


default search action
33rd NDSS 2026: San Diego, CA, USA
- 33rd Annual Network and Distributed System Security Symposium, NDSS 2026, San Diego, California, USA, February 23-27, 2026. The Internet Society 2026

- Licheng Pan, Yunsheng Lu, Jiexi Liu, Jialing Tao, Haozhe Feng, Hui Xue, Zhixuan Chu, Kui Ren:

A Causal Perspective for Enhancing Jailbreak Attack and Defense. - Omar Abusabha, Jiyong Uhm, Tamer Abuhmed, Hyungjoon Koo:

A Deep Dive into Function Inlining and its Security Implications for ML-based Binary Analysis. - Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu:

A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems. - Liwei Zhang, Linghui Li, Xiaotian Si, Ziduo Guo, Xingwu Wang, Kaiguo Yuan, Bingyu Li:

A Unified Defense Framework Against Membership Inference in Federated Learning via Distillation and Contribution-Aware Aggregation. - Zhongming Wang, Tao Xiang, Xiaoguo Li, Guomin Yang, Biwen Chen, Ze Jiang, Jiacheng Wang, Chuan Ma, Robert H. Deng:

Abuse Resistant Traceability with Minimal Trust for Encrypted Messaging Systems. - Qixuan Guo, Yongzhong He:

Accurate Identification of the Vulnerability-Introducing Commit based on Differential Analysis of Patching Patterns. - Evan Li, Tushin Mallick, Evan Rose, William K. Robertson, Alina Oprea, Cristina Nita-Rotaru:

ACE: A Security Architecture for LLM-Integrated App Systems. - Peiyang Li, Fukun Mei, Ye Wang, Zhuotao Liu, Ke Xu, Chao Shen, Qian Wang, Qi Li:

Achieving Interpretable DL-based Web Attack Detection through Malicious Payload Localization. - David Oygenblik, Dinko Dermendzhiev, Filippos Sofias, Mingxuan Yao, Haichuan Xu, Runze Zhang, Jeman Park, Amit Kumar Sikder, Brendan Saltaformaggio:

Achieving Zen: Combining Mathematical and Programmatic Deep Learning Model Representations for Attribution and Reuse. - Yusuke Kubo, Fumihiro Kanei, Mitsuaki Akiyama, Takuro Wakai, Tatsuya Mori:

Action Required: A Mixed-Methods Study of Security Practices in GitHub Actions. - Tillson Galloway, Omar Alrawi, Allen Chang, Athanasios Avgetidis, Manos Antonakakis, Fabian Monrose:

Actively Understanding the Dynamics and Risks of the Threat Intelligence Ecosystem. - Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini:

ACTS: Attestations of Contents in TLS Sessions. - Yuncheng Wang, Yaowen Zheng, Puzhuo Liu, Dongliang Fang, Jiaxing Cheng, Dingyi Shi, Limin Sun:

ADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles. - Xin'an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan, Srikanth V. Krishnamurthy, Mathy Vanhoef:

AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks. - Radu Anghel, Carlos Gañán, Qasim Lone, Matthew Luckie, Yury Zhauniarovich:

Aliens Among Us: Observing Private or Reserved IPs on the Public Internet. - Jiaxing Cheng, Ming Zhou, Haining Wang, Xin Chen, Yuncheng Wang, Yibo Qu, Limin Sun:

An LLM-Driven Fuzzing Framework for Detecting Logic Instruction Bugs in PLCs. - Alan T. Sherman, Jeremy J. Romanik Romano, Edward Zieglar, Enis Golaszewski, Jonathan D. Fuchs, William E. Byrd:

Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System. - Xin Zhang, Xiaohan Zhang, Huijun Zhou, Bo Zhao:

Anchors of Trust: A Usability Study on User Awareness, Consent, and Control in Cross-Device Authentication. - Hexuan Yu, Chaoyu Zhang, Yang Xiao, Angelos D. Keromytis, Y. Thomas Hou, Wenjing Lou:

ANONYCALL: Enabling Native Private Calling in Mobile Networks. - Meng Wang, Philipp Görz, Joschua Schilling, Keno Hassler, Liwei Guo, Thorsten Holz, Ali Abbasi:

Anota: Identifying Business Logic Vulnerabilities via Annotation-Based Sanitization. - Jan Drescher, David Klein, Martin Johns:

Are your Sites Truly Isolated? Automatically Detecting Logic Bugs in Site Isolation Implementations. - Yinan Zhong, Qianhao Miao, Yanjiao Chen, Jiangyi Deng, Yushi Cheng, Wenyuan Xu:

Attention is All You Need to Defend Against Indirect Prompt Injection Attacks in LLMs. - Takao Murakami, Yuichi Sei, Reo Eriguchi:

Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data. - Varun Gadey, Melanie Melanie Gotz, Christoph Sendner, Sampo Sovio, Alexandra Dmitrienko:

Automated Code Annotation with LLMs for Establishing TEE Boundaries. - Yuqiao Yang, Yongzhao Zhang, Wenhao Liu, Jun Li, Pengtao Shi, DingYu Zhong, Jie Yang, Ting Chen, Sheng Cao, Yuntao Ren, Yongyue Wu, Xiaosong Zhang:

Automating Function-Level TARA for Automotive Full-Lifecycle Security. - Qiguang Zhang, Junzhou Luo, Zhen Ling, Yue Zhang, Chongqing Lei, Christopher Morales, Xinwen Fu:

BACnet or "BADnet"? On the (In)Security of Implicitly Reserved Fields in BACnet. - Yiluo Wei, Peixian Zhang, Gareth Tyson:

Benchmarking and Understanding Safety Risks in AI Character Platforms. - Yizhe Shi, Zhemin Yang, Dingyi Liu, Kangwei Zhong, Jiarun Dai, Min Yang:

Better Safe than Sorry: Uncovering the Insecure Resource Management in App-in-App Cloud Services. - Ye Wang, Bo Luo, Fengjun Li:

Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic Bombs. - Yunyi Zhang, Shibo Cui, Baojun Liu, Jingkai Yu, Min Zhang, Fan Shi, Han Zheng:

Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from Blurred Capability Boundaries. - Luke Kurlandski, Harel Berger, Yin Pan, Matthew Wright:

Beyond Raw Bytes: Towards Large Malware Language Models. - Temoor Ali, Shehel Yoosuf, Mouna Rabhi, Mashael Al Sabah, Hao Yun:

Beyond RTT: An Adversarially Robust Two-Tiered Approach For Residential Proxy Detection. - Yiran Zhu, Tong Tang, Jie Wan, Ziqi Yang, Zhenguang Liu, Lorenzo Cavallaro:

BINALIGNER: Aligning Binary Code for Cross-Compilation Environment Diffing. - Wei Shao, Najmeh Nazari, Behnam Omidi, Setareh Rafatirad, Khaled N. Khasawneh, Houman Homayoun, Chongzhou Fang:

Bit of a Close Talker: A Practical Guide to Serverless Cloud Co-Location Attacks. - Jie Song, Zhen Xu, Yan Zhang, Pengwei Zhan, Mingxuan Li, Shuai Ma, Ru Xie:

BKPIR: Keyword PIR for Private Boolean Retrieval. - Yingjie Zhang, Tong Liu, Zhe Zhao, Guozhu Meng, Kai Chen:

Bleeding Pathways: Vanishing Discriminability in LLM Hidden States Fuels Jailbreak Attacks. - Tommaso Sacchetti, Daniele Antonioli:

BLERP: BLE Re-Pairing Attacks and Defenses. - Gaoning Pan, Yiming Tao, Qinying Wang, Chunming Wu, Mingde Hu, Yizhi Ren, Shouling Ji:

Breaking Isolation: A New Perspective on Hypervisor Exploitation via Cross-Domain Attacks. - Andong Chen, Ziyi Guo, Zhaoxuan Jin, Zhenyuan Li, Yan Chen:

Breaking the Bulkhead: Demystifying Cross-Namespace Reference Vulnerabilities in Kubernetes Operators. - Yaofei Wang, Weilong Pang, Kejiang Chen, Jinyang Ding, Donghui Hu, Weiming Zhang, Nenghai Yu:

Breaking the Generative Steganography Trilemma: ANStega for Optimal Capacity, Efficiency, and Security. - Ting Yang, Yue Qin, Lan Zhang, Zhiyuan Fu, Junfan Chen, Jice Wang, Shangru Zhao, Qi Li, Ruidong Li, He Wang, Yuqing Zhang:

BSFuzzer: Context-Aware Semantic Fuzzing for BLE Logic Flaw Detection. - Tariq Houis, Shaoqi Jiang, Mohammad Mannan, Amr Youssef:

Bullseye: Detecting Prototype Pollution in NPM Packages with Proof of Concept Exploits. - Rujia Li, Mingfei Zhang, Xueqian Lu, Wenbo Xu, Ying Yan, Sisi Duan:

BunnyFinder: Finding Incentive Flaws for Ethereum Consensus. - XiangFan Wu, Lingyun Ying, Guoqiang Chen, Yacong Gu, Haipeng Qu:

Cache Me, Catch You: Cache Related Security Threats in LLM Serving Frameworks. - Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li:

Cascading and Proxy Membership Inference Attacks. - Jie Wang, Zheng Yan, Jiahe Lan, Xuyan Li, Elisa Bertino:

CAT: Can Trust be Predicted with Context-Awareness in Dynamic Heterogeneous Networks? - Behrad Tajalli, Stefanos Koffas, Stjepan Picek:

CatBack: Universal Backdoor Attacks on Tabular Data via Categorical Encoding. - Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen:

Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models. - Rong Wang, Zhen Ling, Guangchi Liu, Shaofeng Li, Junzhou Luo, Xinwen Fu:

Cease at the Ultimate Goodness: Towards Efficient Website Fingerprinting Defense via Iterative Mutual Information Minimization. - Rob Jansen:

CELLSHIFT: RTT-Aware Trace Transduction for Real-World Website Fingerprinting. - Hongyu Lin, Yicheng Hu, Haitao Xu, Yanchen Lu, Mengxia Ren, Shuai Hao, Chuan Yue, Zhao Li, Fan Zhang, Yixin Jiang:

CHAMELEOSCAN: Demystifying and Detecting iOS Chameleon Apps via LLM-Powered UI Exploration. - Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Gill, Leo Yu Zhang:

Character-Level Perturbations Disrupt LLM Watermarks. - Anna Ablove, Shreyas Chandrashekaran, Xiao Qiang, Roya Ensafi:

Characterizing the Implementation of Censorship Policies in Chinese LLM Services. - Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr:

Chasing Shadows: Pitfalls in LLM Security Research. - Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao:

Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation. - Wenhao Wang, Fangyan Shi, Dani Vilardell, Fan Zhang:

Cirrus: Performant and Accountable Distributed SNARK. - Shuo Yang, Xinran Zheng, Jinze Li, Jinfeng Xu, Edith C. H. Ngai:

CoLD: Collaborative Label Denoising Framework for Network Intrusion Detection. - Junkyu Kang, Soyoung Lee, Yonghwi Kwon, Sooel Son:

Connecting the Dots: An Investigative Study on Linking Private User Data Across Messaging Apps. - Chenxu Wang, Sisi Duan, Minghui Xu, Feng Li, Xiuzhen Cheng:

Consensus in the Known Participation Model with Byzantine Faults and Sleepy Replicas. - Meng Shen, Jiangyuan Bi, Hao Yu, Zhenming Bai, Wei Wang, Liehuang Zhu:

Constructive Noise Defeats Adversarial Noise: Adversarial Example Detection for Commercial DNN Services. - Hannes Weissteiner, Roland Czerny, Simone Franza, Stefan Gast, Johanna Ullrich, Daniel Gruss:

Continuous User Behavior Monitoring using DNS Cache Timing Attacks. - Yu Zheng, Chenang Li, Zhou Li, Qingsong Wang:

Convergent Privacy Framework for Multi-layer GNNs through Contractive Message Passing. - Ruixuan Li, Chaoyi Lu, Baojun Liu, Yanzhong Lin, Qingfeng Pan, Jun Shao:

CoordMail: Exploiting SMTP Timeout and Command Interaction to Coordinate Email Middleware for Convergence Amplification Attack. - Chenyang Wang, Fan Shi, Min Zhang, Chengxi Xu, Miao Hu, Pengfei Xue, Shasha Guo, Jinghua Zheng:

CoT-DPG: A Co-Training based Dynamic Password Guessing Method. - Yunhao Liu, Jessie Hui Wang, Yuedong Xu, Zongpeng Li, Yangyang Wang, Jilong Wang:

Crack in the Armor: Underlying Infrastructure Threats to RPKI Publication Point Reachability. - Xiaoyu Fang, Shihui Zheng, Lize Gu:

CRISP: An Efficient Cryptographic Framework for ML Inference Against Malicious Clients. - Sohom Datta, Michalis Diamantaris, Ahsan Zafar, Junhua Su, Anupam Das, Jason Polakis, Alexandros Kapravelos:

Cross-Boundary Mobile Tracking: Exploring Java-to-JavaScript Information Diffusion in WebViews. - Claudio Migliorelli, Andrea Mambretti, Alessandro Sorniotti, Vittorio Zaccaria, Anil Kurmus:

Cross-Cache Attacks for the Linux Kernel via PCP Massaging. - Yue Huang, Xin Wang, Haibin Zhang, Sisi Duan:

Cross-Consensus Reliable Broadcast and its Applications. - Andrija Novakovic, Alireza Kavousi, Kobi Gurkan, Philipp Jovanovic:

Cryptobazaar: Private Sealed-bid Auctions at Scale. - Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou:

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning. - Jie Kong, James Damon, Hemi Leibowitz, Ewa Syta, Amir Herzberg:

CTng: Secure Certificate and Revocation Transparency. - Hui Jiang, Zhenrui Zhang, Xiang Li, Yan Li, Anpeng Zhou, Chenghui Wu, Man Hou, Jia Zhang, Zongpeng Li:

CtPhishCapture: Uncovering Credential-Theft-Based Phishing Scams Targeting Cryptocurrency Wallets. - Qingwen Li, Song Bian, Hui Li:

cwPSU: Efficient Unbalanced Private Set Union via Constant-weight Codes. - Hao Luan, Xue Tan, Zhiheng Li, Jun Dai, Xiaoyan Sun, Ping Chen:

Dataset Reduction and Watermark Removal via Self-supervised Learning for Model Extraction Attack. - Zion Leonahenahe Basque, Samuele Doria, Ananta Soneji, Wil Gibbs, Adam Doupé, Yan Shoshitaishvili, Eleonora Losiouk, Ruoyu Wang, Simone Aonzo:

Decompiling the Synergy: An Empirical Study of Human-LLM Teaming in Software Reverse Engineering. - Weitong Li, Tao Wan, Tijay Chung:

Demystifying RPKI-Invalid Prefixes: Hidden Causes and Security Risks. - Yue Liu, Zexiang Zhang, Jiaxun Zhu, Hao Zheng, Jiaqing Huang, Wenbo Shen, Gaoning Pan, Yuliang Lu, Min Zhang, Zulie Pan, Guang Cheng:

Demystifying the Access Control Mechanism of ESXi VMKernel. - Yoochan Lee, Hyuk Kwon, Thorsten Holz:

DirtyFree: Simplified Data-Oriented Programming in the Linux Kernel. - Fangzhou Dong, Arvind S. Raj, Efrén López-Morales, Siyu Liu, Yan Shoshitaishvili, Tiffany Bao, Adam Doupé, Muslum Ozgur Ozmen, Ruoyu Wang:

Discovering Blind-Trust Vulnerabilities in PLC Binaries via State Machine Recovery. - Angelo De Caro, Kaoutar Elkhiyaoui, Sandeep Nishad, Sikhar Patranabis, Venkatraman Ramakrishna:

Distributed Broadcast Encryption for Confidential Interoperability across Private Blockchains. - Minkyung Park, Zelun Kong, DaveTian, Z. Berkay Celik, Chung Hwan Kim:

DNN Latency Sequencing: Extracting DNN Architectures from Intel SGX Enclaves with Single-Stepping Attacks. - Nuno Sabino, Darion Cassel, Rui Abreu, Pedro Adão, Lujo Bauer, Limin Jia:

DOM-XSS Detection via Webpage Interaction Fuzzing and URL Component Synthesis. - Xinzhe Huang, Kedong Xiu, Tianhang Zheng, Churui Zeng, Wangze Ni, Zhan Qin, Kui Ren, Chun Chen:

DUALBREACH: Efficient Dual-Jailbreaking via Target-Driven Initialization and Multi-Target Optimization. - Xiaomeng Chen, Jike Wang, Zhenyu Chen, Qi Alfred Chen, Xinbing Wang, Dongyao Chen:

DualStrike: Accurate, Real-time Eavesdropping and Injection of Keystrokes on Commodity Keyboards. - Yu Liang, Peng Liu:

Efficiently Detecting DBMS Bugs through Bottom-up Syntax-based SQL Generation. - Renata Vaderna, Dusan Nikolic, Patrick Zielinski, David Greisen, BJ Ard, Justin Cappos:

Enhancing Legal Document Security and Accessibility with TAF. - Chengfeng Ye, Anshunkang Zhou, Charles Zhang:

Enhancing Semantic-Aware Binary Diffing with High-Confidence Dynamic Instruction Alignment. - Xinhao Deng, Yixiang Zhang, Qi Li, Zhuotao Liu, Yabo Wang, Ke Xu:

Enhancing Website Fingerprinting Attacks against Traffic Drift. - Jiacen Xu, Chenang Li, Yu Zheng, Zhou Li:

Entente: Cross-silo Intrusion Detection on Network Log Graphs with Federated Learning. - Sudheendra Raghav Neela, Jonas Juffinger, Lukas Maar, Daniel Gruss:

Eviction Notice: Reviving and Advancing Page Cache Attacks. - Zhen Huang, Yidi Kao, Sanchuan Chen, Guoxing Chen, Yan Meng, Haojin Zhu:

EXIA: Trusted Transitions for Enclaves via External-Input Attestation. - Hongyue Jin, Yanan Guo, Zhenkai Zhang:

Exploiting TLBs in Virtualized GPUs for Cross-VM Side-Channel Attacks. - Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong:

ExpShield: Safeguarding Web Text from Unauthorized Crawling and LLM Exploitation. - Yubo Du, Youtao Zhang, Jun Yang:

Fast Pointer Nullification for Use-After-Free Prevention. - Guowei Ling, Peng Tang, Jinyong Shan, Liyao Xiang, Weidong Qiu:

Faster Than Ever: A New Lightweight Private Set Intersection and Its Variants. - Zhiping Zhou, Xiaohong Li, Ruitao Feng, Yao Zhang, Yuekang Li, Wenbu Feng, Yunqian Wang, Yuqing Li:

FidelityGPT: Correcting Decompilation Distortions with Retrieval Augmented Generation. - Jiangan Ji, Chao Zhang, Shuitao Gan, Lin Jian, Hangtian Liu, Tieming Liu, Lei Zheng, Zhipeng Jia:

FirmAgent: Leveraging Fuzzing to Assist LLM Agents with IoT Firmware Vulnerability Discovery. - Runhao Liu, Jiarun Dai, Haoyu Xiao, Yuan Zhang, Yeqi Mou, Lukai Xu, Bo Yu, Baosheng Wang, Min Yang:

FirmCross: Detecting Taint-style Vulnerabilities in Modern C-Lua Hybrid Web Services of Linux-based Firmware. - Martin Heckel, Nima Sayadi, Jonas Juffinger, Carina Fiedler, Daniel Gruss, Florian Adamsky:

FLIPPYRAM: A Large-Scale Study of Rowhammer Prevalence. - Shaoyuan Xie, Mohamad Habib Fakih, Junchi Lu, Fayzah Alshammari, Ningfei Wang, Takami Sato, Halima Bouzidi, Mohammad Abdullah Al Faruque, Qi Alfred Chen:

FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems. - Min Shi, Yongkang Xiao, Jing Chen, Kun He, Ruiying Du, Meng Jia:

Formal Analysis of BLE Secure Connection Pairing and Revelation of the PE Confusion Attack. - Yingyuan Pu, Lingyun Ying, Yacong Gu:

From Noise to Signal: Precisely Identify Affected Packages of Known Vulnerabilities in npm Ecosystem. - Dongchao Zhou, Lingyun Ying, Huajun Chai, Dongbin Wang:

From Obfuscated to Obvious: A Comprehensive JavaScript Deobfuscation Tool for Security Analysis. - Kunlin Cai, Jinghuai Zhang, Ying Li, Zhiyuan Wang, Xun Chen, Tianshi Li, Yuan Tian:

From Perception to Protection: A Developer-Centered Study of Security and Privacy Threats in Extended Reality (XR). - Johannes Lenzen, Mohamadreza Rostami, Lichao Wu, Ahmad-Reza Sadeghi:

Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer. - Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi:

GoldenFuzz: Generative Golden Reference Hardware Fuzzing. - Gabriel K. Gegenhuber, Philipp É. Frenzel, Maximilian Günther, Johanna Ullrich, Aljosha Judmayer:

Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy. - Youqian Zhang, Zheng Fang, Huan Wu, Sze-Yiu Chau, Chao Lu, Xiapu Luo:

Hiding an Ear in Plain Sight: On the Practicality and Implications of Acoustic Eavesdropping with Telecom Fiber Optic Cables. - Efrén López-Morales, Ulysse Planta, Gabriele Marra, Carlos Gonzalez-Cortes, Jacob Hopkins, Majid Garoosi, Elías Obreque, Carlos E. Rubio-Medrano, Ali Abbasi:

HoneySat: A Network-based Satellite Honeypot Framework. - Dongyu Meng, Fabio Gritti, Robert McLaughlin, Nicola Ruaro, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:

HOUSTON: Real-Time Anomaly Detection of Attacks against Ethereum DeFi Protocols. - Sina Kamali, Diogo Barradas:

Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement. - Manuel Andreas, Fabian Specht, Marius Momeu:

HyperMirage: Direct State Manipulation in Hybrid Virtual CPU Fuzzing. - Xiaohai Dai, Yiming Yu, Sisi Duan, Rui Hao, Jiang Xiao, Hai Jin:

Icarus: Achieving Performant Asynchronous BFT with Only Optimistic Paths. - Kaihua Wang, Jianjun Chen, Pinji Chen, Jianwei Zhuge, Jiaju Bai, Haixin Duan:

Identifying Logical Vulnerabilities in QUIC Implementations. - Luke Dramko, Claire Le Goues, Edward J. Schwartz:

Idioms: A Simple and Effective Framework for Turbo-Charging Local Neural Decompilation with Well-Defined Types. - Zhexi Lu, Hongliang Chi, Nathalie Baracaldo, Swanand Ravindra Kadhe, Yuseok Jeon, Lei Yu:

In-Context Probing for Membership Inference in Fine-Tuned Language Models. - Kim Hammar, Tansu Alpcan, Emil C. Lupu:

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination. - Daiping Liu, Danyu Sun, Zhenhua Chen, Shu Wang, Zhou Li:

Indicator of Benignity: An Industry View of False Positive in Malicious Domain Detection and its Mitigation. - Mengyuan Sun, Yu Li, Yunjie Ge, Yuchen Liu, Bo Du, Qian Wang:

InverTune: A Backdoor Defense Method for Multimodal Contrastive Learning via Backdoor-Adversarial Correlation Analysis. - Haoran Yang, Jiaming Guo, Shuangning Yang, Guoli Zhao, Qingqi Liu, Chi Zhang, Zhenlu Tan, Lixiao Shan, Qihang Zhou, Mengting Zhou, Jianwei Tai, Xiaoqi Jia:

IoTBec: An Accurate and Efficient Recurring Vulnerability Detection Framework for Black Box IoT devices. - Xiaohai Dai, Chaozheng Ding, Hai Jin, Julian Loss, Ling Ren:

Ipotane: Balancing the Good and Bad Cases of Asynchronous BFT. - Yingjie Cao, Xiaogang Zhu, Dean Sullivan, Haowei Yang, Lei Xue, Xian Li, Chenxiong Qian, Minrui Yan, Xiapu Luo:

IsolatOS: Detecting Double Fetch Bugs in COTS RTOS by Re-enabling Kernel Isolation. - Ziteng Chen, Menghao Zhang, Jiahao Cao, Xuzheng Chen, Qiyang Peng, Shicheng Wang, Guanyu Li, Mingwei Xu:

Janus: Enabling Expressive and Efficient ACLs in High-speed RDMA Clouds. - Wei Xu, Hui Zhu, Yandong Zheng, Song Bian, Ning Sun, Hao Yuan, Dengguo Feng, Hui Li:

Kangaroo: A Private and Amortized Inference Framework over WAN for Large-Scale Decision Tree Evaluation. - Wei Shao, Zequan Liang, Ruoyu Zhang, Ruijie Fang, Ning Miao, Ehsan Kourkchi, Setareh Rafatirad, Houman Homayoun, Chongzhou Fang:

Know Me by My Pulse: Toward Practical Continuous Authentication on Wearable Devices via Wrist-Worn PPG. - Yuhan Meng, School of Computer Science, Peking University, Shaofei Li, School of Computer Science, Peking University, Jiaping Gui, Peng Jiang, Ding Li:

KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and Accurate Provenance Analysis. - Zhanpeng Liu, Chenyang Li, Wende Tan, Yuan Li, Xinhui Han, Xi Cao, Yong Xie, Chao Zhang:

LatticeBox: A Hardware-Software Co-Designed Framework for Scalable and Low-Latency Compartmentalization. - Peijie Li, Huanhuan Chen, Kaitai Liang, Evangelia Anna Markatou:

Learning from Leakage: Database Reconstruction from Just a Few Multidimensional Range Queries. - Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing:

Les Dissonances: Cross-Tool Harvesting and Polluting in Pool-of-Tools Empowered LLM Agents. - Feng Luo, Zihao Li, Wenxuan Luo, Zheyuan He, Xiapu Luo, Zuchao Ma, Shuwei Song, Ting Chen:

Light into Darkness: Demystifying Profit Strategies Throughout the MEV Bot Lifecycle. - Kavita Kumari, Sasha Behrouzi, Alessandro Pegoraro, Ahmad-Reza Sadeghi:

Light2Lie: Detecting Deepfake Images Using Physical Reflectance Laws. - Khashayar Khajavi, Tao Wang:

Lightening the Load: A Cluster-Based Framework for A Lower-Overhead, Provable Website Fingerprinting Defense. - Marc Wyss, Yih-Chun Hu, Vincent Lenders, Roland Meier, Adrian Perrig:

Lightweight Internet Bandwidth Allocation and Isolation with Fractional Fair Shares. - Chenyu Zhang, Xiulong Liu, Hao Xu, Haochen Ren, Muhammad Shahzad, Guyue Liu, Keqiu Li:

Limitless Scalability: A High-Throughput and Replica-Agnostic BFT Consensus. - Bocheng Xiang, Yuan Zhang, Hao Huang, Fengyu Liu, Youkun Shi:

LinkGuard: A Lightweight State-Aware Runtime Guard Against Link Following Attacks in Windows File System. - Zheng Zhang, Haonan Li, Xingyu Li, Hang Zhang, Zhiyun Qian:

LLMBisect: Breaking Barriers in Bug Bisection with A Comparative Analysis Pipeline. - Pujan Paudel, Gianluca Stringhini:

LOKI: Proactively Discovering Online Scam Websites by Mining Toxic Search Queries. - Xinshu Ma, Michio Honda:

Looma: A Low-Latency PQTLS Authentication Architecture for Cloud Applications. - Zhi Li, Zhen Xu, Weijie Liu, XiaoFeng Wang, Hai Jin, Zheli Liu:

Losing the Beat: Understanding and Mitigating Desynchronization Risks in Container Isolation. - Sumair Ijaz Hashmi, Shafay Kashif, Lea Gröber, Katharina Krombholz, Mobin Javed:

Mapping the Cloud: A Mixed-Methods Study of Cloud Security and Privacy Configuration Challenges. - Eden Luzon, Guy Amit, Roy Weiss, Torsten Krauß, Alexandra Dmitrienko, Yisroel Mirsky:

Memory Backdoor Attacks on Neural Networks. - Carina Fiedler, Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Hannes Weissteiner, Abdullah Giray Yaglikçi, Florian Adamsky, Daniel Gruss:

Memory Band-Aid: A Principled Rowhammer Defense-in-Depth. - Weimin Chen, Xiapu Luo:

MEVisor: High-Throughput MEV Discovery in DEXs with GPU Parallelism. - Xiaoyun Xu, Shujian Yu, Zhuoran Liu, Stjepan Picek:

MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness. - Binbin Tu, Boyudong Zhu, Yang Cao, Yu Chen:

MinBucket MPSI: Breaking the Max-Size Bottleneck in Multi-Party Private Set Intersection. - Zachary Ratliff, RuoxingYang, Avery Bai, Harel Berger, Micah Sherr, James Mickens:

Mirage: Private, Mobility-based Routing for Censorship Evasion. - Hanyue Dou, Peifang Ni, Yingzi Gao, Jing Xu:

Mobius: Enabling Byzantine-Resilient Single Secret Leader Election with Uniquely Verifiable State. - Shuangxiang Kan, Xiao Cheng, Yuekang Li:

MUTATO: Enhancing Fuzz Drivers with Adaptive API Option Mutation. - Robin Vassantlal, Hasan Heydari, Bernardo Ferreira, Alysson Bessani:

MVP-ORAM: a Wait-free Concurrent ORAM for Confidential BFT Storage. - Wayne Wang, Aaron Ortwein, Enrique Sobrados, Robert Stanley, Piyush Kumar Sharma, Afsah Anwar, Roya Ensafi:

MVPNalyzer: An Investigative Framework for Auditing the Security & Privacy of Mobile VPNs. - Osama Bajaber, Bo Ji, Peng Gao:

NetCap: Data-Plane Capability-Based Defense Against Token Theft in Network Access. - Junchen Pan, Lei Zhang, Xiaoyong Si, Jie Zhang, Xinggong Zhang, Yong Cui:

NetRadar: Enabling Robust Carpet Bombing DDoS Detection. - Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi:

NeuroStrike: Neuron-Level Attacks on Aligned LLMs. - Ehsan Khodayarseresht, Suryadipta Majumdar, Serguei A. Mokhov, Mourad Debbabi:

NEXUS: Towards Accurate and Scalable Mapping between Vulnerabilities and Attack Techniques. - Reachal Wang, Yuqi Jia, Neil Zhenqiang Gong:

ObliInjection: Order-Oblivious Prompt Injection Attack to LLM Agents with Multi-source Data. - Kaiyuan Rong, Junqi Fang, Haixia Wang, Dapeng Ju, Dongsheng Wang:

OCCUPY+PROBE: Cross-Privilege Branch Target Buffer Side-Channel Attacks at Instruction Granularity. - Songze Li, Jiameng Cheng, Yiming Li, Xiaojun Jia, Dacheng Tao:

Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography. - Robert Beverly, Erik C. Rye:

On Borrowed Time: Measurement-Informed Understanding of the NTP Pool's Robustness to Monopoly Attacks. - Hocheol Nam, Daehyun Lim, Huancheng Zhou, Guofei Gu, Min Suk Kang:

On the Security Risks of Memory Adaptation and Augmentation in Data-plane DoS Mitigation. - Mengying Wu, Geng Hong, Jiatao Chen, Baojun Liu, Mingxuan Liu, Min Yang:

One Email, Many Faces: A Deep Dive into Identity Confusion in Email Aliases. - Mahdi Rahimi:

OptiMix: Scalable and Distributed Approaches for Latency Optimization in Modern Mixnets. - Shuai Wang, Ruifeng Li, Li Chen, Dan Li, Lancheng Qin, Qian Cao:

OSAVRoute: Advancing Outbound Source Address Validation Deployment Detection with Non-Cooperative Measurement. - Fangyuan Sun, Yaxi Yang, Jia Yu, Jianying Zhou:

PACS: Privacy-Preserving Attribute-Driven Community Search over Attributed Graphs. - Yan Pang, Wenlong Meng, Xiaojing Liao, Tianhao Wang:

Paladin: Defending LLM-enabled Phishing Emails with a New Trigger-Tag Paradigm. - Jérémie Decouchant, David Kozhaya, Vincent Rahli, Jiangshan Yu:

Pallas and Aegis: Rollback Resilience in TEE-Aided Blockchain Consensus. - Xin Wang, Haochen Wang, Haibin Zhang, Sisi Duan:

Pando: Extremely Scalable BFT Based on Committee Sampling. - Avinash Awasthi, Pritam Vediya, Hemant Miranka, Ramesh Babu Battula, Manoj Singh Gaur:

PANDORA: Lightweight Adversarial Defense for Edge IoT using Uncertainty-Aware Metric Learning. - Byeongdo Hong, Gunwoo Yoon:

Passive Multi-Target GUTI Identification via Visual-RF Correlation in LTE Networks. - Yingqian Hao, Hui Zou, Lu Zhou, Yuxuan Chen, Yanbiao Li:

PathProb: Probabilistic Inference and Path Scoring for Enhanced and Flexible BGP Route Leak Detection. - Rui Xiao, Sibo Feng, Soundarya Ramesh, Jun Han, Jinsong Han:

Peering Inside the Black-Box: Long-Range and Scalable Model Architecture Snooping via GPU Electromagnetic Side-Channel. - Jiayi Hu, Qi Tang, Xingkai Wang, Jinmeng Zhou, Rui Chang, Wenbo Shen:

PhantomMap: GPU-Assisted Kernel Exploitation. - Yan He, Guanchong Huang, Song Fang:

PhantomMotion: Laser-Based Motion Injection Attacks on Wireless Security Surveillance Systems. - Ahod Alghuried, David Mohaisen:

Phishing in Wonderland: Evaluating Learning-Based Ethereum Phishing Transaction Detection and Pitfalls. - Sayak Saha Roy, Shirin Nilizadeh:

PhishLang: A Real-Time, Fully Client-Side Phishing Detection Framework Using MobileBERT. - Zhicong Zheng, Jinghui Wu, Shilin Xiao, Yanze Ren, Chen Yan, Xiaoyu Ji, Wenyuan Xu:

PhyFuzz: Detecting Sensor Vulnerabilities with Physical Signal Fuzzing. - Jonas Hofmann, Philipp-Florens Lehwalder, Shahriar Ebrahimi, Parisa Hassanizadeh, Sebastian Faust:

PIRANHAS: PrIvacy-Preserving Remote Attestation in Non-Hierarchical Asynchronous Swarms. - Simeon Hoffmann, Nils Ole Tippenhauer:

Pitfalls for Security Isolation in Multi-CPU Systems. - Peihong Lin, Pengfei Wang, Lei Zhou, Gen Zhang, Xu Zhou, Wei Xie, Zhiyuan Jiang, Kai Lu:

PortRush: Detect Write Port Contention Side-Channel Vulnerabilities via Hardware Fuzzing. - Le Yang, Weijing You, Huiyang He, Kailiang Ji, Jingqiang Lin:

Practical Traceable Over-Threshold Multi-Party Private Set Intersection. - Yang Yang, Guomin Yang, Yingjiu Li, Pengfei Wu, Rui Shi, Minming Huang, Jian Weng, HweeHwa Pang, Robert H. Deng:

PriSrv+: Privacy and Usability-Enhanced Wireless Service Discovery with Fast and Expressive Matchmaking Encryption. - Quan Yuan, Xiaochen Li, Linkang Du, Min Chen, Mingyang Sun, Yunjun Gao, Shibo He, Jiming Chen, Zhikun Zhang:

PrivATE: Differentially Private Average Treatment Effect Estimation for Observational Data. - Zheng Liu, Chen Gong, Terry Yue Zhuo, Kecen Li, Weichen Yu, Matt Fredrikson, Tianhao Wang:

PrivCode: When Code Generation Meets Differential Privacy. - Chen Gong, Zheng Liu, Kecen Li, Tianhao Wang:

PrivORL: Differentially Private Synthetic Dataset for Offline Reinforcement Learning. - Jiawen Shi, Zenghui Yuan, Guiyao Tie, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun:

Prompt Injection Attack to Tool Selection in LLM Agents. - Xiangpu Song, Longjia Pei, Jianliang Wu, Yingpei Zeng, Gaoshuo He, Chaoshun Zuo, Xiaofeng Liu, Qingchuan Zhao, Shanqing Guo:

ProtocolGuard: Detecting Protocol Non-compliance Bugs via LLM-guided Static Analysis and Dynamic Verification. - Haya Schulmann, Niklas Vogel:

Pruning the Tree: Rethinking RPKI Architecture from the Ground up. - Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare:

Prεεmpt: Sanitizing Sensitive Prompts for LLMs. - Wei Zhao, Zhe Li, Yige Li, Jun Sun:

Q-MLLM: Vector Quantization for Robust Multimodal Large Language Model Security. - Cheng Chu, Qian Lou, Fan Chen, Lei Jiang:

QNBAD: Quantum Noise-induced Backdoor Attacks against Zero Noise Extrapolation. - Chen Chen, Zaiyan Xu, Mohamadreza Rostami, David Liu, Dileep Kalathil, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran:

ReFuzz: Reusing Tests for Processor Fuzzing with Contextual Bandits. - Boladji Vinny Adjibi, Athanasios Avgetidis, Manos Antonakakis, Alberto Dainotti, Michael D. Bailey, Fabian Monrose:

Repairing Trust in Domain Name Disputes Practices: Insights from a Quarter-Century's Worth of Squabbles. - Zihao Liu, Aobo Chen, Yan Zhang, Wensheng Zhang, Chenglin Miao:

Rethinking Fake Speech Detection: A Generalized Framework Leveraging Spectrogram Magnitude. - Alessandro Galeazzi, Pujan Paudel, Mauro Conti, Emiliano De Cristofaro, Gianluca Stringhini:

Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Twitter/X. - Zihang Xiang, Tianhao Wang, Cheng-Long Wang, Di Wang:

Revisiting Differentially Private Hyper-parameter Tuning. - Qi Tan, Yi Zhao, Laizhong Cui, Qi Li, Ming Zhu, Xing Fu, Weiqiang Wang, Xiaotong Lin, Ke Xu:

Robust Fraud Transaction Detection: A Two-Player Game Approach. - Kyle Zeng, Moritz Schloegel, Christopher Salls, Adam Doupé, Ruoyu Wang, Yan Shoshitaishvili, Tiffany Bao:

ropbot: Reimaging Code Reuse Attack Synthesis. - Xiangxiang Chen, Peixin Zhang, Jun Sun, Wenhai Wang, Jingyi Wang:

Rounding-Guided Backdoor Injection in Deep Learning Model Quantization. - Xiaoyu Fan, Kun Chen, Jiping Yu, Xin Liu, Yunyi Chen, Wei Xu:

RoundRole: Unlocking the Efficiency of Multi-party Computation with Bandwidth-aware Execution. - Eunkyu Lee, Junyoung Park, Insu Yun:

RTCON: Context-Adaptive Function-Level Fuzzing for RTOS Kernels. - Huaifeng Zhang, Ahmed Ali-Eldin:

RTrace: Towards Better Visibility of Shared Library Execution. - Zhechang Zhang, Hengkai Ye, Song Liu, Hong Hu:

SACK: Systematic Generation of Function Substitution Attacks Against Control-Flow Integrity. - Georgios Syros, Anshuman Suri, Jacob Ginesin, Cristina Nita-Rotaru, Alina Oprea:

SAGA: A Security Architecture for Governing AI Agentic Systems. - Mohsen Minaei, Ranjit Kumaresan, Andrew Beams, Pedro Moreno-Sanchez, Yibin Yang, Srinivasan Raghuraman, Panagiotis Chatzigiannis, Mahdi Zamani, Duc V. Le:

Scalable Off-Chain Auctions. - Martin Kayondo, Junseung You, Eunmin Kim, Jiwon Seo, Yunheung Paek:

SECV: Securing Connected Vehicles with Hardware Trust Anchors. - Nirajan Koirala, Seunghun Paik, Sam Martin, Helena Berens, Tasha Januszewicz, Jonathan Takeshita, Jae Hong Seo, Taeho Jung:

Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE. - Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin:

Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference. - Yuxiao Wu, Yunyi Zhang, Chaoyi Lu, Baojun Liu:

Should I Trust You? Rethinking the Principle of Zone-Based Isolation DNS Bailiwick Checking. - Seonghun Son, Chandrika Mukherjee, Reham Mohamed Aburas, Berk Gülmezoglu, Z. Berkay Celik:

Side-channel Inference of User Activities in AR/VR Using GPU Profiling. - Qi Wang, Jianjun Chen, Jingcheng Yang, Jiahe Zhang, Yaru Yang, Haixin Duan:

SIPConfusion: Exploiting SIP Semantic Ambiguities for Caller ID and SMS Spoofing. - Yaru Yang, Yiming Zhang, Tao Wan, Haixin Duan, Deliang Chang, Yishen Li, Shujun Tang:

Small Cell, Big Risk: A Security Assessment of 4G LTE Femtocells in the Wild. - Ruiyi Zhang, Albert Cheu, Adrià Gascón, Daniel Moghimi, Phillipp Schoppmann, Michael Schwarz, Octavian Suciu:

SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs. - Chenxu Wang, Junjie Huang, Yujun Liang, Xuanyao Peng, Yuqun Zhang, Fengwei Zhang, Jiannong Cao, Hang Lu, Rui Hou, Shoumeng Yan, Tao Wei, Zhengyu He:

SoK: Analysis of Accelerator TEE Designs. - Harjasleen Malvai, Francesca Falzon, Andrew Zitek-Estrada, Sarah Meiklejohn, Joseph Bonneau:

SoK: Cryptographic Authenticated Dictionaries. - Yinhao Hu, Pengyu Ding, Zhenpeng Lin, Dongliang Mu, Yuan Li:

SoK: Take a Deep Step into Linux Kernel Hardening Effectiveness from the Offensive-Defensive Perspective. - Shilin Xiao, Wenjun Zhu, Yan Jiang, Kai Wang, Peiwang Wang, Chen Yan, Xiaoyu Ji, Wenyuan Xu:

SoK: Understanding the Fundamentals and Implications of Sensor Out-of-band Vulnerabilities. - Mu Yuan, Lan Zhang, Yihang Cheng, Miao-Hui Song, Guoliang Xing, Xiang-Yang Li:

STIP: Three-Party Privacy-Preserving and Lossless Inference for Large Transformers in Production. - Francesco Da Dalt, Adrian Perrig:

Strategic Games and Zero Shot Attacks on Heavy-Hitter Network Flow Monitoring. - Yunkai Zou, Ding Wang, Fei Duan:

Success Rates Doubled with Only One Character: Mask Password Guessing. - Chenxiang Luo, David K. Y. Yau, Qun Song:

SVDefense: Effective Defense against Gradient Inversion Attacks via Singular Value Decomposition. - Zezhong Ren, Han Zheng, Zhiyao Feng, Qinying Wang, Marcel Busch, Yuqing Zhang, Chao Zhang, Mathias Payer:

SYSYPHUZZ: the Pressure of More Coverage. - Zhen Li, Ding Wang:

Targeted Password Guessing Using k-Nearest Neighbors. - Pascal Zimmer, Simon Lachnit, Alexander Jan Zielinski, Ghassan Karame:

Targeted Physical Evasion Attacks in the Near-Infrared Domain. - Mohammad Majid Akhtar, Rahat Masood, Muhammad Ikram, Salil S. Kanhere:

TBTrackerX: Fantastic Trigger Bots and Where to Find Malicious Campaigns on X. - Xunqi Liu, Nanzi Yang, Chang Li, Jinku Li, Jianfeng Ma, Kangjie Lu:

The Dark Side of Flexibility: Detecting Risky Permission Chaining Attacks in Serverless Applications. - Sri Hrushikesh Varma Bhupathiraju, Shaoyuan Xie, Michael Clifford, Qi Alfred Chen, Takeshi Sugawara, Sara Rampazzi:

The Heat is On: Understanding and Mitigating Vulnerabilities of Thermal Image Perception in Autonomous Systems. - Ruizhe Wang, Roberta De Viti, Aarushi Dubey, Elissa M. Redmiles:

The Role of Privacy Guarantees in Voluntary Donation of Private Health Data for Altruistic Goals. - Friedemann Lipphardt, Moonis Ali, Martin Banzer, Anja Feldmann, Devashish Gosain:

There is No War in Ba Sing Se: A Global Analysis of Content Moderation in Large Language Models. - Yunzhe Li, Jianan Wang, Hongzi Zhu, James Lin, Shan Chang, Minyi Guo:

ThinkTrap: Denial-of-Service Attacks against Black-box LLM Services via Infinite Thinking. - Nanyu Zhong, Yuekang Li, Yanyan Zou, Jiaxu Zhao, Jinwei Dong, Yang Xiao, Bingwei Peng, Yeting Li, Wei Wang, Wei Huo:

Through the Authentication Maze: Detecting Authentication Bypass Vulnerabilities in Firmware Binaries. - Hugo L. J. Bijmans, Michel van Eeten, Rolf van Wegberg:

Tickets to Hide: An Inside Look into the Anti-Abuse Ecosystem through Internal Abuse Data. - Vik Vanderlinden, Tom van Goethem, Mathy Vanhoef:

Time and Time Again: Leveraging TCP Timestamps to Improve Remote Timing Attacks. - Hongze Wang, Zhen Ling, Xiangyu Xu, Yumingzhi Pan, Guangchi Liu, Junzhou Luo, Xinwen Fu:

Time will Tell: Large-scale De-anonymization of Hidden I2P Services via Live Behavior Alignment. - Ernest Akpaku, Jinfu Chen, Joshua Ofoeda:

TIPSO-GAN: Malicious Network Traffic Detection Using a Novel Optimized Generative Adversarial Network. - Meenatchi Sundaram Muthu Selva Annamalai, Borja Balle, Jamie Hayes, Emiliano De Cristofaro:

To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling. - Jingcheng Yang, Enze Wang, Jianjun Chen, Qi Wang, Yuheng Zhang, Haixin Duan, Wei Xie, Baosheng Wang:

Token Time Bomb: Evaluating JWT Implementations for Vulnerability Discovery. - Shiqian Zhao, Chong Wang, Yiming Li, Yihao Huang, Wenjie Qu, Siew-Kei Lam, Yi Xie, Kangjie Chen, Jie Zhang, Tianwei Zhang:

Towards Effective Prompt Stealing Attack against Text-to-Image Diffusion Models. - Senapati Diwangkara, Yinzhi Cao:

TranSPArent: Taint-style Vulnerability Detection in Generic Single Page Applications through Automated Framework Abstraction. - Shir Bernstein, David Beste, Daniel Ayzenshteyn, Lea Schönherr, Yisroel Mirsky:

Trust Me, I Know This Function: Hijacking LLM Static Analysis using Bias. - Huaiyu Yan, Zhen Ling, Xuandong Chen, Xinhui Shao, Yier Jin, Haobo Li, Ming Yang, Ping Jiang, Junzhou Luo:

UIEE: Secure and Efficient User-space Isolated Execution Environment for Embedded TEE Systems. - Hanqing Zhao, Yiming Zhang, Lingyun Ying, Mingming Zhang, Baojun Liu, Haixin Duan, Zi-Quan You, Shuhao Zhang:

Understanding the Status and Strategies of the Code Signing Abuse Ecosystem. - Yihao Chen, Qi Li, Ke Xu, Zhuotao Liu, Jianping Wu:

Understanding the Stealthy BGP Hijacking Risk in the ROV Era. - Giacomo Longo, Giacomo Ratto, Alessio Merlo, Enrico Russo:

Unknown Target: Uncovering and Detecting Novel In-Flight Attacks to Collision Avoidance (TCAS). - Shang Wang, Tianqing Zhu, Dayong Ye, Hua Ma, Bo Liu, Ming Ding, Shengfang Zhai, Yansong Gao:

Unshaken by Weak Embedding: Robust Probabilistic Watermarking for Dataset Copyright Protection. - Andrea Monzani, Antonio Parata, Andrea Oliveri, Simone Aonzo, Davide Balzarotti, Andrea Lanzi:

Unveiling BYOVD Threats: Malware's Use and Abuse of Kernel Drivers. - Chuan Qin, Cen Zhang, Yaowen Zheng, Puzhuo Liu, Jian Zhang, Yeting Li, Weidong Zhang, Yang Liu, Limin Sun:

User-Space Dependency-Aware Rehosting for Linux-Based Firmware Binaries. - Di Zhai, Jiashuo Zhang, Jianbo Gao, Tianhao Liu, Tao Zhang, Jian Wang, Jiqiang Liu:

Validity Is Not Enough: Uncovering the Security Pitfall in Chainlink's Off-Chain Reporting Protocol. - Andrea Infantino, Mir Masood Ali, Kostas Solomos, Jason Polakis:

Vault Raider: Stealthy UI-based Attacks Against Password Managers in Desktop Environments. - Huayi Qi, Minghui Xu, Xiaohua Jia, Xiuzhen Cheng:

VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness. - Guofu Liao, Taotao Wang, Shengli Zhang, Jiqun Zhang, Long Shi, Dacheng Tao:

VeriLoRA: Fine-Tuning Large Language Models with Verifiable Security via Zero-Knowledge Proofs. - Quan Yuan, Zhikun Zhang, Linkang Du, Min Chen, Mingyang Sun, Yunjun Gao, Shibo He, Jiming Chen:

VICTOR: Dataset Copyright Auditing in Video Recognition Systems. - Ahmad Albarqawi, Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:

ViGText: Deepfake Image Detection with Vision-Language Model Explanations and Graph Neural Networks. - Huaijin Wang, Zhiqiang Lin:

vSim: Semantics-Aware Value Extraction for Efficient Binary Code Similarity Analysis. - Yutao Hu, Chaofan Li, Yueming Wu, Yifeng Cai, Deqing Zou:

VulSCA: A Community-Level SCA Approach for Accurate C/C++ Supply Chain Vulnerability Analysis. - Xue Tan, Hao Luan, Mingyu Luo, Zhuyang Yu, Jun Dai, Xiaoyan Sun, Ping Chen:

Was My Data Used for Training? Membership Inference in Open-Source LLMs via Neural Activations. - Yang Shi, Tianchen Gao, Yimin Li, Jiayao Gao, Kaifeng Huang:

WBSLT: A Framework for White-Box Encryption Based on Substitution-Linear Transformation Ciphers. - Zilin Shen, Imtiaz Karim, Elisa Bertino:

WCDCAnalyzer: Scalable Security Analysis of Wi-Fi Certified Device Connectivity Protocols. - Xingyu Li, Juefei Pu, Yifan Wu, Xiaochen Zou, Shitong Zhu, Qiushi Wu, Zheng Zhang, Joshua Hsu, Yue Dong, Zhiyun Qian, Kangjie Lu, Trent Jaeger, Michael J. De Lucia, Srikanth V. Krishnamurthy:

What Do They Fix? LLM-Aided Categorization of Security Patches for Critical Memory Bugs. - Guanlong Wu, Taojie Wang, Yao Zhang, Zheng Zhang, Jianyu Niu, Ye Wu, Yinqian Zhang:

When Cache Poisoning Meets LLM Systems: Semantic Cache Poisoning and Its Countermeasures. - Bo Jiang, Wanrong Zhang, Donghang Lu, Jian Du, Qiang Yan:

When Focus Enhances Utility: Target Range LDP Frequency Estimation and Unknown Item Discovery. - Mahdi Rahimi:

When Mixnets Fail: Evaluating, Quantifying, and Mitigating the Impact of Adversarial Nodes in Mix Networks. - Zhi Lu, Yongquan Cui, Songfeng Lu:

WhiteCloak: How to Hold Anonymous Malicious Clients Accountable in Secure Aggregation? - Ronghua Li, Shinan Liu, Haibo Hu, Qingqing Ye, Nick Feamster:

WiFinger: Fingerprinting Noisy IoT Event Traffic Using Packet-level Sequence Matching. - Christopher Vattheuer, Justin Feng, Hossein Khalili, Nader Sehatbakhsh, Omid Abari:

XR Devices Send WiFi Packets When They Should Not: Cross-Building Keylogging Attacks via Non-Cooperative Wireless Sensing. - Yixiao Zheng, Changzheng Wei, Xiaodong Qi, Hanghang Wu, Yuhan Wu, Li Lin, Tianmin Song, Ying Yan, Yanqing Yang, Zhao Zhang, Cheqing Jin, Aoying Zhou:

ZKSL: Verifiable and Efficient Split Federated Learning via Asynchronous Zero-Knowledge Proofs.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














