CANnon: Stealthy Remote Shutdown Attacks via Automotive MCUs
Sekar Kulandaivel
Constant-Time Foundations for the New Spectre Era
Sunjay Cauligi and Craig Disselkoen
Detecting AI Trojans Using Meta Neural Analysis
Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li
Differentially Private Imaging via Latent Space Manipulation
Tao Li and Chris Clifton
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
Joachim Neu, Nusret Tas, David Tse
Explainability-based Backdoor Attacks Against Graph Neural Networks
Jing Xu, Minhui Xue, Stjepan Picek
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
Ningfei Wang, Yulong Cao, Chaowei Xiao, Daweil Yang, Jin Fang, Ruigang Yang, Qi Alfredo Chen, Mingyan Liu, Bo Li
Known Vulnerability Detection for WebAssembly Binaries
Luis Garcia,Pengfei Sun, Yi Han, Saman Zonouz and Yao Zhao
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar
Machine Unlearning
Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers
On the (Im)Practicality of Adversarial Perturbation for Image Privacy
Arezoo Rajabi, Rakesh Bobba, Mike Rosulek, Charles V. Wright and Wu-Chi Feng
Privacy Preserving Recurrent Neural Network (RNN) Prediction using Homomorphic Encryption
Robert Podschwadt, Daniel Takabi
Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim
Proof-of-Learning: Definitions and Practice
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi
Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi
Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention
Yibo Wang , Yuzhe Tang, Kai Li, and Sencer Burak Somuncuoglu
Security vs. Privacy in Cyber-Physical Systems
Luis Burbano, Gabriel Torres
Speculative Data-Oblivious Execution: Mobilizing Safe Prediction For Safe and Efficient Speculative Execution
Jiyong Yu, Namrata Mantri, Josep Torrellas, Adam Morrison, Christopher W. Fletcher
Symbolic Modeling of Micro Services for Intrusion Detection
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang
Uncover the Veil: The First Lesson We Learn from a Real-world Bulk Power System
Xi Qin, Neil Ortiz, Alvaro A. Cardenas
Bitcoin-Compatible Virtual Channels
Oguzhan Ersoy
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
Timothy Trippel
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
Sijun Tan
FPFlow: Detect and Prevent Browser Fingerprinting with Dynamic Taint Analysis
Tianyi Li, Xiaofeng Zheng, Kaiwen Shen and Xinhui Han
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
Umar Iqbal
Fraud Detection with Confidence: A Benchmarking Case Study on Synthetic Data
Daniel Turner-Szymkiewicz, Prof. Ulf Norinder, Dr. Miroslawa Alunowska Figueroa, Dr. Edgar Lopez-Rojas
High-Frequency Trading on Decentralized On-Chain Exchanges
Liyi Zhou
Is it Possible to Detect Unknown DNS Covert Channel With No Support of Real Malware Samples?
Jiawen Diao, Zhongru Wang, Xiang Cui, Tian Wang and Hai Jiang
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
Guillermo Pascual-Perez
MPCLeague: Robust and Efficient Mixed-protocol Framework for 4-party Computation
Nishat Koti, Arpita Patra and Ajith Suresh
Mobile Payment Applications: Risks and Possibilities
Trishla Shah, Raghav Sampangi and Angela Siegel
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
Kaihua Qin
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision
Yushi Cheng, Chen Yan
Proof-of-Learning: Definitions and Practice
Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Anvith Thudi
Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi
Rosita++: Automatic Second-Order Leakage Elimination from Cryptographic Code
Madura A. Shelton, Niels Samwel, Łukasz Chmielewski, Lejla Batina, Markus Wagner, Yuval Yarom
Specification-Based Process Control Attack Detection in Substation Automation
Muhammad Nouman Nafees, Neetesh Saxena and Pete Burnap
Squirrel: An Interactive Prover for Protocol Verification in the Computational Model
David Baelde, Stéphanie Delaune, Charlie Jacomme, Adrien Koutsos, and Solène Moreau.
Panelists | |
Roger Dingledine | The Tor Project |
Joseph Bonneau | New York University |
Katie Shilton | University of Maryland College Park |
Erin Kenneally | Guidewire and Elchemy |
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Jianwei Niu
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar and Heiko Ludwig
Good Bot, Bad Bot: Characterizing Automated Browsing Activity
Xigao Li, Babak Amin Azad, Amir Rahmati, Nick Nikiforakis
Is Private Learning Possible with Instance Encoding?
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, Florian Tramèr
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning
Yi Zhou, Kamala Varma, Nathalie Baracaldo, Ali Anwar
Privacy Regularization: Joint Privacy-Utility Optimization in Text-Generation Models
Fatemehsadat Mireshghallah, Huseyin A. Inan, Marcello Hasegawa, Victor Ruhle, Taylor Berg-Kirkpatrick and Robert Sim
Revolutionary DoH: Effective DNS Service
Rintaro Kobayashi
Symbolic Modeling of Micro Services for Intrusion Detection
William Blair, Federtico Araujo, Teryl Taylor, Jiyong Jang
Twice the Fun: Adapting Unicast Privacy Notions for Group Communication
Christoph Coijanovic, Christiane Kuhn and Thorsten Strufe