MAY 22-25, 2023 AT THE HYATT REGENCY, SAN FRANCISCO, CA & ONLINE
44th IEEE Symposium on
Security and Privacy
Poster: Deanonymization of Bitcoin transactions based on network traffic analysis with semi-supervised learning
Chuanyong Tian ( Beijing University of Posts and Telecommunications ), Ruisheng Shi ( Beijing University of Posts and Telecommunications ), Lina Lan ( Beijing University of Posts and Telecommunications ), Zhiyuan Peng ( Beijing University of Posts and Telecommunications ), Yulian Ge ( Beijing University of Posts and Telecommunications ), Yuxuan Liang ( Beijing University of Posts and Telecommunications ), Peng Liu ( The Pennsylvania State University )
Poster: No safety in numbers: traffic analysis of sealed-sender groups in Signal
Eric Brigham ( University of Minnesota ), Nicholas Hopper ( University of Minnesota )
Poster: VIDEZZO: Dependency-aware Virtual Device Fuzzing
Qiang Liu ( Zhejiang University; EPFL ), Flavio Toffalini ( EPFL ), Yajin Zhou ( Zhejiang University ), Mathias Payer ( EPFL )
Poster: Demystifying Exploitable Bugs in Smart Contracts
Zhuo Zhang ( Purdue University ), Brian Zhang ( Harrison High School (Tippecanoe) ), Wen Xu ( Georgia Institute of Technology ), Zhiqiang Lin ( Ohio State University )
Poster: SecureCells: A Secure Compartmentalized Architecture
Atri Bhattacharyya ( EPFL ), Florian Hofhammer ( EPFL ), Yuanlong Li ( EPFL ), Siddharth Gupta ( EPFL ), Andres Sanchez ( EPFL ), Babak Falsafi ( EPFL ), Mathias Payer ( EPFL )
Poster: Hand-covered PIN Authentication for Virtual Reality
Kyle McCraine ( Louisiana State University ), Zeyu Deng ( Louisiana State University ), Chen Wang ( Louisiana State University )
Poster: WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches
Jianhao Xu ( Nanjing University ), Luca Di Bartolomeo ( EPFL ), Flavio Toffalini ( EPFL ), Bing Mao ( Nanjing University ), Mathias Payer ( EPFL )
Poster: “I Have Nothing to Protect”: Understanding the Factors of Adoption of 2FA in Social Media
Yeeun Jo ( University of Illinois Urbana-Champaign ), Margie Ruffin ( University of Illinois Urbana-Champaign ), Mahnoor Jameel ( University of Illinois Urbana-Champaign ), Camille Cobb ( University of Illinois Urbana-Champaign )
Poster: Verifiable Fully Homomorphic Encryption
Christian Knabenhans ( ETH Zurich ), Alexander Viand ( ETH Zurich ), Anwar Hithnawi ( ETH Zurich ), Christian Knabenhans ( ETHZ )
Poster: Towards Refinement Types in Rust
Jasper Gräflich ( Agentur für Innovationen in der Cybersicherheit )
Poster: ThreatKG - A System for Automated Cyber Threat Knowledge Gathering and Management
Zhengjie Ji ( Virginia Tech ), Xiaoyuan Liu ( UC Berkeley ), Edward Choi ( UC Berkeley ), Sibo Ma ( UC Berkeley ), Xinyu Yang ( Virginia Tech ), Dawn Song ( UC Berkeley ), Peng Gao ( Virginia Tech )
Poster: Resiliency in Low Earth Orbit Satellite Routing
Robert Esswein ( University of Pittsburgh ), Sean O'Melia ( MIT Lincoln Laboratory ), Richard Skowyra ( MIT Lincoln Laboratory ), Mai Abdelhakim ( University of Pittsburgh ), Robert Cunningham ( University of Pittsburg )
Poster: A Self-auditing Protocol for Decentralized Cloud Storage via Trusted Hardware Components
Josh Dafoe ( Michigan Technological University ), Niusen Chen ( PhD. candidate in Michigan Technological University ), Bo Chen ( Michigan Technological University )
Poster: TEEzz – Fuzzing Trusted Applications on COTS Android Devices
Marcel Busch ( EPFL ), Aravind Machiry ( Purdue University ), Chad Spensky ( Allthenticate ), Giovanni Vigna ( UC Santa Barbara ), Christopher Kruegel ( University of California, Santa Barbara ), Mathias Payer ( EPFL )
Poster: Extracting Insights from Censorship Measurement Data Using Statistical Techniques
Anna Crowder ( University of Florida ), Kevin Butler ( University of Florida )
Poster: Attendee Survey of an Educational Threat Hunting Exercise
Mahnoor Jameel ( University of Illinois Urbana-Champaign ), Adam Bates ( University of Illinois Urbana-Champaign )
Poster: Towards Continual Learning for Malware Classification
Mohammad Saidur Rahman ( Rochester Institute of Technology ), Scott E. Coull ( Mandiant ), Matthew Wright ( Rochester Institute of Technology )
Poster: Committee Moderation on Encrypted Messaging Platforms
Alistair Pattison ( Carleton College and University of Minnesota ), Nicholas Hopper ( University of Minnesota )
Poster: A Template for developing NIST CSF Profiles
Shreenandan Rajarathnam ( University of Tennessee, Knoxville ), Vandana Singh ( University of Tennessee, Knoxville )
Poster: Intellectual Property Infringement Assessment of Code Language Models
Zhiyuan Yu ( Washington University in St. Louis ), Yuhao Wu ( Washington University in St. Louis ), Ning Zhang ( Washington University in St. Louis ), Chenguang Wang ( Washington University in St. Louis ), Yevgeniy Vorobeychik ( Washington University in St. Louis ), Chaowei Xiao ( Arizona State University )
Poster: What Behaviors Are in Your System Log Dataset?
Jason Liu ( University of Illinois at Urbana-Champaign ), Andy Riddle ( University of Illinois at Urbana-Champaign ), Kim Westfall ( University of Illinois at Urbana-Champaign ), Adam Bates ( University of Illinois at Urbana-Champaign )
Poster: Snooping Online Form Choice Privacy in Video Calls
Steven Seiden ( Louisiana State University ), Long Huang ( Louisiana State University ), Chen Wang ( Louisiana State University )
Poster: Packing-aware Pruning for Efficient Private Inference based on Homomorphic Encryption
Parsa Ghazvinian ( Georgia State University ), Robert Podschwadt ( Georgia State University ), Prajwal Panzade ( Georgia State University ), Mohammad H. Rafiei ( Georgia State University ), Daniel Takabi ( Georgia State University )
Poster: Your Access Control List Is Recoverable Even if Your OS Is Compromised
Caleb Rother ( Michigan Technological University ), Bo Chen ( Michigan Technological University )
Poster: OCTAL: Data Oblivious Programming Language
Biniyam Mengist Tiruye ( University of Michigan ), Lauren Biernacki ( University of Michigan ), Todd Austin ( University of Michigan )
Poster: Assisting Static Analysis with Large Language Models: A ChatGPT Experiment
Haonan Li ( UC Riverside ), Yu Hao ( UC Riverside ), Yizhuo Zhai ( University of California, Riverside ), Zhiyun Qian ( UC Riverside )
Poster: Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
Akul Goyal ( University of Illinois at Urbana-Champaign ), Xueyuan Han ( Wake Forest University ), Gang Wang ( University of Illinois at Urbana-Champaign ), Adam Bates ( University of Illinois at Urbana-Champaign )
Poster: How do Endpoint Detection Products Make Use of MITRE ATT&CK?
Apurva Virkud ( University of Illinois Urbana-Champaign ), Muhammad Adil Inam ( University of Illinois Urbana-Champaign ), Andy Riddle ( University of Illinois Urbana-Champaign ), Gang Wang ( University of Illinois Urbana-Champaign ), Adam Bates ( University of Illinois Urbana-Champaign )
Poster: Foundational Approaches to Formalizing Cryptography can be both Powerful and Usable
Devon Tuma ( University of Minnesota ), Nick Hopper ( University of Minnesota )
Poster: BLEDiff : Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations
Imtiaz Karim ( Purdue University ), Abdullah Al Ishtiaq ( Pennsylvania State University ), Syed Rafiul Hussain ( Pennsylvania State University ), Elisa Bertino ( Purdue University )