( KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany ), Christian Wressnegger ( KASTEL Security Research Labs, Karlsruhe Institute of Technology, Germany )</author></item><item><title>Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Selective%20Amnesia:%20On%20Efficient,%20High-Fidelity%20and%20Blind%20Suppression%20of%20Backdoor%20Effects%20in%20Trojaned%20Machine%20Learning%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Selective%20Amnesia:%20On%20Efficient,%20High-Fidelity%20and%20Blind%20Suppression%20of%20Backdoor%20Effects%20in%20Trojaned%20Machine%20Learning%20Models</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Rui Zhu ( Indiana University Bloomington ), Di Tang ( Indiana University Bloomington ), Siyuan Tang ( Indiana University Bloomington ), XiaoFeng Wang ( Indiana University Bloomington ), Haixu Tang ( Indiana University Bloomington )</author></item><item><title>AI-Guardian: Defeating Adversarial Attacks using Backdoors</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#AI-Guardian:%20Defeating%20Adversarial%20Attacks%20using%20Backdoors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#AI-Guardian:%20Defeating%20Adversarial%20Attacks%20using%20Backdoors</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hong Zhu ( Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China ), Shengzhi Zhang ( Boston University, USA ), Kai Chen ( Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China )</author></item><item><title>Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Jigsaw%20Puzzle:%20Selective%20Backdoor%20Attack%20to%20Subvert%20Malware%20Classifiers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Jigsaw%20Puzzle:%20Selective%20Backdoor%20Attack%20to%20Subvert%20Malware%20Classifiers</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Limin Yang ( University of Illinois at Urbana-Champaign ), Zhi Chen ( University of Illinois at Urbana-Champaign ), Jacopo Cortellazzi ( King&#39;s College London and University College London ), Feargus Pendlebury ( University College London ), Kevin Tu ( University of Illinois at Urbana-Champaign ), Fabio Pierazzi ( King&#39;s College London ), Lorenzo Cavallaro ( University College London ), Gang Wang ( University of Illinois at Urbana-Champaign )</author></item><item><title>BayBFed: Bayesian Backdoor Defense for Federated Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#BayBFed:%20Bayesian%20Backdoor%20Defense%20for%20Federated%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#BayBFed:%20Bayesian%20Backdoor%20Defense%20for%20Federated%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kavita Kumari ( Technical University of Darmstadt, Germany ), Phillip Rieger ( Technical University of Darmstadt, Germany ), Hossein Fereidooni ( Technical University of Darmstadt, Germany ), Murtuza Jadliwala ( The University of Texas at San Antonio, United States ), Ahmad-Reza Sadeghi ( Technical University of Darmstadt, Germany )</author></item><item><title>REDEEM MYSELF: Purifying Backdoors in Deep Learning Models using Self Attention Distillation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#REDEEM%20MYSELF:%20Purifying%20Backdoors%20in%20Deep%20Learning%20Models%20using%20Self%20Attention%20Distillation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#REDEEM%20MYSELF:%20Purifying%20Backdoors%20in%20Deep%20Learning%20Models%20using%20Self%20Attention%20Distillation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xueluan Gong ( School of Computer Science, Wuhan University, China ), Yanjiao Chen ( College of Electrical Engineering, Zhejiang University, China ), Wang Yang ( School of Cyber Science and Engineering, Wuhan University, China ), Qian Wang ( School of Cyber Science and Engineering, Wuhan University, China ), Yuzhe Gu ( School of Cyber Science and Engineering, Wuhan University, China ), Huayang Huang ( School of Cyber Science and Engineering, Wuhan University, China ), Chao Shen ( School of Cyber Science and Engineering, Xi’an Jiaotong University, China )</author></item><item><title>Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Threshold%20BBS+%20Signatures%20for%20Distributed%20Anonymous%20Credential%20Issuance</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Threshold%20BBS+%20Signatures%20for%20Distributed%20Anonymous%20Credential%20Issuance</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jack Doerner ( Technion ), Yashvanth Kondi ( Aarhus University ), Eysa Lee ( Northeastern University ), abhi shelat ( Northeastern University ), LaKyah Tyner ( Northeastern University )</author></item><item><title>zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#zk-creds:%20Flexible%20Anonymous%20Credentials%20from%20zkSNARKs%20and%20Existing%20Identity%20Infrastructure</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#zk-creds:%20Flexible%20Anonymous%20Credentials%20from%20zkSNARKs%20and%20Existing%20Identity%20Infrastructure</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Michael Rosenberg ( University of Maryland ), Jacob White ( Purdue University ), Christina Garman ( Purdue University ), Ian Miers ( University of Maryland )</author></item><item><title>Private Access Control for Function Secret Sharing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Access%20Control%20for%20Function%20Secret%20Sharing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Access%20Control%20for%20Function%20Secret%20Sharing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sacha Servan-Schreiber ( MIT CSAIL ), Simon Beyzerov ( MIT PRIMES ), Eli Yablon ( MIT PRIMES ), Hyojae Park ( MIT PRIMES )</author></item><item><title>MPCAuth: Multi-factor Authentication for Distributed-trust Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#MPCAuth:%20Multi-factor%20Authentication%20for%20Distributed-trust%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#MPCAuth:%20Multi-factor%20Authentication%20for%20Distributed-trust%20Systems</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sijun Tan ( UC Berkeley ), Weikeng Chen ( UC Berkeley ), Ryan Deng ( UC Berkeley ), Raluca Ada Popa ( UC Berkeley )</author></item><item><title>Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Silph:%20A%20Framework%20for%20Scalable%20and%20Accurate%20Generation%20of%20Hybrid%20MPC%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Silph:%20A%20Framework%20for%20Scalable%20and%20Accurate%20Generation%20of%20Hybrid%20MPC%20Protocols</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Edward Chen ( Carnegie Mellon University; Stanford University ), Jinhao Zhu ( Carnegie Mellon University ), Alex Ozdemir ( Stanford Univesity ), Riad Wahby ( Carnegie Mellon University ), Fraser Brown ( Carnegie Mellon University ), Wenting Zheng ( Carnegie Mellon University )</author></item><item><title>SoK: Anti-Facial Recognition Technology</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Anti-Facial%20Recognition%20Technology</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Emily Wenger ( University of Chicago ), Shawn Shan ( University of Chicago ), Haitao Zheng ( University of Chicago ), Ben Y. Zhao ( University of Chicago )</author></item><item><title>Spoofing Real-world Face Authentication Systems through Optical Synthesis</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Spoofing%20Real-world%20Face%20Authentication%20Systems%20through%20Optical%20Synthesis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Spoofing%20Real-world%20Face%20Authentication%20Systems%20through%20Optical%20Synthesis</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yueli Yan ( ShanghaiTech University ), Yuelin Liu ( ShanghaiTech University ), Zhice Yang ( ShanghaiTech University )</author></item><item><title>ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ImU:%20Physical%20Impersonating%20Attack%20for%20Face%20Recognition%20System%20with%20Natural%20Style%20Changes</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ImU:%20Physical%20Impersonating%20Attack%20for%20Face%20Recognition%20System%20with%20Natural%20Style%20Changes</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Shengwei An ( Purdue University, USA ), Yuan Yao ( Nanjing University, China ), Qiuling Xu ( Purdue University, USA ), Shiqing Ma ( Rutgers University, USA ), Guanhong Tao ( Purdue University, USA ), Siyuan Cheng ( Purdue University, USA ), Kaiyuan Zhang ( Purdue University, USA ), Yingqi Liu ( Purdue University, USA ), Guangyu Shen ( Purdue University, USA ), Ian Kelk ( Clarifai Inc., USA ), Xiangyu Zhang ( Purdue University, USA )</author></item><item><title>DepthFake: Spoofing 3D Face Authentication with a 2D Photo</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#DepthFake:%20Spoofing%203D%20Face%20Authentication%20with%20a%202D%20Photo</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#DepthFake:%20Spoofing%203D%20Face%20Authentication%20with%20a%202D%20Photo</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zhihao Wu ( Zhejiang University, China ), Yushi Cheng ( Tsinghua University, China ), Jiahui Yang ( Zhejiang University, China ), Xiaoyu Ji ( Zhejiang University, China ), Wenyuan Xu ( Zhejiang University, China )</author></item><item><title>Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Understanding%20the%20(In)Security%20of%20Cross-side%20Face%20Verification%20Systems%20in%20Mobile%20Apps:%20A%20System%20Perspective</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Understanding%20the%20(In)Security%20of%20Cross-side%20Face%20Verification%20Systems%20in%20Mobile%20Apps:%20A%20System%20Perspective</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xiaohan Zhang ( Fudan University, China ), Haoqi Ye ( Fudan University, China ), Ziqi Huang ( Fudan University, China ), Xiao Ye ( Fudan University, China ), Yinzhi Cao ( Johns Hopkins University, USA ), Yuan Zhang ( Fudan University, China ), Min Yang ( Fudan University, China )</author></item><item><title>Breaking Security-Critical Voice Authentication</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Breaking%20Security-Critical%20Voice%20Authentication</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Breaking%20Security-Critical%20Voice%20Authentication</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Andre Kassis ( University of Waterloo, Canada ), Urs Hengartner ( University of Waterloo, Canada )</author></item><item><title>SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20A%20Critical%20Evaluation%20of%20Efficient%20Website%20Fingerprinting%20Defenses</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Nate Mathews ( Rochester Institute of Technology ), James K Holland ( University of Minnesota ), Se Eun Oh ( Ewha Womans University ), Mohammad Saidur Rahman ( Rochester Institute of Technology ), Nicholas Hopper ( University of Minnesota ), Matthew Wright ( Rochester Institute of Technology )</author></item><item><title>Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers&#39; Anti-Fingerprinting Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Fashion%20Faux%20Pas:%20Implicit%20Stylistic%20Fingerprints%20for%20Bypassing%20Browsers&#39;%20Anti-Fingerprinting%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Fashion%20Faux%20Pas:%20Implicit%20Stylistic%20Fingerprints%20for%20Bypassing%20Browsers&#39;%20Anti-Fingerprinting%20Defenses</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xu Lin ( University of Illinois Chicago, United States ), Frederico Araujo ( IBM Research, United States ), Teryl Taylor ( IBM Research, United States ), Jiyong Jang ( IBM Research, United States ), Jason Polakis ( University of Illinois Chicago, United States )</author></item><item><title>Robust Multi-tab Website Fingerprinting Attacks in the Wild</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Robust%20Multi-tab%20Website%20Fingerprinting%20Attacks%20in%20the%20Wild</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Robust%20Multi-tab%20Website%20Fingerprinting%20Attacks%20in%20the%20Wild</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xinhao Deng ( Tsinghua University, China ), Qilei Yin ( Zhongguancun Laboratory, China ), Zhuotao Liu ( Tsinghua University, China ), Xiyuan Zhao ( Tsinghua University, China ), Qi Li ( Tsinghua University, China ), Mingwei Xu ( Tsinghua University, China ), Ke Xu ( Tsinghua University, Beijing ), Jianping Wu ( Tsinghua University, China )</author></item><item><title>Only Pay for What You Leak: Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Only%20Pay%20for%20What%20You%20Leak:%20Leveraging%20Sandboxes%20for%20a%20Minimally%20Invasive%20Browser%20Fingerprinting%20Defense</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Only%20Pay%20for%20What%20You%20Leak:%20Leveraging%20Sandboxes%20for%20a%20Minimally%20Invasive%20Browser%20Fingerprinting%20Defense</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ryan Torok ( Princeton University ), Amit Levy ( Princeton University )</author></item><item><title>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#It%E2%80%99s%20(DOM)%20Clobbering%20Time:%20Attack%20Techniques,%20Prevalence,%20and%20Defenses</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Soheil Khodayari ( CISPA Helmholtz Center for Information Security, Germany ), Giancarlo Pellegrino ( CISPA Helmholtz Center for Information Security, Germany )</author></item><item><title>Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Scaling%20JavaScript%20Abstract%20Interpretation%20to%20Detect%20and%20Exploit%20Node.js%20Taint-style%20Vulnerability</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Scaling%20JavaScript%20Abstract%20Interpretation%20to%20Detect%20and%20Exploit%20Node.js%20Taint-style%20Vulnerability</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mingqing Kang ( Johns Hopkins University ), Yichao Xu ( Johns Hopkins University ), Song Li ( Zhejiang University ), Rigel Gjomemo ( University of Illinois Chicago ), Jianwei Hou ( Renmin University of China ), V.N. Venkatakrishnan ( University of Illinois Chicago ), Yinzhi Cao ( Johns Hopkins University )</author></item><item><title>Sound Verification of Security Protocols: From Design to Interoperable Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Sound%20Verification%20of%20Security%20Protocols:%20From%20Design%20to%20Interoperable%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Sound%20Verification%20of%20Security%20Protocols:%20From%20Design%20to%20Interoperable%20Implementations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Linard Arquint ( ETH Zurich, Switzerland ), Felix A. Wolf ( ETH Zurich, Switzerland ), Joseph Lallemand ( Univ Rennes, CNRS, IRISA, France ), Ralf Sasse ( ETH Zurich, Switzerland ), Christoph Sprenger ( ETH Zurich, Switzerland ), Sven N. Wiesner ( ETH Zurich, Switzerland ), David Basin ( ETH Zurich, Switzerland ), Peter Müller ( ETH Zurich, Switzerland )</author></item><item><title>Typing High-Speed Cryptography against Spectre v1</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Typing%20High-Speed%20Cryptography%20against%20Spectre%20v1</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Typing%20High-Speed%20Cryptography%20against%20Spectre%20v1</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Basavesh Ammanaghatta Shivakumar ( MPI-SP ), Gilles Barthe ( MPI-SP and IMDEA Software Institute ), Benjamin Grégoire ( Inria and Université Côte d&#39;Azur ), Vincent Laporte ( Université de Lorraine, CNRS and Inria ), Tiago Oliviera ( MPI-SP ), Swarn Priya ( Inria and Université Côte d&#39;Azur ), Peter Schwabe ( MPI-SP &amp;amp; Radboud University ), Lucas Tabary-Maujean ( ENS Paris-Saclay )</author></item><item><title>Less is more: refinement proofs for probabilistic proofs</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Less%20is%20more:%20refinement%20proofs%20for%20probabilistic%20proofs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Less%20is%20more:%20refinement%20proofs%20for%20probabilistic%20proofs</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kunming Jiang ( Carnegie Mellon ), Devora Chait-Roth ( NYU ), Zachary DeStefano ( NYU ), Michael Walfish ( NYU ), Thomas Wies ( NYU )</author></item><item><title>OWL: Compositional Verification of Security Protocols via an Information-Flow Type System</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#OWL:%20Compositional%20Verification%20of%20Security%20Protocols%20via%20an%20Information-Flow%20Type%20System</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#OWL:%20Compositional%20Verification%20of%20Security%20Protocols%20via%20an%20Information-Flow%20Type%20System</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Joshua Gancher ( Carnegie Mellon University, USA ), Sydney Gibson ( Carnegie Mellon University, USA ), Pratap Singh ( Carnegie Mellon University, USA ), Samvid Dharanikota ( Carnegie Mellon University, USA ), Bryan Parno ( Carnegie Mellon University, USA )</author></item><item><title>AUC: Accountable Universal Composability</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#AUC:%20Accountable%20Universal%20Composability</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#AUC:%20Accountable%20Universal%20Composability</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mike Graf ( University of Stuttgart ), Ralf Küsters ( University of Stuttgart ), Daniel Rausch ( University of Stuttgart )</author></item><item><title>High-Order Masking of Lattice Signatures in Quasilinear Time</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#High-Order%20Masking%20of%20Lattice%20Signatures%20in%20Quasilinear%20Time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#High-Order%20Masking%20of%20Lattice%20Signatures%20in%20Quasilinear%20Time</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Rafaël del Pino ( PQShield SAS, France ), Thomas Prest ( PQShield SAS, France ), Mélissa Rossi ( ANSSI, France ), Markku-Juhani Saarinen ( PQShield LTD, UK )</author></item><item><title>Practical Timing Side-Channel Attacks on Memory Compression</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Practical%20Timing%20Side-Channel%20Attacks%20on%20Memory%20Compression</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Practical%20Timing%20Side-Channel%20Attacks%20on%20Memory%20Compression</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Martin Schwarzl ( Graz University of Technology ), Pietro Borrello ( Sapienza University of Rome ), Gururaj Saileshwar ( NVIDIA Research ), Hanna Müller ( Graz University of Technology ), Michael Schwarz ( CISPA Helmholtz Center for Information Security ), Daniel Gruss ( Graz University of Technology )</author></item><item><title>TEEzz: Fuzzing Trusted Applications on COTS Android Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#TEEzz:%20Fuzzing%20Trusted%20Applications%20on%20COTS%20Android%20Devices</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Marcel Busch ( EPFL ), Aravind Machiry ( Purdue University ), Chad Spensky ( Allthenticate ), Giovanni Vigna ( University of California, Santa Barbara ), Christopher Kruegel ( University of California, Santa Barbara ), Mathias Payer ( EPFL )</author></item><item><title>Half&amp;Half: Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Half&amp;Half:%20Demystifying%20Intel%E2%80%99s%20Directional%20Branch%20Predictors%20for%20Fast,%20Secure%20Partitioned%20Execution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Half&amp;Half:%20Demystifying%20Intel%E2%80%99s%20Directional%20Branch%20Predictors%20for%20Fast,%20Secure%20Partitioned%20Execution</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hosein Yavarzadeh ( University of California San Diego ), Mohammadkazem Taram ( Purdue University ), Shravan Narayan ( University of California San Diego ), Deian Stefan ( University of California San Diego ), Dean Tullsen ( University of California San Diego )</author></item><item><title>Improving Developers&#39; Understanding of Regex Denial of Service Tools through Anti-Patterns and Fix Strategies</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Improving%20Developers&#39;%20Understanding%20of%20Regex%20Denial%20of%20Service%20Tools%20through%20Anti-Patterns%20and%20Fix%20Strategies</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Improving%20Developers&#39;%20Understanding%20of%20Regex%20Denial%20of%20Service%20Tools%20through%20Anti-Patterns%20and%20Fix%20Strategies</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sk Adnan Hassan ( Virginia Tech, U.S.A. ), Zainab Aamir ( Stony Brook University, U.S.A. ), Dongyoon Lee ( Stony Brook University, U.S.A. ), James C. Davis ( Purdue University, U.S.A. ), Francisco Servant ( University of Málaga, Spain )</author></item><item><title>Practical Program Modularization with Type-Based Dependence Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Practical%20Program%20Modularization%20with%20Type-Based%20Dependence%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Practical%20Program%20Modularization%20with%20Type-Based%20Dependence%20Analysis</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kangjie Lu ( University of Minnesota )</author></item><item><title>WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#WarpAttack:%20Bypassing%20CFI%20through%20Compiler-Introduced%20Double-Fetches</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#WarpAttack:%20Bypassing%20CFI%20through%20Compiler-Introduced%20Double-Fetches</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jianhao Xu ( Nanjing University, China ), Luca Di Bartolomeo ( EPFL, Switzerland ), Flavio Toffalini ( EPFL, Switzerland ), Bing Mao ( Nanjing University, China ), Mathias Payer ( EPFL, Switzerland )</author></item><item><title>SoK: Certified Robustness for Deep Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Certified%20Robustness%20for%20Deep%20Neural%20Networks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Linyi Li ( University of Illinois Urbana-Champaign, USA ), Tao Xie ( Key Laboratory of High Confidence Software Technologies, MoE (Peking University ), China ), Bo Li ( University of Illinois Urbana-Champaign, USA )</author></item><item><title>RAB: Provable Robustness Against Backdoor Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#RAB:%20Provable%20Robustness%20Against%20Backdoor%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Maurice Weber ( ETH Zurich, Switzerland ), Xiaojun Xu ( University of Illinois at Urbana-Champaign, USA ), Bojan Karlas ( ETH Zurich, Switzerland ), Ce Zhang ( ETH Zurich, Switzerland ), Bo Li ( University of Illinois at Urbana-Champaign, USA )</author></item><item><title>ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ObjectSeeker:%20Certifiably%20Robust%20Object%20Detection%20against%20Patch%20Hiding%20Attacks%20via%20Patch-agnostic%20Masking</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ObjectSeeker:%20Certifiably%20Robust%20Object%20Detection%20against%20Patch%20Hiding%20Attacks%20via%20Patch-agnostic%20Masking</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Chong Xiang ( Princeton University ), Alexander Valtchanov ( Princeton University ), Saeed Mahloujifar ( Princeton University ), Prateek Mittal ( Princeton University )</author></item><item><title>PublicCheck: Public Integrity Verification for Services of Run-time Deep Models</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#PublicCheck:%20Public%20Integrity%20Verification%20for%20Services%20of%20Run-time%20Deep%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#PublicCheck:%20Public%20Integrity%20Verification%20for%20Services%20of%20Run-time%20Deep%20Models</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Shuo Wang ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Sharif Abuadbba ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Sidharth Agarwal ( Indian Institute of Technology Delhi, India ), Kristen Moore ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Ruoxi Sun ( CSIRO’s Data61, Australia ), Minhui Xue ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Surya Nepal ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Seyit Camtepe ( CSIRO’s Data61, Australia; Cybersecurity CRC, Australia ), Salil Kanhere ( University of New South Wales, Australia )</author></item><item><title>FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#FedRecover:%20Recovering%20from%20Poisoning%20Attacks%20in%20Federated%20Learning%20using%20Historical%20Information</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xiaoyu Cao ( Duke University ), Jinyuan Jia ( Duke University ), Zaixi Zhang ( University of Science and Technology of China ), Neil Zhenqiang Gong ( Duke University )</author></item><item><title>On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20The%20Empirical%20Effectiveness%20of%20Unrealistic%20Adversarial%20Hardening%20Against%20Realistic%20Adversarial%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#On%20The%20Empirical%20Effectiveness%20of%20Unrealistic%20Adversarial%20Hardening%20Against%20Realistic%20Adversarial%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Salijona Dyrmishi ( University of Luxembourg, Luxembourg ), Salah Ghamizi ( University of Luxembourg, Luxembourg ), Thibault Simonetto ( University of Luxembourg, Luxembourg ), Yves Le Traon ( University of Luxembourg, Luxembourg ), Maxime Cordy ( University of Luxembourg, Luxembourg )</author></item><item><title>Rethinking Searchable Symmetric Encryption</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Rethinking%20Searchable%20Symmetric%20Encryption</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zichen Gui ( ETH Zurich, Switzerland ), Kenneth G. Paterson ( ETH Zurich, Switzerland ), Sikhar Patranabis ( IBM Research, India )</author></item><item><title>Private Collaborative Data Cleaning via Non-Equi PSI</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Collaborative%20Data%20Cleaning%20via%20Non-Equi%20PSI</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Collaborative%20Data%20Cleaning%20via%20Non-Equi%20PSI</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Erik-Oliver Blass ( Airbus, Germany ), Florian Kerschbaum ( University of Waterloo, Canada )</author></item><item><title>SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SPHINCS+C:%20Compressing%20SPHINCS+%20With%20(Almost)%20No%20Cost</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SPHINCS+C:%20Compressing%20SPHINCS+%20With%20(Almost)%20No%20Cost</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Andreas Hülsing ( TU Eindhoven ), Mikhail Kudinov ( TU Eindhoven ), Eyal Ronen ( Tel Aviv University ), Eylon Yogev ( Bar-Ilan University )</author></item><item><title>Threshold Signatures in the Multiverse</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Threshold%20Signatures%20in%20the%20Multiverse</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Threshold%20Signatures%20in%20the%20Multiverse</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Leemon Baird ( Swirlds Labs ), Sanjam Garg ( University of California, Berkeley&amp;amp;NTT Research ), Abhishek Jain ( Johns Hopkins University ), Pratyay Mukherjee ( Supra Oracles ), Rohit Sinha ( Meta ), Mingyuan Wang ( University of California, Berkeley ), Yinuo Zhang ( University of California, Berkeley )</author></item><item><title>FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#FIDO2,%20CTAP%202.1,%20and%20WebAuthn%202:%20Provable%20Security%20and%20Post-Quantum%20Instantiation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Nina Bindel ( SandboxAQ ), Cas Cremers ( CISPA Helmholtz Center for Information Security ), Mang Zhao ( CISPA Helmholtz Center for Information Security )</author></item><item><title>Token meets Wallet: Formalizing Privacy and Revocation for FIDO2</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Token%20meets%20Wallet:%20Formalizing%20Privacy%20and%20Revocation%20for%20FIDO2</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Token%20meets%20Wallet:%20Formalizing%20Privacy%20and%20Revocation%20for%20FIDO2</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lucjan Hanzlik ( CISPA Helmholtz Center for Information Security, Germany ), Julian Loss ( CISPA Helmholtz Center for Information Security, Germany ), Benedikt Wagner ( CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany )</author></item><item><title>SoK: Taxonomy of Attacks on Open-Source Software Supply Chains</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Taxonomy%20of%20Attacks%20on%20Open-Source%20Software%20Supply%20Chains</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Piergiorgio Ladisa ( SAP Security Research, Université de Rennes 1 ), Henrik Plate ( SAP Security Research ), Matias Martinez ( Université Polytechnique Hauts-de-France ), Olivier Barais ( Université de Rennes 1, Inria, IRISA )</author></item><item><title>It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#It%E2%80%99s%20like%20flossing%20your%20teeth:%20On%20the%20Importance%20and%20Challenges%20of%20Reproducible%20Builds%20for%20Software%20Supply%20Chain%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#It%E2%80%99s%20like%20flossing%20your%20teeth:%20On%20the%20Importance%20and%20Challenges%20of%20Reproducible%20Builds%20for%20Software%20Supply%20Chain%20Security</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Marcel Fourné ( Max Planck Institute for Security and Privacy, Bochum, Germany ), Dominik Wermke ( CISPA Helmholtz Center for Information Security, Germany ), William Enck ( North Carolina State University, Raleigh, North Carolina, USA ), Sascha Fahl ( CISPA Helmholtz Center for Information Security, Germany ), Yasemin Acar ( Paderborn University, Germany, George Washington University, USA )</author></item><item><title>Always Contribute Back: A Qualitative Study on Security Challenges of the Open Source Supply Chain</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Always%20Contribute%20Back:%20A%20Qualitative%20Study%20on%20Security%20Challenges%20of%20the%20Open%20Source%20Supply%20Chain</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Always%20Contribute%20Back:%20A%20Qualitative%20Study%20on%20Security%20Challenges%20of%20the%20Open%20Source%20Supply%20Chain</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Dominik Wermke ( CISPA Helmholtz Center for Information Security ), Jan H. Klemmer ( Leibniz University Hannover ), Noah Wöhler ( CISPA Helmholtz Center for Information Security ), Juliane Schmüser ( CISPA Helmholtz Center for Information Security ), Harshini Sri Ramulu ( Paderborn University ), Yasemin Acar ( Paderborn University, George Washington University ), Sascha Fahl ( CISPA Helmholtz Center for Information Security )</author></item><item><title>Continuous Intrusion: Characterizing the Security of Continuous Integration Services</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Continuous%20Intrusion:%20Characterizing%20the%20Security%20of%20Continuous%20Integration%20Services</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Continuous%20Intrusion:%20Characterizing%20the%20Security%20of%20Continuous%20Integration%20Services</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yacong Gu ( Qi An Xin Technology Research Institute, China ), Lingyun Ying ( Qi An Xin Technology Research Institute, China ), Huajun Chai ( Qi An Xin Technology Research Institute, China ), Chu Qiao ( University of Delaware, USA ), Haixin Duan ( Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS, China ), Xing Gao ( University of Delaware, USA )</author></item><item><title>Investigating Package Related Security Threats in Software Registries</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Investigating%20Package%20Related%20Security%20Threats%20in%20Software%20Registries</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Investigating%20Package%20Related%20Security%20Threats%20in%20Software%20Registries</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yacong Gu ( QI-ANXIN Technology Research Institute, China ), Lingyun Ying ( QI-ANXIN Technology Research Institute, China ), Yingyuan Pu ( Ocean University of China; QI-ANXIN Technology Research Institute, China ), Xiao Hu ( QI-ANXIN Technology Research Institute, China ), Huajun Chai ( QI-ANXIN Technology Research Institute, China ), Ruimin Wang ( Southeast University; QI-ANXIN Technology Research Institute, China ), Xing Gao ( University of Delaware, USA ), Haixin Duan ( Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS, China )</author></item><item><title>ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ShadowNet:%20A%20Secure%20and%20Efficient%20On-device%20Model%20Inference%20System%20for%20Convolutional%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ShadowNet:%20A%20Secure%20and%20Efficient%20On-device%20Model%20Inference%20System%20for%20Convolutional%20Neural%20Networks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zhichuang Sun ( Google ), Ruimin Sun ( Florida International University ), Changming Liu ( Northeastern University ), Amrita Roy Chowdhury ( University of California, San Diego ), Long Lu ( Northeastern University ), Somesh Jha ( University of Wisconsin-Madison )</author></item><item><title>Deepfake Text Detection: Limitations and Opportunities</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Deepfake%20Text%20Detection:%20Limitations%20and%20Opportunities</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jiameng Pu ( Virginia Tech, USA ), Zain Sarwar ( University Of Chicago, USA ), Sifat Muhammad Abdullah ( Virginia Tech, USA ), Abdullah Rehman ( Virginia Tech, USA ), Yoonjin Kim ( Virginia Tech, USA ), Parantapa Bhattacharya ( University Of Virginia, USA ), Mobin Javed ( LUMS, Pakistan ), Bimal Viswanath ( Virginia Tech, USA )</author></item><item><title>StyleFool: Fooling Video Classification Systems via Style Transfer</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#StyleFool:%20Fooling%20Video%20Classification%20Systems%20via%20Style%20Transfer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#StyleFool:%20Fooling%20Video%20Classification%20Systems%20via%20Style%20Transfer</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yuxin Cao ( Shenzhen International Graduate School, Tsinghua University, China ), Xi Xiao ( Shenzhen International Graduate School, Tsinghua University, China ), Ruoxi Sun ( CSIRO&#39;s Data61, Australia ), Derui Wang ( CSIRO&#39;s Data61, Australia ), Minhui Xue ( CSIRO&#39;s Data61, Australia ), Sheng Wen ( Swinburne University of Technology, Australia )</author></item><item><title>GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#GeeSolver:%20A%20Generic,%20Efficient,%20and%20Effortless%20Solver%20with%20Self-Supervised%20Learning%20for%20Breaking%20Text%20Captchas</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#GeeSolver:%20A%20Generic,%20Efficient,%20and%20Effortless%20Solver%20with%20Self-Supervised%20Learning%20for%20Breaking%20Text%20Captchas</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ruijie Zhao ( Shanghai Jiao Tong University ), Xianwen Deng ( Shanghai Jiao Tong University ), Yanhao Wang ( QI-ANXIN ), Zhicong Yan ( Shanghai Jiao Tong University ), Zhengguang Han ( Shanghai Jiao Tong University ), Libo Chen ( Shanghai Jiao Tong University ), Zhi Xue ( Shanghai Jiao Tong University ), Yijun Wang ( Shanghai Jiao Tong University )</author></item><item><title>TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#TrojanModel:%20A%20Practical%20Trojan%20Attack%20against%20Automatic%20Speech%20Recognition%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#TrojanModel:%20A%20Practical%20Trojan%20Attack%20against%20Automatic%20Speech%20Recognition%20Systems</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Wei Zong ( University of Wollongong, Australia ), Yang-Wai Chow ( University of Wollongong, Australia ), Willy Susilo ( University of Wollongong, Australia ), Kien Do ( Deakin University, Australia ), Svetha Venkatesh ( Deakin University, Australia )</author></item><item><title>REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#REGA:%20Scalable%20Rowhammer%20Mitigation%20with%20Refresh-Generating%20Activations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#REGA:%20Scalable%20Rowhammer%20Mitigation%20with%20Refresh-Generating%20Activations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Michele Marazzi ( ETH Zurich ), Flavien Solt ( ETH Zurich ), Patrick Jattke ( ETH Zurich ), Kubo Takashi ( Zentel Japan ), Kaveh Razavi ( ETH Zurich )</author></item><item><title>CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#CSI:Rowhammer%20-%20Cryptographic%20Security%20and%20Integrity%20against%20Rowhammer</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jonas Juffinger ( Lamarr Security Research, Graz University of Technology, Austria ), Lukas Lamster ( Graz University of Technology, Austria ), Andreas Kogler ( Graz University of Technology, Austria ), Maria Eichlseder ( Graz University of Technology, Austria ), Moritz Lipp ( Amazon Web Services, Austria ), Daniel Gruss ( Graz University of Technology, Austria )</author></item><item><title>Jolt: Recovering TLS Signing Keys via Rowhammer Faults</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Jolt:%20Recovering%20TLS%20Signing%20Keys%20via%20Rowhammer%20Faults</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Jolt:%20Recovering%20TLS%20Signing%20Keys%20via%20Rowhammer%20Faults</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Koksal Mus ( Worcester Polytechnic Institute ), Yarkın Doröz ( Worcester Polytechnic Institute ), M. Caner Tol ( Worcester Polytechnic Institute ), Kristi Rahman ( Worcester Polytechnic Institute ), Berk Sunar ( Worcester Polytechnic Institute )</author></item><item><title>Hide and Seek with Spectres: Efficient discovery of speculative vulnerabilities with random testing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Hide%20and%20Seek%20with%20Spectres:%20Efficient%20discovery%20of%20speculative%20vulnerabilities%20with%20random%20testing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Hide%20and%20Seek%20with%20Spectres:%20Efficient%20discovery%20of%20speculative%20vulnerabilities%20with%20random%20testing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Oleksii Oleksenko and Boris Köpf ( Microsoft Research ), Marco Guarnieri ( IMDEA Software Institute ), Mark Silberstein ( Technion )</author></item><item><title>Spectre Declassified: Reading from the Right Place at the Wrong Time</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Spectre%20Declassified:%20Reading%20from%20the%20Right%20Place%20at%20the%20Wrong%20Time</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Basavesh Ammanaghatta Shivakumar ( Max Planck Institute for Security and Privacy, Germany ), Jack Barnes ( The University of Adelaide, Australia ), Gilles Barthe ( Max Planck Institute for Security and Privacy, Germany; IMDEA Software Institute, Spain ), Sunjay Cauligi ( Max Planck Institute for Security and Privacy, Germany ), Chitchanok Chuengsatiansup ( The University of Adelaide, Australia ), Daniel Genkin ( Georgia Institute of Technology, USA ), Sioli O&#39;Connell ( The University of Adelaide, Australia ), Peter Schwabe ( Max Planck Institute for Security and Privacy, Germany; Radboud University, Netherlands ), Rui Qi Sim ( The University of Adelaide, Australia ), Yuval Yarom ( The University of Adelaide, Australia )</author></item><item><title>Volttack: Control IoT Devices by Manipulating Power Supply Voltage</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Volttack:%20Control%20IoT%20Devices%20by%20Manipulating%20Power%20Supply%20Voltage</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Volttack:%20Control%20IoT%20Devices%20by%20Manipulating%20Power%20Supply%20Voltage</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kai Wang ( Zhejiang University, China ), Shilin Xiao ( Zhejiang University, China ), Xiaoyu Ji ( Zhejiang University, China ), Chen Yan ( Zhejiang University, China ), Chaohao Li ( Hangzhou Hikvision Digital Technology Co., Ltd., China ), Wenyuan Xu ( Zhejiang University, China )</author></item><item><title>Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Inducing%20Wireless%20Chargers%20to%20Voice%20Out%20for%20Inaudible%20Command%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Donghui Dai ( The Hong Kong Polytechnic University, China ), Zhenlin An ( The Hong Kong Polytechnic University, China ), Lei Yang ( The Hong Kong Polytechnic University, China )</author></item><item><title>mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#mmSpoof:%20Resilient%20Spoofing%20of%20Automotive%20Millimeter-wave%20Radars%20using%20Reflect%20Array</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#mmSpoof:%20Resilient%20Spoofing%20of%20Automotive%20Millimeter-wave%20Radars%20using%20Reflect%20Array</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Rohith Reddy Vennam ( University of California San Diego ), Ish Kumar Jain ( University of California San Diego ), Kshitiz Bansal ( University of California San Diego ), Joshua Orozco ( University of California San Diego ), Puja Shukla ( University of California San Diego ), Aanjhan Ranganathan ( Northeastern University ), Dinesh Bharadia ( University of California San Diego )</author></item><item><title>PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#PLA-LiDAR:%20Physical%20Laser%20Attacks%20against%20LiDAR-based%203D%20Object%20Detection%20in%20Autonomous%20Vehicle</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zizhi Jin ( Zhejiang University ), Ji Xiaoyu ( Zhejiang University ), Yushi Cheng ( Tsinghua University ), Bo Yang ( Zhejiang University ), Chen Yan ( Zhejiang University ), Wenyuan Xu ( Zhejiang University )</author></item><item><title>mmEcho: A mmWave-based Acoustic Eavesdropping Method</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#mmEcho:%20A%20mmWave-based%20Acoustic%20Eavesdropping%20Method</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#mmEcho:%20A%20mmWave-based%20Acoustic%20Eavesdropping%20Method</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Pengfei Hu ( Shandong University ), Wenhao Li ( Shandong University ), Riccardo Spolaor ( Shandong University ), Xiuzhen Cheng ( Shandong University )</author></item><item><title>Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Side%20Eye:%20Characterizing%20the%20Limits%20of%20POV%20Acoustic%20Eavesdropping%20from%20Smartphone%20Cameras%20with%20Rolling%20Shutters%20and%20Movable%20Lenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Side%20Eye:%20Characterizing%20the%20Limits%20of%20POV%20Acoustic%20Eavesdropping%20from%20Smartphone%20Cameras%20with%20Rolling%20Shutters%20and%20Movable%20Lenses</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yan Long ( University of Michigan, USA ), Pirouz Naghavi ( University of Florida, USA ), Blas Kojusner ( University of Florida, USA ), Kevin Butler ( University of Florida, USA ), Sara Rampazzi ( University of Florida, USA ), Kevin Fu ( University of Michigan, USA )</author></item><item><title>ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ADI:%20Adversarial%20Dominating%20Inputs%20in%20Vertical%20Federated%20Learning%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ADI:%20Adversarial%20Dominating%20Inputs%20in%20Vertical%20Federated%20Learning%20Systems</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Qi Pang ( Carnegie Mellon University, USA ), Yuanyuan Yuan ( Hong Kong University of Science and Technology, Hong Kong SAR ), Shuai Wang ( Hong Kong University of Science and Technology, Hong Kong SAR ), Wenting Zheng ( Carnegie Mellon University, USA )</author></item><item><title>3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#3DFed:%20Adaptive%20and%20Extensible%20Framework%20for%20Covert%20Backdoor%20Attack%20in%20Federated%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#3DFed:%20Adaptive%20and%20Extensible%20Framework%20for%20Covert%20Backdoor%20Attack%20in%20Federated%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Haoyang LI ( The Hong Kong Polytechnic University ), Qingqing Ye ( The Hong Kong Polytechnic University ), Haibo Hu ( The Hong Kong Polytechnic University ), Jin Li ( Guangzhou University ), Leixia Wang ( Renmin University of China ), Chengfang Fang ( Huawei International, Singapore ), Jie Shi ( Huawei International, Singapore )</author></item><item><title>Scalable and Privacy-Preserving Federated Principal Component Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Scalable%20and%20Privacy-Preserving%20Federated%20Principal%20Component%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Scalable%20and%20Privacy-Preserving%20Federated%20Principal%20Component%20Analysis</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>David Froelicher ( MIT, USA ), Hyunghoon Cho ( Broad Institute of MIT and Harvard, USA ), Manaswitha Edupalli ( Broad Institute of MIT and Harvard, USA ), Joao Sa Sousa ( EPFL, Switzerland ), Jean-Philippe Bossuat ( Tune Insight SA, Switzerland ), Apostolos Pyrgelis ( EPFL, Switzerland ), Juan R. Troncoso-Pastoriza ( Tune Insight SA, Switzerland ), Bonnie Berger ( MIT, USA ), Jean-Pierre Hubaux ( EPFL, Switzerland )</author></item><item><title>Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Private,%20Efficient,%20and%20Accurate:%20Protecting%20Models%20Trained%20by%20Multi-party%20Learning%20with%20Differential%20Privacy</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Wenqiang Ruan ( Fudan University, China ), Mingxin Xu ( Fudan University, China ), Wenjing Fnag ( Ant Group, China ), Li Wang ( Ant Group, China ), Lei Wang ( Ant Group, China ), Weili Han ( Fudan University, China )</author></item><item><title>Spectral-DP: Differentially Private Deep Learning through Spectral Perturbation and Filtering</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Spectral-DP:%20Differentially%20Private%20Deep%20Learning%20through%20Spectral%20Perturbation%20and%20Filtering</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Spectral-DP:%20Differentially%20Private%20Deep%20Learning%20through%20Spectral%20Perturbation%20and%20Filtering</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ce Feng ( Lehigh University ), Nuo Xu ( Lehigh University ), Wujie Wen ( Lehigh University ), Parv Venkitasubramaniam ( Lehigh University ), Caiwen Ding ( University of Connecticut )</author></item><item><title>ELSA: Secure Aggregation for Federated Learning with Malicious Actors</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ELSA:%20Secure%20Aggregation%20for%20Federated%20Learning%20with%20Malicious%20Actors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ELSA:%20Secure%20Aggregation%20for%20Federated%20Learning%20with%20Malicious%20Actors</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mayank Rathee ( University of California, Berkeley, USA ), Conghao Shen ( Stanford University, USA ), Sameer Wagh ( Devron Corporation, USA ), Raluca Ada Popa ( University of California, Berkeley, USA )</author></item><item><title>No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#No%20One%20Drinks%20From%20the%20Firehose:%20How%20Organizations%20Filter%20and%20Prioritize%20Vulnerability%20Information</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Stephanie de Smale ( National Cyber Security Centre, The Netherlands &amp;amp; Delft University of Technology, The Netherlands ), Rik van Dijk ( National Cyber Security Centre, The Netherlands ), Xander Bouwman ( Delft University of Technology, The Netherlands ), Jeroen van der Ham ( National Cyber Security Centre, The Netherlands &amp;amp; University of Twente, The Netherlands ), Michel van Eeten ( Delft University of Technology, The Netherlands )</author></item><item><title>Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Vulnerability%20Discovery%20for%20All:%20Experiences%20of%20Marginalization%20in%20Vulnerability%20Discovery</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kelsey R. Fulton ( University of Maryland ), Samantha Katcher ( Tufts University ), Kevin Song ( University of Chicago ), Marshini Chetty ( University of Chicago ), Michelle L. Mazurek ( University of Maryland ), Daniel Votipka ( Tufts University ), Chloé Messdaghi ( Impactive Consulting )</author></item><item><title>We are a startup to the core: A qualitative interview study on the security and privacy development practices in Turkish software startups</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#We%20are%20a%20startup%20to%20the%20core:%20%20%20A%20qualitative%20interview%20study%20on%20the%20security%20and%20privacy%20development%20practices%20in%20Turkish%20software%20startups</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#We%20are%20a%20startup%20to%20the%20core:%20%20%20A%20qualitative%20interview%20study%20on%20the%20security%20and%20privacy%20development%20practices%20in%20Turkish%20software%20startups</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Dilara Kekulluoglu ( University of Edinburgh, UK ), Yasemin Acar ( The George Washington University, USA )</author></item><item><title>How technical do you get? I&#39;m an English teacher: Teaching and Learning Cybersecurity and AI Ethics in High School</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#How%20technical%20do%20you%20get?%20I&#39;m%20an%20English%20teacher:%20Teaching%20and%20Learning%20Cybersecurity%20and%20AI%20Ethics%20in%20High%20School</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zachary Kilhoffer ( University of Illinois at Urbana-Champaign, USA ), Zhixuan Zhou ( University of Illinois at Urbana-Champaign, USA ), Firmiana Wang ( University of Illinois Laboratory High School, USA ), Fahad Tamton ( University of Illinois at Urbana-Champaign, USA ), Yun Huang ( University of Illinois at Urbana-Champaign, USA ), Pilyoung Kim ( University of Denver, USA ), Tom Yeh ( University of Colorado Boulder, USA ), Yang Wang ( University of Illinois at Urbana-Champaign, USA )</author></item><item><title>Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Skilled%20or%20Gullible?%20Gender%20Stereotypes%20Related%20to%20Computer%20Security%20and%20Privacy</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Miranda Wei ( University of Washington, USA ), Pardis Emami-Naeini ( Duke University, USA ), Franziska Roesner ( University of Washington, USA ), Tadayoshi Kohno ( University of Washington, USA )</author></item><item><title>Everybody’s Got ML, Tell Me What Else You Have: Practitioners&#39; Perception of ML-Based Security Tools and Explanations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Everybody%E2%80%99s%20Got%20ML,%20Tell%20Me%20What%20Else%20You%20Have:%20Practitioners&#39;%20Perception%20of%20ML-Based%20Security%20Tools%20and%20Explanations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Everybody%E2%80%99s%20Got%20ML,%20Tell%20Me%20What%20Else%20You%20Have:%20Practitioners&#39;%20Perception%20of%20ML-Based%20Security%20Tools%20and%20Explanations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jaron Mink ( University of Illinois at Urbana-Champaign ), Hadjer Benkraouda ( University of Illinois at Urbana-Champaign ), Limin Yang ( University of Illinois at Urbana-Champaign ), Arridhana Ciptadi ( Truera ), Ali Ahmadzadeh ( Blue Hexagon ), Daniel Votipka ( Tufts University ), Gang Wang ( University of Illinois at Urbana-Champaign )</author></item><item><title>Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Precise%20Detection%20of%20Kernel%20Data%20Races%20with%20Probabilistic%20Lockset%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Precise%20Detection%20of%20Kernel%20Data%20Races%20with%20Probabilistic%20Lockset%20Analysis</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Gabriel Ryan ( Columbia University ), Abhishek Shah ( Columbia University ), Dongdong She ( Columbia University ), Suman Jana ( Columbia University )</author></item><item><title>SEGFUZZ: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SEGFUZZ:%20Segmentizing%20Thread%20Interleaving%20to%20Discover%20Kernel%20Concurrency%20Bugs%20through%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SEGFUZZ:%20Segmentizing%20Thread%20Interleaving%20to%20Discover%20Kernel%20Concurrency%20Bugs%20through%20Fuzzing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Dae R. Jeong ( School of Computing, KAIST ), Byoungyoung Lee ( Department of Electrical and Computer Engineering, Seoul National University ), Insik Shin ( School of Computing, KAIST ), Youngjin Kwon ( School of Computing, KAIST )</author></item><item><title>AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#AEM:%20Facilitating%20Cross-Version%20Exploitability%20Assessment%20of%20Linux%20Kernel%20Vulnerabilities</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zheyue Jiang ( Fudan University ), Yuan Zhang ( Fudan University ), Jun Xu ( University of Utah ), Xinqian Sun ( Fudan University ), Zhuang Liu ( Fudan University ), Min Yang ( Fudan University )</author></item><item><title>When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#When%20Top-down%20Meets%20Bottom-up:%20Detecting%20and%20Exploiting%20Use-After-Cleanup%20Bugs%20in%20Linux%20Kernel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#When%20Top-down%20Meets%20Bottom-up:%20Detecting%20and%20Exploiting%20Use-After-Cleanup%20Bugs%20in%20Linux%20Kernel</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lin Ma ( Zhejiang University, China ), Duoming Zhou ( Zhejiang University, China ), Hanjie Wu ( Carnegie Mellon University, USA ), Yajin Zhou ( Zhejiang University, China ), Rui Chang ( Zhejiang University, China ), Hao Xiong ( Zhejiang University, China ), Lei Wu ( Zhejiang University, China ), Kui Ren ( Zhejiang University, China )</author></item><item><title>RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#RSFuzzer:%20Discovering%20Deep%20SMI%20Handler%20Vulnerabilities%20in%20UEFI%20Firmware%20with%20Hybrid%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#RSFuzzer:%20Discovering%20Deep%20SMI%20Handler%20Vulnerabilities%20in%20UEFI%20Firmware%20with%20Hybrid%20Fuzzing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jiawei Yin ( Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Menghao Li ( Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Yuekang Li ( Nanyang Technological University ), Yong Yu ( Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Boru Lin ( Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Yanyan zou ( Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Yang Liu ( Nanyang Technological University ), Wei Huo ( nstitute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; Beijing Key Laboratory of Network Security and Protection Technology ), Jingling Xue ( UNSW Sydney )</author></item><item><title>A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#A%20Theory%20to%20Instruct%20Differentially-Private%20Learning%20via%20Clipping%20Bias%20Reduction</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#A%20Theory%20to%20Instruct%20Differentially-Private%20Learning%20via%20Clipping%20Bias%20Reduction</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hanshen Xiao ( MIT ), Zihang Xiang ( KAUST ), Di Wang ( KAUST ), Srinivas Devadas ( MIT )</author></item><item><title>Continual Observation under User-level Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Continual%20Observation%20under%20User-level%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Continual%20Observation%20under%20User-level%20Differential%20Privacy</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Wei Dong ( Hong Kong University of Science and Technology, China ), Qiyao Luo ( Hong Kong University of Science and Technology, China ), Ke Yi ( Hong Kong University of Science and Technology, China )</author></item><item><title>Locally Differentially Private Frequency Estimation Based on Convolution Framework</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Locally%20Differentially%20Private%20Frequency%20Estimation%20Based%20on%20Convolution%20Framework</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Locally%20Differentially%20Private%20Frequency%20Estimation%20Based%20on%20Convolution%20Framework</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Huiyu Fang ( Southeast University ), Liquan Chen ( Southeast University ), Yali Liu ( Jiangsu Normal University ), Yuan Gao ( Southeast University )</author></item><item><title>TELEPATH: A Minecraft-based Covert Communication System</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#TELEPATH:%20A%20Minecraft-based%20Covert%20Communication%20System</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#TELEPATH:%20A%20Minecraft-based%20Covert%20Communication%20System</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Zhen Sun ( Cornell Tech ), Vitaly Shmatikov ( Cornell Tech )</author></item><item><title>Discop: Provably Secure Steganography in Practice Based on “Distribution Copies”</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Discop:%20Provably%20Secure%20Steganography%20in%20Practice%20Based%20on%20%E2%80%9CDistribution%20Copies%E2%80%9D</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Discop:%20Provably%20Secure%20Steganography%20in%20Practice%20Based%20on%20%E2%80%9CDistribution%20Copies%E2%80%9D</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jinyang Ding ( University of Science and Technology of China, China ), Kejiang Chen ( University of Science and Technology of China, China ), Yaofei Wang ( Hefei University of Technology, China ), Na Zhao ( University of Science and Technology of China, China ), Weiming Zhang ( University of Science and Technology of China, China ), Nenghai Yu ( University of Science and Technology of China, China )</author></item><item><title>SQUIP: Exploiting the Scheduler Queue Contention Side Channel</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SQUIP:%20Exploiting%20the%20Scheduler%20Queue%20Contention%20Side%20Channel</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Stefan Gast ( Lamarr Security Research, Graz University of Technology ), Jonas Juffinger ( Lamarr Security Research, Graz University of Technology ), Martin Schwarzl ( Graz University of Technology ), Gururaj Saileshwar ( Georgia Institute of Technology ), Andreas Kogler ( Graz University of Technology ), Simone Franza ( Graz University of Technology ), Markus Köstl ( Graz University of Technology ), Daniel Gruss ( Lamarr Security Research, Graz University of Technology )</author></item><item><title>Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Scatter%20and%20Split%20Securely:%20Defeating%20Cache%20Contention%20and%20Occupancy%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Scatter%20and%20Split%20Securely:%20Defeating%20Cache%20Contention%20and%20Occupancy%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lukas Giner ( Graz University of Technology, Austria ), Stefan Steinegger ( Graz University of Technology, Austria ), Antoon Purnal ( Ku Leuven, Belgium ), Maria Eichlseder ( Graz University of Technology, Austria ), Thomas Unterluggauer ( Intel Corporation ), Stefan Mangard ( Graz University of Technology, Austria ), Daniel Gruss ( Graz University of Technology, Austria )</author></item><item><title>DevIOus: Device-Driven Side-Channel Attacks on the IOMMU</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#DevIOus:%20Device-Driven%20Side-Channel%20Attacks%20on%20the%20IOMMU</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#DevIOus:%20Device-Driven%20Side-Channel%20Attacks%20on%20the%20IOMMU</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Taehun Kim ( Korea University, Republic of Korea ), Hyeongjin Park ( Korea University, Republic of Korea ), Seokmin Lee ( Korea University, Republic of Korea ), Seunghee Shin ( The State University of New York at Binghamton, USA ), Junbeom Hur ( Korea University, Republic of Korea ), Youngjoo Shin ( Korea University, Republic of Korea )</author></item><item><title>TBD</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#TBD</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#TBD</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate></item><item><title>A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#A%20Security%20RISC:%20Microarchitectural%20Attacks%20on%20Hardware%20RISC-V%20CPUs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#A%20Security%20RISC:%20Microarchitectural%20Attacks%20on%20Hardware%20RISC-V%20CPUs</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lukas Gerlach ( CISPA Helmholtz Center for Information Security ), Daniel Weber ( CISPA Helmholtz Center for Information Security ), Ruiyi Zhang ( CISPA Helmholtz Center for Information Security ), Michael Schwarz ( CISPA Helmholtz Center for Information Security )</author></item><item><title>Examining Zero-Shot Vulnerability Repair with Large Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Examining%20Zero-Shot%20Vulnerability%20Repair%20with%20Large%20Language%20Models</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hammond Pearce ( New York University ), Benjamin Tan ( University of Calgary ), Baleegh Ahmad ( New York University ), Ramesh Karri ( New York University ), Brendan Dolan-Gavitt ( New York University )</author></item><item><title>Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Callee:%20Recovering%20Call%20Graphs%20for%20Binaries%20with%20Transfer%20and%20Contrastive%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Callee:%20Recovering%20Call%20Graphs%20for%20Binaries%20with%20Transfer%20and%20Contrastive%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Wenyu Zhu ( Tsinghua University &amp;amp; BNRist, China ), Zhiyao Feng ( Tsinghua University &amp;amp; BNRist, China ), Zihan Zhang ( Tsinghua University &amp;amp; BNRist, China ), Jianjun Chen ( Tsinghua University &amp;amp; Zhongguancun Laboratory, China ), Zhijian Ou ( Tsinghua University, China ), Min Yang ( Fudan University, China ), Chao Zhang ( Tsinghua University &amp;amp; BNRist &amp;amp; Zhongguancun Laboratory, China )</author></item><item><title>XFL: Naming Functions in Binaries with Extreme Multi-label Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#XFL:%20Naming%20Functions%20in%20Binaries%20with%20Extreme%20Multi-label%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#XFL:%20Naming%20Functions%20in%20Binaries%20with%20Extreme%20Multi-label%20Learning</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>James Patrick-Evans ( Royal Holloway, University of London ), Moritz Dannehl ( Bundeswehr University Munich ), Johannes Kinder ( Bundeswehr University Munich )</author></item><item><title>D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#D-ARM:%20Disassembling%20ARM%20Binaries%20by%20Lightweight%20Superset%20Instruction%20Interpretation%20and%20Graph%20Modeling</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yapeng Ye ( Purdue University, USA ), Zhuo Zhang ( Purdue University, USA ), Qingkai Shi ( Purdue University, USA ), Yousra Aafer ( University of Waterloo, Canada ), Xiangyu Zhang ( Purdue University, USA )</author></item><item><title>GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#GraphSPD:%20Graph-Based%20Security%20Patch%20Detection%20with%20Enriched%20Code%20Semantics</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Shu Wang ( George Mason University, USA ), Xinda Wang ( George Mason University, USA ), Kun Sun ( George Mason University, USA ), Sushil Jajodia ( George Mason University, USA ), Haining Wang ( Virginia Tech, USA ), Qi Li ( Tsinghua University, China )</author></item><item><title>Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Effective%20ReDoS%20Detection%20by%20Principled%20Vulnerability%20Modeling%20and%20Exploit%20Generation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Effective%20ReDoS%20Detection%20by%20Principled%20Vulnerability%20Modeling%20and%20Exploit%20Generation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xinyi Wang ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Cen Zhang ( Nanyang Technological University ), Yeting Li ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Zhiwu Xu ( Shenzhen University ), Shuailin Huang ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Yi Liu ( Nanyang Technological University ), Yican Yao ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Yang Xiao ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Yanyan Zou ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Yang Liu ( Institute of Information Engineering, Chinese Academy of Sciences, China ), Wei Huo ( Institute of Information Engineering, Chinese Academy of Sciences, China )</author></item><item><title>SoK: Decentralized Finance (DeFi) Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Decentralized%20Finance%20(DeFi)%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20Decentralized%20Finance%20(DeFi)%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Liyi Zhou ( Imperial College London ), Xihan Xiong ( Imperial College London ), Jens Ernstberger ( Technical University of Munich ), Stefanos Chaliasos ( Imperial College London ), Zhipeng Wang ( Imperial College London ), Ye Wang ( University of Macau ), Kaihua Qin ( Imperial College London ), Roger Wattenhofer ( ETH Zurich ), Dawn Song ( UC Berkeley ), Arthur Gervais ( University College London )</author></item><item><title>BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#BlindHub:%20Bitcoin-Compatible%20Privacy-Preserving%20Payment%20Channel%20Hubs%20Supporting%20Variable%20Amounts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#BlindHub:%20Bitcoin-Compatible%20Privacy-Preserving%20Payment%20Channel%20Hubs%20Supporting%20Variable%20Amounts</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xianrui Qin ( The University of Hong Kong ), Shimin Pan ( The University of Hong Kong ), Arash Mirzaei ( Monash University ), Zhimei Sui ( Monash University ), Oguzhan Ersoy ( Radboud University and Delft University of Technology ), Amin Sakzad ( Monash University ), Muhammed Esgin ( Monash University and CSIRO’s Data61 ), Joseph K. Liu ( Monash University ), Jiangshan Yu ( Monash University ), Tsz Hon Yuen ( The University of Hong Kong )</author></item><item><title>Optimistic Fast Confirmation While Tolerating Malicious Majority in Blockchains</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Optimistic%20Fast%20Confirmation%20While%20Tolerating%20Malicious%20Majority%20in%20Blockchains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Optimistic%20Fast%20Confirmation%20While%20Tolerating%20Malicious%20Majority%20in%20Blockchains</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ruomu Hou ( National University of Singapore ), Haifeng Yu ( National University of Singapore )</author></item><item><title>Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Clockwork%20Finance:%20Automated%20Analysis%20of%20Economic%20Security%20in%20Smart%20Contracts</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Kushal Babel ( Cornell Tech ), Philip Daian ( Cornell Tech ), Mahimna Kelkar ( Cornell Tech ), Ari Juels ( Cornell Tech )</author></item><item><title>Tyr: Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Tyr:%20Finding%20Consensus%20Failure%20Bugs%20in%20Blockchain%20System%20with%20Behaviour%20Divergent%20Model</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Tyr:%20Finding%20Consensus%20Failure%20Bugs%20in%20Blockchain%20System%20with%20Behaviour%20Divergent%20Model</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yuanliang Chen ( Tsinghua University ), Fuchen Ma ( Tsinghua University ), Yuanhang Zhou ( Tsinghua University ), Yu Jiang ( Tsinghua University ), Ting Chen ( University of Electronic Science and Technology of China ), Jiaguang Sun ( Tsinghua University )</author></item><item><title>Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Leaking%20Arbitrarily%20Many%20Secrets:%20Any-out-of-Many%20Proofs%20and%20Applications%20to%20RingCT%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Leaking%20Arbitrarily%20Many%20Secrets:%20Any-out-of-Many%20Proofs%20and%20Applications%20to%20RingCT%20Protocols</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Tianyu Zheng ( The Hong Kong Polytechnic University ), Shang Gao ( The Hong Kong Polytechnic University ), Yubo Song ( Southeast University ), Bin Xiao ( The Hong Kong Polytechnic University )</author></item><item><title>Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Could%20you%20clean%20up%20the%20Internet%20with%20a%20Pit%20of%20Tar?%20Investigating%20tarpit%20feasibility%20on%20Internet%20worms</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Harm Griffioen ( Hasso Plattner Institute for Digital Engineering, University of Potsdam ), Christian Doerr ( Hasso Plattner Institute for Digital Engineering, University of Potsdam )</author></item><item><title>Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Beyond%20Phish:%20Toward%20Detecting%20Fraudulent%20e-Commerce%20Websites%20at%20Scale</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Beyond%20Phish:%20Toward%20Detecting%20Fraudulent%20e-Commerce%20Websites%20at%20Scale</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Marzieh Bitaab ( Arizona State University ), Haehyun Cho ( Soongsil University ), Adam Oest ( PayPal, Inc. ), Zhuoer Lyu ( Arizona State University ), Wei Wang ( Palo Alto Networks ), Jorij Abraham ( Scam Adviser ), Ruoyu Wang ( Arizona State University ), Tiffany Bao ( Arizona State University ), Yan Shoshitaishvili ( Arizona State University ), Adam Doupé ( Arizona State University )</author></item><item><title>Limits of I/O Based Ransomware Detection: An Imitation Based Attack</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Limits%20of%20I/O%20Based%20Ransomware%20Detection:%20An%20Imitation%20Based%20Attack</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Limits%20of%20I/O%20Based%20Ransomware%20Detection:%20An%20Imitation%20Based%20Attack</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Chijin Zhou ( Tsinghua University, China ), Lihua Guo ( Tsinghua University, China ), Yiwei Hou ( Tsinghua University, China ), Zhenya Ma ( Tsinghua University, China ), Quan Zhang ( Tsinghua University, China ), Mingzhe Wang ( Tsinghua University, China ), Zhe Liu ( Nanjing University of Aeronautics and Astronautics, China ), Yu Jiang ( Tsinghua University, China )</author></item><item><title>From Grim Reality to Practical Solution: Malware Classification in Real-World Noise</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#From%20Grim%20Reality%20to%20Practical%20Solution:%20Malware%20Classification%20in%20Real-World%20Noise</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#From%20Grim%20Reality%20to%20Practical%20Solution:%20Malware%20Classification%20in%20Real-World%20Noise</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xian Wu ( Northwestern University ), Wenbo Guo ( UC Berkeley ), Jia Yan ( Penn State ), Baris Coskun ( AWS ), Xinyu Xing ( Northwestern University )</author></item><item><title>SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SoK:%20History%20is%20a%20Vast%20Early%20Warning%20System:%20Auditing%20the%20Provenance%20of%20System%20Intrusions</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Muhammad Adil Inam ( University of Illinois at Urbana-Champaign ), Yinfang Chen ( University of Illinois at Urbana-Champaign ), Akul Goyal ( University of Illinois at Urbana-Champaign ), Jason Liu ( University of Illinois at Urbana-Champaign ), Jaron Mink ( University of Illinois at Urbana-Champaign ), Noor Michael ( University of Illinois at Urbana-Champaign ), Sneha Gaur ( University of Illinois at Urbana-Champaign ), Adam Bates ( University of Illinois at Urbana-Champaign ), Wajih Ul Hassan ( University of Virginia )</author></item><item><title>Collaborative Ad Transparency: Promises and Limitations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Collaborative%20Ad%20Transparency:%20Promises%20and%20Limitations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Collaborative%20Ad%20Transparency:%20Promises%20and%20Limitations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Eleni Gkiouzepi ( Technical University of Berlin, Germany ), Athanasios Andreou ( Algorithmic Transparency Institute, USA ), Oana Goga ( CNRS, Inria, Institut Polytechnique de Paris, France ), Patrick Loiseau ( Inria, FairPlay team, France )</author></item><item><title>Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Toss%20a%20Fault%20to%20Your%20Witcher:%20Applying%20Grey-box%20Coverage-Guided%20Mutational%20Fuzzing%20to%20Detect%20SQL%20and%20Command%20Injection%20Vulnerabilities</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Erik Trickel ( Arizona State University ), Fabio Pagani ( UC Santa Barbara ), Chang Zhu ( Arizona State University ), Lukas Dresel ( UC Santa Barbara ), Giovanni Vigna ( UC Santa Barbara ), Christopher Kruegel ( UC Santa Barbara ), Ruoyu Wang ( Arizona State University ), Tiffany Bao ( Arizona State University ), Yan Shoshitaishvili ( Arizona State University ), Adam Doupe ( Arizona State University )</author></item><item><title>UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#UTOPIA:%20Automatic%20Generation%20of%20Fuzz%20Driver%20using%20Unit%20Tests</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Bokdeuk Jeong ( Samsung Research, Republic of Korea ), Joonun Jang ( Samsung Research, Republic of Korea ), Hayoon Yi ( Samsung Research, Republic of Korea ), Jiin Moon ( Samsung Research, Republic of Korea ), Junsik Kim ( Samsung Research, Republic of Korea ), Intae Jeon ( Samsung Research, Republic of Korea ), Taesoo Kim ( Samsung Research, Republic of Korea; Georgia Institute of Technology, USA ), WooChul Shim ( Samsung Research, Republic of Korea ), Yong Ho Hwang ( Samsung Research, Republic of Korea )</author></item><item><title>SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SelectFuzz:%20Efficient%20Directed%20Fuzzing%20with%20Selective%20Path%20Exploration</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SelectFuzz:%20Efficient%20Directed%20Fuzzing%20with%20Selective%20Path%20Exploration</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Changhua Luo ( Chinese University of Hong Kong ), Wei Meng ( Chinese University of Hong Kong ), Penghui Li ( Chinese University of Hong Kong )</author></item><item><title>Finding Specification Blind Spots via Fuzz Testing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Finding%20Specification%20Blind%20Spots%20via%20Fuzz%20Testing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Finding%20Specification%20Blind%20Spots%20via%20Fuzz%20Testing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ru Ji ( University of Waterloo ), Meng Xu ( University of Waterloo )</author></item><item><title>ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#ODDFUZZ:%20Discovering%20Java%20Deserialization%20Vulnerabilities%20via%20Structure-Aware%20Directed%20Greybox%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#ODDFUZZ:%20Discovering%20Java%20Deserialization%20Vulnerabilities%20via%20Structure-Aware%20Directed%20Greybox%20Fuzzing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Sicong Cao ( Yangzhou University, China ), Biao He ( Ant Group, China ), Xiaobing Sun ( Yangzhou University, China ), Yu Ouyang ( Ant Group, China ), Chao Zhang ( Tsinghua University, China ), Xiaoxue Wu ( Yangzhou University, China ), Ting Su ( East China Normal University ), Lili Bo ( Yangzhou University, China ), Bin Li ( Yangzhou University, China ), Chuanlei Ma ( Ant Group, China ), Jiajia Li ( Ant Group, China )</author></item><item><title>The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#The%20Leaky%20Web:%20Automated%20Discovery%20of%20Cross-Site%20Information%20Leaks%20in%20Browsers%20and%20the%20Web</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#The%20Leaky%20Web:%20Automated%20Discovery%20of%20Cross-Site%20Information%20Leaks%20in%20Browsers%20and%20the%20Web</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jannis Rautenstrauch ( CISPA Helmholtz Center for Information Security, Germany ), Giancarlo Pellegrino ( CISPA Helmholtz Center for Information Security, Germany ), Ben Stock ( CISPA Helmholtz Center for Information Security, Germany )</author></item><item><title>WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#WebSpec:%20Towards%20Machine-Checked%20Analysis%20of%20Browser%20Security%20Mechanisms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#WebSpec:%20Towards%20Machine-Checked%20Analysis%20of%20Browser%20Security%20Mechanisms</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Lorenzo Veronese ( TU Wien ), Benjamin Farinier ( Univ Rennes, Inria, CNRS, IRISA ), Pedro Bernardo ( TU Wien ), Mauro Tempesta ( TU Wien ), Marco Squarcina ( TU Wien ), Matteo Maffei ( TU Wien )</author></item><item><title>Detection of Inconsistencies in Privacy Practices of Browser Extensions</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Detection%20of%20Inconsistencies%20in%20Privacy%20Practices%20of%20Browser%20Extensions</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Duc Bui ( University of Michigan, United States of America ), Brian Tang ( University of Michigan, United States of America ), Kang G. Shin ( University of Michigan, United States of America )</author></item><item><title>TeSec: Accurate Server-side Attack Investigation for Web Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#TeSec:%20Accurate%20Server-side%20Attack%20Investigation%20for%20Web%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#TeSec:%20Accurate%20Server-side%20Attack%20Investigation%20for%20Web%20Applications</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ruihua Wang ( KLISS, TNList, School of Software, Tsinghua University ), Yihao Peng ( KLISS, TNList, School of Software, Tsinghua University ), Yilun Sun ( KLISS, TNList, School of Software, Tsinghua University ), Xuancheng Zhang ( KLISS, TNList, School of Software, Tsinghua University ), Hai Wan ( KLISS, TNList, School of Software, Tsinghua University ), Xibin Zhao ( KLISS, TNList, School of Software, Tsinghua University )</author></item><item><title>RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#RuleKeeper:%20GDPR-Aware%20Personal%20Data%20Compliance%20for%20Web%20Frameworks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#RuleKeeper:%20GDPR-Aware%20Personal%20Data%20Compliance%20for%20Web%20Frameworks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mafalda Ferreira ( INESC-ID / Instituto Superior Técnico, Universidade de Lisboa ), Tiago Brito ( INESC-ID / Instituto Superior Técnico, Universidade de Lisboa ), José Fragoso Santos ( INESC-ID / Instituto Superior Técnico, Universidade de Lisboa ), Nuno Santos ( INESC-ID / Instituto Superior Técnico, Universidade de Lisboa )</author></item><item><title>Characterizing Everyday Misuse of Smart Home Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Characterizing%20Everyday%20Misuse%20of%20Smart%20Home%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Characterizing%20Everyday%20Misuse%20of%20Smart%20Home%20Devices</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Phoebe Moh ( University of Maryland, United States ), Pubali Datta ( University of Illinois Urbana-Champaign, United States ), Noel Warford ( University of Maryland, United States ), Adam Bates ( University of Illinois Urbana-Champaign, United States ), Nathan Malkin ( University of Maryland, United States ), Michelle Mazurek ( University of Maryland, United States )</author></item><item><title>It&#39;s up to the Consumer to be Smart: Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#It&#39;s%20up%20to%20the%20Consumer%20to%20be%20Smart:%20Understanding%20the%20Security%20and%20Privacy%20Attitudes%20of%20Smart%20Home%20Users%20on%20Reddit</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jingjie Li ( University of Wisconsin-Madison, USA ), Kaiwen Sun ( University of Michigan, USA ), Brittany Skye Huff ( University of Wisconsin-Madison, USA ), Anna Marie Bierley ( University of Wisconsin-Madison, USA ), Younghyun Kim ( University of Wisconsin-Madison, USA ), Florian Schaub ( University of Michigan, USA ), Kassem Fawaz ( University of Wisconsin-Madison, USA )</author></item><item><title>User Perceptions and Experiences with Smart Home Updates</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#User%20Perceptions%20and%20Experiences%20with%20Smart%20Home%20Updates</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#User%20Perceptions%20and%20Experiences%20with%20Smart%20Home%20Updates</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Julie Haney ( National Institute of Standards and Technology ), Susanne Furman ( 0000−0002−6017−9693 )</author></item><item><title>Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Design%20and%20Evaluation%20of%20Inclusive%20Email%20Security%20Indicators%20for%20People%20with%20Visual%20Impairments</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Design%20and%20Evaluation%20of%20Inclusive%20Email%20Security%20Indicators%20for%20People%20with%20Visual%20Impairments</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yaman Yu ( University of Illinois at Urbana-Champaign, USA ), Saidivya Ashok ( University of Illinois at Urbana-Champaign / CMU, USA ), Smirity Kaushi ( University of Illinois at Urbana-Champaign, USA ), Yang Wang ( University of Illinois at Urbana-Champaign, USA ), Gang Wang ( University of Illinois at Urbana-Champaign, USA )</author></item><item><title>When and Why Do People Want Ad Targeting Explanations? Evidence from a Four-Week, Mixed-Methods Field Study</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#When%20and%20Why%20Do%20People%20Want%20Ad%20Targeting%20Explanations?%20Evidence%20from%20a%20Four-Week,%20Mixed-Methods%20Field%20Study</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#When%20and%20Why%20Do%20People%20Want%20Ad%20Targeting%20Explanations?%20Evidence%20from%20a%20Four-Week,%20Mixed-Methods%20Field%20Study</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Hao-Ping Lee ( Carnegie Mellon University, United States ), Jacob Logas ( Georgia Institute of Technology, United States ), Stephanie Yang ( Georgia Institute of Technology, United States ), Zhouyu Li ( North Carolina State University, United States ), Natã Barbosa ( University of Illinois at Urbana-Champaign, United States ), Yang Wang ( University of Illinois at Urbana-Champaign, United States ), Sauvik Das ( Carnegie Mellon University, United States )</author></item><item><title>SecureCells: A Secure Compartmentalized Architecture</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SecureCells:%20A%20Secure%20Compartmentalized%20Architecture</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SecureCells:%20A%20Secure%20Compartmentalized%20Architecture</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Atri Bhattacharyya ( EPFL ), Florian Hofhammer ( EPFL ), Yuanlong Li ( EPFL ), Siddharth Gupta ( EPFL ), Andres Sanchez ( EPFL ), Babak Falsafi ( EPFL ), Mathias Payer ( EPFL )</author></item><item><title>WaVe: A Verifiably Secure WebAssembly Sandboxing Runtime</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#WaVe:%20A%20Verifiably%20Secure%20WebAssembly%20Sandboxing%20Runtime</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#WaVe:%20A%20Verifiably%20Secure%20WebAssembly%20Sandboxing%20Runtime</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Evan Johnson ( UC San Diego, USA ), Evan Laufer ( Stanford, USA ), Zijie Zhao ( UIUC, USA ), Dan Gohman ( Fastly Labs, USA ), Shravan Narayan ( UC San Diego, USA ), Stefan Savage ( UC San Diego, USA ), Deian Stefan ( UC San Diego, USA ), Fraser Brown ( Carnegie Mellon University, USA )</author></item><item><title>uSWITCH: Fast Kernel Context Isolation with Implicit Context Switches</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#uSWITCH:%20Fast%20Kernel%20Context%20Isolation%20with%20Implicit%20Context%20Switches</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#uSWITCH:%20Fast%20Kernel%20Context%20Isolation%20with%20Implicit%20Context%20Switches</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Dinglan Peng ( Purdue University ), Congyu Liu ( Purdue University ), Tapti Palit ( Purdue University ), Pedro Fonseca ( Purdue University ), Anjo Vahldiek-Oberwagner ( Intel Labs ), Mona Vij ( Intel Labs )</author></item><item><title>Control Flow and Pointer Integrity Enforcement in a Secure Tagged Architecture</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Control%20Flow%20and%20Pointer%20Integrity%20Enforcement%20in%20a%20Secure%20Tagged%20Architecture</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Control%20Flow%20and%20Pointer%20Integrity%20Enforcement%20in%20a%20Secure%20Tagged%20Architecture</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ravi Theja Gollapudi ( State University of New York at Binghamton ), Gokturk Yuksek ( State University of New York at Binghamton ), David Demicco ( State University of New York at Binghamton ), Matthew Cole ( State University of New York at Binghamton ), Gaurav N Kothari ( State University of New York at Binghamton ), Rohit H Kulkarni ( State University of New York at Binghamton ), Xin Zhang ( State University of New York at Binghamton ), Kanad Ghose ( State University of New York at Binghamton ), Aravind Prakash ( State University of New York at Binghamton ), Zerksis Umrigar ( State University of New York at Binghamton )</author></item><item><title>EC: Embedded Systems Compartmentalization via Intra-Kernel Isolation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#EC:%20Embedded%20Systems%20Compartmentalization%20via%20Intra-Kernel%20Isolation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#EC:%20Embedded%20Systems%20Compartmentalization%20via%20Intra-Kernel%20Isolation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Arslan Khan ( Purdue University ), Dongyan Xu ( Purdue University ), Dave Tian ( Purdue University )</author></item><item><title>Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Low-Cost%20Privilege%20Separation%20with%20Compile%20Time%20Compartmentalization%20for%20Embedded%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Low-Cost%20Privilege%20Separation%20with%20Compile%20Time%20Compartmentalization%20for%20Embedded%20Systems</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Arslan Khan ( Purdue University ), Dongyan Xu ( Purdue University ), Dave Tian ( Purdue University )</author></item><item><title>One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#One%20Key%20to%20Rule%20Them%20All:%20Secure%20Group%20Pairing%20for%20Heterogeneous%20IoT%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#One%20Key%20to%20Rule%20Them%20All:%20Secure%20Group%20Pairing%20for%20Heterogeneous%20IoT%20Devices</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Habiba Farrukh ( Purdue University, United States ), Muslum Ozgur Ozmen ( Purdue University, United States ), Faik Kerem Ors ( Purdue University, United States ), Z. Berkay Celik ( Purdue University, United States )</author></item><item><title>Optimistic Access Control for the Smart Home</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Optimistic%20Access%20Control%20for%20the%20Smart%20Home</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Optimistic%20Access%20Control%20for%20the%20Smart%20Home</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Nathan Malkin ( University of Maryland ), Alan F. Luo ( University of Maryland ), Julio Poveda ( University of Maryland ), Michelle L. Mazurek ( University of Maryland )</author></item><item><title>Protected or Porous: A Comparative Analysis of Threat Detection Capability of IoT Safeguards</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Protected%20or%20Porous:%20A%20Comparative%20Analysis%20of%20Threat%20Detection%20Capability%20of%20IoT%20Safeguards</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Protected%20or%20Porous:%20A%20Comparative%20Analysis%20of%20Threat%20Detection%20Capability%20of%20IoT%20Safeguards</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Anna Maria Mandalari ( University College London, UK ), Hamed Haddadi ( Imperial College London, UK ), Daniel J. Dubois ( Northeastern University, US ), David Choffnes ( Northeastern University, US )</author></item><item><title>LazyTAP: On-Demand Data Minimization for Trigger-Action Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#LazyTAP:%20On-Demand%20Data%20Minimization%20for%20Trigger-Action%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#LazyTAP:%20On-Demand%20Data%20Minimization%20for%20Trigger-Action%20Applications</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Mohammad M. Ahmadpanah ( Chalmers University of Technology, Sweden ), Daniel Hedin ( Chalmers University of Technology and Mälardalen University, Sweden ), Andrei Sabelfeld ( Chalmers University of Technology, Sweden )</author></item><item><title>Blue&#39;s Clues: Practical Discovery of Non-Discoverable Bluetooth Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Blue&#39;s%20Clues:%20Practical%20Discovery%20of%20Non-Discoverable%20Bluetooth%20Devices</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Tyler Tucker ( University of Florida ), Hunter Searle ( University of Florida ), Kevin Butler ( University of Florida ), Patrick Traynor ( University of Florida )</author></item><item><title>DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#DeHiREC:%20Detecting%20Hidden%20Voice%20Recorders%20via%20ADC%20Electromagnetic%20Radiation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ruochen Zhou ( Zhejiang University ), Xiaoyu Ji ( Zhejiang University ), Chen Yan ( Zhejiang University ), Yi-Chao Chen ( Shanghai Jiao Tong University; Microsoft Research Asia ), Wenyuan Xu ( Zhejiang University ), Chaohao Li ( Zhejiang University )</author></item><item><title>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#IPvSeeYou:%20Exploiting%20Leaked%20Identifiers%20in%20IPv6%20for%20Street-Level%20Geolocation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Erik Rye ( University of Maryland ), Robert Beverly ( CMAND )</author></item><item><title>From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#From%205G%20Sniffing%20to%20Harvesting%20Leakages%20of%20Privacy-Preserving%20Messengers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#From%205G%20Sniffing%20to%20Harvesting%20Leakages%20of%20Privacy-Preserving%20Messengers</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Norbert Ludant ( Northeastern University, USA ), Pieter Robyns ( Hasselt University - tUL - EDM and Belgian Cyber Command, Belgium ), Guevara Noubir ( Northeastern University, USA )</author></item><item><title>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Man-in-the-Middle%20Attacks%20without%20Rogue%20AP:%20When%20WPAs%20Meet%20ICMP%20Redirects</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Xuewei Feng ( Tsinghua University, China ), Qi Li ( Tsinghua University and Zhongguancun Lab, China ), Kun Sun ( George Mason University, USA ), Yuxiang Yang ( Tsinghua University ), Ke Xu ( Tsinghua University and Zhongguancun Lab, China )</author></item><item><title>Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Mew:%20Enabling%20Large-Scale%20and%20Dynamic%20Link-Flooding%20Defenses%20on%20Programmable%20Switches</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Mew:%20Enabling%20Large-Scale%20and%20Dynamic%20Link-Flooding%20Defenses%20on%20Programmable%20Switches</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Huancheng Zhou ( Texas A&amp;amp;M University ), Sungmin Hong ( Texas A&amp;amp;M University ), Yangyang Liu ( The Hong Kong Polytechnic University ), Xiapu Luo ( The Hong Kong Polytechnic University ), Weichao Li ( Peng Cheng Laboratory ), Guofei Gu ( Texas A&amp;amp;M University )</author></item><item><title>PCspooF: Compromising the Safety of Time-Triggered Ethernet</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#PCspooF:%20Compromising%20the%20Safety%20of%20Time-Triggered%20Ethernet</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Andrew Loveless ( University of Michigan; NASA Johnson Space Center ), Linh Thi Xuan Phan ( University of Pennsylvania ), Ronald Dreslinski ( University of Michigan ), Baris Kasikci ( University of Michigan )</author></item><item><title>BLEDiff : Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#BLEDiff%20:%20Scalable%20and%20Property-Agnostic%20Noncompliance%20Checking%20for%20BLE%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#BLEDiff%20:%20Scalable%20and%20Property-Agnostic%20Noncompliance%20Checking%20for%20BLE%20Implementations</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Imtiaz Karim ( Purdue University ), Abdullah Al Ishtiaq ( Pennsylvania State University ), Syed Rafiul Hussain ( Pennsylvania State University ), Elisa Bertino ( Purdue University )</author></item><item><title>VIDEZZO: Dependency-aware Virtual Device Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#VIDEZZO:%20Dependency-aware%20Virtual%20Device%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#VIDEZZO:%20Dependency-aware%20Virtual%20Device%20Fuzzing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Qiang Liu ( Zhejiang University, China; EPFL, Switzerland ), Flavio Toffalini ( EPFL, Switzerland ), Yajin Zhou ( Zhejiang University, China ), Mathias Payer ( EPFL, Switzerland )</author></item><item><title>DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#DEVFUZZ:%20Automatic%20Device%20Model-Guided%20Device%20Driver%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#DEVFUZZ:%20Automatic%20Device%20Model-Guided%20Device%20Driver%20Fuzzing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yilun Wu ( Stony Brook University ), Tong Zhang ( Samsung Electronics ), Changhee Jung ( Purdue University ), Dongyoon Lee ( Stony Brook University )</author></item><item><title>SyzDescribe: Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#SyzDescribe:%20Principled,%20Automated,%20Static%20Generation%20of%20Syscall%20Descriptions%20for%20Kernel%20Drivers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#SyzDescribe:%20Principled,%20Automated,%20Static%20Generation%20of%20Syscall%20Descriptions%20for%20Kernel%20Drivers</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yu Hao ( University of California, Riverside ), Guoren Li ( University of California, Riverside ), Xiaochen Zou ( University of California, Riverside ), Weiteng Chen ( University of California, Riverside ), Shitong Zhu ( University of California, Riverside ), Zhiyun Qian ( University of California, Riverside ), Ardalan Amiri Sani ( University of California, Irvine )</author></item><item><title>QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#QueryX:%20Symbolic%20Query%20on%20Decompiled%20Code%20for%20Finding%20Bugs%20in%20COTS%20Binaries</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#QueryX:%20Symbolic%20Query%20on%20Decompiled%20Code%20for%20Finding%20Bugs%20in%20COTS%20Binaries</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>HyungSeok Han ( Theori Inc., KAIST ), JeongOh Kyea ( Theori Inc. ), Yonghwi Jin ( Theori Inc. ), Jinoh Kang ( Theori Inc. ), Brian Pak ( Theori Inc. ), Insu Yun ( KAIST )</author></item><item><title>PyFET: Forensically Equivalent Transformation for Python Binary Decompilation</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#PyFET:%20Forensically%20Equivalent%20Transformation%20for%20Python%20Binary%20Decompilation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#PyFET:%20Forensically%20Equivalent%20Transformation%20for%20Python%20Binary%20Decompilation</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ali Ahad ( University of Virginia, USA ), Chijung Jung ( University of Virginia, USA ), Ammar Askar ( Georgia Institute of Technology, USA ), Doowon Kim ( University of Tennessee, USA ), Taesoo Kim ( Georgia Institute of Technology, USA ), Yonghwi Kwon ( University of Virginia, USA )</author></item><item><title>Adaptive Risk-Limiting Comparison Audits</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Adaptive%20Risk-Limiting%20Comparison%20Audits</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Adaptive%20Risk-Limiting%20Comparison%20Audits</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Abigail Harrison ( University of Connecticut ), Benjamin Fuller ( University of Connecticut ), Alexander Russell ( University of Connecticut )</author></item><item><title>Blue Is the New Black (Market): Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Blue%20Is%20the%20New%20Black%20(Market):%20Privacy%20Leaks%20and%20Re-Victimization%20from%20Police-Auctioned%20Cellphones</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Blue%20Is%20the%20New%20Black%20(Market):%20Privacy%20Leaks%20and%20Re-Victimization%20from%20Police-Auctioned%20Cellphones</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Richard Roberts, Julio Poveda, Raley Roberts, and Dave Levin ( University of Maryland, College Park )</author></item><item><title>No Privacy in the Electronics Repair Industry</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#No%20Privacy%20in%20the%20Electronics%20Repair%20Industry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#No%20Privacy%20in%20the%20Electronics%20Repair%20Industry</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Jason Ceci ( University of Guelph, Canada ), Jonah Stegman ( University of Guelph, Canada ), Hassan Khan ( University of Guelph, Canada )</author></item><item><title>How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#How%20IoT%20Re-using%20Threatens%20Your%20Sensitive%20Data:%20Exploring%20the%20User-Data%20Disposal%20in%20Used%20IoT%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#How%20IoT%20Re-using%20Threatens%20Your%20Sensitive%20Data:%20Exploring%20the%20User-Data%20Disposal%20in%20Used%20IoT%20Devices</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Peiyu Liu ( Zhejiang University, China ), Shouling Ji ( Zhejiang University, China ), Lirong Fu ( Zhejiang University, China ), Kangjie Lu ( University of Minnesota, USA ), Xuhong Zhang ( Zhejiang University, China ), Jingchang Qin ( Zhejiang University, China ), Wenhai Wang ( Zhejiang University, China ), Wenzhi Chen ( Zhejiang University, China )</author></item><item><title>Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Privacy%20Leakage%20via%20Unrestricted%20Motion-Position%20Sensors%20in%20the%20Age%20of%20Virtual%20Reality:%20A%20Study%20of%20Snooping%20Typed%20Input%20on%20Virtual%20Keyboards</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Privacy%20Leakage%20via%20Unrestricted%20Motion-Position%20Sensors%20in%20the%20Age%20of%20Virtual%20Reality:%20A%20Study%20of%20Snooping%20Typed%20Input%20on%20Virtual%20Keyboards</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yi Wu ( University of Tennessee, Knoxville, USA ), Cong Shi ( New Jersey Institute of Technology, USA ), Tianfang Zhang ( Rutgers University, USA ), Payton Walker ( Texas A&amp;amp;M University, College Station, USA ), Jian Liu ( University of Tennessee, Knoxville, USA ), Nitesh Saxena ( Texas A&amp;amp;M University, College Station, USA ), Yingying Chen ( Rutgers University, USA )</author></item><item><title>Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Uncovering%20User%20Interactions%20on%20Smartphones%20via%20Contactless%20Wireless%20Charging%20Side%20Channels</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Uncovering%20User%20Interactions%20on%20Smartphones%20via%20Contactless%20Wireless%20Charging%20Side%20Channels</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Tao Ni ( City University of Hong Kong ), Xiaokuan Zhang ( George Mason University ), Chaoshun Zuo ( The Ohio State University ), Jianfeng Li ( The Hong Kong Polytechnic University ), Zhenyu Yan ( The Chinese University of Hong Kong ), Wubing Wang ( DBAPPSecurity Co., Ltd ), Weitao Xu ( City University of Hong Kong ), Xiapu Luo ( The Hong Kong Polytechnic University ), Qingchuan Zhao ( City University of Hong Kong )</author></item><item><title>MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#MagBackdoor:%20Beware%20of%20Your%20Loudspeaker%20as%20A%20Backdoor%20For%20Magnetic%20Injection%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#MagBackdoor:%20Beware%20of%20Your%20Loudspeaker%20as%20A%20Backdoor%20For%20Magnetic%20Injection%20Attacks</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Tiantian Liu ( Zhejiang University, Hangzhou, Zhejiang, China ), Feng Lin ( Zhejiang University, Hangzhou, Zhejiang, China ), Zhangsen Wang ( Zhejiang University, Hangzhou, Zhejiang, China ), Chao Wang ( Zhejiang University, Hangzhou, Zhejiang, China ), Zhongjie Ba ( Zhejiang University, Hangzhou, Zhejiang, China ), Li Lu ( Zhejiang University, Hangzhou, Zhejiang, China ), Wenyao Xu ( University at Buffalo, Buffalo, New York, USA ), Kui Ren ( Zhejiang University, Hangzhou, Zhejiang, China )</author></item><item><title>Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Eye:%20On%20the%20Limits%20of%20Textual%20Screen%20Peeking%20via%20Eyeglass%20Reflections%20in%20Video%20Conferencing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Private%20Eye:%20On%20the%20Limits%20of%20Textual%20Screen%20Peeking%20via%20Eyeglass%20Reflections%20in%20Video%20Conferencing</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Yan Long ( University of Michigan, USA ), Chen Yan ( Zhejiang University, China ), Shilin Xiao ( Zhejiang University, China ), Shivan Prasad ( University of Michigan, USA ), Wenyuan Xu ( Zhejiang University, China ), Kevin Fu ( University of Michigan, USA )</author></item><item><title>Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance</title><description></description><link>https://www.ieee-security.org/TC/SP2023/program-papers.html#Low-effort%20VR%20Headset%20User%20Authentication%20Using%20Head-reverberated%20Sounds%20with%20Replay%20Resistance</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2023/program-papers.html#Low-effort%20VR%20Headset%20User%20Authentication%20Using%20Head-reverberated%20Sounds%20with%20Replay%20Resistance</guid><pubDate>Sat, 31 Dec 2022 16:00:00 GMT</pubDate><author>Ruxin Wang ( Louisiana State University ), Long Huang ( Louisiana State University ), Chen Wang ( Louisiana State University )</author></item><item><title>&quot;Adversarial Examples for Proof-of-Learning&quot;</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Adversarial%20Examples%20for%20Proof-of-Learning%22</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Adversarial%20Examples%20for%20Proof-of-Learning%22</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Rui Zhang (Zhejiang University), Jian Liu (Zhejiang University), Yuan Ding (Zhejiang University), Zhibo Wang (Zhejiang University), Qingbiao Wu (Zhejiang University), Kui Ren (Zhejiang University), Jian Liu (Zhejiang University)</author></item><item><title>&quot;Desperate Times Call for Desperate Measures&quot;: User Concerns with Mobile Loan Apps in Kenya</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Desperate%20Times%20Call%20for%20Desperate%20Measures%22:%20User%20Concerns%20with%20Mobile%20Loan%20Apps%20in%20Kenya</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Desperate%20Times%20Call%20for%20Desperate%20Measures%22:%20User%20Concerns%20with%20Mobile%20Loan%20Apps%20in%20Kenya</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Collins W. Munyendo (The George Washington University), Yasemin Acar (The George Washington University), Adam J. Aviv (The George Washington University), Yasemin Acar (George Washington University)</author></item><item><title>&quot;Flawed, but like democracy we don&#39;t have a better system&quot;: The Experts&#39; Insights on the Peer Review Process of Evaluating Security Papers</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Flawed,%20but%20like%20democracy%20we%20don&#39;t%20have%20a%20better%20system%22:%20The%20Experts&#39;%20Insights%20on%20the%20Peer%20Review%20Process%20of%20Evaluating%20Security%20Papers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#%22Flawed,%20but%20like%20democracy%20we%20don&#39;t%20have%20a%20better%20system%22:%20The%20Experts&#39;%20Insights%20on%20the%20Peer%20Review%20Process%20of%20Evaluating%20Security%20Papers</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ananta Soneji (Arizona State University), Faris Bugra Kokulu (Arizona State University), Carlos Rubio-Medrano (Texas A&amp;amp;M University - Corpus Christi), Tiffany Bao (Arizona State University), Ruoyu Wang (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupe (Arizona State University)</author></item><item><title>&quot;They&#39;re not that hard to mitigate&quot;: What Cryptographic Library Developers Think About Timing Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#%22They&#39;re%20not%20that%20hard%20to%20mitigate%22:%20What%20Cryptographic%20Library%20Developers%20Think%20About%20Timing%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#%22They&#39;re%20not%20that%20hard%20to%20mitigate%22:%20What%20Cryptographic%20Library%20Developers%20Think%20About%20Timing%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jan Jancar (Masaryk University), Marcel Fourné (Max Planck Institute for Security and Privacy), Daniel De Almeida Braga (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), Peter Schwabe (Max Planck Institute for Security and Privacy &amp;amp; Radboud University), Gilles Barthe (Max Planck Institute for Security and Privacy &amp;amp; IMDEA Software Institute), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA), Yasemin Acar (Max Planck Institute for Security and Privacy &amp;amp; George Washington University)</author></item><item><title>27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#27%20Years%20and%2081%20Million%20Opportunities%20Later:%20Investigating%20the%20Use%20of%20Email%20Encryption%20for%20an%20Entire%20University</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#27%20Years%20and%2081%20Million%20Opportunities%20Later:%20Investigating%20the%20Use%20of%20Email%20Encryption%20for%20an%20Entire%20University</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Christian Stransky (Leibniz University Hannover, Germany), Oliver Wiese (Freie Universität Berlin, Germany), Volker Roth (Freie Universität Berlin, Germany), Yasemin Acar (Max Planck Institute for Security and Privacy, Germany), Sascha Fahl (CISPA / Leibniz University Hannover, Germany)</author></item><item><title>A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Formal%20Security%20Analysis%20of%20the%20W3C%20Web%20Payment%20APIs:%20Attacks%20and%20Verification</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Formal%20Security%20Analysis%20of%20the%20W3C%20Web%20Payment%20APIs:%20Attacks%20and%20Verification</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Quoc Huy Do (University of Stuttgart, Germany), Pedram Hosseyni (University of Stuttgart, Germany), Ralf Küsters (University of Stuttgart, Germany), Guido Schmitz (University of Stuttgart, Germany and Royal Holloway, University of London, UK), Nils Wenzler (University of Stuttgart, Germany), Tim Würtele (University of Stuttgart, Germany)</author></item><item><title>A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Logic%20and%20an%20Interactive%20Prover%20for%20the%20Computational%20Post-Quantum%20Security%20of%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Logic%20and%20an%20Interactive%20Prover%20for%20the%20Computational%20Post-Quantum%20Security%20of%20Protocols</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Cas Cremers (CISPA Helmholtz Center for Information Security), Charlie Jacomme (CISPA - Helmholtz Center for Information Security), Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles), Cas Cremers (CISPA Helmholtz Center for Information Security)</author></item><item><title>A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Secret-Free%20Hypervisor:%20Rethinking%20Isolation%20in%20the%20Age%20of%20Speculative%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Secret-Free%20Hypervisor:%20Rethinking%20Isolation%20in%20the%20Age%20of%20Speculative%20Vulnerabilities</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hongyan Xia (Microsoft Research), David Zhang (Microsoft), Wei Liu (Microsoft), Istvan Haller (Microsoft Research), Bruce Sherwin (Microsoft), David Chisnall (Microsoft Research)</author></item><item><title>A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Systematic%20Look%20at%20Ciphertext%20Side%20Channels%20on%20AMD%20SEV-SNP</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#A%20Systematic%20Look%20at%20Ciphertext%20Side%20Channels%20on%20AMD%20SEV-SNP</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Mengyuan Li (The Ohio State University), Luca Wilke (University of Lübeck), Jan Wichelmann (University of Lübeck), Thomas Eisenbarth (University of Lübeck), Radu Teodorescu (The Ohio State University), Yinqian Zhang (Southern University of Science and Technology)</author></item><item><title>AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#AccEar:%20Accelerometer%20Acoustic%20Eavesdropping%20with%20Unconstrained%20Vocabulary</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#AccEar:%20Accelerometer%20Acoustic%20Eavesdropping%20with%20Unconstrained%20Vocabulary</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Pengfei Hu (Shandong University), Hui Zhuang (Shandong University), Panneer Selvam Santhalingam (George Mason University), Riccardo Spolaor (Shandong University), Parth Pathak (George Mason University), Guoming Zhang (Shandong University), Xiuzhen Cheng (Shandong University)</author></item><item><title>Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Adversarial%20Prefetch:%20New%20Cross-Core%20Cache%20Side%20Channel%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Adversarial%20Prefetch:%20New%20Cross-Core%20Cache%20Side%20Channel%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yanan Guo (University of Pittsburgh), Andrew Zigerelli (Independent), Youtao Zhang (Computer Science Department, University of Pittsburgh), Jun Yang (University of Pittsburgh)</author></item><item><title>Analyzing Ground-Truth Data of Mobile Gambling Scam</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Analyzing%20Ground-Truth%20Data%20of%20Mobile%20Gambling%20Scam</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Analyzing%20Ground-Truth%20Data%20of%20Mobile%20Gambling%20Scam</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Geng Hong (Fudan University), Zhemin Yang (Fudan University), Sen Yang (Fudan University), Xiaojing Liao (Indiana University Bloomington), Xiaolin Du (Fudan University), Min Yang (Fudan University), Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp.)</author></item><item><title>Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Annotating,%20Tracking,%20and%20Protecting%20Cryptographic%20Secrets%20with%20CryptoMPK</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Annotating,%20Tracking,%20and%20Protecting%20Cryptographic%20Secrets%20with%20CryptoMPK</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Xuancheng Jin (Shanghai Jiao Tong University), Xuangan Xiao (Shanghai Jiao Tong University), Songlin Jia (Shanghai Jiao Tong University), Wang Gao (Shanghai Jiao Tong University), Hang Zhang (UC Riverside), Dawu Gu (Shanghai Jiao Tong University), Siqi Ma (The University of Queensland), Zhiyun Qian (UC Riverside), Juanru Li (Shanghai Jiao Tong University)</author></item><item><title>Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Anti-Tamper%20Radio:%20System-Level%20Tamper%20Detection%20for%20Computing%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Anti-Tamper%20Radio:%20System-Level%20Tamper%20Detection%20for%20Computing%20Systems</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Paul Staat (Max Planck Institute for Security and Privacy), Johannes Tobisch (Max Planck Institute for Security and Privacy), Christian Zenger (PHYSEC GmbH), Christof Paar (Max Planck Institute for Security and Privacy)</author></item><item><title>Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Are%20We%20There%20Yet?%20Timing%20and%20Floating-Point%20Attacks%20on%20Differential%20Privacy%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Are%20We%20There%20Yet?%20Timing%20and%20Floating-Point%20Attacks%20on%20Differential%20Privacy%20Systems</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jiankai Jin (The University of Melbourne, Australia), Eleanor McMurtry (ETH Zurich), Benjamin Rubinstein (University of Melbourne, Australia), Olga Ohrimenko (The University of Melbourne)</author></item><item><title>Asleep at the Keyboard? Assessing the Security of GitHub Copilot&#39;s Code Contributions</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Asleep%20at%20the%20Keyboard?%20Assessing%20the%20Security%20of%20GitHub%20Copilot&#39;s%20Code%20Contributions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Asleep%20at%20the%20Keyboard?%20Assessing%20the%20Security%20of%20GitHub%20Copilot&#39;s%20Code%20Contributions</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hammond Pearce (NYU Tandon School of Engineering), Baleegh Ahmad (NYU Tandon School of Engineering), Benjamin Tan (NYU Tandon School of Engineering), Brendan Dolan-Gavitt (NYU Tandon School of Engineering), Ramesh Karri (NYU Tandon School of Engineering)</author></item><item><title>Attacks on Wireless Coexistence</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Attacks%20on%20Wireless%20Coexistence</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Attacks%20on%20Wireless%20Coexistence</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jiska Classen (TU Darmstadt, SEEMOO), Michael Hermann (TU Darmstadt, SEEMOO), Francesco Gringoli (University of Brescia), Matthias Hollick (TU Darmstadt, SEEMOO)</author></item><item><title>Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Augury:%20Using%20Data%20Memory-Dependent%20Prefetchers%20to%20Leak%20Data%20at%20Rest</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Augury:%20Using%20Data%20Memory-Dependent%20Prefetchers%20to%20Leak%20Data%20at%20Rest</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jose Rodrigo Sanchez Vicarte (University of Illinois at Urbana-Champaign), Michael Flanders (University of Washington), Riccardo Paccagnella (University of Illinois at Urbana-Champaign), Grant Garrett-Grossman (University of Illinois at Urbana-Champaign), Adam Morrison (Tel Aviv University), Chris Fletcher (University of Illinois at Urbana-Champaign), David Kohlbrenner (University of Washington)</author></item><item><title>Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Automated%20Attack%20Synthesis%20by%20Extracting%20Finite%20State%20Machines%20from%20Protocol%20Specification%20Documents</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Automated%20Attack%20Synthesis%20by%20Extracting%20Finite%20State%20Machines%20from%20Protocol%20Specification%20Documents</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Maria Pacheco Gonzales (Purdue University), Max von Hippel (Northeastern University), Ben Weintraub (Northeastern University), Dan Goldwasser (Purdue University), Cristina Nita-Rotaru (Northeastern University)</author></item><item><title>BEACON : Directed Grey-Box Fuzzing with Provable Path Pruning</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#BEACON%20:%20Directed%20Grey-Box%20Fuzzing%20with%20Provable%20Path%20Pruning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#BEACON%20:%20Directed%20Grey-Box%20Fuzzing%20with%20Provable%20Path%20Pruning</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Heqing Huang (The Hong Kong University of Science and Technology), Yiyuan Guo (The Hong Kong University of Science and Technology), Qingkai Shi (The Hong Kong University of Science and Technology), Peisen Yao (The Hong Kong University of Science and Technology), Rongxin Wu (Xiamen University), Charles Zhang (The Hong Kong University of Science and Technology)</author></item><item><title>Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Back%20to%20the%20Drawing%20Board:%20A%20Critical%20Evaluation%20of%20Poisoning%20Attacks%20on%20Federated%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Back%20to%20the%20Drawing%20Board:%20A%20Critical%20Evaluation%20of%20Poisoning%20Attacks%20on%20Federated%20Learning</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst), Peter Kairouz (Google), Daniel Ramage (Google)</author></item><item><title>Bad Characters: Imperceptible NLP Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Bad%20Characters:%20Imperceptible%20NLP%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Bad%20Characters:%20Imperceptible%20NLP%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Nicholas Boucher (University of Cambridge), Ilia Shumailov (University of Cambridge, Vector Institute), Ross Anderson (University of Cambridge, University of Edinburgh), Nicolas Papernot (University of Toronto, Vector Institute)</author></item><item><title>BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#BadEncoder:%20Backdoor%20Attacks%20to%20Pre-trained%20Encoders%20in%20Self-Supervised%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#BadEncoder:%20Backdoor%20Attacks%20to%20Pre-trained%20Encoders%20in%20Self-Supervised%20Learning</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jinyuan Jia (Duke University, USA), Yupei Liu (Duke University, USA), Neil Zhenqiang Gong (Duke University, USA)</author></item><item><title>Blacksmith: Compromising Target Row Refresh by Rowhammering in the Frequency Domain</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Blacksmith:%20Compromising%20Target%20Row%20Refresh%20by%20Rowhammering%20in%20the%20Frequency%20Domain</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Blacksmith:%20Compromising%20Target%20Row%20Refresh%20by%20Rowhammering%20in%20the%20Frequency%20Domain</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Patrick Jattke (ETH Zurich), Victor van der Veen (Qualcomm Technologies Inc.), Pietro Frigo (Vrije Universiteit Amsterdam), Stijn Gunter (ETH Zurich), Kaveh Razavi (ETH Zurich)</author></item><item><title>COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#COBRA:%20Dynamic%20Proactive%20Secret%20Sharing%20for%20Confidential%20BFT%20Services</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#COBRA:%20Dynamic%20Proactive%20Secret%20Sharing%20for%20Confidential%20BFT%20Services</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Robin Vassantlal (LASIGE, Faculdade de Ciencias, Universidade de Lisboa), Eduardo Alchieri (Universidade de Brasilia), Bernardo Ferreira (LASIGE, Faculdade de Ciencias, Universidade de Lisboa), Alysson Bessani (LASIGE, Faculdade de Ciencias, Universidade de Lisboa)</author></item><item><title>Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Cats%20vs.%20Spectre:%20An%20Axiomatic%20Approach%20to%20Modeling%20Speculative%20Execution%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Cats%20vs.%20Spectre:%20An%20Axiomatic%20Approach%20to%20Modeling%20Speculative%20Execution%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hernán Ponce de León (Bundeswehr University Munich), Johannes Kinder (Bundeswehr University Munich)</author></item><item><title>CirC: Compiler infrastructure for proof systems, software verification, and more</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#CirC:%20Compiler%20infrastructure%20for%20proof%20systems,%20software%20verification,%20and%20more</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#CirC:%20Compiler%20infrastructure%20for%20proof%20systems,%20software%20verification,%20and%20more</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Alex Ozdemir (Stanford University), Fraser Brown (Stanford University, Carnegie Mellon University), Riad Wahby (Stanford University, Carnegie Mellon University, and Algorand), Alex Ozdemir (Stanford University)</author></item><item><title>Committed to Trust: A Qualitative Study on Security &amp; Trust in Open Source Software Projects</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Committed%20to%20Trust:%20A%20Qualitative%20Study%20on%20Security%20&amp;%20Trust%20in%20Open%20Source%20Software%20Projects</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Committed%20to%20Trust:%20A%20Qualitative%20Study%20on%20Security%20&amp;%20Trust%20in%20Open%20Source%20Software%20Projects</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Dominik Wermke (CISPA Helmholtz Center for Information Security), Noah Woehler (CISPA Helmholtz Center for Information Security), Jan H. Klemmer (Leibniz University Hannover), Marcel Fourné (Max Planck Institute for Security and Privacy), Yasemin Acar (George Washington University), Sascha Fahl (CISPA Helmholtz Center for Information Security, Leibniz University Hannover)</author></item><item><title>Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Copy,%20Right?%20A%20Testing%20Framework%20for%20Copyright%20Protection%20of%20Deep%20Learning%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Copy,%20Right?%20A%20Testing%20Framework%20for%20Copyright%20Protection%20of%20Deep%20Learning%20Models</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jialuo Chen (Zhejiang University), Jingyi Wang (Zhejiang University), Tinglan Peng (Zhejiang University), Youcheng Sun (Queen&#39;s University Belfast, UK), Peng Cheng (Zhejiang University), Shouling Ji (Zhejiang University), Xingjun Ma (Deakin University), Bo Li (University of Illinois Urbana-Champaign), Dawn Song (University of California, Berkeley)</author></item><item><title>DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#DEPCOMM:%20Graph%20Summarization%20on%20System%20Audit%20Logs%20for%20Attack%20Investigation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#DEPCOMM:%20Graph%20Summarization%20on%20System%20Audit%20Logs%20for%20Attack%20Investigation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhiqiang Xu (Chinese Academy of Sciences, China), Pengcheng Fang (Case Western Reserve University, USA), Changlin Liu (Case Western Reserve University, USA), Xusheng Xiao (Case Western Reserve University, USA), Yu Wen (Chinese Academy of Sciences, China), Dan Meng (Chinese Academy of Sciences, China)</author></item><item><title>DeepCASE: Semi-Supervised Contextual Analysis of Security Events</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepCASE:%20Semi-Supervised%20Contextual%20Analysis%20of%20Security%20Events</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepCASE:%20Semi-Supervised%20Contextual%20Analysis%20of%20Security%20Events</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Thijs van Ede (University of Twente), Hojjat Aghakhani (University of California, Santa Barbara), Noah Spahn (University of California, Santa Barbara), Riccardo Bortolameotti (ReaQta), Marco Cova (VMware, Inc.), Andrea Continella (University of Twente), Maarten van Steen (University of Twente), Andreas Peter (University of Twente), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California)</author></item><item><title>DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepCoFFEA:%20Improved%20Flow%20Correlation%20Attacks%20on%20Tor%20via%20Metric%20Learning%20and%20Amplification</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepCoFFEA:%20Improved%20Flow%20Correlation%20Attacks%20on%20Tor%20via%20Metric%20Learning%20and%20Amplification</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Se Eun Oh (Ewha Womans University), Taiji Yang (University of Minnesota), Nate Mathews (Rochester Institute of Technology), James K Holland (University of Minnesota), Mohammad Saidur Rahman (Rochester Institute of Technology), Nicholas Hopper (University of Minnesota), Matthew Wright (Rochester Institute of Technology)</author></item><item><title>DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepSteal:%20Advanced%20Model%20Extractions%20Leveraging%20Efficient%20Weight%20Stealing%20in%20Memories</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#DeepSteal:%20Advanced%20Model%20Extractions%20Leveraging%20Efficient%20Weight%20Stealing%20in%20Memories</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Adnan Siraj Rakin (Arizona State University), Md Hafizul Islam Chowdhuryy (University of Central Florida), Fan Yao (University of Central Florida), Deliang Fan (Arizona State University)</author></item><item><title>Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Delay%20Wreaks%20Havoc%20on%20Your%20Smart%20Home:%20Delay-based%20Automation%20Interference%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Delay%20Wreaks%20Havoc%20on%20Your%20Smart%20Home:%20Delay-based%20Automation%20Interference%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Haotian Chi (Temple University), Chenglong Fu (Temple University), Qiang Zeng (University of South Carolina, United States of America), Xiaojiang Du (Stevens Institute of Technology)</author></item><item><title>Deployment of Source Address Validation by Network Operators: A Randomized Control Trial</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Deployment%20of%20Source%20Address%20Validation%20by%20Network%20Operators:%20A%20Randomized%20Control%20Trial</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Deployment%20of%20Source%20Address%20Validation%20by%20Network%20Operators:%20A%20Randomized%20Control%20Trial</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Qasim Lone (Delft University of Technology), Alisa Frik (International Computer Science Institute / UC Berkeley), Matthew Luckie (University of Waikato), Maciej Korczynski (Grenoble INP), Michel van Eeten (Delft University of Technology), Carlos Ganan (Delft University of Technology)</author></item><item><title>Device Fingerprinting with Peripheral Timestamps</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Device%20Fingerprinting%20with%20Peripheral%20Timestamps</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Device%20Fingerprinting%20with%20Peripheral%20Timestamps</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>John Monaco (Naval Postgraduate School, USA)</author></item><item><title>Differential Privacy and Swapping: Examining De-Identification&#39;s Impact on Minority Representation and Privacy Preservation in the U.S. Census</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Differential%20Privacy%20and%20Swapping:%20Examining%20De-Identification&#39;s%20Impact%20on%20Minority%20Representation%20and%20Privacy%20Preservation%20in%20the%20U.S.%20Census</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Differential%20Privacy%20and%20Swapping:%20Examining%20De-Identification&#39;s%20Impact%20on%20Minority%20Representation%20and%20Privacy%20Preservation%20in%20the%20U.S.%20Census</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sarah Radway (Tufts University), Miranda Christ (Columbia University), Steven Bellovin (Columbia University)</author></item><item><title>Differentially Private Histograms in the Shuffle Model from Fake Users</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Differentially%20Private%20Histograms%20in%20the%20Shuffle%20Model%20from%20Fake%20Users</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Differentially%20Private%20Histograms%20in%20the%20Shuffle%20Model%20from%20Fake%20Users</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Albert Cheu (Georgetown University), Maxim Zhilyaev (MindStrong Inc.)</author></item><item><title>Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Domains%20Do%20Change%20Their%20Spots:%20Quantifying%20Potential%20Abuse%20of%20Residual%20Trust</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Domains%20Do%20Change%20Their%20Spots:%20Quantifying%20Potential%20Abuse%20of%20Residual%20Trust</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Johnny So (Stony Brook University, USA), Najmeh Miramirkhani (Stony Brook University, USA), Michael Ferdman (Stony Brook University, USA), Nick Nikiforakis (Stony Brook University, USA)</author></item><item><title>Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Effective%20Seed%20Scheduling%20for%20Fuzzing%20with%20Graph%20Centrality%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Effective%20Seed%20Scheduling%20for%20Fuzzing%20with%20Graph%20Centrality%20Analysis</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Dongdong She (Columbia University), Abhishek Shah (Columbia University), Suman Jana (Columbia University)</author></item><item><title>Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Evaluating%20Physical-Layer%20BLE%20Location%20Tracking%20Attacks%20on%20Mobile%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Evaluating%20Physical-Layer%20BLE%20Location%20Tracking%20Attacks%20on%20Mobile%20Devices</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hadi Givehchian (UC San Diego), Nishant Bhaskar (UC San Diego), Eliana Rodriguez Herrera (UC San Diego), Hector Lopez Soto (UC San Diego), Christian Dameff (UC San Diego), Dinesh Bharadia (UC San Diego), Aaron Schulman (UC San Diego)</author></item><item><title>Exploit the Last Straw That Breaks Android Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Exploit%20the%20Last%20Straw%20That%20Breaks%20Android%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Exploit%20the%20Last%20Straw%20That%20Breaks%20Android%20Systems</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Lei Zhang (Fudan University, China), Keke Lian (Fudan University, China), Haoyu Xiao (Fudan University, China), Zhibo Zhang (Fudan University, China), Peng Liu (The Pennsylvania State University, United States of America), Yuan Zhang (Fudan University, China), Min Yang (Fudan University, China), Haixin Duan (Tsinghua University, China)</author></item><item><title>Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Exposed%20Infrastructures:%20Discovery,%20Attacks%20and%20Remediation%20of%20Insecure%20ICS%20Remote%20Management%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Exposed%20Infrastructures:%20Discovery,%20Attacks%20and%20Remediation%20of%20Insecure%20ICS%20Remote%20Management%20Devices</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Takayuki Sasaki (Yokohama National University), Akira Fujita (Yokohama National University/National Institute of Information and Communications Technology), Carlos Hernandez Ganan (TU Delft/Yokohama National University), Michel van Eeten (TU Delft/Yokohama National University), Katsunari Yoshioka (Yokohama National University), Tsutomu Matsumoto (Yokohama National University)</author></item><item><title>FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#FSAFlow:%20Lightweight%20and%20Fast%20Dynamic%20Path%20Tracking%20and%20Control%20for%20Privacy%20Protection%20on%20Android%20Using%20Hybrid%20Analysis%20with%20State-Reduction%20Strategy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#FSAFlow:%20Lightweight%20and%20Fast%20Dynamic%20Path%20Tracking%20and%20Control%20for%20Privacy%20Protection%20on%20Android%20Using%20Hybrid%20Analysis%20with%20State-Reduction%20Strategy</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhi Yang (PLA Information Engineering University, Zhengzhou, China), Zhanhui Yuan (PLA Information Engineering University, Zhengzhou, China), Xingyuan Chen (PLA Information Engineering University, Zhengzhou, China), Shuyuan Jin (SUN YAT-SEN University, Guangzhou, China.), Lei Sun (PLA Information Engineering University, Zhengzhou, China), Xuehui Du (PLA Information Engineering University, Zhengzhou, China), Wenfa Li (Beijing Union University, Beijing, Chian)</author></item><item><title>Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Finding%20SMM%20Privilege-Escalation%20Vulnerabilities%20in%20UEFI%20Firmware%20with%20Protocol-Centric%20Static%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Finding%20SMM%20Privilege-Escalation%20Vulnerabilities%20in%20UEFI%20Firmware%20with%20Protocol-Centric%20Static%20Analysis</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jiawei Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Wei Huo (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China), Menghao Li (Institute of Information Engineering, Chinese Academy of Sciences), Wei Wu (Huawei Technologies), Dandan Sun (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China), Jianhua Zhou (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China), Jingling Xue (University of New South Wales)</author></item><item><title>Finding and Exploiting CPU Features using MSR Templating</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Finding%20and%20Exploiting%20CPU%20Features%20using%20MSR%20Templating</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Finding%20and%20Exploiting%20CPU%20Features%20using%20MSR%20Templating</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Andreas Kogler (Graz University of Technology), Daniel Weber (CISPA Helmholtz Center for Information Security), Martin Haubenwallner (Graz University of Technology), Moritz Lipp (Graz University of Technology), Daniel Gruss (Graz University of Technology), Michael Schwarz (CISPA Helmholtz Center for Information Security), Moritz Lipp (Amazon Web Services)</author></item><item><title>Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Formal%20Model-Driven%20Discovery%20of%20Bluetooth%20Protocol%20Design%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Formal%20Model-Driven%20Discovery%20of%20Bluetooth%20Protocol%20Design%20Vulnerabilities</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jianliang Wu (Purdue University), Ruoyu Wu (Purdue University), Dongyan Xu (Purdue University), Dave (Jing) Tian (Purdue University), Antonio Bianchi (Purdue University)</author></item><item><title>Foundations of Dynamic BFT</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Foundations%20of%20Dynamic%20BFT</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Foundations%20of%20Dynamic%20BFT</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sisi Duan (Tsinghua University), Haibin Zhang (independent)</author></item><item><title>Four Attacks and a Proof for Telegram</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Four%20Attacks%20and%20a%20Proof%20for%20Telegram</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Four%20Attacks%20and%20a%20Proof%20for%20Telegram</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Martin R. Albrecht (Royal Holloway, University of London, United Kingdom), Lenka Mareková (Royal Holloway, University of London, United Kingdom), Kenneth G. Paterson (ETH Zurich, Switzerland), Igors Stepanovs (ETH Zurich, Switzerland)</author></item><item><title>FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#FuzzUSB:%20Hybrid%20Stateful%20Fuzzing%20of%20USB%20Gadget%20Stacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#FuzzUSB:%20Hybrid%20Stateful%20Fuzzing%20of%20USB%20Gadget%20Stacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Kyungtae Kim (Purdue University), Taegyu Kim (Purdue University), Ertza Warraich (Purdue University), Byoungyoung Lee (Seoul National University), Kevin Butler (University of Florida), Antonio Bianchi (Purdue University), Dave (Jing) Tian (Purdue University)</author></item><item><title>GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#GREBE:%20Unveiling%20Exploitation%20Potential%20for%20Linux%20Kernel%20Bugs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#GREBE:%20Unveiling%20Exploitation%20Potential%20for%20Linux%20Kernel%20Bugs</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhenpeng Lin (Pennsylvania State University), Yueqi Chen (Pennsylvania State University), Dongliang Mu (Huazhong University of Science and Technology), Chensheng Yu (George Washington University), Yuhang Wu (Pennsylvania State University), Xinyu Xing (Pennsylvania State University), Kang Li (Baidu Security)</author></item><item><title>Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Goshawk:%20Hunting%20Memory%20Corruptions%20via%20Structure-Aware%20and%20Object-Centric%20Memory%20Operation%20Synopsis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Goshawk:%20Hunting%20Memory%20Corruptions%20via%20Structure-Aware%20and%20Object-Centric%20Memory%20Operation%20Synopsis</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yunlong Lyu (University of Science and Technology of China), Yi Fang (Feiyu Security), Yiwei Zhang (Shanghai Jiao Tong University), Qibin Sun (University of Science and Technology of China), Siqi Ma (The University of New South Wales Canberra), Elisa Bertino (Purdue University), Kangjie Lu (University of Minnesota), Juanru Li (Shanghai Jiao Tong University)</author></item><item><title>Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Graphics%20Peeping%20Unit:%20Exploiting%20EM%20Side-Channel%20Information%20of%20GPUs%20to%20Eavesdrop%20on%20Your%20Neighbors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Graphics%20Peeping%20Unit:%20Exploiting%20EM%20Side-Channel%20Information%20of%20GPUs%20to%20Eavesdrop%20on%20Your%20Neighbors</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zihao Zhan (Vanderbilt University), Zhengkai Zhang (Clemson University), Sisheng Liang (Clemson University), Fan Yao (University of Central Florida), Xenofon Koutsoukos (Vanderbilt University)</author></item><item><title>HAMRAZ: Resilient Partitioning and Replication</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#HAMRAZ:%20Resilient%20Partitioning%20and%20Replication</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#HAMRAZ:%20Resilient%20Partitioning%20and%20Replication</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Xiao Li (University of California, Riverside, USA), Farzin Houshmand (University of California, Riverside, USA), Mohsen Lesani (University of California, Riverside, USA)</author></item><item><title>HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#HardLog:%20Practical%20Tamper-Proof%20System%20Auditing%20Using%20a%20Novel%20Audit%20Device</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#HardLog:%20Practical%20Tamper-Proof%20System%20Auditing%20Using%20a%20Novel%20Audit%20Device</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Adil Ahmad (Purdue), Sangho Lee (Microsoft Research), Marcus Peinado (Microsoft Research)</author></item><item><title>Hardening Circuit-Design IP Against Reverse-Engineering Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Hardening%20Circuit-Design%20IP%20Against%20Reverse-Engineering%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Hardening%20Circuit-Design%20IP%20Against%20Reverse-Engineering%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Animesh Chhotaray (University of Florida, USA), Thomas Shrimpton (University of Florida, USA)</author></item><item><title>Hark: A Deep Learning System for Navigating Privacy Feedback at Scale</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Hark:%20A%20Deep%20Learning%20System%20for%20Navigating%20Privacy%20Feedback%20at%20Scale</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Hark:%20A%20Deep%20Learning%20System%20for%20Navigating%20Privacy%20Feedback%20at%20Scale</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hamza Harkous (Google Inc.), Sai Teja Peddinti (Google Inc.), Rishabh Khandelwal (University of Wisconsin - Madison), Animesh Srivastava‚Äé (Google Inc.), Nina Taft (Google Inc.)</author></item><item><title>Heapster: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Heapster:%20Analyzing%20the%20Security%20of%20Dynamic%20Allocators%20for%20Monolithic%20Firmware%20Images</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Heapster:%20Analyzing%20the%20Security%20of%20Dynamic%20Allocators%20for%20Monolithic%20Firmware%20Images</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Fabio Gritti (University of California, Santa Barbara), Fabio Pagani (University of California, Santa Barbara), Ilya Grishchenko (University of California, Santa Barbara), Lukas Dresel (University of California, Santa Barbara), Nilo Redini (Qualcomm Inc.), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)</author></item><item><title>How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20Does%20Usable%20Security%20(Not)%20End%20Up%20in%20Software%20Products?%20Results%20From%20a%20Qualitative%20Interview%20Study</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20Does%20Usable%20Security%20(Not)%20End%20Up%20in%20Software%20Products?%20Results%20From%20a%20Qualitative%20Interview%20Study</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Marco Gutfleisch (Ruhr University Bochum, Germany), Jan H. Klemmer (Leibniz University Hannover, Germany), Niklas Busch (Leibniz University Hannover, Germany), Yasemin Acar (Max Planck Institute for Security and Privacy, Germany), M. Angela Sasse (Ruhr University Bochum, Germany), Sascha Fahl (CISPA / Leibniz University Hannover, Germany)</author></item><item><title>How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20Not%20to%20Protect%20Your%20IP%20-%20An%20Industry-Wide%20Break%20of%20IEEE%201735%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20Not%20to%20Protect%20Your%20IP%20-%20An%20Industry-Wide%20Break%20of%20IEEE%201735%20Implementations</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Julian Speith (Max Planck Institute for Security and Privacy), Florian Schweins (Ruhr-University Bochum), Maik Ender (Max Planck Institute for Security and Privacy), Marc Fyrbiak (Max Planck Institute for Security and Privacy), Alexander May (Ruhr-University Bochum), Christof Paar (Max Planck Institute for Security and Privacy)</author></item><item><title>How to Attack and Generate Honeywords</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20to%20Attack%20and%20Generate%20Honeywords</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#How%20to%20Attack%20and%20Generate%20Honeywords</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ding Wang (Nankai University), Yunkai Zou (Nankai University), Qiying Dong (Nankai University), Yuanming Song (Peking University), Xinyi Huang (Fujian Normal University)</author></item><item><title>IRQDebloat: Reducing Driver Attack Surface in Embedded Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#IRQDebloat:%20Reducing%20Driver%20Attack%20Surface%20in%20Embedded%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#IRQDebloat:%20Reducing%20Driver%20Attack%20Surface%20in%20Embedded%20Devices</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhenghao Hu (New York University), Brendan Dolan-Gavitt (NYU)</author></item><item><title>IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#IRShield:%20A%20Countermeasure%20Against%20Adversarial%20Physical-Layer%20Wireless%20Sensing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#IRShield:%20A%20Countermeasure%20Against%20Adversarial%20Physical-Layer%20Wireless%20Sensing</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Paul Staat (Max Planck Institute for Security and Privacy), Simon Mulzer (Ruhr University Bochum), Stefan Roth (Ruhr University Bochum), Veelasha Moonsamy (Ruhr University Bochum), Markus Heinrichs (TH Köln – University of Applied Sciences, Cologne, Germany), Rainer Kronberger (TH Köln – University of Applied Sciences, Cologne, Germany), Aydin Sezgin (Ruhr University Bochum), Christof Paar (Max Planck Institute for Security and Privacy)</author></item><item><title>Investigating Influencer VPN Ads on YouTube</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Investigating%20Influencer%20VPN%20Ads%20on%20YouTube</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Investigating%20Influencer%20VPN%20Ads%20on%20YouTube</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Omer Akgul (University of Maryland), Richard Roberts (University of Maryland), Moses Namara (Clemson University), Dave Levin (University of Maryland), Michelle L. Mazurek (University of Maryland)</author></item><item><title>Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Invisible%20Finger:%20Practical%20Electromagnetic%20Interference%20Attack%20on%20Touchscreen-based%20Electronic%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Invisible%20Finger:%20Practical%20Electromagnetic%20Interference%20Attack%20on%20Touchscreen-based%20Electronic%20Devices</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Haoqi Shan (University of Florida), Boyi Zhang (University of Florida), Zihao Zhan (University of Florida), Dean Sullivan (University of New Hampshire), Shuo Wang (University of Florida), Yier Jin (University of Florida)</author></item><item><title>IronMask: Versatile Verification of Masking Security</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#IronMask:%20Versatile%20Verification%20of%20Masking%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#IronMask:%20Versatile%20Verification%20of%20Masking%20Security</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sonia Belaid (CryptoExperts), Darius Mercadier (CryptoExperts), Matthieu Rivain (CryptoExperts), Abdul Rahman Taleb (CryptoExperts)</author></item><item><title>Jigsaw: Efficient and Scalable Path Constraints Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Jigsaw:%20Efficient%20and%20Scalable%20Path%20Constraints%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Jigsaw:%20Efficient%20and%20Scalable%20Path%20Constraints%20Fuzzing</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ju Chen (UC, Riverside), Jinghan Wang (UC, Riverside), Chengyu Song (UC, Riverside), Heng Yin (UC, Riverside)</author></item><item><title>LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#LinkTeller:%20Recovering%20Private%20Edges%20from%20Graph%20Neural%20Networks%20via%20Influence%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#LinkTeller:%20Recovering%20Private%20Edges%20from%20Graph%20Neural%20Networks%20via%20Influence%20Analysis</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Fan Wu (University of Illinois at Urbana-Champaign, USA), Yunhui Long (University of Illinois at Urbana-Champaign, USA), Ce Zhang (ETH Zurich, Switzerland), Bo Li (University of Illinois at Urbana-Champaign, USA)</author></item><item><title>Locally Differentially Private Sparse Vector Aggregation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Locally%20Differentially%20Private%20Sparse%20Vector%20Aggregation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Locally%20Differentially%20Private%20Sparse%20Vector%20Aggregation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Mingxun Zhou (Carnegie Mellon University), Tianhao Wang (Carnegie Mellon University and University of Virginia), T-H. Hubert Chan (The University of Hong Kong), Giulia Fanti (Carnegie Mellon University), Elaine Shi (Carnegie Mellon University)</author></item><item><title>Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Low-Bandwidth%20Threshold%20ECDSA%20via%20Pseudorandom%20Correlation%20Generators</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Low-Bandwidth%20Threshold%20ECDSA%20via%20Pseudorandom%20Correlation%20Generators</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Damiano Abram (Aarhus University), Ariel Nof (Technion), Claudio Orlandi (Aarhus University), Peter Scholl (Aarhus University), Omer Shlomovits (ZenGo X)</author></item><item><title>MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#MatRiCT+:%20More%20Efficient%20Post-Quantum%20Private%20Blockchain%20Payments</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#MatRiCT+:%20More%20Efficient%20Post-Quantum%20Private%20Blockchain%20Payments</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Muhammed F. Esgin (Monash University and CSIRO&#39;s Data61, Australia), Ron Steinfeld (Monash University, Australia), Raymond K. Zhao (Monash University, Australia)</author></item><item><title>Measuring and Mitigating the Risk of IP Reuse on Public Clouds</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Measuring%20and%20Mitigating%20the%20Risk%20of%20IP%20Reuse%20on%20Public%20Clouds</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Measuring%20and%20Mitigating%20the%20Risk%20of%20IP%20Reuse%20on%20Public%20Clouds</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Eric Pauley (Pennsylvania State University), Ryan Sheatsley (Pennsylvania State University), Blaine Hoak (Pennsylvania State University), Quinn Burke (Pennsylvania State University), Yohan Beugin (Pennsylvania State University), Patrick McDaniel (Pennsylvania State University)</author></item><item><title>Membership inference attacks from first principles</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Membership%20inference%20attacks%20from%20first%20principles</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Membership%20inference%20attacks%20from%20first%20principles</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Nicholas Carlini (Google Brain), Steve Chien (Google Brain), Milad Nasr (UMASS), Shuang Song (Google Research, Brain), Andreas Terzis (Google, Inc.), Florian Tramer (Google Brain)</author></item><item><title>MeshUp: Stateless Cache Side-channel Attack on CPU Mesh</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#MeshUp:%20Stateless%20Cache%20Side-channel%20Attack%20on%20CPU%20Mesh</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#MeshUp:%20Stateless%20Cache%20Side-channel%20Attack%20on%20CPU%20Mesh</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Junpeng Wan (Fudan University), Yanxiang Bi (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine)</author></item><item><title>Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Mind%20the%20Gap:%20Studying%20the%20Insecurity%20of%20Provably%20Secure%20Embedded%20Trusted%20Execution%20Architectures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Mind%20the%20Gap:%20Studying%20the%20Insecurity%20of%20Provably%20Secure%20Embedded%20Trusted%20Execution%20Architectures</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Marton Bognar (KU Leuven), Jo Van Bulck (KU Leuven), Frank Piessens (KU Leuven)</author></item><item><title>Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Mitigating%20Information%20Leakage%20Vulnerabilities%20with%20Type-based%20Data%20Isolation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Mitigating%20Information%20Leakage%20Vulnerabilities%20with%20Type-based%20Data%20Isolation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Alyssa Milburn (Vrije Universiteit Amsterdam, The Netherlands), Erik van der Kouwe (Vrije Universiteit Amsterdam, The Netherlands), Cristiano Giuffrida (Vrije Universiteit Amsterdam, The Netherlands)</author></item><item><title>Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Model%20Orthogonalization:%20Class%20Distance%20Hardening%20in%20Neural%20Networks%20for%20Better%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Model%20Orthogonalization:%20Class%20Distance%20Hardening%20in%20Neural%20Networks%20for%20Better%20Security</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Guanhong Tao (Purdue University), Yingqi Liu (Purdue University), Guangyu Shen (Purdue University), Qiuling Xu (Purdue University), Shengwei An (Purdue University), Zhuo Zhang (Purdue University), Xiangyu Zhang (Purdue University)</author></item><item><title>Model Stealing Attacks Against Inductive Graph Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Model%20Stealing%20Attacks%20Against%20Inductive%20Graph%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Model%20Stealing%20Attacks%20Against%20Inductive%20Graph%20Neural%20Networks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yun Shen (Norton Research Group), Xinlei He (CISPA Helmholtz Center for Information Security), Yufei Han (Inria), Yang Zhang (CISPA Helmholtz Center for Information Security)</author></item><item><title>Multi-Server Verifiable Computation of Low-Degree Polynomials</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Multi-Server%20Verifiable%20Computation%20of%20Low-Degree%20Polynomials</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Multi-Server%20Verifiable%20Computation%20of%20Low-Degree%20Polynomials</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Liang Feng Zhang (ShanghaiTech University), Huaxiong Wang (Nanyang Technological University)</author></item><item><title>Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Noise-SDR:%20Arbitrary%20Modulation%20of%20Electromagnetic%20Noise%20from%20Unprivileged%20Software%20and%20Its%20Impact%20on%20Emission%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Noise-SDR:%20Arbitrary%20Modulation%20of%20Electromagnetic%20Noise%20from%20Unprivileged%20Software%20and%20Its%20Impact%20on%20Emission%20Security</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Giovanni Camurati (EURECOM, France), Aurélien Francillon (EURECOM, France)</author></item><item><title>Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Noise:%20A%20Library%20of%20Verified%20High-Performance%20Secure%20Channel%20Protocol%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Noise:%20A%20Library%20of%20Verified%20High-Performance%20Secure%20Channel%20Protocol%20Implementations</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Son Ho (INRIA), Jonathan Protzenko (Microsoft Research), Abhishek Bichhawat (IIT Gandhinagar), Karthikeyan Bhargavan (INRIA)</author></item><item><title>PATA: Fuzzing with Path Aware Taint Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#PATA:%20Fuzzing%20with%20Path%20Aware%20Taint%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#PATA:%20Fuzzing%20with%20Path%20Aware%20Taint%20Analysis</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jie Liang (Tsinghua University, China), Mingzhe Wang (Tsinghua University, China), Chijin Zhou (Tsinghua University, China), Zhiyong Wu (Tsinghua University, China), Yu Jiang (Tsinghua University, China), (Jianzhong Liu (Tsinghua University, China), Zhe Liu (Nanjing University of Aeronautics and Astronautics, China), Jiaguang Sun (Tsinghua University, China)</author></item><item><title>PCR-Auth: Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#PCR-Auth:%20Solving%20Authentication%20Puzzle%20Challenges%20with%20Encoded%20Palm%20Contact%20Responses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#PCR-Auth:%20Solving%20Authentication%20Puzzle%20Challenges%20with%20Encoded%20Palm%20Contact%20Responses</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Long Huang (Louisiana State University), Chen Wang (Louisiana State University)</author></item><item><title>PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#PGPATCH:%20Policy-Guided%20Logic%20Bug%20Patching%20for%20Robotic%20Vehicles</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#PGPATCH:%20Policy-Guided%20Logic%20Bug%20Patching%20for%20Robotic%20Vehicles</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Z. Berkay Celik (Purdue University), Antonio Bianchi (Purdue University), Dongyan Xu (Purdue University)</author></item><item><title>PICCOLO: Exposing Complex Backdoors in NLP Transformer Models</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#PICCOLO:%20Exposing%20Complex%20Backdoors%20in%20NLP%20Transformer%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#PICCOLO:%20Exposing%20Complex%20Backdoors%20in%20NLP%20Transformer%20Models</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yingqi Liu (Purdue Univ.), Guangyu Shen (Purdue University), Guanhong Tao (Purdue University), Shengwei An (Purdue University), Shiqing Ma (Rutgers University), Xiangyu Zhang (Purdue University)</author></item><item><title>PROTRR: Principled yet Optimal In-DRAM Target Row Refresh</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#PROTRR:%20Principled%20yet%20Optimal%20In-DRAM%20Target%20Row%20Refresh</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#PROTRR:%20Principled%20yet%20Optimal%20In-DRAM%20Target%20Row%20Refresh</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Michele Marazzi (ETH Zurich), Patrick Jattke (ETH Zurich), Flavien Solt (ETH Zurich), Kaveh Razavi (ETH Zurich)</author></item><item><title>Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Peekaboo:%20A%20Hub-Based%20Approach%20to%20Enable%20Transparency%20in%20Data%20Processing%20within%20Smart%20Homes</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Peekaboo:%20A%20Hub-Based%20Approach%20to%20Enable%20Transparency%20in%20Data%20Processing%20within%20Smart%20Homes</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Haojian Jin (Carnegie Mellon University), Gregory William Joseph Liu (Carnegie Mellon University), David Ethan Hwang (Carnegie Mellon University), Swarun Kumar (Carnegie Mellon University), Yuvraj Agarwal (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)</author></item><item><title>Phishing in Organizations: Findings from a Large-Scale and Long-Term Study</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Phishing%20in%20Organizations:%20Findings%20from%20a%20Large-Scale%20and%20Long-Term%20Study</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Phishing%20in%20Organizations:%20Findings%20from%20a%20Large-Scale%20and%20Long-Term%20Study</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Daniele Lain (ETH Zurich), Kari Kostiainen (ETH Zurich), Srdjan Capkun (ETH Zurich)</author></item><item><title>Practical Asynchronous Distributed Key Generation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Practical%20Asynchronous%20Distributed%20Key%20Generation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Practical%20Asynchronous%20Distributed%20Key%20Generation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sourav Das (UIUC), Tom Yurek (UIUC), Zhuolun Xiang (UIUC), Andrew Miller (UIUC), Lefteris Kokoris-Kogias (IST Austria), Ling Ren (UIUC)</author></item><item><title>Practical EMV Relay Protection</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Practical%20EMV%20Relay%20Protection</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Practical%20EMV%20Relay%20Protection</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Andreea-Ina Radu (University of Birmingham, UK), Tom Chothia (University of Birmingham, UK), Christopher J.P. Newton (University of Surrey, UK), Ioana Boureanu (University of Surrey, UK), Liqun Chen (University of Surrey, UK)</author></item><item><title>Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Privacy-from-Birth:%20Protecting%20Sensed%20Data%20from%20Malicious%20Sensors%20with%20VERSA</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Privacy-from-Birth:%20Protecting%20Sensed%20Data%20from%20Malicious%20Sensors%20with%20VERSA</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ivan De Oliveira Nunes (Rochester Institute of Technology), Seoyeon Hwang (UC Irvine), Sashidhar Jakkamsetti (UC Irvine), Gene Tsudik (UC Irvine)</author></item><item><title>Private Nearest Neighbor Search with Sublinear Communication and Malicious Security</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Private%20Nearest%20Neighbor%20Search%20with%20Sublinear%20Communication%20and%20Malicious%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Private%20Nearest%20Neighbor%20Search%20with%20Sublinear%20Communication%20and%20Malicious%20Security</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sacha Servan-Schreiber (Massachusetts Institute of Technology), Simon Langowski (Massachusetts Institute of Technology), Srinivas Devadas (Massachusetts Institute of Technology)</author></item><item><title>ProVerif with Lemmas, Induction, Fast Subsumption, and Much More</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#ProVerif%20with%20Lemmas,%20Induction,%20Fast%20Subsumption,%20and%20Much%20More</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#ProVerif%20with%20Lemmas,%20Induction,%20Fast%20Subsumption,%20and%20Much%20More</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Bruno Blanchet (Inria Paris), Vincent Cheval (Inria Paris), Véronique Cortier (Université de Lorraine, CNRS, Inria)</author></item><item><title>Property Inference from Poisoning</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Property%20Inference%20from%20Poisoning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Property%20Inference%20from%20Poisoning</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Saeed Mahloujifar (Princeton), Esha Ghosh (Microsoft Research), Melissa Chase (Microsoft Research)</author></item><item><title>Publicly Accountable Robust Multi-Party Computation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Publicly%20Accountable%20Robust%20Multi-Party%20Computation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Publicly%20Accountable%20Robust%20Multi-Party%20Computation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Marc Rivinius (University of Stuttgart), Pascal Reisert (University of Stuttgart), Daniel Rausch (University of Stuttgart), Ralf Küsters (University of Stuttgart)</author></item><item><title>Quantifying Blockchain Extractable Value:How dark is the forest?</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Quantifying%20Blockchain%20Extractable%20Value:How%20dark%20is%20the%20forest?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Quantifying%20Blockchain%20Extractable%20Value:How%20dark%20is%20the%20forest?</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Kaihua Qin (Imperial College London), Liyi Zhou (Imperial College London), Arthur Gervais (Imperial College London)</author></item><item><title>RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#RT-TEE:%20Real-time%20System%20Availability%20for%20Cyber-physical%20Systems%20using%20ARM%20TrustZone</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#RT-TEE:%20Real-time%20System%20Availability%20for%20Cyber-physical%20Systems%20using%20ARM%20TrustZone</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jinwen Wang (Washington University in St. Louis), Ao Li (Washington University in St. Louis), Haoran Li (Washington University in St. Louis), Chenyang Lu (Washington University in St. Louis), Ning Zhang (Washington University in St. Louis)</author></item><item><title>Reconstructing Training Data with Informed Adversaries</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Reconstructing%20Training%20Data%20with%20Informed%20Adversaries</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Reconstructing%20Training%20Data%20with%20Informed%20Adversaries</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Borja Balle (DeepMind), Giovanni Cherubin (Alan Turing Institute), Jamie Hayes (DeepMind), Giovanni Cherubin (Alan Turing Institute)</author></item><item><title>Repairing DoS Vulnerability of Real-World Regexes</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Repairing%20DoS%20Vulnerability%20of%20Real-World%20Regexes</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Repairing%20DoS%20Vulnerability%20of%20Real-World%20Regexes</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Nariyoshi Chida (NTT Secure Platform Laboratories), Tachio Terauchi (Waseda University)</author></item><item><title>Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Robbery%20on%20DevOps:%20Understanding%20and%20Mitigating%20Illicit%20Cryptomining%20on%20Continuous%20Integration%20Service%20Platforms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Robbery%20on%20DevOps:%20Understanding%20and%20Mitigating%20Illicit%20Cryptomining%20on%20Continuous%20Integration%20Service%20Platforms</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhi Li (School of Cyber Science and Engineering, Huazhong University of Science and Technology, China; School of Computer Science and Technology, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing Technology and System Lab, China; Big Data Security Engineering Research Center, China), Weijie Liu (Indiana University Bloomington, USA), Hongbo Chen (Indiana University Bloomington, USA), XiaoFeng Wang (Indiana University Bloomington, USA), Xiaojing Liao (Indiana University Bloomington, USA), Luyi Xing (Indiana University Bloomington, USA), Mingming Zha (Indiana University Bloomington, USA), Hai Jin (School of Computer Science and Technology, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing, Deqing Zou (School of Cyber Science and Engineering, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing Technology and System Lab, China; Big Data Security Engineering Research Center, China Technology and System Lab, China; Big Data Security Engineering Research Center, China)</author></item><item><title>SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SAILFISH:%20Vetting%20Smart%20Contract%20State-Inconsistency%20Bugs%20in%20Seconds</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SAILFISH:%20Vetting%20Smart%20Contract%20State-Inconsistency%20Bugs%20in%20Seconds</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Priyanka Bose (University of California, Santa Barbara), Dipanjan Das (University of California, Santa Barbara), Yanju Chen (University of California, Santa Barbara), Yu Feng (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (UC Santa Barbara)</author></item><item><title>SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SIRAJ:%20A%20Unified%20Framework%20for%20Aggregation%20of%20Malicious%20Entity%20Detectors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SIRAJ:%20A%20Unified%20Framework%20for%20Aggregation%20of%20Malicious%20Entity%20Detectors</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Saravanan Thirumuruganathan (QCRI), Mohamed Nabeel (QCRI), Euijin Choo (Qatar Computing Research Institute), Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU), Ting Yu (Qatar Computing Research Institute)</author></item><item><title>SMILE: Secure Memory Introspection for Live Enclave</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SMILE:%20Secure%20Memory%20Introspection%20for%20Live%20Enclave</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SMILE:%20Secure%20Memory%20Introspection%20for%20Live%20Enclave</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Lei Zhou (Southern University of Science and Technology (SUSTech)), Xuhua Ding (Singapore Management University), Fengwei Zhang (Southern University of Science and Technology (SUSTech))</author></item><item><title>SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SNARKBlock:%20Federated%20Anonymous%20Blocklisting%20from%20Hidden%20Common%20Input%20Aggregate%20Proofs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SNARKBlock:%20Federated%20Anonymous%20Blocklisting%20from%20Hidden%20Common%20Input%20Aggregate%20Proofs</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Michael Rosenberg (University of Maryland), Mary Maller (Ethereum Foundation), Ian Miers (University of Maryland)</author></item><item><title>SPURT: Scalable Distributed Randomness Beacon with Transparent Setup</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SPURT:%20Scalable%20Distributed%20Randomness%20Beacon%20with%20Transparent%20Setup</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SPURT:%20Scalable%20Distributed%20Randomness%20Beacon%20with%20Transparent%20Setup</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sourav Das (UIUC), Vinith Krishnan (UIUC), Irene Isaac (UIUC), Ling Ren (UIUC)</author></item><item><title>SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SYMBEXCEL:%20Automated%20Analysis%20and%20Understanding%20of%20Malicious%20Excel%204.0%20Macros</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SYMBEXCEL:%20Automated%20Analysis%20and%20Understanding%20of%20Malicious%20Excel%204.0%20Macros</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Nicola Ruaro (UC Santa Barbara), Fabio Pagani (UC Santa Barbara), Stefano Ortolani (VMware), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)</author></item><item><title>Sabre: Sender-Anonymous Messaging with Fast Audits</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Sabre:%20Sender-Anonymous%20Messaging%20with%20Fast%20Audits</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Sabre:%20Sender-Anonymous%20Messaging%20with%20Fast%20Audits</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Adithya Vadapalli (Indiana University Bloomington), Kyle Storrier (University of Calgary), Ryan Henry (University of Calgary)</author></item><item><title>Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Scraping%20Sticky%20Leftovers:%20App%20User%20Information%20Left%20on%20Servers%20After%20Account%20Deletion</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Scraping%20Sticky%20Leftovers:%20App%20User%20Information%20Left%20on%20Servers%20After%20Account%20Deletion</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Preethi Santhanam (Wichita State University), Hoang Dang (Wichita State University), Zhiyong Shan (Wichita State University), Iulian Neamtiu (New Jersey Institute of Technology)</author></item><item><title>SecFloat: Accurate Floating-Point meets Secure 2-Party Computation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SecFloat:%20Accurate%20Floating-Point%20meets%20Secure%202-Party%20Computation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SecFloat:%20Accurate%20Floating-Point%20meets%20Secure%202-Party%20Computation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Deevashwer Rathee (UC Berkeley), Anwesh Bhattacharya (Microsoft Research India), Rahul Sharma (Microsoft Research India), Divya Gupta (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Aseem Rastogi (Microsoft Research India)</author></item><item><title>Security Analysis of the MLS Key Derivation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Security%20Analysis%20of%20the%20MLS%20Key%20Derivation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Security%20Analysis%20of%20the%20MLS%20Key%20Derivation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Chris Brzuska (Aalto University, Finland), Eric Cornelissen (Aalto University, Finland), Konrad Kohbrok (Aalto University, Finland)</author></item><item><title>Security Foundations for Application-Based Covert Communication Channels</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Security%20Foundations%20for%20Application-Based%20Covert%20Communication%20Channels</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Security%20Foundations%20for%20Application-Based%20Covert%20Communication%20Channels</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>James K Howes IV (University of Florida), Marios Georgiou (Galois), Alex Malozemoff (Galois), Thomas Shrimpton (University of Florida)</author></item><item><title>ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#ShadeWatcher:%20Recommendation-guided%20Cyber%20Threat%20Analysis%20using%20System%20Audit%20Records</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#ShadeWatcher:%20Recommendation-guided%20Cyber%20Threat%20Analysis%20using%20System%20Audit%20Records</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jun Zeng (National University of Singapore), Xiang Wang (National University of Singapore), Jiahao Liu (National University of Singapore), Yinfang Chen (University of Illinois - Urbana Champaign), Zhenkai Liang (National University of Singapore), Tat-Seng Chua (National University of Singapore), Zheng Leong Chua (Independent Researcher)</author></item><item><title>ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#ShorTor:%20Improving%20Tor%20Network%20Latency%20via%20Multi-hop%20Overlay%20Routing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#ShorTor:%20Improving%20Tor%20Network%20Latency%20via%20Multi-hop%20Overlay%20Routing</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Kyle Hogan (MIT), Sacha Servan-Schreiber (MIT), Zachary Newman (MIT), Ben Weintraub (Northeastern University), Cristina Nita-Rotaru (Northeastern University), Srinivas Devadas (MIT)</author></item><item><title>SoK: A Framework for Unifying At-Risk User Research</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20A%20Framework%20for%20Unifying%20At-Risk%20User%20Research</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20A%20Framework%20for%20Unifying%20At-Risk%20User%20Research</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Noel Warford (University of Maryland), Tara Matthews (Google), Kaitlyn Yang (University of Maryland), Omer Akgul (University of Maryland), Sunny Consolvo (Google), Patrick Gage Kelley (Google), Nathan Malkin (University of Maryland), Michelle L. Mazurek (University of Maryland), Manya Sleeper (Google), Kurt Thomas (Google)</author></item><item><title>SoK: Authentication in Augmented and Virtual Reality</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Authentication%20in%20Augmented%20and%20Virtual%20Reality</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Authentication%20in%20Augmented%20and%20Virtual%20Reality</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sophie Stephenson (University of Wisconsin--Madison), Bijeeta Pal (Cornell University), Stephen Fan (University of Wisconsin--Madison), Earlence Fernandes (UW Madison), Yuhang Zhao (University of Wisconsin-Madison), Rahul Chatterjee (University of Wisconsin--Madison)</author></item><item><title>SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Demystifying%20Binary%20Lifters%20Through%20the%20Lens%20of%20Downstream%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Demystifying%20Binary%20Lifters%20Through%20the%20Lens%20of%20Downstream%20Applications</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Shuai Wang (The Hong Kong University of Science and Technology), Yuyan Bao (University of Waterloo)</author></item><item><title>SoK: How Robust is Image Classification Deep Neural Network Watermarking?</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20How%20Robust%20is%20Image%20Classification%20Deep%20Neural%20Network%20Watermarking?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20How%20Robust%20is%20Image%20Classification%20Deep%20Neural%20Network%20Watermarking?</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Nils Lukas (University of Waterloo), Edward Jiang (University of Waterloo), Xinda Li (University of Waterloo), Florian Kerschbaum (University of Waterloo)</author></item><item><title>SoK: Practical Foundations for Software Spectre Defenses</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Practical%20Foundations%20for%20Software%20Spectre%20Defenses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Practical%20Foundations%20for%20Software%20Spectre%20Defenses</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sunjay Cauligi (UC San Diego), Craig Disselkoen (UC San Diego), Daniel Moghimi (UC San Diego), Gilles Barthe (MPI-SP and IMDEA Software Institute), Deian Stefan (UC San Diego)</author></item><item><title>SoK: Social Cybersecurity</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Social%20Cybersecurity</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20Social%20Cybersecurity</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yuxi Wu (Georgia Institute of Technology), W. Keith Edwards (Georgia Institute of Technology), Sauvik Das (Georgia Institute of Technology)</author></item><item><title>SoK: The Dual Nature of Technology in Sexual Assault</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20The%20Dual%20Nature%20of%20Technology%20in%20Sexual%20Assault</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SoK:%20The%20Dual%20Nature%20of%20Technology%20in%20Sexual%20Assault</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Borke Obada-Obieh (The University of British Columbia), Yue Huang (University of British Columbia), Lucrezia Spagnolo (Vesta Social Innovation Technologies), Konstantin (Kosta) Beznosov (University of British Columbia)</author></item><item><title>SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SpecHammer:%20Combining%20Spectre%20and%20Rowhammer%20for%20New%20Speculative%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SpecHammer:%20Combining%20Spectre%20and%20Rowhammer%20for%20New%20Speculative%20Attacks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Youssef Tobah (The University of Michigan), Andrew Kwong (University of Michigan), Ingab Kang (University of Michigan), Daniel Genkin (Georgia Institute of Technology), Kang G. Shin (The University of Michigan)</author></item><item><title>Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Sphinx:%20Enabling%20Privacy-Preserving%20Online%20Learning%20over%20the%20Cloud</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Sphinx:%20Enabling%20Privacy-Preserving%20Online%20Learning%20over%20the%20Cloud</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Han Tian (Hong Kong University of Science and Technology), Chaoliang Zeng (Hong Kong University of Science and Technology), Zhenghang Ren (Hong Kong University of Science and Technology), Di Chai (Hong Kong University of Science and Technology), Junxue ZHANG (Hong Kong University of Science and Technology), Kai Chen (Hong Kong University of Science and Technology), Qiang Yang (Hong Kong University of Science and Technology)</author></item><item><title>Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Spinning%20Language%20Models:%20Risks%20of%20Propaganda-as-a-Service%20and%20Countermeasures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Spinning%20Language%20Models:%20Risks%20of%20Propaganda-as-a-Service%20and%20Countermeasures</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Eugene Bagdasaryan (Cornell Tech), Vitaly Shmatikov (Cornell Tech)</author></item><item><title>Spiral: Fast, High-Rate Single-Server PIR via FHE Composition</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Spiral:%20Fast,%20High-Rate%20Single-Server%20PIR%20via%20FHE%20Composition</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Spiral:%20Fast,%20High-Rate%20Single-Server%20PIR%20via%20FHE%20Composition</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Samir Jordan Menon (None), David J. Wu (UT Austin)</author></item><item><title>Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Spook.js:%20Attacking%20Chrome%20Strict%20Site%20Isolation%20via%20Speculative%20Execution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Spook.js:%20Attacking%20Chrome%20Strict%20Site%20Isolation%20via%20Speculative%20Execution</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ayush Agarwal (University of Michigan, USA), Sioli O’Connell (University of Adelaide, Australia), Jason Kim (Georgia Institute of Technology, USA), Shaked Yehezkel (Tel Aviv University, Israel), Daniel Genkin (Georgia Institute of Technology, USA), Eyal Ronen (Tel Aviv University, Israel), Yuval Yarom (University of Adelaide, Australia)</author></item><item><title>Statistical Quantification of Differential Privacy: A Local Approach</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Statistical%20Quantification%20of%20Differential%20Privacy:%20A%20Local%20Approach</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Statistical%20Quantification%20of%20Differential%20Privacy:%20A%20Local%20Approach</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Önder Askin (Ruhr-University Bochum), Tim Kutta (Ruhr-University Bochum), Holger Dette (Ruhr-University Bochum)</author></item><item><title>Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Surakav:%20Generating%20Realistic%20Traces%20for%20a%20Strong%20Website%20Fingerprinting%20Defense</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Surakav:%20Generating%20Realistic%20Traces%20for%20a%20Strong%20Website%20Fingerprinting%20Defense</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Jiajun GONG (The Hong Kong University of Science and Technology), Wuqi Zhang (The Hong Kong University of Science and Technology), Charles Zhang (The Hong Kong University of Science and Technology), Tao Wang (Simon Fraser University)</author></item><item><title>SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#SwarmFlawFinder:%20Discovering%20and%20Exploiting%20Logic%20Flaws%20of%20Swarm%20Algorithms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#SwarmFlawFinder:%20Discovering%20and%20Exploiting%20Logic%20Flaws%20of%20Swarm%20Algorithms</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Chijung Jung (University of Virginia), Ali Ahad (University of Virginia), Yuseok Jeon (UNIST), Yonghwi Kwon (University of Virginia)</author></item><item><title>TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#TASHAROK:%20Using%20Mechanism%20Design%20for%20Enhancing%20Security%20Resource%20Allocation%20in%20Interdependent%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#TASHAROK:%20Using%20Mechanism%20Design%20for%20Enhancing%20Security%20Resource%20Allocation%20in%20Interdependent%20Systems</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Mustafa Abdallah (Purdue University), Daniel Woods (University of Innsbruck), Parinaz Naghizadeh (Ohio State University), Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU), Timothy Cason (Purdue University), Shreyas Sundaram (Purdue University), Saurabh Bagchi (Purdue University)</author></item><item><title>TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit?</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#TROLLMAGNIFIER:%20Detecting%20State-Sponsored%20Troll%20Accounts%20on%20Reddit?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#TROLLMAGNIFIER:%20Detecting%20State-Sponsored%20Troll%20Accounts%20on%20Reddit?</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Mohammad Hammas Saeed (Boston University), Shiza Ali (Boston University), Jeremy Blackburn (Binghamton University), Emiliano De Cristofaro (University College London), Savvas Zannettou (TU Delft), Gianluca Stringhini (Boston University)</author></item><item><title>The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#The%20State%20of%20the%20SameSite:%20Studying%20the%20Usage,%20Effectiveness,%20and%20Adequacy%20of%20SameSite%20Cookies</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#The%20State%20of%20the%20SameSite:%20Studying%20the%20Usage,%20Effectiveness,%20and%20Adequacy%20of%20SameSite%20Cookies</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Soheil Khodayari (CISPA Helmholtz Center for Information Security, Germany), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security, Germany)</author></item><item><title>Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Time-Print:%20Authenticating%20USB%20Flash%20Drives%20with%20Novel%20Timing%20Fingerprints</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Time-Print:%20Authenticating%20USB%20Flash%20Drives%20with%20Novel%20Timing%20Fingerprints</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Patrick Cronin (University of Delaware), Xing Gao (University of Delaware), Haining Wang (Virginia Tech), Chase Cotton (University of Delaware)</author></item><item><title>Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Timing-Based%20Browsing%20Privacy%20Vulnerabilities%20Via%20Site%20Isolation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Timing-Based%20Browsing%20Privacy%20Vulnerabilities%20Via%20Site%20Isolation</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zihao Jin (Microsoft Research Asia and Tsinghua University, China), Ziqiao Kong (Microsoft Research Asia, China), Shuo Chen (Microsoft Research Asia), Haixin Duan (Tsinghua University, China)</author></item><item><title>Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Towards%20Automated%20Auditing%20for%20Account%20and%20Session%20Management%20Flaws%20in%20Single%20Sign-On%20Deployments</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Towards%20Automated%20Auditing%20for%20Account%20and%20Session%20Management%20Flaws%20in%20Single%20Sign-On%20Deployments</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Mohammad Ghasemisharif (University of Illinois at Chicago), Chris Kanich (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago)</author></item><item><title>Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Transcending%20TRANSCEND:%20Revisiting%20Malware%20Classification%20in%20the%20Presence%20of%20Concept%20Drift</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Transcending%20TRANSCEND:%20Revisiting%20Malware%20Classification%20in%20the%20Presence%20of%20Concept%20Drift</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Federico Barbero (King&#39;s College London &amp;amp; University of Cambridge), Feargus Pendlebury (ICSI &amp;amp; King&#39;s College London &amp;amp; Royal Holloway, University of London), Fabio Pierazzi (King&#39;s College London), Lorenzo Cavallaro (University College London)</author></item><item><title>Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Transfer%20Attacks%20Revisited:%20A%20Large-Scale%20Empirical%20Study%20in%20Real%20Computer%20Vision%20Settings</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Transfer%20Attacks%20Revisited:%20A%20Large-Scale%20Empirical%20Study%20in%20Real%20Computer%20Vision%20Settings</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yuhao Mao (Zhejiang University), Saizhuo Wang (Zhejiang University), Shouling Ji (Zhejiang University), Xuhong Zhang (Zhejiang University), Zhenguang Liu (Zhejiang Gongshang University), Jun Zhou (Ant Financial Services Group), Raheem Beyah (Georgia Institute of Technology), Ting Wang (Penn State)</author></item><item><title>Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Universal%203-Dimensional%20Perturbations%20for%20Black-Box%20Attacks%20on%20Video%20Recognition%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Universal%203-Dimensional%20Perturbations%20for%20Black-Box%20Attacks%20on%20Video%20Recognition%20Systems</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Shangyu Xie (Illinois Institute of Technology, USA), Han Wang (Illinois Institute of Technology, USA), Yu Kong (Rochester Institute of Technology, USA), Yuan Hong (Illinois Institute of Technology, USA)</author></item><item><title>Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Universal%20Atomic%20Swaps:%20Secure%20Exchange%20of%20Coins%20Across%20All%20Blockchains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Universal%20Atomic%20Swaps:%20Secure%20Exchange%20of%20Coins%20Across%20All%20Blockchains</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Sri AravindaKrishnan Thyagarajan (Friedrich Alexander University of Erlangen-Nürnberg), Giulio Malavolta (Max Planck Institute for Security and Privacy), Pedro Moreno-Sanchez (IMDEA Software Institute)</author></item><item><title>Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Using%20Throughput-Centric%20Byzantine%20Broadcast%20to%20Tolerate%20Malicious%20Majority%20in%20Blockchains</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Using%20Throughput-Centric%20Byzantine%20Broadcast%20to%20Tolerate%20Malicious%20Majority%20in%20Blockchains</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Ruomu Hou (National University of Singapore), Haifeng Yu (National University of Singapore), Prateek Saxena (National University of Singapore)</author></item><item><title>WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#WIGHT:%20Wired%20Ghost%20Touch%20Attack%20on%20Capacitive%20Touchscreens</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#WIGHT:%20Wired%20Ghost%20Touch%20Attack%20on%20Capacitive%20Touchscreens</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Kai Wang (Zhejiang University), Chen Yan (Zhejiang University), Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi (Technical University of Darmstadt), Wenyuan Xu (Zhejiang University)</author></item><item><title>Waldo: A Private Time-Series Database from Function Secret-Sharing</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Waldo:%20A%20Private%20Time-Series%20Database%20from%20Function%20Secret-Sharing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Waldo:%20A%20Private%20Time-Series%20Database%20from%20Function%20Secret-Sharing</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Emma Dauterman (UC Berkeley), Mayank Rathee (UC Berkeley), Raluca Popa (UC Berkeley), Ion Stoica (UC Berkeley)</author></item><item><title>Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Why%20Crypto-detectors%20Fail:%20A%20Systematic%20Evaluation%20of%20Cryptographic%20Misuse%20Detection%20Techniques</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Why%20Crypto-detectors%20Fail:%20A%20Systematic%20Evaluation%20of%20Cryptographic%20Misuse%20Detection%20Techniques</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Amit Seal Ami (William &amp;amp; Mary), Nathan Cooper (William &amp;amp; Mary), Kaushal Kafle (William &amp;amp; Mary), Kevin Moran (George Mason University), Denys Poshyvanyk (William &amp;amp; Mary), Adwait Nadkarni (William &amp;amp; Mary)</author></item><item><title>Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#Wobfuscator:%20Obfuscating%20JavaScript%20Malware%20via%20Opportunistic%20Translation%20to%20WebAssembly</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#Wobfuscator:%20Obfuscating%20JavaScript%20Malware%20via%20Opportunistic%20Translation%20to%20WebAssembly</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Alan Romano (University at Buffalo, SUNY), Daniel Lehmann (University of Stuttgart), Michael Pradel (University of Stuttgart), Weihang Wang (University at Buffalo, SUNY)</author></item><item><title>WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#WtaGraph:%20Web%20Tracking%20and%20Advertising%20Detection%20using%20Graph%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#WtaGraph:%20Web%20Tracking%20and%20Advertising%20Detection%20using%20Graph%20Neural%20Networks</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Zhiju Yang (Colorado School of Mines), Weiping Pei (Colorado School of Mines), Monchu Chen (Appen), Chuan Yue (Colorado School of Mines)</author></item><item><title>ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#ZeeStar:%20Private%20Smart%20Contracts%20by%20Homomorphic%20Encryption%20and%20Zero-knowledge%20Proofs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#ZeeStar:%20Private%20Smart%20Contracts%20by%20Homomorphic%20Encryption%20and%20Zero-knowledge%20Proofs</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Samuel Steffen (ETH Zurich), Benjamin Bichsel (ETH Zurich), Roger Baumgartner (ETH Zurich), Martin Vechev (ETH Zurich)</author></item><item><title>mmSpy: Spying Phone Calls using mmWave Radars</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#mmSpy:%20Spying%20Phone%20Calls%20using%20mmWave%20Radars</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#mmSpy:%20Spying%20Phone%20Calls%20using%20mmWave%20Radars</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Suryoday Basak (Penn State University), Mahanth Gowda (Penn State University)</author></item><item><title>vSGX: Virtualizing SGX Enclaves on AMD SEV</title><description></description><link>https://www.ieee-security.org/TC/SP2022/program-papers.html#vSGX:%20Virtualizing%20SGX%20Enclaves%20on%20AMD%20SEV</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2022/program-papers.html#vSGX:%20Virtualizing%20SGX%20Enclaves%20on%20AMD%20SEV</guid><pubDate>Fri, 31 Dec 2021 16:00:00 GMT</pubDate><author>Shixuan Zhao (The Ohio State University), Mengyuan Li (The Ohio State University), Yinqian Zhang (Southern University of Science and Technology), Zhiqiang Lin (Ohio State University)</author></item><item><title>A Decentralized and Encrypted National Gun Registry</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Decentralized%20and%20Encrypted%20National%20Gun%20Registry</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Decentralized%20and%20Encrypted%20National%20Gun%20Registry</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Seny Kamara (Brown University), Tarik Moataz (Aroki Systems), Andrew Park (Brown University), Lucy Qin (Brown University)</author></item><item><title>A First Look at Zoombombing</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20First%20Look%20at%20Zoombombing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20First%20Look%20at%20Zoombombing</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Chen Ling (Boston University), Utkucan Balcı (Binghamton University), Jeremy Blackburn (Binghamton University), Gianluca Stringhini (Boston University)</author></item><item><title>A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Novel%20Dynamic%20Analysis%20Infrastructure%20to%20Instrument%20Untrusted%20Execution%20Flow%20Across%20User-Kernel%20Spaces</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Novel%20Dynamic%20Analysis%20Infrastructure%20to%20Instrument%20Untrusted%20Execution%20Flow%20Across%20User-Kernel%20Spaces</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jiaqi Hong (Singapore Management University), Xuhua Ding (Singapore Management University)</author></item><item><title>A Secure and Formally Verified Linux KVM Hypervisor</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Secure%20and%20Formally%20Verified%20Linux%20KVM%20Hypervisor</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Secure%20and%20Formally%20Verified%20Linux%20KVM%20Hypervisor</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Shih-Wei Li (Columbia University), Xupeng Li (Columbia University), John Hui (Columbia University), Jason Nieh (Columbia University), Ronghui Gu (Columbia University)</author></item><item><title>A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Security%20Model%20and%20Fully%20Verified%20Implementation%20for%20the%20IETF%20QUIC%20Record%20Layer</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A%20Security%20Model%20and%20Fully%20Verified%20Implementation%20for%20the%20IETF%20QUIC%20Record%20Layer</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Antoine Delignat-Lavaud (Microsoft Research), Cedric Fournet (Microsoft Research), Bryan Parno (Carnegie Mellon University), Jonathan Protzenko (Microsoft Research), Tahina Ramananandro (Microsoft Research), Jay Bosamiya (Carnegie Mellon University), Joseph Lallemand (Loria, Inria Nancy Grand Est), Itsaka Rakotonirina (Loria, Inria Nancy Grand Est), Yi Zhou (Carnegie Mellon University), Joseph Lallemand (ETH Zürich)</author></item><item><title>A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#A2L:%20Anonymous%20Atomic%20Locks%20for%20Scalability%20in%20Payment%20Channel%20Hubs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#A2L:%20Anonymous%20Atomic%20Locks%20for%20Scalability%20in%20Payment%20Channel%20Hubs</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Erkan Tairi (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Matteo Maffei (TU Wien)</author></item><item><title>ARBITRAR : User-Guided API Misuse Detection</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#ARBITRAR%20:%20User-Guided%20API%20Misuse%20Detection</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#ARBITRAR%20:%20User-Guided%20API%20Misuse%20Detection</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Ziyang Li (University of Pennsylvania), Aravind Machiry (Purdue University), Binghong Chen (Georgia Institute of Technology), Ke Wang (Visa Research), Mayur Naik (University of Pennsylvania), Le Song (Georgia Institute of Technology)</author></item><item><title>Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Adversarial%20Watermarking%20Transformer:%20Towards%20Tracing%20Text%20Provenance%20with%20Data%20Hiding</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Adversarial%20Watermarking%20Transformer:%20Towards%20Tracing%20Text%20Provenance%20with%20Data%20Hiding</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Sahar Abdelnabi (CISPA Helmholtz Center for Information Security), Mario Fritz (CISPA Helmholtz Center for Information Security)</author></item><item><title>Adversary Instantiation: Lower bounds for differentially private machine learning</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Adversary%20Instantiation:%20Lower%20bounds%20for%20differentially%20private%20machine%20learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Adversary%20Instantiation:%20Lower%20bounds%20for%20differentially%20private%20machine%20learning</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Milad Nasr (University of Massachusetts Amherst), Shuang Song (Google), Abhradeep Guha Thakurta (Google), Nicolas Papernot (Google), Nicholas Carlini (Google)</author></item><item><title>An I/O Separation Model for Formal Verification of Kernel Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#An%20I/O%20Separation%20Model%20for%20Formal%20Verification%20of%20Kernel%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#An%20I/O%20Separation%20Model%20for%20Formal%20Verification%20of%20Kernel%20Implementations</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Miao Yu (Carnegie Mellon University), Virgil Gligor (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)</author></item><item><title>An Interactive Prover for Protocol Verification in the Computational Model</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#An%20Interactive%20Prover%20for%20Protocol%20Verification%20in%20the%20Computational%20Model</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#An%20Interactive%20Prover%20for%20Protocol%20Verification%20in%20the%20Computational%20Model</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>David Baelde (LSV, CNRS, ENS Paris-Saclay, Université Paris-Saclay), Stéphanie Delaune (Univ Rennes, CNRS, IRISA), Charlie Jacomme (CISPA Helmholtz Center for Information Security), Adrien Koutsos (INRIA Paris), Solene Moreau (Univ Rennes, CNRS, IRISA), Charlie Jacomme (LSV &amp;amp; CNRS &amp;amp; ENS Paris-Saclay &amp;amp; INRIA &amp;amp; Université Paris-Saclay, Paris, France)</author></item><item><title>Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Android%20Custom%20Permissions%20Demystified:%20From%20Privilege%20Escalation%20to%20Design%20Shortcomings</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Android%20Custom%20Permissions%20Demystified:%20From%20Privilege%20Escalation%20to%20Design%20Shortcomings</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Rui Li (Shandong University), Wenrui Diao (Shandong University), Zhou Li (University of California, Irvine), Jianqi Du (Shandong University), Shanqing Guo (Shandong University)</author></item><item><title>BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#BUFFing%20signature%20schemes%20beyond%20unforgeability%20and%20the%20case%20of%20post-quantum%20signatures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#BUFFing%20signature%20schemes%20beyond%20unforgeability%20and%20the%20case%20of%20post-quantum%20signatures</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Cas Cremers (CISPA Helmholtz Center for Information Security), Samed Düzlü (TU Darmstadt), Rune Fiedler (TU Darmstadt), Marc Fischlin (TU Darmstadt), Christian Janson (TU Darmstadt)</author></item><item><title>Bitcoin-Compatible Virtual Channels</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Bitcoin-Compatible%20Virtual%20Channels</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Bitcoin-Compatible%20Virtual%20Channels</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Lukas Aumayr (Technische Universität Wien), Oguzhan Ersoy (Delft University of Technology), Andreas Erwig (Technische Universität Darmstadt), Sebastian Faust (Technische Universität Darmstadt), Kristina Hostáková (ETH Zürich), Matteo Maffei (Technische Universität Wien), Pedro Moreno-Sanchez (Technische Universität Wien), Siavash Riahi (Technische Universität Darmstadt)</author></item><item><title>Black Widow: Blackbox Data-driven Web Scanning</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Black%20Widow:%20Blackbox%20Data-driven%20Web%20Scanning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Black%20Widow:%20Blackbox%20Data-driven%20Web%20Scanning</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Benjamin Eriksson (Chalmers University of Technology), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security), Andrei Sabelfeld (Chalmers University of Technology)</author></item><item><title>Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Bomberman:%20Defining%20and%20Defeating%20Hardware%20Ticking%20Timebombs%20at%20Design-time</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Bomberman:%20Defining%20and%20Defeating%20Hardware%20Ticking%20Timebombs%20at%20Design-time</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Timothy Trippel (University of Michigan), Kang G. Shin (University of Michigan), Kevin B. Bush (MIT Lincoln Laboratory), Matthew Hicks (Virginia Tech)</author></item><item><title>Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Bookworm%20Game:%20Automatic%20Discovery%20of%20LTE%20Vulnerabilities%20Through%20Documentation%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Bookworm%20Game:%20Automatic%20Discovery%20of%20LTE%20Vulnerabilities%20Through%20Documentation%20Analysis</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yi Chen (Indiana University Bloomington), Yepeng Yao (Institute of Information Engineering, CAS), XiaoFeng Wang (Indiana University Bloomington), Dandan Xu (Institute of Information Engineering, CAS), Xiaozhong Liu (Indiana University Bloomington), Chang Yue (Institute of Information Engineering, CAS), Kai Chen (Institute of Information Engineering, CAS), Haixu Tang (Indiana University Bloomington), Baoxu Liu (Institute of Information Engineering, CAS)</author></item><item><title>Breaking the Specification: PDF Certification</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Breaking%20the%20Specification:%20PDF%20Certification</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Breaking%20the%20Specification:%20PDF%20Certification</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Simon Rohlmann (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Christian Mainka (Ruhr University Bochum), Jörg Schwenk (Ruhr University Bochum)</author></item><item><title>CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CANnon:%20Reliable%20and%20Stealthy%20Remote%20Shutdown%20Attacks%20via%20Unaltered%20Automotive%20Microcontrollers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CANnon:%20Reliable%20and%20Stealthy%20Remote%20Shutdown%20Attacks%20via%20Unaltered%20Automotive%20Microcontrollers</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Sekar Kulandaivel (Carnegie Mellon University), Shalabh Jain (Research and Technology Center, Robert Bosch LLC, USA), Jorge Guajardo (Research and Technology Center, Robert Bosch LLC, USA), Vyas Sekar (Carnegie Mellon University)</author></item><item><title>CRYLOGGER: Detecting Crypto Misuses Dynamically</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CRYLOGGER:%20Detecting%20Crypto%20Misuses%20Dynamically</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CRYLOGGER:%20Detecting%20Crypto%20Misuses%20Dynamically</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Luca Piccolboni (Columbia University), Giuseppe Di Guglielmo (Columbia University), Luca P. Carloni (Columbia University), Simha Sethumadhavan (Columbia University)</author></item><item><title>CacheOut: Leaking Data on Intel CPUs via Cache Evictions</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CacheOut:%20Leaking%20Data%20on%20Intel%20CPUs%20via%20Cache%20Evictions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CacheOut:%20Leaking%20Data%20on%20Intel%20CPUs%20via%20Cache%20Evictions</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Stephan van Schaik (University of Michigan), Marina Minkin (University of Michigan), Andrew Kwong (University of Michigan), Daniel Genkin (University of Michigan), Yuval Yarom (University of Adelaide and Data61)</author></item><item><title>CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CanDID:%20Can-Do%20Decentralized%20Identity%20with%20Legacy%20Compatibility,%20Sybil-Resistance,%20and%20Accountability</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CanDID:%20Can-Do%20Decentralized%20Identity%20with%20Legacy%20Compatibility,%20Sybil-Resistance,%20and%20Accountability</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Sai Krishna Deepak Maram (Cornell Tech), Fan Zhang (Cornell Tech), Harjasleen Malvai (Cornell), Ari Juels (Cornell Tech), Alexander Frolov (Cornell), Nerla Jean-Louis (University of Illinois at Urbana-Champaign), Andrew Miller (University of Illinois at Urbana-Champaign), Tyler Kell (Cornell Tech)</author></item><item><title>Co-Inflow: Coarse-Grained Information Flow Control for Java-like Languages</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Co-Inflow:%20Coarse-Grained%20Information%20Flow%20Control%20for%20Java-like%20Languages</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Co-Inflow:%20Coarse-Grained%20Information%20Flow%20Control%20for%20Java-like%20Languages</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jian Xiang (Harvard University), Stephen Chong (Harvard University)</author></item><item><title>Compact Certificates of Collective Knowledge</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Compact%20Certificates%20of%20Collective%20Knowledge</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Compact%20Certificates%20of%20Collective%20Knowledge</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Silvio Micali (Algorand and MIT), Leonid Reyzin (Algorand and Boston University), Georgios Vlachos (), Riad S. Wahby (Algorand and Stanford), Nickolai Zeldovich (Algorand and MIT)</author></item><item><title>Compositional Non-Interference for Fine-Grained Concurrent Programs</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Compositional%20Non-Interference%20for%20Fine-Grained%20Concurrent%20Programs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Compositional%20Non-Interference%20for%20Fine-Grained%20Concurrent%20Programs</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Dan Frumin (Radboud University), Robbert Krebbers (TU Delft), Lars Birkedal (Aarhus University)</author></item><item><title>Compositional Security for Reentrant Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Compositional%20Security%20for%20Reentrant%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Compositional%20Security%20for%20Reentrant%20Applications</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Ethan Cecchetti (Cornell University), Siqiu Yao (Cornell University), Haobin Ni (Cornell University), Andrew C. Myers (Cornell University)</author></item><item><title>ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#ConDySTA:%20Context-Aware%20Dynamic%20Supplement%20to%20Static%20Taint%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#ConDySTA:%20Context-Aware%20Dynamic%20Supplement%20to%20Static%20Taint%20Analysis</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Xueling Zhang (University of Texas at San Antonio), Xiaoyin Wang (University of Texas at San Antonio), Rocky Slavin (University of Texas at San Antonio), Jianwei Niu (University of Texas at San Antonio)</author></item><item><title>CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CrawlPhish:%20Large-scale%20Analysis%20of%20Client-side%20Cloaking%20Techniques%20in%20Phishing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CrawlPhish:%20Large-scale%20Analysis%20of%20Client-side%20Cloaking%20Techniques%20in%20Phishing</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Penghui Zhang (Arizona State University), Adam Oest (Arizona State University), Haehyun Cho (Arizona State University), Zhibo Sun (Arizona State University), RC Johnson (PayPal), Brad Wardman (PayPal), Shaown Sarker (North Carolina State University), Alexandros Kapravelos (North Carolina State University), Tiffany Bao (Arizona State University), Ruoyu Wang (Arizona State University), Yan Shoshitaishvili (Arizona State University), Adam Doupé (Arizona State University), Gail-Joon Ahn (Arizona State University and Samsung Research)</author></item><item><title>Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Cross%20Layer%20Attacks%20and%20How%20to%20Use%20Them%20(for%20DNS%20Cache%20Poisoning,%20Device%20Tracking%20and%20More)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Cross%20Layer%20Attacks%20and%20How%20to%20Use%20Them%20(for%20DNS%20Cache%20Poisoning,%20Device%20Tracking%20and%20More)</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Amit Klein (Bar Ilan University)</author></item><item><title>Cross-Domain Access Control Encryption -- Arbitrary-policy, Constant-size, Efficient</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Cross-Domain%20Access%20Control%20Encryption%20--%20Arbitrary-policy,%20Constant-size,%20Efficient</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Cross-Domain%20Access%20Control%20Encryption%20--%20Arbitrary-policy,%20Constant-size,%20Efficient</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Xiuhua Wang (The Chinese University of Hong Kong), Sherman S. M. Chow (The Chinese University of Hong Kong)</author></item><item><title>CrossTalk: Speculative Data Leaks Across Cores Are Real</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CrossTalk:%20Speculative%20Data%20Leaks%20Across%20Cores%20Are%20Real</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CrossTalk:%20Speculative%20Data%20Leaks%20Across%20Cores%20Are%20Real</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Hany Ragab (Vrije Universiteit Amsterdam), Alyssa Milburn (Vrije Universiteit Amsterdam), Kaveh Razavi (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam), Kaveh Razavi (ETH Zurich)</author></item><item><title>CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#CryptGPU:%20Fast%20Privacy-Preserving%20Machine%20Learning%20on%20the%20GPU</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#CryptGPU:%20Fast%20Privacy-Preserving%20Machine%20Learning%20on%20the%20GPU</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Sijun Tan (University of Virginia), Brian Knott (Facebook AI Research), Yuan Tian (University of Virginia), David J. Wu (University of Virginia)</author></item><item><title>DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#DIANE:%20Identifying%20Fuzzing%20Triggers%20in%20Apps%20to%20Generate%20Under-constrained%20Inputs%20for%20IoT%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#DIANE:%20Identifying%20Fuzzing%20Triggers%20in%20Apps%20to%20Generate%20Under-constrained%20Inputs%20for%20IoT%20Devices</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Nilo Redini (UC Santa Barbara), Andrea Continella (University of Twente), Dipanjan Das (UC Santa Barbara), Giulio De Pasquale (UC Santa Barbara), Noah Spahn (UC Santa Barbara), Aravind Machiry (UC Santa Barbara), Antonio Bianchi (Purdue University), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)</author></item><item><title>DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#DICE:%20Automatic%20Emulation%20of%20DMA%20Input%20Channels%20for%20Dynamic%20Firmware%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#DICE:%20Automatic%20Emulation%20of%20DMA%20Input%20Channels%20for%20Dynamic%20Firmware%20Analysis</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Alejandro Mera (Northeastern University), Bo Feng (Northeastern University), Long Lu (Northeastern University), Engin Kirda (Northeastern University)</author></item><item><title>DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#DIFUZZRTL:%20Differential%20Fuzz%20Testing%20to%20Find%20CPU%20Bugs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#DIFUZZRTL:%20Differential%20Fuzz%20Testing%20to%20Find%20CPU%20Bugs</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jaewon Hur (Seoul National University), Suhwan Song (Seoul National University), Dongup Kwon (Seoul National University), Eunjin Baek (Seoul National University), Jangwoo Kim (Seoul National University), Byoungyoung Lee (Seoul National University)</author></item><item><title>DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#DP-Sniper:%20Black-Box%20Discovery%20of%20Differential%20Privacy%20Violations%20using%20Classifiers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#DP-Sniper:%20Black-Box%20Discovery%20of%20Differential%20Privacy%20Violations%20using%20Classifiers</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Benjamin Bichsel (ETH Zurich), Samuel Steffen (ETH Zurich), Ilija Bogunovic (ETH Zurich), Martin Vechev (ETH Zurich)</author></item><item><title>Data Privacy in Trigger-Action Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Data%20Privacy%20in%20Trigger-Action%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Data%20Privacy%20in%20Trigger-Action%20Systems</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yunang Chen (University of Wisconsin-Madison), Amrita Roy Chowdhury (University of Wisconsin-Madison), Ruizhe Wang (University of Wisconsin-Madison), Andrei Sabelfeld (Chalmers University of Technology), Rahul Chatterjee (University of Wisconsin-Madison), Earlence Fernandes (University of Wisconsin-Madison)</author></item><item><title>Defensive Technology Use by Political Activists During the Sudanese Revolution</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Defensive%20Technology%20Use%20by%20Political%20Activists%20During%20the%20Sudanese%20Revolution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Defensive%20Technology%20Use%20by%20Political%20Activists%20During%20the%20Sudanese%20Revolution</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Alaa Daffalla (University of Kansas), Lucy Simko (University of Washington), Tadayoshi Kohno (University of Washington), Alexandru G. Bardas (University of Kansas)</author></item><item><title>Detecting AI Trojans Using Meta Neural Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Detecting%20AI%20Trojans%20Using%20Meta%20Neural%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Detecting%20AI%20Trojans%20Using%20Meta%20Neural%20Analysis</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Xiaojun Xu (University of Illinois at Urbana-Champaign), Qi Wang (University of Illinois at Urbana-Champaign), Huichen Li (University of Illinois at Urbana-Champaign), Nikita Borisov (University of Illinois at Urbana-Champaign), Carl A. Gunter (University of Illinois at Urbana-Champaign), Bo Li (University of Illinois at Urbana-Champaign)</author></item><item><title>Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Detecting%20Filter%20List%20Evasion%20with%20Event-Loop-Turn%20Granularity%20JavaScript%20Signatures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Detecting%20Filter%20List%20Evasion%20with%20Event-Loop-Turn%20Granularity%20JavaScript%20Signatures</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Quan Chen (North Carolina State University), Peter Snyder (Brave Software), Ben Livshits (Brave Software), Alexandros Kapravelos (North Carolina State University)</author></item><item><title>Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Did%20you%20mix%20me?%20Formally%20Verifying%20Verifiable%20Mix%20Nets%20in%20Electronic%20Voting</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Did%20you%20mix%20me?%20Formally%20Verifying%20Verifiable%20Mix%20Nets%20in%20Electronic%20Voting</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Thomas Haines (Norwegian University of Science and Technology), Rajeev Gore (Australian National University), Bhavesh Sharma (Australian National University), Thomas Haines (Norwegian University of Science and Technology)</author></item><item><title>Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Diogenes:%20Lightweight%20Scalable%20RSA%20Modulus%20Generation%20with%20a%20Dishonest%20Majority</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Diogenes:%20Lightweight%20Scalable%20RSA%20Modulus%20Generation%20with%20a%20Dishonest%20Majority</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Carmit Hazay (Bar-Ilan University), Megan Chen (Northeastern U.), Yuval Ishai (Technion), Yuriy Kashnikov (Ligero Inc.), Daniele Micciancio (UC San Diego), Tarik Riviere (Ligero Inc.), abhi shelat (Northeastern U.), Ruihan Wang (Ligero Inc.), Muthu Venkitasubramaniam (U. of Rochester)</author></item><item><title>Doing good by fighting fraud: Ethical anti-fraudsystems for mobile payments</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Doing%20good%20by%20fighting%20fraud:%20Ethical%20anti-fraudsystems%20for%20mobile%20payments</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Doing%20good%20by%20fighting%20fraud:%20Ethical%20anti-fraudsystems%20for%20mobile%20payments</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Zainul Abi Din (UC Davis), Hari Venugopalan (UC Davis), Henry Lin (Bouncer Technologies), Adam Wushensky (Bouncer Technologies), Steven Liu (Bouncer Technologies), Samuel T. King (UC Davis and Bouncer Technologies)</author></item><item><title>DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#DynPTA:%20Combining%20Static%20and%20Dynamic%20Analysis%20for%20Practical%20Selective%20Data%20Protection</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#DynPTA:%20Combining%20Static%20and%20Dynamic%20Analysis%20for%20Practical%20Selective%20Data%20Protection</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Tapti Palit (Stony Brook University), Jarin Firose Moon (Stony Brook University), Fabian Monrose (University of North Carolina, Chapel Hill), Michalis Polychronakis (Stony Brook University)</author></item><item><title>Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Ebb-and-Flow%20Protocols:%20A%20Resolution%20of%20the%20Availability-Finality%20Dilemma</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Ebb-and-Flow%20Protocols:%20A%20Resolution%20of%20the%20Availability-Finality%20Dilemma</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Joachim Neu (Stanford University), Ertem Nusret Tas (Stanford University), David Tse (Stanford University)</author></item><item><title>Electromagnetic Covert Channels Can Be Super Resilient</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Electromagnetic%20Covert%20Channels%20Can%20Be%20Super%20Resilient</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Electromagnetic%20Covert%20Channels%20Can%20Be%20Super%20Resilient</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Cheng Shen (Peking University), Tian Liu (Peking University), Jun Huang (MIT), Rui Tan (Nanyang Technological University)</author></item><item><title>Epochal Signatures for Deniable Group Chats</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Epochal%20Signatures%20for%20Deniable%20Group%20Chats</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Epochal%20Signatures%20for%20Deniable%20Group%20Chats</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Florian Weber (TU Eindhoven), Andreas Hülsing (TU Eindhoven)</author></item><item><title>Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Fingerprinting%20the%20Fingerprinters:%20Learning%20to%20Detect%20Browser%20Fingerprinting%20Behaviors</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Fingerprinting%20the%20Fingerprinters:%20Learning%20to%20Detect%20Browser%20Fingerprinting%20Behaviors</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Umar Iqbal (The University of Iowa), Steven Englehardt (Mozilla Corporation ), Zubair Shafiq (University of California, Davis)</author></item><item><title>Good Bot, Bad Bot: Characterizing Automated Browsing Activity</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Good%20Bot,%20Bad%20Bot:%20Characterizing%20Automated%20Browsing%20Activity</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Good%20Bot,%20Bad%20Bot:%20Characterizing%20Automated%20Browsing%20Activity</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Xigao Li (Stony Brook University), Babak Amin Azad (Stony Brook University), Amir Rahmati (Stony Brook University), Nick Nikiforakis (Stony Brook University)</author></item><item><title>HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#HackEd:%20A%20Pedagogical%20Analysis%20of%20Online%20Vulnerability%20Discovery%20Exercises</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#HackEd:%20A%20Pedagogical%20Analysis%20of%20Online%20Vulnerability%20Discovery%20Exercises</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Daniel Votipka (Tufts University), Eric Zhang (University of Maryland), Michelle Mazurek (University of Maryland)</author></item><item><title>Happer: Unpacking Android Apps via a Hardware-Assisted Approach</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Happer:%20Unpacking%20Android%20Apps%20via%20a%20Hardware-Assisted%20Approach</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Happer:%20Unpacking%20Android%20Apps%20via%20a%20Hardware-Assisted%20Approach</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Lei Xue (The Hong Kong Polytechnic University), Hao Zhou (The Hong Kong Polytechnic University), Xiapu Luo (The Hong Kong Polytechnic University), Yajin Zhou (Zhejiang University), Yang Shi (Tongji University), Guofei Gu (Texas A&amp;amp;M University), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Man Ho Au (The University of Hong Kong)</author></item><item><title>Hardware-Software Contracts for Secure Speculation</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Hardware-Software%20Contracts%20for%20Secure%20Speculation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Hardware-Software%20Contracts%20for%20Secure%20Speculation</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Marco Guarnieri (IMDEA Software Institute), Boris Köpf (Microsoft Research), Jan Reineke (Saarland University), Pepe Vila (IMDEA Software Institute)</author></item><item><title>Hear &quot;No Evil&quot;, See &quot;Kenansville&quot;: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Hear%20%22No%20Evil%22,%20See%20%22Kenansville%22:%20Efficient%20and%20Transferable%20Black-Box%20Attacks%20on%20Speech%20Recognition%20and%20Voice%20Identification%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Hear%20%22No%20Evil%22,%20See%20%22Kenansville%22:%20Efficient%20and%20Transferable%20Black-Box%20Attacks%20on%20Speech%20Recognition%20and%20Voice%20Identification%20Systems</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Hadi Abdullah (University of Florida), Muhammad Sajidur Rahman (University of Florida), Washington Garcia (University of Florida), Kevin Warren (University of Florida), Anurag Swarnim Yadav (University of Florida), Tom Shrimpton (University of Florida), Patrick Traynor (University of Florida)</author></item><item><title>High-Assurance Cryptography in the Spectre Era</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#High-Assurance%20Cryptography%20in%20the%20Spectre%20Era</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#High-Assurance%20Cryptography%20in%20the%20Spectre%20Era</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Gilles Barthe (Max Planck Institute for Security and Privacy and IMDEA Software Institute), Sunjay Cauligi (University of California San Diego), Benjamin Gregoire (INRIA Sophia Antipolis), Adrien Koutsos (Inria Paris, Max Planck Institute for Security and Privacy), Kevin Liao (Max Planck Institute for Security and Privacy and Massachusetts Institute of Technology), Tiago Oliveira (University of Porto (FCUP) and INESC TEC), Swarn Priya (Purdue University), Tamara Rezk (INRIA Sophia Antipolis), Peter Schwabe (Max Planck Institute for Security and Privacy)</author></item><item><title>High-Frequency Trading on Decentralized On-Chain Exchanges</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#High-Frequency%20Trading%20on%20Decentralized%20On-Chain%20Exchanges</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#High-Frequency%20Trading%20on%20Decentralized%20On-Chain%20Exchanges</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Liyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Christof Ferreira Torres (University of Luxembourg), Duc V Le (Purdue University), Arthur Gervais (Imperial College London)</author></item><item><title>How Did That Get In My Phone? Unwanted App Distribution on Android Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#How%20Did%20That%20Get%20In%20My%20Phone?%20Unwanted%20App%20Distribution%20on%20Android%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#How%20Did%20That%20Get%20In%20My%20Phone?%20Unwanted%20App%20Distribution%20on%20Android%20Devices</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Platon Kotzias (NortonLifelock Research Group), Juan Caballero (IMDEA Software Institute), Leyla Bilge (NortonLifelock Research Group)</author></item><item><title>Improving Password Guessing via Representation Learning</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Improving%20Password%20Guessing%20via%20Representation%20Learning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Improving%20Password%20Guessing%20via%20Representation%20Learning</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Dario Pasquini (Sapienza University of Rome; Stevens Institute of Technology; Institute of Applied Computing CNR), Ankit Gangwal (University of Padua; Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Massimo Bernaschi (Institute of Applied Computing CNR), Mauro Conti (University of Padua)</author></item><item><title>Invisible Probe: Timing Attacks with PCIe Congestion Side-channel</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Invisible%20Probe:%20Timing%20Attacks%20with%20PCIe%20Congestion%20Side-channel</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Invisible%20Probe:%20Timing%20Attacks%20with%20PCIe%20Congestion%20Side-channel</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Mingtian Tan (Fudan University), Junpeng Wan (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine)</author></item><item><title>Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Invisible%20for%20both%20Camera%20and%20LiDAR:%20Security%20of%20Multi-Sensor%20Fusion%20based%20Perception%20in%20Autonomous%20Driving%20Under%20Physical-World%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Invisible%20for%20both%20Camera%20and%20LiDAR:%20Security%20of%20Multi-Sensor%20Fusion%20based%20Perception%20in%20Autonomous%20Driving%20Under%20Physical-World%20Attacks</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yulong Cao* (University of Michigan), Ningfei Wang* (University of California, Irvine), Chaowei Xiao* (NVIDIA Research and Arizona State University), Dawei Yang* (University of Michigan), Jin Fang (Baidu Research and National Engineering Laboratory of Deep Learning Technology and Application, China), Ruigang Yang (Inceptio), Qi Alfred Chen (University of California, Irvine), Mingyan Liu (University of Michigan), Bo Li (University of Illinois at Urbana-Champaign), (*co-first authors)</author></item><item><title>Is Private Learning Possible with Instance Encoding?</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Is%20Private%20Learning%20Possible%20with%20Instance%20Encoding?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Is%20Private%20Learning%20Possible%20with%20Instance%20Encoding?</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Nicholas Carlini (Google), Samuel Deng (Columbia), Sanjam Garg (UC Berkeley), Somesh Jha (UW-Madison), Saeed Mahloujifar (Princeton), Mohammad Mahmoody (University of Virginia), Abhradeep Thakurta (Google), Florian Tramer (Stanford University)</author></item><item><title>Journey to the Center of the Cookie Ecosystem: Unraveling Actors&#39; Roles and Relationships</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Journey%20to%20the%20Center%20of%20the%20Cookie%20Ecosystem:%20Unraveling%20Actors&#39;%20Roles%20and%20Relationships</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Journey%20to%20the%20Center%20of%20the%20Cookie%20Ecosystem:%20Unraveling%20Actors&#39;%20Roles%20and%20Relationships</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Iskander Sanchez-Rola (NortonLifeLock Research Group), Matteo Dell&#39;Amico (NortonLifeLock Research Group), Davide Balzarotti (EURECOM), Pierre-Antoine Vervier (NortonLifeLock Research Group), Leyla Bilge (NortonLifeLock Research Group), Iskander ()</author></item><item><title>Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Keep%20the%20Dirt:%20Tainted%20TreeKEM,%20Adaptively%20and%20Actively%20Secure%20Continuous%20Group%20Key%20Agreement</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Keep%20the%20Dirt:%20Tainted%20TreeKEM,%20Adaptively%20and%20Actively%20Secure%20Continuous%20Group%20Key%20Agreement</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Joel Alwen (Wickr Inc.), Margarita Capretto (Universidad Nacional de Rosario), Miguel Cueto (ENS Lyon), Chethan Kamath (Northeastern University), Karen Klein (IST Austria), Ilia Markov (IST Austria), Guillermo Pascual-Perez (IST Austria), Krzysztof Pietrzak (IST Austria), Michael Walter (IST Austria), Michelle Yeo (IST Austria)</author></item><item><title>Learning Differentially Private Mechanisms</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Learning%20Differentially%20Private%20Mechanisms</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Learning%20Differentially%20Private%20Mechanisms</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Subhajit Roy (IIT Kanpur), Justin Hsu (University of Wisconsin--Madison), Aws Albarghouthi (University of Wisconsin--Madison)</author></item><item><title>Lightweight Techniques for Private Heavy Hitters</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Lightweight%20Techniques%20for%20Private%20Heavy%20Hitters</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Lightweight%20Techniques%20for%20Private%20Heavy%20Hitters</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Dan Boneh (Stanford), Elette Boyle (IDC Herzliya), Henry Corrigan-Gibbs (MIT CSAIL), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion)</author></item><item><title>Linking Bluetooth LE &amp; Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Linking%20Bluetooth%20LE%20&amp;%20Classic%20and%20Implications%20for%20Privacy-Preserving%20Bluetooth-Based%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Linking%20Bluetooth%20LE%20&amp;%20Classic%20and%20Implications%20for%20Privacy-Preserving%20Bluetooth-Based%20Protocols</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Norbert Ludant (Northeastern University), Tien D. Vo-Huu (Northeastern University), Sashank Narain (University of Massachusetts Lowell), Guevara Noubir (Northeastern University)</author></item><item><title>Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Lockable%20Signatures%20for%20Blockchains:%20Scriptless%20Scripts%20for%20all%20Signatures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Lockable%20Signatures%20for%20Blockchains:%20Scriptless%20Scripts%20for%20all%20Signatures</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Sri AravindaKrishnan Thyagarajan (Friedrich Alexander Universität Erlangen-Nürnberg), Giulio Malavolta (Max Planck Institute for Security and Privacy)</author></item><item><title>MAD-HTLC: Because HTLC is Crazy-Cheap to Attack</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#MAD-HTLC:%20Because%20HTLC%20is%20Crazy-Cheap%20to%20Attack</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#MAD-HTLC:%20Because%20HTLC%20is%20Crazy-Cheap%20to%20Attack</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Itay Tsabary (Technion), Matan Yechieli (Technion), Alex Manuskin (ZenGo), Ittay Eyal (Technion, VMware)</author></item><item><title>Machine Unlearning</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Machine%20Unlearning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Machine%20Unlearning</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Lucas Bourtoule (University of Toronto; Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Christopher A. Choquette-Choo (University of Toronto; Vector Institute), Hengrui Jia (University of Toronto; Vector Institute), Adelin Travers (University of Toronto; Vector Institute), Baiwu Zhang (University of Toronto; Vector Institute), David Lie (University of Toronto), Nicolas Papernot (University of Toronto; Vector Institute)</author></item><item><title>Manipulation Attacks in Local Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Manipulation%20Attacks%20in%20Local%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Manipulation%20Attacks%20in%20Local%20Differential%20Privacy</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Albert Cheu (Northeastern University), Adam Smith (Boston University), Jonathan Ullman (Northeastern University)</author></item><item><title>Many-out-of-Many Proofs and Applications to Anonymous Zether</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Many-out-of-Many%20Proofs%20and%20Applications%20to%20Anonymous%20Zether</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Many-out-of-Many%20Proofs%20and%20Applications%20to%20Anonymous%20Zether</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Benjamin E. Diamond (J.P. Morgan)</author></item><item><title>Merkle^2: A Low-Latency Transparency Log System</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Merkle^2:%20A%20Low-Latency%20Transparency%20Log%20System</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Merkle^2:%20A%20Low-Latency%20Transparency%20Log%20System</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yuncong Hu (UC Berkeley), Kian Hooshmand (UC Berkeley), Rajeswari Harika Kalidhindi (UC Berkeley), Seung Jin Yang (UC Berkeley), Raluca Popa (UC Berkeley)</author></item><item><title>Method Confusion Attack on Bluetooth Pairing</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Method%20Confusion%20Attack%20on%20Bluetooth%20Pairing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Method%20Confusion%20Attack%20on%20Bluetooth%20Pairing</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Maximilian von Tschirschnitz (Technical University Munich), Ludwig Peuckert (Technical University Munich), Fabian Franzen (Technical University Munich), Jens Grossklags (Technical University Munich)</author></item><item><title>NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#NTFUZZ:%20Enabling%20Type-Aware%20Kernel%20Fuzzing%20on%20Windows%20with%20Static%20Binary%20Analysis</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#NTFUZZ:%20Enabling%20Type-Aware%20Kernel%20Fuzzing%20on%20Windows%20with%20Static%20Binary%20Analysis</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jaeseung Choi (KAIST), Kangsu Kim (KAIST), Daejin Lee (KAIST), Sang Kil Cha (KAIST)</author></item><item><title>OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#OSPREY:%20Recovery%20of%20Variable%20and%20Data%20Structure%20via%20Probabilistic%20Analysis%20for%20Stripped%20Binary</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#OSPREY:%20Recovery%20of%20Variable%20and%20Data%20Structure%20via%20Probabilistic%20Analysis%20for%20Stripped%20Binary</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Zhuo Zhang (Purdue University), Yapeng Ye (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Wen-chuan Lee (Purdue University), Yonghwi Kwon (University of Virginia), Yousra Aafer (University of Waterloo), Xiangyu Zhang (Purdue University)</author></item><item><title>On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#On%20the%20Anonymity%20Guarantees%20of%20Anonymous%20Proof-of-Stake%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#On%20the%20Anonymity%20Guarantees%20of%20Anonymous%20Proof-of-Stake%20Protocols</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Varun Madathil (North Carolina State University), Alessandra Scafuro (North Carolina State University), Kartik Nayak (Duke University), Markulf Kohlweiss (University of Edinburgh)</author></item><item><title>On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#On%20the%20Just-In-Time%20Discovery%20of%20Profit-Generating%20Transactions%20in%20DeFi%20Protocols</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#On%20the%20Just-In-Time%20Discovery%20of%20Profit-Generating%20Transactions%20in%20DeFi%20Protocols</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Liyi Zhou (Imperial College London), Kaihua Qin (Imperial College London), Antoine Cully (Imperial College London), Benjamin Livshits (Imperial College London), Arthur Gervais (Imperial College London)</author></item><item><title>One Engine to Fuzz &#39;em All: Generic Language Processor Testing with Semantic Validation</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#One%20Engine%20to%20Fuzz%20&#39;em%20All:%20Generic%20Language%20Processor%20Testing%20with%20Semantic%20Validation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#One%20Engine%20to%20Fuzz%20&#39;em%20All:%20Generic%20Language%20Processor%20Testing%20with%20Semantic%20Validation</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yongheng Chen (Georgia Institute of Technology), Rui Zhong (Pennsylvania State University), Hong Hu (Pennsylvania State University), Hangfan Zhang (Pennsylvania State University), Yupeng Yang (University of Electronic Science and Technology of China), Dinghao Wu (Pennsylvania State University), Wenke Lee (Georgia Institute of Technology)</author></item><item><title>PLATYPUS: Software-based Power Side-Channel Attacks on x86</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#PLATYPUS:%20Software-based%20Power%20Side-Channel%20Attacks%20on%20x86</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#PLATYPUS:%20Software-based%20Power%20Side-Channel%20Attacks%20on%20x86</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Moritz Lipp (Graz University of Technology), Andreas Kogler (Graz University of Technology), David Oswald (The University of Birmingham, UK), Michael Schwarz (CISPA Helmholtz Center for Information Security), Catherine Easdon (Graz University of Technology), Claudio Canella (Graz University of Technology), Daniel Gruss (Graz University of Technology), Catherine Easdon (Graz University of Technology)</author></item><item><title>Pegasus: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Pegasus:%20Bridging%20Polynomial%20and%20Non-polynomial%20Evaluations%20in%20Homomorphic%20Encryption</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Pegasus:%20Bridging%20Polynomial%20and%20Non-polynomial%20Evaluations%20in%20Homomorphic%20Encryption</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Wen-jie Lu (Alibaba Group), Zhicong Huang (Alibaba Group), Cheng Hong (Alibaba Group), Yiping Ma (University of Pennsylvania), Fuping Qu (Alibaba Group)</author></item><item><title>Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Poltergeist:%20Acoustic%20Adversarial%20Machine%20Learning%20against%20Cameras%20and%20Computer%20Vision</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Poltergeist:%20Acoustic%20Adversarial%20Machine%20Learning%20against%20Cameras%20and%20Computer%20Vision</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Xiaoyu Ji (Zhejiang University), Yushi Cheng (Zhejiang University), Yuepeng Zhang (Zhejiang University), Kai Wang (Zhejiang University), Chen Yan (Zhejiang University), Kevin Fu (University of Michigan), Wenyuan Xu (Zhejiang University)</author></item><item><title>Post-Quantum WireGuard</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Post-Quantum%20WireGuard</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Post-Quantum%20WireGuard</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Andreas Hülsing (Eindhoven University of Technology, NL), Kai-Chun Ning (KPN B.V., NL), Peter Schwabe (Radboud University, NL), Florian Weber (Eindhoven University of Technology, NL), Philip R. Zimmermann (Delft University of Technology &amp;amp; KPN B.V., NL)</author></item><item><title>Proactive Threshold Wallets with Offline Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Proactive%20Threshold%20Wallets%20with%20Offline%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Proactive%20Threshold%20Wallets%20with%20Offline%20Devices</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yashvanth Kondi (Northeastern University), Bernardo Magri (Aarhus University), Claudio Orlandi (Aarhus University), Omer Shlomovits (ZenGo X)</author></item><item><title>Proof-of-Learning: Definitions and Practice</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Proof-of-Learning:%20Definitions%20and%20Practice</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Proof-of-Learning:%20Definitions%20and%20Practice</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Hengrui Jia (University of Toronto and Vector Institute), Mohammad Yaghini (University of Toronto and Vector Institute), Christopher A. Choquette-Choo (University of Toronto and Vector Institute), Natalie Dullerud (University of Toronto and Vector Institute), Anvith Thudi (University of Toronto and Vector Institute), Varun Chandrasekaran (University of Wisconsin-Madison), Nicolas Papernot (University of Toronto and Vector Institute)</author></item><item><title>Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Randomized%20Last-Level%20Caches%20Are%20Still%20Vulnerable%20to%20Cache%20Side-Channel%20Attacks!%20But%20We%20Can%20Fix%20It</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Randomized%20Last-Level%20Caches%20Are%20Still%20Vulnerable%20to%20Cache%20Side-Channel%20Attacks!%20But%20We%20Can%20Fix%20It</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Wei Song (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Boya Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zihan Xue (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Zhenzhen Li (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Wenhao Wang (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Peng Liu (The Pennsylvania State University)</author></item><item><title>Reading between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Reading%20between%20the%20Lines:%20An%20Extensive%20Evaluation%20of%20the%20Security%20and%20Privacy%20Implications%20of%20EPUB%20Reading%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Reading%20between%20the%20Lines:%20An%20Extensive%20Evaluation%20of%20the%20Security%20and%20Privacy%20Implications%20of%20EPUB%20Reading%20Systems</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Gertjan Franken (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven), Wouter Joosen (imec-DistriNet, KU Leuven)</author></item><item><title>Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Real-World%20Snapshots%20vs.%20Theory:%20Questioning%20the%20t-Probing%20Security%20Model.</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Real-World%20Snapshots%20vs.%20Theory:%20Questioning%20the%20t-Probing%20Security%20Model.</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Thilo Krachenfels (Technische Universität Berlin), Amir Moradi (Ruhr-Uni­ver­si­tät Bo­chum), Jean-Pierre Seifert (Technische Universität Berlin), Fatemeh Ganji (Worcester Polytechnic Institute), Shahin Tajik (Worcester Polytechnic Institute)</author></item><item><title>Red Belly: A Secure, Fair and Scalable Open Blockchain</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Red%20Belly:%20A%20Secure,%20Fair%20and%20Scalable%20Open%20Blockchain</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Red%20Belly:%20A%20Secure,%20Fair%20and%20Scalable%20Open%20Blockchain</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Tyler Crain (University of Sydney), Christopher Natoli (University of Sydney), Vincent Gramoli (University of Sydney and EPFL)</author></item><item><title>Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Response-Hiding%20Encrypted%20Ranges:%20Revisiting%20Security%20via%20Parametrized%20Leakage-Abuse%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Response-Hiding%20Encrypted%20Ranges:%20Revisiting%20Security%20via%20Parametrized%20Leakage-Abuse%20Attacks</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Evgenios Kornaropoulos (UC Berkeley), Charalampos Papamanthou (University of Maryland), Roberto Tamassia (Brown University)</author></item><item><title>Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Revealer:%20Detecting%20and%20Exploiting%20Regular%20Expression%20Denial-of-Service%20Vulnerabilities</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Revealer:%20Detecting%20and%20Exploiting%20Regular%20Expression%20Denial-of-Service%20Vulnerabilities</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yinxi Liu (The Chinese University of Hong Kong), Mingxue Zhang (The Chinese University of Hong Kong), Wei Meng (The Chinese University of Hong Kong)</author></item><item><title>Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Runtime%20Recovery%20of%20Web%20Applications%20under%20Zero-Day%20ReDoS%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Runtime%20Recovery%20of%20Web%20Applications%20under%20Zero-Day%20ReDoS%20Attacks</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Zhihao Bai (Johns Hopkins University), Ke Wang (Peking University), Hang Zhu (Johns Hopkins University), Yinzhi Cao (Johns Hopkins University), Xin Jin (Peking University)</author></item><item><title>SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SGUARD:%20Towards%20Fixing%20Vulnerable%20Smart%20Contracts%20Automatically</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SGUARD:%20Towards%20Fixing%20Vulnerable%20Smart%20Contracts%20Automatically</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Tai D. Nguyen (Singapore Management University), Long H. Pham (Singapore Management University), Jun Sun (Singapore Management University)</author></item><item><title>SIRNN: A Math Library for Secure RNN Inference</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SIRNN:%20A%20Math%20Library%20for%20Secure%20RNN%20Inference</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SIRNN:%20A%20Math%20Library%20for%20Secure%20RNN%20Inference</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Deevashwer Rathee (Microsoft), Mayank Rathee (Microsoft), Rahul Kranti Kiran Goli (Microsoft), Divya Gupta (Microsoft), Rahul Sharma (Microsoft), Nishanth Chandran (Microsoft), Aseem Rastogi (Microsoft)</author></item><item><title>STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#STOCHFUZZ:%20Sound%20and%20Cost-effective%20Fuzzing%20of%20Stripped%20Binaries%20by%20Incremental%20and%20Stochastic%20Rewriting</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#STOCHFUZZ:%20Sound%20and%20Cost-effective%20Fuzzing%20of%20Stripped%20Binaries%20by%20Incremental%20and%20Stochastic%20Rewriting</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Zhuo Zhang (Purdue University), Wei You (Renmin University of China), Guanhong Tao (Purdue University), Yousra Aafer (University of Waterloo), Xuwei Liu (Purdue University), Xiangyu Zhang (Purdue University)</author></item><item><title>Self-Supervised Euphemism Detection and Identification for Content Moderation</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Self-Supervised%20Euphemism%20Detection%20and%20Identification%20for%20Content%20Moderation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Self-Supervised%20Euphemism%20Detection%20and%20Identification%20for%20Content%20Moderation</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Wanzheng Zhu (University of Illinois, at Urbana-Champaign), Hongyu Gong (Facebook), Rohan Bansal (Carnegie Mellon University), Zachary Weinberg (University of Massachusetts, Amherst), Nicolas Christin (Carnegie Mellon University), Giulia Fanti (Carnegie Mellon University), Suma Bhat (University of Illinois, at Urbana-Champaign)</author></item><item><title>SmartPulse: Automated Checking of Temporal Properties in Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SmartPulse:%20Automated%20Checking%20of%20Temporal%20Properties%20in%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SmartPulse:%20Automated%20Checking%20of%20Temporal%20Properties%20in%20Smart%20Contracts</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jon Stephens (The University of Texas at Austin), Kostas Ferles (The University of Texas at Austin), Benjamin Mariano (The University of Texas at Austin), Shuvendu Lahiri (Microsoft Research), Isil Dillig (The University of Texas at Austin)</author></item><item><title>SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly but Were Afraid to Ask</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20All%20You%20Ever%20Wanted%20to%20Know%20About%20x86/x64%20Binary%20Disassembly%20but%20Were%20Afraid%20to%20Ask</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20All%20You%20Ever%20Wanted%20to%20Know%20About%20x86/x64%20Binary%20Disassembly%20but%20Were%20Afraid%20to%20Ask</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Chengbin Pang (Stevens Institute of Technology; Nanjing University), Ruotong Yu (Stevens Institute of Technology), Yaohui Chen (Facebook Inc.), Eric Koskinen (Stevens Institute of Technology), Georgios Portokalidis (Stevens Institute of Technology), Bing Mao (Nanjing University), Jun Xu (Stevens Institute of Technology)</author></item><item><title>SoK: Computer-Aided Cryptography</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Computer-Aided%20Cryptography</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Computer-Aided%20Cryptography</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Manuel Barbosa (University of Porto and INESC TEC), Gilles Barthe (Max Planck Institute for Security and Privacy; IMDEA Software Institute), Karthik Bhargavan (INRIA Paris), Bruno Blanchet (INRIA Paris), Cas Cremers (CISPA Helmholtz Center for Information Security), Kevin Liao (Max Planck Institute for Security and Privacy; Massachusetts Institute of Technology), Bryan Parno (Carnegie Mellon University)</author></item><item><title>SoK: Fully Homomorphic Encryption Compilers</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Fully%20Homomorphic%20Encryption%20Compilers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Fully%20Homomorphic%20Encryption%20Compilers</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Alexander Viand (ETH Zurich), Patrick Jattke (ETH Zurich), Anwar Hithnawi (ETH Zurich)</author></item><item><title>SoK: Hate, Harassment, and the Changing Landscape of Online Abuse</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Hate,%20Harassment,%20and%20the%20Changing%20Landscape%20of%20Online%20Abuse</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Hate,%20Harassment,%20and%20the%20Changing%20Landscape%20of%20Online%20Abuse</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Kurt Thomas (Google), Deepak Kumar (University of Illinois, Urbana-Champaign), Michael Bailey (University of Illinois, Urbana-Champaign), Sarah Meiklejohn (University College London), Thomas Ristenpart (Cornell Tech), Devdatta Akhawe (Independent Researcher), Dan Boneh (Stanford), Zakir Durumeric (Stanford), Damon McCoy (New York University), Gianluca Stringhini (Boston University), Sunny Consolvo (Google), Patrick Gage Kelley (Google), Elie Bursztein (Google), Nicki Dell (Cornell)</author></item><item><title>SoK: Quantifying Cyber Risk</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Quantifying%20Cyber%20Risk</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Quantifying%20Cyber%20Risk</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Daniel W Woods (University of Innsbruck), Rainer Böhme (University of Innsbruck)</author></item><item><title>SoK: Security and Privacy in the Age of Commercial Drones</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Security%20and%20Privacy%20in%20the%20Age%20of%20Commercial%20Drones</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20Security%20and%20Privacy%20in%20the%20Age%20of%20Commercial%20Drones</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Ben Nassi (Ben-Gurion University of the Negev), Ron Bitton (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories), Asaf Shabtai (Ben-Gurion University of the Negev), Yuval Elovici (Ben-Gurion University of the Negev)</author></item><item><title>SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20The%20Faults%20in%20our%20ASRs:%20An%20Overview%20of%20Attacks%20against%20Automatic%20Speech%20Recognition%20and%20Speaker%20Identification%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#SoK:%20The%20Faults%20in%20our%20ASRs:%20An%20Overview%20of%20Attacks%20against%20Automatic%20Speech%20Recognition%20and%20Speaker%20Identification%20Systems</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Hadi Abdullah (University of Florida), Kevin Warren (University of Florida), Vincent Bindschaedler (University of Florida), Nicolas Papernot (University of Toronto), Patrick Traynor (University of Florida)</author></item><item><title>Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Survivalism:%20Systematic%20Analysis%20of%20Windows%20Malware%20Living-Off-The-Land</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Survivalism:%20Systematic%20Analysis%20of%20Windows%20Malware%20Living-Off-The-Land</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Frederick Barr-Smith (Oxford University), Xabier Ugarte-Pedrero (Cisco Systems), Mariano Graziano (Cisco Systems), Riccardo Spolaor (Oxford University), Ivan Martinovic (Oxford University)</author></item><item><title>Systematic Analysis of Randomization-Based Protected Cache Architectures</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Systematic%20Analysis%20of%20Randomization-Based%20Protected%20Cache%20Architectures</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Systematic%20Analysis%20of%20Randomization-Based%20Protected%20Cache%20Architectures</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Antoon Purnal (imec-COSIC, KU Leuven), Lukas Giner (Graz University of Technology), Daniel Gruss (Graz University of Technology), Ingrid Verbauwhede (imec-COSIC, KU Leuven)</author></item><item><title>The EMV Standard: Break, Fix, Verify</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#The%20EMV%20Standard:%20Break,%20Fix,%20Verify</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#The%20EMV%20Standard:%20Break,%20Fix,%20Verify</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>David Basin (Department of Computer Science, ETH Zurich), Ralf Sasse (Department of Computer Science, ETH Zurich), Jorge Toro-Pozo (Department of Computer Science, ETH Zurich)</author></item><item><title>The Provable Security of Ed25519: Theory and Practice</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#The%20Provable%20Security%20of%20Ed25519:%20Theory%20and%20Practice</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#The%20Provable%20Security%20of%20Ed25519:%20Theory%20and%20Practice</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Jacqueline Brendel (CISPA), Cas Cremers (CISPA), Dennis Jackson (ETH Zurich), Mang Zhao (CISPA - Helmholtz Center for Information Security)</author></item><item><title>They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#They%20Would%20do%20Better%20if%20They%20Worked%20Together:%20The%20Case%20of%20Interaction%20Problems%20Between%20Password%20Managers%20and%20Websites</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#They%20Would%20do%20Better%20if%20They%20Worked%20Together:%20The%20Case%20of%20Interaction%20Problems%20Between%20Password%20Managers%20and%20Websites</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Nicolas Huaman (Leibniz University Hannover), Sabrina Amft (Leibniz University Hannover), Marten Oltrogge (CISPA Helmholtz Center for Information Security), Yasemin Acar (Leibniz University Hannover and Max Planck Institute for Security and Privacy (MPI-SP)), Sascha Fahl (Leibniz University Hannover)</author></item><item><title>Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Trouble%20Over-The-Air:%20An%20Analysis%20of%20FOTA%20Apps%20in%20the%20Android%20Ecosystem</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Trouble%20Over-The-Air:%20An%20Analysis%20of%20FOTA%20Apps%20in%20the%20Android%20Ecosystem</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Eduardo Blázquez (Universidad Carlos III de Madrid), Sergio Pastrana (Universidad Carlos III de Madrid), Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Julien Gamba (IMDEA Networks Institute / Universidad Carlos III de Madrid), Platon Kotzias (NortonLifelock Research Group), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI / AppCensus Inc.), Juan Tapiador (Universidad Carlos III de Madrid)</author></item><item><title>Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Trust,%20But%20Verify:%20A%20Longitudinal%20Analysis%20Of%20Android%20OEM%20Compliance%20and%20Customization</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Trust,%20But%20Verify:%20A%20Longitudinal%20Analysis%20Of%20Android%20OEM%20Compliance%20and%20Customization</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Andrea Possemato (IDEMIA/Eurecom), Simone Aonzo (Eurecom), Davide Balzarotti (Eurecom), Yanick Fratantonio (Eurecom)</author></item><item><title>Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Using%20Selective%20Memoization%20to%20Defeat%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Using%20Selective%20Memoization%20to%20Defeat%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>James Davis (Virginia Tech / Purdue University), Francisco Servant (Virginia Tech), Dongyoon Lee (Stony Brook University)</author></item><item><title>When Function Signature Recovery Meets Compiler Optimization</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#When%20Function%20Signature%20Recovery%20Meets%20Compiler%20Optimization</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#When%20Function%20Signature%20Recovery%20Meets%20Compiler%20Optimization</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Yan Lin (Singapore Management University), Debin Gao (Singapore Management University)</author></item><item><title>Which Privacy and Security Attributes Most Impact Consumers‚ Risk Perception and Willingness to Purchase IoT Devices?</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Which%20Privacy%20and%20Security%20Attributes%20Most%20Impact%20Consumers%E2%80%9A%20Risk%20Perception%20and%20Willingness%20to%20Purchase%20IoT%20Devices?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Which%20Privacy%20and%20Security%20Attributes%20Most%20Impact%20Consumers%E2%80%9A%20Risk%20Perception%20and%20Willingness%20to%20Purchase%20IoT%20Devices?</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Pardis Emami-Naeini (University of Washington), Janarth Dheenadhayalan (Carnegie Mellon University), Yuvraj Agarwal (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)</author></item><item><title>Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Who%20is%20Real%20Bob?%20Adversarial%20Attacks%20on%20Speaker%20Recognition%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Who%20is%20Real%20Bob?%20Adversarial%20Attacks%20on%20Speaker%20Recognition%20Systems</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Guangke Chen (ShanghaiTech University; Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Sen Chen (Tianjin University; Nanyang Technological University), Lingling Fan (Nanyang Technological University), Xiaoning Du (Nanyang Technological University), Zhe Zhao (ShanghaiTech University), Fu Song (ShanghaiTech University; Shanghai Engineering Research Center of Intelligent Vision and Imaging), Yang Liu (Nanyang Technological University)</author></item><item><title>Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Wolverine:%20Fast,%20Scalable,%20and%20Communication-Efficient%20Zero-Knowledge%20Proofs%20for%20Boolean%20and%20Arithmetic%20Circuits</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Wolverine:%20Fast,%20Scalable,%20and%20Communication-Efficient%20Zero-Knowledge%20Proofs%20for%20Boolean%20and%20Arithmetic%20Circuits</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>Chenkai Weng (Northwestern University), Kang Yang (State Key Laboratory of Cryptology), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University)</author></item><item><title>Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs</title><description></description><link>https://www.ieee-security.org/TC/SP2021/program-papers.html#Zero%20Knowledge%20for%20Everything%20and%20Everyone:%20Fast%20ZK%20Processor%20with%20Cached%20ORAM%20for%20ANSI%20C%20Programs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2021/program-papers.html#Zero%20Knowledge%20for%20Everything%20and%20Everyone:%20Fast%20ZK%20Processor%20with%20Cached%20ORAM%20for%20ANSI%20C%20Programs</guid><pubDate>Thu, 31 Dec 2020 16:00:00 GMT</pubDate><author>David Heath (Georgia Institute of Technology), Yibin Yang (Georgia Institute of Technology), David Devecsery (Georgia Institute of Technology), Vladimir Kolesnikov (Georgia Institute of Technology)</author></item><item><title>A Programming Framework for Differential Privacy with Accuracy Concentration Bounds</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Programming%20Framework%20for%20Differential%20Privacy%20with%20Accuracy%20Concentration%20Bounds</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Programming%20Framework%20for%20Differential%20Privacy%20with%20Accuracy%20Concentration%20Bounds</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Elisabet Lobo-Vesga (Chalmers University of Technology), Alejandro Russo (Chalmers University of Technology), Marco Gaboardi (Boston University)</author></item><item><title>A Security Analysis of the Facebook Ad Library</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Security%20Analysis%20of%20the%20Facebook%20Ad%20Library</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Security%20Analysis%20of%20the%20Facebook%20Ad%20Library</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Laura Edelson (New York University), Tobias Lauinger (New York University), Damon McCoy (New York University)</author></item><item><title>A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Stealthier%20Partitioning%20Attack%20against%20Bitcoin%20Peer-to-Peer%20Network</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Stealthier%20Partitioning%20Attack%20against%20Bitcoin%20Peer-to-Peer%20Network</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Muoi Tran (National University of Singapore), Inho Choi (National University of Singapore), Gi Jun Moon (Korea University), Anh Vu (Japan Advanced Institute of Science and Technology), Min Suk Kang (National University of Singapore)</author></item><item><title>A Tale of Sea and Sky: On the Security of Maritime VSAT Communications</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Tale%20of%20Sea%20and%20Sky:%20On%20the%20Security%20of%20Maritime%20VSAT%20Communications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#A%20Tale%20of%20Sea%20and%20Sky:%20On%20the%20Security%20of%20Maritime%20VSAT%20Communications</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>James Pavur (Oxford University), Daniel Moser (armasuisse), Martin Strohmeier (armasuisse), Vincent Lenders (armasuisse), Ivan Martinovic (Oxford University)</author></item><item><title>AdGraph: A Graph-Based Approach to Ad and Tracker Blocking</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#AdGraph:%20A%20Graph-Based%20Approach%20to%20Ad%20and%20Tracker%20Blocking</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#AdGraph:%20A%20Graph-Based%20Approach%20to%20Ad%20and%20Tracker%20Blocking</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Umar Iqbal (University of Iowa / Brave Software), Peter Snyder (Brave Software), Shitong Zhu (UC Riverside), Benjamin Livshits (Brave Software / Imperial College London), Zhiyun Qian (UC Riverside), Zubair Shafiq (University of Iowa)</author></item><item><title>An Analysis of Pre-installed Android Software</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#An%20Analysis%20of%20Pre-installed%20Android%20Software</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#An%20Analysis%20of%20Pre-installed%20Android%20Software</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Julien Gamba (IMDEA Networks Institute, Universidad Carlos III de Madrid), Mohammed Rashed (Universidad Carlos III de Madrid), Abbas Razaghpanah (Stony Brook University), Juan Tapiador (Universidad Carlos III de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute, ICSI)</author></item><item><title>Are Anonymity-Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Are%20Anonymity-Seekers%20Just%20Like%20Everybody%20Else?%20%20An%20Analysis%20of%20Contributions%20to%20Wikipedia%20from%20Tor</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Are%20Anonymity-Seekers%20Just%20Like%20Everybody%20Else?%20%20An%20Analysis%20of%20Contributions%20to%20Wikipedia%20from%20Tor</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Chau Tran (New York University), Kaylea Champion (University of Washington), Andrea Forte (Drexel University), Benjamin Mako Hill (University of Washington), Rachel Greenstadt (New York University)</author></item><item><title>Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Are%20We%20Susceptible%20to%20Rowhammer?%20%20An%20End-to-End%20Methodology%20for%20Cloud%20Providers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Are%20We%20Susceptible%20to%20Rowhammer?%20%20An%20End-to-End%20Methodology%20for%20Cloud%20Providers</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Lucian Cojocar (Microsoft Research), Jeremie Kim (ETH Zurich, CMU), Minesh Patel (ETH Zurich), Lillian Tsai (MIT), Stefan Saroiu (Microsoft Research), Alec Wolman (Microsoft Research), Onur Mutlu (ETH Zurich, CMU)</author></item><item><title>Ask the Experts: What Should Be on an IoT Privacy and Security Label?</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Ask%20the%20Experts:%20What%20Should%20Be%20on%20an%20IoT%20Privacy%20and%20Security%20Label?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Ask%20the%20Experts:%20What%20Should%20Be%20on%20an%20IoT%20Privacy%20and%20Security%20Label?</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Pardis Emami-Naeini (Carnegie Mellon University), Yuvraj Agarwal (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Hanan Hibshi (Carnegie Mellon University)</author></item><item><title>Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Automatic%20Uncovering%20of%20Hidden%20Behaviors%20from%20Input%20Validation%20in%20Mobile%20Apps</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Automatic%20Uncovering%20of%20Hidden%20Behaviors%20from%20Input%20Validation%20in%20Mobile%20Apps</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Quingchuan Zhao (The Ohio State University), Chaoshun Zuo (The Ohio State University), Brendan Dolan-Gavitt (New York University), Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security, Germany), Zhiqiang Lin (The Ohio State University)</author></item><item><title>Automatically Detecting Bystanders in Photos to Reduce Privacy Risks</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Automatically%20Detecting%20Bystanders%20in%20Photos%20to%20Reduce%20Privacy%20Risks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Automatically%20Detecting%20Bystanders%20in%20Photos%20to%20Reduce%20Privacy%20Risks</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Rakibul Hasan (Indiana University), David Crandall (Indiana University), Mario Fritz (CISPA Helmholtz Center for Information Security, Germany), Apu Kapadia (Indiana University)</author></item><item><title>BIAS: Bluetooth Impersonation AttackS</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#BIAS:%20Bluetooth%20Impersonation%20AttackS</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#BIAS:%20Bluetooth%20Impersonation%20AttackS</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Daniele Antonioli (École Polytechnique Fédérale de Lausanne (EPFL)), Nils Ole Tippenhauer (CISPA Helmholtz Center for Information Security, Germany), Kasper Rasmussen (University of Oxford)</author></item><item><title>Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Binsec/Rel:%20Efficient%20Relational%20Symbolic%20Execution%20for%20Constant-Time%20at%20Binary-Level</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Binsec/Rel:%20Efficient%20Relational%20Symbolic%20Execution%20for%20Constant-Time%20at%20Binary-Level</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Lesly-Ann Daniel (CEA, List, Université Paris-Sacley), Sébastien Bardin (CEA, List, Université Paris-Sacley), Tamara Rezk (INRIA Sophia-Antipolis, INDES Project, France)</author></item><item><title>Breaking and (Partially) Fixing Provably Secure Onion Routing</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Breaking%20and%20(Partially)%20Fixing%20Provably%20Secure%20Onion%20Routing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Breaking%20and%20(Partially)%20Fixing%20Provably%20Secure%20Onion%20Routing</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Christiane Kuhn (KIT Karlsruhe), Martin Beck (TU Dresden), Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and Centre of Tactile Internet (TU Dresden))</author></item><item><title>Browsing Unicity: On the Limits of Anonymizing Web Tracking Data</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Browsing%20Unicity:%20On%20the%20Limits%20of%20Anonymizing%20Web%20Tracking%20Data</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Browsing%20Unicity:%20On%20the%20Limits%20of%20Anonymizing%20Web%20Tracking%20Data</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Clemens Deußer (TU Dresden), Steffen Passmann (INFOnline GMbH), Thorsten Strufe (Karlsruhe Institute of Technology (KIT) and Centre of Tactile Internet (TU Dresden))</author></item><item><title>Burglars&#39; IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Burglars&#39;%20IoT%20Paradise:%20Understanding%20and%20Mitigating%20Security%20Risks%20of%20General%20Messaging%20Protocols%20on%20IoT%20Clouds</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Burglars&#39;%20IoT%20Paradise:%20Understanding%20and%20Mitigating%20Security%20Risks%20of%20General%20Messaging%20Protocols%20on%20IoT%20Clouds</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Yan Jia (Xidian University / University of Chinese Academy of Sciences / Indana University at Bloomington), Luyi Xing (Indiana University at Bloomington), Yuhang Mao (Xidian University / University of Chinese Academy of Sciences), Dongfang Zhao (Indiana University at Bloomington), XiaoFeng Wang (Indiana University at Bloomington), Shangru Zhao (Xidian University / University of Chinese Academy of Sciences), Yuqing Zhang (Xidian University / University of Chinese Academy of Sciences)</author></item><item><title>C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#C3APSULe:%20Cross-FPGA%20Covert-Channel%20Attacks%20through%20Power%20Supply%20Unit%20Leakage</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#C3APSULe:%20Cross-FPGA%20Covert-Channel%20Attacks%20through%20Power%20Supply%20Unit%20Leakage</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Ilias Giechaskiel (University of Oxford), Kasper Bonne Rasmussen (University of Oxford), Jakub Szefer (Yale University)</author></item><item><title>Can Voters Detect Malicious Manipulation of Ballot Marking Devices?</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Can%20Voters%20Detect%20Malicious%20Manipulation%20of%20Ballot%20Marking%20Devices?</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Can%20Voters%20Detect%20Malicious%20Manipulation%20of%20Ballot%20Marking%20Devices?</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Matthew Bernhard (University of Michigan), Allison McDonald (University of Michigan), Henry Meng (University of Michigan), Jensen Hwa (University of Michigan), Nakul Bajaj (The Harker School), Kevin Chang (University of Michigan), J. Alex Halderman (University of Michigan)</author></item><item><title>Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Combating%20Dependence%20Explosion%20in%20Forensic%20Analysis%20Using%20Alternative%20Tag%20Propagation%20Semantics</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Combating%20Dependence%20Explosion%20in%20Forensic%20Analysis%20Using%20Alternative%20Tag%20Propagation%20Semantics</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Md Nahid Hossain (Stony Brook University), Sanaz Sheikhi (Stony Brook University), R. Sekar (Stony Brook University)</author></item><item><title>Cornucopia: Temporal Safety for CHERI Heaps</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Cornucopia:%20Temporal%20Safety%20for%20CHERI%20Heaps</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Cornucopia:%20Temporal%20Safety%20for%20CHERI%20Heaps</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Nathaniel Wesley Filardo (University of Cambridge), Brett F. Gutstein (University of Cambridge), Jonathan Woodruff (University of Cambridge), Sam Ainsworth (University of Cambridge), Lucian Paul-Trifu (University of Cambridge), Brooks Davis (SRI International), Hongyan Xia (University of Cambridge), Edward Tomasz Napierala (University of Cambridge), Alexander Richardson (University of Cambridge), John Baldwin (Ararat River Consulting), David Chisnall (Microsoft Research / University of Cambridge), Jessica Clarke (University of Cambridge), Khilan Gudka (University of Cambridge), Alexandre Joannou (University of Cambridge), A. Theodore Markettos (University of Cambridge), Alfredo Mazzinghi (University of Cambridge), Robert Norton (University of Cambridge), Michael Roe (University of Cambridge), Peter Sewell (University of Cambridge), Stacey Son (University of Cambridge), Timothy M. Jones (University of Cambridge), Simon Moore (University of Cambridge), Peter G. Neumann (SRI International), Robert N. M. Watson (University of Cambridge)</author></item><item><title>CrypTFlow : Secure TensorFlow Inference</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#CrypTFlow%20:%20Secure%20TensorFlow%20Inference</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#CrypTFlow%20:%20Secure%20TensorFlow%20Inference</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Nishant Kumar (Microsoft Research, India), Mayank Rathee (Microsoft Research, India), Nishanth Chandran (Microsoft Research, India), Divya Gupta (Microsoft Research, India), Aseem Rastogi (Microsoft Research, India), Rahul Sharma (Microsoft Research, India)</author></item><item><title>Detection of Electromagnetic Interference Attacks on Sensor Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Detection%20of%20Electromagnetic%20Interference%20Attacks%20on%20Sensor%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Detection%20of%20Electromagnetic%20Interference%20Attacks%20on%20Sensor%20Systems</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Youqian Zhang (University of Oxford), Kasper Rasmussen (University of Oxford)</author></item><item><title>Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe&#39;s Transparancy and Consent Framework</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Do%20Cookie%20Banners%20Respect%20My%20Choice?%20%20Measuring%20Legal%20Compliance%20of%20Banners%20from%20IAB%20Europe&#39;s%20Transparancy%20and%20Consent%20Framework</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Do%20Cookie%20Banners%20Respect%20My%20Choice?%20%20Measuring%20Legal%20Compliance%20of%20Banners%20from%20IAB%20Europe&#39;s%20Transparancy%20and%20Consent%20Framework</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Célestin Matte (Inria, France), Nataliia Bielova (Inria, France), Cristiana Santos (Inria, France)</author></item><item><title>Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Dragonblood:%20Analyzing%20the%20Dragonfly%20Handshake%20of%20WPA3%20and%20EAP-pwd</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Dragonblood:%20Analyzing%20the%20Dragonfly%20Handshake%20of%20WPA3%20and%20EAP-pwd</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Mathy Vanhoef (New York University Abu Dhabi), Eyal Ronen (Tel Aviv University / KU Leuven)</author></item><item><title>Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Efficient%20and%20Secure%20Multiparty%20Computation%20from%20Fixed-Key%20Block%20Ciphers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Efficient%20and%20Secure%20Multiparty%20Computation%20from%20Fixed-Key%20Block%20Ciphers</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Chun Guo (Université catholique de Louvain), Jonathan Katz (University of Maryland), Xiao Wang (Northwestern University), Yu Yu (Shanghai Jiao Tong University)</author></item><item><title>Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Enabling%20Rack-scale%20Confidential%20Computing%20using%20Heterogeneous%20Trusted%20Execution%20Environment</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Enabling%20Rack-scale%20Confidential%20Computing%20using%20Heterogeneous%20Trusted%20Execution%20Environment</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jianping Zhu (University of Chinese Academy of Sciences), Rui Hou (University of Chinese Academy of Sciences), XiaoFeng Wang (Indiana University at Bloomington), Wenhao Wang (University of Chinese Academy of Sciences), Jianfeng Cao (University of Chinese Academy of Sciences), Boyan Zhao (University of Chinese Academy of Sciences), Zhongpu Wang (University of Chinese Academy of Sciences), Yuhui Zhang (University of Chinese Academy of Sciences), Jiameng Ying (University of Chinese Academy of Sciences), Lixin Zhang (Institute of Computing Technology, CAS), Dan Meng (University of Chinese Academy of Sciences)</author></item><item><title>Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Even%20Black%20Cats%20Cannot%20Stay%20Hidden%20in%20the%20Dark:%20Full-band%20De-anonymization%20of%20Bluetooth%20Classic%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Even%20Black%20Cats%20Cannot%20Stay%20Hidden%20in%20the%20Dark:%20Full-band%20De-anonymization%20of%20Bluetooth%20Classic%20Devices</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Marco Cominelli (CNIT / University of Brescia), Francesco Gringoli (CNIT / University of Brescia), Margus Lind (Context Information Security, Scotland), Paul Patras (The University of Edinburgh), Guevara Noubir (Northeastern University)</author></item><item><title>EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#EverCrypt:%20%20A%20Fast,%20Verified,%20Cross-Platform%20Crytographic%20Provider</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#EverCrypt:%20%20A%20Fast,%20Verified,%20Cross-Platform%20Crytographic%20Provider</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jonathan Protzenko (Microsoft Research), Bryan Parno (Carnegie Melon University), Aymeric Fromherz (Carnegie Melon University), Chris Hawblitzel (Microsoft Research), Marina Polubelova (Inria, France), Karthikeyan Bhargavan (Inria, France), Benjamin Beurdouche (Inria, France), Joonwon Choi (MIT / Microsoft Research), Antione Delignat-Lavaud (Microsoft Research), Cédric Fournet (Microsoft Research), Natalia Kulatova (Inria, France), Tahina Ramananandro (Microsoft Research), Aseem Rastogi (Microsoft Research, India), Nikhil Swamy (Microsoft Research), Christoph Wintersteiger (Microsoft Research, UK), Santiago Zanella-Beguelin (Microsoft Research, UK)</author></item><item><title>Ex-vivo dynamic analysis framework for Android device drivers</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Ex-vivo%20dynamic%20analysis%20framework%20for%20Android%20device%20drivers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Ex-vivo%20dynamic%20analysis%20framework%20for%20Android%20device%20drivers</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Ivan Pustogarov (University of Toronto), Qian Wu (University of Toronto), David Lie (University of Toronto)</author></item><item><title>Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Flash%20Boys%202.0:%20Frontrunning%20in%20Decentralized%20Exchanges,%20Miner%20Extractable%20Value,%20and%20Consensus%20Instability</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Flash%20Boys%202.0:%20Frontrunning%20in%20Decentralized%20Exchanges,%20Miner%20Extractable%20Value,%20and%20Consensus%20Instability</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Philip Daian (Cornell Tech), Steven Goldfeder (Cornell Tech), Tyler Kell (Cornell Tech), Yunqi Li (UIUC), Xueyuan Zhao (Carnegie Mellon University), Iddo Bentov (Cornell Tech), Lorenz Breidenbach (ETH Zurich), Ari Juels (Cornell Tech)</author></item><item><title>Flaw Label: Exploiting IPv6 Flow Label</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Flaw%20Label:%20Exploiting%20IPv6%20Flow%20Label</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Flaw%20Label:%20Exploiting%20IPv6%20Flow%20Label</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jonathan Berger (Bar-Ilan University), Amit Klein (Bar-Ilan University), Benny Pinkas (Bar-Ilan University)</author></item><item><title>FlyClient: Super-Light Clients for Cryptocurrencies</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#FlyClient:%20Super-Light%20Clients%20for%20Cryptocurrencies</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#FlyClient:%20Super-Light%20Clients%20for%20Cryptocurrencies</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Benedikt Bünz (Stanford University), Lucianna Kiffer (Northeastern University), Loi Luu (Kyber Network), Mahdi Zamani (Visa Research)</author></item><item><title>Fuzzing JavaScript Engines with Aspect-preserving Mutation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Fuzzing%20JavaScript%20Engines%20with%20Aspect-preserving%20Mutation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Fuzzing%20JavaScript%20Engines%20with%20Aspect-preserving%20Mutation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Soyeon Park (Georgia Institute of Technology), Wen Xu (Georgia Institute of Technology), Insu Yun (Georgia Institute of Technology), Daehee Jang (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)</author></item><item><title>Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Gesture%20Authentication%20for%20Smartphones:%20Evaluation%20of%20Gesture%20Password%20Selection%20Policies</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Gesture%20Authentication%20for%20Smartphones:%20Evaluation%20of%20Gesture%20Password%20Selection%20Policies</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Eunyong Cheon (UNIST, Republic of Korea), Yonghwan Shin (UNIST, Republic of Korea), Jun Ho Huh (Samsung Research, Republic of Korea), Hyoungshick Kim (Sungkyunkwan University, Republic of Korea), Ian Oakley (UNIST, Republic of Korea)</author></item><item><title>High Precision Open-World Website Fingerprinting</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#High%20Precision%20Open-World%20Website%20Fingerprinting</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#High%20Precision%20Open-World%20Website%20Fingerprinting</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Tao Wang (Hong Kong University of Science and Technology)</author></item><item><title>HopSkipJumpAttack: A Query-Efficient Decision-Based Attack</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#HopSkipJumpAttack:%20A%20Query-Efficient%20Decision-Based%20Attack</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#HopSkipJumpAttack:%20A%20Query-Efficient%20Decision-Based%20Attack</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jianbo Chen (University of California, Berkeley), Michael I. Jordan (University of California, Berkeley), Martin J. Wainwright (University of California, Berkeley / Voleon Group)</author></item><item><title>How Not to Prove Your Election Outcome</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#How%20Not%20to%20Prove%20Your%20Election%20Outcome</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#How%20Not%20to%20Prove%20Your%20Election%20Outcome</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Thomas Haines (Norweigian University of Science and Technology), Sarah Jamie Lewis (Open Privacy Research Society), Olivier Pereira (UCLouvian ICTEAM), Vanessa Teague (The University of Melbourne)</author></item><item><title>Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Humpty%20Dumpty:%20Controlling%20Word%20Meanings%20via%20Corpus%20Poisoning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Humpty%20Dumpty:%20Controlling%20Word%20Meanings%20via%20Corpus%20Poisoning</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Roei Schuster (Tel Aviv University), Tal Schuster (CSAIL / MIT), Yoav Meri (Cornell Tech), Vitaly Shmatikov (Cornell Tech)</author></item><item><title>HydRand: Efficient Continuous Distributed Randomness</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#HydRand:%20Efficient%20Continuous%20Distributed%20Randomness</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#HydRand:%20Efficient%20Continuous%20Distributed%20Randomness</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Philipp Schindler (SBA Research), Aljosha Judmayer (SBA Research), Nicholas Stifter (SBA Research / TU Wien), Edgar Weippl (SBA Research / TU Wien)</author></item><item><title>ICAS: An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#ICAS:%20An%20Extensible%20Framework%20for%20Estimating%20the%20Susceptibility%20of%20IC%20Layouts%20to%20Additive%20Trojans</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#ICAS:%20An%20Extensible%20Framework%20for%20Estimating%20the%20Susceptibility%20of%20IC%20Layouts%20to%20Additive%20Trojans</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Timothy Trippel (University of Michigan), Kang Shin (University of Michigan), Kevin Bush (MIT Lincoln Laboratory), Matthew Hicks (Virginia Tech)</author></item><item><title>ICLab: A Global, Longitudinal Internet Censorship Measurement Platform</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#ICLab:%20A%20Global,%20Longitudinal%20Internet%20Censorship%20Measurement%20Platform</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#ICLab:%20A%20Global,%20Longitudinal%20Internet%20Censorship%20Measurement%20Platform</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Arian Akhavan Niaki (University of Massachusetts, Amherst), Shinyoung Cho (University of Massachusetts, Amherst / Stony Brook University), Zachary Weinberg (Carnegie Mellon University), Nguyen Phong Hoang (Stony Brook University), Abbas Razaghpanah (Stony Brook University), Nicholas Christin (Carnegie Mellon University), Phillipa Gill (Stony Brook University)</author></item><item><title>IJON: Exploring Deep State Spaces via Fuzzing</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#IJON:%20Exploring%20Deep%20State%20Spaces%20via%20Fuzzing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#IJON:%20Exploring%20Deep%20State%20Spaces%20via%20Fuzzing</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Cornelius Aschermann (Ruhr University Bochum), Sergej Schumilo (Ruhr University Bochum), Ali Abbasi (Ruhr University Bochum), Thorsten Holz (Ruhr University Bochum)</author></item><item><title>Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Influencing%20Photo%20Sharing%20Decisions%20on%20Social%20Media:%20%20A%20Case%20of%20Paradoxical%20Findings</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Influencing%20Photo%20Sharing%20Decisions%20on%20Social%20Media:%20%20A%20Case%20of%20Paradoxical%20Findings</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Mary Jean Amon (University of Colorado Boulder), Rakibul Hasan (Indiana University), Kurt Hugenberg (Indiana University), Bennett Bertenthal (Indiana University), Apu Kapadia (Indiana University)</author></item><item><title>Intriguing Properties of Adversarial ML Attacks in the Problem Space</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Intriguing%20Properties%20of%20Adversarial%20ML%20Attacks%20in%20the%20Problem%20Space</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Intriguing%20Properties%20of%20Adversarial%20ML%20Attacks%20in%20the%20Problem%20Space</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Fabio Pierazzi (King&#39;s College London), Feargus Pendlebury (King&#39;s College London &amp;amp; Royal Holloway, University of London &amp;amp; The Alan Turing Institute), Jacopo Cortellazzi (King&#39;s College London), Lorenzo Cavallaro (King&#39;s College London)</author></item><item><title>Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Is%20FIDO2%20the%20Kingslayer%20of%20User%20Authentication?%20A%20Comparative%20Usability%20Study%20of%20FIDO2%20Passwordless%20Authentication</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Is%20FIDO2%20the%20Kingslayer%20of%20User%20Authentication?%20A%20Comparative%20Usability%20Study%20of%20FIDO2%20Passwordless%20Authentication</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Michaela Neumayr (CISPA Helmholtz Center for Information Security, Germany), Michael Backes (CISPA Helmholtz Center for Information Security, Germany), Sven Bugiel (CISPA Helmholtz Center for Information Security, Germany)</author></item><item><title>JIT Leaks: Inducing Timing Side Channels through Just-In-Time Compilation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#JIT%20Leaks:%20Inducing%20Timing%20Side%20Channels%20through%20Just-In-Time%20Compilation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#JIT%20Leaks:%20Inducing%20Timing%20Side%20Channels%20through%20Just-In-Time%20Compilation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Tegan Brennan (University of California, Santa Barbara), Nicolás Rosner (University of California, Santa Barbara), Tevfik Bultan (University of California, Santa Barbara)</author></item><item><title>KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#KARONTE:%20Detecting%20Insecure%20Multi-binary%20Interactions%20in%20Embedded%20Firmware</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#KARONTE:%20Detecting%20Insecure%20Multi-binary%20Interactions%20in%20Embedded%20Firmware</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Nilo Redini (University of California, Santa Barbara), Aravind Machiry (University of California, Santa Barbara), Ruoyu Wang (Arizona State University), Chad Spensky (University of California, Santa Barbara), Andrea Continella (University of California, Santa Barbara), Yan Shoshitaishvili (Arizona State University), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)</author></item><item><title>Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Kobold:%20Evaluating%20Decentralized%20Access%20Control%20for%20Remote%20NSXPC%20Methods%20on%20iOS</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Kobold:%20Evaluating%20Decentralized%20Access%20Control%20for%20Remote%20NSXPC%20Methods%20on%20iOS</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Luke Deshotels (North Carolina State University / Samsung Research America), Costin Carabaș (University POLITEHNICA of Bucharest), Jordan Beichler (North Carolina State University), Răzvan Deaconescu (University POLITEHNICA of Bucharest), William Enck (North Carolina State University)</author></item><item><title>Krace: Data Race Fuzzing for Kernel File Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Krace:%20Data%20Race%20Fuzzing%20for%20Kernel%20File%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Krace:%20Data%20Race%20Fuzzing%20for%20Kernel%20File%20Systems</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Meng Xu (Georgia Institute of Technology), Sanidhya Kashyap (Georgia Institute of Technology), Hanqing Zhao (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology)</author></item><item><title>LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#LVI:%20%20Hijacking%20Transient%20Execution%20through%20Microarchitectural%20Load%20Value%20Injection</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#LVI:%20%20Hijacking%20Transient%20Execution%20through%20Microarchitectural%20Load%20Value%20Injection</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jo Van Bulck (imec-DistriNet, KU Leuven), Daniel Moghimi (Worchester Polytechnic Institute), Michael Schwarz (Graz University of Technology), Moritz Lipp (Graz University of Technology), Marina Minkin (University of Michigan), Daniel Genkin (University of Michigan), Yuval Yarom (University of Adalaide and Data61), Berk Sunar (Worchester Polytechnic Institute), Daniel Gruss (Graz University of Technology), Frank Piessens (imec-DistriNet, KU Leuven)</author></item><item><title>Leveraging EM Side-Channel Information to Detect Rowhammer Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Leveraging%20EM%20Side-Channel%20Information%20to%20Detect%20Rowhammer%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Leveraging%20EM%20Side-Channel%20Information%20to%20Detect%20Rowhammer%20Attacks</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Zhenkai Zhang (Texas Tech University), Zihao Zhan (Vanderbilt University), Daniel Balasubramanian (Vanderbilt University), Bo Li (Univeristy of Illinios at Urbana-Champaign), Peter Volgyesi (Vanderbilt University), Xenofon Koutsoukos (Vanderbilt University)</author></item><item><title>MarkUs: Drop-in use-after-free prevention for low-level languages</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#MarkUs:%20Drop-in%20use-after-free%20prevention%20for%20low-level%20languages</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#MarkUs:%20Drop-in%20use-after-free%20prevention%20for%20low-level%20languages</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sam Ainsworth (University of Cambridge), Timothy Jones (University of Cambridge)</author></item><item><title>Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Meddling%20Middlemen:%20Empirical%20Analysis%20of%20the%20Risks%20of%20Data-Saving%20Mobile%20Browsers</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Meddling%20Middlemen:%20Empirical%20Analysis%20of%20the%20Risks%20of%20Data-Saving%20Mobile%20Browsers</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Brian Kondracki (Stony Brook University), Assel Aliyeva (Boston University), Manuel Egele (Boston University), Jason Polakis (University of Illinios at Chicago), Nick Nikiforakis (Stony Brook University)</author></item><item><title>Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Message%20Time%20of%20Arrival%20Codes:%20A%20Fundamental%20Primitive%20for%20Secure%20Distance%20Measurement</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Message%20Time%20of%20Arrival%20Codes:%20A%20Fundamental%20Primitive%20for%20Secure%20Distance%20Measurement</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Patrick Leu (ETH Zurich), Mridula Singh (ETH Zurich), Marc Roeschlin (ETH Zurich), Kenneth Paterson (ETH Zurich), Srdjan Capkun (ETH Zurich)</author></item><item><title>NetCAT: Practical Cache Attacks for the Network</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#NetCAT:%20%20Practical%20Cache%20Attacks%20for%20the%20Network</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#NetCAT:%20%20Practical%20Cache%20Attacks%20for%20the%20Network</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Michael Kurth (Vrije Universiteit Amsterdam, The Netherlands; ETH Zurich, Switzerland), Ben Gras (Vrije Universiteit Amsterdam, The Netherlands), Dennis Andriesse (Vrije Universiteit Amsterdam, The Netherlands), Cristiano Giuffrida (Vrije Universiteit Amsterdam, The Netherlands), Herbert Bos (Vrije Universiteit Amsterdam, The Netherlands), Kaveh Razavi (Vrije Universiteit Amsterdam, The Netherlands)</author></item><item><title>Neutaint: Efficient Dynamic Taint Analysis with Neural Networks</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Neutaint:%20Efficient%20Dynamic%20Taint%20Analysis%20with%20Neural%20Networks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Neutaint:%20Efficient%20Dynamic%20Taint%20Analysis%20with%20Neural%20Networks</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Dongdong She (Columbia University), Yizheng Chen (Columbia University), Abhishek Shah (Columbia University), Baishakhi Ray (Columbia University), Suman Jana (Columbia University)</author></item><item><title>OAT: Attesting Operation Integrity of Embedded Devices</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#OAT:%20Attesting%20Operation%20Integrity%20of%20Embedded%20Devices</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#OAT:%20Attesting%20Operation%20Integrity%20of%20Embedded%20Devices</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Zhichuang Sun (Northeastern University), Bo Feng (Northeastern University), Long Lu (Northeastern University), Somesh Jha (University of Wisconsin-Madison)</author></item><item><title>OHIE: Blockchain Scaling Made Simple</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#OHIE:%20Blockchain%20Scaling%20Made%20Simple</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#OHIE:%20Blockchain%20Scaling%20Made%20Simple</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Haifeng Yu (National University of Singapore), Ivica Nikolic (National University of Singapore), Ruomu Hou (National University of Singapore), Prateek Saxena (National University of Singapore)</author></item><item><title>PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#PMP:%20Cost-effective%20Forced%20Execution%20with%20Probabilistic%20Memory%20Pre-planning</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#PMP:%20Cost-effective%20Forced%20Execution%20with%20Probabilistic%20Memory%20Pre-planning</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Wei You (Purdue University), Zhuo Zhang (Purdue University), Yonghwi Kwon (University of Virginia), Yousra Aafer (Purdue University), Fei Peng (Purdue University), Yu Shi (Purdue University), Carson Harmon (Purdue University), Xiangyu Zhang (Purdue University)</author></item><item><title>Pangolin:Incremental Hybrid Fuzzing with Polyhedral Path Abstraction</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Pangolin:Incremental%20Hybrid%20Fuzzing%20with%20Polyhedral%20Path%20Abstraction</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Pangolin:Incremental%20Hybrid%20Fuzzing%20with%20Polyhedral%20Path%20Abstraction</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Heqing Huang (The Hong Kong University of Science and Technology), Peisen Yao (The Hong Kong University of Science and Technology), Rongxin Wu (Xiamen University), Qingkai Shi (The Hong Kong University of Science and Technology), Charles Zhang (The Hong Kong University of Science and Technology)</author></item><item><title>Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Path%20Oblivious%20Heap:%20Optimal%20and%20Practical%20Oblivious%20Priority%20Queue</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Path%20Oblivious%20Heap:%20Optimal%20and%20Practical%20Oblivious%20Priority%20Queue</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Elaine Shi (Cornell University)</author></item><item><title>Plundervolt: Software-based Fault Injection Attacks against Intel SGX</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Plundervolt:%20Software-based%20Fault%20Injection%20Attacks%20against%20Intel%20SGX</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Plundervolt:%20Software-based%20Fault%20Injection%20Attacks%20against%20Intel%20SGX</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Kit Murdock (University of Birmingham), David Oswald (University of Birmingham), Flavio Garcia (University of Birmingham), Jo Van Bulck (imec-DistriNet, KU Leuven), Daniel Gruss (Graz University of Technology), Frank Piessens (imec-DistriNet, KU Leuven)</author></item><item><title>Privacy Risks of General-Purpose Language Models</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Privacy%20Risks%20of%20General-Purpose%20Language%20Models</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Privacy%20Risks%20of%20General-Purpose%20Language%20Models</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Xudong Pan (Fudan University), Mi Zhang (Fudan University), Shouling Ji (Zhejiiang University / Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies), Min Yang (Fudan University)</author></item><item><title>Private Resource Allocators and Their Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Private%20Resource%20Allocators%20and%20Their%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Private%20Resource%20Allocators%20and%20Their%20Applications</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sebastian Angel (University of Pennsylvania), Sampath Kannan (University of Pennsylvania), Zachary Ratliff (Raytheon BBN Technologies)</author></item><item><title>Pseudorandom Black Swans: Cache Attacks on CTR_DRBG</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Pseudorandom%20Black%20Swans:%20Cache%20Attacks%20on%20CTR_DRBG</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Pseudorandom%20Black%20Swans:%20Cache%20Attacks%20on%20CTR_DRBG</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Shaanan Cohney (University of Pennsylvania), Andrew Kwong (University of Michigan), Sharar Paz (Tel Aviv University), Daniel Genkin (University of Michigan), Nadia Heninger (University of California, San Diego), Eyal Ronen (Tel Eviv University / COSIC), Yuval Yarom (University of Adalaide / Data61)</author></item><item><title>RAMBleed: Reading Bits in Memory Without Accessing Them</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#RAMBleed:%20%20Reading%20Bits%20in%20Memory%20Without%20Accessing%20Them</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#RAMBleed:%20%20Reading%20Bits%20in%20Memory%20Without%20Accessing%20Them</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Andrew Kwong (University of Michigan), Daniel Genkin (University of Michigan), Daniel Gruss (Graz University of Technology), Yuval Yarom (University of Adalaide and Data61)</author></item><item><title>Replicated State Machines Without Replicated Execution</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Replicated%20State%20Machines%20Without%20Replicated%20Execution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Replicated%20State%20Machines%20Without%20Replicated%20Execution</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jonathan Lee (Microsoft Research), Kirill Nikitin (EPFL), Srinath Setty (Microsoft Research)</author></item><item><title>RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#RetroWrite:%20Statically%20Instrumenting%20COTS%20Binaries%20for%20Fuzzing%20and%20Sanitization</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#RetroWrite:%20Statically%20Instrumenting%20COTS%20Binaries%20for%20Fuzzing%20and%20Sanitization</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sushant Dinesh (Purdue University), Nathan Burow (Purdue University), Dongyan Xu (Purdue University), Mathias Payer (EPFL)</author></item><item><title>Rigorous Engineering for Hardware Security: Formal Modelling and Proof in the CHERI Design and Implementation Process</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Rigorous%20Engineering%20for%20Hardware%20Security:%20%20Formal%20Modelling%20and%20Proof%20in%20the%20CHERI%20Design%20and%20Implementation%20Process</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Rigorous%20Engineering%20for%20Hardware%20Security:%20%20Formal%20Modelling%20and%20Proof%20in%20the%20CHERI%20Design%20and%20Implementation%20Process</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Kyndylan Nienhuis (University of Cambridge), Alexandre Joannou (University of Cambridge), Thomas Bauereiss (University of Cambridge), Anthony Fox (ARM Limited), Michael Roe (University of Cambridge), Brian Campbell (University of Edinburgh), Matthew Naylor (University of Cambridge), Robert Norton (University of Cambridge), Simon Moore (University of Cambridge), Peter Neumann (SRI International), Ian Stark (University of Edinburgh), Robert Watson (University of Cambridge), Peter Sewell (University of Cambridge)</author></item><item><title>SAVIOR: Towards Bug-Driven Hybrid Testing</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SAVIOR:%20Towards%20Bug-Driven%20Hybrid%20Testing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SAVIOR:%20Towards%20Bug-Driven%20Hybrid%20Testing</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Yaohui Chen (Northeastern University), Peng Li (Baidu USA), Jun Xu (Stevens Institute of Technology), Shengjian Guo (Baidu USA), Rundong Zhou (Baidu USA), Yulong Zhang (Baidu USA), Tao Wei (Baidu USA), Long Lu (Northeastern University)</author></item><item><title>SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SEIMI:%20Efficient%20and%20Secure%20SMAP-Enabled%20Intra-process%20Memory%20Isolation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SEIMI:%20Efficient%20and%20Secure%20SMAP-Enabled%20Intra-process%20Memory%20Isolation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Zhe Wang (Institute of Computing Technology, CAS, University of Chinese Academy of Sciences), Chenggang Wu (Institute of Computing Technology, CAS, University of Chinese Academy of Sciences), Mengyao Xie (Institute of Computing Technology, CAS, University of Chinese Academy of Sciences), Yinqian Zhang (The Ohio State University), Kangjie Lu (University of Minnesota), Xiaofeng Zhang (Institute of Computing Technology, CAS, University of Chinese Academy of Sciences), Yuanming Lai (Institute of Computing Technology, CAS, University of Chinese Academy of Sciences), Yang Kang (Institute of Computing Technology, CAS), Min Yang (Fudan University)</author></item><item><title>SEVurity: No Security Without Integrity - Breaking Integrity-Free Memory Encryption with Minimal Assumptions</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SEVurity:%20No%20Security%20Without%20Integrity%20-%20Breaking%20Integrity-Free%20Memory%20Encryption%20with%20Minimal%20Assumptions</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SEVurity:%20No%20Security%20Without%20Integrity%20-%20Breaking%20Integrity-Free%20Memory%20Encryption%20with%20Minimal%20Assumptions</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Luca Wilke (University of Lübeck), Jan Wichelmann (University of Lübeck), Mathias Morbitzer (Fraunhofer AISEC), Thomas Eisenbarth (University of Lübeck)</author></item><item><title>SPECCFI: Mitigating Spectre Attacks Using CFI Imformed Speculation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SPECCFI:%20%20Mitigating%20Spectre%20Attacks%20Using%20CFI%20Imformed%20Speculation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SPECCFI:%20%20Mitigating%20Spectre%20Attacks%20Using%20CFI%20Imformed%20Speculation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Esmaeil Mohammadian Koruyeh (University of California, Riverside), Shirin Hajl Amin Shirazi (University of California, Riverside), Khaled Khasawneh (George Mason University), Chengyu Song (University of California, Riverside), Nael Abu-Ghazaleh (University of California, Riverside)</author></item><item><title>SPIDER: Enabling Fast Patch Propagation in Related Software Repositories</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SPIDER:%20Enabling%20Fast%20Patch%20Propagation%20in%20Related%20Software%20Repositories</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SPIDER:%20Enabling%20Fast%20Patch%20Propagation%20in%20Related%20Software%20Repositories</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Aravind Machiry (University of California, Santa Barbara), Nilo Redini (University of California, Santa Barbara), Eric Camellini (Politecnico di Milano), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)</author></item><item><title>Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Security%20Update%20Labels:%20Establishing%20Economic%20Incentives%20for%20Security%20Patching%20of%20IoT%20Consumer%20Products</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Security%20Update%20Labels:%20Establishing%20Economic%20Incentives%20for%20Security%20Patching%20of%20IoT%20Consumer%20Products</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Philipp Morgner (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Christoph Mai (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Nicole Koschate-Fischer (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Felix Freiling (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)), Zinaida Benenson (Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU))</author></item><item><title>Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Semantic%20Understanding%20of%20Smart%20Contracts:%20Executable%20Operational%20Semantics%20of%20Solidity</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Semantic%20Understanding%20of%20Smart%20Contracts:%20Executable%20Operational%20Semantics%20of%20Solidity</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jiao Jiao (Nanyang Technological University), Shuanglong Kan (Nanyang Technological University), Shang-Wei Lin (Nanyang Technological University), David Sanán (Nanyang Technological University), Yang Liu (Nanyang Technological University), Jun Sun (Singapore Management University)</author></item><item><title>SoK: A Minimalist Approach to Formalizing Analog Sensor Security</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20A%20Minimalist%20Approach%20to%20Formalizing%20Analog%20Sensor%20Security</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20A%20Minimalist%20Approach%20to%20Formalizing%20Analog%20Sensor%20Security</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Chen Yan (Zhejiang University), Hocheol Shin (KAIST), Connor Bolton (University of Michigan), Wenyuan Xu (Zhejiang University), Yongdae Kim (KAIST), Kevin Fu (University of Michigan)</author></item><item><title>SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Cyber%20Insurance%20-%20Technical%20Challenges%20and%20a%20System%20Security%20Roadmap</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Cyber%20Insurance%20-%20Technical%20Challenges%20and%20a%20System%20Security%20Roadmap</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Savino Dambra (Eurecom), Leyla Bilge (Symantec Research Labs), Davide Balzarotti (Eurecom)</author></item><item><title>SoK: Differential Privacy as a Causal Property</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Differential%20Privacy%20as%20a%20Causal%20Property</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Differential%20Privacy%20as%20a%20Causal%20Property</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Michael Carl Tschantz (International Computer Science Institute), Shayak Sen (Carnegie Melon University), Anupam Datta (Carnegie Melon University)</author></item><item><title>SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Understanding%20the%20Prevailing%20Security%20Vulnerabilities%20in%20TrustZone-assisted%20TEE%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#SoK:%20Understanding%20the%20Prevailing%20Security%20Vulnerabilities%20in%20TrustZone-assisted%20TEE%20Systems</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>David Cerdeira (Universidade do Minho), Nuno Santos (INESC-ID / Instituto Superior Técnico, Universidade de Lisboa), Pedro Fonseca (Purdue University), Sandro Pinto (Universidade do Minho)</author></item><item><title>Spectector: Principled Detection of Speculative Information Flows</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Spectector:%20%20Principled%20Detection%20of%20Speculative%20Information%20Flows</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Spectector:%20%20Principled%20Detection%20of%20Speculative%20Information%20Flows</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Marco Guarnieri (IMDEA Software Institute), Boris Köpf (Microsoft Research), José Morales (IMDEA Software Institute), Jan Reineke (Saarland University), Andrés Sánchez (IMDEA Software Institute)</author></item><item><title>Sync HotStuff: Simple and Practical Synchronous State Machine Replication</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Sync%20HotStuff:%20Simple%20and%20Practical%20Synchronous%20State%20Machine%20Replication</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Sync%20HotStuff:%20Simple%20and%20Practical%20Synchronous%20State%20Machine%20Replication</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Ittai Abraham (Vmware Research), Dahlia Malkhi (Calibra), Kartik Nayak (Duke University), Ling Ren (University of Illinois at Urbana-Champaign), Maofan Yin (Cornell University)</author></item><item><title>TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#TARDIS:%20Rolling%20Back%20The%20Clock%20On%20CMS-Targeting%20Cyber%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#TARDIS:%20Rolling%20Back%20The%20Clock%20On%20CMS-Targeting%20Cyber%20Attacks</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Ranjita Pai Kasturi (Georgia Institute of Technology), Yiting Sun (Georgia Institute of Technology), Ruian Duan (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Ehsan Asdar (Georgia Institute of Technology), Victor Zhu (Georgia Institute of Technology), Yonghwi Kwon (University of Virginia), Brendan Saltaformaggio (Georgia Institute of Technology)</author></item><item><title>TRRespass: Exploiting the Many Sides of Target Row Refresh</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#TRRespass:%20%20Exploiting%20the%20Many%20Sides%20of%20Target%20Row%20Refresh</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#TRRespass:%20%20Exploiting%20the%20Many%20Sides%20of%20Target%20Row%20Refresh</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Pietro Frigo (Vrije Universiteit Amsterdam, The Netherlands), Emanuele Vannacci (Vrije Universiteit Amsterdam, The Netherlands), Hasan Hassan (ETH Zürich), Victor van der Veen (Qualcomm Technologies, Inc.), Onur Mutlu (ETH Zürich), Cristiano Giuffrida (Vrije Universiteit Amsterdam, The Netherlands), Herbert Bos (Vrije Universiteit Amsterdam, The Netherlands), Kaveh Razavi (Vrije Universiteit Amsterdam, The Netherlands)</author></item><item><title>Tactical Provenance Analysis for Endpoint Detection and Response Systems</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Tactical%20Provenance%20Analysis%20for%20Endpoint%20Detection%20and%20Response%20Systems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Tactical%20Provenance%20Analysis%20for%20Endpoint%20Detection%20and%20Response%20Systems</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Wajih Ul Hassan (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign), Daniel Marino (NortonLifeLock Research Group)</author></item><item><title>TextExerciser: Feedback-driven Text Input Exercising for Android Applications</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#TextExerciser:%20Feedback-driven%20Text%20Input%20Exercising%20for%20Android%20Applications</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#TextExerciser:%20Feedback-driven%20Text%20Input%20Exercising%20for%20Android%20Applications</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Yuyu He (Fudan University), Lei Zhang (Fudan University), Zhemin Yang (Fudan University), Yinzhi Cao (Johns Hopkins University), Keke Lian (Fudan University), Shuai Li (Fudan University), Wei Yang (University of Texas at Dallas), Zhibo Zhang (Fudan University), Min Yang (Fudan University), Yuan Zhang (Fudan University), Haixin Duan (Fudan University)</author></item><item><title>The Last Mile: High-Assurance and High-Speed Cryptographic Implementations</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Last%20Mile:%20%20High-Assurance%20and%20High-Speed%20Cryptographic%20Implementations</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Last%20Mile:%20%20High-Assurance%20and%20High-Speed%20Cryptographic%20Implementations</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>José Bacelar Almeida (University of Minho / INESC TEC), Manuel Barbosa (University of Porto (FCUP) / INESC TEC), Gilles Barthe (MPI for Security and Privacy / IMDEA Software), Benjamin Grégoire (Inria), Adrien Koutsos (LSV, CNRS, ENS Paris-Saclay), Vincent Laporte (Inria), Tiago Oliveira (University of Porto (FCUP) / INESC TEC), Pierre-Yves Strub (Ecole Polytechnique)</author></item><item><title>The Many Kinds of Creepware Used for Interpersonal Attacks</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Many%20Kinds%20of%20Creepware%20Used%20for%20Interpersonal%20Attacks</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Many%20Kinds%20of%20Creepware%20Used%20for%20Interpersonal%20Attacks</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Kevin Roundy (NortonLifeLock Research Group), Paula Barmaimon Mendelberg (Cornell Tech), Nicola Dell (Cornell Tech), Damon McCoy (New York University), Daniel Nissani (Cornell Tech), Thomas Ristenpart (Cornell Tech), Acar Tamersoy (NortonLifeLock Research Group)</author></item><item><title>The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20State%20of%20the%20Uniform:%20Attacks%20on%20Encrypted%20Databases%20Beyond%20the%20Uniform%20Query%20Distribution</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20State%20of%20the%20Uniform:%20Attacks%20on%20Encrypted%20Databases%20Beyond%20the%20Uniform%20Query%20Distribution</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Evgenios Kornaropoulos (UC Berkeley), Charalampos Papamanthou (University of Maryland), Roberto Tamassia (Brown University)</author></item><item><title>The Value of Collaboration in Convex Machine Learning with Differential Privacy</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Value%20of%20Collaboration%20in%20Convex%20Machine%20Learning%20with%20Differential%20Privacy</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#The%20Value%20of%20Collaboration%20in%20Convex%20Machine%20Learning%20with%20Differential%20Privacy</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Nan Wu (Macquarie University), Farhad Farokhi (CSIRO&#39;s Data61 / The University of Melbourne), David Smith (CSIRO&#39;s Data61 / Austrailian National University), Mohamed Ali Kaafar (CSIRO&#39;s Data61 / Macquarie University)</author></item><item><title>This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#This%20PIN%20Can%20Be%20Easily%20Guessed:%20Analyzing%20the%20Security%20of%20Smartphone%20Unlock%20PINs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#This%20PIN%20Can%20Be%20Easily%20Guessed:%20Analyzing%20the%20Security%20of%20Smartphone%20Unlock%20PINs</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Philipp Markert (Ruhr University Bochum), Daniel Bailey (Ruhr University Bochum), Maximilian Golla (Max Planck Institute for Security and Privacy), Markus Dürmuth (Ruhr University Bochum), Adam Aviv (The George Washington University)</author></item><item><title>Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Throwing%20Darts%20in%20the%20Dark?%20Detecting%20Bots%20with%20Limited%20Data%20using%20Neural%20Data%20Augmentation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Throwing%20Darts%20in%20the%20Dark?%20Detecting%20Bots%20with%20Limited%20Data%20using%20Neural%20Data%20Augmentation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Steve T.K. Jan (University of Illinios at Urbana-Champaign / Virginia Tech), Qingying Hao (University of Illinios at Urbana-Champaign), Tianrui Hu (Virginia Tech), Jiameng Pu (Virginia Tech), Sonal Oswal (Radware, Isreal), Gang Wang (University of Illinios at Urbana-Champaign), Bimal Viswanath (Virginia Tech)</author></item><item><title>Towards Effective Differential Privacy Communication for Users&#39; Data Sharing Decision and Comprehension</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20Effective%20Differential%20Privacy%20Communication%20for%20Users&#39;%20Data%20Sharing%20Decision%20and%20Comprehension</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20Effective%20Differential%20Privacy%20Communication%20for%20Users&#39;%20Data%20Sharing%20Decision%20and%20Comprehension</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Aiping Xiong (Penn State University), Tianhao Wang (Purdue University), Ninghui Li (Purdue University), Somesh Jha (University of Wisconsin-Madison)</author></item><item><title>Towards Scalable Threshold Cryptosystems</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20Scalable%20Threshold%20Cryptosystems</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20Scalable%20Threshold%20Cryptosystems</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Alin Tomescu (MIT CSAIL), Robert Chen (MIT PRIMES / Lexington High School), Yiming Zheng (MIT PRIMES / Lexington High School), Ittai Abraham (VMware Research), Benny Pinkas (VMware Research / Bar Ilan University), Guy Golan Gueta (VMware Research), Srinivas Devadas (MIT CSAIL)</author></item><item><title>Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20a%20Natural%20Perspective%20of%20Smart%20Homes%20for%20Practical%20Security%20and%20Safety%20Analyses</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Towards%20a%20Natural%20Perspective%20of%20Smart%20Homes%20for%20Practical%20Security%20and%20Safety%20Analyses</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sunil Manandhar (William &amp;amp; Mary), Kevin Moran (William &amp;amp; Mary), Kaushal Kafle (William &amp;amp; Mary), Ruhao Tang (William &amp;amp; Mary), Denys Poshyvanyk (William &amp;amp; Mary), Adwait Nadkarni (William &amp;amp; Mary)</author></item><item><title>Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Transparent%20Polynomial%20Delegation%20and%20Its%20Applications%20to%20Zero%20Knowledge%20Proof</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Transparent%20Polynomial%20Delegation%20and%20Its%20Applications%20to%20Zero%20Knowledge%20Proof</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Jiaheng Zhang (UC Berkeley), Tiancheng Xie (UC Berkeley), Yupeng Zhang (Texas A&amp;amp;M University), Dawn Song (UC Berkeley)</author></item><item><title>Transys: Leveraging Common Security Properties Across Hardware Designs</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Transys:%20Leveraging%20Common%20Security%20Properties%20Across%20Hardware%20Designs</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Transys:%20Leveraging%20Common%20Security%20Properties%20Across%20Hardware%20Designs</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Rui Zhang (University of North Carolina at Chapel Hill), Cynthia Sturton (University of North Carolina at Chapel Hill)</author></item><item><title>Unexpected Data Dependency Creation and Chaining: A New Attack to SDN</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#Unexpected%20Data%20Dependency%20Creation%20and%20Chaining:%20A%20New%20Attack%20to%20SDN</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#Unexpected%20Data%20Dependency%20Creation%20and%20Chaining:%20A%20New%20Attack%20to%20SDN</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Feng Xiao (The Pennsylvania State University), Jinquan Zhang (The Pennsylvania State University), Jianwei Huang (Texas A&amp;amp;M University), Guofei Gu (Texas A&amp;amp;M University), Dinghao Wu (The Pennsylvania State University), Peng Liu (The Pennsylvania State University)</author></item><item><title>VerX: Safety Verification of Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#VerX:%20Safety%20Verification%20of%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#VerX:%20Safety%20Verification%20of%20Smart%20Contracts</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Anton Permenev (ChainSecurity), Dimitar Dimitrov (ETH Zurich), Petar Tsankov (ChainSecurity), Dana Drachsler-Cohen (ETH Zurich), Martin Vechev (ETH Zurich)</author></item><item><title>VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#VeriSmart:%20A%20Highly%20Precise%20Safety%20Verifier%20for%20Ethereum%20Smart%20Contracts</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#VeriSmart:%20A%20Highly%20Precise%20Safety%20Verifier%20for%20Ethereum%20Smart%20Contracts</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sunbeom So (Korea University), Myungho Lee (Korea University), Jisu Park (Korea University), Heejo Lee (Korea University), Hakjoo Oh (Korea University)</author></item><item><title>WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#WaveSpy:%20Remote%20and%20Through-wall%20Screen%20Attack%20via%20mmWave%20Sensing</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#WaveSpy:%20Remote%20and%20Through-wall%20Screen%20Attack%20via%20mmWave%20Sensing</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Zhengxiong Li (University of Buffalo, SUNY), Fenglong Ma (University of Buffalo, SUNY), Aditya Singh Rathore (University of Buffalo, SUNY), Zhuolin Yang (University of Buffalo, SUNY), Baicheng Chen (University of Buffalo, SUNY), Lu Su (University of Buffalo, SUNY), Wenyao Xu (University of Buffalo, SUNY)</author></item><item><title>ZEXE: Enabling Decentralized Private Computation</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#ZEXE:%20Enabling%20Decentralized%20Private%20Computation</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#ZEXE:%20Enabling%20Decentralized%20Private%20Computation</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sean Bowe (Zcash), Alessandro Chiesa (University of California, Berkeley), Matthew Green (Johns Hopkins University), Ian Miers (Cornell Tech), Pratyush Mishra (University of California, Berkeley), Howard Wu (University of California, Berkeley)</author></item><item><title>_ I Know Where You Parked Last Summer _ Automated Reverse Engineering and Privacy Analysis of Modern Cars</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#_%20I%20Know%20Where%20You%20Parked%20Last%20Summer%20_%20Automated%20Reverse%20Engineering%20and%20Privacy%20Analysis%20of%20Modern%20Cars</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#_%20I%20Know%20Where%20You%20Parked%20Last%20Summer%20_%20Automated%20Reverse%20Engineering%20and%20Privacy%20Analysis%20of%20Modern%20Cars</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Daniel Frassinelli (CISPA Helmholtz Center for Information Security, Saarland Informatics Campus, Germany), Sohyeon Park (CISPA Helmholtz Center for Information Security, Saarland Informatics Campus, Germany), Stefan Nürnberger (CISPA Helmholtz Center for Information Security, Saarland Informatics Campus, Germany)</author></item><item><title>xMP: Selective Memory Protection for Kernel and User Space</title><description></description><link>https://www.ieee-security.org/TC/SP2020/program-papers.html#xMP:%20Selective%20Memory%20Protection%20for%20Kernel%20and%20User%20Space</link><guid isPermaLink="false">https://www.ieee-security.org/TC/SP2020/program-papers.html#xMP:%20Selective%20Memory%20Protection%20for%20Kernel%20and%20User%20Space</guid><pubDate>Tue, 31 Dec 2019 16:00:00 GMT</pubDate><author>Sergej Proskurin (Technical University of Munich), Marius Momeu (Technical University of Munich), Seyedhamed Ghavamnia (Stony Brook University), Vasileios Kemerlis (Brown University), Michalis Polychronakis (Stony Brook University)</author></item></channel></rss>