IEEE Symposium on Security and Privacy
#15 No Privacy Left Outside Ziqi Zhang
13:39
IEEE Symposium on Security and Privacy
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
17:29
IEEE Symposium on Security and Privacy
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
13:12
IEEE Symposium on Security and Privacy
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
13:43
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
19:07
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
18:13
IEEE Symposium on Security and Privacy
06 Zihao Li NURGLE zihao li
10:58
IEEE Symposium on Security and Privacy
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
12:06
IEEE Symposium on Security and Privacy
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
19:32
IEEE Symposium on Security and Privacy
14 TuDoor Xiang Li
18:14
IEEE Symposium on Security and Privacy
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
18:14
IEEE Symposium on Security and Privacy
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
19:05
IEEE Symposium on Security and Privacy
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
10:21
IEEE Symposium on Security and Privacy
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
15:03
IEEE Symposium on Security and Privacy
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
11:06
IEEE Symposium on Security and Privacy
95 Preserving Node level Privacy in Graph Neural Networks ZH X
9:17
IEEE Symposium on Security and Privacy
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
19:48
IEEE Symposium on Security and Privacy
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
15:10
IEEE Symposium on Security and Privacy
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
17:42
IEEE Symposium on Security and Privacy
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
16:00
IEEE Symposium on Security and Privacy
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
9:19
IEEE Symposium on Security and Privacy
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
14:24
IEEE Symposium on Security and Privacy
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
19:49
IEEE Symposium on Security and Privacy
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
13:00
IEEE Symposium on Security and Privacy
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
15:26
IEEE Symposium on Security and Privacy
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
19:37
IEEE Symposium on Security and Privacy
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
8:14
IEEE Symposium on Security and Privacy
241 Backdooring Multimodal Learning 卡的不动弹
15:29
IEEE Symposium on Security and Privacy
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
13:36
IEEE Symposium on Security and Privacy
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
16:05
IEEE Symposium on Security and Privacy
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
17:12
IEEE Symposium on Security and Privacy
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
14:59
IEEE Symposium on Security and Privacy
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
15:48
IEEE Symposium on Security and Privacy
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
13:08
IEEE Symposium on Security and Privacy
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
11:27
IEEE Symposium on Security and Privacy
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
9:43
IEEE Symposium on Security and Privacy
284 Group Oblivious Message Retrieval Thomas
19:58
IEEE Symposium on Security and Privacy
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
19:04
IEEE Symposium on Security and Privacy
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
13:17
IEEE Symposium on Security and Privacy
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
11:10
IEEE Symposium on Security and Privacy
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
15:58
IEEE Symposium on Security and Privacy
339 NodeAwareSmoothing Yuni Lai Lena
13:08
IEEE Symposium on Security and Privacy
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
10:21
IEEE Symposium on Security and Privacy
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
16:23
IEEE Symposium on Security and Privacy
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
12:18
IEEE Symposium on Security and Privacy
443 Targeted and Troublesome Zahra Moti Zahra Moti
15:56
IEEE Symposium on Security and Privacy
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
13:17
IEEE Symposium on Security and Privacy
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
19:43
IEEE Symposium on Security and Privacy
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
11:20
IEEE Symposium on Security and Privacy
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
9:56
IEEE Symposium on Security and Privacy
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
15:29
IEEE Symposium on Security and Privacy
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
16:39
IEEE Symposium on Security and Privacy
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
15:27
IEEE Symposium on Security and Privacy
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
16:55
IEEE Symposium on Security and Privacy
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
11:20
IEEE Symposium on Security and Privacy
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
16:42
IEEE Symposium on Security and Privacy
646 attackinng byzantine robustness in high dimensions kolluri aashish
19:43
IEEE Symposium on Security and Privacy
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
17:48
IEEE Symposium on Security and Privacy
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
13:38
IEEE Symposium on Security and Privacy
2024 05 22 02 41 48 H 264 Rui Xi
20:16
IEEE Symposium on Security and Privacy
671 One for All and All for One GNN based Control Flow Attestation for Embedded Devices Richard M
15:04
IEEE Symposium on Security and Privacy
699 CoreLocker Andrew Wang
8:05
IEEE Symposium on Security and Privacy
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
11:05
IEEE Symposium on Security and Privacy
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang
14:13
IEEE Symposium on Security and Privacy
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge Patrick Kon
16:20
IEEE Symposium on Security and Privacy
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
16:26
IEEE Symposium on Security and Privacy
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation 박영기
17:02
IEEE Symposium on Security and Privacy
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect Cristiano Rodri
19:15
IEEE Symposium on Security and Privacy
2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini
10:29
IEEE Symposium on Security and Privacy
2024 48 SwiftRange Vincent
14:29
IEEE Symposium on Security and Privacy
2024 50 BAFFLE Mr HE Junda
8:29
IEEE Symposium on Security and Privacy
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann
18:05
IEEE Symposium on Security and Privacy
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
15:05
IEEE Symposium on Security and Privacy
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild
8:52
IEEE Symposium on Security and Privacy
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu
19:37
IEEE Symposium on Security and Privacy
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao
15:06
IEEE Symposium on Security and Privacy
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par
15:06
IEEE Symposium on Security and Privacy
2024 151 Shedding Light on CVSS Scoring Inconsistencies A User Centric Study on Evaluating Widespre
18:18
IEEE Symposium on Security and Privacy
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse
18:48
IEEE Symposium on Security and Privacy
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee
15:50
IEEE Symposium on Security and Privacy
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support Daniel Schadt
13:59
IEEE Symposium on Security and Privacy
2024 196 The Times They Are A Changin Christos Tsoukaladelis
12:43
IEEE Symposium on Security and Privacy
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan
8:11
IEEE Symposium on Security and Privacy
2024 237 SoK Unintended Interactions among ML Defenses and Risks Vasisht Duddu
18:20
IEEE Symposium on Security and Privacy
2024 319 FCert yantiing wang
7:44
IEEE Symposium on Security and Privacy
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu
14:58
IEEE Symposium on Security and Privacy
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
13:18
IEEE Symposium on Security and Privacy
2024 431 Routing Attacks on Cryptocurrency Mining Pools Muoi Tran
19:26
IEEE Symposium on Security and Privacy
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation Joyanta De
19:01
IEEE Symposium on Security and Privacy
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples cheng yushi
9:15
IEEE Symposium on Security and Privacy
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf
19:20
IEEE Symposium on Security and Privacy
2024 471 Private Hierarchical Governance for Encrypted Messaging Armin Namavari
17:16
IEEE Symposium on Security and Privacy
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
18:07
IEEE Symposium on Security and Privacy
Backdooring Multimodal Learning
15:29
IEEE Symposium on Security and Privacy
Chronos presentation sard Chen
9:16
IEEE Symposium on Security and Privacy
MEA Defender Lv Peizhuo
17:11
IEEE Symposium on Security and Privacy
GroVE 20mins S&P Asim Waheed
14:54
IEEE Symposium on Security and Privacy
LowerBoundsRDP Tim Kutta
18:45
IEEE Symposium on Security and Privacy
SP24 HD Florian Hantke
20:00
IEEE Symposium on Security and Privacy
sp24 long recording Jannis Rautenstrauch
19:20