#15 No Privacy Left Outside   Ziqi Zhang
IEEE Symposium on Security and Privacy
#15 No Privacy Left Outside Ziqi Zhang
13:39
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake   Eric Pan
IEEE Symposium on Security and Privacy
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
17:29
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning   Hongsh
IEEE Symposium on Security and Privacy
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
13:12
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs   Hongsheng Hu
IEEE Symposium on Security and Privacy
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
13:43
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem   Rae Gong
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
19:07
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem   Rae Gong1
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
18:13
06 Zihao Li NURGLE   zihao li
IEEE Symposium on Security and Privacy
06 Zihao Li NURGLE zihao li
10:58
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
IEEE Symposium on Security and Privacy
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
12:06
9 Prune+PlumTree   Finding Eviction Sets at Scale   Tom Kissos
IEEE Symposium on Security and Privacy
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
19:32
14 TuDoor   Xiang Li
IEEE Symposium on Security and Privacy
14 TuDoor Xiang Li
18:14
33 INVISILINE Invisible Plausibly Deniable Storage   Sandeep Kiran Pinjala
IEEE Symposium on Security and Privacy
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
18:14
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
IEEE Symposium on Security and Privacy
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
19:05
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
IEEE Symposium on Security and Privacy
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
10:21
77 UnTrustZone Systematic Accelerated Aging to Expose On chip   Jubayer Mahmod
IEEE Symposium on Security and Privacy
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
15:03
91 PIRANA  Faster Multi query PIR via Constant weight Codes   Jingyu Li
IEEE Symposium on Security and Privacy
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
11:06
95 Preserving Node level Privacy in Graph Neural Networks    ZH X
IEEE Symposium on Security and Privacy
95 Preserving Node level Privacy in Graph Neural Networks ZH X
9:17
101 The Great Request Robbery Soheil Khodayari   Soheil Khodayari
IEEE Symposium on Security and Privacy
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
19:48
109 BULKOR:Enabling Bulk Loading for Path ORAM   Xiang Li
IEEE Symposium on Security and Privacy
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
15:10
111 Efficient and Generic Microarchitectural Hash Function Recovery   Lukas Gerlach
IEEE Symposium on Security and Privacy
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
17:42
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
IEEE Symposium on Security and Privacy
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
16:00
154 Test time Poisoning Attacks Against Test time Adaptation Models   Tianshuo Cong
IEEE Symposium on Security and Privacy
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
9:19
164 SoK Security and Privacy of Blockchain Interoperability   André Augusto
IEEE Symposium on Security and Privacy
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
14:24
172 Don t Eject the Impostor  Fast Three Party Computation With a Known Cheater   Andreas Brüggeman
IEEE Symposium on Security and Privacy
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
19:49
185 BadVFL backdoor attacks in vertical federated learning   Mohammad Naseri
IEEE Symposium on Security and Privacy
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
13:00
211   Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection   Mahmoud Khaled Ahm
IEEE Symposium on Security and Privacy
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
15:26
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation   Mingxun Zhou
IEEE Symposium on Security and Privacy
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
19:37
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
IEEE Symposium on Security and Privacy
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
8:14
241 Backdooring Multimodal Learning   卡的不动弹
IEEE Symposium on Security and Privacy
241 Backdooring Multimodal Learning 卡的不动弹
15:29
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks   Jane
IEEE Symposium on Security and Privacy
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
13:36
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations   杨博睿
IEEE Symposium on Security and Privacy
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
16:05
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries   Joe
IEEE Symposium on Security and Privacy
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
17:12
275 Don t Shoot the Messenger  Localization Prevention of Satellite Internet Users   Richard Mitev
IEEE Symposium on Security and Privacy
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
14:59
276 Everyone for Themselves  A Qualitative Study about Individual Security Setups of Open Source Sof
IEEE Symposium on Security and Privacy
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
15:48
591 Where URLs Become Weapons  Automated Discovery of SSRF Vulnerabilities in Web Applications   Sam
IEEE Symposium on Security and Privacy
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
13:08
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator   Jo
IEEE Symposium on Security and Privacy
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
11:27
282 Transferable Multimodal Attack on Vision Language Pre training Models   haodi wang
IEEE Symposium on Security and Privacy
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
9:43
284 Group Oblivious Message Retrieval   Thomas
IEEE Symposium on Security and Privacy
284 Group Oblivious Message Retrieval Thomas
19:58
301 Scalable Verification of Zero Knowledge Protocols   MIGUEL ISABEL MÁRQUEZ
IEEE Symposium on Security and Privacy
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
19:04
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet  A Comprehensive Eva
IEEE Symposium on Security and Privacy
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
13:17
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length   Ming Su
IEEE Symposium on Security and Privacy
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
11:10
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models   Shawn Shan
IEEE Symposium on Security and Privacy
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
15:58
339 NodeAwareSmoothing   Yuni Lai Lena
IEEE Symposium on Security and Privacy
339 NodeAwareSmoothing Yuni Lai Lena
13:08
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
IEEE Symposium on Security and Privacy
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
10:21
415   SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields   Jan G
IEEE Symposium on Security and Privacy
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
16:23
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
IEEE Symposium on Security and Privacy
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
12:18
443 Targeted and Troublesome Zahra Moti   Zahra Moti
IEEE Symposium on Security and Privacy
443 Targeted and Troublesome Zahra Moti Zahra Moti
15:56
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
IEEE Symposium on Security and Privacy
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
13:17
483 Pandora  Principled Symbolic Validation of Intel SGX Enclave Runtimes   Jo Van Bulck
IEEE Symposium on Security and Privacy
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
19:43
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
IEEE Symposium on Security and Privacy
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
11:20
555 Patchy Performance  Uncovering the Vulnerability Management Practices of IoT Centric Vendors   S
IEEE Symposium on Security and Privacy
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
9:56
574 Cohere Managing Differential Privacy in Large Scale Systems   Nicolas Küchler
IEEE Symposium on Security and Privacy
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
15:29
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
IEEE Symposium on Security and Privacy
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
16:39
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
IEEE Symposium on Security and Privacy
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
15:27
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security   Jannik Albrech
IEEE Symposium on Security and Privacy
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
16:55
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification   homeway yao
IEEE Symposium on Security and Privacy
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
11:20
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP   Supraja Sridhara
IEEE Symposium on Security and Privacy
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
16:42
646 attackinng byzantine robustness in high dimensions   kolluri aashish
IEEE Symposium on Security and Privacy
646 attackinng byzantine robustness in high dimensions kolluri aashish
19:43
646 SoK Prudent Evaluation Practices for Fuzzing   Moritz Schloegel
IEEE Symposium on Security and Privacy
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
17:48
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation   Jan
IEEE Symposium on Security and Privacy
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
13:38
2024 05 22 02 41 48 H 264   Rui Xi
IEEE Symposium on Security and Privacy
2024 05 22 02 41 48 H 264 Rui Xi
20:16
671 One for All and All for One  GNN based Control Flow Attestation for Embedded Devices   Richard M
IEEE Symposium on Security and Privacy
671 One for All and All for One GNN based Control Flow Attestation for Embedded Devices Richard M
15:04
699 CoreLocker   Andrew Wang
IEEE Symposium on Security and Privacy
699 CoreLocker Andrew Wang
8:05
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
IEEE Symposium on Security and Privacy
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
11:05
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices   Jincheng Wang
IEEE Symposium on Security and Privacy
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang
14:13
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge   Patrick Kon
IEEE Symposium on Security and Privacy
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge Patrick Kon
16:20
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
IEEE Symposium on Security and Privacy
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
16:26
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation   박영기
IEEE Symposium on Security and Privacy
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation 박영기
17:02
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect   Cristiano Rodri
IEEE Symposium on Security and Privacy
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect Cristiano Rodri
19:15
2024 37 SoK Safer Digital Safety Research Involving At Risk Users   Rosanna “Rosie” Bellini
IEEE Symposium on Security and Privacy
2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini
10:29
2024 48 SwiftRange   Vincent
IEEE Symposium on Security and Privacy
2024 48 SwiftRange Vincent
14:29
2024 50 BAFFLE   Mr HE Junda
IEEE Symposium on Security and Privacy
2024 50 BAFFLE Mr HE Junda
8:29
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing   Max Ammann
IEEE Symposium on Security and Privacy
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann
18:05
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations   刘威
IEEE Symposium on Security and Privacy
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
15:05
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild
IEEE Symposium on Security and Privacy
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild
8:52
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu
IEEE Symposium on Security and Privacy
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu
19:37
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel   Garrison Gao
IEEE Symposium on Security and Privacy
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao
15:06
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par
IEEE Symposium on Security and Privacy
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par
15:06
2024 151 Shedding Light on CVSS Scoring Inconsistencies  A User Centric Study on Evaluating Widespre
IEEE Symposium on Security and Privacy
2024 151 Shedding Light on CVSS Scoring Inconsistencies A User Centric Study on Evaluating Widespre
18:18
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse
IEEE Symposium on Security and Privacy
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse
18:48
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs   Mayank Rathee
IEEE Symposium on Security and Privacy
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee
15:50
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support   Daniel Schadt
IEEE Symposium on Security and Privacy
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support Daniel Schadt
13:59
2024 196 The Times They Are A Changin    Christos Tsoukaladelis
IEEE Symposium on Security and Privacy
2024 196 The Times They Are A Changin Christos Tsoukaladelis
12:43
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge   Jiahe Lan
IEEE Symposium on Security and Privacy
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan
8:11
2024 237 SoK Unintended Interactions among ML Defenses and Risks   Vasisht Duddu
IEEE Symposium on Security and Privacy
2024 237 SoK Unintended Interactions among ML Defenses and Risks Vasisht Duddu
18:20
2024 319 FCert   yantiing wang
IEEE Symposium on Security and Privacy
2024 319 FCert yantiing wang
7:44
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs   Tianyi Liu
IEEE Symposium on Security and Privacy
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu
14:58
2024 265 eAudit  A Fast, Scalable and Deployable Audit Data Collection System   Hanke Kimm
IEEE Symposium on Security and Privacy
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
13:18
2024 431 Routing Attacks on Cryptocurrency Mining Pools   Muoi Tran
IEEE Symposium on Security and Privacy
2024 431 Routing Attacks on Cryptocurrency Mining Pools Muoi Tran
19:26
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation   Joyanta De
IEEE Symposium on Security and Privacy
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation Joyanta De
19:01
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples   cheng yushi
IEEE Symposium on Security and Privacy
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples cheng yushi
9:15
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf
IEEE Symposium on Security and Privacy
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf
19:20
2024 471 Private Hierarchical Governance for Encrypted Messaging   Armin Namavari
IEEE Symposium on Security and Privacy
2024 471 Private Hierarchical Governance for Encrypted Messaging Armin Namavari
17:16
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers  Coding Practices with Inse
IEEE Symposium on Security and Privacy
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
18:07
Backdooring Multimodal Learning
IEEE Symposium on Security and Privacy
Backdooring Multimodal Learning
15:29
Chronos presentation   sard Chen
IEEE Symposium on Security and Privacy
Chronos presentation sard Chen
9:16
MEA Defender   Lv Peizhuo
IEEE Symposium on Security and Privacy
MEA Defender Lv Peizhuo
17:11
GroVE 20mins S&P   Asim Waheed
IEEE Symposium on Security and Privacy
GroVE 20mins S&P Asim Waheed
14:54
LowerBoundsRDP   Tim Kutta
IEEE Symposium on Security and Privacy
LowerBoundsRDP Tim Kutta
18:45
SP24 HD   Florian Hantke
IEEE Symposium on Security and Privacy
SP24 HD Florian Hantke
20:00
sp24 long recording   Jannis Rautenstrauch
IEEE Symposium on Security and Privacy
sp24 long recording Jannis Rautenstrauch
19:20