Vienna, July 8-12, 2024
9th IEEE European Symposium on Security and Privacy
Bad Design Smells in Benchmark NIDS Datasets | (University of Edinburgh), (DistriNet, KU Leuven), (University of Edinburgh), (DistriNet, KU Leuven) |
Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs | (Graz, University of Technology), (Graz, University of Technology), (Graz, University of Technology), (Intel Labs), (Intel Labs), (Intel Labs), (Intel Labs), (Graz, University of Technology) |
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs | (Technische Universität Berlin), (Technische Universität Berlin), (Technische Universität Berlin) |
Metadata Privacy Beyond Tunneling for Instant Messaging | (Aarhus University), (Chalmers University of Technology), (Aarhus University) |
Can Allowlists Capture the Variability of Home IoT Device Network Behavior? | (Dartmouth University), (University of Chicago), (University of Chicago), (New York University), (University of Chicago), (New York University), (University of Chicago) |
DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems | (Waseda University), (AIST, Waseda University), (Waseda University, NICT, RIKEN AIP) |
(Deep) Learning of Android Access Control Recommendation from Static Execution Paths | (University of Waterloo), (University of Waterloo), (University of Waterloo) |
(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting | (Hasso-Plattner-Institute, University of Potsdam), (Hasso-Plattner-Institute, University of Potsdam) |
Activity Recognition Protection for IoT Trigger-Action Platforms | (Sharif University of Technology), (Sharif University of Technology), (KTH Royal Institute of Technology), (KTH Royal Institute of Technology) |
Are We There Yet? Filling the Gap Between ML-Based Binary Similarity Analysis and Binary Software Composition Analysis. | (Hong Kong University of Science and Technology), (Hong Kong University of Science and Technology), (Hong Kong University of Science and Technology), (Northeastern University (China)), (Keen Security Lab, Tencent), (Keen Security Lab, Tencent), (Keen Security Lab, Tencent) |
Bad Design Smells in Benchmark NIDS Datasets | (University of Edinburgh), (DistriNet, KU Leuven), (University of Edinburgh), (DistriNet, KU Leuven) |
Can Allowlists Capture the Variability of Home IoT Device Network Behavior? | (Dartmouth University), (University of Chicago), (University of Chicago), (New York University), (University of Chicago), (New York University), (University of Chicago) |
chainBoost: A Secure Performance Booster for Blockchain-based Resource Markets | (University of Connecticut), (University of Connecticut), (University of Connecticut) |
Communication-Efficient Secure Logistic Regression | (University of Illinois Urbana-Champaign), (Georgia Tech), (Google), (Google), (Google) |
CSRF-ing the SSO waves: security testing of SSO-based account linking process | (Fondazione Bruno Kessler (Italy) and Futuro & Conoscenza (Italy)), (Fondazione Bruno Kessler (Italy)), (Fondazione Bruno Kessler (Italy)), (SAP Labs (France)), (Fondazione Bruno Kessler (Italy) and Department of Mathematics, University of Trento (Italy)), (Independent Researcher) |
David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge | (Universidade do Minho), (Universidade do Minho) |
DeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems | (Waseda University), (AIST, Waseda University), (Waseda University, NICT, RIKEN AIP) |
DISC-NG: Robust Service Discovery in the Ethereum Global Network | (City, University of London), (Lancaster University), (University College London), (MystenLabs & University College London), (UCLouvain), (UCLouvain), (Ethereum Foundation), (UCLouvain) |
DNS Exfiltration Guided by Generative Adversarial Networks | (University of California, Riverside), (University of California, Riverside), (University of California, Riverside), (University of California, Riverside), (University of California, Riverside), (Capital One), (Army Research Lab), (Army Research Lab), (The Pennsylvania State University), (University of California, Riverside) |
Dynamic Frequency-Based Side-Channel Attacks against Modern Sandbox Environments | (Iowa State University), (University of Luebeck), (Iowa State University), (Telefonica Research), (University of Luebeck) |
Efficient and Secure Two Party Maximum Computing via Incremental Distributed Point Functions | (University of St. Gallen), (University of St. Gallen), (Nanyang Institute of Technology), (University of St. Gallen) |
Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption | (Korea University, School of Cyber Security), (Samsung Research), (Korea University, School of Cyber Security) |
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE | (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur) |
Fingerprinting Image-to-Image Generative Adversarial Networks | (Nanyang Technological University), (City University of Hong Kong), (Tsinghua University), (Chongqing University), (Wuhan University), (Zhejiang University), (Nanyang Technological University), (University of New Brunswick) |
GOTCHA: Real-Time Video Deepfake Detection via Challenge-Response | (New York University), (New York University), (New York University) |
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions | (Ben Gurion University of the Negev), (Ben Gurion University of the Negev), (Ben Gurion University of the Negev), (Ben Gurion University of the Negev), (Ben Gurion University of the Negev), (Ben Gurion University of the Negev) |
How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India | (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi), (Indraprastha Institute of Information Technology, New Delhi) |
Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks | (Case Western Reserve University), (Independent Researcher), (Case Western Reserve University) |
Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs | (Graz, University of Technology), (Graz, University of Technology), (Graz, University of Technology), (Intel Labs), (Intel Labs), (Intel Labs), (Intel Labs), (Graz, University of Technology) |
Metadata Privacy Beyond Tunneling for Instant Messaging | (Aarhus University), (Chalmers University of Technology), (Aarhus University) |
MQ on my Mind: Post-Quantum Signatures from the Non-Structured Multivariate Quadratic Problem | (CryptoExperts), (CryptoExperts, Sorbonne Université), (CryptoExperts) |
MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search | (Singapore Management University), (Zhejiang Lab), (The Chinese University of Hong Kong), (Singapore Management University), (The Chinese University of Hong Kong), (Xidian University), (Morgan Stanley China), (Singapore Management University) |
Panacea: Stateless and Non-Interactive Oblivious RAM | (Zama, France), (COSIC, KU Leuven), (COSIC, KU Leuven), (NTNU, Norway) |
PASA: Attack Agnostic Unsupervised Adversarial Detection using Prediction & Attribution Sensitivity Analysis | (Rochester Institute of Technology), (Rochester Institute of Technology), (Rochester Institute of Technology), (Toyota Motor North America), (University of Florida), (Rochester Institute of Technology) |
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications | (University of Bristol), (University of Bristol) |
Practical Constructions for Single Input Functionality against a Dishonest Majority | (Zhejiang University), (Zhejiang University), (Virginia Commonwealth University), (Zhejiang University) |
ProInspector: Uncovering Logical Bugs in Protocol Implementations | (Carnegie Mellon University), (Carnegie Mellon University), (Carnegie Mellon University) |
SACfe: Secure Access Control in Functional Encryption with Unbounded Data | (University of St Gallen, Switzerland), (Indian Institute of Technology Kharagpur, India), (University of St Gallen, Switzerland), (Indian Institute of Technology Jammu, India), (NTT Social Informatics Laboratories, Japan), (University of St Gallen, Switzerland) |
Secure compilation of rich smart contracts on poor UTXO blockchains | (University of Cagliari), (University of Trento), (University of Trento) |
Seeing is Not Always Believing: An Empirical Analysis of Fake Evidence Generators | (University of Central Florida), (University of Central Florida), (Indiana University Bloomington), (University of Central Florida) |
SEKA: Secretless Key Exchange and Authentication in LiFi Networks | (Fraunhofer HHI and HPI), (Fraunhofer HHI), (Fraunhofer HHI), (HPI) |
Share with Care: Breaking E2EE in Nextcloud | (King's College London), (ETH Zurich), (ETH Zurich), (ETH Zurich) |
Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster | (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences), (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences) |
SoK: Public Randomness | (University College London), (Imperial College London), (University College London) |
SoK: SSO-Monitor - The Current State and Future Research Directions in Single Sign-On Security Measurements | (Ruhr University Bochum), (Heilbronn University of Applied Sciences), (ecsec GmbH), (Ruhr University Bochum), (Heilbronn University of Applied Sciences), (Ruhr University Bochum) |
The IEMI Effect: On the Efficacy of PCB-level Countermeasures in Adversarial Environments | (Virginia Tech), (Virginia Tech), (Utah State University), (Qualcomm), (Utah State University), (Virginia Tech), (Utah State University) |
The Web of Abuse: A Comprehensive Analysis of Online Resource in the Context of Technology-Enabled Intimate Partner Surveillance | (University of Wisconsin-Madison), (University of Wisconsin-Madison), (Indian Institute of Technology, Kharagpur), (Indian Institute of Technology, Kharagpur), (University of Wisconsin-Madison) |
Trojan attribute inference attack on gradient boosting decision trees | (NEC Corporation), (NEC Corporation), (NEC Corporation), (Tokyo Institute of Technology / RIKEN AIP) |
Uncovering the Role of Support Infrastructure in Clickbait PDF Campaigns | (CISPA Helmholtz Center for Information Security), (CISPA Helmholtz Center for Information Security), (CISPA Helmholtz Center for Information Security), (Cisco Talos), (CISPA Helmholtz Center for Information Security) |
Using Honeybuckets to Characterize Cloud Storage Scanning in the Wild | (University of California San Diego), (University of California San Diego), (University of California San Diego), (Stanford University), (University of California San Diego), (University of California San Diego) |
Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs | (Technische Universität Berlin), (Technische Universität Berlin), (Technische Universität Berlin) |