9:25 910 Stateful Analysis and Fuzzing of Commercial Baseband Firmware IEEE Symposium on Security and Privacy 373 views - 5 months ago
7:48 170 Zero Knowledge Location Privacy via Accurate Floating Point SNARKs IEEE Symposium on Security and Privacy 185 views - 5 months ago
8:24 896 Eva Efficient Privacy Preserving Proof of Authenticity for Lossily Encoded Videos IEEE Symposium on Security and Privacy 130 views - 5 months ago
15:03 636 COINDEF A Comprehensive Code Injection Defense for the Electron Framework IEEE Symposium on Security and Privacy 169 views - 6 months ago
23:24 119 Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging IEEE Symposium on Security and Privacy 138 views - 6 months ago
10:53 711 Hermes: Efficient and Secure Multi-Writer Encrypted Database IEEE Symposium on Security and Privacy 265 views - 6 months ago
9:09 #170 LombardVLD Voice Liveness Detection based on Human Auditory Feedback IEEE Symposium on Security and Privacy 65 views - 6 months ago
7:56 1106 Extended Diffie Hellman Encryption for Secure and Efficient Real Time Beacon Notifications IEEE Symposium on Security and Privacy 65 views - 6 months ago
10:35 147 Is Nobody There Good! Globally Measuring Connection Tampering without Responsive Endhosts IEEE Symposium on Security and Privacy 85 views - 6 months ago
9:19 148 Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs Made with Clipcha IEEE Symposium on Security and Privacy 87 views - 6 months ago
10:22 349 SoK Software Compartmentalization IEEE Symposium on Security and Privacy 95 views - 6 months ago
9:51 542 GPTracker A Large Scale Measurement of Misused GPTs IEEE Symposium on Security and Privacy 77 views - 6 months ago
6:37 1170 Turning Power Into Timing Without Frequency Scaling IEEE Symposium on Security and Privacy 87 views - 6 months ago
8:05 720 RGFuzz Rule Guided Fuzzer for WebAssembly Runtimes IEEE Symposium on Security and Privacy 67 views - 6 months ago
10:56 830 Not All Edges are Equally Robust Evaluating the Robustness of Ranking Based Federated Learning IEEE Symposium on Security and Privacy 43 views - 6 months ago
10:05 875 Robust Threshold ECDSA with Online Friendly Design in Three Rounds IEEE Symposium on Security and Privacy 44 views - 6 months ago
6:35 #173 Prevalence Overshadows Concerns IEEE Symposium on Security and Privacy 24 views - 6 months ago
7:39 128 PyLingual Toward Perfect Decompilation of High Level Languages IEEE Symposium on Security and Privacy 87 views - 6 months ago
7:54 81 SwiftSweeper Defeating Use After Free Bugs Using Memory Sweeper Without Stop the World IEEE Symposium on Security and Privacy 57 views - 6 months ago
8:19 880 Sparta: Practical Anonymity with Long-Term Resistance to Traffic Analysis IEEE Symposium on Security and Privacy 80 views - 6 months ago
8:08 743 Growlithe A Developer Centric Compliance Tool for Serverless Applications IEEE Symposium on Security and Privacy 23 views - 6 months ago
8:20 236 Sorry for bugging you so much Exploring Developers' Behavior Towards Privacy Compliant Implemen IEEE Symposium on Security and Privacy 34 views - 6 months ago
11:56 262 EveGuard Defeating Vibration based Side Channel Eavesdropping with Audio Adversarial Perturbatio IEEE Symposium on Security and Privacy 77 views - 6 months ago
7:46 794 A Low Cost Privacy Preserving Wallet for Humanitarian Aid Distribution IEEE Symposium on Security and Privacy 49 views - 6 months ago
9:32 830 Check Before you Solve Verifiable Time lock puzzles IEEE Symposium on Security and Privacy 63 views - 6 months ago
23:55 843 A Composability Analysis Framework for Web3 Wallet Recovery Mechanisms IEEE Symposium on Security and Privacy 41 views - 6 months ago
7:13 901 Open Sesame! On the Security and Memorability of Verbal Passwords IEEE Symposium on Security and Privacy 57 views - 6 months ago
7:57 848 Asymmetric Mempool DoS Security Formal Definitions and Provable Secure Designs IEEE Symposium on Security and Privacy 33 views - 6 months ago
7:02 221 Supporting Family Discussions About Digital Privacy Through Perspective Taking IEEE Symposium on Security and Privacy 24 views - 6 months ago
12:06 268 IUBIK Isolating User Bytes in Commodity Operating System Kernels via Memory Tagging Extension IEEE Symposium on Security and Privacy 131 views - 6 months ago
11:19 402 Follow My Flowcolon Unveiling Client Side Prototype Pollution Gadgets from One Million Real Worl IEEE Symposium on Security and Privacy 21 views - 6 months ago
4:55 497 Cauchyproofs Batch Updatable Vector Commitment with Easy Aggregation and Application to Statele IEEE Symposium on Security and Privacy 19 views - 6 months ago
8:05 689 Identifying Incoherent Search Sessions IEEE Symposium on Security and Privacy 40 views - 6 months ago
8:02 80 CMASan: Custom Memory Allocator-aware Address Sanitizer IEEE Symposium on Security and Privacy 188 views - 6 months ago
21:22 670 Quantifying the leakage of mix networks using a provably optimal heuristic adversary IEEE Symposium on Security and Privacy 27 views - 6 months ago
7:52 570 We can’t change it overnight Understanding Industry Perspectives on IoT Product Se IEEE Symposium on Security and Privacy 23 views - 6 months ago
14:43 14 CHIMERA Fuzzing P4 Network Infrastructure for Multi Plane Bug Detection and Vulnerability Discove IEEE Symposium on Security and Privacy 60 views - 6 months ago
7:44 375 Analyzing Ad Prevalence, Characteristics, and Compliance in Alexa Skills IEEE Symposium on Security and Privacy 24 views - 6 months ago
14:00 446 AccuRevoke Enhancing Certificate Revocation with Distributed Cryptographic Accumulators IEEE Symposium on Security and Privacy 129 views - 6 months ago
7:18 505 CHLOE Loop Transformation over Fully Homomorphic Encryption via Multi Level Vectorization and Co IEEE Symposium on Security and Privacy 62 views - 6 months ago
6:56 795 Investigating the U.S. Legal Perspectives on Liability for IoT Product Security IEEE Symposium on Security and Privacy 34 views - 6 months ago
6:31 520 CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels IEEE Symposium on Security and Privacy 78 views - 6 months ago
8:03 390 Sailfish: Towards Improving the Latency of DAG-based BFT IEEE Symposium on Security and Privacy 48 views - 6 months ago
6:52 642 VITARIT: Paying for Threshold Services on Bitcoin and Friends IEEE Symposium on Security and Privacy 33 views - 6 months ago
7:26 446 Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors IEEE Symposium on Security and Privacy 59 views - 6 months ago
13:39 #15 No Privacy Left Outside Ziqi Zhang IEEE Symposium on Security and Privacy 1.1K views - 1 year ago
17:29 #144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan IEEE Symposium on Security and Privacy 500 views - 1 year ago
13:12 #498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh IEEE Symposium on Security and Privacy 674 views - 1 year ago
13:43 #518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu IEEE Symposium on Security and Privacy 224 views - 1 year ago
19:07 6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong IEEE Symposium on Security and Privacy 396 views - 1 year ago
18:13 6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1 IEEE Symposium on Security and Privacy 282 views - 1 year ago
12:06 7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin IEEE Symposium on Security and Privacy 154 views - 1 year ago
19:32 9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos IEEE Symposium on Security and Privacy 207 views - 1 year ago
18:14 33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala IEEE Symposium on Security and Privacy 160 views - 1 year ago
19:05 43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled IEEE Symposium on Security and Privacy 302 views - 1 year ago
10:21 52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M IEEE Symposium on Security and Privacy 126 views - 1 year ago
15:03 77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod IEEE Symposium on Security and Privacy 123 views - 1 year ago
11:06 91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li IEEE Symposium on Security and Privacy 178 views - 1 year ago